9th International Conference on Information Technology, InCIT 2025, Hybrid, Phuket, Tayland, 12 - 14 Kasım 2025, ss.892-897, (Tam Metin Bildiri)
As more patient information is stored and shared electronically with developing technology, cybersecurity risks and threats in e-healthcare applications have become a notable problem. To mitigate these risks, it is essential to implement measures such as strengthening security protocols, regularly updating systems, and collaborating with IT experts. Along with identifying security measures, determining which risks pose a threat to cybersecurity and their relative importance is also a crucial step in managing risk. This study aims to investigate cybersecurity risks in e-healthcare applications and rank them. Therefore, it will identify which risks are most critical and, accordingly, which risks should be combated first. For risk prioritization, the Best Worst Method (BWM), which has been frequently used in the literature recently, has been adopted. Among the nine main risks identified as a result of literature research and expert opinions, it has been successfully determined which ones should be addressed with priority.