Published on in Vol 23, No 7 (2021): July

Preprints (earlier versions) of this paper are available at https://preprints.jmir.org/preprint/26157, first published .
Hospital Productivity After Data Breaches: Difference-in-Differences Analysis

Hospital Productivity After Data Breaches: Difference-in-Differences Analysis

Hospital Productivity After Data Breaches: Difference-in-Differences Analysis

Authors of this article:

Jinhyung Lee1, 2 Author Orcid Image ;   Sung J Choi3 Author Orcid Image

Journals

  1. Baillette P, Barlette Y, Berthevas J. Benefits and Risks of Shadow IT in Health Care: A Narrative Review of the Literature. Systèmes d'information & management 2022;Volume 27(2):59 View
  2. Raghupathi W, Raghupathi V, Saharia A. Analyzing Health Data Breaches: A Visual Analytics Approach. AppliedMath 2023;3(1):175 View
  3. Alipour J, Mehdipour Y, Karimi A, Khorashadizadeh M, Akbarpour M. Security, confidentiality, privacy and patient safety in the hospital information systems from the users’ perspective: A cross-sectional study. International Journal of Medical Informatics 2023;175:105066 View
  4. Chiaradonna S, Jevtić P, Lanchier N. Framework for cyber risk loss distribution of hospital infrastructure: Bond percolation on mixed random graphs approach. Risk Analysis 2023;43(12):2450 View
  5. Bo Y, Liu Q, Tong Y. The Effects of Adopting Mobile Health and Fitness Apps on Hospital Visits: Quasi-Experimental Study. Journal of Medical Internet Research 2023;25:e45681 View
  6. Al-Hawawreh M, Alazab M, Ferrag M, Hossain M. Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms. Journal of Network and Computer Applications 2024;223:103809 View
  7. Munoz-Cornejo G, Sakowski J, Lee J, Parks A. Analyzing the urban–rural divide: the role of location, time, and breach characteristics in U.S. hospital security incidents, 2012–2021. Discover Health Systems 2024;3(1) View
  8. Tetteh G, Otioma C. Cyberattack, cyber risk mitigation capabilities, and firm productivity in Kenya. Small Business Economics 2024 View
  9. Lv X, Rani S, Manimurugan S, Slowik A, Feng Y. Quantum-Inspired Sensitive Data Measurement and Secure Transmission in 5G-Enabled Healthcare Systems. Tsinghua Science and Technology 2025;30(1):456 View

Books/Policy Documents

  1. Wibbenmeyer K. Exploring Ethical Problems in Today’s Technological World. View
  2. Hall J. Applied Research Approaches to Technology, Healthcare, and Business. View