Published on in Vol 20, No 5 (2018): May

Preprints (earlier versions) of this paper are available at https://preprints.jmir.org/preprint/10059, first published .
Cybersecurity in Hospitals: A Systematic, Organizational Perspective

Cybersecurity in Hospitals: A Systematic, Organizational Perspective

Cybersecurity in Hospitals: A Systematic, Organizational Perspective

Authors of this article:

Mohammad S Jalali1 Author Orcid Image ;   Jessica P Kaiser1 Author Orcid Image

Journals

  1. Ghafur S, Kristensen S, Honeyford K, Martin G, Darzi A, Aylin P. A retrospective impact analysis of the WannaCry cyberattack on the NHS. npj Digital Medicine 2019;2(1) View
  2. Darabi N, Hosseinichimeh N. System dynamics modeling in health and medicine: a systematic literature review. System Dynamics Review 2020;36(1):29 View
  3. Jalali M, Bruckes M, Westmattelmann D, Schewe G. Why Employees (Still) Click on Phishing Links: An Investigation in Hospitals. SSRN Electronic Journal 2019 View
  4. Mishah N, Bukhari A, AlMutairi B, Mohreq M. Status of e-security and privacy protection in Saudi hospitals. Computer Methods and Programs in Biomedicine 2019;171:5 View
  5. Barad M. Linking Cyber Security Improvement Actions in Healthcare Systems to Their Strategic Improvement Needs. Procedia Manufacturing 2019;39:279 View
  6. Gordon W, Wright A, Aiyagari R, Corbo L, Glynn R, Kadakia J, Kufahl J, Mazzone C, Noga J, Parkulo M, Sanford B, Scheib P, Landman A. Assessment of Employee Susceptibility to Phishing Attacks at US Health Care Institutions. JAMA Network Open 2019;2(3):e190393 View
  7. Jalali M, Siegel M, Madnick S. Decision Making and Biases in Cybersecurity Capability Development: Evidence from a Simulation Game Experiment. SSRN Electronic Journal 2017 View
  8. Offner K, Sitnikova E, Joiner K, MacIntyre C. Towards understanding cybersecurity capability in Australian healthcare organisations: a systematic review of recent trends, threats and mitigation. Intelligence and National Security 2020;35(4):556 View
  9. Jalali M, Russell B, Razak S, Gordon W. EARS to cyber incidents in health care. Journal of the American Medical Informatics Association 2019;26(1):81 View
  10. Karampela M, Ouhbi S, Isomursu M. Connected Health User Willingness to Share Personal Health Data: Questionnaire Study. Journal of Medical Internet Research 2019;21(11):e14537 View
  11. Jalali M, Kaiser J, Siegel M, Madnick S. The Internet of Things Promises New Benefits and Risks: A Systematic Analysis of Adoption Dynamics of IoT Products. IEEE Security & Privacy 2019;17(2):39 View
  12. Billingsley L. Cybersmart: Protect the Patient, Protect the Data. Journal of Radiology Nursing 2019;38(4):261 View
  13. Zerka F, Barakat S, Walsh S, Bogowicz M, Leijenaar R, Jochems A, Miraglio B, Townend D, Lambin P. Systematic Review of Privacy-Preserving Distributed Machine Learning From Federated Databases in Health Care. JCO Clinical Cancer Informatics 2020;(4):184 View
  14. Jalali M, Razak S, Gordon W, Perakslis E, Madnick S. Health Care and Cybersecurity: A Bibliometric Analysis of the Literature. SSRN Electronic Journal 2018 View
  15. Jalali M, Siegel M, Madnick S. Decision-making and biases in cybersecurity capability development: Evidence from a simulation game experiment. The Journal of Strategic Information Systems 2019;28(1):66 View
  16. Jalali M, Bruckes M, Westmattelmann D, Schewe G. Why Employees (Still) Click on Phishing Links: An Investigation in Hospitals. Journal of Medical Internet Research 2020;22(1):e16775 View
  17. Jalali M, Razak S, Gordon W, Perakslis E, Madnick S. Health Care and Cybersecurity: Bibliometric Analysis of the Literature. Journal of Medical Internet Research 2019;21(2):e12644 View
  18. de Gooyert V, Größler A. On the differences between theoretical and applied system dynamics modeling. System Dynamics Review 2018;34(4):575 View
  19. Alsubaei F, Abuhussein A, Shiva S. Ontology-Based Security Recommendation for the Internet of Medical Things. IEEE Access 2019;7:48948 View
  20. Le Bris A, Mazille-Orfanos N, Simonot P, Luherne M, Flamant C, Gascoin G, ÓLaighin G, Harte R, Pladys P. Parents’ and healthcare professionals’ perceptions of the use of live video recording in neonatal units: a focus group study. BMC Pediatrics 2020;20(1) View
  21. Yesmin T, Carter M. Evaluation framework for automatic privacy auditing tools for hospital data breach detections: A case study. International Journal of Medical Informatics 2020;138:104123 View
  22. Li P, Luo Y, Yu X, Wen J, Mason E, Li W, Jalali M. Patients’ Perceptions of Barriers and Facilitators to the Adoption of E-Hospitals: Cross-Sectional Study in Western China. Journal of Medical Internet Research 2020;22(6):e17221 View
  23. Li P, Luo Y, Yu X, Zeng Z, Jin W, Mason E, Li W, Jalali M. Readiness of Healthcare Providers for e-Hospitals: Cross-sectional Analysis in China. SSRN Electronic Journal 2020 View
  24. Ghafur S, Grass E, Jennings N, Darzi A. The challenges of cybersecurity in health care: the UK National Health Service as a case study. The Lancet Digital Health 2019;1(1):e10 View
  25. Rangabashyam M, Wee H, Wang W, Mueller S, Karim K, Skanthakumar T, Hariraman B, Sommat K, Soong Y, Chua M, Tay G, Tan N, Tan H, Iyer N. Electronic tumor board presentations as the basis for the development of a head and neck cancer database. Laryngoscope Investigative Otolaryngology 2020;5(1):46 View
  26. Tully J, Selzer J, Phillips J, O'Connor P, Dameff C. Healthcare Challenges in the Era of Cybersecurity. Health Security 2020;18(3):228 View
  27. Wani T, Mendoza A, Gray K. Hospital Bring-Your-Own-Device Security Challenges and Solutions: Systematic Review of Gray Literature. JMIR mHealth and uHealth 2020;8(6):e18175 View
  28. Singh B, Singh N. MoLaBSS: Server-Specific Add-On Biometric Security Layer Model to Enhance the Usage of Biometrics. Information 2020;11(6):308 View
  29. Cronin A, Carlile M, Dameff C, Coyne C, Castillo E. Leveraging Remote Research Associates During a Pandemic. Western Journal of Emergency Medicine 2020;21(5) View
  30. Gunasekeran D, Tham Y, Ting D, Tan G, Wong T. Digital health during COVID-19: lessons from operationalising new models of care in ophthalmology. The Lancet Digital Health 2021;3(2):e124 View
  31. O'Brien N, Martin G, Grass E, Durkin M, Darzi A, Ghafur S. Cybersecurity in Healthcare: Comparing Cybersecurity Maturity and Experiences Across Global Healthcare Organizations. SSRN Electronic Journal 2020 View
  32. He Y, Aliyu A, Evans M, Luo C. Health Care Cybersecurity Challenges and Solutions Under the Climate of COVID-19: Scoping Review. Journal of Medical Internet Research 2021;23(4):e21747 View
  33. Maggio L, Dameff C, Kanter S, Woods B, Tully J. Cybersecurity Challenges and the Academic Health Center: An Interactive Tabletop Simulation for Executives. Academic Medicine 2021;96(6):850 View
  34. Lambraki I, Majowicz S, Parmley E, Wernli D, Léger A, Graells T, Cousins M, Harbarth S, Carson C, Henriksson P, Troell M, Jørgensen P. Building Social-Ecological System Resilience to Tackle Antimicrobial Resistance Across the One Health Spectrum: Protocol for a Mixed Methods Study. JMIR Research Protocols 2021;10(6):e24378 View
  35. Ma X, Shi W. AESMOTE: Adversarial Reinforcement Learning With SMOTE for Anomaly Detection. IEEE Transactions on Network Science and Engineering 2021;8(2):943 View
  36. Jofre M, Navarro-Llobet D, Agulló R, Puig J, Gonzalez-Granadillo G, Mora Zamorano J, Romeu R. Cybersecurity and Privacy Risk Assessment of Point-of-Care Systems in Healthcare—A Use Case Approach. Applied Sciences 2021;11(15):6699 View
  37. Nifakos S, Chandramouli K, Nikolaou C, Papachristou P, Koch S, Panaousis E, Bonacina S. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review. Sensors 2021;21(15):5119 View
  38. Choi S, Johnson M. The relationship between cybersecurity ratings and the risk of hospital data breaches. Journal of the American Medical Informatics Association 2021;28(10):2085 View
  39. Dovleac R. Assessing the Level of Cybersecurity Knowledge of Computer Science and Applied Automation Undergraduates. WSEAS TRANSACTIONS ON ADVANCES in ENGINEERING EDUCATION 2022;19:127 View
  40. Ahouanmenou S, Van Looy A, Poels G. Information security and privacy in hospitals: a literature mapping and review of research gaps. Informatics for Health and Social Care 2023;48(1):30 View
  41. Baillette P, Barlette Y, Berthevas J. Benefits and Risks of Shadow IT in Health Care: A Narrative Review of the Literature. Systèmes d'information & management 2022;Volume 27(2):59 View
  42. Ritenour E. Hacking and Artificial Intelligence in Radiology: Basic Principles of Data Integrity and Security. Contemporary Diagnostic Radiology 2023;46(5):1 View
  43. He Y, Zamani E, Yevseyeva I, Luo C. Artificial Intelligence–Based Ethical Hacking for Health Information Systems: Simulation Study. Journal of Medical Internet Research 2023;25:e41748 View
  44. Tan T, Li Y, Lim J, Gunasekeran D, Teo Z, Ng W, Ting D. Metaverse and Virtual Health Care in Ophthalmology: Opportunities and Challenges. Asia-Pacific Journal of Ophthalmology 2022;11(3):237 View
  45. Prictor M, Rychkova M. Recording our genes: Stakeholder views on genetic test results in networked electronic medical records. Health Information Management Journal 2023;52(3):194 View
  46. Benis A, Grosjean J, Billey K, Montanha G, Dornauer V, Crișan-Vida M, Hackl W, Stoicu-Tivadar L, Darmoni S. Medical informatics and digital health multilingual ontology (MIMO): A tool to improve international collaborations. International Journal of Medical Informatics 2022;167:104860 View
  47. Alhuwail D, Al-Jafar E, Abdulsalam Y, AlDuaij S. Information Security Awareness and Behaviors of Health Care Professionals at Public Health Care Facilities. Applied Clinical Informatics 2021;12(04):924 View
  48. Beaulieu E, Spanjaart A, Roes A, Rachet B, Dalle S, Kersten M, Maucort-Boulch D, Jalali M. Health-related quality of life in cancer immunotherapy: a systematic perspective, using causal loop diagrams. Quality of Life Research 2022;31(8):2357 View
  49. Shrivastava U, Hazarika B, Rea A. Restoring clinical information system operations post data disaster: the role of IT investment, integration and interoperability. Industrial Management & Data Systems 2021;121(12):2672 View
  50. Zhou Q, Zuley M, Guo Y, Yang L, Nair B, Vargo A, Ghannam S, Arefan D, Wu S. A machine and human reader study on AI diagnosis model safety under attacks of adversarial images. Nature Communications 2021;12(1) View
  51. Mosch L, Poncette A, Spies C, Weber-Carstens S, Schieler M, Krampe H, Balzer F. Creation of an Evidence-Based Implementation Framework for Digital Health Technology in the Intensive Care Unit: Qualitative Study. JMIR Formative Research 2022;6(4):e22866 View
  52. Ahmed M, Sindi H, Nour M. Cybersecurity in Hospitals: An Evaluation Model. Journal of Cybersecurity and Privacy 2022;2(4):853 View
  53. Barbaria S, Mont M, Ghadafi E, Mahjoubi Machraoui H, Rahmouni H. Leveraging Patient Information Sharing Using Blockchain-Based Distributed Networks. IEEE Access 2022;10:106334 View
  54. Argyridou E, Nifakos S, Laoudias C, Panda S, Panaousis E, Chandramouli K, Navarro-Llobet D, Mora Zamorano J, Papachristou P, Bonacina S. Cyber Hygiene Methodology for Raising Cybersecurity and Data Privacy Awareness in Health Care Organizations: Concept Study. Journal of Medical Internet Research 2023;25:e41294 View
  55. Fernandez De Arroyabe I, Arranz C, Arroyabe M, Fernandez de Arroyabe J. Cybersecurity capabilities and cyber-attacks as drivers of investment in cybersecurity systems: A UK survey for 2018 and 2019. Computers & Security 2023;124:102954 View
  56. Lee I. An analysis of data breaches in the U.S. healthcare industry: diversity, trends, and risk profiling. Information Security Journal: A Global Perspective 2022;31(3):346 View
  57. Maheshwari A, Mantry H. Quantum Cryptography for Securing Personal Health Information in Hospitals. Newborn 2022;1(4):333 View
  58. Gioulekas F, Stamatiadis E, Tzikas A, Gounaris K, Georgiadou A, Michalitsi-Psarrou A, Doukas G, Kontoulis M, Nikoloudakis Y, Marin S, Cabecinha R, Ntanos C. A Cybersecurity Culture Survey Targeting Healthcare Critical Infrastructures. Healthcare 2022;10(2):327 View
  59. Javaid M, Haleem A, Singh R, Suman R. Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends. Cyber Security and Applications 2023;1:100016 View
  60. Puder A, Henle J, Sax E. Threat Assessment and Risk Analysis (TARA) for Interoperable Medical Devices in the Operating Room Inspired by the Automotive Industry. Healthcare 2023;11(6):872 View
  61. Russell S, Fahey E, Curtin M, Rowley S, Kenny P, Cashman J. The Irish National Orthopaedic Register Under Cyberattack: What Happened, and What Were the Consequences?. Clinical Orthopaedics & Related Research 2023;481(9):1763 View
  62. Giovannoni G, Alvarez E, Tutton E, Hoffmann O, Xu Y, Vermersch P, Oreja-Guevara C, Trojano M, Gold R, Robles-Cedeño R, Khwaja M, Stadler B, Vandercappellen J, Ziemssen T. Development and usability testing of your MS questionnaire: A patient-based digital tool to monitor symptoms of multiple sclerosis. DIGITAL HEALTH 2023;9:205520762311735 View
  63. Portela D, Nogueira-Leite D, Almeida R, Cruz-Correia R. Economic Impact of a Hospital Cyberattack in a National Health System: Descriptive Case Study. JMIR Formative Research 2023;7:e41738 View
  64. Kulkov I, Ivanova-Gongne M, Bertello A, Makkonen H, Kulkova J, Rohrbeck R, Ferraris A. Technology entrepreneurship in healthcare: Challenges and opportunities for value creation. Journal of Innovation & Knowledge 2023;8(2):100365 View
  65. Ashiwaju B, Orikpete O, Uzougbo C. The intersection of artificial intelligence and big data in drug discovery: A review of current trends and future implications. Matrix Science Pharma 2023;7(2):36 View
  66. Jerry-Egemba N. Safe and sound: Strengthening cybersecurity in healthcare through robust staff educational programs. Healthcare Management Forum 2024;37(1):21 View
  67. Jalali M, Beaulieu E. Strengthening a weak link: transparency of causal loop diagrams — current state and recommendations. System Dynamics Review 2023 View
  68. Fernandez de Arroyabe J, Arroyabe M, Fernandez I, Arranz C. Cybersecurity Resilience in SMEs. A Machine Learning Approach. Journal of Computer Information Systems 2023:1 View
  69. Choi S, Chen M, Tan X. Assessing the impact of health information exchange on hospital data breach risk. International Journal of Medical Informatics 2023;177:105149 View
  70. Haque M, Ahmad S, John A, Mishra K, Mishra B, Kumar K, Nazeer J. Cybersecurity in Universities: An Evaluation Model. SN Computer Science 2023;4(5) View
  71. Kim E, Van Cain M, Hron J. Survey of clinical informatics fellows graduating 2016–2024: experiences before and during fellowship. Journal of the American Medical Informatics Association 2023;30(10):1608 View
  72. Czekster R, Grace P, Marcon C, Hessel F, Cazella S. Challenges and Opportunities for Conducting Dynamic Risk Assessments in Medical IoT. Applied Sciences 2023;13(13):7406 View
  73. Dart M, Ahmed M. CYBER-AIDD: A novel approach to implementing improved cyber security resilience for large Australian healthcare providers using a Unified Modelling Language ontology. DIGITAL HEALTH 2023;9 View
  74. Arafa A, Sheerah H, Alsalamah S. Emerging Digital Technologies in Healthcare with a Spotlight on Cybersecurity: A Narrative Review. Information 2023;14(12):640 View
  75. Chingombe R. Impact of Risk Attributes on Vendor Risk Assessment and Classification. SSRN Electronic Journal 2023 View
  76. Pigola A, Da Costa P, Ferasso M, Cavalcanti da Silva L. Enhancing cybersecurity capability investments: Evidence from an experiment. Technology in Society 2024;76:102449 View
  77. Jalali M, Beaulieu E. Strengthening a Weak Link: Transparency of Qualitative Modeling Tools. SSRN Electronic Journal 2022 View
  78. AllahRakha N. Rethinking Digital Borders to Address Jurisdiction and Governance in the Global Digital Economy. International Journal of Law and Policy 2024;2(1) View
  79. Rashid H, Rabia K, Rajesh T, Manoj K. Enhancing cyber security in health care industry by using ISO 27001 accreditation. i-manager's Journal on Digital Forensics & Cyber Security 2023;1(2):26 View
  80. Ewoh P, Vartiainen T. Vulnerability to Cyberattacks and Sociotechnical Solutions for Health Care Systems: Systematic Review. Journal of Medical Internet Research 2024;26:e46904 View
  81. Rajamäki J, Jarzemski D, Kucera J, Nyman V, Pura I, Virtanen J, Herlevi M, Karlsson L. Implications of GDPR and NIS2 for Cyber Threat Intelligence Exchange in Hospitals. WSEAS TRANSACTIONS ON COMPUTERS 2024;23:1 View
  82. Sabet C, Lin J, Zhong A, Nguyen D. Cybersecurity in the age of digital pandemics: protecting patient data in low-income and middle-income countries. The Lancet Global Health 2024;12(6):e911 View
  83. Borkar S, Chakole S, Prasad R, Bansod S. Revolutionizing Oncology: A Comprehensive Review of Digital Health Applications. Cureus 2024 View
  84. Song J, Park M. A system dynamics approach for cost-benefit simulation in designing policies to enhance the cybersecurity resilience of small and medium-sized enterprises. Information Development 2024 View
  85. Burke W, Stranieri A, Oseni T, Gondal I. The need for cybersecurity self-evaluation in healthcare. BMC Medical Informatics and Decision Making 2024;24(1) View
  86. Al-Momani A, Ramayah T, Al-Sharafi M. Exploring the impact of cybersecurity on using electronic health records and their performance among healthcare professionals: A multi-analytical SEM-ANN approach. Technology in Society 2024;77:102592 View

Books/Policy Documents

  1. Lelis C, de Oliveira Filho S, Marcondes C. 17th International Conference on Information Technology–New Generations (ITNG 2020). View
  2. Alsubaei F, Abuhussein A, Shiva S. Proceedings of the Future Technologies Conference (FTC) 2018. View
  3. Sagay A, Jahankhani H. Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity. View
  4. Reichman B, Jing L, Akin O, Tian Y. Pattern Recognition. ICPR International Workshops and Challenges. View
  5. Arun Kumar B. Computer Networks and Inventive Communication Technologies. View
  6. Jara H, Navarro H, Armas-Aguirre J. Proceedings of the 6th Brazilian Technology Symposium (BTSym’20). View
  7. Medhekar A. Handbook of Research on Advancing Cybersecurity for Digital Transformation. View
  8. Parlakkılıç A. Blockchain Technologies and Applications for Digital Governance. View
  9. Medhekar A. Research Anthology on Securing Medical Systems and Records. View
  10. McConomy B, Leber D. Clinical Informatics Study Guide. View
  11. Hamid O, Abduljabbar R, Dawood A, Naghmash M, Alhyani N. Proceedings of the 2nd International Conference on Emerging Technologies and Intelligent Systems. View
  12. Jayapradha J, Prakash M. Sustainable Advanced Computing. View
  13. Quimiz-Moreira M, Zambrano-Romero W, Moreira-Zambrano C, Mendoza-Zambrano M, Cedeño-Palma E. Trends in Artificial Intelligence and Computer Engineering. View
  14. Kaberuka J, Johnson C. Intelligent Sustainable Systems. View
  15. Mwim E, Mtsweni J. Human Aspects of Information Security and Assurance. View
  16. Kure H, Nwajana A. 5G Internet of Things and Changing Standards for Computing and Electronic Systems. View
  17. Richardson K, Burrell D, Mingo H, Ferreras-Perez J, Shen P, Muller S, Bessette D, Khanta K. Handbook of Research on Cybersecurity Risk in Contemporary Business Systems. View
  18. Kushnikova E, Petrov V, Rezchikov A, Kusheleva E, Bogomolov A, Dranko O. Artificial Intelligence in Models, Methods and Applications. View
  19. Ferreira D, Mateus-Coelho N. Exploring Cyber Criminals and Data Privacy Measures. View
  20. Köbe P. Handbuch Digitale Gesundheitswirtschaft. View
  21. Tariq M. Transformative Approaches to Patient Literacy and Healthcare Innovation. View
  22. Ahouanmenou S. Research Challenges in Information Science. View
  23. Mukherjee S, Pal A, Mishra S. Securing Next-Generation Connected Healthcare Systems. View
  24. Tolsdorf J, Lo Iacono L. HCI for Cybersecurity, Privacy and Trust. View