Cybersecurity business models of IoT-mobile management services in futures digital hospitals |
|
Author: | Gomes, Julius Francis1; Iivari, Marika1; Ahokangas, Petri1; |
Organizations: |
1Martti Ahtisaari Institute of Global Business & Economics, Oulu Business School, University of Oulu, Finland 2Elisa Corporation, Finland 3MedicalMountains AG, Tuttlingen, Germany |
Format: | article |
Version: | published version |
Access: | open |
Online Access: | PDF Full Text (PDF, 0.4 MB) |
Persistent link: | http://urn.fi/urn:nbn:fi-fe2020090167141 |
Language: | English |
Published: |
River Publishers,
2017
|
Publish Date: | 2020-09-01 |
Description: |
AbstractHospitals as critical infrastructures has been historically dependent on various types of devices and equipment that are being revolutionized with digitalized solutions. The digitalization of conventional healthcare equipment is added with the new inclusion of numerous new devices for data collection, analysis, communication, and so on. All in all, the futures digital hospitals in 5G will be exponentially more data-dependent and digital-intensive. For that, this paper looks to theorize how the security scenario in a futures digital hospital would look like, and what relevant business possibilities could emerge for cybersecurity providers in the healthcare context. In this paper, we open up discussions on business possibilities relevant to Internet of Things-mobile device management for critical infrastructures such as future digital hospital. We apply business models as a conceptual lens to analyze how cybersecurity business could evolve for 5G enabled IoT-Mobile device management providers as a cybersecurity vendor. see all
|
Series: |
Journal of ICT standardization |
ISSN: | 2245-800X |
ISSN-E: | 2246-0853 |
ISSN-L: | 2245-800X |
Volume: | 5 |
Issue: | 1 |
Pages: | 107 - 128 |
DOI: | 10.13052/jicts2245-800X.516 |
OADOI: | https://oadoi.org/10.13052/jicts2245-800X.516 |
Type of Publication: |
A1 Journal article – refereed |
Field of Science: |
213 Electronic, automation and communications engineering, electronics |
Subjects: | |
Funding: |
This study has been supported by the DIMECC Cyber Trust – Digital cyber security program. |
Copyright information: |
This is an Open Access publication. © 2017 the Author(s). All rights reserved. |