Gomes, J. F., Iivari, M., Ahokangas, P., Isotalo, L., & Niemelä, R. (2017). Cybersecurity Business Models for IoT-Mobile Device Management Services in Futures Digital Hospitals. Journal of ICT Standardization, 5(1), 107–128. https://doi.org/10.13052/jicts2245-800x.516
Cybersecurity business models of IoT-Mobile management services in futures digital hospitals
|Author:||Gomes, Julius Francis1; Iivari, Marika1; Ahokangas, Petri1;|
1Martti Ahtisaari Institute of Global Business & Economics, Oulu Business School, University of Oulu, Finland
2Elisa Corporation, Finland
3MedicalMountains AG, Tuttlingen, Germany
|Online Access:||PDF Full Text (PDF, 0.4 MB)|
|Persistent link:|| http://urn.fi/urn:nbn:fi-fe2020090167141
|Publish Date:|| 2020-09-01
Hospitals as critical infrastructures has been historically dependent on various types of devices and equipment that are being revolutionized with digitalized solutions. The digitalization of conventional healthcare equipment is added with the new inclusion of numerous new devices for data collection, analysis, communication, and so on. All in all, the futures digital hospitals in 5G will be exponentially more data-dependent and digital-intensive. For that, this paper looks to theorize how the security scenario in a futures digital hospital would look like, and what relevant business possibilities could emerge for cybersecurity providers in the healthcare context. In this paper, we open up discussions on business possibilities relevant to Internet of Things-mobile device management for critical infrastructures such as future digital hospital. We apply business models as a conceptual lens to analyze how cybersecurity business could evolve for 5G enabled IoT-Mobile device management providers as a cybersecurity vendor.
Journal of ICT standardization
|Pages:||107 - 128|
|Type of Publication:||
A1 Journal article – refereed
|Field of Science:||
213 Electronic, automation and communications engineering, electronics
This study has been supported by the DIMECC Cyber Trust – Digital cyber security program.
This is an Open Access publication. © 2017 the Author(s). All rights reserved.