Skip to main content
  • Research article
  • Open access
  • Published:

Analyzing medical device connectivity and its effect on cyber security in german hospitals

Abstract

Background

Modern healthcare devices can be connected to computer networks and many western healthcare institutions run those devices in networks. At the same time, cyber attacks are on the rise and there is evidence that cybercriminals do not spare critical infrastructure such as major hospitals, even if they endanger patients. Intuitively, the more and closer connected healthcare devices are to public networks, the higher the risk of getting attacked.

Methods

To asses the current connectivity status of healthcare devices, we surveyed the field of German hospitals and especially University Medical Center UMCs.

Results

The results show a strong correlation between the networking degree and the number of medical devices. The average number of medical devices is 25.150, with a median of networked medical devices of 3.600. Actual key users of networked medical devices are the departments Radiology, Intensive Care, Radio-Oncology RO, Nuclear Medicine NUC, and Anaesthesiology in the group of UMCs. In the next five years, the usage of networked medical devices will increase significantly in the departments of Surgery, Intensive Care, and Radiology. We detected a strong correlation between the degree of connectivity and the likelihood of being attacked.The survey answers regarding the cyber security status reveal a lack of security basics in some of the inquired hospitals. We did discover successful attacks in hospitals with separated or subsidiary departments. A fusion of competencies on an organizational level facilitates the right behavior here. Most hospitals rated themselves predominantly positively in the self-assessment but also stated the usefulness of IT security insurance.

Conclusions

Concluding our results, hospitals are already facing the consequences of omitted measures within their growing pool of medical devices. Continuously relying on historically grown structures without adaption and trusting manufactures to solve vectors is a critical behavior that could seriously endanger patients.

Peer Review reports

Background

Healthcare institutions worldwide are facing a growing threat of cyber attacks. Many networked medical devices were found to contain critical security vulnerabilities [1]. Furthermore, medical devices tend to have a long life-span. Medical institutions may operate medical devices well beyond the point in time, at which the producer will not issue security patches. Due to these vulnerable systems in hospital networks, healthcare is among the most attacked sectors globally [2], and there are several public known attacks on healthcare infrastructure [3, 4].

A way to prevent these devices from attacks is to asses and shield them from attackers, e.g., by operating them in a restricted environment. In this paper, we study how German hospitals manage networked medical devices and how their respective approach addresses common cybersecurity threats. Concretely, we answer the following questions:

  • What is the degree of connectivity of medical devices in German university medical centers and how is network connectivity and medical digitization developing in different departments?

  • How is a growing network degree within active medical devices affecting cyber security in German hospitals?

  • How do organizational structure and self-assessment reflect the particular threat level?

In Germany, there are overall 1943 hospitals [5]. The hospitals having a minimum of 30.000 inpatient cases per year are a member of the Critical Infrastructure Protection CIP according to the German IT Security Act of 2015 and the Critical Infrastructure Regulations for Hospitals of CIP published in 2017 [6]. The exact number of CIP hospitals is kept confidential, but we estimate it to be a total of 80-110 Hospitals [7] in Germany. From those hospitals, 36 are University Medical Center UMCs.

In 2017, the total patient case number in all German hospitals was 19,4 million fully inpatient cases [8]. The 36 UMCs alone covered about 10.8 million outpatients and about 1.9 million inpatients. This results in 9.7% of the German inpatient healthcare treatment covered by 1.85% of the hospitals [9].

To get an overview of the security status on networked medical devices in German Hospitals, it is essential having insights into the network situation of specific hospitals. Unfortunately, to the best of our knowledge, there is no public dataset about the degree of medical device connectivity in hospitals available.

1.1 Cyber security

Medical devices offer critical services and process sensitive data of patients with high protection requirements. In particular, the security of data and services is split into three distinct properties ([pp.8], [10]):

  • Confidentiality: The confidentiality of the data must be protected for stored and transmitted data from the access of authorized persons.

  • Integrity: The integrity of data in transit and at rest must be protected from unintended or unauthorized modification. In the case of integrity loss, this modification should be detected immediately.

  • Availability: The availability of the data must be protected for stored and transmitted data to ensure access for all authorised persons, when it is needed.

The term cyber security stands for the strict adherence of these three properties within the cyber space, which spans over all digital devices that are connected to the Internet or to private networks with direct or indirect Internet connections. Note that we define a private network to be indirectly connected to the Internet if devices like laptops or USB drives are used in the private network as well as the Internet. An example is a USB drive that is used to move software updates from an Internet-connected computer to a computer within the confined private network.

An incident in which a remote attacker negatively affects at least one of these three key properties is called an cyber security incident.

1.2 Cyber security of networked devices

To attack non-networked devices, an attacker must be on-site and perform the attack manually, i.e. change device configurations by pushing buttons on the device’s user interface, or to copy, to steal or to modify patient’s data.

This changes once a device becomes networked. A networked device can be attacked remotely if the attacker manages to connect to it. In many cases, network segmentation and perimeter security protect external attackers from connecting to medical devices directly. However, a single exposed system is enough for an attacker to get a foothold within the local network. The attack can move laterally between different networks if the compromised machine is part of both networks. The more systems are connected to linked networks, the more potential targets are available to an attacker. ([p.637], [11]).

1.3 Related work

Due to the increasing trend of network usage in German hospitals, medical devices are becoming more and more endangered to threats of cyber criminality [12, 13]. One of the most severe cases in the past years was the non-targeted WannaCry-infection in April 2017. The affected medical devices caused several hospitals to discontinue their service, mainly in the UK[14]. Due to a hospital study in 2017, 64% of all German hospitals were victims of cybercrime [15].

Responding to this trend, the cyber security research community is starting to focus more on the networked healthcare sector, revealing a variety of vulnerabilities inside medical devices [16, 17].

A significant part of the networked system in a modern hospital consists of desktop workstations and networked medical devices. The responsibility for correct operation is historically separated between a central department of Information Technology IT and a central department of Medical Technology MT within the organization structure. Accordingly, the desktop workstations are managed by a central IT department, while medical devices are maintained by the producer and the central department of MT. As medical devices have to comply with regulations, including certification renewal for every change, patching of those devices generates a much higher effort than common proposed devices like desktop workstations[18, p.41].

UMCs are profitable targets for ransomware attackers due to their large sales volume of 22.1 billion Euros per year (2015) [19]. This leads to an average volume of about 614 million Euros per hospital. Larger hospitals even exceed one billion Euros per year. The Charite in Berlin, for example, states a yearly volume of 1.8 billion Euro [20].

A study in the Critical Infrastructure Protection CIP sector was conducted by the Bundeswehr University Munich and the Friedrich-Alexander University Erlangen-Nuremberg in 2018 [21]. This study surveyed the entire CIP sector, including a minor part of healthcare institutions, but not focused on healthcare in particular. Nevertheless, this study could serve as a basis for comparison.

Due to the 2019 hospital report of the WidO, German hospitals are behind their international counterparts. They are blaming a missing culture of innovation and a backlog of investments for this behavior[22]. One important factor is the lack of available stable broad band connections in Germany. Furthermore, the standardizing process for digital patient data and interoperability of medical devices is not in a sufficient state to build digital solutions without limitations. This can lead to a low adoption rate within pilot projects and a general user and management scepticism concerning the digital change in German hospitals [23].

Methods

To measure the medical device connectivity and level of preparation against cybersecurity incidents in German hospitals, we developed 11 questions as a foundation for structured interviews (see Additional Files). The interview is addressed to Information Technology IT risk managers and leading IT and Medical Technology MT representatives of German hospitals. We conducted the interviews via telephone. The Questionnaire is attached in the Additional file 1.

The questions are separated into three categories:

  • Demographic information about the hospital and its medical devices,

  • The hospital’s degree of connectivity of medical devices, and

  • Information about the cybersecurity status.

In the first Category on the hospital’s demographics (1) the questions aim at acquiring the total number of medical devices inside the hospital and whether the hospital is a member of Critical Infrastructure Protection CIP.

The definition of medical devices considered in this study is based on the German act of medical devices [24, §3(1)]. It characterizes a product as a medical device, when it is primarily used for the detection, prevention, monitoring, treatment, alleviation or compensation of disease, injuries or disabilities, for the examination, replacement or modification of the anatomical structure or a physiological process, or for conception regulation.

In our study we looked particularly at active medical devices. These are devices that are depending on an external energy source, including but not limited to: Radiological equipment, laboratory diagnostic systems, monitoring and life support systems, and all kinds of electronic treatment and supporting systems.

Furthermore, we collect the positions of the department of MT and the department of IT within the hospital’s organizational structure. Historically, those departments are separated from each other [25]. The level of connectivity of networked medical devices rises, and as many of them are connected to IT networks, the responsibilities of both departments increasingly overlap. This creates incentives in modern hospitals to merge both departments, and we ask for detailed information about these two departments in hospitals. The second Category (2) asks questions about the degree of connectivity of medical devices. This is done using four questions regarding the currently existing and the estimated future level of connectivity of medical devices per hospital department as well as for all medical devices combined in that hospital. The last Category (3) of the questionnaire aims at gathering information on general IT security aspects inside the hospital. It also assesses the hospital’s preparation for an information security incident and if the hospital leadership considers cyber insurance useful for hospitals. Finally, the questionnaire asks for information on past security incidents that affected the hospital‘s networked medical devices and their consequences.

Structured interviews can be prone to errors, especially if they are conducted by telephone. Possible sources of errors, for example, may result from a different understanding of questions or terms as well as different counting of devices. Furthermore, it is crucial for the correctness of the data to have the right contact person providing reliable information. To deal with those caveats, a basic understanding of the crucial terms was established during the interview process. Furthermore, we checked the plausibility of the given information using data provided by the German Federal Statistical Office.

Results

Initially, we directly contacted 50 German hospitals via email and asked for their participation in the survey. We did focus on the hospitals with the largest capacity of inpatient care. Furthermore, the German hospital federation sent our survey questions to the boards of the German hospital associations, but we never received an answer. After 18 months, 20 (40%) hospitals responded. Out of these, in total, four hospitals declined the interview request. Two from this group did not mention a reason; one blamed capacity problems, and one hospital was not able to provide the required information about their infrastructure. We conducted the interviews with the 16 remaining hospitals in 12 weeks after they agreed to the interview.

As a result, we were able to create a data-set of 16 completed interviews with hospital representatives. From these 16 hospitals, there are 11 University Medical Centers UMCs, three Standard Care Hospitals SC, which are part of Critical Infrastructure Protection CIP, and two non-CIP SCs, as described in Table 1. In the following subsections, the results of the interview are described per category.

Table 1 This table shows our pool of responding hospitals. It consists of 11 UMC and 5 SC hospitals. The group of SC hospitals is divided into members of CIP and non-members

3.1 Category (1): demographic information on hospitals

General information regarding the hospital and medical devices

An essential indicator for estimating the information security status of hospitals is the number of medical devices, especially the ratio of networked ones. Figure 1 and Table 2 show the interview results for this question. The mean of medical devices in the group of UMCs amounts to 25.000 devices. Two hospitals stated a substantially lower value and one a higher amount of medical devices. The median totals to 25.500 devices. To get a more comparable result, we normalized the number of medical devices using the hospital’s number of cases per year documented in the latest quality reports of the relevant hospitals. The data is visualized in Figure 2. For anonymity reasons, the data in Figure 2 is not in the same order as in Table 1 but ordered from high to low instead. This results in a total of seven hospitals ranging between 0,4 and 0,6 devices per case. The remaining three hospitals deviate from this group with one much higher (0,78%) and two substantially lower (0,22% and 0,2%). The number of networked medical devices per case has a median of 0,03.

Fig. 1
figure 1

This figure illustrates the total number of active devices and their networked proportion. The amount ranges between 42.000 for large hospitals and about 10K medical devices. The average total number of medical devices amounts to about 25.000 and the mean of networked medical devices is about 3.600

Fig. 2
figure 2

This figure presents the number of active medical devices standardised to the hospital specific number of inpatient cases per year. It shows a range between about 0.8 to 0.2 devices per case. Seven hospitals are in the range between 0.6 and 0.4 devices per case. The number of networked medical device per case ranges between 0.02 and 0.19

Table 2 This table presents the quantitative data of the inquired UMC hospitals regarding the active medical devices. The table also presents the ar. average, median and standard derivation within the networked and total number of medical devices. As described in “Discussion” section, the sixth hospital is treated as an outlier due to its implausible high networking degree

Organizational department structure of Medical Technology MT and Information Technology IT within the hospital structure We asked the hospitals for their organizational structure regarding the department of Medical Technology MT and the department of Information Technology IT. Out of all participating hospitals, the most popular answer was separated departments (68,8%). The major part of the UMC group also stated separated departments (63.6%), whereas, for the SC group, 80% of the given answers were separated departments in their organizational structure. 18.8% of all participating hospitals stated subsidiary company as their answer. Out of the group of UMCs, the answer subsidiary company was similar to 18.2%, and within the SC group, 20% gave the answer subsidiary company. The answer joint department was only given by two UMCs (12.5% of all inquired hospitals).

3.2 Category (2): degree of connectivity

The results of the question regarding the department with the highest usage of networked medical devices are presented in Figure 3, and the highest estimated growth in Figure 4. The questions in this section allow multiple answers. According to the answers, the most technically specialized and therefore highly networked departments within the group of UMCs are Radiology with 73%, as well as ICU and Radio-Oncology, with 45% each. Please note that multiple answers per hospital were allowed.

Fig. 3
figure 3

Highest usage of networked medical devices: This figure illustrates, that out of the inquired UMC hospitals, the most usage of networked medical devices can be found in departments of Radiology, Intensive care, and Radio-Oncology. The standard care hospitals are seeing their departments of Radiology, Nuclear-medicine, and Internal Medicine as the most networked

Fig. 4
figure 4

Highest growth in usage of networked medical devices in the next five years: The figure illustrates, that out of the inquired hospitals, the most expected growth can be expected in the departments of Surgery, Intensive Care, and Radiology

Other departments with a high association with MT were mentioned as well, but less frequently: Nuclear Medicine (27%), Anaesthesiology (27%), Surgery (18%), Internal Medicine, Laboratory, Cardiology, and Neurology (all 9%). The group of SC distributed their answers more towards Radiology (100%), Nuclear Medicine (40%), and Internal Medicine (also 40%). Lower numbers were in Surgery, Cardiology, and Neurology (each with 20%).

Departments with the lowest usage of networked medical devices The results on the question of the department with the lowest usage of networked medical devices are presented in Figure 5. The most given answers in both groups were “Normal Wards in Basic Care” (UMCs 45% and SC 20%) and Psychology (UMCs 36% and SCs 20%). However, the group of SCs gave only three different types of answers, where the UMC group spread into nine different answers.

Fig. 5
figure 5

Lowest usage of networked medical devices: This figure illustrates, that out of the inquired hospitals, the lowest usage of networked medical devices can be found in normal wards in basic care as well as in disciplines of Psych, and Dermatology

Departments with the most expected increase in networked medical devices over the next five years

The most expected increase in networked medical devices over the next five years is presented in Figure 4. The group of UMCs ranked Surgery with 73%, ICU and Radiology with 36% each, Laboratory with 27%, Cardiology,“Normal Wards in Basic Care” and Anaesthesiology with 18%, and Emergency Room with 9%.

3.3 Category (3): cybersecurity incident procedures

Protection against cybercrime targeting networked medical devices In these questions, the representatives were asked to rate the hospital’s protection against cybercrime targeting their networked medical devices. The group of UMCs answered with a mean of “between intermediate and good” (2.5). The group of SCs answered with an arithmetic mean of “good” (2.2). Out of the 16 hospitals, six were attacked until June 2019. Three of these attacks proofed to be successful in compromising the availability, credibility, or integrity of medical data. Six hospitals had a security incident. Out of these, three proofed to be an endangerment to the confidentiality, integrity, or availability. The networking degree of the active medical devices and the experienced attacks correlated with a coefficient of 0.53. This suggests a proportional relation between the connectivity of medical devices and the likelihood of an attack.

Meaningfulness of insurance against the consequences of a Cyber Security Incident. As nowadays, insurance against the consequences of an IT security incident become more apparent, 69% rated such insurance as reasonable. Table 3 shows the answers in correlation to past security incidents.

Table 3 This table presents the results of the interviews regarding a IT security self assessment, the attack history and the actual organisation structure within the specific hospitals

Discussion

4.1 Discussion of the data set

As described in “Results” section, out of 50 hospitals, 20 representatives answered our inquiry. Initially, we presumed a higher response rate in the group of University Medical Centers UMCs. Due to their higher financial resources for IT, these hospitals possess expertise as well as skilled human resources in security associated issues. Additionally, they are bound to clinical research resulting in the assumption that the response rate to a security-related research interview would be higher than the rate of Standard Care Hospitals SCs.

Out of the 50 asked hospitals, 36 were UMCs, and 14 were SCs. Our final data set contains 11 UMCs and five SCs. This shows a response rate of 31% in the group of UMC, while the rate of SCs is 35%. We did not have any withdrawing or drop out hospitals in our survey. The achieved response rate matches the literature, where 50% or less is often a result within written surveys [26, p.95].

Interestingly, out of the 20 responsive hospitals, one hospital stated that they want to participate but did not have the required data, especially regarding the number of (networked) medical systems. This hospital is a UMC and also a member of Critical Infrastructure Protection CIP and therefore bound to the following regulations. The industry-specific standard for health care, the B3S, states in section 7.5 that networked devices must be inventoried to establish cyber security in every CIP hospital [27]. That leads to the conclusion that the hospital will not be able to assess cyber security risks as this requires knowledge of their IT landscape.

Some of the representatives did not stick with the prescribed answering options during the interview. In this case, the given answers were adapted to the standard prescribed options. This procedure contains a chance of bending the answers towards the options. We consider this deviation as insignificant because it showed in the course that the adaptation of the answers did not change the meaning.

4.2 General hospital features

As shown in Figure 1 and Table 2, the arithmetic average number of medical devices in the group of UMCs amounts to 25.150 devices. Furthermore, Figure 1 shows the number of networked medical devices. As the networking degree of three hospitals significantly differs from the rest, the use of the median is more reliable in this case. We reached a median value of 3.600 (14,3%) networked devices within the group of UMCs. The arithmetic average amounts to 4.500 (17,9%).

One large factor regarding the diversification of the networked numbers, is the first hospital in Figure 1. That can be described by the status of this hospital as it is one of the top three hospitals in Germany. This implies a higher capability regarding expertise and financial aspects to improve the quality of treatment. But a networking degree of 40% is considered as to high to be plausible.

The Dean-Dixon criterion shows that this value could be treated as an outlier. Excluding this hospital would result in a lower standard derivation of ± 2.860 within the networked medical device analysis.

As described above, we assume that the size of a hospital influences the network degree as the financial aspects and the available Information Technology IT expertise are higher than in small hospitals. Additionally, clinical research requires access to state-of-the-art devices that are network-capable by default nowadays [28].

Looking into the relationship of the network degree percentage and the number of medical devices reveals a strong positive correlation that can be described with a correlation coefficient of 0.53. This supports our assumption.

In Fig. 2, the number of medical devices per case is described. A majority of UMCs show a range of 0.4 to 0.6 devices per case. As these UMC hospitals are economizing similar and the quotient of devices per case is stable, this can be interpreted as an indicator for the plausibility of our data set.

Since 2013, the German regulation SGB V paragraph 136b(1) sentence 3 obligates every UMC to publish quality reports on an annual basis. These reports contain information about their inpatient and outpatient numbers. Aggregating these reports results in an arithmetic average patient number per UMC of about 70.000 inpatients and about 317.000 outpatients.

Organization structure of the department of Medical Technology MT and IT within the hospital structure In the past, IT systems were only used for administrative tasks as well as documentation of patient data, diagnoses, and treatments [29]. In this time, medical devices were stand-alone and designed to particular use-cases. Therefore, MT was maintained by specialized departments. In the past 20 years, more and more medical devices interact with either each other or even with IT systems like servers and data storages [30].

This trend leads to the assumption that the department of MT has to deal with increasing IT-related matters. Furthermore, the department of IT has to integrate more MT-devices into their networks and systems. As a result, these two departments have to work together in order to guarantee proper operation. This could even include the fusion of both departments into a single one.

Contrary to our assumption, only two hospitals (12,5,%) have a combined department of medical IT. The remaining 87,5% of the hospitals stated having Medical Technology MT, and IT separated from each other. Out of these hospitals, 30% even have a subsidiary company for MT.

Having independent departments inherit the advantage of being equally in influence in the organization structure. Some of the interviewed representatives stated, that the disadvantage of being separated is a resulting gray area of responsibilities, where it is not clear, who is responsible for operating the systems and implementing essential patches. This can also be found in the literature, where it is also possible that the two departments are not cooperating and working against each other [25, p.26]. Additionally, if the MT is operated as a subsidiary company, the strategic goals of this company may differ from the goals of the main company. Furthermore, responsibilities may not be that clear in contrast to a joint department of MIT, where the cooperation is close [28]. These statements could also be verified in our study as it occurred in several interviews.

Concluding the facts mentioned above, only an organization structure with joint departments covers the requirements of operating networked medical devices in the present and future at the full grade. The capacity of being fully in charge of the device‘s mechanical functions and the networking abilities are crucial for safe and secure operation. The department’s influence within the company is strengthened due to their combined expertise as well. Making MT or IT to a subsidiary company of the main company produces specific problems when it comes to working in interdisciplinary fields like cyber security [31].

Nevertheless, as MT and IT are historically separated, it is hard to merge two existing departments inside a complex organization [25]. This can be seen as one of the reasons for the measured results.

4.3 Networking degree

4.3.1 Highest usage and highest estimated growth potential of networked medical devices

In the following subsection, the highest usage, as well as the highest estimated growth potential of networked medical devices, is described per department or discipline. An overview of the answers to both of the discussed questions can be found in Fig. 3 and Fig. 4.

Department of Radiology As the department of Radiology is based on digital imaging technologies, digitization is a substantial part of it [32]. Examples of active radiological devices are: CAT-scanner-systems, MRI-systems, angiographic-systems and standard X-Ray-systems. Picture Archiving and Communication Systems (PACS) are also considered as medical devices since their inherent purpose of diagnosing patients.

The department of Radiology is, according to the results, the largest user of networked medical devices in most of the inquired hospitals (73% in UMCs and 100% SCs).Regarding the growth in networked medical device usage in the next five years, the department of Radiology comes in third place with 36% in UMCs and 40% in SCs.

Reviewing these results leads to the conclusion that the digitization and networking process in the group of UMC is changing. The digitization and networking process in the department of Radiology seems to have progressed so far that UMCs are able to focus on extending the networking degree in other departments and disciplines.

It can also be seen in the average number of medical imaging devices per hospital (Table 4). The 34 UMCs, which are 2.3% of all hospitals in Germany operate 13.6% CAT scanners and 18.7% MRI scanners [5, p. 58].

Table 4 This table presents the data given from the German Federal Office of Statistics regarding the so called large-scale equipment in German hospitals and especially in UMCs. The UMCs proportion is given in percentage of the total number of devices

Discipline of Intensive Care (IC) The discipline of Intensive Care relies on the exact application of life support devices and device based patient monitoring. Examples are: Respirators, infusion pumps, monitoring systems. The capability of intensive care technology has increased in the past years [33]. This enhances a trend towards more interconnectivity and digitization in intensive care [34]. Again, we propose a pioneering role in the group of UMC in the usage of networked devices in the field of Intensive care.

Inside the group of UMCs, Intensive Care is already the second-largest user of networked medical devices, with 45% of the given answers. The SCs are not that far progressed in this matter, as 20% of SCs mentioned this department. This may also derive from the fact that the 34 UMCs cover about 18% of all intensive care capabilities in Germany, enabling these hospitals to spend more resources for intensive care technology [5, p. 68].

The inquiry of the highest growth in the usage of networked medical devices shows the departments of Intensive Care with 36% in second place in the group of UMCs.

Department of Radio-Oncology RO

The discipline of RO consists on the application of highly technical radiation devices. Ionizing radiation is produced either by radioactive decay or by electron acceleration within a large magnetic field. These devices are processing and generating image data to ensure a highly conformal conservation of the healthy tissue.

RO is only mentioned in the group of UMC. Due to its need for large-scale equipment, departments of RO are only found in large hospitals like UMCs resulting in 166 German hospitals operating a department of RO. Out of these 166, 32 UMCs are operating about 33% of all Radio-Oncologic linear accelerator LINACs, which are vital for the therapy [5, p.58]. This can also be seen in the results, as 45% mentioned this department sharing second place with intensive care.

Discipline of Nuclear Medicine NUC The discipline of NUC is another highly technology depending field of medicine. The patient’s metabolism is made visible through an uptake measurement of specific injected, gamma-ray-emitting radioactive isotopes so called tracers. These isotopes are either produced in the hospital or brought from a near nuclear reactor facility. In combination with conventional radiological procedures the NUC is essential for the correct diagnosis of oncologic patients. It depends on the cooperation of image data, the availability of radioactive isotopes, and the timed functionality of several networked devices [35].

UMC Hospitals cover a large part of the national nuclear medical care. For example, nearly one third (31%) of the total usage of Positron Emission Tomography PET systems is performed by 31 UMCs [5, p. 58]. Therefore, we assumed a high network degree in the group of UMCs.

Nevertheless, only 27% of the inquired UMCs stated this department as one of the highest users of networked medical devices. We did not expect this result. A possible reason for this could be a missing mentioning by the hospital representatives due to the inclusion of this department into the department of radiology.

To validate these results,we tried to get back to the hospital representatives with this and other outliers but unfortunately, we did not receive any answers. This particular question was discussed with the head of MT at the local UMC. He stated also that a possible explanation for this result is the inclusion of this department into the department of radiology.

Discipline of Anaesthesiology The discipline of Anaesthesiology relies on narcotic and life maintaining devices as well as devices to monitor the patients’ vital parameters. Historically, these devices operate on their own without any network connection. Nevertheless, the trend towards an intelligent networked operating system influences the Anaesthesiology massively [36, p.39]. The UMC group stated this discipline also with 27%. The group of SCs did not mention this discipline, but 18% of the UMCs and 20% of the SCs stated this discipline as one with high growth in the usage of networked medical devices.

Discipline of Surgery The discipline of Surgery was stated by 18% of the UMCs and 20% of the SCs. As mentioned above, we suspect a partial separation from the discipline of Anaesthesiology.

In matters of future growth, the discipline of Surgery leads the survey results with 73% in the group of UMC. This proofs our hypothesis that a connected smart surgery with imaging processing, navigation, robotics, and connected Anaesthesiology is one of the most anticipated steps in the UMC hospital development in the next five years. This concludes with the literature [37]. Hoeckelmann et al. presume a gradual increasing usage of robotics in a connected Surgery [38]. Additionally, 3D-printing is progressing in state of the art departments of surgery [39].

Additionally, as part of the surgery, growth in network usage regarding the emergency rooms is expected by 9% of the UMCs.

Department of Internal Medicine The department of internal medicine was mentioned within the SCs by 40% and the UMC group by 9%. UMCs usually cover a vast range of specialized disciplines, leading to a lot of individual departments for single disciplines, for example, cardiology or oncology. In SCs, those particular disciplines are often combined into a superior department of internal medicine [40].

Unfortunately, there were no mentions of this department in context to usage growth.

Department of Cardiology In Cardiology, active medical devices are used to ensure the electro-mechanic function of the patients heart. There are devices as: pacemakers and defibrillators, but also diagnostic devices as, ultrasonic-systems and radiological systems. In Germany, there are 323 specialized departments for Cardiology [5, p. 26]. Assuming that every UMC possesses a department of Cardiology, 20% of SCs operate a special department for cardiology. This leads to the conclusion that a department of Cardiology inside an SC is often part of their specialization. Looking at the result of the survey, 20% of SCs mentioned this department as one of the departments with the highest networking degree. Out of the UMCs, only 9% stated this department as it is part of their primary care. Regarding the growth in the next five years, the results of UMCs and SCs are close to each other, with 18% and 20%. This can be explained by the fact that connected devices are relatively new in the part of cardiology [41], leading to increased growth for departments in UMCs as well as in hospitals with an emphasis on cardiology.

Department of Neurology The department of Neurology uses highly sensible sensor technology to measure little neurologic voltage potentials [42]. To improve the workflow, currently, big data and AI concepts are on the edge of getting implemented into the clinical workflow of Neurology [43, p.8]. Additionally, Teleneurology is trending in this field of medicine [44]. Implementing these technologies requires high connectivity between the used medical devices.

This department was mentioned by 9% of the UMCs as one of the most significant users of networked medical devices but did not appear in the departments of highest growth. That refutes the thesis but shows that some UMCs are focusing on Neurology as one of their core competences. One of the SCs (20%) stated this department leading to the assumption that this hospital is specialized in Neurology.

Discipline of Laboratory The discipline of Laboratory is an essential part of the clinical workflow. Fast and correct treatment of patients mainly depends on the exactness as well as the timely availability of the results. This can be achieved by using connected systems processing data automatically and making it available to all stakeholders directly [45]. Additionally, a trend in Laboratory is the so-called “In-Home” laboratories, where patients have devices at home, sending data to the treating physician [46]. Laboratory equipment is therefore also diagnostic equipment, the size of which depends on the number of cases treated.

The discipline of Laboratory is mentioned as one of the most significant users of networked medical devices (9%) in the group of UMCs.

Further, it is considered with 27% (UMC) and 20% (SC) as one discipline with the highest future potential in becoming a large user of networked medical devices. This matches our expectations of laboratory devices, achieving a faster work process operating automatically and connected with other systems.

Normal Wards in Basic Care Normal wards in basic care cover every inpatient not being in intensive or intermediate care. It is part of most of the treating disciplines inside a hospital and therefore considered as one of the most abundant components in basic treatment.

Being one of the largest parts in a hospitals’ basic proficiency, it is also one of the least connected disciplines, as can be seen in Fig. 5.

Nevertheless, the possibilities of using network-connected devices to improve and support normal wards in basic care are increasing. There are two main use cases for connected devices on normal wards to improve individual treatment: Connected patient beds [47] and the generation of real-time data from patients [48]. The connected patient bed can, for example, be used to display and manage the patient’s digital medical record. Additionally, the connected bed could be extended by measuring units supporting the second part, the real-time data generation.

This proposition implies an expected growth in the networking connectivity of normal ward’s devices, which is consistent with the results having 18% of the UMCs mentioning this department.

4.3.2 Lowest usage of networked medical devices

In the following subsection, the lowest usage of networked medical devices is described per department or discipline. An overview of the answers to the discussed questions can be found in Fig. 5.

Comparing the results with the preceding ones, a more extensive range of answer distribution was recognized.

Normal Wards in Basic Care As mentioned in the last section, the normal wards in basic care are mentioned as the lowest connected discipline. This was mentioned by 45% of all UMCs.

However, global digitization and networking processes like the implementation of an electronic patient record are progressing into this discipline [49].

Discipline of Psychology The discipline of psychology is not widely based on the usage of medical devices [50]. Therefore, the total number of networked medical devices in this area is limited. This can also be seen in the answers of the hospitals as 36% of the UMCs, and 20% of the SCs mention this as one of their lowest networked discipline.

Discipline of Dermatology This discipline relies heavily on the usage of microscopic and imaging devices, as well as therapy illuminants, which fall under the classification in this subject area as active medical devices. [51]. These devices are still running as stand-alone devices without a networked component. The group of UMCs stated this department with 18% as one of their lowest networked departments. The SCs stated 20% for this department.

Connecting those devices could support the workflow inside the dermatology and is requested by a majority of patients who could benefit from such development as, e.g., the inclusion of apps to screen lesions in matters of malicious melanoma [52].

Departments with the lowest usage of networked medical devices The answers to this particular question resulted in a high range. The most common answer was “Normal Wards in Basic Care”, with 40%. This leads to the assumption that in normal wards in basic care, networked medical devices are not more attractive to use, than the analog variant. A possible cause for this can also be seen in the fact, that the implementation and usage of digital devices is considered frustrating if the underlying data and infrastructure in the organisation is not compliant[23]. We can associate this measure with a high degree of representativeness, since all of the hospitals surveyed have normal wards in basic care.

Due to individual clinical politic in setting the focus on different departments, we received a wide variety of answers. Many of these departments are historically present in the clinic and mainly operate without the use of networked MT. 25% of the inquired hospitals stated the department of dermatology as the one with the lowest usage of networked medical devices. This connects to the assumption that even in the most sophisticated hospitals in Germany, the major part of the used devices are still without the usage of any network. The nomination of the department of ophthalmology suggests a major usage of analog optical systems in both departments. The absence of a universal digital image standard like DICOM for radiological images is evidently.

4.4 Emphasis on networked medical devices in the next five years

The literature shows that the increase in the amount of networked medical devices is one of the essential improvements in medical care during the next years.[37, 5355]

Two of the inquired hospitals did not want to give an answer to this question in the shortcoming of an official opinion. Ten out of eleven UMCs answered this question with high. This is in line with our expectations. Some of the representatives even increased the voting of high to enormous and gigantic in specific departments Fig. 4. We can state that a major part of German UMCs is about to increase their percentage of networked medical devices significantly in the next five years.

4.5 Information security status in hospitals

Protection against cybercrime targeting networked medical devices The majority of the inquired hospital representatives stated their hospital as intermediate-well protected against cybercriminals targeting their networked medical devices.

However, the representatives are under some pressure not to portray the hospital as unfavorable due to public relations causes. This glossing over the own company’s security assessment over the average sector value is known in other Critical Infrastructure Protection CIP branches as well [21, p.19].

Some of the representatives were concerned about their missing knowledge and limited resources to operate the systems on a more secure basis. This, in combination with the fact above, leads to the assumption that the true self-assessment of the hospitals is more likely to be less secure than promoted in our interview. This can also be seen in related literature, where 50.5% of all inquired CIP institutions suffered from an cyber security incident in 2017. The overall security assessment against this kind of risk was stated as high within 58% of the inquired institutions [21].

Our results show a total attack rate of 37.5%. The group of UMCs was attacked with a rate of 27.2% and the SCs with 80%.

We propose a relationship between the large pool of networked medical devices and the attack surface of UMCs [11, pp.637]. This is supported by our measurement of attacks and the correlating degree of connectivity (0.53). This correlation is considered as strong positive. It is based on our complete hospital data not only looking at the UMC hospitals. Further, we anticipate a specific influence of the existing organization structure in operating these devices in a secure way. Therefore, we correlated the cyber security self-assessment and the successfully performed attacks with each other and reached a coefficient of -0.27. This is considered to be a small to medium correlation. We also looked into the stated organization structure and the successfully performed attacks on networked medical devices, and it became obvious that all successfully performed attacks happened in hospitals with either separated or subsidiary departments of MT and IT. Reviewing the successful and unsuccessful performed attacks, we discovered a success rate of 67% within the group of attacked UMCs and a rate of 33% within the attacked SCs. As the data set is limited, this result is a qualitative statement.

Meaningfulness of insurance against the consequences of an IT security incident 69% of the inquired hospitals would consider an insurance against the consequences of an cyber security incident in their hospital. This implies a big concern in matters of cyber security. Comparing the assessment with regard to the vulnerability and the meaningfulness of an insurance, one does not recognize any correlation. Even if the hospital representatives consider their hospital as well protected against cybercrime, they would still recommend placing an insurance against these kinds of threats as residual risk coverage. Furthermore, this supports the thesis that there could never be an absolute security level [56].

Conclusions

The data collected from the German hospitals of maximum care shows a diverse situation in some aspects of IT security.

German University Medical Centers UMCs are facing a substantial change within their landscape of medical devices becoming more and more networked. The conducted survey showed a median of 25.500 medical devices and containing a median of 3600 networked medical devices. That results in a strong correlation between the actual number of medical devices and the networking degree of 0.53.

The departments of Radiology, Intensive Care, Radio-Oncology, and Nuclear Medicine are currently the largest users of networked medical devices. In the next five years, the usage of networked medical devices will increase significantly in the departments of Surgery, Intensive Care, and Radiology. That could lead to a growing attack surface in matters of cyber security.

Concluding answers regarding the cyber security status reveals a lack of security basics in some of the inquired hospitals. Some representatives even were concerned about their missing knowledge and limited resources to operate the systems on a more secure basis. However, that does not align with the given Security self-assessment.

Most of the inquired hospitals are operating separated departments of IT and MT. The literature and our experience show problems in handling cyber security incidents on the organizational level. As a result, the most suitable organization structure for handling the requirements of operating networked medical devices is a joint department with a combination of both fields of expertise. We did also discover, that success-full attacks only happened in hospitals with separated departments of MT and IT.

Cyber security in German healthcare might become a major issue. We detected a strong positive correlation (0.53) between the state of being attacked and the networking degree of active medical devices. Consequently, some of the inquired hospitals are already facing the consequences of omitted measures within their growing pool of medical devices. Continuously relying on historically grown structures without adaption and trusting manufactures to solve vectors is a critical behavior that could seriously endanger patients. Some hospitals are already on a good path here, and talking to the responsible persons showed much awareness for this topic, but a common, nationwide approach is still missing.

Availability of data and materials

The data sets generated and analysed during the current study is available from the corresponding authors on reasonable request.

Notes

  1. https: //www.uni-muenster.de/imperia/md/content/kowi/forschen/ethik\_richtlinien\_fu\_\_r\_mitglieder\_der\_ethikkommission.pdf

Abbreviations

CIP:

Critical Infrastructure Protection

IT:

Information Technology

LINAC:

Radio-Oncologic linearaccelerator

MT:

Medical Technology

NUC:

Nuclear Medicine

PET:

Positron Emission Tomography

RO:

Radio-Oncology

SC:

Standard Care Hospital

UMC:

University Medical Center

References

  1. Beavers J, Pournouri S. In: Jahankhani H, Kendzierskyj S, Jamal A, Epiphaniou G, Al-Khateeb H, (eds).Recent Cyber Attacks and Vulnerabilities in Medical Devices and Healthcare Institutions. Cham: Springer; 2019, pp. 249–267. https://0-doi-org.brum.beds.ac.uk/10.1007/978-3-030-11289-9\_11.

    Google Scholar 

  2. Martin G, Martin P, Hankin C, Darzi A, Kinross J. Cybersecurity and healthcare: how safe are we?BMJ. 2017; 358. https://0-doi-org.brum.beds.ac.uk/10.1136/bmj.j3179.

  3. Chinthapalli K. The hackers holding hospitals to ransom. BMJ. 2017; 357. https://0-doi-org.brum.beds.ac.uk/10.1136/bmj.j2214.

  4. Dyer O. Hackers demand ransom to release encrypted us medical records. BMJ. 2016; 353. https://0-doi-org.brum.beds.ac.uk/10.1136/bmj.i1876.

  5. Statistisches Bundesamt. Gesundheit: Grunddaten der Krankenhäuser 2017. 2018. https://www.destatis.de/DE/Themen/Gesellschaft-Umwelt/Gesundheit/Krankenhaeuser/Publikationen/ Downloads-Krankenhaeuser/grunddaten-krankenhaeuser-2120611177004.pdf;jsessionid= 0CAA26E928B3E074ECE37B118AAA064D.internet742?\__blob=publicationFile. Accessed 15 Jan 2020.

  6. Federal Republic of Germany. Gesetz zur Erhöhung der Sicherheit informationstechnischer Systeme (IT-Sicherheitsgesetz). 2015. https://www.bgbl.de/xaver/bgbl/start.xav?startbk=Bundesanzeiger_BGBl&jumpTo=bgbl115s1324.pdfAccessed 14 Nov 2019.

  7. Gerlof H. It-sicherheitsgesetz wird scharf geschaltet. 2017. https://www.aerztezeitung.de/praxis_wirtschaft/klinikmanagement/article/937004/kritis-kliniken-zugzwang.html. Accessed 17 Oct 2019.

  8. Statistisches Bundesamt. Krankenhäuser: Einrichtungen. Betten und Patientenbewegung. 2019. https://www.destatis.de/DE/Themen/Gesellschaft-Umwelt/Gesundheit/Krankenhaeuser/Tabellen/gd-krankenhaeuser-jahre. html?view=main. Accessed 15 Jan 2020.

  9. Gesundheitsberichterstattung des Bundes. Krankenhäuser und Vorsorge- oder Rehabilitationseinrichtungen (Anzahl und je 100.000 Einwohner) sowie Aufenthalte (Fallzahl, Berechnungs-/Belegungstage und Verweildauer). Gliederungsmerkmale: Jahre, Deutschland, Einrichtungsmerkmale (Einrichtungsart / Bettenzahl / Träger / Art der Zulassung). 2019. http://www.gbe-bund.de/oowa921-install/servlet/oowa/aw92/WS0100/_XWD_FORMPROC?TARGET=&PAGE. _XWD_2&OPINDEX=2&HANDLER=_XWD_CUBE.SETPGS&DATACUBE=_XWD_30&D.922=11802. Accessed 09 Oct 2019.

  10. Eckert C. IT-Sicherheit. Berlin, Boston: De Gruyter Oldenbourg; 2014. https://0-www-degruyter-com.brum.beds.ac.uk/view/title/310256.

    Book  Google Scholar 

  11. Anderson R. Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd edn. Cambridge: Wiley Publishing; 2008.

    Google Scholar 

  12. Darms M, Haßfeld S, Fedtke S. Medizintechnik und medizinische Geräte als potenzielle Schwachstelle. Wiesbaden: Springer; 2019, pp. 109–28.

    Book  Google Scholar 

  13. Williams P, Woodward A. Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem. Med Devices (Auckl). 2015; 8:305–16.

    Google Scholar 

  14. Brandom R. UK hospitals hit with massive ransomware attack. 2017. https://www.theverge.com/2017/5/12/15630354/nhs-hospitals-ransomware-hack-wannacry-bitcoin. Accessed 14 Nov 2019.

  15. Berger R. Krankenhausstudie 2017. 2017. http://e-health-com.de/fileadmin/user_upload/dateien/News/roland_berger_krankenhausstudie_2017.pdf. Accessed 15 Jan 2020.

  16. Halperin D, Heydt-Benjamin TS, Ransford B, Clark SS, Defend B, Morgan W, Fu K, Kohno T, Maisel WH. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In: 2008 IEEE Symposium on Security and Privacy (sp 2008). Oakland: IEEE: 2008. p. 129–42. https://0-doi-org.brum.beds.ac.uk/10.1109/SP.2008.31.

    Google Scholar 

  17. Zetter K. It’s Insanely Easy to Hack Hospital Equipment. 2014. https://www.wired.com/2014/04/hospital-equipment-vulnerable/. Accessed 14 Nov 2019.

  18. of the european communities C. Directive 93/42 EWG. 1993. https://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CONSLEG:1993L0042:20071011:de:PDF. Accessed 14 Jan 2020.

  19. Verband der Universitätsklinika Deutschlands e. V. (VUD). Politikbrief 1|2018. 2018. https://www.uniklinika.de/fileadmin/user_upload/VUD_PB_01_2018_v2.pdf. Accessed 18 Oct 2019.

  20. Charité Universitätsmedizin Berlin. Anual report 2018. 2019. https://www.charite.de/fileadmin/user_upload/portal_relaunch/Mediathek/publikationen/jahresberichte/ Charite-Jahresbericht_2018.pdf. Accessed 14 Jan 2020.

  21. Ulrike Lechner SR. Monitor 2.0: IT-Sicherheit. 2018. https://monitor.itskritis.de/monitor2/. Accessed 15 Jan 2020.

  22. Mewis D. Investitionsstau: Helfer in der not. kma - Das Gesundheitswirtschaftsmagazin. 2017; 22:20–2. https://0-doi-org.brum.beds.ac.uk/10.1055/s-0036-1594694.

    Article  Google Scholar 

  23. Stephani V, Busse R, Geissler A. In: Klauber J, Geraedts M, Friedrich J, Wasem J, (eds).Benchmarking der Krankenhaus-IT: Deutschland im internationalen Vergleich. Berlin, Heidelberg: Springer; 2019, pp. 17–32. https://0-doi-org.brum.beds.ac.uk/10.1007/978-3-662-58225-1\_2 https://0-doi-org.brum.beds.ac.uk/10.1007/978-3-662-58225-1\_2.

    Google Scholar 

  24. Federal Republic of Germany. Medizinproduktegesetz - MPG. 1994. https://www.gesetze-im-internet.de/mpg/MPG.pdf. Accessed 13 Jan 2020.

  25. Wehrle T, Dujat C. Der verschmelzungsprozess läuft: It- und medizintechnikplanung wachsen bei komplexen neubauvorhaben sukzessive zusamm. Krankenhaustechnik-Management. 2012; 1-2:24.

    Google Scholar 

  26. Peter Sedlmeier F. Forschungsmethoden und Statistik Für Psychologen und Sozialwissenschaftler. Sozial, Erziehung (Pearson Studium - Psychologie). München: Pearson Studium; 2013.

    Google Scholar 

  27. Krankenhausgesellschaft D. Branchenspezifischer Sicherheitsstandard für die Gesundheitsversorgung im Krankenhaus. 2019. https://www.dkgev.de/fileadmin/default/Mediapool/2_Themen/2.1_Digitalisierung_Daten/2.1.4._IT-Sicherheit_und_ technischer_Datenschutz/2.1.4.1._IT-Sicherheit_im_Krankenhaus/B3S_KH_v1.1_8a_geprueft.pdf. Accessed 07 Jan 2020.

  28. Krüger-Brand HE. Medizinische IT-Netzwerke: Wenn Medizintechnik auf IT trifft...Dtsch Arztebl Int. 2010; 107(11):480. http://arxiv.org/abs/https://www.aerzteblatt.de/pdf.asp?id=70010 https://www.aerzteblatt.de/pdf.asp?id=70010.

    Google Scholar 

  29. Blackwell G, Blackwell G. The future of it in healthcare. Inform Health Soc Care. 2008; 33(4):211–326. https://0-doi-org.brum.beds.ac.uk/10.1080/17538150802598860 http://arxiv.org/abs/https://0-doi-org.brum.beds.ac.uk/10.1080/17538150802598860.

    Article  PubMed  Google Scholar 

  30. Lesh K, Weininger S, Goldman JM, Wilson B, Himes G. Medical device interoperability-assessing the environment. In: 2007 Joint Workshop on High Confidence Medical Devices, Software, and Systems and Medical Device Plug-and-Play Interoperability (HCMDSS-MDPnP 2007). Boston: IEEE: 2007. p. 3–12. https://0-doi-org.brum.beds.ac.uk/10.1109/HCMDSS-MDPnP.2007.22.

    Google Scholar 

  31. Tanck H. In: Kramme R, (ed).Fusion von Medizintechnik und Informationstechnologie. Berlin, Heidelberg: Springer; 2016, pp. 1–10. https://0-doi-org.brum.beds.ac.uk/10.1007/978-3-662-45538-8\_39-1.

    Google Scholar 

  32. Moses V, Korah I. Am J Roentgenol. 2019; 204(2):343–53. https://0-doi-org.brum.beds.ac.uk/10.2214/ajr.14.12882.

  33. Adhikari N, E.Lapinsky S. Medical informatics in the intensive care unit: Overview of technology assessment. J Crit Care. 2003; 18(1):41–7. https://0-doi-org.brum.beds.ac.uk/10.1053/jcrc.2003.yjcrc9.

    Article  PubMed  Google Scholar 

  34. Craft R. Trends in technology and the future intensive care unit. Crit Care Med. 2001; 29(8).

  35. Siegel E. Ahead of the curve or out of the loop? ten challenges to nuclear medicine interconnectivity. J Nucl Med. 2003; 44(10).

  36. Koeny M, Czaplik M, Walter M, Rossiant R, Leonhardt S. A new telesupervision system integrated in an intelligent networked operating room. In: EMERGING 2011: The Third International Conference on Emerging Network Intelligen. Lisbon: The Third International Conference on Emerging Network Intelligence: 2011.

    Google Scholar 

  37. Kucera M. Operationssaal der zukunft: Alles ist vernetzt. kma. 2019; 24(04):70–3.

    Article  Google Scholar 

  38. Hoeckelmann M, Rudas I, Fiorini P, Kirchner F, Haidegger T. Current capabilities and development potential in surgical robotics. Int J Adv Robot Syst. 2015; 12(5):61. https://0-doi-org.brum.beds.ac.uk/10.5772/60133 http://arxiv.org/abs/https://0-doi-org.brum.beds.ac.uk/10.5772/60133.

    Article  Google Scholar 

  39. Honigmann P, Sharma N, Okolo B, Popp U, Msallem B, Thieringer FM. Patient-Specific Surgical Implants Made of 3D Printed PEEK: Material, Technology, and Scope of Surgical Application. 2018. https://0-doi-org.brum.beds.ac.uk/10.1155/2018/4520636.

  40. Braunwald E. Tensions between academic cardiology and internal medicine. Int J Cardiol. 1984; 5:223–8.

    Article  CAS  PubMed  Google Scholar 

  41. Hills A, Farpour-Lambert NJ, Byrne NM. Precision medicine and healthy living: The importance of the built environment. Prog Cardiovasc Dis. 2019; 62(1):34–8. https://0-doi-org.brum.beds.ac.uk/10.1016/j.pcad.2018.12.013 Merging Precision and Healthy Living Medicine: Tailored Approaches for Chronic Disease Prevention and Treatment.

    Article  PubMed  Google Scholar 

  42. Fregni F, Pascual-Leone A. Technology insight: noninvasive brain stimulation in neurology–perspectives on the therapeutic potential of rtms and tdcs. Nat Clin Pract Neurol. 2007; 3(7):383–93.

    Article  PubMed  Google Scholar 

  43. In: Sub’ıas P, Ribas V, (eds).Big Data for Critical Care vol. 1. Barcelona: Big Data CoE: Barcelona; 2018. https://www.bigdatabcn.com/wp-content/uploads/2019/01/Big-Data-for-Critical-Care.pdfeurecat.

    Google Scholar 

  44. Wechsler L. Advantages and Limitations of Teleneurology. JAMA Neurology. 2015; 72(3):349–54. https://0-doi-org.brum.beds.ac.uk/10.1001/jamaneurol.2014.3844 https://jamanetwork.com/journals/jamaneurology/articlepdf/2089220/nrv140010.pdf.

    Article  PubMed  Google Scholar 

  45. Plecko T, Pfeiffer A, Wieland E. Laborautomation im krankenhaus: Systeme, it, potenziale und perspektiven / hospital laboratory automation: systems, it, potentials, and perspectives. J Lab Med. 2007. https://0-doi-org.brum.beds.ac.uk/10.1515/JLM.2007.033.

  46. Vergados D, Kavvadias C, Bigalke O, Eppler A, Jerabek B, Alevizos A, Caragiozidis M, Biniaris C, Robert E. An intelligent interactive healthcare services environment for assisted living at home. In: 2008 Second International Conference on Pervasive Computing Technologies for Healthcare. Tampere: 2008. p. 329. https://0-doi-org.brum.beds.ac.uk/10.4108/ICST.PERVASIVEHEALTH2008.4056.

  47. Williams F. Collins J, Allen J, Huster KA, Riley C, Glidewell P, Irvin J. Vanderpohl I, Schuman RJ, Howell BE, Wildman T. Hospital bed having wired and wireless network connectivity. 2019. https://patentimages.storage.googleapis.com/97/44/9e/230e8ef0695df2/US10278582.pdf. Accessed 25 Oct 2019.

  48. Albahri Os, Zaidan A, Bahaa B, Hashim M, Albahri As, Alsalem M. Real-time remote health-monitoring systems in a medical centre: A review of the provision of healthcare services-based body sensor information, open challenges and methodological aspects. J Med Syst. 2018; 42. https://0-doi-org.brum.beds.ac.uk/10.1007/s10916-018-1006-6.

  49. Ludwick D, Doucette J. Adopting electronic medical records in primary care: Lessons learned from health information systems implementation experience in seven countries. Int J Med Inform. 2009; 78(1):22–31. https://0-doi-org.brum.beds.ac.uk/10.1016/j.ijmedinf.2008.06.005.

    Article  CAS  PubMed  Google Scholar 

  50. Beneker C. Psychotherapie braucht dringend stärkere Vernetzung. ÄrzteZeitung. 2014. https://www.aerztezeitung.de/Politik/Psychotherapie-braucht-dringend-staerkere-Vernetzung-233623.html.

  51. Lake A. Dermatology - here and now. J Vis Commun Med. 2005; 28(2):63–7. https://0-doi-org.brum.beds.ac.uk/10.1080/01405110500079765.

    Article  PubMed  Google Scholar 

  52. Greis C, Meier Zürcher C, Djamei V, Moser A, Lautenschlager S, Navarini A. Unmet digital health service needs in dermatology patients. J Dermatol Treat. 2018; 29(7):643–7. https://0-doi-org.brum.beds.ac.uk/10.1080/09546634.2018.1441488.

    Article  Google Scholar 

  53. Cáceres C, Rosário JM, Amaya D. Towards health 4.0: e-hospital proposal based industry 4.0 and artificial intelligence concepts In: Riaño D, Wilk S, ten Teije A, editors. Artificial Intelligence in Medicine. Cham: Springer: 2019. p. 84–89.

    Google Scholar 

  54. Hubertus F, Adrian P. Surgery 4.0: the Natural Culmination of the Industrial Revolution? 2019; 3. https://0-www-degruyter-com.brum.beds.ac.uk/view/j/iss.2017.2.issue-3/iss-2017-0036/iss-2017-0036.xml.

  55. Savino J, Latifi R. In: Latifi R, (ed).The Hospital of the Future: Evidence-Based, Data-Driven. Cham: Springer; 2019, pp. 375–387. https://0-doi-org.brum.beds.ac.uk/10.1007/978-3-030-01394-3\_35.

    Google Scholar 

  56. Cavusoglu H, Mishra B, Raghunathan S. A model for evaluating it security investments. Commun ACM. 2004; 47(7):87–92. https://0-doi-org.brum.beds.ac.uk/10.1145/1005817.1005828.

    Article  Google Scholar 

Download references

Acknowledgements

We thank every participating hospital for sharing their time and information on this topic.

Funding

The research was funded by the research training group “Human Centered System Security”, sponsored by the state of North Rhine-Westfalia. The postgraduate research training group NERD (North Rhine-Westphalian Experts on Research in Digitalization) is funding your researchers in IT-security at universities and universities of applied sciences in North Rhine-Westphalia to promote research in the area of Human Centered Systems Security. Young researchers from different locations and principle investigators are cooperating on shared projects. Markus Willing and Christian Dresen were supported by the research training group “Human Centered System Security”, sponsored by the state of North Rhine-Westfalia. Open Access funding enabled and organized by Projekt DEAL.

Author information

Authors and Affiliations

Authors

Contributions

MW and CD did conduct this study and write this manuscript cooperatively through all the survey stages. Therefore the first authorship is shared between both of them. UH and SSC were leading the research team as a bipartisan cooperation. All authors have read and approved the manuscript.

Ethics declarations

Ethics approval and consent to participate

All participating hospitals gave their consent to participate in the interview. They also consent to the publication of the anonymized data. Based on the information provided, the proposed study does not fit the definition of human subjects research requiring IRB approval Footnote 1

Consent for publication

Not applicable

Competing interests

The authors declare that they have no competing interests.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary information

Additional file 1

The specific questionnaire used for the interviews.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated in a credit line to the data.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Willing, M., Dresen, C., Haverkamp, U. et al. Analyzing medical device connectivity and its effect on cyber security in german hospitals. BMC Med Inform Decis Mak 20, 246 (2020). https://0-doi-org.brum.beds.ac.uk/10.1186/s12911-020-01259-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://0-doi-org.brum.beds.ac.uk/10.1186/s12911-020-01259-y

Keywords