Published on in Vol 20 , No 5 (2018) :May
Preprints (earlier versions) of this paper are
available at
https://preprints.jmir.org/preprint/10059, first published
.

Journals
- Ghafur S, Kristensen S, Honeyford K, Martin G, Darzi A, Aylin P. A retrospective impact analysis of the WannaCry cyberattack on the NHS. npj Digital Medicine 2019;2(1) View
- Darabi N, Hosseinichimeh N. System dynamics modeling in health and medicine: a systematic literature review. System Dynamics Review 2020;36(1):29 View
- Jalali M, Bruckes M, Westmattelmann D, Schewe G. Why Employees (Still) Click on Phishing Links: An Investigation in Hospitals. SSRN Electronic Journal 2019 View
- Mishah N, Bukhari A, AlMutairi B, Mohreq M. Status of e-security and privacy protection in Saudi hospitals. Computer Methods and Programs in Biomedicine 2019;171:5 View
- Barad M. Linking Cyber Security Improvement Actions in Healthcare Systems to Their Strategic Improvement Needs. Procedia Manufacturing 2019;39:279 View
- Gordon W, Wright A, Aiyagari R, Corbo L, Glynn R, Kadakia J, Kufahl J, Mazzone C, Noga J, Parkulo M, Sanford B, Scheib P, Landman A. Assessment of Employee Susceptibility to Phishing Attacks at US Health Care Institutions. JAMA Network Open 2019;2(3):e190393 View
- Jalali M, Siegel M, Madnick S. Decision Making and Biases in Cybersecurity Capability Development: Evidence from a Simulation Game Experiment. SSRN Electronic Journal 2017 View
- Offner K, Sitnikova E, Joiner K, MacIntyre C. Towards understanding cybersecurity capability in Australian healthcare organisations: a systematic review of recent trends, threats and mitigation. Intelligence and National Security 2020;35(4):556 View
- Jalali M, Russell B, Razak S, Gordon W. EARS to cyber incidents in health care. Journal of the American Medical Informatics Association 2019;26(1):81 View
- Karampela M, Ouhbi S, Isomursu M. Connected Health User Willingness to Share Personal Health Data: Questionnaire Study. Journal of Medical Internet Research 2019;21(11):e14537 View
- Jalali M, Kaiser J, Siegel M, Madnick S. The Internet of Things Promises New Benefits and Risks: A Systematic Analysis of Adoption Dynamics of IoT Products. IEEE Security & Privacy 2019;17(2):39 View
- Billingsley L. Cybersmart: Protect the Patient, Protect the Data. Journal of Radiology Nursing 2019;38(4):261 View
- Zerka F, Barakat S, Walsh S, Bogowicz M, Leijenaar R, Jochems A, Miraglio B, Townend D, Lambin P. Systematic Review of Privacy-Preserving Distributed Machine Learning From Federated Databases in Health Care. JCO Clinical Cancer Informatics 2020;(4):184 View
- Jalali M, Razak S, Gordon W, Perakslis E, Madnick S. Health Care and Cybersecurity: A Bibliometric Analysis of the Literature. SSRN Electronic Journal 2018 View
- Jalali M, Siegel M, Madnick S. Decision-making and biases in cybersecurity capability development: Evidence from a simulation game experiment. The Journal of Strategic Information Systems 2019;28(1):66 View
- Jalali M, Bruckes M, Westmattelmann D, Schewe G. Why Employees (Still) Click on Phishing Links: An Investigation in Hospitals. Journal of Medical Internet Research 2020;22(1):e16775 View
- Jalali M, Razak S, Gordon W, Perakslis E, Madnick S. Health Care and Cybersecurity: Bibliometric Analysis of the Literature. Journal of Medical Internet Research 2019;21(2):e12644 View
- de Gooyert V, Größler A. On the differences between theoretical and applied system dynamics modeling. System Dynamics Review 2018;34(4):575 View
- Alsubaei F, Abuhussein A, Shiva S. Ontology-Based Security Recommendation for the Internet of Medical Things. IEEE Access 2019;7:48948 View
- Le Bris A, Mazille-Orfanos N, Simonot P, Luherne M, Flamant C, Gascoin G, ÓLaighin G, Harte R, Pladys P. Parents’ and healthcare professionals’ perceptions of the use of live video recording in neonatal units: a focus group study. BMC Pediatrics 2020;20(1) View
- Yesmin T, Carter M. Evaluation framework for automatic privacy auditing tools for hospital data breach detections: A case study. International Journal of Medical Informatics 2020;138:104123 View
- Li P, Luo Y, Yu X, Wen J, Mason E, Li W, Jalali M. Patients’ Perceptions of Barriers and Facilitators to the Adoption of E-Hospitals: Cross-Sectional Study in Western China. Journal of Medical Internet Research 2020;22(6):e17221 View
- Li P, Luo Y, Yu X, Zeng Z, Jin W, Mason E, Li W, Jalali M. Readiness of Healthcare Providers for e-Hospitals: Cross-sectional Analysis in China. SSRN Electronic Journal 2020 View
- Ghafur S, Grass E, Jennings N, Darzi A. The challenges of cybersecurity in health care: the UK National Health Service as a case study. The Lancet Digital Health 2019;1(1):e10 View
- Rangabashyam M, Wee H, Wang W, Mueller S, Karim K, Skanthakumar T, Hariraman B, Sommat K, Soong Y, Chua M, Tay G, Tan N, Tan H, Iyer N. Electronic tumor board presentations as the basis for the development of a head and neck cancer database. Laryngoscope Investigative Otolaryngology 2020;5(1):46 View
- Tully J, Selzer J, Phillips J, O'Connor P, Dameff C. Healthcare Challenges in the Era of Cybersecurity. Health Security 2020;18(3):228 View
- Wani T, Mendoza A, Gray K. Hospital Bring-Your-Own-Device Security Challenges and Solutions: Systematic Review of Gray Literature. JMIR mHealth and uHealth 2020;8(6):e18175 View
- Singh B, Singh N. MoLaBSS: Server-Specific Add-On Biometric Security Layer Model to Enhance the Usage of Biometrics. Information 2020;11(6):308 View
- Cronin A, Carlile M, Dameff C, Coyne C, Castillo E. Leveraging Remote Research Associates During a Pandemic. Western Journal of Emergency Medicine 2020;21(5) View
- Gunasekeran D, Tham Y, Ting D, Tan G, Wong T. Digital health during COVID-19: lessons from operationalising new models of care in ophthalmology. The Lancet Digital Health 2021;3(2):e124 View
- O'Brien N, Martin G, Grass E, Durkin M, Darzi A, Ghafur S. Cybersecurity in Healthcare: Comparing Cybersecurity Maturity and Experiences Across Global Healthcare Organizations. SSRN Electronic Journal 2020 View
- He Y, Aliyu A, Evans M, Luo C. Health Care Cybersecurity Challenges and Solutions Under the Climate of COVID-19: Scoping Review. Journal of Medical Internet Research 2021;23(4):e21747 View
- Maggio L, Dameff C, Kanter S, Woods B, Tully J. Cybersecurity Challenges and the Academic Health Center: An Interactive Tabletop Simulation for Executives. Academic Medicine 2021;96(6):850 View
- Lambraki I, Majowicz S, Parmley E, Wernli D, Léger A, Graells T, Cousins M, Harbarth S, Carson C, Henriksson P, Troell M, Jørgensen P. Building Social-Ecological System Resilience to Tackle Antimicrobial Resistance Across the One Health Spectrum: Protocol for a Mixed Methods Study. JMIR Research Protocols 2021;10(6):e24378 View
- Ma X, Shi W. AESMOTE: Adversarial Reinforcement Learning With SMOTE for Anomaly Detection. IEEE Transactions on Network Science and Engineering 2021;8(2):943 View
- Jofre M, Navarro-Llobet D, Agulló R, Puig J, Gonzalez-Granadillo G, Mora Zamorano J, Romeu R. Cybersecurity and Privacy Risk Assessment of Point-of-Care Systems in Healthcare—A Use Case Approach. Applied Sciences 2021;11(15):6699 View
- Nifakos S, Chandramouli K, Nikolaou C, Papachristou P, Koch S, Panaousis E, Bonacina S. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review. Sensors 2021;21(15):5119 View
- Choi S, Johnson M. The relationship between cybersecurity ratings and the risk of hospital data breaches. Journal of the American Medical Informatics Association 2021;28(10):2085 View
- Dovleac R. Assessing the Level of Cybersecurity Knowledge of Computer Science and Applied Automation Undergraduates. WSEAS TRANSACTIONS ON ADVANCES in ENGINEERING EDUCATION 2022;19:127 View
- Ahouanmenou S, Van Looy A, Poels G. Information security and privacy in hospitals: a literature mapping and review of research gaps. Informatics for Health and Social Care 2023;48(1):30 View
- Baillette P, Barlette Y, Berthevas J. Benefits and Risks of Shadow IT in Health Care: A Narrative Review of the Literature. Systèmes d'information & management 2022;Volume 27(2):59 View
- Ritenour E. Hacking and Artificial Intelligence in Radiology: Basic Principles of Data Integrity and Security. Contemporary Diagnostic Radiology 2023;46(5):1 View
- He Y, Zamani E, Yevseyeva I, Luo C. Artificial Intelligence–Based Ethical Hacking for Health Information Systems: Simulation Study. Journal of Medical Internet Research 2023;25:e41748 View
- Tan T, Li Y, Lim J, Gunasekeran D, Teo Z, Ng W, Ting D. Metaverse and Virtual Health Care in Ophthalmology: Opportunities and Challenges. Asia-Pacific Journal of Ophthalmology 2022;11(3):237 View
- Prictor M, Rychkova M. Recording our genes: Stakeholder views on genetic test results in networked electronic medical records. Health Information Management Journal 2022:183335832210909 View
- Benis A, Grosjean J, Billey K, Montanha G, Dornauer V, Crișan-Vida M, Hackl W, Stoicu-Tivadar L, Darmoni S. Medical informatics and digital health multilingual ontology (MIMO): A tool to improve international collaborations. International Journal of Medical Informatics 2022;167:104860 View
- Alhuwail D, Al-Jafar E, Abdulsalam Y, AlDuaij S. Information Security Awareness and Behaviors of Health Care Professionals at Public Health Care Facilities. Applied Clinical Informatics 2021;12(04):924 View
- Beaulieu E, Spanjaart A, Roes A, Rachet B, Dalle S, Kersten M, Maucort-Boulch D, Jalali M. Health-related quality of life in cancer immunotherapy: a systematic perspective, using causal loop diagrams. Quality of Life Research 2022;31(8):2357 View
- Shrivastava U, Hazarika B, Rea A. Restoring clinical information system operations post data disaster: the role of IT investment, integration and interoperability. Industrial Management & Data Systems 2021;121(12):2672 View
- Zhou Q, Zuley M, Guo Y, Yang L, Nair B, Vargo A, Ghannam S, Arefan D, Wu S. A machine and human reader study on AI diagnosis model safety under attacks of adversarial images. Nature Communications 2021;12(1) View
- Mosch L, Poncette A, Spies C, Weber-Carstens S, Schieler M, Krampe H, Balzer F. Creation of an Evidence-Based Implementation Framework for Digital Health Technology in the Intensive Care Unit: Qualitative Study. JMIR Formative Research 2022;6(4):e22866 View
- Ahmed M, Sindi H, Nour M. Cybersecurity in Hospitals: An Evaluation Model. Journal of Cybersecurity and Privacy 2022;2(4):853 View
- Barbaria S, Mont M, Ghadafi E, Mahjoubi Machraoui H, Rahmouni H. Leveraging Patient Information Sharing Using Blockchain-Based Distributed Networks. IEEE Access 2022;10:106334 View
- Argyridou E, Nifakos S, Laoudias C, Panta S, Panaousis E, Chandramouli K, Navarro-Llobet D, Zamorano J, Papachristou P, Bonacina S. Cyber Hygiene Methodology for Raising Cybersecurity and Data Privacy Awareness in Healthcare Organisations (Preprint). Journal of Medical Internet Research 2022 View
- Fernandez De Arroyabe I, Arranz C, Arroyabe M, Fernandez de Arroyabe J. Cybersecurity capabilities and cyber-attacks as drivers of investment in cybersecurity systems: A UK survey for 2018 and 2019. Computers & Security 2023;124:102954 View
- Lee I. An analysis of data breaches in the U.S. healthcare industry: diversity, trends, and risk profiling. Information Security Journal: A Global Perspective 2022;31(3):346 View
- Maheshwari A, Mantry H. Quantum Cryptography for Securing Personal Health Information in Hospitals. Newborn 2022;1(4):333 View
- Gioulekas F, Stamatiadis E, Tzikas A, Gounaris K, Georgiadou A, Michalitsi-Psarrou A, Doukas G, Kontoulis M, Nikoloudakis Y, Marin S, Cabecinha R, Ntanos C. A Cybersecurity Culture Survey Targeting Healthcare Critical Infrastructures. Healthcare 2022;10(2):327 View
- Javaid M, Haleem A, Singh R, Suman R. Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends. Cyber Security and Applications 2023;1:100016 View
- Puder A, Henle J, Sax E. Threat Assessment and Risk Analysis (TARA) for Interoperable Medical Devices in the Operating Room Inspired by the Automotive Industry. Healthcare 2023;11(6):872 View
- Russell S, Fahey E, Curtin M, Rowley S, Kenny P, Cashman J. The Irish National Orthopaedic Register Under Cyberattack: What Happened, and What Were the Consequences?. Clinical Orthopaedics & Related Research 2023;Publish Ahead of Print View
- Giovannoni G, Alvarez E, Tutton E, Hoffmann O, Xu Y, Vermersch P, Oreja-Guevara C, Trojano M, Gold R, Robles-Cedeño R, Khwaja M, Stadler B, Vandercappellen J, Ziemssen T. Development and usability testing of your MS questionnaire: A patient-based digital tool to monitor symptoms of multiple sclerosis. DIGITAL HEALTH 2023;9:205520762311735 View
- Portela D, Nogueira Leite D, Almeida R, Cruz-Correia R. Hospital cyber-attack economic impact: a descriptive case study on the Portuguese National Health System (Preprint). JMIR Formative Research 2022 View
- Kulkov I, Ivanova-Gongne M, Bertello A, Makkonen H, Kulkova J, Rohrbeck R, Ferraris A. Technology entrepreneurship in healthcare: Challenges and opportunities for value creation. Journal of Innovation & Knowledge 2023;8(2):100365 View
Books/Policy Documents
- Lelis C, de Oliveira Filho S, Marcondes C. 17th International Conference on Information Technology–New Generations (ITNG 2020). View
- Alsubaei F, Abuhussein A, Shiva S. Proceedings of the Future Technologies Conference (FTC) 2018. View
- Sagay A, Jahankhani H. Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity. View
- Reichman B, Jing L, Akin O, Tian Y. Pattern Recognition. ICPR International Workshops and Challenges. View
- Arun Kumar B. Computer Networks and Inventive Communication Technologies. View
- Jara H, Navarro H, Armas-Aguirre J. Proceedings of the 6th Brazilian Technology Symposium (BTSym’20). View
- Medhekar A. Handbook of Research on Advancing Cybersecurity for Digital Transformation. View
- Parlakkılıç A. Blockchain Technologies and Applications for Digital Governance. View
- Medhekar A. Research Anthology on Securing Medical Systems and Records. View
- McConomy B, Leber D. Clinical Informatics Study Guide. View
- Hamid O, Abduljabbar R, Dawood A, Naghmash M, Alhyani N. Proceedings of the 2nd International Conference on Emerging Technologies and Intelligent Systems. View
- Jayapradha J, Prakash M. Sustainable Advanced Computing. View
- Quimiz-Moreira M, Zambrano-Romero W, Moreira-Zambrano C, Mendoza-Zambrano M, Cedeño-Palma E. Trends in Artificial Intelligence and Computer Engineering. View
- Kaberuka J, Johnson C. Intelligent Sustainable Systems. View
- Mwim E, Mtsweni J. Human Aspects of Information Security and Assurance. View
- Kure H, Nwajana A. 5G Internet of Things and Changing Standards for Computing and Electronic Systems. View
- Richardson K, Burrell D, Mingo H, Ferreras-Perez J, Shen P, Muller S, Bessette D, Khanta K. Handbook of Research on Cybersecurity Risk in Contemporary Business Systems. View
- Kushnikova E, Petrov V, Rezchikov A, Kusheleva E, Bogomolov A, Dranko O. Artificial Intelligence in Models, Methods and Applications. View