Published on in Vol 22, No 1 (2020): January
Journals
- Williams C, Chaturvedi R, Chakravarthy K. Cybersecurity Risks in a Pandemic. Journal of Medical Internet Research 2020;22(9):e23692 View
- Aleroud A, Abu-Shanab E, Al-Aiad A, Alshboul Y. An examination of susceptibility to spear phishing cyber attacks in non-English speaking communities. Journal of Information Security and Applications 2020;55:102614 View
- Abdelhamid M. The Role of Health Concerns in Phishing Susceptibility: Survey Design Study. Journal of Medical Internet Research 2020;22(5):e18394 View
- Montañez R, Golob E, Xu S. Human Cognition Through the Lens of Social Engineering Cyberattacks. Frontiers in Psychology 2020;11 View
- Jalali M, Landman A, Gordon W. Telemedicine, privacy, and information security in the age of COVID-19. Journal of the American Medical Informatics Association 2021;28(3):671 View
- Abroshan H, Devos J, Poels G, Laermans E. Phishing Happens Beyond Technology: The Effects of Human Behaviors and Demographics on Each Step of a Phishing Process. IEEE Access 2021;9:44928 View
- He Y, Aliyu A, Evans M, Luo C. Health Care Cybersecurity Challenges and Solutions Under the Climate of COVID-19: Scoping Review. Journal of Medical Internet Research 2021;23(4):e21747 View
- Nifakos S, Chandramouli K, Nikolaou C, Papachristou P, Koch S, Panaousis E, Bonacina S. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review. Sensors 2021;21(15):5119 View
- Batista E, Moncusi M, López-Aguilar P, Martínez-Ballesté A, Solanas A. Sensors for Context-Aware Smart Healthcare: A Security Perspective. Sensors 2021;21(20):6886 View
- Sari P, Handayani P, Hidayanto A, Yazid S, Aji R. Information Security Behavior in Health Information Systems: A Review of Research Trends and Antecedent Factors. Healthcare 2022;10(12):2531 View
- Yeng P, Fauzi M, Yang B, Nimbe P. Investigation into Phishing Risk Behaviour among Healthcare Staff. Information 2022;13(8):392 View
- Rizzoni F, Magalini S, Casaroli A, Mari P, Dixon M, Coventry L. Phishing simulation exercise in a large hospital: A case study. DIGITAL HEALTH 2022;8:205520762210817 View
- Wasserman L, Wasserman Y. Hospital cybersecurity risks and gaps: Review (for the non-cyber professional). Frontiers in Digital Health 2022;4 View
- Alhuwail D, Al-Jafar E, Abdulsalam Y, AlDuaij S. Information Security Awareness and Behaviors of Health Care Professionals at Public Health Care Facilities. Applied Clinical Informatics 2021;12(04):924 View
- Kraft M. Alternatives to Google Suite Applications. Medical Reference Services Quarterly 2021;40(3):303 View
- Kandasamy K, Srinivas S, Achuthan K, Rangan V. Digital Healthcare - Cyberattacks in Asian Organizations: An Analysis of Vulnerabilities, Risks, NIST Perspectives, and Recommendations. IEEE Access 2022;10:12345 View
- Taodang D, Gundur R. How Frauds in Times of Crisis Target People. Victims & Offenders 2023;18(5):889 View
- Grilc Š, Prislan K, Mihelič A. Teorije in modeli v vedenjskih informacijskovarnostnih raziskavah. Psihološka obzorja 2022;31(1):602 View
- Petrič G, Roer K. The impact of formal and informal organizational norms on susceptibility to phishing: Combining survey and field experiment data. Telematics and Informatics 2022;67:101766 View
- Gioulekas F, Stamatiadis E, Tzikas A, Gounaris K, Georgiadou A, Michalitsi-Psarrou A, Doukas G, Kontoulis M, Nikoloudakis Y, Marin S, Cabecinha R, Ntanos C. A Cybersecurity Culture Survey Targeting Healthcare Critical Infrastructures. Healthcare 2022;10(2):327 View
- Sturman D, Valenzuela C, Plate O, Tanvir T, Auton J, Bayl-Smith P, Wiggins M. The role of cue utilization in the detection of phishing emails. Applied Ergonomics 2023;106:103887 View
- Shiau W, Wang X, Zheng F. What are the trend and core knowledge of information security? A citation and co-citation analysis. Information & Management 2023;60(3):103774 View
- Al‐Qahtani A, Cresci S. The COVID‐19 scamdemic: A survey of phishing attacks and their countermeasures during COVID‐19. IET Information Security 2022;16(5):324 View
- Georgiadou A, Michalitsi-Psarrou A, Gioulekas F, Stamatiadis E, Tzikas A, Gounaris K, Doukas G, Ntanos C, Landeiro Ribeiro L, Askounis D. Hospitals’ Cybersecurity Culture during the COVID-19 Crisis. Healthcare 2021;9(10):1335 View
- Argyridou E, Nifakos S, Laoudias C, Panda S, Panaousis E, Chandramouli K, Navarro-Llobet D, Mora Zamorano J, Papachristou P, Bonacina S. Cyber Hygiene Methodology for Raising Cybersecurity and Data Privacy Awareness in Health Care Organizations: Concept Study. Journal of Medical Internet Research 2023;25:e41294 View
- Vrhovec S, Bernik I, Markelj B. Explaining information seeking intentions: Insights from a Slovenian social engineering awareness campaign. Computers & Security 2023;125:103038 View
- Zhuo S, Biddle R, Koh Y, Lottridge D, Russello G. SoK: Human-centered Phishing Susceptibility. ACM Transactions on Privacy and Security 2023;26(3):1 View
- Dey J. State-of-the-art session key generation on priority-based adaptive neural machine (PANM) in telemedicine. Neural Computing and Applications 2023;35(13):9517 View
- Tally A, Abbott J, Bochner A, Das S, Nippert-Eng C. What Mid-Career Professionals Think, Know, and Feel About Phishing: Opportunities for University IT Departments to Better Empower Employees in Their Anti-Phishing Decisions. Proceedings of the ACM on Human-Computer Interaction 2023;7(CSCW1):1 View
- Kannelønning K, Katsikas S. A systematic literature review of how cybersecurity-related behavior has been assessed. Information & Computer Security 2023;31(4):463 View
- Xu T, Rajivan P. Determining psycholinguistic features of deception in phishing messages. Information & Computer Security 2023;31(2):199 View
- Rajamäki J, Chaulagain N, Kukkonen M, Nurmi P, Honkonen M, Saarinen S, Kinnunen T. Improving the Cybersecurity Awareness of Finnish Podiatry SMEs. WSEAS TRANSACTIONS ON COMPUTERS 2023;22:198 View
- Mikuletič S, Vrhovec S, Skela-Savič B, Žvanut B. Security and privacy oriented information security culture (ISC): Explaining unauthorized access to healthcare data by nursing employees. Computers & Security 2024;136:103489 View
- Merhavy Z, Bassett L, Melchiorre M, Hall M. The impact of lecture playback speeds on concentration and memory. BMC Medical Education 2023;23(1) View
- Burda P, Allodi L, Zannone N. Cognition in Social Engineering Empirical Research: A Systematic Literature Review. ACM Transactions on Computer-Human Interaction 2024;31(2):1 View
- Willie M. The Role of Organizational Culture in Cybersecurity: Building a Security-First Culture. SSRN Electronic Journal 2023 View
- Tazi F, Nandakumar A, Dykstra J, Rajivan P, Das S. SoK: Analyzing Privacy and Security of Healthcare Data from the User Perspective. ACM Transactions on Computing for Healthcare 2024;5(2):1 View
- Kim B, Kim M. The influence of work overload on cybersecurity behavior: A moderated mediation model of psychological contract breach, burnout, and self-efficacy in AI learning such as ChatGPT. Technology in Society 2024;77:102543 View
- Gerdin M, Kolkowska E, Grönlund Å. What goes around comes around: an in-depth analysis of how respondents interpret ISP non-/compliance questionnaire items. Information & Computer Security 2024;32(4):459 View
- Longtchi T, Rodriguez R, Al-Shawaf L, Atyabi A, Xu S. Internet-Based Social Engineering Psychology, Attacks, and Defenses: A Survey. Proceedings of the IEEE 2024;112(3):210 View
- Talwar Y, Mehra A. Cybercrime threats in health-care establishments: Urgent need for action. Indian Journal of Community and Family Medicine 2024;10(1):67 View
- Ahola K, Butavicius M, McCormac A, Sturman D. Hey “CSIRI”, should I report this? Investigating the factors that influence employees to report cyber security incidents in the workplace. Information & Computer Security 2024 View
- Elendu C, Omeludike E, Oloyede P, Obidigbo B, Omeludike J. Legal implications for clinicians in cybersecurity incidents: A review. Medicine 2024;103(39):e39887 View
Books/Policy Documents
- Hendriks F, Distel B, Engelke K, Westmattelmann D, Wintterlin F. Trust and Communication. View
- Janzik R, Quandt T. Trust and Communication. View
- Montañez R, Atyabi A, Xu S. Cybersecurity and Cognitive Science. View
- Jayasinghe R, Jayasinghe R. Effective Use of Social Media in Public Health. View
- Sharma D, Habibi Lashkari A, Parizadeh M. Understanding Cybersecurity Management in Healthcare. View
- Bouma D, Hoffmans C, van den Hout N, Zwarts N, Treur J, Roelofsma P. International Joint Conferences. View