Published on in Vol 21, No 2 (2019): February
Preprints (earlier versions) of this paper are
available at
https://preprints.jmir.org/preprint/12644, first published
.
Journals
- Martignani C. Cybersecurity in cardiac implantable electronic devices. Expert Review of Medical Devices 2019;16(6):437 View
- Marquez G, Astudillo H, Taramasco C. Security in Telehealth Systems From a Software Engineering Viewpoint: A Systematic Mapping Study. IEEE Access 2020;8:10933 View
- Razaque A, Amsaad F, Jaro Khan M, Hariri S, Chen S, Siting C, Ji X. Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain. IEEE Access 2019;7:168774 View
- Bhuyan S, Kabir U, Escareno J, Ector K, Palakodeti S, Wyant D, Kumar S, Levy M, Kedia S, Dasgupta D, Dobalian A. Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations. Journal of Medical Systems 2020;44(5) View
- Jalali M, Bruckes M, Westmattelmann D, Schewe G. Why Employees (Still) Click on Phishing Links: An Investigation in Hospitals. Journal of Medical Internet Research 2020;22(1):e16775 View
- Johansson D, Jönsson P, Ivarsson B, Christiansson M. Information Technology and Medical Technology Personnel´s Perception Regarding Segmentation of Medical Devices: A Focus Group Study. Healthcare 2020;8(1):23 View
- Li P, Luo Y, Yu X, Wen J, Mason E, Li W, Jalali M. Patients’ Perceptions of Barriers and Facilitators to the Adoption of E-Hospitals: Cross-Sectional Study in Western China. Journal of Medical Internet Research 2020;22(6):e17221 View
- Jalali M, Russell B, Razak S, Gordon W. EARS to cyber incidents in health care. Journal of the American Medical Informatics Association 2019;26(1):81 View
- T. Alanazi S, Anbar M, A. Ebad S, Karuppayah S, Al-Ani H. Theory-Based Model and Prediction Analysis of Information Security Compliance Behavior in the Saudi Healthcare Sector. Symmetry 2020;12(9):1544 View
- Li P, Luo Y, Yu X, Zeng Z, Jin W, Mason E, Li W, Jalali M. Readiness of Healthcare Providers for e-Hospitals: Cross-sectional Analysis in China. SSRN Electronic Journal 2020 View
- Romare C, Skär L. Smart Glasses for Caring Situations in Complex Care Environments: Scoping Review. JMIR mHealth and uHealth 2020;8(4):e16055 View
- Kang H, Han J, Kwon G. Determining the Intellectual Structure and Academic Trends of Smart Home Health Care Research: Coword and Topic Analyses. Journal of Medical Internet Research 2021;23(1):e19625 View
- Kulakli A, Shubina I. Scientific Publication Patterns of Mobile Technologies and Apps for Posttraumatic Stress Disorder Treatment: Bibliometric Co-Word Analysis. JMIR mHealth and uHealth 2020;8(11):e19391 View
- Spinazze P, Aardoom J, Chavannes N, Kasteleyn M. The Computer Will See You Now: Overcoming Barriers to Adoption of Computer-Assisted History Taking (CAHT) in Primary Care. Journal of Medical Internet Research 2021;23(2):e19306 View
- Dhawan S, Gupta B, Elango B. Global Cyber Security Research Output (1998–2019): A Scientometric Analysis. Science & Technology Libraries 2021;40(2):172 View
- Eichelberg M, Kleber K, Kämmerer M. Cybersecurity in PACS and Medical Imaging: an Overview. Journal of Digital Imaging 2020;33(6):1527 View
- Moosavi J, Naeni L, Fathollahi-Fard A, Fiore U. Blockchain in supply chain management: a review, bibliometric, and network analysis. Environmental Science and Pollution Research 2021 View
- Aktürk C. Bibliometric Analysis of Clinical Decision Support Systems. Acta Informatica Pragensia 2021;10(1):61 View
- AKIN M. Sağlık Turizmi Alanyazının Bibliyometrik Analizi (2015-2020). MANAS Sosyal Araştırmalar Dergisi 2021;10(3):2026 View
- Loan F, Bisma B, Nahida N. Global research productivity in cybersecurity: a scientometric study. Global Knowledge, Memory and Communication 2022;71(4/5):342 View
- Srinivasan K, Rathee G, Raja M, Jaglan N, Mahendiran T, Palaniswamy T. Secure multimedia data processing scheme in medical applications. Multimedia Tools and Applications 2022;81(7):9079 View
- Xiong P, Buffett S, Iqbal S, Lamontagne P, Mamun M, Molyneaux H. Towards a robust and trustworthy machine learning system development: An engineering perspective. Journal of Information Security and Applications 2022;65:103121 View
- Poleto T, Carvalho V, Silva A, Clemente T, Silva M, Gusmão A, Costa A, Nepomuceno T. Fuzzy Cognitive Scenario Mapping for Causes of Cybersecurity in Telehealth Services. Healthcare 2021;9(11):1504 View
- Epizitone A, Moyane S, Agbehadji I. Health Information System and Health Care Applications Performance in the Healthcare Arena: A Bibliometric Analysis. Healthcare 2022;10(11):2273 View
- A. Alzahrani F. Estimating Security Risk of Healthcare Web Applications: A Design Perspective. Computers, Materials & Continua 2021;67(1):187 View
- Alyami H, Nadeem M, Alharbi A, Alosaimi W, Ansari M, Pandey D, Kumar R, Khan R. The Evaluation of Software Security through Quantum Computing Techniques: A Durability Perspective. Applied Sciences 2021;11(24):11784 View
- Shubina I. Scientific Publication Patterns of Systematic Reviews on Psychosocial Interventions Improving Well-being: Bibliometric Analysis. Interactive Journal of Medical Research 2022;11(2):e41456 View
- Wasserman L, Wasserman Y. Hospital cybersecurity risks and gaps: Review (for the non-cyber professional). Frontiers in Digital Health 2022;4 View
- Dastani M, Danesh F, Nazir S. Iranian COVID-19 Publications in LitCovid: Text Mining and Topic Modeling. Scientific Programming 2021;2021:1 View
- Chen X, Cheng G, Wang F, Tao X, Xie H, Xu L. Machine and cognitive intelligence for human health: systematic review. Brain Informatics 2022;9(1) View
- He Y, Zamani E, Yevseyeva I, Luo C. Artificial Intelligence–Based Ethical Hacking for Health Information Systems: Simulation Study. Journal of Medical Internet Research 2023;25:e41748 View
- Huang X, Wang T, Zu W, Xu T, Du L, Wang Y, Nie W, Wang L. A bibliometric analysis of global publications on graft-versus-host disease research. Medicine 2022;101(27):e29634 View
- Singh N, Krishnaswamy V, Zhang J. Intellectual structure of cybersecurity research in enterprise information systems. Enterprise Information Systems 2023;17(6) View
- Wells J. Preparing for hybrid warfare and cyberattacks on health services' digital infrastructure: What nurse managers need to know. Journal of Nursing Management 2022;30(6):2000 View
- Liu J, Simsek M, Kantarci B, Erol-kantarci M, Malton A, Walenstein A. Risk-aware Fine-grained Access Control in Cyber-physical Contexts. Digital Threats: Research and Practice 2022;3(4):1 View
- Alhuwail D, Al-Jafar E, Abdulsalam Y, AlDuaij S. Information Security Awareness and Behaviors of Health Care Professionals at Public Health Care Facilities. Applied Clinical Informatics 2021;12(04):924 View
- Zhou H, Yip W, Ren J, To S. Thematic analysis of sustainable ultra-precision machining by using text mining and unsupervised learning method. Journal of Manufacturing Systems 2022;62:218 View
- Sharma D, Mittal R, Sekhar R, Shah P, Renz M. A bibliometric analysis of cyber security and cyber forensics research. Results in Control and Optimization 2023;10:100204 View
- Javaid M, Haleem A, Singh R, Suman R. Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends. Cyber Security and Applications 2023;1:100016 View
- Veličković J, Jonev-Ćiraković K. Cyberattacks on healthcare systems. Annals of Nursing 2023;1(4):6 View
- İSTANBULLU A. How Should I Start Research in Cyber Security? Suggestions for Researchers According to Bibliometric Analysis Data. Sakarya University Journal of Education 2023;13(1):119 View
- Wenhua Z, Kamrul Hasan M, Ismail A, Yanke Z, Razzaque M, Islam S, Anil kumar B. Data security in smart devices: Advancement, constraints and future recommendations. IET Networks 2023;12(6):269 View
- Dart M, Ahmed M. Evaluating Staff Attitudes, Intentions, and Behaviors Related to Cyber Security in Large Australian Health Care Environments: Mixed Methods Study. JMIR Human Factors 2023;10:e48220 View
- KARAYEL T, AKBIYIK A. Siber Güvenlik Araştırmalarına Küresel Bir Bakış: Yayın Trendleri ve Araştırma Yönelimleri. Bilişim Teknolojileri Dergisi 2023;16(3):221 View
- van Boven L, Kusters R, Tin D, van Osch F, De Cauwer H, Ketelings L, Rao M, Dameff C, Barten D. Hacking Acute Care: A Qualitative Study on the Health Care Impacts of Ransomware Attacks Against Hospitals. Annals of Emergency Medicine 2024;83(1):46 View
- Bhukya C, Thakur P, Mudhivarthi B, Singh G. Cybersecurity in Internet of Medical Vehicles: State-of-the-Art Analysis, Research Challenges and Future Perspectives. Sensors 2023;23(19):8107 View
- Dart M, Ahmed M. CYBER-AIDD: A novel approach to implementing improved cyber security resilience for large Australian healthcare providers using a Unified Modelling Language ontology. DIGITAL HEALTH 2023;9 View
- Poleto T, Nepomuceno T, de Carvalho V, Friaes L, de Oliveira R, Figueiredo C. Information Security Applications in Smart Cities: A Bibliometric Analysis of Emerging Research. Future Internet 2023;15(12):393 View
- Arafa A, Sheerah H, Alsalamah S. Emerging Digital Technologies in Healthcare with a Spotlight on Cybersecurity: A Narrative Review. Information 2023;14(12):640 View
- Inaam ul haq M, Li Q. Revealing the Trends in the Academic Landscape of the Health Care System Using Contextual Topic Modeling. Data Intelligence 2023;5(4):923 View
- Dart M, Ahmed M. Operational shock: A method for estimating cyber security incident costs for large Australian healthcare providers. Journal of Cyber Security Technology 2024;8(4):260 View
- Tazi F, Nandakumar A, Dykstra J, Rajivan P, Das S. SoK: Analyzing Privacy and Security of Healthcare Data from the User Perspective. ACM Transactions on Computing for Healthcare 2024;5(2):1 View
- Ewoh P, Vartiainen T. Vulnerability to Cyberattacks and Sociotechnical Solutions for Health Care Systems: Systematic Review. Journal of Medical Internet Research 2024;26:e46904 View
- Grabowska-Lepczak I. The use of modern technologies in education for safety and the effectiveness of undertaken activities. Journal of Modern Science 2024;55(1):471 View
- Neri M, Benevento E, Stefanini A, Aloini D, Niccolini F, Carducci A, Federigi I, Dini G. Understanding information security awareness: evidence from the public healthcare sector. Information & Computer Security 2025;33(3):309 View
- Murthi S, Martini N, Falconer N, Scahill S. Evaluating EHR-Integrated Digital Technologies for Medication-Related Outcomes and Health Equity in Hospitalised Adults: A Scoping Review. Journal of Medical Systems 2024;48(1) View
- Wang L, Li M. An exploration method for technology forecasting that combines link prediction with graph embedding: A case study on blockchain. Technological Forecasting and Social Change 2024;208:123736 View
- Ghaempanah F, Moasses Ghafari B, Hesami D, Hossein Zadeh R, Noroozpoor R, Moodi Ghalibaf A, Hasanabadi P. Metaverse and its impact on medical education and health care system: A narrative review. Health Science Reports 2024;7(9) View
- Kellermann A, Kipper L, Moraes E, Leivas P. Tecnologias habilitadoras para a agricultura 4.0 na cadeia de suprimentos visando a redução de desperdícios. Exacta 2022;22(3):668 View
- Qi K. Advancing hospital healthcare: achieving IoT-based secure health monitoring through multilayer machine learning. Journal of Big Data 2025;12(1) View
- Muria-Tarazón J, Oltra-Gutiérrez J, Oltra-Badenes R, Escobar-Román S. Uncovering Research Trends on Artificial Intelligence Risk Assessment in Businesses: A State-of-the-Art Perspective Using Bibliometric Analysis. Applied Sciences 2025;15(3):1412 View
- Singh P, Dutta S, Pranav P. Network Security and Cryptography: Threats, Obstacles and Solutions - A Bibliometric Analysis. Recent Advances in Computer Science and Communications 2025;18(2) View
- Park S, Lee H. The Effect of Communication in Emergency Department Isolation Rooms Using Smart Glasses: A Mixed‐Methods Study. Journal of Clinical Nursing 2025;34(10):4340 View
- Obreja D, Rughiniș R, Țurcanu D. What drives new knowledge in human cybersecurity behavior? Insights from bibliometrics and thematic review. Computers in Human Behavior Reports 2025;18:100650 View
- Sarker J, Rolfe J, Akbar D. Mapping the Landscape: A Bibliometric Analysis of Water Security, Governance, and Trading in Australia. Water 2025;17(7):1035 View
- Baban N, Bhattacharjee S, Song Y, Chakrabarty K, Karri R. Cyber-physical security of biochips: A perspective. Biomicrofluidics 2025;19(3) View
- Nuryahati I, Adam Assim M, Kurniasih N, Nuriman H, Pradana M, Pramiyanti A. Blockchain in education: a bibliometric study and future research agenda. Cogent Arts & Humanities 2025;12(1) View
- Algarni A, Thayananthan V. Cybersecurity for Analyzing Artificial Intelligence (AI)-Based Assistive Technology and Systems in Digital Health. Systems 2025;13(6):439 View
- Ulloa-Zamora M, Barría-Huidobro C, Sánchez-Rubio M, Galeazzi L. Integral Security Pillars for Medical Devices: A Comprehensive Analysis. Applied Sciences 2025;15(12):6634 View
- Ewoh P, Vartiainen T, Mantere T. Sociotechnical Cybersecurity Framework for Securing Health Care From Vulnerabilities and Cyberattacks: Scoping Review. Journal of Medical Internet Research 2025;27:e75584 View
- Ali A, Zaaba Z, Singh M, Anuar N, Shariff M. Advancing cybersecurity in ASEAN: current trends, emerging challenges, and opportunities for enhanced resilience. International Journal of Information Security 2025;24(5) View
- Ibragimova I. Health Governance Review Vol. 30, Issue 3: Cyberbullying, cybersecurity and health governance. International Journal of Health Governance 2025;30(3):263 View
- Coman E, Coman C, Alexandrescu M, Bilți R. Mapping the Frontiers of Cybersecurity and Data Protection: Insights from a Bibliometric Study. Electronics 2025;14(19):3769 View
- Jalali M, Largman K, Razzaghi H. Bridging data gaps and tackling human vulnerabilities in healthcare cybersecurity with generative AI. PLOS Digital Health 2025;4(10):e0001063 View
- Verma R, Gupta N, Kumar A. A comprehensive scientometric study of research trends in cybersecurity from 2000 to 2024 using Biblioshiny and VOSviewer. Discover Networks 2025;1(1) View
- Fuller P, Duffie H, Li D, Carbonell A, Perkins N, Cha J. Cybersecurity Risks and Vulnerabilities in Robotic-Assisted Surgery. Human Factors: The Journal of the Human Factors and Ergonomics Society 2025 View
Books/Policy Documents
- Fournier H, Molyneaux H, Kondratova I. Advances in Usability, User Experience, Wearable and Assistive Technology. View
- Hough T, Gross K. Advanced Practice and Leadership in Radiology Nursing. View
- Albastaki Y, Al-Alawi A, Al-Bassam S. Handbook of Research on Implementing Knowledge Management Strategy in the Public Sector. View
- Fournier H, Molyneaux H, Kondratova I, Ali N. Innovation in Information Systems and Technologies to Support Learning Research. View
- Fournier H, Kondratova I, Molyneaux H. HCI International 2020 – Late Breaking Papers: Universal Access and Inclusive Design. View
- Ravidas D, Pattinson M, Oliver P. Human Aspects of Information Security and Assurance. View
- Medhekar A. Handbook of Research on Advancing Cybersecurity for Digital Transformation. View
- Medhekar A. Research Anthology on Securing Medical Systems and Records. View
- Ahmed M, Zubair S. Explainable Artificial Intelligence for Cyber Security. View
- Costantini F, Soncini G. Endorobotics. View
- Tazi F, Dykstra J, Rajivan P, Das S. Socio-Technical Aspects in Security. View
- Kuika Watat J, Agbozo E. Co-creating for Context in the Transfer and Diffusion of IT. View
- Bhowmik A, Karforma S. Computational Intelligence for Medical Internet of Things (MIoT) Applications. View
- Sahoo B, Pattnaik P. Communication Technology and Gender Violence. View
- Von Solms S, du Toit J. Intelligent Computing. View
- Rai D, Dhull A, Singh A, Singh K. Healthcare Industry Assessment: Analyzing Risks, Security, and Reliability. View
- Kisielewicz M, Kedziora M, Jozwiak I. Recent Challenges in Intelligent Information and Database Systems. View
- Sharma D, Habibi Lashkari A, Parizadeh M. Understanding Cybersecurity Management in Healthcare. View
- Sharma D, Habibi Lashkari A, Parizadeh M. Understanding Cybersecurity Management in Healthcare. View
- Singh C, Singh R, Kamini , Kumar Y. Cyber-Physical Systems Security. View
- Coventry L, Sillence E, Brown R, Branley-Bell D, Mari P, Saverio C, Casaroli A, Rizzoni F, Magalini S. Socio-Technical Aspects in Security. View
Conference Proceedings
- Pears M, Konstantinidis S. 2021 IEEE Global Engineering Education Conference (EDUCON). Cybersecurity Training in the Healthcare Workforce – Utilization of the ADDIE Model View
- Ganai P, Bag A, Sable A, Abdullah K, Bhatia S, Pant B. 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). A Detailed Investigation of Implementation of Internet of Things (IOT) in Cyber Security in Healthcare Sector View
- Bhosale K, Nenova M, Iliev G. 2021 Sixth Junior Conference on Lighting (Lighting). A study of cyber attacks: In the healthcare sector View
- Carello M, Marchetti-Spaccamela A, Querzoni L, Angelini M. 2023 IEEE International Conference on Intelligence and Security Informatics (ISI). SoK: Cybersecurity Regulations, Standards and Guidelines for the Healthcare Sector * View
