Published on in Vol 22, No 9 (2020): September

Preprints (earlier versions) of this paper are available at https://preprints.jmir.org/preprint/23692, first published .
Cybersecurity Risks in a Pandemic

Cybersecurity Risks in a Pandemic

Cybersecurity Risks in a Pandemic

Journals

  1. Gupta L, Sanjeevkumar Gaur P. CHANGING RESEARCH PARADIGM IN THE FACE OF A GLOBAL PANDEMIC: FORESEEABLE IMPACT AND ADAPTIVE MEASURES IN ACADEMIC RESEARCH IN THE FUTURE. Proceedings of the Shevchenko Scientific Society. Medical Sciences 2020;62(2) View
  2. Damaševičius R, Venčkauskas A, Toldinas J, Grigaliūnas Š. Ensemble-Based Classification Using Neural Networks and Machine Learning Models for Windows PE Malware Detection. Electronics 2021;10(4):485 View
  3. Diaz R, Ghita M, Copot D, Birs I, Muresan C, Ionescu C. Context Aware Control Systems: An Engineering Applications Perspective. IEEE Access 2020;8:215550 View
  4. Yigit Ozkan B, van Lingen S, Spruit M. The Cybersecurity Focus Area Maturity (CYSFAM) Model. Journal of Cybersecurity and Privacy 2021;1(1):119 View
  5. Fremming B, Ringenberg K, Berky K, Roberts E, Lisco S, Schulte T. Perioperative pandemic protocols are also useful during a cyber-attack system downtime. Journal of Clinical Anesthesia 2021;71:110243 View
  6. He Y, Aliyu A, Evans M, Luo C. Health Care Cybersecurity Challenges and Solutions Under the Climate of COVID-19: Scoping Review. Journal of Medical Internet Research 2021;23(4):e21747 View
  7. Kania K, Abu-Ghname A, Agrawal N, Maricevich R. Reply: Four Strategies for Plastic Surgery Education amid the COVID-19 Pandemic. Plastic & Reconstructive Surgery 2021;148(1):153e View
  8. Cruz M, Nieblas-Bedolla E, Young C, Feroze A, Williams J, Ellenbogen R, Levitt M. United States Medicolegal Progress and Innovation in Telemedicine in the Age of COVID-19: A Primer for Neurosurgeons. Neurosurgery 2021;89(3):364 View
  9. Knop M, Mueller M, Niehaves B. Investigating the Use of Telemedicine for Digitally Mediated Delegation in Team-Based Primary Care: Mixed Methods Study. Journal of Medical Internet Research 2021;23(8):e28151 View
  10. Nifakos S, Chandramouli K, Nikolaou C, Papachristou P, Koch S, Panaousis E, Bonacina S. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review. Sensors 2021;21(15):5119 View
  11. Moosavi J, Bakhshi J, Martek I. The application of industry 4.0 technologies in pandemic management: Literature review and case study. Healthcare Analytics 2021;1:100008 View
  12. John B, McCreary C, Roberts A. Smartphone technology for communications between clinicians – A scoping review. Journal of Dentistry 2022;122:104112 View
  13. Law E, Abascal J. Post-Pandemic HCI—Living Digitally: Well-Being-Driven Digital Technologies. Interacting with Computers 2021;33(4):331 View
  14. Katagiri N. Explaining Cyberspace Dynamics in the COVID Era. Global Studies Quarterly 2022;2(3) View
  15. Kernebeck S, Busse T, Jux C, Bork U, Ehlers J. Electronic Medical Records for (Visceral) Medicine: An Overview of the Current Status and Prospects. Visceral Medicine 2021;37(6):476 View
  16. Sharma V, Feldman M, Sharma R. Telehealth Technologies in Diabetes Self-management and Education. Journal of Diabetes Science and Technology 2024;18(1):148 View
  17. Perwej D, Qamar Abbas S, Pratap Dixit J, Akhtar D, Kumar Jaiswal A. A Systematic Literature Review on the Cyber Security. International Journal of Scientific Research and Management 2021;9(12):669 View
  18. Kagerl C, Starzetz J. Working from home for good? Lessons learned from the COVID-19 pandemic and what this means for the future of work. Journal of Business Economics 2023;93(1-2):229 View
  19. Gisselsson D. Next-Generation Biowarfare: Small in Scale, Sensational in Nature?. Health Security 2022;20(2):182 View
  20. Chunlei S, Yuxin L. Exploring the discourse of enterprise cyber governance in the covid-19 era: a sociosemiotic perspective. International Journal of Legal Discourse 2022;7(1):53 View
  21. He Y, Zamani E, Yevseyeva I, Luo C. Artificial Intelligence–Based Ethical Hacking for Health Information Systems: Simulation Study. Journal of Medical Internet Research 2023;25:e41748 View
  22. Sabin J. The future of security in a remote-work environment. Network Security 2021;2021(10):15 View
  23. Wasserman L, Wasserman Y. Hospital cybersecurity risks and gaps: Review (for the non-cyber professional). Frontiers in Digital Health 2022;4 View
  24. Argyridou E, Nifakos S, Laoudias C, Panda S, Panaousis E, Chandramouli K, Navarro-Llobet D, Mora Zamorano J, Papachristou P, Bonacina S. Cyber Hygiene Methodology for Raising Cybersecurity and Data Privacy Awareness in Health Care Organizations: Concept Study. Journal of Medical Internet Research 2023;25:e41294 View
  25. Vignali V, Hines P, Cruz A, Ziętek B, Herold R. Health horizons: Future trends and technologies from the European Medicines Agency’s horizon scanning collaborations. Frontiers in Medicine 2022;9 View
  26. Miethlich B, Belotserkovich D, Abasova S, Zatsarinnaya E, Veselitsky O. The Impact of COVID-19 on Digital Enterprise Management. IEEE Engineering Management Review 2021;49(4):16 View
  27. Ghourabi A. A Security Model Based on LightGBM and Transformer to Protect Healthcare Systems From Cyberattacks. IEEE Access 2022;10:48890 View
  28. Al‐Qahtani A, Cresci S. The COVID‐19 scamdemic: A survey of phishing attacks and their countermeasures during COVID‐19. IET Information Security 2022;16(5):324 View
  29. Mubarak E, Kaur S, Min M, Hughes M, Rushton C, Ali J. Emerging Experiences with Virtual Clinical Ethics Consultation: Case Studies from the United States and Malaysia. The Journal of Clinical Ethics 2023;34(1):51 View
  30. Titus A. Tax Policy for the Future of Developing Countries: The Synergies between COVID-19 and Automation. SSRN Electronic Journal 2021 View
  31. Cartwright A. The elephant in the room: cybersecurity in healthcare. Journal of Clinical Monitoring and Computing 2023;37(5):1123 View
  32. Halman L, Alenazi M. MCAD: A Machine Learning Based Cyberattacks Detector in Software-Defined Networking (SDN) for Healthcare Systems. IEEE Access 2023;11:37052 View
  33. İSTANBULLU A. How Should I Start Research in Cyber Security? Suggestions for Researchers According to Bibliometric Analysis Data. Sakarya University Journal of Education 2023;13(1):119 View
  34. Dameff C, Tully J, Chan T, Castillo E, Savage S, Maysent P, Hemmen T, Clay B, Longhurst C. Ransomware Attack Associated With Disruptions at Adjacent Emergency Departments in the US. JAMA Network Open 2023;6(5):e2312270 View
  35. Ozkan-Okay M, Samet R, Aslan Ö, Kosunalp S, Iliev T, Stoyanov I. A Novel Feature Selection Approach to Classify Intrusion Attacks in Network Communications. Applied Sciences 2023;13(19):11067 View
  36. Jerry-Egemba N. Safe and sound: Strengthening cybersecurity in healthcare through robust staff educational programs. Healthcare Management Forum 2024;37(1):21 View
  37. van Boven L, Kusters R, Tin D, van Osch F, De Cauwer H, Ketelings L, Rao M, Dameff C, Barten D. Hacking Acute Care: A Qualitative Study on the Health Care Impacts of Ransomware Attacks Against Hospitals. Annals of Emergency Medicine 2024;83(1):46 View
  38. Sari P, Handayani P, Hidayanto A. Demographic Comparison of Information Security Behavior Toward Health Information System Protection: Survey Study. JMIR Formative Research 2023;7:e49439 View
  39. Cacciamani G, Chen A, Gill I, Hung A. Artificial intelligence and urology: ethical considerations for urologists and patients. Nature Reviews Urology 2024;21(1):50 View
  40. van Kessel R, Haig M, Mossialos E. Strengthening Cybersecurity for Patient Data Protection in Europe. Journal of Medical Internet Research 2023;25:e48824 View
  41. Lu Z, Huang Y, Du P, Li F, Li Z. Pandemics uncertainty and informational globalization in CEE countries: The role of innovation diffusion. Heliyon 2023;9(11):e21489 View
  42. Lieneck C, McLauchlan M, Phillips S. Healthcare Cybersecurity Ethical Concerns during the COVID-19 Global Pandemic: A Rapid Review. Healthcare 2023;11(22):2983 View
  43. Khan J, Shinde A, Mujawar S, S J, Singh B. Securing Hms Through Hybrid Method. SSRN Electronic Journal 2024 View
  44. Sunil V, Mathew S. A Systematic Review on Cybersecurity Threats and Challenges in Hospitals. Acta Medica International 2024;11(1):1 View
  45. Hossain S, Yigitcanlar T, Nguyen K, Xu Y. Understanding Local Government Cybersecurity Policy: A Concept Map and Framework. Information 2024;15(6):342 View
  46. Bedón A, Pujol F, Ramírez T, Mora H, Pujol M. The Importance of Teleworking and Its Implications for Industry 5.0: A Case Study. IEEE Access 2024;12:80529 View
  47. Morales-Sáenz F, Medina-Quintero J, Reyna-Castillo M. Beyond Data Protection: Exploring the Convergence between Cybersecurity and Sustainable Development in Business. Sustainability 2024;16(14):5884 View
  48. Eisenberg J, Rhee J. Implications of telemedicine. Seminars in Spine Surgery 2024;36(3):101121 View
  49. Elendu C, Omeludike E, Oloyede P, Obidigbo B, Omeludike J. Legal implications for clinicians in cybersecurity incidents: A review. Medicine 2024;103(39):e39887 View
  50. Peng W, Meng J, Lim S, Liu H. Online health [mis]information processing and evaluation among older adults: Comparing individuals with varied abilities in information discernment. Telematics and Informatics 2024;95:102197 View
  51. Mahmood S, Chadhar M, Firmin S. Addressing Cybersecurity Challenges in Times of Crisis: Extending the Sociotechnical Systems Perspective. Applied Sciences 2024;14(24):11610 View

Books/Policy Documents

  1. Gofman M, Mitra S, Tadesse B, Villa M. Advances in Cybersecurity Management. View
  2. Aneke J, Ardito C, Desolda G. HCI for Cybersecurity, Privacy and Trust. View
  3. Medhekar A. Handbook of Research on Advancing Cybersecurity for Digital Transformation. View
  4. Khan M. Cities and Mega Risks. View
  5. Medhekar A. Research Anthology on Securing Medical Systems and Records. View
  6. Jhanjhi N, Ahmad M, Khan M, Hussain M. Cybersecurity Measures for E-Government Frameworks. View
  7. Ibrahim A, Jamri B, Zakari A. Global Perspectives on Information Security Regulations. View
  8. Shah I. Cybersecurity Measures for E-Government Frameworks. View
  9. Lenka A, Goswami M, Singh H, Baskaran H. Effective Cybersecurity Operations for Enterprise-Wide Systems. View
  10. Shah I, Jhanjhi N, Ray S. Advances in Explainable AI Applications for Smart Cities. View
  11. Shah I, Murugesan R, Rajper S. Navigating Cyber Threats and Cybersecurity in the Logistics Industry. View