Published on in Vol 25 (2023)

Preprints (earlier versions) of this paper are available at https://preprints.jmir.org/preprint/41294, first published .
Cyber Hygiene Methodology for Raising Cybersecurity and Data Privacy Awareness in Health Care Organizations: Concept Study

Cyber Hygiene Methodology for Raising Cybersecurity and Data Privacy Awareness in Health Care Organizations: Concept Study

Cyber Hygiene Methodology for Raising Cybersecurity and Data Privacy Awareness in Health Care Organizations: Concept Study

Journals

  1. McIntosh T, Susnjak T, Liu T, Watters P, Xu D, Liu D, Nowrozy R, Halgamuge M. From COBIT to ISO 42001: Evaluating cybersecurity frameworks for opportunities, risks, and regulatory compliance in commercializing large language models. Computers & Security 2024;144:103964 View
  2. Alhammad A, Yusof M, Jambari D. Evaluating applied security controls for safeguarding medical device‐integrated electronic medical records. Journal of Evaluation in Clinical Practice 2025;31(1) View
  3. Howell C, Maimon D, Muniz C, Kamar E, Berenblum T. Engaging in cyber hygiene: the role of thoughtful decision-making and informational interventions. Frontiers in Psychology 2024;15 View
  4. Dursun F. Digital Age Workplace Security: Cyber Hygiene Approach in Remote Work. İşletme Bilimi Dergisi 2025;13(1):138 View
  5. Avery A, Baker E, Wright B, Avery I, Gomez D. Media Framing and Portrayals of Ransomware Impacts on Informatics, Employees, and Patients: Systematic Media Literature Review. Journal of Medical Internet Research 2025;27:e59231 View

Books/Policy Documents

  1. Naga J, Caguiat M. Proceedings of the 4th International Conference on Advances in Computational Science and Engineering. View
  2. Singergy M, Ehab J, Rasslan M, Sabty C, El-Bolock A. Methodologies and Intelligent Systems for Technology Enhanced Learning, 14th International Conference. View
  3. Gupta N, Vashist S, Verma R, Terang P. Navigating Innovations and Challenges in Travel Medicine and Digital Health. View

Conference Proceedings

  1. Das Chowdhury P, Renaud K. New Security Paradigms Workshop. ‘Ought’ should not assume ‘Can’? Basic Capabilities in Cybersecurity to Ground Sen’s Capability Approach View