ISSN: A/F

Enhancing Hospital Operations and Patient Care: The Role of AI in Smart Healthcare Systems

Abstract

This paper explores the growing threat of ransomware attacks against businesses and sets forth ways to put effective defensive measures in place. Qualitative research, through case studies and interviews of experts, allows the researcher to examine critical aspects of ransomware defense, which include identifying vulnerabilities, advanced preventive measures, training of employees, dynamic incident response, and legal and ethical considerations. Findings underscore the need for proactive vulnerability management, strategic investment in AI-driven security technologies, continuous employee education, and dynamic incident response planning. The research emphasizes ethical considerations in ransomware negotiations and provides actionable recommendations to enhance organizational resilience against such threats.

References

  1. Smith, J., & White, R. (2023). Mitigating Ransomware: Best Practices for Businesses. Cybersecurity Journal, 45(2), 123–145
  2. Johnson, T., & Miller, P. (2022). The Role of AI in Threat Detection. International Journal of Cyber Defense, 12(3), 89–110
  3. Davis, L., & Carter, A. (2021). Incident Response in the Age of Ransomware. Business Continuity Review, 18(1), 47–63
  4. Green, K., & Lopez, S. (2020). Employee Training and Cybersecurity Awareness Programs. Journal of IT Management, 33(4), 67–89
  5. Patel, R., & Chen, Y. (2023). Legal and Ethical Issues in Cybercrime Negotiations. Law and Technology Journal, 29(1), 102–128
  6. Morgan, B. (2021). Vulnerability Assessments and Proactive Security. Cyber Risk Insights, 22(5), 77–95
  7. O'Brien, J., & Singh, M. (2023). AI-Driven Threat Detection: Challenges and Opportunities. Journal of Advanced Cyber Studies, 19(2), 56–78
  8. Lewis, T., & Zhang, H. (2020). The Ethics of Ransom Payments: A Global Perspective. Journal of Information Ethics, 15(3), 14–36
  9. Clarke, P., & Rivera, J. (2022). Evolving Ransomware Tactics and Their Implications. Digital Defense Quarterly, 27(1), 32–51
  10. Baker, E., & Wilson, G. (2023). Cybersecurity Challenges in Small Businesses. Journal of Cyber Resilience, 9(4), 123–145
  11. Kumar N (2024) “Health Care DNS Tunnelling Detection Method via Spiking Neural Network” Lecture Notes in Electrical Engineering, Springer Nature, pp715-725. DOI: 10.1007/978-981-99-8646-0_56
  12. T. Parashar, K. Joshi, R. R. N, D. Verma, N. Kumar and K. S. Krishna, "Skin Disease Detection using Deep Learning," 2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART), Moradabad, India, 2022, pp. 1380-1384, doi: 10.1109/SMART55829.2022.10047465
Download PDF

How to Cite

Vishwash Singh, (2025-03-05 19:05:17.204). Enhancing Hospital Operations and Patient Care: The Role of AI in Smart Healthcare Systems. JANOLI International Journal of Cyber Security, Volume QlF27Gax0kgzWMWcJnBX, Issue 1.