Published on in Vol 26 (2024)
Preprints (earlier versions) of this paper are
available at
https://preprints.jmir.org/preprint/46904, first published
.

Journals
- Vrhovec S, Markelj B, Roumani Y. We need to aim at the top: Factors associated with cybersecurity awareness of cyber and information security decision-makers. PLOS ONE 2024;19(10):e0312266 View
- Zeng Y, Fu J, Cao W, Chen Y, Yang Z. Research Hotspots and Knowledge Framework of Digital Healthcare Service Management from the Perspective of the Silver Economy. Sustainability 2024;16(22):9735 View
- Nastasa I, Furtunescu F, Mincă D. Challenges and Progress in General Data Protection Regulation Implementation in Romanian Public Healthcare. Cureus 2025 View
- Huntsman D, Bulaj G. Home Environment as a Therapeutic Target for Prevention and Treatment of Chronic Diseases: Delivering Restorative Living Spaces, Patient Education and Self-Care by Bridging Biophilic Design, E-Commerce and Digital Health Technologies. International Journal of Environmental Research and Public Health 2025;22(2):225 View
- Taha I, Ali R, Abbas A. The Impact of Students’ Cybersecurity Vulnerability Behavior on E-Learning Obstacles. Organizacija 2025;58(1):85 View
- Avery A, Baker E, Wright B, Avery I, Gomez D. Media Framing and Portrayals of Ransomware Impacts on Informatics, Employees, and Patients: Systematic Media Literature Review. Journal of Medical Internet Research 2025;27:e59231 View
- Ulloa-Zamora M, Barría-Huidobro C, Sánchez-Rubio M, Galeazzi L. Integral Security Pillars for Medical Devices: A Comprehensive Analysis. Applied Sciences 2025;15(12):6634 View
- Li S, Surineni K, Prabhakaran N. Cyber-Attacks on Hospital Systems: A Narrative Review. The American Journal of Geriatric Psychiatry: Open Science, Education, and Practice 2025;7:30 View
- Belani H, Fišter K. Who should do what to help mitigate cyber threats in health care: narrative review of practical approaches and actionable recommendations. International Journal of Health Governance 2025;30(3):282 View
- Ameh J, Otebolaku A, Shenfield A, Ikpehai A. C3-VULMAP: A Dataset for Privacy-Aware Vulnerability Detection in Healthcare Systems. Electronics 2025;14(13):2703 View
- Cecconi M, Greco M, Shickel B, Angus D, Bailey H, Bignami E, Calandra T, Celi L, Einav S, Elbers P, Ercole A, Gómez H, Gong M, Komorowski M, Liu V, Park S, Sarwal A, Seymour C, Zampieri F, Taccone F, Vincent J, Bihorac A. Implementing Artificial Intelligence in Critical Care Medicine: a consensus of 22. Critical Care 2025;29(1) View
- Piotrowski B, Seth I, Kovoor J, Sorich M, Bacchi S. Cybersecurity Should be a Routine Component of Healthcare Provider Education. ANZ Journal of Surgery 2025;95(9):1656 View
- Chuma K. Legacy electronic health record systems as culprit behind cybersecurity risks in public healthcare facilities of South Africa. Global Security: Health, Science and Policy 2025;10(1) View
- Soner O. Modeling and analyzing cybersecurity risk propagation in ports using fuzzy cognitive maps: System sensitivity to key threat factors. Ocean & Coastal Management 2025;270:107857 View
- Ewoh P, Vartiainen T, Mantere T. Sociotechnical Cybersecurity Framework for Securing Health Care From Vulnerabilities and Cyberattacks: Scoping Review. Journal of Medical Internet Research 2025;27:e75584 View
- Herrera Montano I, Góngora Alonso S, Sañudo García S, García Aranda J, Rodrígues J, de la Torre Díez I. Security practices and insider threats in Spanish healthcare centers: a survey-based risk assessment. International Journal of Medical Informatics 2026;205:106107 View
- Hwang T, Choi S, Lee J. The impact of data breach on IT investment at neighboring hospitals: Evidence from California Hospitals. DIGITAL HEALTH 2025;11 View
- Amebleh J, Okoh O. Explainable Risk Controls for Digital Health Payments: SHAP-Constrained Gradient Boosting with Policy-Based Access, Audit Trails, and Chargeback Mitigation. International Journal of Scientific Research and Modern Technology 2023:13 View
- Yin Y, Riaz Z, Amoro Sanchez R, Mustafa A, Eighaei Sedeh A. Evaluating ChatGPT as a Standalone Tool for Patient Education: A Review of Frequently Asked Questions by Patients With Chronic Obstructive Pulmonary Disease. Cureus 2025 View
- Cole L, Gettis M. Implementing the Use of Virtual Reality in One Pediatric Health Care Setting. Nurse Leader 2025;23(6):102514 View
- Moka M, Rathakrishnan D, Sriram D, George M. Enhancing digital evolution in Indian clinical trials: bridging technological, participant, and regulatory gaps. Current Medical Research and Opinion 2025:1 View
- van den Broek-Altenburg E, Cunningham N, Benson J, Ali N, DeStigter K. Patients’ and Providers’ Preferences and Perceptions for Imaging Information for Patients: Cross-Sectional Survey Study. Journal of Participatory Medicine 2025;17:e72362 View
- Frimpong G, Anyebe A, Okoh O, James U. Zero Trust Security Architectures Safeguarding Protected Health Information Within Multi Cloud Telemedicine and Cross Border Data Environments. International Journal of Innovative Science and Research Technology 2025:2158 View
- Bawack R, Dennehy D, Kumi C, Boutchouang W. AI Analytics in Enhancing Patient-Centered Care Through Wearables: A Cross-Country Analysis. Information Systems Frontiers 2025 View
- Gellert G, Borgasano D, Palermo R, Gellert G, Kelly S. Third-Party Access Cybersecurity Threats and Precautions: A Survey of Healthcare Delivery Organizations. Applied Clinical Informatics 2025;16(05):1518 View
- Tawfik M, Abu-Ein A, Noaman H, Abdelhaliem A, Fathi I. FedMedSecure: federated few-shot learning with cross-attention mechanisms and explainable AI for collaborative healthcare cybersecurity. Scientific Reports 2025;15(1) View
- Kumar D, Agarwal P, Babu A. Emergence of Intelligent Photonic Technologies in Early Medical Diagnostics. physica status solidi (a) 2025 View
- Fišter K, Belani H. Cybersecurity preparedness and resilience in health care: a narrative review. International Journal of Health Governance 2025:1 View
Books/Policy Documents
Conference Proceedings
- Zakaria W, Abdollah M, Mohd O, Aziz M, Yassin S, Kassim S. 2025 IEEE 15th Symposium on Computer Applications & Industrial Electronics (ISCAIE). RENTAKA: Detecting Ransomware at Pre-Attack Stage Using Machine Learning Approach View
