{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,16]],"date-time":"2026-05-16T08:51:06Z","timestamp":1778921466627,"version":"3.51.4"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030503086","type":"print"},{"value":"9783030503093","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-50309-3_8","type":"book-chapter","created":{"date-parts":[[2020,7,9]],"date-time":"2020-07-09T23:21:31Z","timestamp":1594336891000},"page":"105-122","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["Cyber-Risk in Healthcare: Exploring Facilitators and Barriers to Secure Behaviour"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6600-8414","authenticated-orcid":false,"given":"Lynne","family":"Coventry","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0105-5495","authenticated-orcid":false,"given":"Dawn","family":"Branley-Bell","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1085-7115","authenticated-orcid":false,"given":"Elizabeth","family":"Sillence","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4056-1115","authenticated-orcid":false,"given":"Sabina","family":"Magalini","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1136-9722","authenticated-orcid":false,"given":"Pasquale","family":"Mari","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9025-8456","authenticated-orcid":false,"given":"Aimilia","family":"Magkanaraki","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8782-8307","authenticated-orcid":false,"given":"Kalliopi","family":"Anastasopoulou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,10]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MC.2016.185","volume":"49","author":"D Kotz","year":"2016","unstructured":"Kotz, D., Gunter, C.A., Kumar, S., Weiner, J.P.: Privacy and security in mobile health: a research agenda. Computer (Long Beach Calif) 49, 22\u201330 (2016). https:\/\/doi.org\/10.1109\/MC.2016.185","journal-title":"Computer (Long Beach Calif)"},{"key":"8_CR2","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/2890488","volume":"59","author":"AJ Burns","year":"2016","unstructured":"Burns, A.J., Johnson, M.E., Honeyman, P.: A brief chronology of medical device security. Commun. ACM 59, 66\u201372 (2016). https:\/\/doi.org\/10.1145\/2890488","journal-title":"Commun. ACM"},{"key":"8_CR3","unstructured":"Coulter, A., Roberts, S., Dixon, A.: Delivering Better Services for People with Long-Term Conditions. Building the House of Care (2013)"},{"key":"8_CR4","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-08-2012-0043","author":"K Hedstr\u00f6m","year":"2013","unstructured":"Hedstr\u00f6m, K., Karlsson, F., Kolkowska, E.: Social action theory for understanding information security non-compliance in hospitals the importance of user rationale. Inf. Manag. Comput. Secur. (2013). https:\/\/doi.org\/10.1108\/IMCS-08-2012-0043","journal-title":"Inf. Manag. Comput. Secur."},{"key":"8_CR5","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1017\/S0963180116000931","volume":"26","author":"A Shenoy","year":"2017","unstructured":"Shenoy, A., Appel, J.M.: Safeguarding confidentiality in electronic health records. Camb. Q. Healthc. Ethics 26, 337\u2013341 (2017). https:\/\/doi.org\/10.1017\/S0963180116000931","journal-title":"Camb. Q. Healthc. Ethics"},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.maturitas.2018.04.008","volume":"113","author":"L Coventry","year":"2018","unstructured":"Coventry, L., Branley, D.: Cybersecurity in healthcare: a narrative review of trends, threats and ways forward. Maturitas 113, 48\u201352 (2018). https:\/\/doi.org\/10.1016\/j.maturitas.2018.04.008","journal-title":"Maturitas"},{"key":"8_CR7","unstructured":"Systems shut down in Victorian hospitals after suspected cyber attack (2019).  https:\/\/www.theguardian.com\/australia-news\/2019\/oct\/01\/systems-shut-down-in-victorian-hospitals-after-suspected-cyber-attack"},{"key":"8_CR8","unstructured":"Albert, M: Why do we need to wait for people to be hurt?. Medical cyber attacks soar 1400%. In: SFGate (2019). https:\/\/www.sfgate.com\/healthredesign\/article\/medical-cyber-attacks-terrorism-hospital-health-13853912.php. Accessed 11 Oct 2019"},{"key":"8_CR9","unstructured":"Kam, R.: The human risk factor of a healthcare data breach - Community Blog. In: Heal. IT Exch (2015). https:\/\/searchhealthit.techtarget.com\/healthitexchange\/CommunityBlog\/the-human-risk-factor-of-a-healthcare-data-breach\/. Accessed 10 Apr 2018"},{"key":"8_CR10","unstructured":"Scott, M., Wingfield, N.: Hacking attack has security experts scrambling to contain fallout (2017). https:\/\/www.nytimes.com\/2017\/05\/13\/world\/asia\/cyberattacks-online-security-.html"},{"key":"8_CR11","unstructured":"National Audit Office: Investigation: WannaCry cyber attack and the NHS (2018)"},{"key":"8_CR12","unstructured":"Sussman, B.: Doctors Quitting Due to Ransomware Attacks. In: SecureWorld (2019). https:\/\/www.secureworldexpo.com\/industry-news\/are-doctors-quitting-after-ransomware-attacks. Accessed 30 Jan 2020"},{"key":"8_CR13","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.ijhcs.2019.05.005","volume":"131","author":"V Zimmermann","year":"2019","unstructured":"Zimmermann, V., Renaud, K.: Moving from a \u201chuman-as-problem\u201d to a \u201chuman-as-solution\u201d cybersecurity mindset. Int. J. Hum Comput Stud. 131, 169\u2013187 (2019). https:\/\/doi.org\/10.1016\/j.ijhcs.2019.05.005","journal-title":"Int. J. Hum Comput Stud."},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Boyce, M.W., Duma, K.M., Hettinger, L.J., et al.: Human performance in cybersecurity: a research agenda. In: Proceedings of the Human Factors and Ergonomics Society 55th Annual Meeting, pp 1115\u20131119 (2011)","DOI":"10.1177\/1071181311551233"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"e0159015","DOI":"10.1371\/journal.pone.0159015","volume":"11","author":"LH Hall","year":"2016","unstructured":"Hall, L.H., Johnson, J., Watt, I., et al.: Healthcare staff wellbeing, burnout, and patient safety: a systematic review. PLoS One 11, e0159015 (2016). https:\/\/doi.org\/10.1371\/journal.pone.0159015","journal-title":"PLoS One"},{"key":"8_CR16","doi-asserted-by":"publisher","unstructured":"Hall, L.H., Johnson, J., Heyhoe, J., et al.: Exploring the impact of primary care physician burnout and well-being on patient care. J. Patient Saf. 1 (2017). https:\/\/doi.org\/10.1097\/PTS.0000000000000438","DOI":"10.1097\/PTS.0000000000000438"},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1111\/inm.12416","volume":"27","author":"J Johnson","year":"2018","unstructured":"Johnson, J., Hall, L.H., Berzins, K., et al.: Mental healthcare staff well-being and burnout: a\u00a0narrative review of trends, causes, implications, and recommendations for future interventions. Int. J. Ment. Health Nurs. 27, 20\u201332 (2018). https:\/\/doi.org\/10.1111\/inm.12416","journal-title":"Int. J. Ment. Health Nurs."},{"key":"8_CR18","doi-asserted-by":"publisher","first-page":"147","DOI":"10.2146\/ajhp170460","volume":"75","author":"PJ Bridgeman","year":"2018","unstructured":"Bridgeman, P.J., Bridgeman, M.B., Barone, J.: Burnout syndrome among healthcare professionals. Am. J. Heal. Pharm. 75, 147\u2013152 (2018). https:\/\/doi.org\/10.2146\/ajhp170460","journal-title":"Am. J. Heal. Pharm."},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Zaccaro, S.J., Dalal, R.S., Tetrick, L.E., et al.: The psychosocial dynamics of cyber security: an overview. In: Psychosocial Dynamics of Cyber Security. Routledge, pp 31\u201342 (2016)","DOI":"10.4324\/9781315796352-10"},{"key":"8_CR20","unstructured":"Blythe, J.M.: Cyber security in the workplace: understanding and promoting behaviour change. In: Proceedings of CHI 2013 Doctoral Consortium (2013)"},{"key":"8_CR21","unstructured":"Vossler, A., Moller, N., Braun, V., et al.: How to use thematic analysis with interview data. In: The Counselling and Psychotherapy Research Handbook (2017)"},{"key":"8_CR22","unstructured":"Williams, B.: The dangers of password sharing at work. In: TechRadar (2019). https:\/\/www.techradar.com\/news\/the-dangers-of-password-sharing-at-work. Accessed 14 Oct 2019"},{"key":"8_CR23","unstructured":"Caldwell, F.: Why Sharing Passwords Is Now Illegal And What This Means for Employers And Digital Businesses (2016)"},{"key":"8_CR24","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1177\/0018720815576827","volume":"57","author":"M Zahabi","year":"2015","unstructured":"Zahabi, M., Kaber, D.B., Swangnetr, M.: Usability and safety in electronic medical records interface design: a review of recent literature and guideline formulation. Hum. Factors 57, 805\u2013834 (2015). https:\/\/doi.org\/10.1177\/0018720815576827","journal-title":"Hum. Factors"},{"key":"8_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.amjsurg.2014.08.030","author":"MJ Johnston","year":"2015","unstructured":"Johnston, M.J., King, D., Arora, S., et al.: Smartphones let surgeons know WhatsApp: An analysis of communication in emergency surgical teams. Am. J. Surg. (2015). https:\/\/doi.org\/10.1016\/j.amjsurg.2014.08.030","journal-title":"Am. J. Surg."},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Coventry, L., Branley-Bell, D., Magalini, S., et al.: Cyber-risk in healthcare: exploring facilitators and barriers to secure behaviour (2020)","DOI":"10.1007\/978-3-030-50309-3_8"},{"key":"8_CR27","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1177\/0018720818780472","volume":"60","author":"BD Sawyer","year":"2018","unstructured":"Sawyer, B.D., Hancock, P.A.: Hacking the human: the prevalence paradox in cybersecurity. Hum. Factors 60, 597\u2013609 (2018). https:\/\/doi.org\/10.1177\/0018720818780472","journal-title":"Hum. Factors"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Briggs, P., Jeske, D., Coventry, L.: Behavior change interventions for cybersecurity. In: Behavior Change Research and Theory: Psychological and Technological Perspectives, pp 115\u2013136. Academic Press (2017)","DOI":"10.1016\/B978-0-12-802690-8.00004-9"},{"key":"8_CR29","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1177\/109019810002700506","volume":"27","author":"K Witte","year":"2000","unstructured":"Witte, K., Allen, M.: A meta-analysis of fear appeals: Implications for effective public health campaigns. Heal Educ. Behav. 27, 591\u2013615 (2000). https:\/\/doi.org\/10.1177\/109019810002700506","journal-title":"Heal Educ. Behav."}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50309-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:30:50Z","timestamp":1720571450000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-50309-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030503086","9783030503093"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50309-3_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2020.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}