{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T12:11:21Z","timestamp":1775563881758,"version":"3.50.1"},"reference-count":29,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T00:00:00Z","timestamp":1772582400000},"content-version":"vor","delay-in-days":62,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1016\/j.procs.2026.03.047","type":"journal-article","created":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T12:39:40Z","timestamp":1774355980000},"page":"751-758","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Digital Fortresses: Software Security Practices in Healthcare Settings"],"prefix":"10.1016","volume":"278","author":[{"given":"Sileshi Demesie","family":"Yalew","sequence":"first","affiliation":[]},{"given":"Abraham Asfawosen","family":"Getahun","sequence":"additional","affiliation":[]},{"given":"Parisa","family":"Aasi","sequence":"additional","affiliation":[]},{"given":"Gideon Mekonnen","family":"Jonathan","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2026.03.047_bib1","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.csi.2016.10.001","article-title":"\u201cExploring software security approaches in software development lifecycle: A systematic mapping study.\u201d","volume":"50","author":"Mohammed","year":"2017","journal-title":"Computer Standards & Interfaces"},{"issue":"2","key":"10.1016\/j.procs.2026.03.047_bib2","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MSECP.2004.1281254","article-title":"\u201cSoftware security\u201d.","volume":"2","author":"McGraw","year":"2004","journal-title":"IEEE Security & Privacy"},{"issue":"3","key":"10.1016\/j.procs.2026.03.047_bib3","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/s12198-021-00237-3","article-title":"\u201cOptimising multi-layered security screening.\u201d","volume":"14","author":"Anderson","year":"2021","journal-title":"Journal of transportation security"},{"issue":"4","key":"10.1016\/j.procs.2026.03.047_bib4","first-page":"32","article-title":"\u201cThe process of security.\u201d","volume":"3","author":"Schneier","year":"2000","journal-title":"Information Security"},{"issue":"3","key":"10.1016\/j.procs.2026.03.047_bib5","first-page":"7","article-title":"The current status of cybersecurity in Ethiopia.","volume":"16","author":"Adane","year":"2020","journal-title":"IUP Journal of Information Technology"},{"issue":"4-5","key":"10.1016\/j.procs.2026.03.047_bib6","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1016\/j.telpol.2012.04.011","article-title":"Privacy and security issues in cloud computing: The role of institutions and institutional evolution.","volume":"37","author":"Kshetri","year":"2013","journal-title":"Telecommunications Policy"},{"key":"10.1016\/j.procs.2026.03.047_bib7","unstructured":"INSA. (2023) \u201cINSA foils 6768 cyber-attacks in concluded fiscal year.\u201d https:\/\/www.ena.et\/web\/eng\/w\/eng_3120234 Accessed July 7, 2025."},{"issue":"2","key":"10.1016\/j.procs.2026.03.047_bib8","doi-asserted-by":"crossref","first-page":"e247","DOI":"10.1002\/itl2.247","article-title":"\u201cCOVID\u201019 pandemic cybersecurity issues.\u201d","volume":"4","author":"Pranggono","year":"2021","journal-title":"Internet Technology Letters"},{"issue":"1","key":"10.1016\/j.procs.2026.03.047_bib9","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MSEC.2022.3205484","article-title":"\u201cEight lightweight usable security principles for developers.\u201d","volume":"21","author":"Gorski","year":"2022","journal-title":"IEEE Security & Privacy"},{"key":"10.1016\/j.procs.2026.03.047_bib10","unstructured":"Sadeghi, S., & Hadavi, M. A. (2021) \u201cAutomatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications.\u201d Journal of Computing & Security, 8(1)."},{"issue":"5","key":"10.1016\/j.procs.2026.03.047_bib11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3708533","article-title":"\u201cSoftware security analysis in 2030 and beyond: A research roadmap.\u201d","volume":"34","author":"B\u00f6hme","year":"2025","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1016\/j.procs.2026.03.047_bib12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-017-0778-4","article-title":"\u201cSecurity techniques for the electronic health records.\u201d","volume":"41","author":"Kruse","year":"2017","journal-title":"Journal of Medical Systems"},{"key":"10.1016\/j.procs.2026.03.047_bib13","unstructured":"Cybersecurity, C. I. (2018) \u201cFramework for improving critical infrastructure cybersecurity.\u201d CSWP, 4162018(7)."},{"key":"10.1016\/j.procs.2026.03.047_bib14","unstructured":"Howard, M., & Lipner, S. (2006). \u201cThe security development lifecycle (Vol. 8).\u201d Redmond: Microsoft Press."},{"issue":"40","key":"10.1016\/j.procs.2026.03.047_bib15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.9734\/cjast\/2020\/v39i4031106","article-title":"\u201cAdoption of cloud computing technology for effective university administration in Nigeria.\u201d","volume":"39","author":"Adeleke","year":"2020","journal-title":"Current Journal of Applied Science and Technology"},{"key":"10.1016\/j.procs.2026.03.047_bib16","unstructured":"WHO. (2020) \u201cWho reports fivefold increase in cyberattacks, urges vigilance.\u201d World Health Organisation. https:\/\/www.who.int\/news\/item\/23-04-2020-who-reports-fivefold-increase-in-cyber-attacks-urges-vigilance. Accessed July 7, 2025."},{"key":"10.1016\/j.procs.2026.03.047_bib17","doi-asserted-by":"crossref","unstructured":"Renaud, K., & Dupuis, M. (2019) \u201cCyber security fear appeals: Unexpectedly complicated.\u201d In Proceedings of the New Security Paradigms Workshop (pp. 42-56).","DOI":"10.1145\/3368860.3368864"},{"issue":"1","key":"10.1016\/j.procs.2026.03.047_bib18","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1080\/23742917.2016.1252211","article-title":"\u201cReview of cybersecurity issues in industrial critical infrastructure: manufacturing in perspective.\u201d","volume":"1","author":"Ani","year":"2017","journal-title":"Journal of Cyber Security Technology"},{"key":"10.1016\/j.procs.2026.03.047_bib19","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.ijcip.2014.12.002","article-title":"\u201cCritical infrastructure protection: Requirements and challenges for the 21st century.\u201d","volume":"8","author":"Alcaraz","year":"2015","journal-title":"International journal of critical infrastructure protection"},{"issue":"45","key":"10.1016\/j.procs.2026.03.047_bib20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5120\/ijca2023922333","article-title":"\u201cA review on data breaches in healthcare security systems.\u201d","volume":"184","author":"Reddy","year":"2023","journal-title":"International Journal of Computer Applications"},{"issue":"1","key":"10.1016\/j.procs.2026.03.047_bib21","first-page":"23","article-title":"\u201cCybersecurity in the healthcare industry.\u201d","volume":"8","author":"Chua","year":"2021","journal-title":"Physician Leadership Journal"},{"key":"10.1016\/j.procs.2026.03.047_bib22","series-title":"\u201cMitigating vulnerabilities and threats for patient-centric healthcare systems in low-income developing countries.\u201d In 2017 IST-Africa Week Conference (IST-Africa) (pp. 1-11)","author":"Pankomera","year":"2017"},{"issue":"7","key":"10.1016\/j.procs.2026.03.047_bib23","doi-asserted-by":"crossref","first-page":"8639","DOI":"10.1007\/s10586-024-04507-2","article-title":"\u201cData breaches in healthcare: security mechanisms for attack mitigation.\u201d","volume":"27","author":"Nemec Zlatolas","year":"2024","journal-title":"Cluster computing"},{"issue":"2","key":"10.1016\/j.procs.2026.03.047_bib24","doi-asserted-by":"crossref","first-page":"56","DOI":"10.47738\/ijiis.v6i2.158","article-title":"Exploring the effectiveness of web crawlers in detecting security vulnerabilities in computer software applications.","volume":"6","author":"Wan","year":"2023","journal-title":"International Journal of Informatics and Information Systems"},{"issue":"2","key":"10.1016\/j.procs.2026.03.047_bib25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJDCF.302875","article-title":"Web Vulnerability Detection Analyzer Based on Python.","volume":"14","author":"Xu","year":"2022","journal-title":"International Journal of Digital Crime and Forensics (IJDCF)"},{"key":"10.1016\/j.procs.2026.03.047_bib26","doi-asserted-by":"crossref","unstructured":"Yahya, F., Walters, R. J., & Wills, G. B. (2017). Using goal-question-metric (GQM) approach to assess security in cloud storage. In Enterprise Security: Second International Workshop, ES. Springer International Publishing.","DOI":"10.1007\/978-3-319-54380-2_10"},{"key":"10.1016\/j.procs.2026.03.047_bib27","doi-asserted-by":"crossref","unstructured":"Van Solingen, R., Basili, V., Caldiera, G., & Rombach, H. D. (2002). Goal question metric (GQM) approach. Encyclopedia of Software Engineering.","DOI":"10.1002\/0471028959.sof142"},{"key":"10.1016\/j.procs.2026.03.047_bib28","doi-asserted-by":"crossref","first-page":"103532","DOI":"10.1016\/j.cose.2023.103532","article-title":"A quantitative security evaluation and analysis model for web applications based on OWASP application security verification standard.","volume":"135","author":"Wen","year":"2023","journal-title":"Computers & Security"},{"issue":"4","key":"10.1016\/j.procs.2026.03.047_bib29","doi-asserted-by":"crossref","first-page":"201","DOI":"10.4236\/jis.2020.114014","article-title":"A cloud computing security assessment framework for small and medium enterprises.","volume":"11","author":"Rupra","year":"2020","journal-title":"Journal of Information Security"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926006393?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926006393?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T11:28:45Z","timestamp":1775561325000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050926006393"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":29,"alternative-id":["S1877050926006393"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2026.03.047","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Digital Fortresses: Software Security Practices in Healthcare Settings","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2026.03.047","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}