Cyber Security and Privacy Safeguarding Pharmaceutical Innovation in a Digital Age
Pharmaceutical Innovation in a Digital Age
DOI:
https://doi.org/10.54393/pbmj.v8i4.1232Keywords:
Cybersecurity, Privacy, Pharmaceutical Industry, Digital Transformation, Innovation, Data Protection RegulationsAbstract
In order to improve efficiency and creativity, the pharmaceutical sector is going through a major digital revolution that contains the broad use of digital technologies including cloud computing, IoT devices, EHR systems, and artificial intelligence. Although this change presents new prospects, it also makes the industry more susceptible to sophisticated and frequent attacks. For preserving trust, comply with laws like GDPR and possibly HIPAA, and preserving pharmaceutical innovation, organizations in this sector must protect the vast and sensitive datasets they handle, such as patient medical histories, financial records, research findings, and rational property. In order to protect pharmaceutical innovation and uphold investor confidence, this review paper attempts to give a thorough overview of the digital transition in the pharmaceutical sector and stress the vital significance of strong cybersecurity protections and data privacy rules. It will look at future trends, cybersecurity risks, privacy issues, digital transformation, safeguarding strategies, regulatory frameworks, and policy and industry propositions.
References
Snigdha EZ, Jalil MS, Dahwal FM, Saeed M, Mehedy MT, Hasan SK. Cybersecurity in Healthcare IT Systems: Business Risk Management and Data Privacy Strategies. The American Journal of Engineering and Technology. 2025 Mar; 7(03): 163-84. doi: 10.37547/tajet/Volume07Issue03-15. DOI: https://doi.org/10.37547/tajet/Volume07Issue03-15
Arden NS, Fisher AC, Tyner K, Yu LX, Lee SL, Kopcha M. Industry 4.0 for pharmaceutical manufacturing: Preparing for the smart factories of the future. International Journal of Pharmaceutics. 2021 Jun; 602: 120554. doi: 10.1016/j.ijpharm.2021.120554. DOI: https://doi.org/10.1016/j.ijpharm.2021.120554
Bag S, Pretorius JH, Gupta S, Dwivedi YK. Role of institutional pressures and resources in the adoption of big data analytics powered artificial intelligence, sustainable manufacturing practices and circular economy capabilities. Technological Forecasting and Social Change. 2021 Feb; 163: 120420. doi: 10.1016/j.techfore.2020.120420. DOI: https://doi.org/10.1016/j.techfore.2020.120420
Kruse CS, Frederick B, Jacobson T, Monticone DK. Cybersecurity in healthcare: A systematic review of modern threats and trends. Technology and Health Care. 2017 Jan; 25(1): 1-0. doi: 10.3233/THC-161263. DOI: https://doi.org/10.3233/THC-161263
Parihar A, Prajapati JB, Prajapati BG, Trambadiya B, Thakkar A, Engineer P. Role of IOT in healthcare: Applications, security & privacy concerns. Intelligent Pharmacy. 2024 Oct; 2(5): 707-14. doi: 10.1016/j.ipha.2024.01.003. DOI: https://doi.org/10.1016/j.ipha.2024.01.003
Jadav NK, Kakkar R, Mankodiya H, Gupta R, Tanwar S, Agrawal S et al. GRADE: Deep learning and garlic routing-based secure data sharing framework for IIoT beyond 5G. Digital Communications and Networks. 2023 Apr; 9(2): 422-35. doi: 10.1016/j.dcan.2022.11.004. DOI: https://doi.org/10.1016/j.dcan.2022.11.004
Rust-Nguyen N, Sharma S, Stamp M. Darknet traffic classification and adversarial attacks using machine learning. Computers & Security. 2023 Apr; 127: 103098. doi: 10.1016/j.cose.2023.103098. DOI: https://doi.org/10.1016/j.cose.2023.103098
Aamir M and Zaidi SM. DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation. International Journal of Information Security. 2019 Dec; 18: 761-85. doi: 10.1007/s10207-019-00434-1. DOI: https://doi.org/10.1007/s10207-019-00434-1
Benmalek M. Ransomware on cyber-physical systems: Taxonomies, case studies, security gaps, and open challenges. Internet of Things and Cyber-Physical Systems. 2024 Jan; 4: 186-202. doi: 10.1016/j.iotcps.2023.12.001. DOI: https://doi.org/10.1016/j.iotcps.2023.12.001
Check Point Research. A continuing cyber-storm with increasing ransomware threats and a surge in healthcare and APAC region. [Cited on: 10th May 2025]. Available at: https://blog.checkpoint.com/security/a-continuing-cyber-storm-with-increasing-ransomware-threats-and-a-surge-in-healthcare-and-apac-region/.
Shaki F, Amirkhanloo M, Jahani D, Chahardori M. Artificial intelligence in pharmaceuticals: Exploring applications and legal challenges. Pharmaceutical and Biomedical Research. 2024 Dec; 10(1): 1-0. doi: 10.32598/PBR.10.1.1257.1. DOI: https://doi.org/10.32598/PBR.10.1.1257.1
Shackelford SJ. Protecting intellectual property and privacy in the digital age: the use of national cybersecurity strategies to mitigate cyber risk. Chapman Law Review. 2016; 19: 445.
Ramezan G and Leung C. A blockchain‐based contractual routing protocol for the internet of things using smart contracts. Wireless Communications and Mobile Computing. 2018 Nov; 2018(1): 4029591. doi: 10.1155/2018/4029591. DOI: https://doi.org/10.1155/2018/4029591
He Y, Aliyu A, Evans M, Luo C. Health care cybersecurity challenges and solutions under the climate of COVID-19: scoping review. Journal of Medical Internet Research. 2021 Apr; 23(4): e21747. doi: 10.2196/21747. DOI: https://doi.org/10.2196/21747
Weber GM, Adams WG, Bernstam EV, Bickel JP, Fox KP, Marsolo K et al. Biases introduced by filtering electronic health records for patients with "complete data". Journal of the American Medical Informatics Association. 2017 Nov; 24(6): 1134-41. doi: 10.1093/jamia/ocx071. DOI: https://doi.org/10.1093/jamia/ocx071
Singh, H. (2024). Ethical considerations in pharmaceutical analytics: Balancing innovation and patient privacy. International Journal of Research in Computer Applications and Information Technology. 2024 Nov; 7(2): 955-972. doi: 10.5281/zenodo.14054904.
Abouelmehdi K, Beni-Hessane A, Khaloufi H. Big healthcare data: preserving security and privacy. Journal of big data. 2018 Dec; 5(1): 1-8. doi: 10.1186/s40537-017-0110-7. DOI: https://doi.org/10.1186/s40537-017-0110-7
Chen Y, Yang O, Sampat C, Bhalode P, Ramachandran R, Ierapetritou M. Digital twins in pharmaceutical and biopharmaceutical manufacturing: a literature review. Processes. 2020 Sep; 8(9): 1088. doi: 10.3390/pr8091088. DOI: https://doi.org/10.3390/pr8091088
Demyanenko VG, Demyanenko DV, Breusova SV, Baranova II, Karpenko LA. Effect of the material of primary packaging containers on providing of visual inspection of pharmaceutical products. Scripta Scientifica Pharmaceutica. 2016 Jul; 3(1): 60-72. doi: 10.14748/ssp.v1i1.1685. DOI: https://doi.org/10.14748/ssp.v1i1.1685
Abrar I, Ayub Z, Masoodi F. Current trends and future scope for the internet of things. Internet of Things in Business Transformation: Developing an Engineering and Business Strategy for Industry 5.0. 2021 Jan: 185-209. doi: 10.1002/9781119711148.ch11. DOI: https://doi.org/10.1002/9781119711148.ch11
Buese, A. M., & Setterlund, E. Rise in Healthcare Data Breaches & the Impact for Healthcare Providers in 2024. Journal of Healthcare Information Management. 2024 Mar; 38(2): 225-241.
AL-Dosari K, Fetais N, Kucukvar M. Artificial intelligence and cyber defense system for banking industry: A qualitative study of AI applications and challenges. Cybernetics and systems. 2024 Feb; 55(2): 302-30. doi: 10.1080/01969722.2022.2112539. DOI: https://doi.org/10.1080/01969722.2022.2112539
Gupta V. IoT enabled air pollution monitoring in smart cities. Handbook of Wireless Sensor Networks: Issues and Challenges in Current Scenario's. 2020: 569-91. doi: 10.1007/978-3-030-40305-8_27. DOI: https://doi.org/10.1007/978-3-030-40305-8_27
Sufian MA, Haque S, Al-Samad K, Faruq O, Hossain MA, Talukder T et al. IoT and Data Science Integration for Smart City Solutions. AIJMR-Advanced International Journal of Multidisciplinary Research. 2024 Sep 18;2(5). doi: 10.62127/aijmr.2024.v02i05.1086. DOI: https://doi.org/10.62127/aijmr.2024.v02i05.1086
Elali W. The importance of strategic agility to business survival during corona crisis and beyond. International Journal of Business Ethics and Governance (IJBEG). 2021 May: 1-8. doi: 10.51325/ijbeg.v4i2.64. DOI: https://doi.org/10.51325/ijbeg.v4i2.64
Cremer F, Sheehan B, Fortmann M, Kia AN, Mullins M, Murphy F et al. Cyber risk and cybersecurity: a systematic review of data availability. The Geneva papers on risk and insurance. Issues and Practice. 2022 Feb; 47(3): 698. doi: 10.1057/s41288-022-00266-6. DOI: https://doi.org/10.1057/s41288-022-00266-6
Khan N, Hossain S, Khadka U, Sarkar S. Optimizing Business Operations through Edge Computing: Advancements in Real-Time Data Processing for the Big Data Era. AIJMR-Advanced International Journal of Multidisciplinary Research. 2024 Oct; 2(5). doi: 10.62127/aijmr.2024.v02i05.1108. DOI: https://doi.org/10.62127/aijmr.2024.v02i05.1108
Akram PS, Ramesha M, Valiveti SA, Sohail S, Rao KT. IoT based remote patient health monitoring system. In2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS) 2021 Mar; 1: 1519-1524. doi: 10.1109/ICACCS51430.2021.9441874. DOI: https://doi.org/10.1109/ICACCS51430.2021.9441874
Buliga O, Scheiner CW, Voigt KI. Business model innovation and organizational resilience: towards an integrated conceptual framework. Journal of Business Economics. 2016 Aug; 86: 647-70. doi: 10.1007/s11573-015-0796-y. DOI: https://doi.org/10.1007/s11573-015-0796-y
Rouhani S, Ashrafi A, Zare Ravasan A, Afshari S. The impact model of business intelligence on decision support and organizational benefits. Journal of Enterprise Information Management. 2016 Feb; 29(1): 19-50. doi: 10.1108/JEIM-12-2014-0126. DOI: https://doi.org/10.1108/JEIM-12-2014-0126
Almalawi A, Khan AI, Alsolami F, Abushark YB, Alfakeeh AS. Managing security of healthcare data for a modern healthcare system. Sensors. 2023 Mar; 23(7): 3612. doi: 10.3390/s23073612. DOI: https://doi.org/10.3390/s23073612
Arif H, Kumar A, Fahad M, Hussain HK. Future horizons: AI-enhanced threat detection in cloud environments: Unveiling opportunities for research. International Journal of Multidisciplinary Sciences and Arts. 2024 Jan; 3(1): 242-51. doi: 10.47709/ijmdsa.v2i2.3452. DOI: https://doi.org/10.47709/ijmdsa.v2i2.3452
Dedzins R, James M. Biopharmaceutical technical resource guide. Emerson; 2015 [Cited On: 10th May 2025]. Available at: https://www.lakesidecontrols.com/getattachment/7846bd01-541d-4b2d-a70017a37c651f76/article.
Biasin E, Kamenjašević E, Ludvigsen KR. Cybersecurity of AI medical devices: risks, legislation, and challenges. Research Handbook on Health, AI and the Law. 2024 Jul: 57-74. doi: 10.4337/9781802205657.ch04. DOI: https://doi.org/10.4337/9781802205657.ch04
Attkan A, Ranga V, Ahlawat P. A Rubik's Cube Cryptosystem-based Authentication and Session Key Generation Model Driven in Blockchain Environment for IoT Security. Association for Computing Machinery Transactions on Internet of Things. 2023 May; 4(2): 1-39. doi: 10.1145/3586578. DOI: https://doi.org/10.1145/3586578
Patil RS, Kulkarni SB, Gaikwad VL. Artificial intelligence in pharmaceutical regulatory affairs. Drug Discovery Today. 2023 Sep; 28(9): 103700. doi: 10.1016/j.drudis.2023.103700. DOI: https://doi.org/10.1016/j.drudis.2023.103700
Mohammed ZA, Mohammed M, Mohammed S, Syed M. Artificial Intelligence: Cybersecurity Threats in Pharmaceutical IT Systems. 2024 Aug: 11(8). doi: 10.17148/IARJSET.2024.11801. DOI: https://doi.org/10.17148/IARJSET.2024.11801
Michael K, Abbas R, Roussos G. AI in cybersecurity: The paradox. Institute of Electrical and Electronics Engineers Transactions on Technology and Society. 2023 Jun; 4(2): 104-9. doi: 10.1109/TTS.2023.3280109. DOI: https://doi.org/10.1109/TTS.2023.3280109
Abd Elazeem NE. Effect of cybercrime on the pharmaceutical industry. Journal of Intellectual Property and Innovation Management. 2020 Jul; 3(5): 91-121. doi: 10.21608/jipim.2021.181274. DOI: https://doi.org/10.21608/jipim.2021.181274
Kazim AK and Shanshul NR. The impact of cyber-attacks on companies and organisations in developed countries. Edelweiss Applied Science and Technology. 2024 Dec; 8(6): 9245-52. doi: 10.55214/25768484.v8i6.3980. DOI: https://doi.org/10.55214/25768484.v8i6.3980
Eisenhardt KM and Graebner ME. Theory building from cases: Opportunities and challenges. Academy of Management Journal. 2007 Feb; 50(1): 25-32. doi: 10.5465/amj.2007.24160888. DOI: https://doi.org/10.5465/amj.2007.24160888
Khan MN, Haque S, Azim KS, Al-Samad K, Jafor AH, Aziz M et al. Analyzing the Impact of Data Analytics on Performance Metrics in SMEs. AIJMR-Advanced International Journal of Multidisciplinary Research. 2024 Sep; 2(5). doi: 10.62127/aijmr.2024.v02i05.1081. DOI: https://doi.org/10.62127/aijmr.2024.v02i05.1081
Haque S, Azim KS, Al-Samad K, Jafor AH, Aziz M, Faruq O et al. The Evolution of Artificial Intelligence and its Impact on Economic Paradigms in the USA and Globally. AIJMR-Advanced International Journal of Multidisciplinary Research. 2024 Sep; 2(5). doi: 10.62127/aijmr.2024.v02i05.1083. DOI: https://doi.org/10.62127/aijmr.2024.v02i05.1083
Khasawneh O and Alzghoul A. The real effects of Fintech on the global financial system. International Journal of Professional Business Review: International Journal of Professional Business Review. 2023 Mar; 8(3): e01725. doi: 10.26668/businessreview/2023.v8i3.1725. DOI: https://doi.org/10.26668/businessreview/2023.v8i3.1725
Hossain Z, Chowdhury SS, Rana MS, Hossain A, Faisal MH, Al Wahid SA et al. Business Innovations in Healthcare: Emerging Models for Sustainable Growth. AIJMR-Advanced International Journal of Multidisciplinary Research. 2024 Sep; 2(5). doi: 10.62127/aijmr.2024.v02i05.1093. DOI: https://doi.org/10.62127/aijmr.2024.v02i05.1093
Punia V and Aggarwal G. Impact of Artificial Intelligence (AI) in Cybersecurity. InRecent Advances in Computational Intelligence and Cyber Security. 2024 Apr; 13(5): 183-193. doi: 10.1201/9781003518587-18. DOI: https://doi.org/10.1201/9781003518587-18
Salama R and Al-Turjman F. Future uses of AI and blockchain technology in the global value chain and cybersecurity. InSmart Global Value Chain 2024 Aug: 257-269. doi: 10.1201/9781003461432-17. DOI: https://doi.org/10.1201/9781003461432-17
Field M. WannaCry cyber-attack cost the NHS£ 92m as 19,000 appointments cancelled. The telegraph. 2018 Oct; 11. doi: 10.1016/S1361-3723(18)30102-7. DOI: https://doi.org/10.1016/S1361-3723(18)30102-7
Pharmaceutical Technology. Five pharma cybersecurity breaches to know and learn from: the transition to digital, expedited by the Covid-19 pandemic, has opened up new cybersecurity concerns. [Cite On: 10th May 2025]. Available at: https://www.pharmaceutical-technology.com/comment/pharma-cybersecurity-breaches/.
Alexandra P, Camelia C, Elena CC, Bogdan P, Răzvan dc. Cyber risk assessment in the pharmaceutical industry: vulnerabilities, threats, and global response strategies. Annals of'Constantin Brancusi'University of Targu-Jiu. Economy Series/Analele Universităţii'Constantin Brâncuşi'din Târgu-Jiu Seria Economie. 2024 Oct: 1(5): 307 – 319.
Shafik W. Blockchain-based internet of things (B-IoT): Challenges, solutions, opportunities, open research questions, and future trends. Blockchain-based Internet of Things. 2024 Feb: 35-58. doi: 10.1201/9781003407096-3. DOI: https://doi.org/10.1201/9781003407096-3
Mathkor DM, Mathkor N, Bassfar Z, Bantun F, Slama P, Ahmad F et al. Multirole of the internet of medical things (IoMT) in biomedical systems for managing smart healthcare systems: An overview of current and future innovative trends. Journal of Infection and Public Health. 2024 Apr; 17(4): 559-72. doi: 10.1016/j.jiph.2024.01.013. DOI: https://doi.org/10.1016/j.jiph.2024.01.013
Ramos-Cruz B, Andreu-Perez J, Martínez L. The cybersecurity mesh: A comprehensive survey of involved artificial intelligence methods, cryptographic protocols and challenges for future research. Neurocomputing. 2024 Feb: 127427. doi: 10.1016/j.neucom.2024.127427. DOI: https://doi.org/10.1016/j.neucom.2024.127427
Iqbal Z, Khan S, Mehmood A, Lloret J, Alrajeh NA. Adaptive Cross‐Layer Multipath Routing Protocol for Mobile Ad Hoc Networks. Journal of Sensors. 2016; 2016(1): 5486437. doi: 10.1155/2016/5486437. DOI: https://doi.org/10.1155/2016/5486437
Li C, Li F, Yin L, Luo T, Wang B. A Blockchain‐Based IoT Cross‐Domain Delegation Access Control Method. Security and Communication Networks. 2021 Sep; 2021(1): 3091104. doi: 10.1155/2021/3091104. DOI: https://doi.org/10.1155/2021/3091104
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Pakistan BioMedical Journal

This work is licensed under a Creative Commons Attribution 4.0 International License.
This is an open-access journal and all the published articles / items are distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. For comments editor@pakistanbmj.com