Published on in Vol 25 (2023)
Preprints (earlier versions) of this paper are
available at
https://preprints.jmir.org/preprint/41294, first published
.
Journals
- McIntosh T, Susnjak T, Liu T, Watters P, Xu D, Liu D, Nowrozy R, Halgamuge M. From COBIT to ISO 42001: Evaluating cybersecurity frameworks for opportunities, risks, and regulatory compliance in commercializing large language models. Computers & Security 2024;144:103964 View
- Alhammad A, Yusof M, Jambari D. Evaluating applied security controls for safeguarding medical device‐integrated electronic medical records. Journal of Evaluation in Clinical Practice 2025;31(1) View
- Howell C, Maimon D, Muniz C, Kamar E, Berenblum T. Engaging in cyber hygiene: the role of thoughtful decision-making and informational interventions. Frontiers in Psychology 2024;15 View
- Dursun F. Digital Age Workplace Security: Cyber Hygiene Approach in Remote Work. İşletme Bilimi Dergisi 2025;13(1):138 View
- Avery A, Baker E, Wright B, Avery I, Gomez D. Media Framing and Portrayals of Ransomware Impacts on Informatics, Employees, and Patients: Systematic Media Literature Review. Journal of Medical Internet Research 2025;27:e59231 View
Books/Policy Documents
- Naga J, Caguiat M. Proceedings of the 4th International Conference on Advances in Computational Science and Engineering. View
- Singergy M, Ehab J, Rasslan M, Sabty C, El-Bolock A. Methodologies and Intelligent Systems for Technology Enhanced Learning, 14th International Conference. View
- Gupta N, Vashist S, Verma R, Terang P. Navigating Innovations and Challenges in Travel Medicine and Digital Health. View
Conference Proceedings
- Das Chowdhury P, Renaud K. New Security Paradigms Workshop. ‘Ought’ should not assume ‘Can’? Basic Capabilities in Cybersecurity to Ground Sen’s Capability Approach View