Published on in Vol 22, No 3 (2020): March
This is a member publication of UC Davis - Shields Library, Davis, CA, USA
Preprints (earlier versions) of this paper are
available at
https://preprints.jmir.org/preprint/17612, first published
.

Journals
- He Y, Zamani E, Yevseyeva I, Luo C. Artificial Intelligence–Based Ethical Hacking for Health Information Systems: Simulation Study. Journal of Medical Internet Research 2023;25:e41748 View
- Lieneck C, McLauchlan M, Phillips S. Healthcare Cybersecurity Ethical Concerns during the COVID-19 Global Pandemic: A Rapid Review. Healthcare 2023;11(22):2983 View
- Chinthamu N, Jayakumar S, K M, M P R, Rashid S, D J, Kannadhasan S, Sivakumar P, Saravanan T, Senthil Kumar S. Cyber-Physical Systems Security Protecting Critical Infrastructure from Cyber Threats and Attacks. ITM Web of Conferences 2025;76:03005 View
- Carboni C, Brightwell C, Halpern O, Freyer O, Gilbert S. Reconciling security and care in digital medicine. npj Digital Medicine 2025;8(1) View
- Kahl N, Frieden M, Killeen J, Chan T, Longhurst C, Tully J, Dameff C. Cybersecurity and Emergency Medicine: A Literary Review. The Journal of Emergency Medicine 2026 View
Books/Policy Documents
- Coventry L, Sillence E, Brown R, Branley-Bell D, Mari P, Saverio C, Casaroli A, Rizzoni F, Magalini S. Socio-Technical Aspects in Security. View
Conference Proceedings
- Alsaig A, Alagar V. 2023 IEEE International Conference on Smart Internet of Things (SmartIoT). Dependable Service-Oriented Design of Healthcare IoT View
- Thompson R, Sweet R, J Dameff C, Tully J, Votipka D. Proceedings of the 2026 CHI Conference on Human Factors in Computing Systems. Beyond Clinical Risk: An Experimental Study of Cybersecurity Informed Consent and Patient Choice for Connected Medical Devices View
