Published on in Vol 20, No 5 (2018): May
Preprints (earlier versions) of this paper are
available at
https://preprints.jmir.org/preprint/10059, first published
.
Journals
- Ghafur S, Kristensen S, Honeyford K, Martin G, Darzi A, Aylin P. A retrospective impact analysis of the WannaCry cyberattack on the NHS. npj Digital Medicine 2019;2(1) View
- Darabi N, Hosseinichimeh N. System dynamics modeling in health and medicine: a systematic literature review. System Dynamics Review 2020;36(1):29 View
- Jalali M, Bruckes M, Westmattelmann D, Schewe G. Why Employees (Still) Click on Phishing Links: An Investigation in Hospitals. SSRN Electronic Journal 2019 View
- Mishah N, Bukhari A, AlMutairi B, Mohreq M. Status of e-security and privacy protection in Saudi hospitals. Computer Methods and Programs in Biomedicine 2019;171:5 View
- Barad M. Linking Cyber Security Improvement Actions in Healthcare Systems to Their Strategic Improvement Needs. Procedia Manufacturing 2019;39:279 View
- Gordon W, Wright A, Aiyagari R, Corbo L, Glynn R, Kadakia J, Kufahl J, Mazzone C, Noga J, Parkulo M, Sanford B, Scheib P, Landman A. Assessment of Employee Susceptibility to Phishing Attacks at US Health Care Institutions. JAMA Network Open 2019;2(3):e190393 View
- Jalali M, Siegel M, Madnick S. Decision Making and Biases in Cybersecurity Capability Development: Evidence from a Simulation Game Experiment. SSRN Electronic Journal 2017 View
- Offner K, Sitnikova E, Joiner K, MacIntyre C. Towards understanding cybersecurity capability in Australian healthcare organisations: a systematic review of recent trends, threats and mitigation. Intelligence and National Security 2020;35(4):556 View
- Jalali M, Russell B, Razak S, Gordon W. EARS to cyber incidents in health care. Journal of the American Medical Informatics Association 2019;26(1):81 View
- Karampela M, Ouhbi S, Isomursu M. Connected Health User Willingness to Share Personal Health Data: Questionnaire Study. Journal of Medical Internet Research 2019;21(11):e14537 View
- Jalali M, Kaiser J, Siegel M, Madnick S. The Internet of Things Promises New Benefits and Risks: A Systematic Analysis of Adoption Dynamics of IoT Products. IEEE Security & Privacy 2019;17(2):39 View
- Billingsley L. Cybersmart: Protect the Patient, Protect the Data. Journal of Radiology Nursing 2019;38(4):261 View
- Zerka F, Barakat S, Walsh S, Bogowicz M, Leijenaar R, Jochems A, Miraglio B, Townend D, Lambin P. Systematic Review of Privacy-Preserving Distributed Machine Learning From Federated Databases in Health Care. JCO Clinical Cancer Informatics 2020;(4):184 View
- Jalali M, Razak S, Gordon W, Perakslis E, Madnick S. Health Care and Cybersecurity: A Bibliometric Analysis of the Literature. SSRN Electronic Journal 2018 View
- Jalali M, Siegel M, Madnick S. Decision-making and biases in cybersecurity capability development: Evidence from a simulation game experiment. The Journal of Strategic Information Systems 2019;28(1):66 View
- Jalali M, Bruckes M, Westmattelmann D, Schewe G. Why Employees (Still) Click on Phishing Links: An Investigation in Hospitals. Journal of Medical Internet Research 2020;22(1):e16775 View
- Jalali M, Razak S, Gordon W, Perakslis E, Madnick S. Health Care and Cybersecurity: Bibliometric Analysis of the Literature. Journal of Medical Internet Research 2019;21(2):e12644 View
- de Gooyert V, Größler A. On the differences between theoretical and applied system dynamics modeling. System Dynamics Review 2018;34(4):575 View
- Alsubaei F, Abuhussein A, Shiva S. Ontology-Based Security Recommendation for the Internet of Medical Things. IEEE Access 2019;7:48948 View
- Le Bris A, Mazille-Orfanos N, Simonot P, Luherne M, Flamant C, Gascoin G, ÓLaighin G, Harte R, Pladys P. Parents’ and healthcare professionals’ perceptions of the use of live video recording in neonatal units: a focus group study. BMC Pediatrics 2020;20(1) View
- Yesmin T, Carter M. Evaluation framework for automatic privacy auditing tools for hospital data breach detections: A case study. International Journal of Medical Informatics 2020;138:104123 View
- Li P, Luo Y, Yu X, Wen J, Mason E, Li W, Jalali M. Patients’ Perceptions of Barriers and Facilitators to the Adoption of E-Hospitals: Cross-Sectional Study in Western China. Journal of Medical Internet Research 2020;22(6):e17221 View
- Li P, Luo Y, Yu X, Zeng Z, Jin W, Mason E, Li W, Jalali M. Readiness of Healthcare Providers for e-Hospitals: Cross-sectional Analysis in China. SSRN Electronic Journal 2020 View
- Ghafur S, Grass E, Jennings N, Darzi A. The challenges of cybersecurity in health care: the UK National Health Service as a case study. The Lancet Digital Health 2019;1(1):e10 View
- Rangabashyam M, Wee H, Wang W, Mueller S, Karim K, Skanthakumar T, Hariraman B, Sommat K, Soong Y, Chua M, Tay G, Tan N, Tan H, Iyer N. Electronic tumor board presentations as the basis for the development of a head and neck cancer database. Laryngoscope Investigative Otolaryngology 2020;5(1):46 View
- Tully J, Selzer J, Phillips J, O'Connor P, Dameff C. Healthcare Challenges in the Era of Cybersecurity. Health Security 2020;18(3):228 View
- Wani T, Mendoza A, Gray K. Hospital Bring-Your-Own-Device Security Challenges and Solutions: Systematic Review of Gray Literature. JMIR mHealth and uHealth 2020;8(6):e18175 View
- Singh B, Singh N. MoLaBSS: Server-Specific Add-On Biometric Security Layer Model to Enhance the Usage of Biometrics. Information 2020;11(6):308 View
- Cronin A, Carlile M, Dameff C, Coyne C, Castillo E. Leveraging Remote Research Associates During a Pandemic. Western Journal of Emergency Medicine 2020;21(5) View
- Gunasekeran D, Tham Y, Ting D, Tan G, Wong T. Digital health during COVID-19: lessons from operationalising new models of care in ophthalmology. The Lancet Digital Health 2021;3(2):e124 View
- O'Brien N, Martin G, Grass E, Durkin M, Darzi A, Ghafur S. Cybersecurity in Healthcare: Comparing Cybersecurity Maturity and Experiences Across Global Healthcare Organizations. SSRN Electronic Journal 2020 View
- He Y, Aliyu A, Evans M, Luo C. Health Care Cybersecurity Challenges and Solutions Under the Climate of COVID-19: Scoping Review. Journal of Medical Internet Research 2021;23(4):e21747 View
- Maggio L, Dameff C, Kanter S, Woods B, Tully J. Cybersecurity Challenges and the Academic Health Center: An Interactive Tabletop Simulation for Executives. Academic Medicine 2021;96(6):850 View
- Lambraki I, Majowicz S, Parmley E, Wernli D, Léger A, Graells T, Cousins M, Harbarth S, Carson C, Henriksson P, Troell M, Jørgensen P. Building Social-Ecological System Resilience to Tackle Antimicrobial Resistance Across the One Health Spectrum: Protocol for a Mixed Methods Study. JMIR Research Protocols 2021;10(6):e24378 View
- Ma X, Shi W. AESMOTE: Adversarial Reinforcement Learning With SMOTE for Anomaly Detection. IEEE Transactions on Network Science and Engineering 2021;8(2):943 View
- Jofre M, Navarro-Llobet D, Agulló R, Puig J, Gonzalez-Granadillo G, Mora Zamorano J, Romeu R. Cybersecurity and Privacy Risk Assessment of Point-of-Care Systems in Healthcare—A Use Case Approach. Applied Sciences 2021;11(15):6699 View
- Nifakos S, Chandramouli K, Nikolaou C, Papachristou P, Koch S, Panaousis E, Bonacina S. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review. Sensors 2021;21(15):5119 View
- Choi S, Johnson M. The relationship between cybersecurity ratings and the risk of hospital data breaches. Journal of the American Medical Informatics Association 2021;28(10):2085 View
- Dovleac R. Assessing the Level of Cybersecurity Knowledge of Computer Science and Applied Automation Undergraduates. WSEAS TRANSACTIONS ON ADVANCES in ENGINEERING EDUCATION 2022;19:127 View
- Ahouanmenou S, Van Looy A, Poels G. Information security and privacy in hospitals: a literature mapping and review of research gaps. Informatics for Health and Social Care 2023;48(1):30 View
- Baillette P, Barlette Y, Berthevas J. Benefits and Risks of Shadow IT in Health Care: A Narrative Review of the Literature. Systèmes d'information & management 2022;Volume 27(2):59 View
- Ritenour E. Hacking and Artificial Intelligence in Radiology: Basic Principles of Data Integrity and Security. Contemporary Diagnostic Radiology 2023;46(5):1 View
- He Y, Zamani E, Yevseyeva I, Luo C. Artificial Intelligence–Based Ethical Hacking for Health Information Systems: Simulation Study. Journal of Medical Internet Research 2023;25:e41748 View
- Tan T, Li Y, Lim J, Gunasekeran D, Teo Z, Ng W, Ting D. Metaverse and Virtual Health Care in Ophthalmology: Opportunities and Challenges. Asia-Pacific Journal of Ophthalmology 2022;11(3):237 View
- Prictor M, Rychkova M. Recording our genes: Stakeholder views on genetic test results in networked electronic medical records. Health Information Management Journal 2023;52(3):194 View
- Benis A, Grosjean J, Billey K, Montanha G, Dornauer V, Crișan-Vida M, Hackl W, Stoicu-Tivadar L, Darmoni S. Medical informatics and digital health multilingual ontology (MIMO): A tool to improve international collaborations. International Journal of Medical Informatics 2022;167:104860 View
- Alhuwail D, Al-Jafar E, Abdulsalam Y, AlDuaij S. Information Security Awareness and Behaviors of Health Care Professionals at Public Health Care Facilities. Applied Clinical Informatics 2021;12(04):924 View
- Beaulieu E, Spanjaart A, Roes A, Rachet B, Dalle S, Kersten M, Maucort-Boulch D, Jalali M. Health-related quality of life in cancer immunotherapy: a systematic perspective, using causal loop diagrams. Quality of Life Research 2022;31(8):2357 View
- Shrivastava U, Hazarika B, Rea A. Restoring clinical information system operations post data disaster: the role of IT investment, integration and interoperability. Industrial Management & Data Systems 2021;121(12):2672 View
- Zhou Q, Zuley M, Guo Y, Yang L, Nair B, Vargo A, Ghannam S, Arefan D, Wu S. A machine and human reader study on AI diagnosis model safety under attacks of adversarial images. Nature Communications 2021;12(1) View
- Mosch L, Poncette A, Spies C, Weber-Carstens S, Schieler M, Krampe H, Balzer F. Creation of an Evidence-Based Implementation Framework for Digital Health Technology in the Intensive Care Unit: Qualitative Study. JMIR Formative Research 2022;6(4):e22866 View
- Ahmed M, Sindi H, Nour M. Cybersecurity in Hospitals: An Evaluation Model. Journal of Cybersecurity and Privacy 2022;2(4):853 View
- Barbaria S, Mont M, Ghadafi E, Mahjoubi Machraoui H, Rahmouni H. Leveraging Patient Information Sharing Using Blockchain-Based Distributed Networks. IEEE Access 2022;10:106334 View
- Argyridou E, Nifakos S, Laoudias C, Panda S, Panaousis E, Chandramouli K, Navarro-Llobet D, Mora Zamorano J, Papachristou P, Bonacina S. Cyber Hygiene Methodology for Raising Cybersecurity and Data Privacy Awareness in Health Care Organizations: Concept Study. Journal of Medical Internet Research 2023;25:e41294 View
- Fernandez De Arroyabe I, Arranz C, Arroyabe M, Fernandez de Arroyabe J. Cybersecurity capabilities and cyber-attacks as drivers of investment in cybersecurity systems: A UK survey for 2018 and 2019. Computers & Security 2023;124:102954 View
- Lee I. An analysis of data breaches in the U.S. healthcare industry: diversity, trends, and risk profiling. Information Security Journal: A Global Perspective 2022;31(3):346 View
- Maheshwari A, Mantry H. Quantum Cryptography for Securing Personal Health Information in Hospitals. Newborn 2022;1(4):333 View
- Gioulekas F, Stamatiadis E, Tzikas A, Gounaris K, Georgiadou A, Michalitsi-Psarrou A, Doukas G, Kontoulis M, Nikoloudakis Y, Marin S, Cabecinha R, Ntanos C. A Cybersecurity Culture Survey Targeting Healthcare Critical Infrastructures. Healthcare 2022;10(2):327 View
- Javaid M, Haleem A, Singh R, Suman R. Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends. Cyber Security and Applications 2023;1:100016 View
- Puder A, Henle J, Sax E. Threat Assessment and Risk Analysis (TARA) for Interoperable Medical Devices in the Operating Room Inspired by the Automotive Industry. Healthcare 2023;11(6):872 View
- Russell S, Fahey E, Curtin M, Rowley S, Kenny P, Cashman J. The Irish National Orthopaedic Register Under Cyberattack: What Happened, and What Were the Consequences?. Clinical Orthopaedics & Related Research 2023;481(9):1763 View
- Giovannoni G, Alvarez E, Tutton E, Hoffmann O, Xu Y, Vermersch P, Oreja-Guevara C, Trojano M, Gold R, Robles-Cedeño R, Khwaja M, Stadler B, Vandercappellen J, Ziemssen T. Development and usability testing of your MS questionnaire: A patient-based digital tool to monitor symptoms of multiple sclerosis. DIGITAL HEALTH 2023;9 View
- Portela D, Nogueira-Leite D, Almeida R, Cruz-Correia R. Economic Impact of a Hospital Cyberattack in a National Health System: Descriptive Case Study. JMIR Formative Research 2023;7:e41738 View
- Kulkov I, Ivanova-Gongne M, Bertello A, Makkonen H, Kulkova J, Rohrbeck R, Ferraris A. Technology entrepreneurship in healthcare: Challenges and opportunities for value creation. Journal of Innovation & Knowledge 2023;8(2):100365 View
- Ashiwaju B, Orikpete O, Uzougbo C. The Intersection of Artificial Intelligence and Big Data in Drug Discovery: A Review of Current Trends and Future Implications. Matrix Science Pharma 2023;7(2):36 View
- Jerry-Egemba N. Safe and sound: Strengthening cybersecurity in healthcare through robust staff educational programs. Healthcare Management Forum 2024;37(1):21 View
- Jalali M, Beaulieu E. Strengthening a weak link: transparency of causal loop diagrams — current state and recommendations. System Dynamics Review 2023 View
- Fernandez de Arroyabe J, Arroyabe M, Fernandez I, Arranz C. Cybersecurity Resilience in SMEs. A Machine Learning Approach. Journal of Computer Information Systems 2024;64(6):711 View
- Choi S, Chen M, Tan X. Assessing the impact of health information exchange on hospital data breach risk. International Journal of Medical Informatics 2023;177:105149 View
- Haque M, Ahmad S, John A, Mishra K, Mishra B, Kumar K, Nazeer J. Cybersecurity in Universities: An Evaluation Model. SN Computer Science 2023;4(5) View
- Kim E, Van Cain M, Hron J. Survey of clinical informatics fellows graduating 2016–2024: experiences before and during fellowship. Journal of the American Medical Informatics Association 2023;30(10):1608 View
- Czekster R, Grace P, Marcon C, Hessel F, Cazella S. Challenges and Opportunities for Conducting Dynamic Risk Assessments in Medical IoT. Applied Sciences 2023;13(13):7406 View
- Dart M, Ahmed M. CYBER-AIDD: A novel approach to implementing improved cyber security resilience for large Australian healthcare providers using a Unified Modelling Language ontology. DIGITAL HEALTH 2023;9 View
- Arafa A, Sheerah H, Alsalamah S. Emerging Digital Technologies in Healthcare with a Spotlight on Cybersecurity: A Narrative Review. Information 2023;14(12):640 View
- Chingombe R. Impact of Risk Attributes on Vendor Risk Assessment and Classification. SSRN Electronic Journal 2023 View
- Pigola A, Da Costa P, Ferasso M, Cavalcanti da Silva L. Enhancing cybersecurity capability investments: Evidence from an experiment. Technology in Society 2024;76:102449 View
- Jalali M, Beaulieu E. Strengthening a Weak Link: Transparency of Qualitative Modeling Tools. SSRN Electronic Journal 2022 View
- AllahRakha N. Rethinking Digital Borders to Address Jurisdiction and Governance in the Global Digital Economy. International Journal of Law and Policy 2024;2(1) View
- Rashid H, Rabia K, Rajesh T, Manoj K. Enhancing cyber security in health care industry by using ISO 27001 accreditation. i-manager's Journal on Digital Forensics & Cyber Security 2023;1(2):26 View
- Ewoh P, Vartiainen T. Vulnerability to Cyberattacks and Sociotechnical Solutions for Health Care Systems: Systematic Review. Journal of Medical Internet Research 2024;26:e46904 View
- Rajamäki J, Jarzemski D, Kucera J, Nyman V, Pura I, Virtanen J, Herlevi M, Karlsson L. Implications of GDPR and NIS2 for Cyber Threat Intelligence Exchange in Hospitals. WSEAS TRANSACTIONS ON COMPUTERS 2024;23:1 View
- Sabet C, Lin J, Zhong A, Nguyen D. Cybersecurity in the age of digital pandemics: protecting patient data in low-income and middle-income countries. The Lancet Global Health 2024;12(6):e911 View
- Borkar S, Chakole S, Prasad R, Bansod S. Revolutionizing Oncology: A Comprehensive Review of Digital Health Applications. Cureus 2024 View
- Song J, Park M. A system dynamics approach for cost-benefit simulation in designing policies to enhance the cybersecurity resilience of small and medium-sized enterprises. Information Development 2024 View
- Burke W, Stranieri A, Oseni T, Gondal I. The need for cybersecurity self-evaluation in healthcare. BMC Medical Informatics and Decision Making 2024;24(1) View
- Al-Momani A, Ramayah T, Al-Sharafi M. Exploring the impact of cybersecurity on using electronic health records and their performance among healthcare professionals: A multi-analytical SEM-ANN approach. Technology in Society 2024;77:102592 View
- Rajamäki J. Digital twin technology training and research in health higher education: a review. Exploration of Digital Health Technologies 2024:188 View
- Neri M, Benevento E, Stefanini A, Aloini D, Niccolini F, Carducci A, Federigi I, Dini G. Understanding information security awareness: evidence from the public healthcare sector. Information & Computer Security 2024 View
- Elendu C, Omeludike E, Oloyede P, Obidigbo B, Omeludike J. Legal implications for clinicians in cybersecurity incidents: A review. Medicine 2024;103(39):e39887 View
- Ognjanović I, Zoulias E, Mantas J. Progress Achieved, Landmarks, and Future Concerns in Biomedical and Health Informatics. Healthcare 2024;12(20):2041 View
- Jayaraj I, Shanmugam B, Azam S, Thennadil S. Detecting and Localizing Wireless Spoofing Attacks on the Internet of Medical Things. Journal of Sensor and Actuator Networks 2024;13(6):72 View
Books/Policy Documents
- Lelis C, de Oliveira Filho S, Marcondes C. 17th International Conference on Information Technology–New Generations (ITNG 2020). View
- Alsubaei F, Abuhussein A, Shiva S. Proceedings of the Future Technologies Conference (FTC) 2018. View
- Sagay A, Jahankhani H. Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity. View
- Reichman B, Jing L, Akin O, Tian Y. Pattern Recognition. ICPR International Workshops and Challenges. View
- Arun Kumar B. Computer Networks and Inventive Communication Technologies. View
- Jara H, Navarro H, Armas-Aguirre J. Proceedings of the 6th Brazilian Technology Symposium (BTSym’20). View
- Medhekar A. Handbook of Research on Advancing Cybersecurity for Digital Transformation. View
- Parlakkılıç A. Blockchain Technologies and Applications for Digital Governance. View
- Medhekar A. Research Anthology on Securing Medical Systems and Records. View
- McConomy B, Leber D. Clinical Informatics Study Guide. View
- Hamid O, Abduljabbar R, Dawood A, Naghmash M, Alhyani N. Proceedings of the 2nd International Conference on Emerging Technologies and Intelligent Systems. View
- Jayapradha J, Prakash M. Sustainable Advanced Computing. View
- Quimiz-Moreira M, Zambrano-Romero W, Moreira-Zambrano C, Mendoza-Zambrano M, Cedeño-Palma E. Trends in Artificial Intelligence and Computer Engineering. View
- Kaberuka J, Johnson C. Intelligent Sustainable Systems. View
- Mwim E, Mtsweni J. Human Aspects of Information Security and Assurance. View
- Kure H, Nwajana A. 5G Internet of Things and Changing Standards for Computing and Electronic Systems. View
- Richardson K, Burrell D, Mingo H, Ferreras-Perez J, Shen P, Muller S, Bessette D, Khanta K. Handbook of Research on Cybersecurity Risk in Contemporary Business Systems. View
- Kushnikova E, Petrov V, Rezchikov A, Kusheleva E, Bogomolov A, Dranko O. Artificial Intelligence in Models, Methods and Applications. View
- Ferreira D, Mateus-Coelho N. Exploring Cyber Criminals and Data Privacy Measures. View
- Köbe P. Handbuch Digitale Gesundheitswirtschaft. View
- Tariq M. Transformative Approaches to Patient Literacy and Healthcare Innovation. View
- Ahouanmenou S. Research Challenges in Information Science. View
- Mukherjee S, Pal A, Mishra S. Securing Next-Generation Connected Healthcare Systems. View
- Tolsdorf J, Lo Iacono L. HCI for Cybersecurity, Privacy and Trust. View
- Kaberuka J. Proceedings of Ninth International Congress on Information and Communication Technology. View
- Udayai K, D. P. V, Kumar P, Manjunath U. Healthcare Administration and Managerial Training in the 21st Century. View
- Sharma D, Habibi Lashkari A, Parizadeh M. Understanding Cybersecurity Management in Healthcare. View