Authors’ citation

What specific topics are covered?

How was SP 800-66 Revision 1 used?

Publishing Year

(Gikas, 2010) [17]

Regulatory Compliance Requirements

It was used as an example of one of the sources for implementing the requirements of the HIPAA Security Rule.

2010

(Pagano & Peterson, 2010) [18]

Regulatory Compliance

Requirements

It was used as a reference for access controls on electronic devices

2010

(Ghafarian & Smith, 2011) [19]

Risk Assessment

It was used as an example of one of the risk assessment methodologies used by United States healthcare

2011

(Avancha et al., 2012) [20]

Confidentiality, Integrity, Availability (CIA).

It was used as a source to address privacy. Particularly in healthcare mobile technology

2012

(Rahman & Kreider, 2012) [21]

Electronic Medical Record (EMR)

It was used as a source to explain confidentiality in healthcare organizations

2012

(Alaqili, 2013) [22]

HIPAA Security Rule.

It was used as a source in developing questionnaires for risk assessment reports in the healthcare domain

2013

(Meyer et al., 2016) [23]

Security Controls

It was used as a Security and privacy requirement for systems, including healthcare organizations

2016

(Aranha et al., 2019) [24]

Industrial Internet of Things (IIoT) and Interoperability

It was used as a security standard to describe the security requirements for all types of healthcare environments including medical devices.

2019

(Valluripally et al., 2019) [25]

Regulatory Compliance Requirements

It was used as a security standard to configure cloud-based system healthcare domain involving Big Data

2019

(Jabangwe & Nguyen-Duc, 2020) [26]

IoT healthcare software

It was used as an example of the security standard in the United States, particularly from the regulation of the healthcare domain

2020

(Wilkinson et al., 2021)

[27]

HIPAA Security Rule Requirements for the Electronic Medical Record (EMR)

It was used as a reference for the Health Insurance Portability and Accountability Act (HIPAA) because EMRs contain patient event logging data, and Protected Health Information (PHI), which are originally mandated by the Security Rule in HIPAA

2021