Published on in Vol 21, No 2 (2019): February
Preprints (earlier versions) of this paper are
available at
https://preprints.jmir.org/preprint/12644, first published
.
Journals
- Martignani C. Cybersecurity in cardiac implantable electronic devices. Expert Review of Medical Devices 2019;16(6):437 View
- Marquez G, Astudillo H, Taramasco C. Security in Telehealth Systems From a Software Engineering Viewpoint: A Systematic Mapping Study. IEEE Access 2020;8:10933 View
- Razaque A, Amsaad F, Jaro Khan M, Hariri S, Chen S, Siting C, Ji X. Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain. IEEE Access 2019;7:168774 View
- Bhuyan S, Kabir U, Escareno J, Ector K, Palakodeti S, Wyant D, Kumar S, Levy M, Kedia S, Dasgupta D, Dobalian A. Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations. Journal of Medical Systems 2020;44(5) View
- Jalali M, Bruckes M, Westmattelmann D, Schewe G. Why Employees (Still) Click on Phishing Links: An Investigation in Hospitals. Journal of Medical Internet Research 2020;22(1):e16775 View
- Johansson D, Jönsson P, Ivarsson B, Christiansson M. Information Technology and Medical Technology Personnel´s Perception Regarding Segmentation of Medical Devices: A Focus Group Study. Healthcare 2020;8(1):23 View
- Li P, Luo Y, Yu X, Wen J, Mason E, Li W, Jalali M. Patients’ Perceptions of Barriers and Facilitators to the Adoption of E-Hospitals: Cross-Sectional Study in Western China. Journal of Medical Internet Research 2020;22(6):e17221 View
- Jalali M, Russell B, Razak S, Gordon W. EARS to cyber incidents in health care. Journal of the American Medical Informatics Association 2019;26(1):81 View
- T. Alanazi S, Anbar M, A. Ebad S, Karuppayah S, Al-Ani H. Theory-Based Model and Prediction Analysis of Information Security Compliance Behavior in the Saudi Healthcare Sector. Symmetry 2020;12(9):1544 View
- Li P, Luo Y, Yu X, Zeng Z, Jin W, Mason E, Li W, Jalali M. Readiness of Healthcare Providers for e-Hospitals: Cross-sectional Analysis in China. SSRN Electronic Journal 2020 View
- Romare C, Skär L. Smart Glasses for Caring Situations in Complex Care Environments: Scoping Review. JMIR mHealth and uHealth 2020;8(4):e16055 View
- Kang H, Han J, Kwon G. Determining the Intellectual Structure and Academic Trends of Smart Home Health Care Research: Coword and Topic Analyses. Journal of Medical Internet Research 2021;23(1):e19625 View
- Kulakli A, Shubina I. Scientific Publication Patterns of Mobile Technologies and Apps for Posttraumatic Stress Disorder Treatment: Bibliometric Co-Word Analysis. JMIR mHealth and uHealth 2020;8(11):e19391 View
- Spinazze P, Aardoom J, Chavannes N, Kasteleyn M. The Computer Will See You Now: Overcoming Barriers to Adoption of Computer-Assisted History Taking (CAHT) in Primary Care. Journal of Medical Internet Research 2021;23(2):e19306 View
- Dhawan S, Gupta B, Elango B. Global Cyber Security Research Output (1998–2019): A Scientometric Analysis. Science & Technology Libraries 2021;40(2):172 View
- Eichelberg M, Kleber K, Kämmerer M. Cybersecurity in PACS and Medical Imaging: an Overview. Journal of Digital Imaging 2020;33(6):1527 View
- Moosavi J, Naeni L, Fathollahi-Fard A, Fiore U. Blockchain in supply chain management: a review, bibliometric, and network analysis. Environmental Science and Pollution Research 2021 View
- Aktürk C. Bibliometric Analysis of Clinical Decision Support Systems. Acta Informatica Pragensia 2021;10(1):61 View
- AKIN M. Sağlık Turizmi Alanyazının Bibliyometrik Analizi (2015-2020). MANAS Sosyal Araştırmalar Dergisi 2021;10(3):2026 View
- Loan F, Bisma B, Nahida N. Global research productivity in cybersecurity: a scientometric study. Global Knowledge, Memory and Communication 2022;71(4/5):342 View
- Srinivasan K, Rathee G, Raja M, Jaglan N, Mahendiran T, Palaniswamy T. Secure multimedia data processing scheme in medical applications. Multimedia Tools and Applications 2022;81(7):9079 View
- Xiong P, Buffett S, Iqbal S, Lamontagne P, Mamun M, Molyneaux H. Towards a robust and trustworthy machine learning system development: An engineering perspective. Journal of Information Security and Applications 2022;65:103121 View
- Poleto T, Carvalho V, Silva A, Clemente T, Silva M, Gusmão A, Costa A, Nepomuceno T. Fuzzy Cognitive Scenario Mapping for Causes of Cybersecurity in Telehealth Services. Healthcare 2021;9(11):1504 View
- Epizitone A, Moyane S, Agbehadji I. Health Information System and Health Care Applications Performance in the Healthcare Arena: A Bibliometric Analysis. Healthcare 2022;10(11):2273 View
- A. Alzahrani F. Estimating Security Risk of Healthcare Web Applications: A Design Perspective. Computers, Materials & Continua 2021;67(1):187 View
- Alyami H, Nadeem M, Alharbi A, Alosaimi W, Ansari M, Pandey D, Kumar R, Khan R. The Evaluation of Software Security through Quantum Computing Techniques: A Durability Perspective. Applied Sciences 2021;11(24):11784 View
- Shubina I. Scientific Publication Patterns of Systematic Reviews on Psychosocial Interventions Improving Well-being: Bibliometric Analysis. Interactive Journal of Medical Research 2022;11(2):e41456 View
- Wasserman L, Wasserman Y. Hospital cybersecurity risks and gaps: Review (for the non-cyber professional). Frontiers in Digital Health 2022;4 View
- Dastani M, Danesh F, Nazir S. Iranian COVID-19 Publications in LitCovid: Text Mining and Topic Modeling. Scientific Programming 2021;2021:1 View
- Chen X, Cheng G, Wang F, Tao X, Xie H, Xu L. Machine and cognitive intelligence for human health: systematic review. Brain Informatics 2022;9(1) View
- He Y, Zamani E, Yevseyeva I, Luo C. Artificial Intelligence–Based Ethical Hacking for Health Information Systems: Simulation Study. Journal of Medical Internet Research 2023;25:e41748 View
- Huang X, Wang T, Zu W, Xu T, Du L, Wang Y, Nie W, Wang L. A bibliometric analysis of global publications on graft-versus-host disease research. Medicine 2022;101(27):e29634 View
- Singh N, Krishnaswamy V, Zhang J. Intellectual structure of cybersecurity research in enterprise information systems. Enterprise Information Systems 2023;17(6) View
- Wells J. Preparing for hybrid warfare and cyberattacks on health services' digital infrastructure: What nurse managers need to know. Journal of Nursing Management 2022;30(6):2000 View
- Liu J, Simsek M, Kantarci B, Erol-kantarci M, Malton A, Walenstein A. Risk-aware Fine-grained Access Control in Cyber-physical Contexts. Digital Threats: Research and Practice 2022;3(4):1 View
- Alhuwail D, Al-Jafar E, Abdulsalam Y, AlDuaij S. Information Security Awareness and Behaviors of Health Care Professionals at Public Health Care Facilities. Applied Clinical Informatics 2021;12(04):924 View
- Zhou H, Yip W, Ren J, To S. Thematic analysis of sustainable ultra-precision machining by using text mining and unsupervised learning method. Journal of Manufacturing Systems 2022;62:218 View
- Sharma D, Mittal R, Sekhar R, Shah P, Renz M. A bibliometric analysis of cyber security and cyber forensics research. Results in Control and Optimization 2023;10:100204 View
- Javaid M, Haleem A, Singh R, Suman R. Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends. Cyber Security and Applications 2023;1:100016 View
- Veličković J, Jonev-Ćiraković K. Cyberattacks on healthcare systems. Annals of Nursing 2023;1(4):6 View
- İSTANBULLU A. How Should I Start Research in Cyber Security? Suggestions for Researchers According to Bibliometric Analysis Data. Sakarya University Journal of Education 2023;13(1):119 View
- Wenhua Z, Kamrul Hasan M, Ismail A, Yanke Z, Razzaque M, Islam S, Anil kumar B. Data security in smart devices: Advancement, constraints and future recommendations. IET Networks 2023;12(6):269 View
- Dart M, Ahmed M. Evaluating Staff Attitudes, Intentions, and Behaviors Related to Cyber Security in Large Australian Health Care Environments: Mixed Methods Study. JMIR Human Factors 2023;10:e48220 View
- KARAYEL T, AKBIYIK A. Siber Güvenlik Araştırmalarına Küresel Bir Bakış: Yayın Trendleri ve Araştırma Yönelimleri. Bilişim Teknolojileri Dergisi 2023;16(3):221 View
- van Boven L, Kusters R, Tin D, van Osch F, De Cauwer H, Ketelings L, Rao M, Dameff C, Barten D. Hacking Acute Care: A Qualitative Study on the Health Care Impacts of Ransomware Attacks Against Hospitals. Annals of Emergency Medicine 2024;83(1):46 View
- Bhukya C, Thakur P, Mudhivarthi B, Singh G. Cybersecurity in Internet of Medical Vehicles: State-of-the-Art Analysis, Research Challenges and Future Perspectives. Sensors 2023;23(19):8107 View
- Dart M, Ahmed M. CYBER-AIDD: A novel approach to implementing improved cyber security resilience for large Australian healthcare providers using a Unified Modelling Language ontology. DIGITAL HEALTH 2023;9 View
- Poleto T, Nepomuceno T, de Carvalho V, Friaes L, de Oliveira R, Figueiredo C. Information Security Applications in Smart Cities: A Bibliometric Analysis of Emerging Research. Future Internet 2023;15(12):393 View
- Arafa A, Sheerah H, Alsalamah S. Emerging Digital Technologies in Healthcare with a Spotlight on Cybersecurity: A Narrative Review. Information 2023;14(12):640 View
- Inaam ul haq M, Li Q. Revealing the Trends in the Academic Landscape of the Health Care System Using Contextual Topic Modeling. Data Intelligence 2023;5(4):923 View
- Dart M, Ahmed M. Operational shock: A method for estimating cyber security incident costs for large Australian healthcare providers. Journal of Cyber Security Technology 2024;8(4):260 View
- Tazi F, Nandakumar A, Dykstra J, Rajivan P, Das S. SoK: Analyzing Privacy and Security of Healthcare Data from the User Perspective. ACM Transactions on Computing for Healthcare 2024;5(2):1 View
- Ewoh P, Vartiainen T. Vulnerability to Cyberattacks and Sociotechnical Solutions for Health Care Systems: Systematic Review. Journal of Medical Internet Research 2024;26:e46904 View
- Grabowska-Lepczak I. The use of modern technologies in education for safety and the effectiveness of undertaken activities. Journal of Modern Science 2024;55(1):471 View
- Neri M, Benevento E, Stefanini A, Aloini D, Niccolini F, Carducci A, Federigi I, Dini G. Understanding information security awareness: evidence from the public healthcare sector. Information & Computer Security 2024 View
- Murthi S, Martini N, Falconer N, Scahill S. Evaluating EHR-Integrated Digital Technologies for Medication-Related Outcomes and Health Equity in Hospitalised Adults: A Scoping Review. Journal of Medical Systems 2024;48(1) View
- Wang L, Li M. An exploration method for technology forecasting that combines link prediction with graph embedding: A case study on blockchain. Technological Forecasting and Social Change 2024;208:123736 View
- Ghaempanah F, Moasses Ghafari B, Hesami D, Hossein Zadeh R, Noroozpoor R, Moodi Ghalibaf A, Hasanabadi P. Metaverse and its impact on medical education and health care system: A narrative review. Health Science Reports 2024;7(9) View
- Kellermann A, Kipper L, Moraes E, Leivas P. Tecnologias habilitadoras para a agricultura 4.0 na cadeia de suprimentos visando a redução de desperdícios. Exacta 2022;22(3):668 View
Books/Policy Documents
- Fournier H, Molyneaux H, Kondratova I. Advances in Usability, User Experience, Wearable and Assistive Technology. View
- Hough T, Gross K. Advanced Practice and Leadership in Radiology Nursing. View
- Albastaki Y, Al-Alawi A, Al-Bassam S. Handbook of Research on Implementing Knowledge Management Strategy in the Public Sector. View
- Fournier H, Molyneaux H, Kondratova I, Ali N. Innovation in Information Systems and Technologies to Support Learning Research. View
- Fournier H, Kondratova I, Molyneaux H. HCI International 2020 – Late Breaking Papers: Universal Access and Inclusive Design. View
- Ravidas D, Pattinson M, Oliver P. Human Aspects of Information Security and Assurance. View
- Medhekar A. Handbook of Research on Advancing Cybersecurity for Digital Transformation. View
- Medhekar A. Research Anthology on Securing Medical Systems and Records. View
- Ahmed M, Zubair S. Explainable Artificial Intelligence for Cyber Security. View
- Costantini F, Soncini G. Endorobotics. View
- Tazi F, Dykstra J, Rajivan P, Das S. Socio-Technical Aspects in Security. View
- Kuika Watat J, Agbozo E. Co-creating for Context in the Transfer and Diffusion of IT. View
- Bhowmik A, Karforma S. Computational Intelligence for Medical Internet of Things (MIoT) Applications. View
- Sahoo B, Pattnaik P. Communication Technology and Gender Violence. View
- Von Solms S, du Toit J. Intelligent Computing. View
- Rai D, Dhull A, Singh A, Singh K. Healthcare Industry Assessment: Analyzing Risks, Security, and Reliability. View
- Kisielewicz M, Kedziora M, Jozwiak I. Recent Challenges in Intelligent Information and Database Systems. View
- Sharma D, Habibi Lashkari A, Parizadeh M. Understanding Cybersecurity Management in Healthcare. View
- Sharma D, Habibi Lashkari A, Parizadeh M. Understanding Cybersecurity Management in Healthcare. View