Published on in Vol 20 , No 5 (2018) :May

Preprints (earlier versions) of this paper are available at, first published .
Cybersecurity in Hospitals: A Systematic, Organizational Perspective

Cybersecurity in Hospitals: A Systematic, Organizational Perspective

Cybersecurity in Hospitals: A Systematic, Organizational Perspective

Authors of this article:

Mohammad S Jalali 1 Author Orcid Image ;   Jessica P Kaiser 1 Author Orcid Image


  1. Ghafur S, Kristensen S, Honeyford K, Martin G, Darzi A, Aylin P. A retrospective impact analysis of the WannaCry cyberattack on the NHS. npj Digital Medicine 2019;2(1) View
  2. Darabi N, Hosseinichimeh N. System dynamics modeling in health and medicine: a systematic literature review. System Dynamics Review 2020;36(1):29 View
  3. Jalali M, Bruckes M, Westmattelmann D, Schewe G. Why Employees (Still) Click on Phishing Links: An Investigation in Hospitals. SSRN Electronic Journal 2019 View
  4. Mishah N, Bukhari A, AlMutairi B, Mohreq M. Status of e-security and privacy protection in Saudi hospitals. Computer Methods and Programs in Biomedicine 2019;171:5 View
  5. Barad M. Linking Cyber Security Improvement Actions in Healthcare Systems to Their Strategic Improvement Needs. Procedia Manufacturing 2019;39:279 View
  6. Gordon W, Wright A, Aiyagari R, Corbo L, Glynn R, Kadakia J, Kufahl J, Mazzone C, Noga J, Parkulo M, Sanford B, Scheib P, Landman A. Assessment of Employee Susceptibility to Phishing Attacks at US Health Care Institutions. JAMA Network Open 2019;2(3):e190393 View
  7. Jalali M, Siegel M, Madnick S. Decision Making and Biases in Cybersecurity Capability Development: Evidence from a Simulation Game Experiment. SSRN Electronic Journal 2017 View
  8. Offner K, Sitnikova E, Joiner K, MacIntyre C. Towards understanding cybersecurity capability in Australian healthcare organisations: a systematic review of recent trends, threats and mitigation. Intelligence and National Security 2020;35(4):556 View
  9. Jalali M, Russell B, Razak S, Gordon W. EARS to cyber incidents in health care. Journal of the American Medical Informatics Association 2019;26(1):81 View
  10. Karampela M, Ouhbi S, Isomursu M. Connected Health User Willingness to Share Personal Health Data: Questionnaire Study. Journal of Medical Internet Research 2019;21(11):e14537 View
  11. Jalali M, Kaiser J, Siegel M, Madnick S. The Internet of Things Promises New Benefits and Risks: A Systematic Analysis of Adoption Dynamics of IoT Products. IEEE Security & Privacy 2019;17(2):39 View
  12. Billingsley L. Cybersmart: Protect the Patient, Protect the Data. Journal of Radiology Nursing 2019;38(4):261 View
  13. Zerka F, Barakat S, Walsh S, Bogowicz M, Leijenaar R, Jochems A, Miraglio B, Townend D, Lambin P. Systematic Review of Privacy-Preserving Distributed Machine Learning From Federated Databases in Health Care. JCO Clinical Cancer Informatics 2020;(4):184 View
  14. Jalali M, Razak S, Gordon W, Perakslis E, Madnick S. Health Care and Cybersecurity: A Bibliometric Analysis of the Literature. SSRN Electronic Journal 2018 View
  15. Jalali M, Siegel M, Madnick S. Decision-making and biases in cybersecurity capability development: Evidence from a simulation game experiment. The Journal of Strategic Information Systems 2019;28(1):66 View
  16. Jalali M, Bruckes M, Westmattelmann D, Schewe G. Why Employees (Still) Click on Phishing Links: An Investigation in Hospitals. Journal of Medical Internet Research 2020;22(1):e16775 View
  17. Jalali M, Razak S, Gordon W, Perakslis E, Madnick S. Health Care and Cybersecurity: Bibliometric Analysis of the Literature. Journal of Medical Internet Research 2019;21(2):e12644 View
  18. de Gooyert V, Größler A. On the differences between theoretical and applied system dynamics modeling. System Dynamics Review 2018;34(4):575 View
  19. Alsubaei F, Abuhussein A, Shiva S. Ontology-Based Security Recommendation for the Internet of Medical Things. IEEE Access 2019;7:48948 View
  20. Le Bris A, Mazille-Orfanos N, Simonot P, Luherne M, Flamant C, Gascoin G, ÓLaighin G, Harte R, Pladys P. Parents’ and healthcare professionals’ perceptions of the use of live video recording in neonatal units: a focus group study. BMC Pediatrics 2020;20(1) View
  21. Yesmin T, Carter M. Evaluation framework for automatic privacy auditing tools for hospital data breach detections: A case study. International Journal of Medical Informatics 2020;138:104123 View
  22. Li P, Luo Y, Yu X, Wen J, Mason E, Li W, Jalali M. Patients’ Perceptions of Barriers and Facilitators to the Adoption of E-Hospitals: Cross-Sectional Study in Western China. Journal of Medical Internet Research 2020;22(6):e17221 View
  23. Li P, Luo Y, Yu X, Zeng Z, Jin W, Mason E, Li W, Jalali M. Readiness of Healthcare Providers for e-Hospitals: Cross-sectional Analysis in China. SSRN Electronic Journal 2020 View
  24. Ghafur S, Grass E, Jennings N, Darzi A. The challenges of cybersecurity in health care: the UK National Health Service as a case study. The Lancet Digital Health 2019;1(1):e10 View
  25. Rangabashyam M, Wee H, Wang W, Mueller S, Karim K, Skanthakumar T, Hariraman B, Sommat K, Soong Y, Chua M, Tay G, Tan N, Tan H, Iyer N. Electronic tumor board presentations as the basis for the development of a head and neck cancer database. Laryngoscope Investigative Otolaryngology 2020;5(1):46 View
  26. Tully J, Selzer J, Phillips J, O'Connor P, Dameff C. Healthcare Challenges in the Era of Cybersecurity. Health Security 2020;18(3):228 View
  27. Wani T, Mendoza A, Gray K. Hospital Bring-Your-Own-Device Security Challenges and Solutions: Systematic Review of Gray Literature. JMIR mHealth and uHealth 2020;8(6):e18175 View
  28. Singh B, Singh N. MoLaBSS: Server-Specific Add-On Biometric Security Layer Model to Enhance the Usage of Biometrics. Information 2020;11(6):308 View
  29. Cronin A, Carlile M, Dameff C, Coyne C, Castillo E. Leveraging Remote Research Associates During a Pandemic. Western Journal of Emergency Medicine 2020;21(5) View
  30. Gunasekeran D, Tham Y, Ting D, Tan G, Wong T. Digital health during COVID-19: lessons from operationalising new models of care in ophthalmology. The Lancet Digital Health 2021;3(2):e124 View
  31. O'Brien N, Martin G, Grass E, Durkin M, Darzi A, Ghafur S. Cybersecurity in Healthcare: Comparing Cybersecurity Maturity and Experiences Across Global Healthcare Organizations. SSRN Electronic Journal 2020 View
  32. He Y, Aliyu A, Evans M, Luo C. Health Care Cybersecurity Challenges and Solutions Under the Climate of COVID-19: Scoping Review. Journal of Medical Internet Research 2021;23(4):e21747 View
  33. Maggio L, Dameff C, Kanter S, Woods B, Tully J. Cybersecurity Challenges and the Academic Health Center: An Interactive Tabletop Simulation for Executives. Academic Medicine 2021;96(6):850 View
  34. Lambraki I, Majowicz S, Parmley E, Wernli D, Léger A, Graells T, Cousins M, Harbarth S, Carson C, Henriksson P, Troell M, Jørgensen P. Building Social-Ecological System Resilience to Tackle Antimicrobial Resistance Across the One Health Spectrum: Protocol for a Mixed Methods Study. JMIR Research Protocols 2021;10(6):e24378 View
  35. Ma X, Shi W. AESMOTE: Adversarial Reinforcement Learning With SMOTE for Anomaly Detection. IEEE Transactions on Network Science and Engineering 2021;8(2):943 View
  36. Jofre M, Navarro-Llobet D, Agulló R, Puig J, Gonzalez-Granadillo G, Mora Zamorano J, Romeu R. Cybersecurity and Privacy Risk Assessment of Point-of-Care Systems in Healthcare—A Use Case Approach. Applied Sciences 2021;11(15):6699 View
  37. Nifakos S, Chandramouli K, Nikolaou C, Papachristou P, Koch S, Panaousis E, Bonacina S. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review. Sensors 2021;21(15):5119 View
  38. Choi S, Johnson M. The relationship between cybersecurity ratings and the risk of hospital data breaches. Journal of the American Medical Informatics Association 2021;28(10):2085 View
  39. Dovleac R. Assessing the Level of Cybersecurity Knowledge of Computer Science and Applied Automation Undergraduates. WSEAS TRANSACTIONS ON ADVANCES in ENGINEERING EDUCATION 2022;19:127 View
  40. Ahouanmenou S, Van Looy A, Poels G. Information security and privacy in hospitals: a literature mapping and review of research gaps. Informatics for Health and Social Care 2023;48(1):30 View
  41. Baillette P, Barlette Y, Berthevas J. Benefits and Risks of Shadow IT in Health Care: A Narrative Review of the Literature. Systèmes d'information & management 2022;Volume 27(2):59 View
  42. Ritenour E. Hacking and Artificial Intelligence in Radiology: Basic Principles of Data Integrity and Security. Contemporary Diagnostic Radiology 2023;46(5):1 View
  43. He Y, Zamani E, Yevseyeva I, Luo C. Artificial Intelligence–Based Ethical Hacking for Health Information Systems: Simulation Study. Journal of Medical Internet Research 2023;25:e41748 View
  44. Tan T, Li Y, Lim J, Gunasekeran D, Teo Z, Ng W, Ting D. Metaverse and Virtual Health Care in Ophthalmology: Opportunities and Challenges. Asia-Pacific Journal of Ophthalmology 2022;11(3):237 View
  45. Prictor M, Rychkova M. Recording our genes: Stakeholder views on genetic test results in networked electronic medical records. Health Information Management Journal 2022:183335832210909 View
  46. Benis A, Grosjean J, Billey K, Montanha G, Dornauer V, Crișan-Vida M, Hackl W, Stoicu-Tivadar L, Darmoni S. Medical informatics and digital health multilingual ontology (MIMO): A tool to improve international collaborations. International Journal of Medical Informatics 2022;167:104860 View
  47. Alhuwail D, Al-Jafar E, Abdulsalam Y, AlDuaij S. Information Security Awareness and Behaviors of Health Care Professionals at Public Health Care Facilities. Applied Clinical Informatics 2021;12(04):924 View
  48. Beaulieu E, Spanjaart A, Roes A, Rachet B, Dalle S, Kersten M, Maucort-Boulch D, Jalali M. Health-related quality of life in cancer immunotherapy: a systematic perspective, using causal loop diagrams. Quality of Life Research 2022;31(8):2357 View
  49. Shrivastava U, Hazarika B, Rea A. Restoring clinical information system operations post data disaster: the role of IT investment, integration and interoperability. Industrial Management & Data Systems 2021;121(12):2672 View
  50. Zhou Q, Zuley M, Guo Y, Yang L, Nair B, Vargo A, Ghannam S, Arefan D, Wu S. A machine and human reader study on AI diagnosis model safety under attacks of adversarial images. Nature Communications 2021;12(1) View
  51. Mosch L, Poncette A, Spies C, Weber-Carstens S, Schieler M, Krampe H, Balzer F. Creation of an Evidence-Based Implementation Framework for Digital Health Technology in the Intensive Care Unit: Qualitative Study. JMIR Formative Research 2022;6(4):e22866 View
  52. Ahmed M, Sindi H, Nour M. Cybersecurity in Hospitals: An Evaluation Model. Journal of Cybersecurity and Privacy 2022;2(4):853 View
  53. Barbaria S, Mont M, Ghadafi E, Mahjoubi Machraoui H, Rahmouni H. Leveraging Patient Information Sharing Using Blockchain-Based Distributed Networks. IEEE Access 2022;10:106334 View
  54. Argyridou E, Nifakos S, Laoudias C, Panta S, Panaousis E, Chandramouli K, Navarro-Llobet D, Zamorano J, Papachristou P, Bonacina S. Cyber Hygiene Methodology for Raising Cybersecurity and Data Privacy Awareness in Healthcare Organisations (Preprint). Journal of Medical Internet Research 2022 View
  55. Fernandez De Arroyabe I, Arranz C, Arroyabe M, Fernandez de Arroyabe J. Cybersecurity capabilities and cyber-attacks as drivers of investment in cybersecurity systems: A UK survey for 2018 and 2019. Computers & Security 2023;124:102954 View
  56. Lee I. An analysis of data breaches in the U.S. healthcare industry: diversity, trends, and risk profiling. Information Security Journal: A Global Perspective 2022;31(3):346 View
  57. Maheshwari A, Mantry H. Quantum Cryptography for Securing Personal Health Information in Hospitals. Newborn 2022;1(4):333 View
  58. Gioulekas F, Stamatiadis E, Tzikas A, Gounaris K, Georgiadou A, Michalitsi-Psarrou A, Doukas G, Kontoulis M, Nikoloudakis Y, Marin S, Cabecinha R, Ntanos C. A Cybersecurity Culture Survey Targeting Healthcare Critical Infrastructures. Healthcare 2022;10(2):327 View
  59. Javaid M, Haleem A, Singh R, Suman R. Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends. Cyber Security and Applications 2023;1:100016 View
  60. Puder A, Henle J, Sax E. Threat Assessment and Risk Analysis (TARA) for Interoperable Medical Devices in the Operating Room Inspired by the Automotive Industry. Healthcare 2023;11(6):872 View
  61. Russell S, Fahey E, Curtin M, Rowley S, Kenny P, Cashman J. The Irish National Orthopaedic Register Under Cyberattack: What Happened, and What Were the Consequences?. Clinical Orthopaedics & Related Research 2023;Publish Ahead of Print View
  62. Giovannoni G, Alvarez E, Tutton E, Hoffmann O, Xu Y, Vermersch P, Oreja-Guevara C, Trojano M, Gold R, Robles-Cedeño R, Khwaja M, Stadler B, Vandercappellen J, Ziemssen T. Development and usability testing of your MS questionnaire: A patient-based digital tool to monitor symptoms of multiple sclerosis. DIGITAL HEALTH 2023;9:205520762311735 View
  63. Portela D, Nogueira Leite D, Almeida R, Cruz-Correia R. Hospital cyber-attack economic impact: a descriptive case study on the Portuguese National Health System (Preprint). JMIR Formative Research 2022 View
  64. Kulkov I, Ivanova-Gongne M, Bertello A, Makkonen H, Kulkova J, Rohrbeck R, Ferraris A. Technology entrepreneurship in healthcare: Challenges and opportunities for value creation. Journal of Innovation & Knowledge 2023;8(2):100365 View

Books/Policy Documents

  1. Lelis C, de Oliveira Filho S, Marcondes C. 17th International Conference on Information Technology–New Generations (ITNG 2020). View
  2. Alsubaei F, Abuhussein A, Shiva S. Proceedings of the Future Technologies Conference (FTC) 2018. View
  3. Sagay A, Jahankhani H. Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity. View
  4. Reichman B, Jing L, Akin O, Tian Y. Pattern Recognition. ICPR International Workshops and Challenges. View
  5. Arun Kumar B. Computer Networks and Inventive Communication Technologies. View
  6. Jara H, Navarro H, Armas-Aguirre J. Proceedings of the 6th Brazilian Technology Symposium (BTSym’20). View
  7. Medhekar A. Handbook of Research on Advancing Cybersecurity for Digital Transformation. View
  8. Parlakkılıç A. Blockchain Technologies and Applications for Digital Governance. View
  9. Medhekar A. Research Anthology on Securing Medical Systems and Records. View
  10. McConomy B, Leber D. Clinical Informatics Study Guide. View
  11. Hamid O, Abduljabbar R, Dawood A, Naghmash M, Alhyani N. Proceedings of the 2nd International Conference on Emerging Technologies and Intelligent Systems. View
  12. Jayapradha J, Prakash M. Sustainable Advanced Computing. View
  13. Quimiz-Moreira M, Zambrano-Romero W, Moreira-Zambrano C, Mendoza-Zambrano M, Cedeño-Palma E. Trends in Artificial Intelligence and Computer Engineering. View
  14. Kaberuka J, Johnson C. Intelligent Sustainable Systems. View
  15. Mwim E, Mtsweni J. Human Aspects of Information Security and Assurance. View
  16. Kure H, Nwajana A. 5G Internet of Things and Changing Standards for Computing and Electronic Systems. View
  17. Richardson K, Burrell D, Mingo H, Ferreras-Perez J, Shen P, Muller S, Bessette D, Khanta K. Handbook of Research on Cybersecurity Risk in Contemporary Business Systems. View
  18. Kushnikova E, Petrov V, Rezchikov A, Kusheleva E, Bogomolov A, Dranko O. Artificial Intelligence in Models, Methods and Applications. View