Final published version, 1.23 MB, PDF document
Available under license: CC BY-ND: Creative Commons Attribution-NoDerivatives 4.0 International License
Research output: Book/Report/Proceedings › Other report
Research output: Book/Report/Proceedings › Other report
}
TY - BOOK
T1 - HIPSTER Project - State of the Art
T2 - Technical Report
AU - Weir, Charles
AU - Dyson, Anna
AU - Prince, Daniel
PY - 2021/11/16
Y1 - 2021/11/16
N2 - Health IoT (HIoT) software offers thorny and complex security, privacy and safeguarding (SPS) problems and requirements, with huge potential impact. The HIPSTER project aims to help development teams in the Small-to-Medium Enterprise community, incorporating background information from cyber threat and risk intelligence to create a cost-effective intervention to support decision making around such threats and requirements.This report outlines the approach we plan to use and explores the academic ‘state of the art’ literature around the project. It concludes that the areas of novelty for the project are in finding ways to make risk data meaningful and palatable for software development teams; and in finding objective sources of such security and privacy information for this domain.To support readers in using the literature referenced, all citations and bibliography entries in this document have hyperlinks to the corresponding sources.
AB - Health IoT (HIoT) software offers thorny and complex security, privacy and safeguarding (SPS) problems and requirements, with huge potential impact. The HIPSTER project aims to help development teams in the Small-to-Medium Enterprise community, incorporating background information from cyber threat and risk intelligence to create a cost-effective intervention to support decision making around such threats and requirements.This report outlines the approach we plan to use and explores the academic ‘state of the art’ literature around the project. It concludes that the areas of novelty for the project are in finding ways to make risk data meaningful and palatable for software development teams; and in finding objective sources of such security and privacy information for this domain.To support readers in using the literature referenced, all citations and bibliography entries in this document have hyperlinks to the corresponding sources.
KW - Health
KW - Software security
KW - IOT
KW - Cybersecurity
KW - Software development
KW - Risk assessment
KW - Literature review
U2 - 10.5281/zenodo.5849057
DO - 10.5281/zenodo.5849057
M3 - Other report
BT - HIPSTER Project - State of the Art
ER -