{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T06:52:11Z","timestamp":1771051931061,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T00:00:00Z","timestamp":1746662400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T00:00:00Z","timestamp":1746662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"European Commission, Horizon Europe Program","award":["101094218"],"award-info":[{"award-number":["101094218"]}]},{"name":"European Commission, Horizon Europe Program","award":["101094218"],"award-info":[{"award-number":["101094218"]}]},{"name":"European Commission, Horizon Europe Program","award":["101094218"],"award-info":[{"award-number":["101094218"]}]},{"name":"European Commission, Horizon Europe Program","award":["101094218"],"award-info":[{"award-number":["101094218"]}]},{"name":"European Commission, Horizon Europe Program","award":["101094218"],"award-info":[{"award-number":["101094218"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["npj Digit. Med."],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Common approaches to cybersecurity frame end users as the weakest link in a system. In this Perspective, we argue that appraising end users as contributors to security can help reconcile both security and care practices. Through two case studies, including Swedish hospitals and a UK smart-home system, we demonstrate the gaps between established security protocols and the daily reality of care practices, and outline approaches to reconcile security and care.<\/jats:p>","DOI":"10.1038\/s41746-025-01685-0","type":"journal-article","created":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T13:22:49Z","timestamp":1746710569000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Reconciling security and care in digital medicine"],"prefix":"10.1038","volume":"8","author":[{"given":"Chiara","family":"Carboni","sequence":"first","affiliation":[]},{"given":"Celia","family":"Brightwell","sequence":"additional","affiliation":[]},{"given":"Orit","family":"Halpern","sequence":"additional","affiliation":[]},{"given":"Oscar","family":"Freyer","sequence":"additional","affiliation":[]},{"given":"Stephen","family":"Gilbert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,8]]},"reference":[{"key":"1685_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.2196\/17612","volume":"22","author":"H Tully","year":"2020","unstructured":"Tully, H., Coravos, A., Doerr, M. & Dameff, C. Connected medical technology and cybersecurity informed consent: a new paradigm. J. Med. Internet Res. 22, 3 (2020).","journal-title":"J. Med. Internet Res."},{"key":"1685_CR2","unstructured":"Eddy, M. & Perlroth, N. Cyber attack suspected in German woman\u2019s death. New York Times. www.nytimes.com\/2020\/09\/18\/world\/europe\/cyber-attack-germany-ransomeware-death.html (2020)."},{"key":"1685_CR3","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-024-01044-5","volume":"7","author":"S Gilbert","year":"2024","unstructured":"Gilbert, S. et al. Can we learn from an imagined ransomware attack on a hospital at home platform?. npj Digital Med. 7, 65 (2024).","journal-title":"npj Digital Med."},{"key":"1685_CR4","first-page":"1","volume":"21","author":"Z Li","year":"2023","unstructured":"Li, Z., Nam, T. hanh, Vu, S., Dragoni, N. & Doherty, K. Accomplishing more with less: the practice of cybersecure health technology design among Danish startups. CHI: Conf. Hum. Factors Comput. Syst. 21, 1\u20138 (2023).","journal-title":"CHI: Conf. Hum. Factors Comput. Syst."},{"key":"1685_CR5","doi-asserted-by":"crossref","unstructured":"Bernsmed, K. & Jaatun, M. G. Security-by-design challenges for medical device manufacturers. Eur. Interdiscip. Cybersecurity Conf. 155\u2013160 (2024).","DOI":"10.1145\/3655693.3661297"},{"key":"1685_CR6","doi-asserted-by":"crossref","unstructured":"Stobert, E., Barrera, D., Homier, V., Kollek, D. Understanding cybersecurity practices in emergency departments. CHI: Conf. Human Factors Comput. Syst. 1\u20138. (2020).","DOI":"10.1145\/3313831.3376881"},{"key":"1685_CR7","doi-asserted-by":"crossref","unstructured":"Coventry, L. et al. Cyber-risk in healthcare: exploring facilitators and barriers to secure behaviour. In HCI for Cybersecurity, Privacy and Trust (ed Moallem, A) 105\u2013122 (Springer, 2020).","DOI":"10.1007\/978-3-030-50309-3_8"},{"key":"1685_CR8","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/s10111-021-00683-y","volume":"24","author":"Pollini","year":"2022","unstructured":"Pollini et al. Leveraging human factors in cybersecurity: an integrated methodological approach. Cognit. Technol. Work 24, 371\u2013390 (2022).","journal-title":"Cognit. Technol. Work"},{"key":"1685_CR9","first-page":"225","volume":"127","author":"T Fotis","year":"2024","unstructured":"Fotis, T., Kioskli, K. & Mouratidis, H. Human factors and cybersecurity in NHS Virtual Wards. Hum. Factors Cybersecur. 127, 225\u2013235 (2024).","journal-title":"Hum. Factors Cybersecur."},{"key":"1685_CR10","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.ijhcs.2019.05.005","volume":"131","author":"V Zimmermann","year":"2019","unstructured":"Zimmermann, V. & Renaud, K. Moving from a \u2018human-as-problem\u2019 to a \u2018human-as-solution\u2019 cybersecurity mindset. Int. J. Hum. Comput. Stud. 131, 169\u2013187 (2019).","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"1685_CR11","doi-asserted-by":"publisher","first-page":"1316","DOI":"10.1177\/0162243921992844","volume":"46","author":"N Klimburg-Witjes","year":"2021","unstructured":"Klimburg-Witjes, N. & Wentland, A. Hacking humans? Social engineering and the construction of the \u201cdeficient user\u201d in cybersecurity discourses. Sci. Technol. Hum. Values 46, 1316\u20131339 (2021).","journal-title":"Sci. Technol. Hum. Values"},{"key":"1685_CR12","first-page":"215","volume":"208","author":"R Koppel","year":"2015","unstructured":"Koppel, R., Smith, S., Blythe, J. & Kothari, V. Workarounds to computer access in healthcare organizations: you want my password or a dead patient?. Stud. Health Technol. Inform. 208, 215\u2013220 (2015).","journal-title":"Stud. Health Technol. Inform."},{"key":"1685_CR13","doi-asserted-by":"publisher","first-page":"609","DOI":"10.3390\/telecom5030031","volume":"5","author":"J Marchang","year":"2024","unstructured":"Marchang, J. et al. Secure-by-design real-time internet of medical things architecture: e-Health population monitoring. Telecom 5, 609\u2013631 (2024).","journal-title":"Telecom"},{"key":"1685_CR14","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1016\/j.jsis.2011.06.001","volume":"20","author":"K Hedstr\u00f6m","year":"2011","unstructured":"Hedstr\u00f6m, K., Kolkowska, E., Karlsson, F. & Allen, J. P. Value conflicts for information security management. J. Strateg. Inf. Syst. 20, 373\u2013384 (2011).","journal-title":"J. Strateg. Inf. Syst."},{"key":"1685_CR15","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1108\/JICES-12-2018-0095","volume":"17","author":"M Loi","year":"2019","unstructured":"Loi, M., Christen, M., Kleine, N. & Weber, K. Cybersecurity in health \u2013 disentangling value tensions. J. Inf. Commun. Ethics Soc. 17, 229\u2013245 (2019).","journal-title":"J. Inf. Commun. Ethics Soc."},{"key":"1685_CR16","doi-asserted-by":"publisher","first-page":"335","DOI":"10.3390\/info13070335","volume":"13","author":"PK Yeng","year":"2022","unstructured":"Yeng, P. K., Fauzi, M. A. & Yang, B. A comprehensive assessment of human factors in cyber security compliance toward enhancing the security practice of healthcare staff in paperless hospitals. Information 13, 335 (2022).","journal-title":"Information"},{"key":"1685_CR17","doi-asserted-by":"publisher","first-page":"2617","DOI":"10.1080\/1369118X.2023.2279557","volume":"27","author":"M Lanzing","year":"2023","unstructured":"Lanzing, M. Traveling technology and perverted logics: conceptualizing Palantir\u2019s expansion into health as sphere transgression. Inf. Commun. Soc. 27, 2617\u20132633 (2023).","journal-title":"Inf. Commun. Soc."},{"key":"1685_CR18","unstructured":"Fisher, B. & Tronto, J. Toward a feminist theory of caring. In Circles of Care (eds. Abel, E. K., Nelson, M. K.) 35\u201362 (State University of New York Press, 1990)."},{"key":"1685_CR19","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1177\/0306312715602073","volume":"45","author":"A Martin","year":"2015","unstructured":"Martin, A., Myers, N. & Viseu, A. The politics of care in technoscience. Soc. Stud. Sci. 45, 625\u2013641 (2015).","journal-title":"Soc. Stud. Sci."},{"key":"1685_CR20","doi-asserted-by":"crossref","unstructured":"Mol, A., Moser, I. & Pols, J. Care in Practice (Transcript, 2010).","DOI":"10.1515\/transcript.9783839414477"},{"key":"1685_CR21","first-page":"103","volume":"50","author":"J Rajam\u00e4ki","year":"2021","unstructured":"Rajam\u00e4ki, J. & H\u00e4m\u00e4l\u00e4inen, H. Ethics of cybersecurity and biomedical ethics: case SHAPES. Inf. Secur. 50, 103\u2013116 (2021).","journal-title":"Inf. Secur."},{"key":"1685_CR22","doi-asserted-by":"crossref","unstructured":"Mol, A. The Logic of Care (Routledge, 2008).","DOI":"10.4324\/9780203927076"},{"key":"1685_CR23","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.alter.2009.01.003","volume":"3","author":"J Pols","year":"2009","unstructured":"Pols, J. & Moser, I. Cold technologies versus warm care? On affective and social relations with and through care technologies. Alter 3, 159\u2013178 (2009).","journal-title":"Alter"},{"key":"1685_CR24","doi-asserted-by":"publisher","unstructured":"Ghorayeb, A., Comber, R. & Gooberman-Hill, R. Older adults\u2019 perspectives of smart home technology: are we developing the technology that older people want? Int. J. Human Comput. Stud. 147. https:\/\/doi.org\/10.1016\/j.ijhcs.2020.102571 (2021).","DOI":"10.1016\/j.ijhcs.2020.102571"},{"key":"1685_CR25","doi-asserted-by":"crossref","unstructured":"Renaud, K. Accessible cyber security: the next frontier? In Proc. 7th international conference on information systems security and privacy, (ed. Mori, P., Gabriele, L., Furnell, S.) 9\u201318. (SciTePress, 2020).","DOI":"10.5220\/0010419500090018"},{"key":"1685_CR26","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/s42979-022-01239-1","volume":"3","author":"K Renaud","year":"2022","unstructured":"Renaud, K. & Coles-Kemp, L. Accessible and inclusive cyber security: a nuanced and complex challenge. SN Comput. Sci. 3, 346 (2022).","journal-title":"SN Comput. Sci."},{"key":"1685_CR27","doi-asserted-by":"publisher","unstructured":"Mesman, J., Walsh, K., Kinsman, L., Ford, K. & Bywaters, D. Blending video-reflexive ethnography with solution-focused approach: a strengths-based approach to practice improvement in health care. Int. J. Qual. Methods 18, https:\/\/doi.org\/10.1177\/1609406919875277 (2019).","DOI":"10.1177\/1609406919875277"},{"key":"1685_CR28","doi-asserted-by":"publisher","unstructured":"Hollnagel, E., Wears, R. L. & Braithwaite, J. From Safety-I to Safety-II: A White Paper. Resilient Health Care Net. https:\/\/doi.org\/10.13140\/RG.2.1.4051.5282 (2015).","DOI":"10.13140\/RG.2.1.4051.5282"},{"key":"1685_CR29","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1111\/j.1467-9566.2007.01032.x","volume":"30","author":"N Oudshoorn","year":"2008","unstructured":"Oudshoorn, N. Diagnosis at a distance: the invisible work of patients and healthcare professionals in cardiac telemonitoring technology. Sociol. Health Illn. 30, 272\u2013288 (2008).","journal-title":"Sociol. Health Illn."},{"key":"1685_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2196\/25159","volume":"23","author":"D Trupia","year":"2021","unstructured":"Trupia, D., Mathieu-Fritz, A. & Duong, T. The sociological perspective of users\u2019 invisible work: a qualitative research framework for studying digital health innovations integration. J. Med. Internet Res. 23, 1\u201313 (2021).","journal-title":"J. Med. Internet Res."},{"key":"1685_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3274361","volume":"2","author":"L Koksch","year":"2018","unstructured":"Koksch, L., Korn, M., Poller, A. & Wagenknecht, S. Caring for IT security: accountabilities, moralities, and oscillations in IT security practices. Proc. ACM Hum. Comput. Interact. 2, 1\u201320 (2018). 92.","journal-title":"Proc. ACM Hum. Comput. Interact."},{"key":"1685_CR32","unstructured":"FDA. Applying human factors and usability engineering to medical devices www.fda.gov\/media\/80481\/download (2016)."},{"key":"1685_CR33","doi-asserted-by":"publisher","first-page":"e45259","DOI":"10.2196\/45259","volume":"25","author":"L Verweij","year":"2023","unstructured":"Verweij, L. et al. Improvement, implementation, and evaluation of the CMyLife digital care platform: participatory action research approach. J. Med. Internet Res. 25, e45259 (2023).","journal-title":"J. Med. Internet Res."},{"key":"1685_CR34","doi-asserted-by":"crossref","unstructured":"De Croon, R., Klerkx, J. & Duval, E. Designing a useful and usable mobile EMR application through a participatory design methodology: a case study. In 2014 IEEE International Conference on Healthcare Informatics, 176\u2013185. (IEEE, 2014).","DOI":"10.1109\/ICHI.2014.31"},{"key":"1685_CR35","doi-asserted-by":"crossref","unstructured":"Tang, K., Hirano, S., Cheng, K. & Hayes, G. Balancing caregiver and clinician needs in a mobile health informatics tool for preterm infants. In Proc. 6th International Conference on Pervasive Computing Technologies for Healthcare, 1\u20138 (IEEE, 2012).","DOI":"10.4108\/icst.pervasivehealth.2012.248716"},{"key":"1685_CR36","doi-asserted-by":"publisher","first-page":"e35478","DOI":"10.2196\/35478","volume":"9","author":"E Kj\u00f6rk","year":"2022","unstructured":"Kj\u00f6rk, E., Sunnerhagen, K., Lundgren-Nilsson \u00c5, Andersson, A. & Carlsson, G. Development of a digital tool for people with a long-term condition using stroke as a case example: participatory design approach. JMIR Hum. Factors 9, e35478 (2022).","journal-title":"JMIR Hum. Factors"},{"key":"1685_CR37","doi-asserted-by":"publisher","unstructured":"Br\u00fcckner, S., Brightwell, C. & Gilbert, S. FDA launches health care at home initiative to drive equity in digital medical care. npj Digital Med. 7. https:\/\/doi.org\/10.1038\/s41746-024-01198-2 (2024).","DOI":"10.1038\/s41746-024-01198-2"},{"key":"1685_CR38","doi-asserted-by":"crossref","unstructured":"Slesinger, I., Coles-Kemp, L., Panteli, N. & Hansen, R. R. Designing through the stack: the case for a participatory digital security by design. In Proc. 2022 New Security Paradigms Workshop, 45\u201359. (ACM, 2022).","DOI":"10.1145\/3584318.3584322"},{"key":"1685_CR39","doi-asserted-by":"crossref","unstructured":"Nhinda, G. T. & Shava, F. B. Towards the use of participatory methods in cybersecurity research in rural Africa: a grassroots approach. In International Multidisciplinary Information Technology and Engineering Conference, 1\u20137, (IEEE, 2021).","DOI":"10.1109\/IMITEC52926.2021.9714649"},{"key":"1685_CR40","doi-asserted-by":"crossref","unstructured":"Heckle, R. R. Security dilemma: healthcare clinicians at work. IEEE Secur. Privacy 9, 14\u201319. (2011).","DOI":"10.1109\/MSP.2011.74"},{"key":"1685_CR41","unstructured":"Hollnagel, E., Woods, D. D. & Leveson, N. G. Resilience engineering: concepts and precepts (Ashgate, 2006)."},{"key":"1685_CR42","doi-asserted-by":"publisher","first-page":"e199","DOI":"10.1016\/S2468-2667(24)00003-3","volume":"9","author":"B Goodair","year":"2024","unstructured":"Goodair, B. & Reeves, A. The effect of health-care privatisation on the quality of care. Lancet Public Health 9, e199\u2013e206 (2024).","journal-title":"Lancet Public Health"},{"key":"1685_CR43","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1177\/00207314221114540","volume":"52","author":"P Roderick","year":"2022","unstructured":"Roderick, P. & Pollock, A. M. Dismantling the National Health Service in England. Int. J. Health Serv. 52, 470\u2013479 (2022).","journal-title":"Int. J. Health Serv."},{"key":"1685_CR44","doi-asserted-by":"publisher","first-page":"693","DOI":"10.1017\/S0007123404000250","volume":"34","author":"JS Hacker","year":"2004","unstructured":"Hacker, J. S. Dismantling the Health Care State? Political institutions, public policies and the comparative politics of health reform. Br. J. Political Sci. 34, 693\u2013724 (2004).","journal-title":"Br. J. Political Sci."}],"container-title":["npj Digital Medicine"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.nature.com\/articles\/s41746-025-01685-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.nature.com\/articles\/s41746-025-01685-0","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.nature.com\/articles\/s41746-025-01685-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T13:22:58Z","timestamp":1746710578000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.nature.com\/articles\/s41746-025-01685-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,8]]},"references-count":44,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["1685"],"URL":"https:\/\/doi.org\/10.1038\/s41746-025-01685-0","relation":{},"ISSN":["2398-6352"],"issn-type":[{"value":"2398-6352","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,8]]},"assertion":[{"value":"18 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"C.B., C.C., O.F. and O.H. declare no nonfinancial interests and no competing financial interests. S.G. is a News and Views Editor for npj Digital Medicine. S.G. played no role in the internal review or decision to publish this Perspective article. S.G. declares a nonfinancial interest as an Advisory Group member of the EY-coordinated \u201cStudy on Regulatory Governance and Innovation in the field of Medical Devices\u201d conducted on behalf of the Directorate-General for Health and Food Safety (SANTE) of the European Commission. S.G. declares the following competing financial interests: he has or has had consulting relationships with Una Health GmbH, Lindus Health Ltd., Flo Ltd, ICURA ApS, Rock Health Inc., Thymia Ltd., FORUM Institut f\u00fcr Management GmbH, High-Tech Gr\u00fcnderfonds Management GmbH, Directorate-General for Research and Innovation Of the European Commission, and Ada Health GmbH and holds share options in Ada Health GmbH.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"261"}}