Published on in Vol 21, No 2 (2019): February

Preprints (earlier versions) of this paper are available at https://preprints.jmir.org/preprint/12644, first published .
Health Care and Cybersecurity: Bibliometric Analysis of the Literature

Health Care and Cybersecurity: Bibliometric Analysis of the Literature

Health Care and Cybersecurity: Bibliometric Analysis of the Literature

Journals

  1. Martignani C. Cybersecurity in cardiac implantable electronic devices. Expert Review of Medical Devices 2019;16(6):437 View
  2. Marquez G, Astudillo H, Taramasco C. Security in Telehealth Systems From a Software Engineering Viewpoint: A Systematic Mapping Study. IEEE Access 2020;8:10933 View
  3. Razaque A, Amsaad F, Jaro Khan M, Hariri S, Chen S, Siting C, Ji X. Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain. IEEE Access 2019;7:168774 View
  4. Bhuyan S, Kabir U, Escareno J, Ector K, Palakodeti S, Wyant D, Kumar S, Levy M, Kedia S, Dasgupta D, Dobalian A. Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations. Journal of Medical Systems 2020;44(5) View
  5. Jalali M, Bruckes M, Westmattelmann D, Schewe G. Why Employees (Still) Click on Phishing Links: An Investigation in Hospitals. Journal of Medical Internet Research 2020;22(1):e16775 View
  6. Johansson D, Jönsson P, Ivarsson B, Christiansson M. Information Technology and Medical Technology Personnel´s Perception Regarding Segmentation of Medical Devices: A Focus Group Study. Healthcare 2020;8(1):23 View
  7. Li P, Luo Y, Yu X, Wen J, Mason E, Li W, Jalali M. Patients’ Perceptions of Barriers and Facilitators to the Adoption of E-Hospitals: Cross-Sectional Study in Western China. Journal of Medical Internet Research 2020;22(6):e17221 View
  8. Jalali M, Russell B, Razak S, Gordon W. EARS to cyber incidents in health care. Journal of the American Medical Informatics Association 2019;26(1):81 View
  9. T. Alanazi S, Anbar M, A. Ebad S, Karuppayah S, Al-Ani H. Theory-Based Model and Prediction Analysis of Information Security Compliance Behavior in the Saudi Healthcare Sector. Symmetry 2020;12(9):1544 View
  10. Li P, Luo Y, Yu X, Zeng Z, Jin W, Mason E, Li W, Jalali M. Readiness of Healthcare Providers for e-Hospitals: Cross-sectional Analysis in China. SSRN Electronic Journal 2020 View
  11. Romare C, Skär L. Smart Glasses for Caring Situations in Complex Care Environments: Scoping Review. JMIR mHealth and uHealth 2020;8(4):e16055 View
  12. Kang H, Han J, Kwon G. Determining the Intellectual Structure and Academic Trends of Smart Home Health Care Research: Coword and Topic Analyses. Journal of Medical Internet Research 2021;23(1):e19625 View
  13. Kulakli A, Shubina I. Scientific Publication Patterns of Mobile Technologies and Apps for Posttraumatic Stress Disorder Treatment: Bibliometric Co-Word Analysis. JMIR mHealth and uHealth 2020;8(11):e19391 View
  14. Spinazze P, Aardoom J, Chavannes N, Kasteleyn M. The Computer Will See You Now: Overcoming Barriers to Adoption of Computer-Assisted History Taking (CAHT) in Primary Care. Journal of Medical Internet Research 2021;23(2):e19306 View
  15. Dhawan S, Gupta B, Elango B. Global Cyber Security Research Output (1998–2019): A Scientometric Analysis. Science & Technology Libraries 2021;40(2):172 View
  16. Eichelberg M, Kleber K, Kämmerer M. Cybersecurity in PACS and Medical Imaging: an Overview. Journal of Digital Imaging 2020;33(6):1527 View
  17. Moosavi J, Naeni L, Fathollahi-Fard A, Fiore U. Blockchain in supply chain management: a review, bibliometric, and network analysis. Environmental Science and Pollution Research 2021 View
  18. Aktürk C. Bibliometric Analysis of Clinical Decision Support Systems. Acta Informatica Pragensia 2021;10(1):61 View
  19. AKIN M. Sağlık Turizmi Alanyazının Bibliyometrik Analizi (2015-2020). MANAS Sosyal Araştırmalar Dergisi 2021;10(3):2026 View
  20. Loan F, Bisma B, Nahida N. Global research productivity in cybersecurity: a scientometric study. Global Knowledge, Memory and Communication 2022;71(4/5):342 View
  21. Srinivasan K, Rathee G, Raja M, Jaglan N, Mahendiran T, Palaniswamy T. Secure multimedia data processing scheme in medical applications. Multimedia Tools and Applications 2022;81(7):9079 View
  22. Xiong P, Buffett S, Iqbal S, Lamontagne P, Mamun M, Molyneaux H. Towards a robust and trustworthy machine learning system development: An engineering perspective. Journal of Information Security and Applications 2022;65:103121 View
  23. Poleto T, Carvalho V, Silva A, Clemente T, Silva M, Gusmão A, Costa A, Nepomuceno T. Fuzzy Cognitive Scenario Mapping for Causes of Cybersecurity in Telehealth Services. Healthcare 2021;9(11):1504 View
  24. Epizitone A, Moyane S, Agbehadji I. Health Information System and Health Care Applications Performance in the Healthcare Arena: A Bibliometric Analysis. Healthcare 2022;10(11):2273 View
  25. A. Alzahrani F. Estimating Security Risk of Healthcare Web Applications: A Design Perspective. Computers, Materials & Continua 2021;67(1):187 View
  26. Alyami H, Nadeem M, Alharbi A, Alosaimi W, Ansari M, Pandey D, Kumar R, Khan R. The Evaluation of Software Security through Quantum Computing Techniques: A Durability Perspective. Applied Sciences 2021;11(24):11784 View
  27. Shubina I. Scientific Publication Patterns of Systematic Reviews on Psychosocial Interventions Improving Well-being: Bibliometric Analysis. Interactive Journal of Medical Research 2022;11(2):e41456 View
  28. Wasserman L, Wasserman Y. Hospital cybersecurity risks and gaps: Review (for the non-cyber professional). Frontiers in Digital Health 2022;4 View
  29. Dastani M, Danesh F, Nazir S. Iranian COVID-19 Publications in LitCovid: Text Mining and Topic Modeling. Scientific Programming 2021;2021:1 View
  30. Chen X, Cheng G, Wang F, Tao X, Xie H, Xu L. Machine and cognitive intelligence for human health: systematic review. Brain Informatics 2022;9(1) View
  31. He Y, Zamani E, Yevseyeva I, Luo C. Artificial Intelligence–Based Ethical Hacking for Health Information Systems: Simulation Study. Journal of Medical Internet Research 2023;25:e41748 View
  32. Huang X, Wang T, Zu W, Xu T, Du L, Wang Y, Nie W, Wang L. A bibliometric analysis of global publications on graft-versus-host disease research. Medicine 2022;101(27):e29634 View
  33. Singh N, Krishnaswamy V, Zhang J. Intellectual structure of cybersecurity research in enterprise information systems. Enterprise Information Systems 2023;17(6) View
  34. Wells J. Preparing for hybrid warfare and cyberattacks on health services' digital infrastructure: What nurse managers need to know. Journal of Nursing Management 2022;30(6):2000 View
  35. Liu J, Simsek M, Kantarci B, Erol-kantarci M, Malton A, Walenstein A. Risk-aware Fine-grained Access Control in Cyber-physical Contexts. Digital Threats: Research and Practice 2022;3(4):1 View
  36. Alhuwail D, Al-Jafar E, Abdulsalam Y, AlDuaij S. Information Security Awareness and Behaviors of Health Care Professionals at Public Health Care Facilities. Applied Clinical Informatics 2021;12(04):924 View
  37. Zhou H, Yip W, Ren J, To S. Thematic analysis of sustainable ultra-precision machining by using text mining and unsupervised learning method. Journal of Manufacturing Systems 2022;62:218 View
  38. Sharma D, Mittal R, Sekhar R, Shah P, Renz M. A bibliometric analysis of cyber security and cyber forensics research. Results in Control and Optimization 2023;10:100204 View
  39. Javaid M, Haleem A, Singh R, Suman R. Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends. Cyber Security and Applications 2023;1:100016 View
  40. Veličković J, Jonev-Ćiraković K. Cyberattacks on healthcare systems. Annals of Nursing 2023;1(4):6 View
  41. İSTANBULLU A. How Should I Start Research in Cyber Security? Suggestions for Researchers According to Bibliometric Analysis Data. Sakarya University Journal of Education 2023;13(1):119 View
  42. Wenhua Z, Kamrul Hasan M, Ismail A, Yanke Z, Razzaque M, Islam S, Anil kumar B. Data security in smart devices: Advancement, constraints and future recommendations. IET Networks 2023;12(6):269 View
  43. Dart M, Ahmed M. Evaluating Staff Attitudes, Intentions, and Behaviors Related to Cyber Security in Large Australian Health Care Environments: Mixed Methods Study. JMIR Human Factors 2023;10:e48220 View
  44. KARAYEL T, AKBIYIK A. Siber Güvenlik Araştırmalarına Küresel Bir Bakış: Yayın Trendleri ve Araştırma Yönelimleri. Bilişim Teknolojileri Dergisi 2023;16(3):221 View
  45. van Boven L, Kusters R, Tin D, van Osch F, De Cauwer H, Ketelings L, Rao M, Dameff C, Barten D. Hacking Acute Care: A Qualitative Study on the Health Care Impacts of Ransomware Attacks Against Hospitals. Annals of Emergency Medicine 2024;83(1):46 View
  46. Bhukya C, Thakur P, Mudhivarthi B, Singh G. Cybersecurity in Internet of Medical Vehicles: State-of-the-Art Analysis, Research Challenges and Future Perspectives. Sensors 2023;23(19):8107 View
  47. Dart M, Ahmed M. CYBER-AIDD: A novel approach to implementing improved cyber security resilience for large Australian healthcare providers using a Unified Modelling Language ontology. DIGITAL HEALTH 2023;9 View
  48. Poleto T, Nepomuceno T, de Carvalho V, Friaes L, de Oliveira R, Figueiredo C. Information Security Applications in Smart Cities: A Bibliometric Analysis of Emerging Research. Future Internet 2023;15(12):393 View
  49. Arafa A, Sheerah H, Alsalamah S. Emerging Digital Technologies in Healthcare with a Spotlight on Cybersecurity: A Narrative Review. Information 2023;14(12):640 View
  50. Inaam ul haq M, Li Q. Revealing the Trends in the Academic Landscape of the Health Care System Using Contextual Topic Modeling. Data Intelligence 2023;5(4):923 View
  51. Dart M, Ahmed M. Operational shock: A method for estimating cyber security incident costs for large Australian healthcare providers. Journal of Cyber Security Technology 2024;8(4):260 View
  52. Tazi F, Nandakumar A, Dykstra J, Rajivan P, Das S. SoK: Analyzing Privacy and Security of Healthcare Data from the User Perspective. ACM Transactions on Computing for Healthcare 2024;5(2):1 View
  53. Ewoh P, Vartiainen T. Vulnerability to Cyberattacks and Sociotechnical Solutions for Health Care Systems: Systematic Review. Journal of Medical Internet Research 2024;26:e46904 View
  54. Grabowska-Lepczak I. The use of modern technologies in education for safety and the effectiveness of undertaken activities. Journal of Modern Science 2024;55(1):471 View
  55. Neri M, Benevento E, Stefanini A, Aloini D, Niccolini F, Carducci A, Federigi I, Dini G. Understanding information security awareness: evidence from the public healthcare sector. Information & Computer Security 2024 View
  56. Murthi S, Martini N, Falconer N, Scahill S. Evaluating EHR-Integrated Digital Technologies for Medication-Related Outcomes and Health Equity in Hospitalised Adults: A Scoping Review. Journal of Medical Systems 2024;48(1) View
  57. Wang L, Li M. An exploration method for technology forecasting that combines link prediction with graph embedding: A case study on blockchain. Technological Forecasting and Social Change 2024;208:123736 View
  58. Ghaempanah F, Moasses Ghafari B, Hesami D, Hossein Zadeh R, Noroozpoor R, Moodi Ghalibaf A, Hasanabadi P. Metaverse and its impact on medical education and health care system: A narrative review. Health Science Reports 2024;7(9) View
  59. Kellermann A, Kipper L, Moraes E, Leivas P. Tecnologias habilitadoras para a agricultura 4.0 na cadeia de suprimentos visando a redução de desperdícios. Exacta 2022;22(3):668 View

Books/Policy Documents

  1. Fournier H, Molyneaux H, Kondratova I. Advances in Usability, User Experience, Wearable and Assistive Technology. View
  2. Hough T, Gross K. Advanced Practice and Leadership in Radiology Nursing. View
  3. Albastaki Y, Al-Alawi A, Al-Bassam S. Handbook of Research on Implementing Knowledge Management Strategy in the Public Sector. View
  4. Fournier H, Molyneaux H, Kondratova I, Ali N. Innovation in Information Systems and Technologies to Support Learning Research. View
  5. Fournier H, Kondratova I, Molyneaux H. HCI International 2020 – Late Breaking Papers: Universal Access and Inclusive Design. View
  6. Ravidas D, Pattinson M, Oliver P. Human Aspects of Information Security and Assurance. View
  7. Medhekar A. Handbook of Research on Advancing Cybersecurity for Digital Transformation. View
  8. Medhekar A. Research Anthology on Securing Medical Systems and Records. View
  9. Ahmed M, Zubair S. Explainable Artificial Intelligence for Cyber Security. View
  10. Costantini F, Soncini G. Endorobotics. View
  11. Tazi F, Dykstra J, Rajivan P, Das S. Socio-Technical Aspects in Security. View
  12. Kuika Watat J, Agbozo E. Co-creating for Context in the Transfer and Diffusion of IT. View
  13. Bhowmik A, Karforma S. Computational Intelligence for Medical Internet of Things (MIoT) Applications. View
  14. Sahoo B, Pattnaik P. Communication Technology and Gender Violence. View
  15. Von Solms S, du Toit J. Intelligent Computing. View
  16. Rai D, Dhull A, Singh A, Singh K. Healthcare Industry Assessment: Analyzing Risks, Security, and Reliability. View
  17. Kisielewicz M, Kedziora M, Jozwiak I. Recent Challenges in Intelligent Information and Database Systems. View
  18. Sharma D, Habibi Lashkari A, Parizadeh M. Understanding Cybersecurity Management in Healthcare. View
  19. Sharma D, Habibi Lashkari A, Parizadeh M. Understanding Cybersecurity Management in Healthcare. View