Published on in Vol 23, No 7 (2021): July

Preprints (earlier versions) of this paper are available at https://preprints.jmir.org/preprint/26157, first published .
Hospital Productivity After Data Breaches: Difference-in-Differences Analysis

Hospital Productivity After Data Breaches: Difference-in-Differences Analysis

Hospital Productivity After Data Breaches: Difference-in-Differences Analysis

Authors of this article:

Jinhyung Lee1, 2 Author Orcid Image ;   Sung J Choi3 Author Orcid Image

Journals

  1. Baillette P, Barlette Y, Berthevas J. Benefits and Risks of Shadow IT in Health Care: A Narrative Review of the Literature. Systèmes d'information & management 2022;Volume 27(2):59 View
  2. Raghupathi W, Raghupathi V, Saharia A. Analyzing Health Data Breaches: A Visual Analytics Approach. AppliedMath 2023;3(1):175 View
  3. Alipour J, Mehdipour Y, Karimi A, Khorashadizadeh M, Akbarpour M. Security, confidentiality, privacy and patient safety in the hospital information systems from the users’ perspective: A cross-sectional study. International Journal of Medical Informatics 2023;175:105066 View
  4. Chiaradonna S, Jevtić P, Lanchier N. Framework for cyber risk loss distribution of hospital infrastructure: Bond percolation on mixed random graphs approach. Risk Analysis 2023;43(12):2450 View
  5. Bo Y, Liu Q, Tong Y. The Effects of Adopting Mobile Health and Fitness Apps on Hospital Visits: Quasi-Experimental Study. Journal of Medical Internet Research 2023;25:e45681 View
  6. Al-Hawawreh M, Alazab M, Ferrag M, Hossain M. Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms. Journal of Network and Computer Applications 2024;223:103809 View
  7. Munoz-Cornejo G, Sakowski J, Lee J, Parks A. Analyzing the urban–rural divide: the role of location, time, and breach characteristics in U.S. hospital security incidents, 2012–2021. Discover Health Systems 2024;3(1) View
  8. Tetteh G, Otioma C. Cyberattack, cyber risk mitigation capabilities, and firm productivity in Kenya. Small Business Economics 2025;64(3):1493 View
  9. Lv X, Rani S, Manimurugan S, Slowik A, Feng Y. Quantum-Inspired Sensitive Data Measurement and Secure Transmission in 5G-Enabled Healthcare Systems. Tsinghua Science and Technology 2025;30(1):456 View
  10. Chen D, Chou S, Peng X. Impacts of Hospital Data Breach on Healthcare Quality. Health Services Research 2025;60(3) View
  11. Kayondo B, Kyobe M. Influence of trust on hospital staff compliance with the data protection act, moderated by noncompliance costs – a Ugandan case study. Information & Computer Security 2025;33(4):649 View
  12. Avery A, Baker E, Wright B, Avery I, Gomez D. Media Framing and Portrayals of Ransomware Impacts on Informatics, Employees, and Patients: Systematic Media Literature Review. Journal of Medical Internet Research 2025;27:e59231 View
  13. Cornejo G. Assessing cybersecurity dynamics: a comparative analysis of data breaches in urban and rural hospitals in the United States. Security Journal 2025;38(1) View

Books/Policy Documents

  1. Wibbenmeyer K. Exploring Ethical Problems in Today’s Technological World. View
  2. Hall J. Applied Research Approaches to Technology, Healthcare, and Business. View

Conference Proceedings

  1. Alexander M, Candiwan C. 2024 IEEE International Conference on Computing (ICOCO). A Conceptual Model of Information Security Compliance and Protection Behavior through Stimulus-Organism-Response Theory View