• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4604935)   Today's Articles (5250)   Subscriber (49371)
For: Loi M, Christen M, Kleine N, Weber K. Cybersecurity in health – disentangling value tensions. JICES 2019. [DOI: 10.1108/jices-12-2018-0095] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.6] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Number Cited by Other Article(s)
1
Ewoh P, Vartiainen T. Vulnerability to Cyberattacks and Sociotechnical Solutions for Health Care Systems: Systematic Review. J Med Internet Res 2024;26:e46904. [PMID: 38820579 PMCID: PMC11179043 DOI: 10.2196/46904] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/03/2023] [Revised: 10/17/2023] [Accepted: 03/08/2024] [Indexed: 06/02/2024]  Open
2
Saeed S, Altamimi SA, Alkayyal NA, Alshehri E, Alabbad DA. Digital Transformation and Cybersecurity Challenges for Businesses Resilience: Issues and Recommendations. SENSORS (BASEL, SWITZERLAND) 2023;23:6666. [PMID: 37571451 PMCID: PMC10422504 DOI: 10.3390/s23156666] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/02/2023] [Revised: 07/17/2023] [Accepted: 07/19/2023] [Indexed: 08/13/2023]
3
Rathbone A, Stumpf S, Claisse C, Sillence E, Coventry L, Brown RD, Durrant AC. People with long-term conditions sharing personal health data via digital health technologies: A scoping review to inform design. PLOS DIGITAL HEALTH 2023;2:e0000264. [PMID: 37224154 DOI: 10.1371/journal.pdig.0000264] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/31/2022] [Accepted: 04/27/2023] [Indexed: 05/26/2023]
4
Cyberattacks as “state of exception” reconceptualizing cybersecurity from prevention to surviving and accommodating. JOURNAL OF INFORMATION COMMUNICATION & ETHICS IN SOCIETY 2021. [DOI: 10.1108/jices-01-2021-0015] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
5
Pollini A, Callari TC, Tedeschi A, Ruscio D, Save L, Chiarugi F, Guerri D. Leveraging human factors in cybersecurity: an integrated methodological approach. COGNITION, TECHNOLOGY & WORK (ONLINE) 2021;24:371-390. [PMID: 34149309 PMCID: PMC8195225 DOI: 10.1007/s10111-021-00683-y] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/06/2021] [Accepted: 05/24/2021] [Indexed: 06/12/2023]
6
Domingo-Ferrer J, Blanco-Justicia A. Ethical Value-Centric Cybersecurity: A Methodology Based on a Value Graph. SCIENCE AND ENGINEERING ETHICS 2020;26:1267-1285. [PMID: 31571047 DOI: 10.1007/s11948-019-00138-8] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/17/2019] [Accepted: 09/16/2019] [Indexed: 06/10/2023]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA