{"id":"https://openalex.org/W7130501813","doi":"https://doi.org/10.3389/fcomp.2026.1719783","title":"From cybersecurity to digital health: an AI-based eGuide framework for Oman's healthcare centers","display_name":"From cybersecurity to digital health: an AI-based eGuide framework for Oman's healthcare centers","publication_year":2026,"publication_date":"2026-02-19","ids":{"openalex":"https://openalex.org/W7130501813","doi":"https://doi.org/10.3389/fcomp.2026.1719783"},"language":null,"primary_location":{"id":"doi:10.3389/fcomp.2026.1719783","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2026.1719783","pdf_url":null,"source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.3389/fcomp.2026.1719783","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043925187","display_name":"Akbar Khanan","orcid":"https://orcid.org/0000-0002-2226-0001"},"institutions":[{"id":"https://openalex.org/I206935292","display_name":"Shaqra University","ror":"https://ror.org/05hawb687","country_code":"SA","type":"education","lineage":["https://openalex.org/I206935292"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Akbar Khanan","raw_affiliation_strings":["College of Business Administration, MIS, A'sharqiyah University"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Business Administration, MIS, A'sharqiyah University","institution_ids":["https://openalex.org/I206935292"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039065536","display_name":"Yasir Abdelgadir Mohamed","orcid":"https://orcid.org/0000-0002-9337-7688"},"institutions":[{"id":"https://openalex.org/I206935292","display_name":"Shaqra University","ror":"https://ror.org/05hawb687","country_code":"SA","type":"education","lineage":["https://openalex.org/I206935292"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Yasir Abdelgadir Mohamed","raw_affiliation_strings":["College of Business Administration, MIS, A'sharqiyah University"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Business Administration, MIS, A'sharqiyah University","institution_ids":["https://openalex.org/I206935292"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071455107","display_name":"Mohamed Bashir","orcid":"https://orcid.org/0000-0002-2292-2677"},"institutions":[{"id":"https://openalex.org/I206935292","display_name":"Shaqra University","ror":"https://ror.org/05hawb687","country_code":"SA","type":"education","lineage":["https://openalex.org/I206935292"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mohamed Bashir","raw_affiliation_strings":["College of Business Administration, MIS, A'sharqiyah University"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Business Administration, MIS, A'sharqiyah University","institution_ids":["https://openalex.org/I206935292"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042990967","display_name":"Dil Nawaz Hakro","orcid":"https://orcid.org/0000-0001-9532-4013"},"institutions":[{"id":"https://openalex.org/I126131087","display_name":"University of Sindh","ror":"https://ror.org/01d692d57","country_code":"PK","type":"education","lineage":["https://openalex.org/I126131087"]},{"id":"https://openalex.org/I204409756","display_name":"Middle East College","ror":"https://ror.org/03z34n548","country_code":"OM","type":"education","lineage":["https://openalex.org/I204409756"]}],"countries":["OM","PK"],"is_corresponding":false,"raw_author_name":"Dil Nawaz Hakro","raw_affiliation_strings":["Department of Computing and Electronics Engineering, Middle East College","Department of Software Engineering, University of Sindh"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computing and Electronics Engineering, Middle East College","institution_ids":["https://openalex.org/I204409756"]},{"raw_affiliation_string":"Department of Software Engineering, University of Sindh","institution_ids":["https://openalex.org/I126131087"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5126436477","display_name":"Danish Garg","orcid":null},"institutions":[{"id":"https://openalex.org/I204409756","display_name":"Middle East College","ror":"https://ror.org/03z34n548","country_code":"OM","type":"education","lineage":["https://openalex.org/I204409756"]}],"countries":["OM"],"is_corresponding":false,"raw_author_name":"Danish Garg","raw_affiliation_strings":["Department of Computing and Electronics Engineering, Middle East College"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computing and Electronics Engineering, Middle East College","institution_ids":["https://openalex.org/I204409756"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5043925187"],"corresponding_institution_ids":["https://openalex.org/I206935292"],"apc_list":{"value":1150,"currency":"USD","value_usd":1150},"apc_paid":{"value":1150,"currency":"USD","value_usd":1150},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20469586,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.16459999978542328,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.16459999978542328,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14064","display_name":"Organizational and Employee Performance","score":0.08269999921321869,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.037300001829862595,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/health-care","display_name":"Health care","score":0.5184999704360962},{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.45170000195503235},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.4244000017642975},{"id":"https://openalex.org/keywords/health-insurance-portability-and-accountability-act","display_name":"Health Insurance Portability and Accountability Act","score":0.4092999994754791},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.39730000495910645},{"id":"https://openalex.org/keywords/underpinning","display_name":"Underpinning","score":0.39079999923706055},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.38519999384880066},{"id":"https://openalex.org/keywords/disaster-recovery","display_name":"Disaster recovery","score":0.37689998745918274},{"id":"https://openalex.org/keywords/business-continuity","display_name":"Business continuity","score":0.367000013589859},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.3619999885559082}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7028999924659729},{"id":"https://openalex.org/C160735492","wikidata":"https://www.wikidata.org/wiki/Q31207","display_name":"Health care","level":2,"score":0.5184999704360962},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.45170000195503235},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4341999888420105},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.4244000017642975},{"id":"https://openalex.org/C2778306010","wikidata":"https://www.wikidata.org/wiki/Q606563","display_name":"Health Insurance Portability and Accountability Act","level":3,"score":0.4092999994754791},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.39730000495910645},{"id":"https://openalex.org/C2780871342","wikidata":"https://www.wikidata.org/wiki/Q7883752","display_name":"Underpinning","level":2,"score":0.39079999923706055},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.38519999384880066},{"id":"https://openalex.org/C129230348","wikidata":"https://www.wikidata.org/wiki/Q1140205","display_name":"Disaster recovery","level":2,"score":0.37689998745918274},{"id":"https://openalex.org/C2778143579","wikidata":"https://www.wikidata.org/wiki/Q831801","display_name":"Business continuity","level":2,"score":0.367000013589859},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.3619999885559082},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.3562999963760376},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.3537999987602234},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.34209999442100525},{"id":"https://openalex.org/C2776007630","wikidata":"https://www.wikidata.org/wiki/Q2798912","display_name":"Accountability","level":2,"score":0.33719998598098755},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.33489999175071716},{"id":"https://openalex.org/C2777407602","wikidata":"https://www.wikidata.org/wiki/Q1888932","display_name":"Mandatory access control","level":4,"score":0.3010999858379364},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.28999999165534973},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2874999940395355},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.28700000047683716},{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.28279998898506165},{"id":"https://openalex.org/C39389867","wikidata":"https://www.wikidata.org/wiki/Q380767","display_name":"Corporate governance","level":2,"score":0.2806999981403351},{"id":"https://openalex.org/C80958533","wikidata":"https://www.wikidata.org/wiki/Q1047174","display_name":"Audit trail","level":3,"score":0.28029999136924744},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.2782000005245209},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2777999937534332},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.2743000090122223},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.26019999384880066},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2590999901294708},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.25679999589920044},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.25619998574256897},{"id":"https://openalex.org/C196879817","wikidata":"https://www.wikidata.org/wiki/Q872685","display_name":"Data governance","level":4,"score":0.2531999945640564},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.25130000710487366},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.25060001015663147}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3389/fcomp.2026.1719783","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2026.1719783","pdf_url":null,"source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.3389/fcomp.2026.1719783","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2026.1719783","pdf_url":null,"source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8169987435","display_name":null,"funder_award_id":"MoHERI/BFP/ASU/2023","funder_id":"https://openalex.org/F4320319853","funder_display_name":"Ministry of Higher Education, Research and Innovation"}],"funders":[{"id":"https://openalex.org/F4320319853","display_name":"Ministry of Higher Education, Research and Innovation","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":64,"referenced_works":["https://openalex.org/W2060289434","https://openalex.org/W2069707920","https://openalex.org/W2165529641","https://openalex.org/W2514994441","https://openalex.org/W2522448907","https://openalex.org/W2621635773","https://openalex.org/W2749040653","https://openalex.org/W2788332681","https://openalex.org/W2792347597","https://openalex.org/W2797022659","https://openalex.org/W2900954917","https://openalex.org/W2908201961","https://openalex.org/W2990724439","https://openalex.org/W3034839622","https://openalex.org/W3044738047","https://openalex.org/W3143257057","https://openalex.org/W3192851400","https://openalex.org/W3201497420","https://openalex.org/W4285982397","https://openalex.org/W4292840130","https://openalex.org/W4312379477","https://openalex.org/W4321760789","https://openalex.org/W4366216951","https://openalex.org/W4378840015","https://openalex.org/W4385463135","https://openalex.org/W4385517678","https://openalex.org/W4388588841","https://openalex.org/W4388713780","https://openalex.org/W4391559759","https://openalex.org/W4392028635","https://openalex.org/W4399360943","https://openalex.org/W4400720698","https://openalex.org/W4401020666","https://openalex.org/W4401044969","https://openalex.org/W4401486720","https://openalex.org/W4404582548","https://openalex.org/W4406584055","https://openalex.org/W4406728991","https://openalex.org/W4406989353","https://openalex.org/W4407156455","https://openalex.org/W4407157884","https://openalex.org/W4408287847","https://openalex.org/W4408435165","https://openalex.org/W4408945417","https://openalex.org/W4409656257","https://openalex.org/W4409676367","https://openalex.org/W4409737914","https://openalex.org/W4410587894","https://openalex.org/W4410841881","https://openalex.org/W4411049671","https://openalex.org/W4411105034","https://openalex.org/W4411520156","https://openalex.org/W4411972440","https://openalex.org/W4412675492","https://openalex.org/W4412984512","https://openalex.org/W4413188708","https://openalex.org/W4413392074","https://openalex.org/W4413862582","https://openalex.org/W4414107065","https://openalex.org/W4414136699","https://openalex.org/W4415943946","https://openalex.org/W4417193840","https://openalex.org/W7083314112","https://openalex.org/W7111222711"],"related_works":[],"abstract_inverted_index":{"The":[0,86,153],"AI-based":[1],"eGuide":[2,38,187],"platform":[3,188],"for":[4,196],"healthcare":[5],"centers":[6],"in":[7],"Oman":[8],"represents":[9],"a":[10,29,64,72,190],"cornerstone":[11],"of":[12,84,93,127,148,169],"the":[13,37,61,91,107,114,125,186],"Sultanate's":[14],"critical":[15],"national":[16,24],"health":[17,199],"infrastructure,":[18],"underpinning":[19],"both":[20],"patient":[21],"care":[22],"and":[23,32,52,81,113,118,141,151,160,167,179,193],"resilience.":[25],"This":[26],"paper":[27],"develops":[28],"comprehensive":[30],"cybersecurity":[31],"governance":[33],"framework":[34,87],"to":[35],"secure":[36],"system":[39],"against":[40],"an":[41],"increasingly":[42],"complex":[43],"threat":[44],"landscape":[45],"characterized":[46],"by":[47,90],"phishing":[48],"campaigns,":[49],"ransomware":[50],"incidents,":[51],"data":[53],"leakage":[54],"risks.":[55],"Building":[56],"upon":[57],"global":[58],"best":[59],"practices,":[60],"study":[62],"advances":[63],"transition":[65],"from":[66],"legacy":[67],"perimeter":[68],"security":[69,130],"models":[70],"toward":[71],"Zero":[73],"Trust":[74],"Architecture,":[75],"ensuring":[76],"continuous":[77,157],"authentication,":[78,134],"dynamic":[79],"authorization,":[80],"micro":[82],"segmentation":[83],"services.":[85],"is":[88,124],"reinforced":[89],"adoption":[92],"ISO/IEC":[94],"27000":[95],"aligned":[96],"governance,":[97],"demonstrable":[98],"compliance":[99],"with":[100],"Oman's":[101,197],"Personal":[102],"Data":[103,109],"Protection":[104,110],"Law":[105],"(PDPL),":[106],"General":[108],"Regulation":[111],"(GDPR),":[112],"Health":[115],"Insurance":[116],"Portability":[117],"Accountability":[119],"Act":[120],"(HIPAA).":[121],"Further":[122],"contribution":[123],"integration":[126],"mathematically":[128],"verified":[129],"primitives,":[131],"including":[132],"multi-factor":[133],"hybrid":[135],"RBAC":[136],"cum":[137],"ABAC":[138],"access":[139],"models,":[140],"blockchain-enabled":[142],"audit":[143],"trails,":[144],"providing":[145],"rigorous":[146],"assurances":[147],"privacy,":[149],"integrity,":[150],"accountability.":[152],"methodology":[154],"also":[155],"incorporates":[156],"evaluation":[158],"cycles":[159],"penetration":[161],"testing":[162],"strategies,":[163],"enabling":[164],"proactive":[165],"detection":[166],"mitigation":[168],"vulnerabilities.":[170],"By":[171],"embedding":[172],"resilience":[173],"through":[174],"architectural":[175],"scalability,":[176],"high-availability":[177],"patterns,":[178],"disaster":[180],"recovery":[181],"mechanisms,":[182],"this":[183],"research":[184],"positions":[185],"as":[189],"secure,":[191],"reliable,":[192],"future-ready":[194],"foundation":[195],"digital":[198],"ecosystem.":[200]},"counts_by_year":[],"updated_date":"2026-05-21T06:26:12.895304","created_date":"2026-02-19T00:00:00"}
