• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4613486)   Today's Articles (540)   Subscriber (49386)
For: Pollini A, Callari TC, Tedeschi A, Ruscio D, Save L, Chiarugi F, Guerri D. Leveraging human factors in cybersecurity: an integrated methodological approach. Cogn Technol Work 2021;24:371-390. [PMID: 34149309 PMCID: PMC8195225 DOI: 10.1007/s10111-021-00683-y] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/06/2021] [Accepted: 05/24/2021] [Indexed: 06/12/2023]
Number Cited by Other Article(s)
1
Luidold C, Jungbauer C. Cybersecurity policy framework requirements for the establishment of highly interoperable and interconnected health data spaces. Front Med (Lausanne) 2024;11:1379852. [PMID: 38784226 PMCID: PMC11111971 DOI: 10.3389/fmed.2024.1379852] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/31/2024] [Accepted: 04/23/2024] [Indexed: 05/25/2024]  Open
2
Hines E, Trivedi S, Hoang-Tran C, Mocharnuk J, Pfaff MJ. Perspectives on Cybersecurity and Plastic Surgery: A Survey of Plastic Surgeons and Scoping Review of the Literature. Aesthet Surg J 2023;43:1376-1383. [PMID: 37186025 DOI: 10.1093/asj/sjad122] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/12/2023] [Revised: 04/21/2023] [Accepted: 04/23/2023] [Indexed: 05/17/2023]  Open
3
Sari PK, Handayani PW, Hidayanto AN. Demographic Comparison of Information Security Behavior Toward Health Information System Protection: Survey Study. JMIR Form Res 2023;7:e49439. [PMID: 37616025 PMCID: PMC10485712 DOI: 10.2196/49439] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/29/2023] [Revised: 07/11/2023] [Accepted: 07/24/2023] [Indexed: 08/25/2023]  Open
4
Watkins ME. Designing an Effective Organizational Culture to Guard Against the Cyber Risks of Emerging Technologies. J Healthc Manag 2023;68:239-250. [PMID: 37410988 DOI: 10.1097/jhm-d-23-00097] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 07/08/2023]
5
McGregor R, Reaiche C, Boyle S, Corral de Zubielqui G. Cyberspace and Personal Cyber Insurance: A Systematic Review. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2023. [DOI: 10.1080/08874417.2023.2185551] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 04/08/2023]
6
Patel AU, Williams CL, Hart SN, Garcia CA, Durant TJS, Cornish TC, McClintock DS. Cybersecurity and Information Assurance for the Clinical Laboratory. J Appl Lab Med 2023;8:145-161. [PMID: 36610432 DOI: 10.1093/jalm/jfac119] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/18/2022] [Accepted: 10/26/2022] [Indexed: 01/09/2023]
7
Information Security Behavior in Health Information Systems: A Review of Research Trends and Antecedent Factors. Healthcare (Basel) 2022;10:healthcare10122531. [PMID: 36554055 PMCID: PMC9777837 DOI: 10.3390/healthcare10122531] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/18/2022] [Revised: 12/09/2022] [Accepted: 12/12/2022] [Indexed: 12/23/2022]  Open
8
Ünözkan H, Ertem M, Bendak S. Using attack graphs to defend healthcare systems from cyberattacks: a longitudinal empirical study. NETWORK MODELING ANALYSIS IN HEALTH INFORMATICS AND BIOINFORMATICS 2022;11:52. [PMCID: PMC9668211 DOI: 10.1007/s13721-022-00391-1] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/06/2022] [Revised: 10/01/2022] [Accepted: 10/19/2022] [Indexed: 11/17/2022]
9
Hilowle M, Yeoh W, Grobler M, Pye G, Jiang F. Users’ Adoption of National Digital Identity Systems: Human-Centric Cybersecurity Review. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2022. [DOI: 10.1080/08874417.2022.2140089] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
10
Research on the Effectiveness of Cyber Security Awareness in ICS Risk Assessment Frameworks. ELECTRONICS 2022. [DOI: 10.3390/electronics11101659] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA