Published on in Vol 22, No 9 (2020): September
Preprints (earlier versions) of this paper are
available at
https://preprints.jmir.org/preprint/23692, first published
.
Journals
- Gupta L, Sanjeevkumar Gaur P. CHANGING RESEARCH PARADIGM IN THE FACE OF A GLOBAL PANDEMIC: FORESEEABLE IMPACT AND ADAPTIVE MEASURES IN ACADEMIC RESEARCH IN THE FUTURE. Proceedings of the Shevchenko Scientific Society. Medical Sciences 2020;62(2) View
- Damaševičius R, Venčkauskas A, Toldinas J, Grigaliūnas Š. Ensemble-Based Classification Using Neural Networks and Machine Learning Models for Windows PE Malware Detection. Electronics 2021;10(4):485 View
- Diaz R, Ghita M, Copot D, Birs I, Muresan C, Ionescu C. Context Aware Control Systems: An Engineering Applications Perspective. IEEE Access 2020;8:215550 View
- Yigit Ozkan B, van Lingen S, Spruit M. The Cybersecurity Focus Area Maturity (CYSFAM) Model. Journal of Cybersecurity and Privacy 2021;1(1):119 View
- Fremming B, Ringenberg K, Berky K, Roberts E, Lisco S, Schulte T. Perioperative pandemic protocols are also useful during a cyber-attack system downtime. Journal of Clinical Anesthesia 2021;71:110243 View
- He Y, Aliyu A, Evans M, Luo C. Health Care Cybersecurity Challenges and Solutions Under the Climate of COVID-19: Scoping Review. Journal of Medical Internet Research 2021;23(4):e21747 View
- Kania K, Abu-Ghname A, Agrawal N, Maricevich R. Reply: Four Strategies for Plastic Surgery Education amid the COVID-19 Pandemic. Plastic & Reconstructive Surgery 2021;148(1):153e View
- Cruz M, Nieblas-Bedolla E, Young C, Feroze A, Williams J, Ellenbogen R, Levitt M. United States Medicolegal Progress and Innovation in Telemedicine in the Age of COVID-19: A Primer for Neurosurgeons. Neurosurgery 2021;89(3):364 View
- Knop M, Mueller M, Niehaves B. Investigating the Use of Telemedicine for Digitally Mediated Delegation in Team-Based Primary Care: Mixed Methods Study. Journal of Medical Internet Research 2021;23(8):e28151 View
- Nifakos S, Chandramouli K, Nikolaou C, Papachristou P, Koch S, Panaousis E, Bonacina S. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review. Sensors 2021;21(15):5119 View
- Moosavi J, Bakhshi J, Martek I. The application of industry 4.0 technologies in pandemic management: Literature review and case study. Healthcare Analytics 2021;1:100008 View
- John B, McCreary C, Roberts A. Smartphone technology for communications between clinicians – A scoping review. Journal of Dentistry 2022;122:104112 View
- Law E, Abascal J. Post-Pandemic HCI—Living Digitally: Well-Being-Driven Digital Technologies. Interacting with Computers 2021;33(4):331 View
- Katagiri N. Explaining Cyberspace Dynamics in the COVID Era. Global Studies Quarterly 2022;2(3) View
- Kernebeck S, Busse T, Jux C, Bork U, Ehlers J. Electronic Medical Records for (Visceral) Medicine: An Overview of the Current Status and Prospects. Visceral Medicine 2021;37(6):476 View
- Sharma V, Feldman M, Sharma R. Telehealth Technologies in Diabetes Self-management and Education. Journal of Diabetes Science and Technology 2024;18(1):148 View
- Perwej D, Qamar Abbas S, Pratap Dixit J, Akhtar D, Kumar Jaiswal A. A Systematic Literature Review on the Cyber Security. International Journal of Scientific Research and Management 2021;9(12):669 View
- Kagerl C, Starzetz J. Working from home for good? Lessons learned from the COVID-19 pandemic and what this means for the future of work. Journal of Business Economics 2023;93(1-2):229 View
- Gisselsson D. Next-Generation Biowarfare: Small in Scale, Sensational in Nature?. Health Security 2022;20(2):182 View
- Chunlei S, Yuxin L. Exploring the discourse of enterprise cyber governance in the covid-19 era: a sociosemiotic perspective. International Journal of Legal Discourse 2022;7(1):53 View
- He Y, Zamani E, Yevseyeva I, Luo C. Artificial Intelligence–Based Ethical Hacking for Health Information Systems: Simulation Study. Journal of Medical Internet Research 2023;25:e41748 View
- Sabin J. The future of security in a remote-work environment. Network Security 2021;2021(10):15 View
- Wasserman L, Wasserman Y. Hospital cybersecurity risks and gaps: Review (for the non-cyber professional). Frontiers in Digital Health 2022;4 View
- Argyridou E, Nifakos S, Laoudias C, Panda S, Panaousis E, Chandramouli K, Navarro-Llobet D, Mora Zamorano J, Papachristou P, Bonacina S. Cyber Hygiene Methodology for Raising Cybersecurity and Data Privacy Awareness in Health Care Organizations: Concept Study. Journal of Medical Internet Research 2023;25:e41294 View
- Vignali V, Hines P, Cruz A, Ziętek B, Herold R. Health horizons: Future trends and technologies from the European Medicines Agency’s horizon scanning collaborations. Frontiers in Medicine 2022;9 View
- Miethlich B, Belotserkovich D, Abasova S, Zatsarinnaya E, Veselitsky O. The Impact of COVID-19 on Digital Enterprise Management. IEEE Engineering Management Review 2021;49(4):16 View
- Ghourabi A. A Security Model Based on LightGBM and Transformer to Protect Healthcare Systems From Cyberattacks. IEEE Access 2022;10:48890 View
- Al‐Qahtani A, Cresci S. The COVID‐19 scamdemic: A survey of phishing attacks and their countermeasures during COVID‐19. IET Information Security 2022;16(5):324 View
- Mubarak E, Kaur S, Min M, Hughes M, Rushton C, Ali J. Emerging Experiences with Virtual Clinical Ethics Consultation: Case Studies from the United States and Malaysia. The Journal of Clinical Ethics 2023;34(1):51 View
- Titus A. Tax Policy for the Future of Developing Countries: The Synergies between COVID-19 and Automation. SSRN Electronic Journal 2021 View
- Cartwright A. The elephant in the room: cybersecurity in healthcare. Journal of Clinical Monitoring and Computing 2023;37(5):1123 View
- Halman L, Alenazi M. MCAD: A Machine Learning Based Cyberattacks Detector in Software-Defined Networking (SDN) for Healthcare Systems. IEEE Access 2023;11:37052 View
- İSTANBULLU A. How Should I Start Research in Cyber Security? Suggestions for Researchers According to Bibliometric Analysis Data. Sakarya University Journal of Education 2023;13(1):119 View
- Dameff C, Tully J, Chan T, Castillo E, Savage S, Maysent P, Hemmen T, Clay B, Longhurst C. Ransomware Attack Associated With Disruptions at Adjacent Emergency Departments in the US. JAMA Network Open 2023;6(5):e2312270 View
- Ozkan-Okay M, Samet R, Aslan Ö, Kosunalp S, Iliev T, Stoyanov I. A Novel Feature Selection Approach to Classify Intrusion Attacks in Network Communications. Applied Sciences 2023;13(19):11067 View
- Jerry-Egemba N. Safe and sound: Strengthening cybersecurity in healthcare through robust staff educational programs. Healthcare Management Forum 2024;37(1):21 View
- van Boven L, Kusters R, Tin D, van Osch F, De Cauwer H, Ketelings L, Rao M, Dameff C, Barten D. Hacking Acute Care: A Qualitative Study on the Health Care Impacts of Ransomware Attacks Against Hospitals. Annals of Emergency Medicine 2024;83(1):46 View
- Sari P, Handayani P, Hidayanto A. Demographic Comparison of Information Security Behavior Toward Health Information System Protection: Survey Study. JMIR Formative Research 2023;7:e49439 View
- Cacciamani G, Chen A, Gill I, Hung A. Artificial intelligence and urology: ethical considerations for urologists and patients. Nature Reviews Urology 2024;21(1):50 View
- van Kessel R, Haig M, Mossialos E. Strengthening Cybersecurity for Patient Data Protection in Europe. Journal of Medical Internet Research 2023;25:e48824 View
- Lu Z, Huang Y, Du P, Li F, Li Z. Pandemics uncertainty and informational globalization in CEE countries: The role of innovation diffusion. Heliyon 2023;9(11):e21489 View
- Lieneck C, McLauchlan M, Phillips S. Healthcare Cybersecurity Ethical Concerns during the COVID-19 Global Pandemic: A Rapid Review. Healthcare 2023;11(22):2983 View
- Khan J, Shinde A, Mujawar S, S J, Singh B. Securing Hms Through Hybrid Method. SSRN Electronic Journal 2024 View
- Sunil V, Mathew S. A Systematic Review on Cybersecurity Threats and Challenges in Hospitals. Acta Medica International 2024;11(1):1 View
- Hossain S, Yigitcanlar T, Nguyen K, Xu Y. Understanding Local Government Cybersecurity Policy: A Concept Map and Framework. Information 2024;15(6):342 View
- Bedón A, Pujol F, Ramírez T, Mora H, Pujol M. The Importance of Teleworking and Its Implications for Industry 5.0: A Case Study. IEEE Access 2024;12:80529 View
- Morales-Sáenz F, Medina-Quintero J, Reyna-Castillo M. Beyond Data Protection: Exploring the Convergence between Cybersecurity and Sustainable Development in Business. Sustainability 2024;16(14):5884 View
- Eisenberg J, Rhee J. Implications of telemedicine. Seminars in Spine Surgery 2024;36(3):101121 View
- Elendu C, Omeludike E, Oloyede P, Obidigbo B, Omeludike J. Legal implications for clinicians in cybersecurity incidents: A review. Medicine 2024;103(39):e39887 View
- Peng W, Meng J, Lim S, Liu H. Online health [mis]information processing and evaluation among older adults: Comparing individuals with varied abilities in information discernment. Telematics and Informatics 2024;95:102197 View
- Mahmood S, Chadhar M, Firmin S. Addressing Cybersecurity Challenges in Times of Crisis: Extending the Sociotechnical Systems Perspective. Applied Sciences 2024;14(24):11610 View
Books/Policy Documents
- Gofman M, Mitra S, Tadesse B, Villa M. Advances in Cybersecurity Management. View
- Aneke J, Ardito C, Desolda G. HCI for Cybersecurity, Privacy and Trust. View
- Medhekar A. Handbook of Research on Advancing Cybersecurity for Digital Transformation. View
- Khan M. Cities and Mega Risks. View
- Medhekar A. Research Anthology on Securing Medical Systems and Records. View
- Jhanjhi N, Ahmad M, Khan M, Hussain M. Cybersecurity Measures for E-Government Frameworks. View
- Ibrahim A, Jamri B, Zakari A. Global Perspectives on Information Security Regulations. View
- Shah I. Cybersecurity Measures for E-Government Frameworks. View
- Lenka A, Goswami M, Singh H, Baskaran H. Effective Cybersecurity Operations for Enterprise-Wide Systems. View
- Shah I, Jhanjhi N, Ray S. Advances in Explainable AI Applications for Smart Cities. View
- Shah I, Murugesan R, Rajper S. Navigating Cyber Threats and Cybersecurity in the Logistics Industry. View