Published on in Vol 23, No 7 (2021): July
Preprints (earlier versions) of this paper are
available at
https://preprints.jmir.org/preprint/26157, first published
.
Journals
- Baillette P, Barlette Y, Berthevas J. Benefits and Risks of Shadow IT in Health Care: A Narrative Review of the Literature. Systèmes d'information & management 2022;Volume 27(2):59 View
- Raghupathi W, Raghupathi V, Saharia A. Analyzing Health Data Breaches: A Visual Analytics Approach. AppliedMath 2023;3(1):175 View
- Alipour J, Mehdipour Y, Karimi A, Khorashadizadeh M, Akbarpour M. Security, confidentiality, privacy and patient safety in the hospital information systems from the users’ perspective: A cross-sectional study. International Journal of Medical Informatics 2023;175:105066 View
- Chiaradonna S, Jevtić P, Lanchier N. Framework for cyber risk loss distribution of hospital infrastructure: Bond percolation on mixed random graphs approach. Risk Analysis 2023;43(12):2450 View
- Bo Y, Liu Q, Tong Y. The Effects of Adopting Mobile Health and Fitness Apps on Hospital Visits: Quasi-Experimental Study. Journal of Medical Internet Research 2023;25:e45681 View
- Al-Hawawreh M, Alazab M, Ferrag M, Hossain M. Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms. Journal of Network and Computer Applications 2024;223:103809 View
- Munoz-Cornejo G, Sakowski J, Lee J, Parks A. Analyzing the urban–rural divide: the role of location, time, and breach characteristics in U.S. hospital security incidents, 2012–2021. Discover Health Systems 2024;3(1) View
- Tetteh G, Otioma C. Cyberattack, cyber risk mitigation capabilities, and firm productivity in Kenya. Small Business Economics 2024 View
- Lv X, Rani S, Manimurugan S, Slowik A, Feng Y. Quantum-Inspired Sensitive Data Measurement and Secure Transmission in 5G-Enabled Healthcare Systems. Tsinghua Science and Technology 2025;30(1):456 View