University of Oulu

Gomes, J. F., Iivari, M., Ahokangas, P., Isotalo, L., & Niemelä, R. (2017). Cybersecurity Business Models for IoT-Mobile Device Management Services in Futures Digital Hospitals. Journal of ICT Standardization, 5(1), 107–128. https://doi.org/10.13052/jicts2245-800x.516

Cybersecurity business models of IoT-Mobile management services in futures digital hospitals

Saved in:
Author: Gomes, Julius Francis1; Iivari, Marika1; Ahokangas, Petri1;
Organizations: 1Martti Ahtisaari Institute of Global Business & Economics, Oulu Business School, University of Oulu, Finland
2Elisa Corporation, Finland
3MedicalMountains AG, Tuttlingen, Germany
Format: article
Version: published version
Access: open
Online Access: PDF Full Text (PDF, 0.4 MB)
Persistent link: http://urn.fi/urn:nbn:fi-fe2020090167141
Language: English
Published: River Publishers, 2017
Publish Date: 2020-09-01
Description:

Abstract

Hospitals as critical infrastructures has been historically dependent on various types of devices and equipment that are being revolutionized with digitalized solutions. The digitalization of conventional healthcare equipment is added with the new inclusion of numerous new devices for data collection, analysis, communication, and so on. All in all, the futures digital hospitals in 5G will be exponentially more data-dependent and digital-intensive. For that, this paper looks to theorize how the security scenario in a futures digital hospital would look like, and what relevant business possibilities could emerge for cybersecurity providers in the healthcare context. In this paper, we open up discussions on business possibilities relevant to Internet of Things-mobile device management for critical infrastructures such as future digital hospital. We apply business models as a conceptual lens to analyze how cybersecurity business could evolve for 5G enabled IoT-Mobile device management providers as a cybersecurity vendor.

see all

Series: Journal of ICT standardization
ISSN: 2245-800X
ISSN-E: 2246-0853
ISSN-L: 2245-800X
Volume: 5
Issue: 1
Pages: 107 - 128
DOI: 10.13052/jicts2245-800X.516
OADOI: https://oadoi.org/10.13052/jicts2245-800X.516
Type of Publication: A1 Journal article – refereed
Field of Science: 213 Electronic, automation and communications engineering, electronics
Subjects:
Funding: This study has been supported by the DIMECC Cyber Trust – Digital cyber security program.
Copyright information: This is an Open Access publication. © 2017 the Author(s). All rights reserved.