Maintenance Notice

Due to necessary scheduled maintenance, the JMIR Publications website will be unavailable from Wednesday, July 01, 2020 at 8:00 PM to 10:00 PM EST. We apologize in advance for any inconvenience this may cause you.

Who will be affected?

Citing this Article

Right click to copy or hit: ctrl+c (cmd+c on mac)

Published on 28.05.18 in Vol 20, No 5 (2018): May

This paper is in the following e-collection/theme issue:

Works citing "Cybersecurity in Hospitals: A Systematic, Organizational Perspective"

According to Crossref, the following articles are citing this article (DOI 10.2196/10059):

(note that this is only a small subset of citations)

  1. Rangabashyam M, Wee HE, Wang W, Mueller S, Karim KABA, Skanthakumar T, Hariraman B, Sommat K, Soong Y, Chua MLK, Tay G, Tan N, Tan HK, Iyer NG. Electronic tumor board presentations as the basis for the development of a head and neck cancer database. Laryngoscope Investigative Otolaryngology 2020;5(1):46
    CrossRef
  2. Darabi N, Hosseinichimeh N. System dynamics modeling in health and medicine: a systematic literature review. System Dynamics Review 2020;36(1):29
    CrossRef
  3. Li P, Luo Y, Yu X, Zeng Z, Jin W, Mason E, Li W, Jalali M. Readiness of Healthcare Providers for e-Hospitals: Cross-sectional Analysis in China. SSRN Electronic Journal 2020;
    CrossRef
  4. Li P, Luo Y, Yu X, Wen J, Mason E, Li W, Jalali MS. Patients’ Perceptions of Barriers and Facilitators to the Adoption of E-Hospitals: Cross-Sectional Study in Western China. Journal of Medical Internet Research 2020;22(6):e17221
    CrossRef
  5. Yesmin T, Carter MW. Evaluation framework for automatic privacy auditing tools for hospital data breach detections: A case study. International Journal of Medical Informatics 2020;138:104123
    CrossRef
  6. Le Bris A, Mazille-Orfanos N, Simonot P, Luherne M, Flamant C, Gascoin G, ÓLaighin G, Harte R, Pladys P. Parents’ and healthcare professionals’ perceptions of the use of live video recording in neonatal units: a focus group study. BMC Pediatrics 2020;20(1)
    CrossRef
  7. Singh B, Singh N. MoLaBSS: Server-Specific Add-On Biometric Security Layer Model to Enhance the Usage of Biometrics. Information 2020;11(6):308
    CrossRef
  8. Jalali MS, Bruckes M, Westmattelmann D, Schewe G. Why Employees (Still) Click on Phishing Links: An Investigation in Hospitals. Journal of Medical Internet Research 2020;22(1):e16775
    CrossRef
  9. Zerka F, Barakat S, Walsh S, Bogowicz M, Leijenaar RTH, Jochems A, Miraglio B, Townend D, Lambin P. Systematic Review of Privacy-Preserving Distributed Machine Learning From Federated Databases in Health Care. JCO Clinical Cancer Informatics 2020;(4):184
    CrossRef
  10. Wani TA, Mendoza A, Gray K. Hospital Bring-Your-Own-Device Security Challenges and Solutions: Systematic Review of Gray Literature. JMIR mHealth and uHealth 2020;8(6):e18175
    CrossRef
  11. Offner KL, Sitnikova E, Joiner K, MacIntyre CR. Towards understanding cybersecurity capability in Australian healthcare organisations: a systematic review of recent trends, threats and mitigation. Intelligence and National Security 2020;35(4):556
    CrossRef
  12. Tully J, Selzer J, Phillips JP, O'Connor P, Dameff C. Healthcare Challenges in the Era of Cybersecurity. Health Security 2020;18(3):228
    CrossRef
  13. Gordon WJ, Wright A, Aiyagari R, Corbo L, Glynn RJ, Kadakia J, Kufahl J, Mazzone C, Noga J, Parkulo M, Sanford B, Scheib P, Landman AB. Assessment of Employee Susceptibility to Phishing Attacks at US Health Care Institutions. JAMA Network Open 2019;2(3):e190393
    CrossRef
  14. Ghafur S, Grass E, Jennings NR, Darzi A. The challenges of cybersecurity in health care: the UK National Health Service as a case study. The Lancet Digital Health 2019;1(1):e10
    CrossRef
  15. Jalali M, Bruckes M, Westmattelmann D, Schewe G. Why Employees (Still) Click on Phishing Links: An Investigation in Hospitals. SSRN Electronic Journal 2019;
    CrossRef
  16. Mishah N, Bukhari A, AlMutairi B, Mohreq M. Status of e-security and privacy protection in Saudi hospitals. Computer Methods and Programs in Biomedicine 2019;171:5
    CrossRef
  17. Barad M. Linking Cyber Security Improvement Actions in Healthcare Systems to Their Strategic Improvement Needs. Procedia Manufacturing 2019;39:279
    CrossRef
  18. Alsubaei F, Abuhussein A, Shiva S. Ontology-Based Security Recommendation for the Internet of Medical Things. IEEE Access 2019;7:48948
    CrossRef
  19. Jalali MS, Razak S, Gordon W, Perakslis E, Madnick S. Health Care and Cybersecurity: Bibliometric Analysis of the Literature. Journal of Medical Internet Research 2019;21(2):e12644
    CrossRef
  20. Jalali MS, Russell B, Razak S, Gordon WJ. EARS to cyber incidents in health care. Journal of the American Medical Informatics Association 2019;26(1):81
    CrossRef
  21. Jalali MS, Siegel M, Madnick S. Decision-making and biases in cybersecurity capability development: Evidence from a simulation game experiment. The Journal of Strategic Information Systems 2019;28(1):66
    CrossRef
  22. Billingsley L. Cybersmart: Protect the Patient, Protect the Data. Journal of Radiology Nursing 2019;38(4):261
    CrossRef
  23. Jalali MS, Kaiser JP, Siegel M, Madnick S. The Internet of Things Promises New Benefits and Risks: A Systematic Analysis of Adoption Dynamics of IoT Products. IEEE Security & Privacy 2019;17(2):39
    CrossRef
  24. Karampela M, Ouhbi S, Isomursu M. Connected Health User Willingness to Share Personal Health Data: Questionnaire Study. Journal of Medical Internet Research 2019;21(11):e14537
    CrossRef
  25. Ghafur S, Kristensen S, Honeyford K, Martin G, Darzi A, Aylin P. A retrospective impact analysis of the WannaCry cyberattack on the NHS. npj Digital Medicine 2019;2(1)
    CrossRef
  26. de Gooyert V, Größler A. On the differences between theoretical and applied system dynamics modeling. System Dynamics Review 2018;34(4):575
    CrossRef
  27. Jalali M, Razak S, Gordon W, Perakslis E, Madnick SE. Health Care and Cybersecurity: A Bibliometric Analysis of the Literature. SSRN Electronic Journal 2018;
    CrossRef
  28. Jalali MS, Siegel M, Madnick S. Decision Making and Biases in Cybersecurity Capability Development: Evidence from a Simulation Game Experiment. SSRN Electronic Journal 2017;
    CrossRef

According to Crossref, the following books are citing this article (DOI 10.2196/10059)

:
  1. Lelis CAS, de Oliveira Filho SRA, Marcondes CAC. 17th International Conference on Information Technology–New Generations (ITNG 2020). 2020. Chapter 62:469
    CrossRef
  2. Sagay A, Jahankhani H. Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity. 2020. Chapter 6:95
    CrossRef
  3. Alsubaei F, Abuhussein A, Shiva S. Proceedings of the Future Technologies Conference (FTC) 2018. 2019. Chapter 17:205
    CrossRef