<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="review-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v21i2e12644</article-id>
      <article-id pub-id-type="pmid">30767908</article-id>
      <article-id pub-id-type="doi">10.2196/12644</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Review</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Review</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Health Care and Cybersecurity: Bibliometric Analysis of the Literature</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Eysenbach</surname>
            <given-names>Gunther</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Lynch</surname>
            <given-names>Paul</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Suleder</surname>
            <given-names>Julian</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="author" id="contrib1" corresp="yes">
          <name name-style="western">
            <surname>Jalali</surname>
            <given-names>Mohammad S</given-names>
          </name>
          <degrees>MS, PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>MGH Institute for Technology Assessment</institution>
            <institution>Harvard Medical School</institution>
            <addr-line>101 Merrimac Street, Suite 1010</addr-line>
            <addr-line>Boston, MA, 02114</addr-line>
            <country>United States</country>
            <phone>1 617 724 3738</phone>
            <email>msjalali@mgh.harvard.edu</email>
          </address>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0001-6769-2732</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib2">
          <name name-style="western">
            <surname>Razak</surname>
            <given-names>Sabina</given-names>
          </name>
          <degrees>BSc</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-4622-2771</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib3">
          <name name-style="western">
            <surname>Gordon</surname>
            <given-names>William</given-names>
          </name>
          <degrees>MD</degrees>
          <xref rid="aff3" ref-type="aff">3</xref>
          <xref rid="aff4" ref-type="aff">4</xref>
          <xref rid="aff5" ref-type="aff">5</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-6975-3225</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib4">
          <name name-style="western">
            <surname>Perakslis</surname>
            <given-names>Eric</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff6" ref-type="aff">6</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0003-2395-810X</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib5">
          <name name-style="western">
            <surname>Madnick</surname>
            <given-names>Stuart</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0001-9240-2573</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
      <label>1</label>
      <institution>MGH Institute for Technology Assessment</institution>
      <institution>Harvard Medical School</institution>  
      <addr-line>Boston, MA</addr-line>
      <country>United States</country></aff>
      <aff id="aff2">
      <label>2</label>
      <institution>Sloan School of Management</institution>
      <institution>Massachusetts Institute of Technology</institution>  
      <addr-line>Cambridge, MA</addr-line>
      <country>United States</country></aff>
      <aff id="aff3">
      <label>3</label>
      <institution>Division of General Internal Medicine</institution>
      <institution>Department of Medicine</institution>  
      <institution>Brigham &amp; Women’s Hospital</institution>  
      <addr-line>Boston, MA</addr-line>
      <country>United States</country></aff>
      <aff id="aff4">
        <label>4</label>
        <institution>Partners Healthcare</institution>
        <addr-line>Boston, MA</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff5">
      <label>5</label>
      <institution>Department of Dermatology</institution>
      <institution>Harvard Medical School</institution>  
      <addr-line>Boston, MA</addr-line>
      <country>United States</country></aff>
      <aff id="aff6">
      <label>6</label>
      <institution>Department of Biomedical Informatics</institution>
      <institution>Harvard Medical School</institution>  
      <addr-line>Boston, MA</addr-line>
      <country>United States</country></aff>
      <author-notes>
        <corresp>Corresponding Author: Mohammad S Jalali 
        <email>msjalali@mgh.harvard.edu</email></corresp>
      </author-notes>
      <pub-date pub-type="collection"><month>02</month><year>2019</year></pub-date>
      <pub-date pub-type="epub">
        <day>15</day>
        <month>02</month>
        <year>2019</year>
      </pub-date>
      <volume>21</volume>
      <issue>2</issue>
      <elocation-id>e12644</elocation-id>
      <!--history from ojs - api-xml-->
      <history>
        <date date-type="received">
          <day>31</day>
          <month>10</month>
          <year>2018</year>
        </date>
        <date date-type="rev-request">
          <day>22</day>
          <month>11</month>
          <year>2018</year>
        </date>
        <date date-type="rev-recd">
          <day>27</day>
          <month>11</month>
          <year>2018</year>
        </date>
        <date date-type="accepted">
          <day>29</day>
          <month>11</month>
          <year>2018</year>
        </date>
      </history>
      <copyright-statement>©Mohammad S Jalali, Sabina Razak, William Gordon, Eric Perakslis, Stuart Madnick. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 15.02.2019.</copyright-statement>
      <copyright-year>2019</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on http://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://www.jmir.org/2019/2/e12644/" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Over the past decade, clinical care has become globally dependent on information technology. The cybersecurity of health care information systems is now an essential component of safe, reliable, and effective health care delivery.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>The objective of this study was to provide an overview of the literature at the intersection of cybersecurity and health care delivery.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>A comprehensive search was conducted using PubMed and Web of Science for English-language peer-reviewed articles. We carried out chronological analysis, domain clustering analysis, and text analysis of the included articles to generate a high-level concept map composed of specific words and the connections between them.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>Our final sample included 472 English-language journal articles. Our review results revealed that majority of the articles were focused on technology: Technology–focused articles made up more than half of all the clusters, whereas managerial articles accounted for only 32% of all clusters. This finding suggests that nontechnological variables (human–based and organizational aspects, strategy, and management) may be understudied. In addition, <italic>Software Development Security</italic>, <italic>Business Continuity</italic>, and <italic>Disaster Recovery Planning</italic> each accounted for 3% of the studied articles. Our results also showed that publications on <italic>Physical Security</italic> account for only 1% of the literature, and research in this area is lacking. Cyber vulnerabilities are not all digital; many physical threats contribute to breaches and potentially affect the physical safety of patients.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>Our results revealed an overall increase in research on cybersecurity and identified major gaps and opportunities for future work.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>bibliometric review</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>health care</kwd>
        <kwd>literature analysis</kwd>
        <kwd>text mining</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <p>Cybersecurity is an increasingly critical aspect of health care information technology infrastructure. The rapid digitization of health care delivery, from electronic health records and telehealth to mobile health (mHealth) and network-enabled medical devices, introduces risks related to cybersecurity vulnerabilities [<xref ref-type="bibr" rid="ref1">1</xref>]. These vulnerabilities are particularly worrisome because cyberattacks in a health care setting can result in the exposure of highly sensitive personal information or cause disruptions in clinical care [<xref ref-type="bibr" rid="ref2">2</xref>-<xref ref-type="bibr" rid="ref5">5</xref>]. Cyberattacks may also affect the safety of patients, for example, by compromising the integrity of data or impairing medical device functionality. The WannaCry and NotPetya ransomware attacks and vulnerabilities in Medtronic Implantable Cardiac Device Programmers are recent examples that have resulted in impaired health care delivery capabilities [<xref ref-type="bibr" rid="ref6">6</xref>].</p>
      <p>Health care organizations are particularly vulnerable to cyber threats. Verizon’s 2018 Data Breach Investigation Report found that the health care field, in general, was most affected by data breaches, which accounted for 24% of all investigated breaches across all industries [<xref ref-type="bibr" rid="ref7">7</xref>]. Additionally, a report by the Ponemon Institute found that almost 90% of respondents (involved in health plans and health care clearing houses as well as health care providers with electronic health records) experienced a data breach in the past 2 years [<xref ref-type="bibr" rid="ref8">8</xref>]. Another survey of health care information security professionals revealed that over 75% of health care organizations experienced a recent security incident [<xref ref-type="bibr" rid="ref9">9</xref>]. The causes are multifactorial, involving both technology and people, and human error and cultural factors play increasingly critical roles [<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref11">11</xref>]. Despite efforts to teach best-practice security behavior through training programs, recent surveys have revealed that one in five health care employees still write down their usernames and passwords on paper [<xref ref-type="bibr" rid="ref12">12</xref>].</p>
      <p>Given the increasing importance of cybersecurity for safe, effective, and reliable health care delivery, there is a need to provide an overview of the literature at the intersection of cybersecurity and health care. Recent systematic reviews synthesized insights from 31 articles on cyber threats in health care [<xref ref-type="bibr" rid="ref13">13</xref>] and aggregated strategies from 13 articles about responding to cyber incidents in health care organizations [<xref ref-type="bibr" rid="ref14">14</xref>]. In this study, we conducted a large bibliometric review of the literature and describe the current state of research on various aspects of cybersecurity in health care in order to not only understand current trends but also identify gaps and guide future research efforts toward improving the security of our health care systems.</p>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Study Eligibility Criteria</title>
        <p>A comprehensive search was conducted using PubMed and Web of Science (WoS) for English-language peer-reviewed articles. We identified search keywords by adopting terminologies in The National Initiative for Cybersecurity Careers and Studies [<xref ref-type="bibr" rid="ref15">15</xref>] and The British Standards Institution glossaries [<xref ref-type="bibr" rid="ref16">16</xref>]. The list of keywords used is as follows:</p>
        <p>WoS (journal articles, all years):</p>
        <disp-formula>“Health*” AND “Cybersecurity” OR “Cyber Security” OR “Cyber Attack*” OR “Cyber Crisis*” OR “Cyber Incident*” OR “Cyber Infrastructure*” OR “Cyber Operation*” OR “Cyber Risk*” OR “Cyber Threat*” OR “Cyberspace*” OR “Data Breach*” OR “Data Security*” OR “Firewall*” OR “Information Security*” OR “Information Systems Security*” OR “Information Technology Security*” OR “IT Security*” OR “Malware*” OR “Phishing*” OR “Ransomware*” OR “Security Incident*” OR “Information Assurance*”</disp-formula>
        <p>PubMed (journal articles, all years, abstract availability):</p>
        <disp-formula>“Cybersecurity” OR “Cyber Security” OR “Cyber Attack” OR “Cyber Crisis” OR “Cyber Incident” OR “Cyber Infrastructure” OR “Cyber Operation” OR “Cyber Risk” OR “Cyber Threat” OR “Cyberspace” OR “Data Breach” OR “Data Security” OR “Firewall” OR “Information Security” OR “Information Systems Security” OR “Information Technology Security” OR “IT Security” OR “Malware” OR “Phishing” OR “Ransomware” OR “Security Incident” OR “Information Assurance”.</disp-formula>
        <p>Keywords that widened the search results far beyond the scope were rejected. For example, “exploit” and “malicious” can be used in a cyber context, but are more commonly used in unrelated contexts that add noise to the search. Such terms were not included because of their contribution to an overwhelming amount of irrelevant results.</p>
        <p>We included articles published from the inception of PubMed in 1966 and WoS in 1900 to September 2017. Articles were excluded if they did not clearly focus on cybersecurity or health care or if they were reviews or meta-analyses. Inclusion and exclusion criteria were formulated prior to the preliminary title and abstract screening. The eligibility criteria were intentionally nonspecific to obtain a complete picture of the existing relevant research. To increase our confidence in the inclusion criteria, we conducted an initial pilot screening of 100 articles.</p>
      </sec>
      <sec>
        <title>Screening and Selection</title>
        <p>Screening of titles and abstracts was conducted using the software package Abstrackr [<xref ref-type="bibr" rid="ref17">17</xref>]. Full texts of the “maybe” articles were independently reviewed by two trained individuals to assess study eligibility. Disagreements about study inclusion were discussed until a consensus was reached. More details about our methodology are available in <xref ref-type="app" rid="app1">Multimedia Appendix 1</xref>.</p>
      </sec>
      <sec>
        <title>Chronological Clustering and Trend Analysis</title>
        <p>We performed chronological analysis of the number of articles published per year and the number of authors per article. We topically clustered articles using 10 security domains created by the International Information Systems Security Certification Consortium to categorize each article (<xref ref-type="app" rid="app1">Multimedia Appendix 1</xref>). Each clustered article was further categorized as technological, managerial, legal, or interdisciplinary (if it fell into more than three categories). Features of the included articles, such as the publishing journal and number of citations, were recorded.</p>
      </sec>
      <sec>
        <title>Text Analysis</title>
        <p>After analyzing all the titles and abstracts, we removed words with high frequencies that were common in research articles but were not specific to our subject (eg, “paper,” “using,” and “results”). In addition, we merged the plural forms with singular forms of the same word and merged “healthcare” and “health care” into “healthcare.” Subsequently, we created word clouds to visualize the word frequencies in titles and abstracts over time. Word frequency is represented by color and size, with darker, larger words representing higher occurrence.</p>
        <p>We then assessed text titles and abstracts to generate a high-level concept map composed of specific words and the connections between them by using the software package Leximancer text analytics (version 4.5; Leximancer Pty Ltd, Brisbane, Australia). The software started with an unsupervised machine learning approach to extract a network of meaning from the data and developed a heat map that visually illustrated the end results. The method, underpinned by a naive Bayesian co-occurrence metric, considers how often two words co-occur as well as how often they occur apart [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref19">19</xref>]. Heat maps consist of “themes” represented by bubbles and “concepts” represented by grey dots. Concepts can be equated to a list of similar terms coalescing into a monothematic idea, and themes are clusters of these concepts. The lines between dots suggest a strong connection between two concepts.</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Search Results</title>
        <p>The primary search on PubMed for papers containing terms pertaining to “cyber” yielded 1480 articles, and the search on WoS yielded 810 articles. After removing 310 duplicates, the titles and abstracts of 1980 articles were screened, which was facilitated by the Abstrackr software [<xref ref-type="bibr" rid="ref17">17</xref>]. Based on the inclusion criteria, 1262 articles were excluded in the first screening, reducing the results to 718 articles for full-text review. Eventually, a further screening removed additional articles to provide a final selection of 472 articles. <xref ref-type="fig" rid="figure1">Figure 1</xref> presents the search method and results.</p>
      </sec>
      <sec>
        <title>Chronological Clustering and Trend Analysis</title>
        <p><xref ref-type="fig" rid="figure2">Figure 2</xref> presents the overall trend of all publications over time, from 1985 to September 2017; the first included article was published in 1979 but was excluded from the figure for better visualization. <xref ref-type="fig" rid="figure2">Figure 2</xref> shows a steady increase in the number of articles published on cybersecurity in health care (<xref ref-type="app" rid="app1">Multimedia Appendix 1</xref>).</p>
        <p><xref ref-type="fig" rid="figure3">Figure 3</xref> shows the distribution among the three high-level categories: technological, managerial, and legal (<xref ref-type="app" rid="app1">Multimedia Appendix 1</xref>). The seven technological clusters made up more than half of all clusters, the two managerial clusters represented 32%, and the legal cluster represented 18% of all clusters.</p>
        <p>The orange-shaded portion within each cluster in <xref ref-type="fig" rid="figure3">Figure 3</xref> represents interdisciplinary articles (spanning multiple high-level categories). Although <italic>Physical Security</italic> had the lowest number of publications (<xref ref-type="fig" rid="figure3">Figure 3</xref>), it was the most interdisciplinary cluster (six out of the seven articles [85.7%] identified as interdisciplinary). <italic>Legal, Regulations, Investigations, and Compliance</italic> was the second most interdisciplinary cluster (59.8% of the articles in this category were interdisciplinary), followed by <italic>Operations Security</italic> (52.9%), <italic>Business Continuity and Disaster Recovery Planning</italic> (50%), <italic>Information Security Governance and Risk Management</italic> (43.9%), and <italic>Access Control</italic> (30.6%). Although <italic>Security Architecture and Design</italic> was the second most frequent cluster overall, only 22.2% of the articles were found to be interdisciplinary. The less interdisciplinary categories were <italic>Telecommunications and Network Security</italic> (18.9%), <italic>Software Development Security</italic> (17.6%), and <italic>Cryptography</italic> (4%) (<xref ref-type="app" rid="app1">Multimedia Appendix 1</xref>).</p>
        <p>We analyzed the publication trends over time in the 10 clusters (<xref ref-type="fig" rid="figure4">Figure 4</xref>). All clusters showed increased frequency, and some clusters such as <italic>Security Architecture and Design</italic>, <italic>Information Security Governance and Risk Management</italic>, and <italic>Cryptography</italic> demonstrated particularly steep increases in frequency.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>Search method and results.</p>
          </caption>
          <graphic xlink:href="jmir_v21i2e12644_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>Annual number of published papers at the intersection of health care and cybersecurity (fitted trend line: y=0.9166e0.1252x; R²=0.82).</p>
          </caption>
          <graphic xlink:href="jmir_v21i2e12644_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <fig id="figure3" position="float">
          <label>Figure 3</label>
          <caption>
            <p>Cluster distributions.</p>
          </caption>
          <graphic xlink:href="jmir_v21i2e12644_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <fig id="figure4" position="float">
          <label>Figure 4</label>
          <caption>
            <p>Trend of 10 clusters over time.</p>
          </caption>
          <graphic xlink:href="jmir_v21i2e12644_fig4.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Journals with the most articles.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="400"/>
            <col width="200"/>
            <col width="400"/>
            <thead>
              <tr valign="top">
                <td>Journal</td>
                <td>Number of published papers</td>
                <td>Indexed categories (according to Journal Citation Reports) [<xref ref-type="bibr" rid="ref20">20</xref>]</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Studies in Health Technology and Informatics</td>
                <td>47</td>
                <td>Not indexed</td>
              </tr>
              <tr valign="top">
                <td>International Journal of Medical Informatics</td>
                <td>24</td>
                <td>Computer Science, Information Systems; Health Care Sciences &amp; Services; Medical Informatics</td>
              </tr>
              <tr valign="top">
                <td>Journal of Medical Systems</td>
                <td>17</td>
                <td>Health Care Sciences &amp; Services; Medical Informatics</td>
              </tr>
              <tr valign="top">
                <td>Journal of Diabetes Science and Technology</td>
                <td>9</td>
                <td>Not indexed</td>
              </tr>
              <tr valign="top">
                <td>Healthcare Financial Management</td>
                <td>8</td>
                <td>Not indexed</td>
              </tr>
              <tr valign="top">
                <td>Medical Informatics</td>
                <td>8</td>
                <td>Computer Science, Information Systems; Computer Science, Interdisciplinary Applications; Medical Informatics</td>
              </tr>
              <tr valign="top">
                <td>International Journal of Bio-Medical Computing</td>
                <td>8</td>
                <td>Computer Science, Interdisciplinary Applications; Computer Science, Theory &amp; Methods; Engineering, Biomedical; Medical Informatics</td>
              </tr>
              <tr valign="top">
                <td>Computers &amp; Security</td>
                <td>7</td>
                <td>Computer Science, Information Systems</td>
              </tr>
              <tr valign="top">
                <td>Journal of the American Medical Informatics Association</td>
                <td>7</td>
                <td>Computer Science, Information Systems; Computer Science, Interdisciplinary Applications; Health Care Sciences &amp; Services; Medical Informatics</td>
              </tr>
              <tr valign="top">
                <td>Journal of Healthcare Protection Management</td>
                <td>7</td>
                <td>Not indexed</td>
              </tr>
              <tr valign="top">
                <td>Telemedicine Journal and E-Health</td>
                <td>5</td>
                <td>Health Care Sciences &amp; Services</td>
              </tr>
              <tr valign="top">
                <td>IEEE<sup>a</sup> Journal of Biomedical and Health Informatics</td>
                <td>4</td>
                <td>Computer Science, Information Systems; Computer Science, Interdisciplinary Applications; Mathematical &amp; Computational Biology; Medical Informatics</td>
              </tr>
              <tr valign="top">
                <td>Journal of the American Health Information Management Association</td>
                <td>4</td>
                <td>Not indexed</td>
              </tr>
              <tr valign="top">
                <td>Journal of Digital Imaging</td>
                <td>4</td>
                <td>Radiology, Nuclear Medicine &amp; Medical Imaging</td>
              </tr>
              <tr valign="top">
                <td>Journal of Healthcare Information Management</td>
                <td>4</td>
                <td>Not indexed</td>
              </tr>
              <tr valign="top">
                <td>Journal of Medical Internet Research</td>
                <td>4</td>
                <td>Health Care Sciences &amp; Services; Medical Informatics</td>
              </tr>
              <tr valign="top">
                <td>Journal of Medical Practice Management</td>
                <td>4</td>
                <td>Not indexed</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table1fn1">
              <p><sup>a</sup>IEEE: Institute of Electrical and Electronics Engineers.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
      <sec>
        <title>Journal Characteristics</title>
        <p>Overall, the 472 articles included were published in 239 unique journals. We ranked the journals according to the number of published articles and selected the journals with more than three articles, which resulted in a list of 17 journals (<xref ref-type="table" rid="table1">Table 1</xref>). According to the corresponding Incites Journal Citation Reports (JCR) categories [<xref ref-type="bibr" rid="ref20">20</xref>], the top journals tended to focus on computer science, information systems, and medical informatics. The most popular JCR category, accounting for seven out of the 10 journals listed in JCR, was medical informatics. Six journals had a computer science category, specifically within information systems, interdisciplinary applications, or theory and methods. Five journals were from the health care sciences and services. Only one of the top 15 journals was categorized as a biomedical engineering journal; one, as a math and computational biology journal; and one, as a radiology, nuclear medicine, and medical imaging journal.</p>
        <p>Approximately, 73% of the 239 journals had only published one article at the intersection of cybersecurity and health care. The high number and diversity of the journals included along with the low publication rate suggest that there is currently no major niche for medical practice readership at the intersection of cybersecurity and health care due to the cross-disciplinary nature of the field.</p>
      </sec>
      <sec>
        <title>Characteristics of the Most Cited Articles</title>
        <p><xref ref-type="table" rid="table2">Table 2</xref> shows the most influential publications in the field of cybersecurity in health care, ranked by the number of citations as of September 2017. Six of the top 15 cited articles were published in five journals of the Institute of Electrical and Electronics Engineers. The clusters show a mix of article domains across the legal, managerial, and technological domains. The author-denoted keywords support this finding.</p>
        <p>Of the total clusters of the top 15 articles, 38% belonged to <italic>Security Architecture and Design</italic>. <italic>Cryptography</italic> was the next most popular cluster (17%), followed by <italic>Legal, Regulations, Investigations, and Compliance</italic> (13%) and <italic>Access Control</italic> (13%). Overall, 79% of the clusters were technological, 13% were legal, and 8% were managerial. Additionally, 20% of the papers were interdisciplinary, with multiple clusters of distinct high-level categories. Notably, the list of most cited articles does not reflect the most recent articles, as citation of these articles is often significantly delayed.</p>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Top 15 most cited articles.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="50"/>
            <col width="100"/>
            <col width="160"/>
            <col width="160"/>
            <col width="50"/>
            <col width="160"/>
            <col width="160"/>
            <col width="160"/>
            <thead>
              <tr valign="top">
                <td>Rank</td>
                <td>Number of citations</td>
                <td>Title</td>
                <td>Authors</td>
                <td>Year</td>
                <td>Journal</td>
                <td>Clusters</td>
                <td>Author-denoted keywords</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>1</td>
                <td>443</td>
                <td>Data security and privacy in wireless body area networks</td>
                <td>Li M, Lou WJ, and Ren K</td>
                <td>2010</td>
                <td>IEEE<sup>a</sup> Wireless Communications</td>
                <td>Telecommunications and Network Security</td>
                <td>Data security; Data privacy; Body sensor networks; Biomedical monitoring; Wireless sensor networks; Wearable sensors; Wireless communication; Medical services; Application software; Patient monitoring</td>
              </tr>
              <tr valign="top">
                <td>2</td>
                <td>304</td>
                <td>Analyzing regulatory rules for privacy and security requirements</td>
                <td>Breaux TD and Anton AI</td>
                <td>2008</td>
                <td>IEEE<sup>a</sup> Transactions on Software Engineering</td>
                <td>Legal, Regulations, Investigations and Compliance</td>
                <td>Data security and privacy; Laws and regulations; Compliance; Accountability; Requirements engineering</td>
              </tr>
              <tr valign="top">
                <td>3</td>
                <td>173</td>
                <td>Medical image security in a HIPAA<sup>b</sup> mandated PACS<sup>c</sup> environment</td>
                <td>Cao F, Huang HK, and Zhou XQ</td>
                <td>2003</td>
                <td>Computerized Medical Imaging and Graphics</td>
                <td>Legal, Regulations, Investigations and Compliance; Security Architecture and Design</td>
                <td>Data encryption; Picture archiving and communication system security; Image integrity; Digital imaging and communication in medicine; Compliance; Health insurance portability and accountability act</td>
              </tr>
              <tr valign="top">
                <td>4</td>
                <td>168</td>
                <td>SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency</td>
                <td>Lu RX, Lin XD, and Shen XM</td>
                <td>2013</td>
                <td>IEEE<sup>a</sup> Transactions on Parallel and Distributed Systems</td>
                <td>Access Control; Security Architecture and Design</td>
                <td>Mobile-healthcare emergency; Opportunistic computing; User-centric privacy access control; PPSPC</td>
              </tr>
              <tr valign="top">
                <td>5</td>
                <td>158</td>
                <td>Authenticity and integrity of digital mammography images</td>
                <td>Zhou XQ, Huang HK, and Lou SL</td>
                <td>2001</td>
                <td>IEEE<sup>a</sup> Transactions on Medical Imaging</td>
                <td>Cryptography; Telecommunications and Network Security</td>
                <td>Data embedding and cryptography; Digital mammography; Image authenticity and integrity; Telemammography</td>
              </tr>
              <tr valign="top">
                <td>6</td>
                <td>131</td>
                <td>Security in health-care information systems--current trends</td>
                <td>Smith E and Eloff JH</td>
                <td>1999</td>
                <td>International Journal of Medical Informatics</td>
                <td>Access Control; Information Security Governance and Risk Management</td>
                <td>Health-care information systems security; Risk-analysis in health-care information systems; Access control for computerized health-care; Electronic patient record; International Medical Informatics Association; Managed health-care</td>
              </tr>
              <tr valign="top">
                <td>7</td>
                <td>112</td>
                <td>How to ensure data security of an epidemiological follow-up: quality assessment of an anonymous record linkage procedure</td>
                <td>Quantin C, Bouzelat H, Allaert FA, Benhamiche AM, Faivre J, and Dusserre L</td>
                <td>1998</td>
                <td>International Journal of Medical Informatics</td>
                <td>Cryptography; Security Architecture and Design</td>
                <td>Data security; Computerized record; Linkage procedure</td>
              </tr>
              <tr valign="top">
                <td>8</td>
                <td>103</td>
                <td>IBE-Lite: a lightweight identity-based cryptography for body sensor networks</td>
                <td>Tan CC, Wang HD, Zhong S, and Li Q</td>
                <td>2009</td>
                <td>IEEE<sup>a</sup> Transactions on Information Technology in Biomedicine</td>
                <td>Security Architecture and Design; Cryptography</td>
                <td>Body sensor network; Identity-based encryption; Privacy; Security</td>
              </tr>
              <tr valign="top">
                <td>9</td>
                <td>89</td>
                <td>A security architecture for interconnecting health information systems</td>
                <td>Gritzalis D and Lambrinoudakis C</td>
                <td>2004</td>
                <td>International Journal of Medical Informatics</td>
                <td>Access Control; Security Architecture and Design</td>
                <td>Information systems security; Computer security; Medical data security; Medical Data Protection; Electronic healthcare records; Role-based access control</td>
              </tr>
              <tr valign="top">
                <td>10</td>
                <td>85</td>
                <td>Biometric methods for secure communications in body sensor networks: Resource-efficient key management and signal-level data scrambling</td>
                <td>Bui FM and Hatzinakos D</td>
                <td>2008</td>
                <td>Eurasip Journal on Advances in Signal Processing</td>
                <td>Security Architecture and Design; Cryptography</td>
                <td>Not available</td>
              </tr>
              <tr valign="top">
                <td>11</td>
                <td>84</td>
                <td>mHealth data security: the need for HIPAA<sup>b</sup>-compliant standardization</td>
                <td>Luxton DD, Kayl RA, and Mishkind MC</td>
                <td>2012</td>
                <td>Telemedicine Journal and E-Health</td>
                <td>Software Development Security; Legal, Regulations, Investigations and Compliance</td>
                <td>Security; HIPAA<sup>b</sup>; Encryption; Telehealth; Mobile health</td>
              </tr>
              <tr valign="top">
                <td>12</td>
                <td>82</td>
                <td>Analysis of the security and privacy requirements of cloud-based electronic health records systems</td>
                <td>Rodrigues JJ, de la Torre I, Fernandez G, and Lopez-Coronado M</td>
                <td>2013</td>
                <td>Journal of Medical Internet Research</td>
                <td>Security Architecture and Design</td>
                <td>Cloud-computing; eHealth; Electronic health records (EHRs); Privacy; Security</td>
              </tr>
              <tr valign="top">
                <td>13</td>
                <td>82</td>
                <td>Health care management and information systems security: awareness, training or education?</td>
                <td>Katsikas SK</td>
                <td>2000</td>
                <td>International Journal of Medical Informatics</td>
                <td>Information Security Governance and Risk Management</td>
                <td>Health information systems; Information systems security; Health care management; Education; Training; Awareness</td>
              </tr>
              <tr valign="top">
                <td>14</td>
                <td>82</td>
                <td>Securing m-healthcare social networks: challenges, countermeasures and future directions</td>
                <td>Zhou J, Cao ZF, Dong XL, Lin XD, and Vasilakos AV</td>
                <td>2013</td>
                <td>IEEE<sup>a</sup> Wireless Communications</td>
                <td>Security Architecture and Design</td>
                <td>Mobile communication; Social network services; Medical services; Mobile computing; Personal digital assistants; Privacy; Network security; Electronic medical records</td>
              </tr>
              <tr valign="top">
                <td>15</td>
                <td>80</td>
                <td>Privacy and data security in E-health: requirements from the user's perspective</td>
                <td>Wilkowska W and Ziefle M</td>
                <td>2012</td>
                <td>Health Informatics Journal</td>
                <td>Security Architecture and Design</td>
                <td>E-health; Gender; Medical assistive technologies; Privacy; Security</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table2fn3">
              <p><sup>a</sup>IEEE: Institute of Electrical and Electronics Engineers.</p>
            </fn>
            <fn id="table2fn1">
              <p><sup>b</sup>HIPAA: Health Insurance Portability and Accountability Act. </p>
            </fn>
            <fn id="table2fn2">
              <p><sup>c</sup>PACS: picture archiving and communication system.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
      <sec>
        <title>Text Analysis</title>
        <p>The text-mining analysis identified specific trends in the article texts. The map produced from all titles and abstracts is shown in <xref ref-type="fig" rid="figure5">Figure 5</xref>. The thematic bubbles are ranked by relevance based on a heat-map color scheme: Hot colors indicate more important themes, and cool colors indicate less important themes. The relative positions of the bubbles indicate the relationship between aggregated ideas, reflecting how closely they are related to each other. The sizes of the bubbles are only set to include their grey dots, and the size of each grey dot (a common word within the theme) indicates its relative frequency. The lines between these dots signify connectivity and association of concepts.</p>
        <p>The overlay of grey-dot concepts onto thematic bubbles allows for more specific analysis of terms. Technological terms emerge as the main theme in <xref ref-type="fig" rid="figure5">Figure 5</xref>, including words like “encryption” and “software.” Concept words within these themes highlighted the following common elements of an organization’s informal technology structure related to cybersecurity: “Internet,” “network,” “applications,” “records,” “breaches,” “key,” and “electronic.” Managerial and legal terms were also identified as concepts (<xref ref-type="fig" rid="figure5">Figure 5</xref>). “Management” was a concept within the “information” theme. “Policies” and “process” were concepts in the risk theme and indicated the influence of risk analysis on the cybersecurity policies and procedures of organizations. “HIPAA” was a concept that stemmed from the “information” concept in the “important” theme.</p>
        <p>The two central themes “security” and “information” included multiple, large grey-dot concepts that branched out into other thematic areas. There was an overlap between “security” and “encryption,” suggesting that encoding material is fundamental to security. An overlap between “security” and “users” could imply that user control is imperative to security.</p>
        <p>For further analysis of word frequencies, the articles from 1985 to 2017 were split into four time periods: 1985-1993, 1994-2001, 2002-2009, and 2010-2017 (September). <xref ref-type="app" rid="app1">Multimedia Appendix 1</xref> presents the word clouds within the four time periods. The size of the word represents the frequency of its occurrence. The term “privacy” increased in size in the last three time periods. “Internet” appeared in 1994-2001, around the time of the dot-com bubble. “Legal” was mentioned in 1985-1993, and “legislation” was found in 1994-2001. “HIPAA” appeared in 2002-2009 and again, although to a smaller extent, in 2010-2017.</p>
        <p>Maps of the four time periods were also created to identify trends over time (<xref ref-type="fig" rid="figure6">Figure 6</xref>). “Security” remained the most popular concept from 1985 to 2009, but was overtaken by “health care” from 2010 to 2017 (the most popular concept is indicated by the red bubble). The time period maps in <xref ref-type="app" rid="app1">Multimedia Appendix 1</xref> provide further details.</p>
        <fig id="figure5" position="float">
          <label>Figure 5</label>
          <caption>
            <p>Thematic map of all titles and abstracts (A) and concept cloud of all titles and abstracts (B).</p>
          </caption>
          <graphic xlink:href="jmir_v21i2e12644_fig5.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <fig id="figure6" position="float">
          <label>Figure 6</label>
          <caption>
            <p>Thematic maps of titles and abstracts of articles in four time periods.</p>
          </caption>
          <graphic xlink:href="jmir_v21i2e12644_fig6.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Overview</title>
        <p>This article provides an analysis of the literature at the intersection of cybersecurity and health care. In general, research in this area has been increasing over the past 20 years and is continually represented in a wide, distributed array of academic journals, reflecting the importance of cybersecurity. With the increase in cybersecurity attacks against hospitals and dependency of health care delivery on technology, we expect cybersecurity to continue to play a central role in health care delivery.</p>
        <p>Despite the increase in research and attention to cybersecurity, there are persistent shortcomings in the research on cybersecurity. For example, our research suggests that majority of the articles on cybersecurity focus on technology. In our domain-clustering analysis, technology–focused articles accounted for more than half of all the clusters, whereas managerial articles accounted for only 32%. Similarly, in our journal analysis, 58 articles included in the 15 most published journals were from computer science journals and 12 articles were from health-focused journals. Notably, 79% of the top 15 most cited paper clusters were technological. This focus on the technological aspects of cybersecurity suggests that nontechnological variables (human–based and organizational aspects, strategy, and management) may be understudied. Investment in technological tools should be the output of a robust cybersecurity strategy rather than the foundation [<xref ref-type="bibr" rid="ref21">21</xref>]. An overwhelming majority of cybersecurity incidents are caused or propagated by people [<xref ref-type="bibr" rid="ref22">22</xref>], and technological solutions can mitigate this risk to a limited extent.</p>
        <p>We found discordance between the topics of the highly cited articles and the topical breakdown of our cluster analysis (these articles were published more than 5 years ago, implying that emergent threats are poorly captured). This finding suggests that articles on topics such as cryptography have significant traction, even though they are not widely present in the literature. On the other hand, only a few information security governance and compliance articles were frequently cited, despite accounting for a large portion of the literature.</p>
        <p>Cybersecurity is most often examined with respect to privacy and compliance. Our results show that physical security is lacking in research, and only 1% of the literature is categorized under <italic>Physical Security</italic>. Not all cyber vulnerabilities are digital. Many physical threats contribute to breaches, and these threats potentially affect the physical safety of patients. <italic>Software Development Security, Business Continuity</italic>, and <italic>Disaster Recovery Planning</italic>, each accounted for 3% of the studied articles. Further examination is needed on these topics, and our study suggests that incident recovery (critical to the success of recovery from incidents) is not a significant focus in the research community. Articles focusing on legality were the least represented. Moreover, federal cybersecurity guidance such as the publications of the National Institute of Standards and Technology was seldom observed in our text analysis. In addition, massive increases in cybersecurity spending [<xref ref-type="bibr" rid="ref23">23</xref>] did not drive proportional growth in the literature.</p>
        <p>Our lexical analysis highlighted a separation of security processes and software terminology, with longer word distances between these themes. Additionally, the time period maps for 2002-2009 and 2010-2017 showed no overlap between the management and technological themes. More interdisciplinary research is needed to avoid gaps that arise from only analyzing managerial and technological security issues.</p>
        <p>Unlike medical research, which is set up to openly benefit human lives [<xref ref-type="bibr" rid="ref24">24</xref>], cybersecurity is based on the premise of an active adversary. The presence of this adversary may, unfortunately, drive a school of thought that knowledge, especially specific strategies and tactics, should not be shared openly, which impedes the growth and utility of research in this field.</p>
      </sec>
      <sec>
        <title>Limitations and Suggestions for Future Research</title>
        <p>Our review was limited to journal articles indexed in PubMed and WoS. Information retrieval was limited to articles that included the terms of the search strategy in their titles or abstracts: Articles that used different terminology were not retrieved. Additionally, we only included articles with cybersecurity at the core of the study.</p>
        <p>Our review did not assess non-English language articles or documents other than journal articles (eg, conference articles, white papers, or reports by governments or other organizations). A more comprehensive search could include these sources. Importantly, much of the work on cybersecurity and health care is operational and administrative, not academic. Information security professionals may not rely on academic literature as extensively as clinicians do when considering new diagnostics or therapeutics and may instead favor “on the job” experience and industry best practices. Additionally, information security research performed within the health care ecosystem may not be publishable due to security-related concerns such as exposing an internal vulnerability. Understanding the published literature in this space is an important starting point, and hospitals and patients will benefit from transparency in research, wherever possible.</p>
        <p>Future reviews can focus on individual clusters that were reviewed in our study to provide a more in-depth analysis of the cluster. For instance, they could look specifically at business continuity and disaster recovery planning or software development security. Such a detailed focus can help synthesize research findings and provide best practices. Studies may also analyze the gap in managerial research and the implications of a narrow technological focus. Furthermore, such studies can focus on different settings in health care, such as inpatient and outpatient care, translational research, health and wellness environments, and integration of mobile devices and networked systems.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <app id="app1">
        <title>Multimedia Appendix 1</title>
        <p>Details of the methodology.</p>
        <media xlink:href="jmir_v21i2e12644_app1.pdf" xlink:title="PDF File (Adobe PDF File), 1MB"/>
      </app>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">HIPAA</term>
          <def>
            <p>Health Insurance Portability and Accountability Act </p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">IEEE</term>
          <def>
            <p>Institute of Electrical and Electronics Engineers</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">mHealth</term>
          <def>
            <p>mobile health</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">NIST</term>
          <def>
            <p>National Institute of Standards and Technology</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">PACS</term>
          <def>
            <p>picture archiving and communication system</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">WoS</term>
          <def>
            <p>Web of Science</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>Financial support for this study was provided by Cybersecurity at MIT Sloan (CAMS), also known as the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity.</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Jalali</surname>
            <given-names>MS</given-names>
          </name>
          <name name-style="western">
            <surname>Kaiser</surname>
            <given-names>JP</given-names>
          </name>
        </person-group>
        <article-title>Cybersecurity in Hospitals: A Systematic, Organizational Perspective</article-title>
        <source>J Med Internet Res</source>  
        <year>2018</year>  
        <month>05</month>  
        <day>28</day>  
        <volume>20</volume>  
        <issue>5</issue>  
        <fpage>e10059</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://www.jmir.org/2018/5/e10059/"/>
        </comment>  
        <pub-id pub-id-type="doi">10.2196/10059</pub-id>
        <pub-id pub-id-type="medline">29807882</pub-id>
        <pub-id pub-id-type="pii">v20i5e10059</pub-id>
        <pub-id pub-id-type="pmcid">PMC5996174</pub-id></nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Gordon</surname>
            <given-names>W</given-names>
          </name>
          <name name-style="western">
            <surname>Fairhall</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Landman</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>Threats to Information Security - Public Health Implications</article-title>
        <source>N Engl J Med</source>  
        <year>2017</year>  
        <month>08</month>  
        <day>24</day>  
        <volume>377</volume>  
        <issue>8</issue>  
        <fpage>707</fpage>  
        <lpage>709</lpage>  
        <pub-id pub-id-type="doi">10.1056/NEJMp1707212</pub-id>
        <pub-id pub-id-type="medline">28700269</pub-id></nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Perakslis</surname>
            <given-names>E</given-names>
          </name>
        </person-group>
        <article-title>Cybersecurity in health care</article-title>
        <source>N Engl J Med</source>  
        <year>2014</year>  
        <month>07</month>  
        <day>31</day>  
        <volume>371</volume>  
        <issue>5</issue>  
        <fpage>395</fpage>  
        <lpage>7</lpage>  
        <pub-id pub-id-type="doi">10.1056/NEJMp1404358</pub-id>
        <pub-id pub-id-type="medline">25075831</pub-id></nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Jarrett</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Cybersecurity-A Serious Patient Care Concern</article-title>
        <source>JAMA</source>  
        <year>2017</year>  
        <month>10</month>  
        <day>10</day>  
        <volume>318</volume>  
        <issue>14</issue>  
        <fpage>1319</fpage>  
        <lpage>1320</lpage>  
        <pub-id pub-id-type="doi">10.1001/jama.2017.11986</pub-id>
        <pub-id pub-id-type="medline">28973258</pub-id>
        <pub-id pub-id-type="pii">2654933</pub-id></nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kramer</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Fu</surname>
            <given-names>K</given-names>
          </name>
        </person-group>
        <article-title>Cybersecurity Concerns and Medical Devices: Lessons From a Pacemaker Advisory</article-title>
        <source>JAMA</source>  
        <year>2017</year>  
        <month>12</month>  
        <day>05</day>  
        <volume>318</volume>  
        <issue>21</issue>  
        <fpage>2077</fpage>  
        <lpage>2078</lpage>  
        <pub-id pub-id-type="doi">10.1001/jama.2017.15692</pub-id>
        <pub-id pub-id-type="medline">29049709</pub-id>
        <pub-id pub-id-type="pii">2659246</pub-id></nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Furnell</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Emm</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <article-title>The ABC of ransomware protection</article-title>
        <source>Computer Fraud &amp; Security</source>  
        <year>2017</year>  
        <month>10</month>  
        <volume>2017</volume>  
        <issue>10</issue>  
        <fpage>5</fpage>  
        <lpage>11</lpage>  
        <pub-id pub-id-type="doi">10.1016/S1361-3723(17)30089-1</pub-id></nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="web">
        <source>Verizon Enterprise</source>  
        <year>2018</year>  
        <access-date>2018-09-01</access-date>
        <comment>Data Breach Investigations Report 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.verizonenterprise.com/resources/reports/rp_DBIR_2018_Report_execsummary_en_xg.pdf">https://www.verizonenterprise.com/resources/reports/rp_DBIR_2018_Report_execsummary_en_xg.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="755YqckBt"/></comment> </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="web">
        <source>Ponemon Institute</source>  
        <year>2016</year>  
        <access-date>2018-04-09</access-date>
        <comment>Sixth Annual Benchmark Study on Privacy &amp; Security of Healthcare Data 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ponemon.org/local/upload/file/Sixth%20Annual%20Patient%20Privacy%20%26%20Data%20Security%20Report%20FINAL%206.pdf">https://www.ponemon.org/local/upload/file/Sixth%20Annual%20Patient%20Privacy%20%26%20Data%20Security%20Report%20FINAL%206.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6yYqScUxi"/></comment> </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="web">
        <source>Healthcare Information and Management Systems Society</source>  
        <year>2018</year>  
        <access-date>2018-07-30</access-date>
        <comment>2018 HIMSS Cybersecurity Survey 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.himss.org/sites/himssorg/files/u132196/2018_HIMSS_Cybersecurity_Survey_Final_Report.pdf">https://www.himss.org/sites/himssorg/files/u132196/2018_HIMSS_Cybersecurity_Survey_Final_Report.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="70oQtDbCw"/></comment> </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Madnick</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Jalali</surname>
            <given-names>MS</given-names>
          </name>
          <name name-style="western">
            <surname>Siegel</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Lee</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Strong</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Wang</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Ang</surname>
            <given-names>WH</given-names>
          </name>
          <name name-style="western">
            <surname>Deng</surname>
            <given-names>V</given-names>
          </name>
          <name name-style="western">
            <surname>Mistree</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <person-group person-group-type="editor">
          <name name-style="western">
            <surname>Woon</surname>
            <given-names>W</given-names>
          </name>
          <name name-style="western">
            <surname>Aung</surname>
            <given-names>Z</given-names>
          </name>
          <name name-style="western">
            <surname>Kramer</surname>
            <given-names>O</given-names>
          </name>
          <name name-style="western">
            <surname>Madnick</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <article-title>Measuring Stakeholders’ Perceptions of Cybersecurity for Renewable Energy Systems</article-title>
        <source>Data Analytics for Renewable Energy Integration</source>  
        <year>2017</year>  
        <publisher-loc>Cham, Switzerland</publisher-loc>
        <publisher-name>Springer</publisher-name></nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Jalali</surname>
            <given-names>MS</given-names>
          </name>
          <name name-style="western">
            <surname>Siegel</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Madnick</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <article-title>Decision-making and biases in cybersecurity capability development: Evidence from a simulation game experiment</article-title>
        <source>The Journal of Strategic Information Systems</source>  
        <year>2018</year>  
        <month>9</month>  
        <fpage>E</fpage>  
        <comment>(forthcoming)</comment>  
        <pub-id pub-id-type="doi">10.1016/j.jsis.2018.09.003</pub-id></nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
        <collab>Accenture</collab> </person-group>
        <source>Accenture 2018 Healthcare Workforce Survey on Cybersecurity</source>  
        <year>2018</year>  
        <publisher-name>YouTube</publisher-name>
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.youtube.com/watch?v=1WI_o7VQQxI">https://www.youtube.com/watch?v=1WI_o7VQQxI</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="75wLGj4nt"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kruse</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Frederick</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>Jacobson</surname>
            <given-names>T</given-names>
          </name>
          <name name-style="western">
            <surname>Monticone</surname>
            <given-names>DK</given-names>
          </name>
        </person-group>
        <article-title>Cybersecurity in healthcare: A systematic review of modern threats and trends</article-title>
        <source>Technol Health Care</source>  
        <year>2017</year>  
        <volume>25</volume>  
        <issue>1</issue>  
        <fpage>1</fpage>  
        <lpage>10</lpage>  
        <pub-id pub-id-type="doi">10.3233/THC-161263</pub-id>
        <pub-id pub-id-type="medline">27689562</pub-id>
        <pub-id pub-id-type="pii">THC1263</pub-id></nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Jalali</surname>
            <given-names>MS</given-names>
          </name>
          <name name-style="western">
            <surname>Russell</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>Razak</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Gordon</surname>
            <given-names>WJ</given-names>
          </name>
        </person-group>
        <article-title>EARS to cyber incidents in health care</article-title>
        <source>J Am Med Inform Assoc</source>  
        <year>2019</year>  
        <month>01</month>  
        <day>01</day>  
        <volume>26</volume>  
        <issue>1</issue>  
        <fpage>81</fpage>  
        <lpage>90</lpage>  
        <pub-id pub-id-type="doi">10.1093/jamia/ocy148</pub-id>
        <pub-id pub-id-type="medline">30517701</pub-id>
        <pub-id pub-id-type="pii">5229203</pub-id></nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="web">
        <source>National Initiative for Cybersecurity Careers and Studies</source>  
        <year>2017</year>  
        <month>11</month>  
        <day>27</day>  
        <access-date>2018-12-31</access-date>
        <comment>Explore Terms: A Glossary of Common Cybersecurity Terminology 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://niccs.us-cert.gov/glossary">https://niccs.us-cert.gov/glossary</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="755d7O0DN"/></comment> </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="web">
        <source>BSI</source>  
        <access-date>2018-07-31</access-date>
        <comment>Glossary of cyber security terms 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.bsigroup.com/en-GB/Cyber-Security/Cyber-security-for-SMEs/Glossary-of-cyber-security-terms/">https://www.bsigroup.com/en-GB/Cyber-Security/Cyber-security-for-SMEs/Glossary-of-cyber-security-terms/</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="755dGRUAl"/></comment> </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
        <name name-style="western">
        <surname>Wallace</surname>  
        <given-names>BC</given-names></name>  
        <name name-style="western">
        <surname>Small</surname>  
        <given-names>K</given-names></name>  
        <name name-style="western">
        <surname>Brodley</surname>  
        <given-names>CE</given-names></name>  
        <name name-style="western">
        <surname>Lau</surname>  
        <given-names>J</given-names></name>  
        <name name-style="western">
        <surname>Trikalinos</surname>  
        <given-names>TA</given-names></name> </person-group>
        <article-title>Deploying an interactive machine learning system in an evidence-based practice center: abstrackr</article-title>
        <year>2012</year>  
        <conf-name>Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium</conf-name>
        <conf-date>January 28, 2012</conf-date>
        <conf-loc>Miami, Florida</conf-loc>
        <publisher-name>ACM</publisher-name>
        <fpage>819</fpage>  
        <lpage>824</lpage>  
        <pub-id pub-id-type="doi">10.1145/2110363.2110464</pub-id></nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Smith</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Humphreys</surname>
            <given-names>MS</given-names>
          </name>
        </person-group>
        <article-title>Evaluation of unsupervised semantic mapping of natural language with Leximancer concept mapping</article-title>
        <source>Behavior Research Methods</source>  
        <year>2006</year>  
        <month>5</month>  
        <volume>38</volume>  
        <issue>2</issue>  
        <fpage>262</fpage>  
        <lpage>279</lpage>  
        <pub-id pub-id-type="doi">10.3758/BF03192778</pub-id></nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Cheng</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Edwards</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <article-title>A comparative automated content analysis approach on the review of the sharing economy discourse in tourism and hospitality</article-title>
        <source>Current Issues in Tourism</source>  
        <year>2017</year>  
        <month>08</month>  
        <day>17</day>  
        <volume>22</volume>  
        <issue>1</issue>  
        <fpage>35</fpage>  
        <lpage>49</lpage>  
        <pub-id pub-id-type="doi">10.1080/13683500.2017.1361908</pub-id></nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="web">
        <source>Clarivate Analytics</source>  
        <year>2018</year>  
        <access-date>2018-10-29</access-date>
        <comment>InCites Journal Citation Reports 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://clarivate.com/products/incites/">https://clarivate.com/products/incites/</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="73XTpO9jx"/></comment> </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="web">
        <source>Health Care Industry Cybersecurity Task Force: Report on improving cybersecurity in the health care industry</source>  
        <year>2017</year>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.phe.gov/Preparedness/planning/CyberTF/Documents/report2017.pdf">https://www.phe.gov/Preparedness/planning/CyberTF/Documents/report2017.pdf</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="70oQxvqIp"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>van Zadelhoff</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <source>Harvard Business Review</source>  
        <year>2016</year>  
        <access-date>2019-02-04</access-date>
        <comment>The Biggest Cybersecurity Threats Are Inside Your Company 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://hbr.org/2016/09/the-biggest-cybersecurity-threats-are-inside-your-company">https://hbr.org/2016/09/the-biggest-cybersecurity-threats-are-inside-your-company</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="75wMaOrxM"/></comment> </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="web">
        <source>Gartner Forecasts Worldwide Security Spending Will Reach $96 Billion in 2018, Up 8 Percent from 2017</source>  
        <year>2017</year>  
        <access-date>2018-10-29</access-date>
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.gartner.com/en/newsroom/press-releases/2017-12-07-gartner-forecasts-worldwide-security-spending-will-reach-96-billion-in-2018">https://www.gartner.com/en/newsroom/press-releases/2017-12-07-gartner-forecasts-worldwide-security-spending-will-reach-96-billion-in-2018</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="73XT5gFp1"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Ioannidis</surname>
            <given-names>JPA</given-names>
          </name>
          <name name-style="western">
            <surname>Greenland</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Hlatky</surname>
            <given-names>MA</given-names>
          </name>
          <name name-style="western">
            <surname>Khoury</surname>
            <given-names>MJ</given-names>
          </name>
          <name name-style="western">
            <surname>Macleod</surname>
            <given-names>MR</given-names>
          </name>
          <name name-style="western">
            <surname>Moher</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Schulz</surname>
            <given-names>KF</given-names>
          </name>
          <name name-style="western">
            <surname>Tibshirani</surname>
            <given-names>R</given-names>
          </name>
        </person-group>
        <article-title>Increasing value and reducing waste in research design, conduct, and analysis</article-title>
        <source>The Lancet</source>  
        <year>2014</year>  
        <month>01</month>  
        <day>11</day>  
        <volume>383</volume>  
        <issue>9912</issue>  
        <fpage>166</fpage>  
        <lpage>175</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/24411645"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1016/S0140-6736(13)62227-8</pub-id>
        <pub-id pub-id-type="medline">24411645</pub-id>
        <pub-id pub-id-type="pii">S0140-6736(13)62227-8</pub-id>
        <pub-id pub-id-type="pmcid">PMC4697939</pub-id></nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
