Cybersecurity Business Models for IoT-Mobile Device Management Services in Futures Digital Hospitals
DOI:
https://doi.org/10.13052/jicts2245-800X.516Keywords:
Internet of Things, Mobile Device Management, Business Model, Digital Hospital, 5G Security, CybersecurityAbstract
Hospitals as critical infrastructures has been historically dependent on various types of devices and equipment that are being revolutionized with digitalized solutions. The digitalization of conventional healthcare equipment is added with the new inclusion of numerous new devices for data collection, analysis, communication, and so on. All in all, the futures digital hospitals in 5G will be exponentially more data-dependent and digital-intensive. For that, this paper looks to theorize how the security scenario in a futures digital hospital would look like, and what relevant business possibilities could emerge for cybersecurity providers in the healthcare context. In this paper, we open up discussions on business possibilities relevant to Internet of Things-mobile device management for critical infrastructures such as future digital hospital. We apply business models as a conceptual lens to analyze how cybersecurity business could evolve for 5G enabled IoT-Mobile device management providers as a cybersecurity vendor.
Downloads
References
Gomes, J. F., Pikkarainen, M., Ahokangas, P., and Niemelä, R. (2017). Towards business ecosystems for connected health. Finnish Journal of EHealth and EWelfare, 9, 95–111. doi:10.23996/fjhw.61004
PWC. (2017). Strategically managing emerging cyber risks. Accessed on: 1 September, 2017. Available at: https://www.pwc.com/us/en/cybersecurity/broader-perspectives/ransomware-global-outbreak.html
Lehto, I., and Ahokangas, P. (2017). “Mobile Security Business Models for Critical Infrastructures – An Ecosystemic Approach”, in Proceedings of the 24th Nordic Academy of Management Conference 2017, Bodo, Norway.
Pinto, Z. (2013). Cyber security – product of service? Accessed on: 29 August, 2017 Available at: http://www.automationworld.com/security/cyber-security-product-or-service
Loebbecke, C., and Picot, A. (2015). Reflections on societal and business model transformation arising from digitization and big data analytics: A research agenda. The Journal of Strategic Information Systems, 24, 149–157.
Himidan, S., and Kim, P. (2015). The evolving identity, capacity, and capability of the future surgeon. In Seminars in pediatric surgery, 24, 145–149, WB Saunders.
Thimbleby, H. (2013). Technology and the future of healthcare. J. Public Health Res. 2. doi:10.4081/jphr.2013.e28
Beimborn, D., and Palitza, M. (2013). “Enterprise app stores for mobile applications-development of a benefits framework”, in Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois.
Ortbach, K., Brockmann, T., and Stieglitz, S. (2014). “Drivers for the adoption of mobile device management in organizations”, in proceedings of the Twenty Second European Conference on Information Systems, Tel Aviv 2014.
Wirtz, B. W., Schilke, O., and Ullrich, S. (2010). Strategic development of business models: implications of the Web 2.0 for creating value on the internet. Long range planning, 43, 272–290.
Afuah, A. (2004). Business Models: A Strategic Management Approach. McGraw-Hill/Irwin.
Alt, R., and Zimmermann, H. D. (2001). Preface: introduction to special section–business models. Electronic markets, 11, 3–9.
Chesbrough, H., and Rosenbloom, R. S. (2002). The role of the business model in capturing value from innovation: evidence from Xerox Corporation’s technology spin-off companies. Industrial and corporate change, 11, 529–555.
Shafer, S. M., Smith, H. J., and Linder, J. C. (2005). The power of business models. Business horizons, 48, 199–207.
Zott, C., and Amit, R. (2010). Business model design: an activity system perspective. Long range planning, 43, 216–226.
Takalo, T. (2016). IoT vs. Mobile Device Management. Accessed on: 25 August, 2017. Available at: http://www.capricode.com/iot-vs-mobile/
Gartner. (2011). Magic quadrant for mobile device management software. Available at: http://www.knet.com.au/uploads/5/7/1/8/57184575/magic_quadrant_gartner.pdf
Xu, T., Wendt, J. B., and Potkonjak, M. (2014). Security of IoT systems: Design challenges and opportunities. In Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design, 417–423. IEEE Press.
Zhang, Z. K., Cho, M. C. Y., and Shieh, S. (2015). Emerging security threats and countermeasures in IoT. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, 1–6. ACM.
Takalo, T. (2016). Should IoT Device Management be automated? Accessed on: 25 August, 2017. Available at: http://www.capricode.com/automatic-iot-device-management/
Zhang, Z. K., Cho, M. C. Y., Wang, C. W., Hsu, C. W., Chen, C. K., and Shieh, S. (2014). IoT security: ongoing challenges and research opportunities. In Service-Oriented Computing and Applications (SOCA), 2014 IEEE 7th International Conference, 230–234. IEEE.
Farooq, M. U., Waseem, M., Khairi, A., and Mazhar, S. (2015). A critical analysis on the security concerns of internet of things (IoT). Int. J. Computer Appl. 111.
Backman, J., Väre, J., Främling, K., Madhikermi, M., and Nykänen, O. (2016). IoT-based interoperability framework for asset and fleet management. In Emerging Technologies and Factory Automation (ETFA), 2016 IEEE 21st International Conference, 1–4. IEEE.
Isotalo, L. (2017). “5G Slicing as a Tool to Test User Equipment Against Advanced Persistent Threats”, in International Conference on Network and System Security, 595–603. Springer, Cham.
Alcaraz, C., and Zeadally, S. (2015). “Critical infrastructure protection: requirements and challenges for the 21st century”, in International Journal of Critical Infrastructure Protection, 8, 53–66.
Sutherland, J., and van den Heuvel, W. J. A. M. (2006). Towards an intelligent hospital environment: adaptive workflow in the OR of the future. In System Sciences, 2006. HICSS’06, in Proceedings of the 39th Annual Hawaii International Conference, 5, 100b–100b. IEEE.
Haq, M. M. (2008). U.S. Patent No. 7,412,396. Washington, DC: U.S. Patent and Trademark Office.
Spector, N. D., Cull, W., Daniels, S. R., Gilhooly, J., Hall, J., Horn, I., and Stanton, B. F. (2014). Gender and generational influences on the pediatric workforce and practice. Pediatrics, 133, 1112–1121.
Wirtz, B. W. (2011). Business model management. Design–Instrumente–Erfolgsfaktoren von Geschäftsmodellen, 2.
Gomes, J. F., Ahokangas, P., and Owusu, K. A. (2016). Business modeling facilitated cyber preparedness. Int. J. Business & Cyber Security, 1, 54–67.
Richardson, J. (2008). The business model: an integrative framework for strategy execution. Strategic change, 17, 133–144.
Morris, M., Schindehutte, M., and Allen, J. (2005). The entrepreneur’s business model: toward a unified perspective. J. Business Res. 58, 726–735.
Zott, C., Amit, R., and Massa, L. (2011). The business model: recent developments and future research. J. Manage. 37, 1019–1042.
Teece, D. J. (2010). Business models, business strategy and innovation. Long range planning, 43, 172–194.
Gomes, J.F., Iivari, M., Ahokangas, P., Isotalo, L., Sahlin, B., and Melen, J. (Forthcoming, in press), Cyber security business models in 5G. Comprehensive guide to 5G security, Wiley Publishers, London.
Ballon, P. (2007). Business modelling revisited: the configuration of control and value. info, 9, 6–19.
Yrjölä, S., Ahokangas, P., and Matinmikko, M. (2015). Evaluation of recent spectrum sharing concepts from business model scalability point of view. In Dynamic Spectrum Access Networks (DySPAN, in 2015 IEEE International Symposiu, 241–250. IEEE.
Ahokangas, P., Moqaddamerad, S., Matinmikko, M., Abouzeid, A., Atkova, I., Gomes, J. F., and Iivari, M. (2016). Future micro operators business models in 5G. The Business & Management Review, 7, 143.
Mitola, J., Guerci, J., Reed, J., Yao, Y. D., Chen, Y., Clancy, T., and Guo, Y. (2014). Accelerating 5G QoE via public-private spectrum sharing. IEEE Communications Magazine, 52, 77–85.
Casadesus-Masanell, R., and Llanes, G. (2011). Mixed source. Manage. Sci. 57, 1212–1230.
Mason, J. (2002). Qualitative researching. Sage.
Miles, M. B., and Huberman, A. M. (1994). Qualitative data analysis: An expanded sourcebook. Sage.