Published on in Vol 22, No 1 (2020): January

Journals
- Williams C, Chaturvedi R, Chakravarthy K. Cybersecurity Risks in a Pandemic. Journal of Medical Internet Research 2020;22(9):e23692 View
- Aleroud A, Abu-Shanab E, Al-Aiad A, Alshboul Y. An examination of susceptibility to spear phishing cyber attacks in non-English speaking communities. Journal of Information Security and Applications 2020;55:102614 View
- Abdelhamid M. The Role of Health Concerns in Phishing Susceptibility: Survey Design Study. Journal of Medical Internet Research 2020;22(5):e18394 View
- Montañez R, Golob E, Xu S. Human Cognition Through the Lens of Social Engineering Cyberattacks. Frontiers in Psychology 2020;11 View
- Jalali M, Landman A, Gordon W. Telemedicine, privacy, and information security in the age of COVID-19. Journal of the American Medical Informatics Association 2021;28(3):671 View
- Abroshan H, Devos J, Poels G, Laermans E. Phishing Happens Beyond Technology: The Effects of Human Behaviors and Demographics on Each Step of a Phishing Process. IEEE Access 2021;9:44928 View
- He Y, Aliyu A, Evans M, Luo C. Health Care Cybersecurity Challenges and Solutions Under the Climate of COVID-19: Scoping Review. Journal of Medical Internet Research 2021;23(4):e21747 View
- Nifakos S, Chandramouli K, Nikolaou C, Papachristou P, Koch S, Panaousis E, Bonacina S. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review. Sensors 2021;21(15):5119 View
- Batista E, Moncusi M, López-Aguilar P, Martínez-Ballesté A, Solanas A. Sensors for Context-Aware Smart Healthcare: A Security Perspective. Sensors 2021;21(20):6886 View
- Sari P, Handayani P, Hidayanto A, Yazid S, Aji R. Information Security Behavior in Health Information Systems: A Review of Research Trends and Antecedent Factors. Healthcare 2022;10(12):2531 View
- Yeng P, Fauzi M, Yang B, Nimbe P. Investigation into Phishing Risk Behaviour among Healthcare Staff. Information 2022;13(8):392 View
- Rizzoni F, Magalini S, Casaroli A, Mari P, Dixon M, Coventry L. Phishing simulation exercise in a large hospital: A case study. DIGITAL HEALTH 2022;8:205520762210817 View
- Wasserman L, Wasserman Y. Hospital cybersecurity risks and gaps: Review (for the non-cyber professional). Frontiers in Digital Health 2022;4 View
- Alhuwail D, Al-Jafar E, Abdulsalam Y, AlDuaij S. Information Security Awareness and Behaviors of Health Care Professionals at Public Health Care Facilities. Applied Clinical Informatics 2021;12(04):924 View
- Kraft M. Alternatives to Google Suite Applications. Medical Reference Services Quarterly 2021;40(3):303 View
- Kandasamy K, Srinivas S, Achuthan K, Rangan V. Digital Healthcare - Cyberattacks in Asian Organizations: An Analysis of Vulnerabilities, Risks, NIST Perspectives, and Recommendations. IEEE Access 2022;10:12345 View
- Taodang D, Gundur R. How Frauds in Times of Crisis Target People. Victims & Offenders 2023;18(5):889 View
- Grilc Š, Prislan K, Mihelič A. Teorije in modeli v vedenjskih informacijskovarnostnih raziskavah. Psihološka obzorja 2022;31(1):602 View
- Petrič G, Roer K. The impact of formal and informal organizational norms on susceptibility to phishing: Combining survey and field experiment data. Telematics and Informatics 2022;67:101766 View
- Gioulekas F, Stamatiadis E, Tzikas A, Gounaris K, Georgiadou A, Michalitsi-Psarrou A, Doukas G, Kontoulis M, Nikoloudakis Y, Marin S, Cabecinha R, Ntanos C. A Cybersecurity Culture Survey Targeting Healthcare Critical Infrastructures. Healthcare 2022;10(2):327 View
- Sturman D, Valenzuela C, Plate O, Tanvir T, Auton J, Bayl-Smith P, Wiggins M. The role of cue utilization in the detection of phishing emails. Applied Ergonomics 2023;106:103887 View
- Shiau W, Wang X, Zheng F. What are the trend and core knowledge of information security? A citation and co-citation analysis. Information & Management 2023;60(3):103774 View
- Al‐Qahtani A, Cresci S. The COVID‐19 scamdemic: A survey of phishing attacks and their countermeasures during COVID‐19. IET Information Security 2022;16(5):324 View
- Georgiadou A, Michalitsi-Psarrou A, Gioulekas F, Stamatiadis E, Tzikas A, Gounaris K, Doukas G, Ntanos C, Landeiro Ribeiro L, Askounis D. Hospitals’ Cybersecurity Culture during the COVID-19 Crisis. Healthcare 2021;9(10):1335 View
- Argyridou E, Nifakos S, Laoudias C, Panda S, Panaousis E, Chandramouli K, Navarro-Llobet D, Mora Zamorano J, Papachristou P, Bonacina S. Cyber Hygiene Methodology for Raising Cybersecurity and Data Privacy Awareness in Health Care Organizations: Concept Study. Journal of Medical Internet Research 2023;25:e41294 View
- Vrhovec S, Bernik I, Markelj B. Explaining information seeking intentions: Insights from a Slovenian social engineering awareness campaign. Computers & Security 2023;125:103038 View
- Zhuo S, Biddle R, Koh Y, Lottridge D, Russello G. SoK: Human-centered Phishing Susceptibility. ACM Transactions on Privacy and Security 2023;26(3):1 View
- Dey J. State-of-the-art session key generation on priority-based adaptive neural machine (PANM) in telemedicine. Neural Computing and Applications 2023;35(13):9517 View
- Tally A, Abbott J, Bochner A, Das S, Nippert-Eng C. What Mid-Career Professionals Think, Know, and Feel About Phishing: Opportunities for University IT Departments to Better Empower Employees in Their Anti-Phishing Decisions. Proceedings of the ACM on Human-Computer Interaction 2023;7(CSCW1):1 View
- Kannelønning K, Katsikas S. A systematic literature review of how cybersecurity-related behavior has been assessed. Information & Computer Security 2023;31(4):463 View
- Xu T, Rajivan P. Determining psycholinguistic features of deception in phishing messages. Information & Computer Security 2023;31(2):199 View
- Rajamäki J, Chaulagain N, Kukkonen M, Nurmi P, Honkonen M, Saarinen S, Kinnunen T. Improving the Cybersecurity Awareness of Finnish Podiatry SMEs. WSEAS TRANSACTIONS ON COMPUTERS 2023;22:198 View
- Mikuletič S, Vrhovec S, Skela-Savič B, Žvanut B. Security and privacy oriented information security culture (ISC): Explaining unauthorized access to healthcare data by nursing employees. Computers & Security 2024;136:103489 View
- Merhavy Z, Bassett L, Melchiorre M, Hall M. The impact of lecture playback speeds on concentration and memory. BMC Medical Education 2023;23(1) View
- Burda P, Allodi L, Zannone N. Cognition in Social Engineering Empirical Research: A Systematic Literature Review. ACM Transactions on Computer-Human Interaction 2024;31(2):1 View
- Willie M. The Role of Organizational Culture in Cybersecurity: Building a Security-First Culture. SSRN Electronic Journal 2023 View
- Tazi F, Nandakumar A, Dykstra J, Rajivan P, Das S. SoK: Analyzing Privacy and Security of Healthcare Data from the User Perspective. ACM Transactions on Computing for Healthcare 2024;5(2):1 View
- Kim B, Kim M. The influence of work overload on cybersecurity behavior: A moderated mediation model of psychological contract breach, burnout, and self-efficacy in AI learning such as ChatGPT. Technology in Society 2024;77:102543 View
- Gerdin M, Kolkowska E, Grönlund Å. What goes around comes around: an in-depth analysis of how respondents interpret ISP non-/compliance questionnaire items. Information & Computer Security 2024;32(4):459 View
- Longtchi T, Rodriguez R, Al-Shawaf L, Atyabi A, Xu S. Internet-Based Social Engineering Psychology, Attacks, and Defenses: A Survey. Proceedings of the IEEE 2024;112(3):210 View
- Talwar Y, Mehra A. Cybercrime threats in health-care establishments: Urgent need for action. Indian Journal of Community and Family Medicine 2024;10(1):67 View
- Ahola K, Butavicius M, McCormac A, Sturman D. Hey “CSIRI”, should I report this? Investigating the factors that influence employees to report cyber security incidents in the workplace. Information & Computer Security 2025;33(2):242 View
- Elendu C, Omeludike E, Oloyede P, Obidigbo B, Omeludike J. Legal implications for clinicians in cybersecurity incidents: A review. Medicine 2024;103(39):e39887 View
- Pigola A, da Costa P. Cybersecurity management: an empirical analysis of dynamic capabilities framework for enhancing cybersecurity intelligence. Information & Computer Security 2025;33(4):473 View
- Schürmann F, Westmattelmann D, Schewe G. Factors Influencing Telemedicine Adoption Among Health Care Professionals: Qualitative Interview Study. JMIR Formative Research 2025;9:e54777 View
- Clusmann J, Ferber D, Wiest I, Schneider C, Brinker T, Foersch S, Truhn D, Kather J. Prompt injection attacks on vision language models in oncology. Nature Communications 2025;16(1) View
- Gerdin M, Grönlund Å, Kolkowska E. Conceptual inconsistencies in variable definitions and measurement items within ISP non-/compliance research: A systematic literature review. Computers & Security 2025;152:104365 View
- Cornejo G. Assessing cybersecurity dynamics: a comparative analysis of data breaches in urban and rural hospitals in the United States. Security Journal 2025;38(1) View
- Clusmann J, Schulz S, Ferber D, Wiest I, Fernandez A, Eckstein M, Lange F, Reitsam N, Kellers F, Schmitt M, Neidlinger P, Koop P, Schneider C, Truhn D, Roth W, Jesinghaus M, Kather J, Foersch S. Incidental Prompt Injections on Vision–Language Models in Real-Life Histopathology. NEJM AI 2025;2(6) View
- Pigola A, da Costa P, Vils L, Meirelles F. Enhancing information security management and performance through social and relational factors: a structural equation modelling approach. Behaviour & Information Technology 2025:1 View
- Nizamuddin M. Investigating the cybersecurity risks of remote work: a systematic literature review of organizational vulnerabilities and mitigation strategies. International Journal of Information Security 2025;24(4) View
- Ramadani D. THE INFLUENCE OF TASK CHARACTERISTICS AND TECHNOLOGY FUNCTIONALITY ON TASKTECHNOLOGY FIT AND SERVICE LEVEL PERFORMANCE IN FULFILLMENT CENTERS: EVIDENCE FROM A STARTUP CONTEXT. Accounting and Management Journal 2025;9(1):1 View
- Lu X, Jiang J, Head M, Yang J. Phishing detection in multitasking contexts: the impact of working memory load, goal activation, and message framing cue on detection performance. European Journal of Information Systems 2025:1 View
- Prabhu S, Dell P. A structured review of insider cybersecurity behaviour studies. Information Security Journal: A Global Perspective 2025;34(6):655 View
- Jalali M, Largman K, Razzaghi H. Bridging data gaps and tackling human vulnerabilities in healthcare cybersecurity with generative AI. PLOS Digital Health 2025;4(10):e0001063 View
- Peters S, O’Donovan A, Bellini M, Caissie A, Coffey M, Dabach A, Delaney G, Fischer P, Frenken G, Liszewski B, Maingon P, Messens E, Perryck S, Zhang B, Reijnders-Thijssen P. ESTRO framework for radiation oncology departments to mitigate against cyberattacks. Radiotherapy and Oncology 2026;214:111305 View
Books/Policy Documents
- Hendriks F, Distel B, Engelke K, Westmattelmann D, Wintterlin F. Trust and Communication. View
- Janzik R, Quandt T. Trust and Communication. View
- Montañez R, Atyabi A, Xu S. Cybersecurity and Cognitive Science. View
- Jayasinghe R, Jayasinghe R. Effective Use of Social Media in Public Health. View
- Sharma D, Habibi Lashkari A, Parizadeh M. Understanding Cybersecurity Management in Healthcare. View
- Bouma D, Hoffmans C, van den Hout N, Zwarts N, Treur J, Roelofsma P. International Joint Conferences. View
- Coventry L, Sillence E, Brown R, Branley-Bell D, Mari P, Saverio C, Casaroli A, Rizzoni F, Magalini S. Socio-Technical Aspects in Security. View
- Mui J, Eversole B, Crowder C. Human Resources Development in a Digital Age. View
Conference Proceedings
- Saha I, Sarma D, Chakma R, Alam M, Sultana A, Hossain S. 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT). Phishing Attacks Detection using Deep Learning Approach View
- Yeng P, Fauzi M, Yang B. 25th Pan-Hellenic Conference on Informatics. Assessing the effect of human factors in healthcare cyber security practice: An empirical study View
- Tally A, Abbott J, Bochner A, Das S, Nippert-Eng C. Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems. Tips, Tricks, and Training: Supporting Anti-Phishing Awareness among Mid-Career Office Workers Based on Employees’ Current Practices View
- Marin I, Burda P, Zannone N, Allodi L. Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems. The Influence of Human Factors on the Intention to Report Phishing Emails View
- Yeng P, Yang B, Fauzi M, Nimbe P. 2023 Intelligent Methods, Systems, and Applications (IMSA). A framework for exploring incentive methods towards reducing phishing susceptibility in Healthcare: Based on a review and In-the-wild-field study approach View
- Duman Ş, Hayran R, Sogukpinar İ. 2023 11th International Symposium on Digital Forensics and Security (ISDFS). Impact Analysis and Performance Model of Social Engineering Techniques View
- Lysenko S, Vorobiov V, Bokhonko O, Gaj P, Savenko O, Wołoszyn J. 2023 13th International Conference on Dependable Systems, Services and Technologies (DESSERT). Social Engineering Attacks Detection Approach View
- Solic K, Velki T, Bodalec D, Fosic I. 2024 47th MIPRO ICT and Electronics Convention (MIPRO). Comparative Study on Online Security Awareness and Behavior Among Healthcare Professionals in Croatia View
- Burda P, Kokkini M, Allodi L, Zannone N. 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). The (Relative) Impact of Email Cues on the Perceived Threat of Phishing Attacks: A User Perspective on Phishing Deceptiveness View
- Zhuo S, Biddle R, Daniel Recomendable J, Russello G, Lottridge D. Proceedings of the 2024 European Symposium on Usable Security. Eyes on the Phish(er): Towards Understanding Users' Email Processing Pattern and Mental Models in Phishing Detection View
- Zhuo S, Biddle R, Russello G, Lottridge D. Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems. Precision Email Simulator for Research on Safety-Critical Phishing Behaviour View
- Braun O, Hörnemann J, Pohlmann N, Urban T, Grosse-Kampmann M. Proceedings of the 20th ACM Asia Conference on Computer and Communications Security. Different Seas, Different Phishes – Large-Scale Analysis of Phishing Simulations Across Different Industries View
- Tolsdorf J, Langer D, Lo Iacono L. Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security. Phishing Susceptibility and the (In-)Effectiveness of Common Anti-Phishing Interventions in a Large University Hospital View
- Brunken L, Schöps M, Buckmann A, Meißner F, Sasse M. Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security. Noise and Stress Don't Help With Learning: A Qualitative Study to Inform Design of Effective Cybersecurity Awareness in Manufacturing Environments View
