{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:56:21Z","timestamp":1773154581161,"version":"3.50.1"},"publisher-location":"Cham","reference-count":214,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031101823","type":"print"},{"value":"9783031101830","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-10183-0_8","type":"book-chapter","created":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T13:06:54Z","timestamp":1657717614000},"page":"153-181","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["SOK: Evaluating Privacy and\u00a0Security Vulnerabilities of\u00a0Patients\u2019 Data in\u00a0Healthcare"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9781-2694","authenticated-orcid":false,"given":"Faiza","family":"Tazi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3455-2562","authenticated-orcid":false,"given":"Josiah","family":"Dykstra","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8596-085X","authenticated-orcid":false,"given":"Prashanth","family":"Rajivan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1299-7867","authenticated-orcid":false,"given":"Sanchari","family":"Das","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,14]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Abd-alrazaq, A.A., et al.: Patients and healthcare workers experience with a mobile application for self-management of diabetes in Qatar: a qualitative study. Comput. Methods Program. Biomed. Update 1, 100002 (2021)","DOI":"10.1016\/j.cmpbup.2021.100002"},{"issue":"1","key":"8_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-017-0110-7","volume":"5","author":"K Abouelmehdi","year":"2018","unstructured":"Abouelmehdi, K., Beni-Hessane, A., Khaloufi, H.: Big healthcare data: preserving security and privacy. J. Big Data 5(1), 1\u201318 (2018). https:\/\/doi.org\/10.1186\/s40537-017-0110-7","journal-title":"J. Big Data"},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.procs.2017.08.292","volume":"113","author":"K Abouelmehdi","year":"2017","unstructured":"Abouelmehdi, K., Beni-Hssane, A., Khaloufi, H., Saadi, M.: Big data security and privacy in healthcare: a review. Procedia Comput. Sci. 113, 73\u201380 (2017)","journal-title":"Procedia Comput. Sci."},{"issue":"4","key":"8_CR4","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/j.bushor.2019.03.010","volume":"62","author":"C Abraham","year":"2019","unstructured":"Abraham, C., Chatterjee, D., Sims, R.R.: Muddling through cybersecurity: insights from the us healthcare industry. Bus. Horiz. 62(4), 539\u2013548 (2019)","journal-title":"Bus. Horiz."},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Acharya, S., Susai, G., Pillai, M.: Patient portals: Anytime, anywhere, pp. 779\u2013781 (2015)","DOI":"10.1109\/BIBM.2015.7359785"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Aiswarya, R., Divya, R., Sangeetha, D., Vaidehi, V.: Harnessing healthcare data security in cloud, pp. 482\u2013488 (2013)","DOI":"10.1109\/ICRTIT.2013.6844251"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Al Hamid, H.A., Rahman, S.M.M., Hossain, M.S., Almogren, A., Alamri, A.: A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access 5, 22313\u201322328 (2017)","DOI":"10.1109\/ACCESS.2017.2757844"},{"key":"8_CR8","doi-asserted-by":"publisher","unstructured":"Al-Karaki, J.N., Gawanmeh, A., Ayache, M., Mashaleh, A.: Dass-care: a decentralized, accessible, scalable, and secure healthcare framework using blockchain, pp. 330\u2013335 (2019). https:\/\/doi.org\/10.1109\/IWCMC.2019.8766714","DOI":"10.1109\/IWCMC.2019.8766714"},{"key":"8_CR9","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/j.jpdc.2018.08.011","volume":"123","author":"MGR Alam","year":"2019","unstructured":"Alam, M.G.R., Munir, M.S., Uddin, M.Z., Alam, M.S., Dang, T.N., Hong, C.S.: Edge-of-things computing framework for cost-effective provisioning of healthcare data. J. Parallel Distrib. Comput. 123, 54\u201360 (2019)","journal-title":"J. Parallel Distrib. Comput."},{"issue":"7","key":"8_CR10","first-page":"2349","volume":"6","author":"AI Albarrak","year":"2012","unstructured":"Albarrak, A.I.: Information security behavior among nurses in an academic hospital. Health Med. 6(7), 2349\u20132354 (2012)","journal-title":"Health Med."},{"key":"8_CR11","doi-asserted-by":"publisher","unstructured":"Alboaie, S., Nita, L., Stefanescu, C.: Executable choreographies for medical systems integration and data leaks prevention, pp. 1\u20134 (2015). https:\/\/doi.org\/10.1109\/EHB.2015.7391612","DOI":"10.1109\/EHB.2015.7391612"},{"key":"8_CR12","doi-asserted-by":"publisher","unstructured":"Almehmadi, T., Alshehri, S., Tahir, S.: A secure fog-cloud based architecture for MIoT, pp. 1\u20136 (2019). https:\/\/doi.org\/10.1109\/CAIS.2019.8769524","DOI":"10.1109\/CAIS.2019.8769524"},{"key":"8_CR13","doi-asserted-by":"publisher","unstructured":"Alshalali, T., M\u2019Bale, K., Josyula, D.: Security and privacy of electronic health records sharing using hyperledger fabric, pp. 760\u2013763 (2018). https:\/\/doi.org\/10.1109\/CSCI46756.2018.00152","DOI":"10.1109\/CSCI46756.2018.00152"},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1016\/j.sbspro.2013.10.509","volume":"99","author":"G Altunta\u015f","year":"2013","unstructured":"Altunta\u015f, G., Semerci\u00f6z, F., Eregez, H.: Linking strategic and market orientations to organizational performance: the role of innovation in private healthcare organizations. Procedia-Soc. Behav. Sci. 99, 413\u2013419 (2013)","journal-title":"Procedia-Soc. Behav. Sci."},{"key":"8_CR15","doi-asserted-by":"publisher","unstructured":"Alyami, H., Feng, J.L., Hilal, A., Basir, O.: On-demand key distribution for body area networks for emergency case (2014). https:\/\/doi.org\/10.1145\/2642668.2642684","DOI":"10.1145\/2642668.2642684"},{"key":"8_CR16","unstructured":"Anghelescu, P.: Encryption of multimedia medical content using programmable cellular automata, pp. 11\u201316 (2012)"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Anghelescu, P., Ionita, S., Sofron, E.: Block encryption using hybrid additive cellular automata, pp. 132\u2013137 (2007)","DOI":"10.1109\/HIS.2007.23"},{"key":"8_CR18","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.jbi.2018.08.010","volume":"86","author":"S Arumugham","year":"2018","unstructured":"Arumugham, S., Rajagopalan, S., Rayappan, J.B.B., Amirtharajan, R.: Networked medical data sharing on secure medium-a web publishing mode for DICOM viewer with three layer authentication. J. Biomed. Inf. 86, 90\u2013105 (2018)","journal-title":"J. Biomed. Inf."},{"key":"8_CR19","doi-asserted-by":"publisher","unstructured":"Asija, R., Nallusamy, R.: Data model to enhance the security and privacy of healthcare data, pp. 237\u2013244 (2014). https:\/\/doi.org\/10.1109\/GHTC-SAS.2014.6967590","DOI":"10.1109\/GHTC-SAS.2014.6967590"},{"key":"8_CR20","doi-asserted-by":"publisher","unstructured":"Aski, V., Dhaka, V.S., Kumar, S., Parashar, A., Ladagi, A.: A multi-factor access control and ownership transfer framework for future generation healthcare systems, pp. 93\u201398 (2020). https:\/\/doi.org\/10.1109\/PDGC50313.2020.9315840","DOI":"10.1109\/PDGC50313.2020.9315840"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Ayad, H., Khalil, M.: A semi-blind information hiding technique using DWT-SVD and QAM-16 for medical images, pp. 1\u20137 (2017)","DOI":"10.1145\/3090354.3090433"},{"key":"8_CR22","doi-asserted-by":"publisher","unstructured":"Ayad, H., Khalil, M.: A semi-blind information hiding technique using DWT-SVD and QAM-16 for medical images (2017). https:\/\/doi.org\/10.1145\/3090354.3090433","DOI":"10.1145\/3090354.3090433"},{"issue":"5","key":"8_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2019.e01735","volume":"5","author":"O Ayanlade","year":"2019","unstructured":"Ayanlade, O., Oyebisi, T., Kolawole, B.: Health information technology acceptance framework for diabetes management. Heliyon 5(5), e01735 (2019)","journal-title":"Heliyon"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Baker, A., Vega, L., DeHart, T., Harrison, S.: Healthcare and security: understanding and evaluating the risks, pp. 99\u2013108 (2011)","DOI":"10.1007\/978-3-642-21716-6_11"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Balamurugan, G., Joseph, K.S., Arulalan, V.: An iris based reversible watermarking system for the security of teleradiology, pp. 1\u20136 (2016)","DOI":"10.1109\/STARTUP.2016.7583937"},{"issue":"6","key":"8_CR26","doi-asserted-by":"publisher","first-page":"1487","DOI":"10.1109\/JBHI.2017.2679979","volume":"21","author":"SD Bao","year":"2017","unstructured":"Bao, S.D., Chen, M., Yang, G.Z.: A method of signal scrambling to secure data storage for healthcare applications. IEEE J. Biomed. Health Inf. 21(6), 1487\u20131494 (2017). https:\/\/doi.org\/10.1109\/JBHI.2017.2679979","journal-title":"IEEE J. Biomed. Health Inf."},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Basavegowda, R., Seenappa, S.: Electronic medical report security using visual secret sharing scheme, pp. 78\u201383 (2013)","DOI":"10.1109\/UKSim.2013.123"},{"key":"8_CR28","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.genhosppsych.2020.10.004","volume":"68","author":"JM Bechtel","year":"2021","unstructured":"Bechtel, J.M., Lepoire, E., Bauer, A.M., Bowen, D.J., Fortney, J.C.: Care manager perspectives on integrating an mhealth app system into clinical workflows: a mixed methods study. Gener. Hospital Psychiatry 68, 38\u201345 (2021)","journal-title":"Gener. Hospital Psychiatry"},{"issue":"10","key":"8_CR29","doi-asserted-by":"publisher","first-page":"11977","DOI":"10.1109\/JSEN.2020.3013634","volume":"21","author":"KM Besher","year":"2020","unstructured":"Besher, K.M., Subah, Z., Ali, M.Z.: IoT sensor initiated healthcare data security. IEEE Sens. J. 21(10), 11977\u201311982 (2020)","journal-title":"IEEE Sens. J."},{"key":"8_CR30","doi-asserted-by":"publisher","unstructured":"Bharghavi, G., Kumar, P.S., Geetha, K., Sasikala Devi, N.: An implementation of slice algorithm to enforce security for medical images using DNA approach, pp. 0984\u20130988 (2018). https:\/\/doi.org\/10.1109\/ICCSP.2018.8524413","DOI":"10.1109\/ICCSP.2018.8524413"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Bharghavi, G., Kumar, P.S., Geetha, K., Devi, N.S.: An implementation of slice algorithm to enforce security for medical images using DNA approach, pp. 0984\u20130988 (2018)","DOI":"10.1109\/ICCSP.2018.8524413"},{"key":"8_CR32","unstructured":"Bhola, J., Soni, S., Cheema, G.K.: Recent trends for security applications in wireless sensor networks-a technical review, pp. 707\u2013712 (2019)"},{"key":"8_CR33","doi-asserted-by":"crossref","unstructured":"Bhuiyan, M.Z.A., Zaman, A., Wang, T., Wang, G., Tao, H., Hassan, M.M.: Blockchain and big data to transform the healthcare, pp. 62\u201368 (2018)","DOI":"10.1145\/3224207.3224220"},{"key":"8_CR34","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.procs.2016.09.166","volume":"100","author":"S Binobaid","year":"2016","unstructured":"Binobaid, S., Fan, I.S., Almeziny, M.: Investigation interoperability problems in pharmacy automation: a case study in Saudi Arabia. Procedia Comput. Sci. 100, 329\u2013338 (2016)","journal-title":"Procedia Comput. Sci."},{"key":"8_CR35","doi-asserted-by":"crossref","unstructured":"Boddy, A., Hurst, W., Mackay, M., El Rhalibi, A.: A study into detecting anomalous behaviours within healthcare infrastructures, pp. 111\u2013117 (2016)","DOI":"10.1109\/DeSE.2016.20"},{"key":"8_CR36","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.nedt.2019.05.007","volume":"79","author":"G Bodur","year":"2019","unstructured":"Bodur, G., Gumus, S., Gursoy, N.G.: Perceptions of Turkish health professional students toward the effects of the internet of things (IOT) technology in the future. Nurse Educ. Today 79, 98\u2013104 (2019)","journal-title":"Nurse Educ. Today"},{"issue":"1","key":"8_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.51381\/adrs.v3i1.51","volume":"3","author":"D Branley-Bell","year":"2020","unstructured":"Branley-Bell, D., et al.: Your hospital needs you: eliciting positive cybersecurity behaviours from healthcare staff using the aide approach. Ann. Disaster Risk Sci. 3(1), 1\u201316 (2020)","journal-title":"Ann. Disaster Risk Sci."},{"key":"8_CR38","doi-asserted-by":"publisher","first-page":"1787","DOI":"10.1016\/j.procs.2019.09.350","volume":"159","author":"L Brunese","year":"2019","unstructured":"Brunese, L., Mercaldo, F., Reginelli, A., Santone, A.: A blockchain based proposal for protecting healthcare systems through formal methods. Procedia Comput. Sci. 159, 1787\u20131794 (2019)","journal-title":"Procedia Comput. Sci."},{"key":"8_CR39","doi-asserted-by":"publisher","first-page":"1803","DOI":"10.1016\/j.procs.2019.09.352","volume":"159","author":"L Brunese","year":"2019","unstructured":"Brunese, L., Mercaldo, F., Reginelli, A., Santone, A.: Formal modeling for magnetic resonance images tamper mitigation. Procedia Comput. Sci. 159, 1803\u20131810 (2019)","journal-title":"Procedia Comput. Sci."},{"key":"8_CR40","doi-asserted-by":"publisher","first-page":"1795","DOI":"10.1016\/j.procs.2019.09.351","volume":"159","author":"L Brunese","year":"2019","unstructured":"Brunese, L., Mercaldo, F., Reginelli, A., Santone, A.: Radiomic features for medical images tamper detection by equivalence checking. Procedia Comput. Sci. 159, 1795\u20131802 (2019)","journal-title":"Procedia Comput. Sci."},{"key":"8_CR41","doi-asserted-by":"crossref","unstructured":"Burke, W., Oseni, T., Jolfaei, A., Gondal, I.: Cybersecurity indexes for ehealth, pp. 1\u20138 (2019)","DOI":"10.1145\/3290688.3290721"},{"issue":"2\u20133","key":"8_CR42","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/S0895-6111(02)00073-3","volume":"27","author":"F Cao","year":"2003","unstructured":"Cao, F., Huang, H.K., Zhou, X.: Medical image security in a HIPAA mandated PACS environment. Computer. Med. Imaging Graph. 27(2\u20133), 185\u2013196 (2003)","journal-title":"Computer. Med. Imaging Graph."},{"key":"8_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.nepr.2020.102864","volume":"48","author":"KG Chan","year":"2020","unstructured":"Chan, K.G., Pawi, S., Ong, M.F., Kowitlawakul, Y., Goy, S.C.: Simulated electronic health documentation: a cross-sectional exploration of factors influencing nursing students\u2019 intention to use. Nurse Educ. Pract. 48, 102864 (2020)","journal-title":"Nurse Educ. Pract."},{"key":"8_CR44","doi-asserted-by":"crossref","unstructured":"Chaudhry, J., Qidwai, U., Miraz, M.H.: Securing big data from eavesdropping attacks in scada\/ics network data streams through impulsive statistical fingerprinting, pp. 77\u201389 (2019)","DOI":"10.1007\/978-3-030-23943-5_6"},{"key":"8_CR45","doi-asserted-by":"crossref","unstructured":"Chen, Y., Chen, W.: Finger ECG-based authentication for healthcare data security using artificial neural network, pp. 1\u20136 (2017)","DOI":"10.1109\/HealthCom.2017.8210804"},{"issue":"3","key":"8_CR46","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1016\/j.hlpt.2020.04.008","volume":"9","author":"SJ Choi","year":"2020","unstructured":"Choi, S.J., Johnson, M.E., Lee, J.: An event study of data breaches and hospital IT spending. Health Policy Technol. 9(3), 372\u2013378 (2020)","journal-title":"Health Policy Technol."},{"key":"8_CR47","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.maturitas.2018.04.008","volume":"113","author":"L Coventry","year":"2018","unstructured":"Coventry, L., Branley, D.: Cybersecurity in healthcare: a narrative review of trends, threats and ways forward. Maturitas 113, 48\u201352 (2018)","journal-title":"Maturitas"},{"key":"8_CR48","doi-asserted-by":"crossref","unstructured":"Coventry, L., et al.: Cyber-risk in healthcare: Exploring facilitators and barriers to secure behaviour, pp. 105\u2013122 (2020)","DOI":"10.1007\/978-3-030-50309-3_8"},{"key":"8_CR49","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1016\/j.procs.2016.09.063","volume":"98","author":"W Currie","year":"2016","unstructured":"Currie, W.: Health organizations\u2019 adoption and use of mobile technology in France, the USA and UK. Procedia Comput. Sci. 98, 413\u2013418 (2016)","journal-title":"Procedia Comput. Sci."},{"key":"8_CR50","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.scs.2018.02.014","volume":"39","author":"GG Dagher","year":"2018","unstructured":"Dagher, G.G., Mohler, J., Milojkovic, M., Marella, P.B.: Ancile: privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustain. Cities Soc. 39, 283\u2013297 (2018)","journal-title":"Sustain. Cities Soc."},{"key":"8_CR51","unstructured":"Das, S., Kim, A., Tingle, Z., Nippert-Eng, C.: All about phishing: Exploring user research through a systematic literature review. arXiv preprint arXiv:1908.05897 (2019)"},{"key":"8_CR52","unstructured":"Das, S., Wang, B., Tingle, Z., Camp, L.J.: Evaluating user perception of multi-factor authentication: a systematic review. In: Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019) (2019)"},{"key":"8_CR53","doi-asserted-by":"crossref","unstructured":"Demjaha, A., Caulfield, T., Sasse, M.A., Pym, D.: 2 fast 2 secure: a case study of post-breach security changes, pp. 192\u2013201 (2019)","DOI":"10.1109\/EuroSPW.2019.00028"},{"key":"8_CR54","doi-asserted-by":"crossref","unstructured":"Duque, H., Montagnat, J., Pierson, J.M., Brunie, L., Magnin, I.: Dm2: a distributed medical data manager for grids, pp. 138\u2013147 (2003)","DOI":"10.1109\/CCGRID.2003.1199421"},{"issue":"2","key":"8_CR55","doi-asserted-by":"publisher","first-page":"326","DOI":"10.3390\/s19020326","volume":"19","author":"AD Dwivedi","year":"2019","unstructured":"Dwivedi, A.D., Srivastava, G., Dhar, S., Singh, R.: A decentralized privacy-preserving healthcare blockchain for IoT. Sensors 19(2), 326 (2019)","journal-title":"Sensors"},{"key":"8_CR56","doi-asserted-by":"publisher","unstructured":"Dykstra, J., Mathur, R., Spoor, A.: Cybersecurity in medical private practice: results of a survey in audiology, pp. 169\u2013176 (2020). https:\/\/doi.org\/10.1109\/CIC50333.2020.00029","DOI":"10.1109\/CIC50333.2020.00029"},{"key":"8_CR57","doi-asserted-by":"crossref","unstructured":"El Bouchti, A., Bahsani, S., Nahhal, T.: Encryption as a service for data healthcare cloud security, pp. 48\u201354 (2016)","DOI":"10.1109\/FGCT.2016.7605072"},{"key":"8_CR58","doi-asserted-by":"crossref","unstructured":"Elmogazy, H., Bamasak, O.: Towards healthcare data security in cloud computing, pp. 363\u2013368 (2013)","DOI":"10.1109\/ICIST.2013.6747572"},{"key":"8_CR59","unstructured":"Esposito, C., Castiglione, A.: Cloud-based management of healthcare data: security and privacy concerns and a promising solution"},{"issue":"5","key":"8_CR60","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-019-1250-4","volume":"43","author":"YM Essa","year":"2019","unstructured":"Essa, Y.M., Hemdan, E.E.D., El-Mahalawy, A., Attiya, G., El-Sayed, A.: IFHDS: intelligent framework for securing healthcare bigdata. J. Med. Syst. 43(5), 1\u201313 (2019)","journal-title":"J. Med. Syst."},{"key":"8_CR61","first-page":"1219","volume":"96","author":"SA Garner","year":"2018","unstructured":"Garner, S.A., Kim, J.: The privacy risks of direct-to-consumer genetic testing: a case study of 23 and Me and ancestry. Wash. UL Rev. 96, 1219 (2018)","journal-title":"Wash. UL Rev."},{"issue":"2","key":"8_CR62","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1080\/03091902.2020.1718223","volume":"44","author":"R Geetha","year":"2020","unstructured":"Geetha, R., Geetha, S.: Efficient high capacity technique to embed EPR information and to detect tampering in medical images. J. Med. Eng. Technol. 44(2), 55\u201368 (2020)","journal-title":"J. Med. Eng. Technol."},{"issue":"12","key":"8_CR63","doi-asserted-by":"publisher","first-page":"586","DOI":"10.3390\/info11120586","volume":"11","author":"D Georgiou","year":"2020","unstructured":"Georgiou, D., Lambrinoudakis, C.: Compatibility of a security policy for a cloud-based healthcare system with the EU general data protection regulation (GDPR). Information 11(12), 586 (2020)","journal-title":"Information"},{"issue":"02","key":"8_CR64","first-page":"49","volume":"7","author":"LA Gordon","year":"2016","unstructured":"Gordon, L.A., Loeb, M.P., Zhou, L., et al.: Investing in cybersecurity: insights from the Gordon-Loeb model. J. Inf. Secur. 7(02), 49 (2016)","journal-title":"J. Inf. Secur."},{"key":"8_CR65","doi-asserted-by":"publisher","unstructured":"Goudar, V., Potkonjak, M.: Addressing biosignal data sharing security issues with robust watermarking, pp. 618\u2013626 (2014). https:\/\/doi.org\/10.1109\/SAHCN.2014.6990402","DOI":"10.1109\/SAHCN.2014.6990402"},{"key":"8_CR66","doi-asserted-by":"publisher","unstructured":"Goudar, V., Potkonjak, M.: On admitting sensor fault tolerance while achieving secure biosignal data sharing, pp. 266\u2013275 (2014). https:\/\/doi.org\/10.1109\/ICHI.2014.44","DOI":"10.1109\/ICHI.2014.44"},{"key":"8_CR67","doi-asserted-by":"crossref","unstructured":"Goudar, V., Potkonjak, M.: A robust watermarking technique for secure sharing of basn generated medical data, pp. 162\u2013170 (2014)","DOI":"10.1109\/DCOSS.2014.22"},{"issue":"8","key":"8_CR68","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1016\/S0167-4048(97)00009-6","volume":"16","author":"D Gritzalis","year":"1997","unstructured":"Gritzalis, D.: A baseline security policy for distributed healthcare information systems. Comput. Secur. 16(8), 709\u2013719 (1997)","journal-title":"Comput. Secur."},{"issue":"2","key":"8_CR69","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/0167-4048(92)90042-P","volume":"11","author":"D Gritzalis","year":"1992","unstructured":"Gritzalis, D., Katsikas, S., Keklikoglou, J., Tomaras, A.: Determining access rights for medical information systems. Comput. Secur. 11(2), 149\u2013161 (1992)","journal-title":"Comput. Secur."},{"issue":"3","key":"8_CR70","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/j.ijmedinf.2003.12.011","volume":"73","author":"D Gritzalis","year":"2004","unstructured":"Gritzalis, D., Lambrinoudakis, C.: A security architecture for interconnecting health information systems. Int. J. Med. Inf. 73(3), 305\u2013309 (2004)","journal-title":"Int. J. Med. Inf."},{"issue":"2","key":"8_CR71","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/0167-4048(91)90008-2","volume":"10","author":"D Gritzalis","year":"1991","unstructured":"Gritzalis, D., Tomaras, A., Katsikas, S., Keklikoglou, J.: Data security in medical information systems: the Greek case. Comput. Secur. 10(2), 141\u2013159 (1991)","journal-title":"Comput. Secur."},{"key":"8_CR72","doi-asserted-by":"crossref","unstructured":"Gross, M.S., Miller Jr, R.C.: Ethical implementation of the learning healthcare system with blockchain technology. Blockchain in Healthcare Today, Forthcoming (2019)","DOI":"10.2139\/ssrn.3391034"},{"key":"8_CR73","doi-asserted-by":"publisher","unstructured":"Guennoun, M., El-Khatib, K.: Securing medical data in smart homes, pp. 104\u2013107 (2009). https:\/\/doi.org\/10.1109\/MEMEA.2009.5167964","DOI":"10.1109\/MEMEA.2009.5167964"},{"key":"8_CR74","doi-asserted-by":"crossref","unstructured":"Guizani, K., Guizani, S.: IoT healthcare monitoring systems overview for elderly population, pp. 2005\u20132009 (2020)","DOI":"10.1109\/IWCMC48107.2020.9148446"},{"key":"8_CR75","first-page":"2384","volume":"6","author":"A Gupta","year":"2020","unstructured":"Gupta, A., Bansiya, A.: Utilizing cloud computing for stronger healthcare data security. Int. J. Sci. Res. Eng. Trends 6, 2384 (2020)","journal-title":"Int. J. Sci. Res. Eng. Trends"},{"key":"8_CR76","doi-asserted-by":"crossref","unstructured":"Gupta, V., Metha, G.: Medical data security using cryptography, pp. 866\u2013869 (2018)","DOI":"10.1109\/CONFLUENCE.2018.8442712"},{"key":"8_CR77","doi-asserted-by":"publisher","first-page":"1004","DOI":"10.1016\/j.procs.2019.04.141","volume":"151","author":"H Hammouchi","year":"2019","unstructured":"Hammouchi, H., Cherqi, O., Mezzour, G., Ghogho, M., El Koutbi, M.: Digging deeper into data breaches: an exploratory data analysis of hacking breaches over time. Procedia Comput. Sci. 151, 1004\u20131009 (2019)","journal-title":"Procedia Comput. Sci."},{"key":"8_CR78","first-page":"420","volume":"2016","author":"KF Hollis","year":"2016","unstructured":"Hollis, K.F.: To share or not to share: ethical acquisition and use of medical data. AMIA Summits Transl. Sci. Proc. 2016, 420 (2016)","journal-title":"AMIA Summits Transl. Sci. Proc."},{"issue":"3","key":"8_CR79","doi-asserted-by":"publisher","first-page":"193","DOI":"10.12788\/jhm.2704","volume":"12","author":"AJ Holmgren","year":"2017","unstructured":"Holmgren, A.J., Adler-Milstein, J.: Health information exchange in us hospitals: the current landscape and a path to improved information sharing. J. Hospital Med. 12(3), 193\u2013198 (2017)","journal-title":"J. Hospital Med."},{"issue":"1","key":"8_CR80","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.eujim.2014.09.134","volume":"7","author":"WWQ Hsu","year":"2015","unstructured":"Hsu, W.W.Q., Chan, E.W.Y., Zhang, Z.J., Lin, Z.X., Bian, Z.X., Wong, I.C.K.: Chinese medicine students\u2019 views on electronic prescribing: a survey in Hong Kong. Eur. J. Integr. Med. 7(1), 47\u201354 (2015)","journal-title":"Eur. J. Integr. Med."},{"key":"8_CR81","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.dss.2013.10.011","volume":"61","author":"CD Huang","year":"2014","unstructured":"Huang, C.D., Behara, R.S., Goo, J.: Optimal information security investment in a healthcare information exchange: An economic analysis. Decis. Support Syst. 61, 1\u201311 (2014)","journal-title":"Decis. Support Syst."},{"key":"8_CR82","doi-asserted-by":"publisher","unstructured":"Ibrahim, A., Mahmood, B., Singhal, M.: A secure framework for sharing electronic health records over clouds, pp. 1\u20138 (2016). https:\/\/doi.org\/10.1109\/SeGAH.2016.7586273","DOI":"10.1109\/SeGAH.2016.7586273"},{"key":"8_CR83","doi-asserted-by":"crossref","unstructured":"Ibrahim, A., Mahmood, B., Singhal, M.: A secure framework for sharing electronic health records over clouds, pp. 1\u20138 (2016)","DOI":"10.1109\/SeGAH.2016.7586273"},{"key":"8_CR84","doi-asserted-by":"publisher","unstructured":"Iva\u015fcu, T., Fr\u00eencu, M., Negru, V.: Considerations towards security and privacy in internet of things based ehealth applications, pp. 275\u2013280 (2016). https:\/\/doi.org\/10.1109\/SISY.2016.7601512","DOI":"10.1109\/SISY.2016.7601512"},{"key":"8_CR85","volume":"58","author":"S Izza","year":"2021","unstructured":"Izza, S., Benssalah, M., Drouiche, K.: An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment. J. Inf. Secur. Appl. 58, 102705 (2021)","journal-title":"J. Inf. Secur. Appl."},{"key":"8_CR86","doi-asserted-by":"publisher","first-page":"183460","DOI":"10.1109\/ACCESS.2020.3028686","volume":"8","author":"T Jabeen","year":"2020","unstructured":"Jabeen, T., Ashraf, H., Khatoon, A., Band, S.S., Mosavi, A.: A lightweight genetic based algorithm for data security in wireless body area networks. IEEE Access 8, 183460\u2013183469 (2020)","journal-title":"IEEE Access"},{"key":"8_CR87","doi-asserted-by":"crossref","unstructured":"Jabeen, T., Ashraf, H., Ullah, A.: A survey on healthcare data security in wireless body area networks. J. Ambient Intell. Humanized Comput. 1\u201314 (2021)","DOI":"10.1007\/s12652-020-02728-y"},{"key":"8_CR88","doi-asserted-by":"crossref","unstructured":"Jaigirdar, F.T.: Trust based security solution for internet of things healthcare solution: an end-to-end trustworthy architecture, pp. 1757\u20131760 (2018)","DOI":"10.1145\/3267305.3277810"},{"issue":"2","key":"8_CR89","doi-asserted-by":"publisher","DOI":"10.2196\/12644","volume":"21","author":"MS Jalali","year":"2019","unstructured":"Jalali, M.S., Razak, S., Gordon, W., Perakslis, E., Madnick, S.: Health care and cybersecurity: bibliometric analysis of the literature. J. Med. Internet Res. 21(2), e12644 (2019)","journal-title":"J. Med. Internet Res."},{"key":"8_CR90","doi-asserted-by":"crossref","unstructured":"Janjic, V., et al.: The serums tool-chain: Ensuring security and privacy of medical data in smart patient-centric healthcare systems, pp. 2726\u20132735 (2019)","DOI":"10.1109\/BigData47090.2019.9005600"},{"key":"8_CR91","doi-asserted-by":"crossref","unstructured":"Jayanthilladevi, A., Sangeetha, K., Balamurugan, E.: Healthcare biometrics security and regulations: biometrics data security and regulations governing PHI and HIPAA act for patient privacy, pp. 244\u2013247 (2020)","DOI":"10.1109\/ESCI48226.2020.9167635"},{"key":"8_CR92","doi-asserted-by":"crossref","unstructured":"Joshitta, R.S.M., Arockiam, L., Malarchelvi, P.S.K.: Security analysis of sat_jo lightweight block cipher for data security in healthcare IoT, pp. 111\u2013116 (2019)","DOI":"10.1145\/3358505.3358527"},{"issue":"1","key":"8_CR93","doi-asserted-by":"publisher","first-page":"42","DOI":"10.4018\/ijhisi.2014010103","volume":"9","author":"F Kamoun","year":"2014","unstructured":"Kamoun, F., Nicho, M.: Human and organizational factors of healthcare data breaches: the swiss cheese model of data breach causation and prevention. Int. J. Healthcare Inf. Syst. Inf. (IJHISI) 9(1), 42\u201360 (2014)","journal-title":"Int. J. Healthcare Inf. Syst. Inf. (IJHISI)"},{"key":"8_CR94","doi-asserted-by":"crossref","unstructured":"Karthick, R., Ramkumar, R., Akram, M., Kumar, M.V.: Overcome the challenges in bio-medical instruments using IoT-a review. Materials Today: Proceedings (2020)","DOI":"10.1016\/j.matpr.2020.08.420"},{"key":"8_CR95","doi-asserted-by":"publisher","first-page":"355","DOI":"10.2147\/RMHP.S233706","volume":"13","author":"J Kaur","year":"2020","unstructured":"Kaur, J., et al.: Security risk assessment of healthcare web application through adaptive neuro-fuzzy inference system: a design perspective. Risk Manage. Healthcare Policy 13, 355 (2020)","journal-title":"Risk Manage. Healthcare Policy"},{"key":"8_CR96","doi-asserted-by":"crossref","unstructured":"Kausar, F.: Iris based cancelable biometric cryptosystem for secure healthcare smart card. Egyptian Inf. J. (2021)","DOI":"10.1016\/j.eij.2021.01.004"},{"key":"8_CR97","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1016\/j.ijinfomgt.2018.09.008","volume":"45","author":"JA Kaw","year":"2019","unstructured":"Kaw, J.A., Loan, N.A., Parah, S.A., Muhammad, K., Sheikh, J.A., Bhat, G.M.: A reversible and secure patient information hiding system for IoT driven e-health. Int. J. Inf. Manage. 45, 262\u2013275 (2019)","journal-title":"Int. J. Inf. Manage."},{"key":"8_CR98","doi-asserted-by":"publisher","unstructured":"Kelkar, V., Tuckley, K.: Reversible watermarking for medical images with added security using chaos theory, pp. 84\u201387 (2018). https:\/\/doi.org\/10.1109\/CESYS.2018.8724039","DOI":"10.1109\/CESYS.2018.8724039"},{"key":"8_CR99","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1016\/j.procs.2017.11.105","volume":"121","author":"G Kenny","year":"2017","unstructured":"Kenny, G., O\u2019Connor, Y., Eze, E., Ndibuagu, E., Heavin, C.: A ground-up approach to mHealth in Nigeria: a study of primary healthcare workers\u2019 attitude to mHealth adoption. Procedia Comput. Sci. 121, 809\u2013816 (2017)","journal-title":"Procedia Comput. Sci."},{"key":"8_CR100","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1016\/j.procs.2018.10.199","volume":"141","author":"H Khaloufi","year":"2018","unstructured":"Khaloufi, H., Abouelmehdi, K., Beni-hssane, A., Saadi, M.: Security model for big healthcare data lifecycle. Procedia Comput. Sci. 141, 294\u2013301 (2018)","journal-title":"Procedia Comput. Sci."},{"key":"8_CR101","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1016\/j.procs.2014.07.058","volume":"34","author":"FA Khan","year":"2014","unstructured":"Khan, F.A., Ali, A., Abbas, H., Haldar, N.A.H.: A cloud-based healthcare framework for security and patients\u2019 data privacy using wireless body area networks. Procedia Comput. Sci. 34, 511\u2013517 (2014)","journal-title":"Procedia Comput. Sci."},{"key":"8_CR102","doi-asserted-by":"publisher","unstructured":"Khan, J., et al.: Medical image encryption into smart healthcare IoT system, pp. 378\u2013382 (2019). https:\/\/doi.org\/10.1109\/ICCWAMTIP47768.2019.9067592","DOI":"10.1109\/ICCWAMTIP47768.2019.9067592"},{"key":"8_CR103","doi-asserted-by":"crossref","unstructured":"Khan, J., et al.: Medical image encryption into smart healthcare IoT system, pp. 378\u2013382 (2019)","DOI":"10.1109\/ICCWAMTIP47768.2019.9067592"},{"issue":"2","key":"8_CR104","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.clsr.2012.01.003","volume":"28","author":"P Kierkegaard","year":"2012","unstructured":"Kierkegaard, P.: Medical data breaches: notification delayed is notification denied. Comput. Law Secur. Rev. 28(2), 163\u2013183 (2012)","journal-title":"Comput. Law Secur. Rev."},{"key":"8_CR105","unstructured":"Kim, J., Feng, D.D., Cai, T.W., Eberl, S.: Integrated multimedia medical data agent in e-health. In: Proceedings of the Pan-Sydney area Workshop on Visual Information Processing, vol. 11, pp. 11\u201315 (2001)"},{"key":"8_CR106","doi-asserted-by":"publisher","unstructured":"Kiourtis, A., Mavrogiorgou, A., Kyriazis, D., Graziani, A., Torelli, F.: Improving health information exchange through wireless communication protocols, pp. 32\u201339 (2020). https:\/\/doi.org\/10.1109\/WiMob50308.2020.9253374","DOI":"10.1109\/WiMob50308.2020.9253374"},{"key":"8_CR107","doi-asserted-by":"crossref","unstructured":"Kiruba, W.M., Vijayalakshmi, M.: Implementation and analysis of data security in a real time IoT based healthcare application, pp. 1460\u20131465 (2018)","DOI":"10.1109\/ICOEI.2018.8553908"},{"issue":"11","key":"8_CR108","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1109\/JPROC.2010.2065210","volume":"98","author":"J Ko","year":"2010","unstructured":"Ko, J., Lu, C., Srivastava, M.B., Stankovic, J.A., Terzis, A., Welsh, M.: Wireless sensor networks for healthcare. Proc. IEEE 98(11), 1947\u20131960 (2010)","journal-title":"Proc. IEEE"},{"key":"8_CR109","doi-asserted-by":"crossref","unstructured":"Kondawar, S.S., Gawali, D.H.: Security algorithms for wireless medical data, pp. 1\u20136 (2016)","DOI":"10.1109\/GET.2016.7916652"},{"issue":"4","key":"8_CR110","doi-asserted-by":"publisher","first-page":"654","DOI":"10.2105\/AJPH.2006.090902","volume":"97","author":"R Krishna","year":"2007","unstructured":"Krishna, R., Kelleher, K., Stahlberg, E.: Patient confidentiality in the research use of clinical medical databases. Am. J. Public Health 97(4), 654\u2013658 (2007)","journal-title":"Am. J. Public Health"},{"key":"8_CR111","doi-asserted-by":"crossref","unstructured":"Krombholz, K., Busse, K., Pfeffer, K., Smith, M., von Zezschwitz, E.: \u201cIf https Were Secure, i Wouldn\u2019t need 2fa\u201d-end User and Administrator Mental Models of https, pp. 246\u2013263 (2019)","DOI":"10.1109\/SP.2019.00060"},{"key":"8_CR112","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.102975","volume":"179","author":"M Kumar","year":"2021","unstructured":"Kumar, M., Chand, S.: Medhypchain: a patient-centered interoperability hyperledger-based medical healthcare system: regulation in covid-19 pandemic. J. Netw. Comput. Appl. 179, 102975 (2021)","journal-title":"J. Netw. Comput. Appl."},{"key":"8_CR113","unstructured":"Kumar, S., Namdeo, V.: Enabling privacy and security of healthcare-related data in the cloud"},{"key":"8_CR114","doi-asserted-by":"crossref","unstructured":"Kumar, V.N., Rochan, M., Hariharan, S., Rajamani, K.: Data hiding scheme for medical images using lossless code for mobile HIMS, pp. 1\u20134 (2011)","DOI":"10.1109\/COMSNETS.2011.5716516"},{"key":"8_CR115","doi-asserted-by":"crossref","unstructured":"Kuo, M.H., Chrimes, D., Moa, B., Hu, W.: Design and construction of a big data analytics framework for health applications, pp. 631\u2013636 (2015)","DOI":"10.1109\/SmartCity.2015.140"},{"key":"8_CR116","doi-asserted-by":"crossref","unstructured":"Lee, C.Y., Ibrahim, H., Othman, M., Yaakob, R.: Reconciling semantic conflicts in electronic patient data exchange, pp. 390\u2013394 (2009)","DOI":"10.1145\/1806338.1806409"},{"key":"8_CR117","doi-asserted-by":"publisher","unstructured":"Lees, P.J., Chronaki, C.E., Simantirakis, E.N., Kostomanolakis, S.G., Orphanoudakis, S.C., Vardas, P.E.: Remote access to medical records via the internet: feasibility, security and multilingual considerations, pp. 89\u201392 (1999). https:\/\/doi.org\/10.1109\/CIC.1999.825913","DOI":"10.1109\/CIC.1999.825913"},{"key":"8_CR118","doi-asserted-by":"crossref","unstructured":"Li, P., Xu, C., Luo, Y., Cao, Y., Mathew, J., Ma, Y.: Carenet: building regulation-compliant home-based healthcare services with software-defined infrastructure, pp. 373\u2013382 (2017)","DOI":"10.1145\/3040992.3041007"},{"key":"8_CR119","doi-asserted-by":"publisher","first-page":"22011","DOI":"10.1109\/ACCESS.2019.2898265","volume":"7","author":"X Li","year":"2019","unstructured":"Li, X., Huang, X., Li, C., Yu, R., Shu, L.: Edgecare: leveraging edge computing for collaborative data management in mobile healthcare systems. IEEE Access 7, 22011\u201322025 (2019)","journal-title":"IEEE Access"},{"key":"8_CR120","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.optlaseng.2019.05.027","volume":"122","author":"H Liu","year":"2019","unstructured":"Liu, H., Kadir, A., Liu, J.: Color pathological image encryption algorithm using arithmetic over galois field and coupled hyper chaotic system. Opt. Lasers Eng. 122, 123\u2013133 (2019)","journal-title":"Opt. Lasers Eng."},{"key":"8_CR121","doi-asserted-by":"publisher","unstructured":"Lohiya, S., Ragha, L.: Privacy preserving in data mining using hybrid approach, pp. 743\u2013746 (2012). https:\/\/doi.org\/10.1109\/CICN.2012.166","DOI":"10.1109\/CICN.2012.166"},{"key":"8_CR122","doi-asserted-by":"publisher","first-page":"692","DOI":"10.1016\/j.pmcj.2017.06.020","volume":"40","author":"RK Lomotey","year":"2017","unstructured":"Lomotey, R.K., Pry, J., Sriramoju, S.: Wearable IoT data stream traceability in a distributed health information system. Pervasive Mob. Comput. 40, 692\u2013707 (2017)","journal-title":"Pervasive Mob. Comput."},{"key":"8_CR123","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-030-81111-2_16","volume-title":"Human Aspects of Information Security and Assurance","author":"JM Jones","year":"2021","unstructured":"Jones, J.M., Duezguen, R., Mayer, P., Volkamer, M., Das, S.: A literature review on virtual reality authentication. In: Furnell, S., Clarke, N. (eds.) HAISA 2021. IAICT, vol. 613, pp. 189\u2013198. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-81111-2_16"},{"key":"8_CR124","doi-asserted-by":"crossref","unstructured":"Mahima, K.T.Y., Ginige, T.: A secured healthcare system using blockchain and graph theory (2020). https:\/\/doi.org\/10.1145\/3440084.3441217","DOI":"10.1145\/3440084.3441217"},{"issue":"3","key":"8_CR125","first-page":"603","volume":"41","author":"T Majam","year":"2006","unstructured":"Majam, T., Theron, F.: The purpose and relevance of a scientific literature review: a holistic approach to research. J. Public Adm. 41(3), 603\u2013615 (2006)","journal-title":"J. Public Adm."},{"key":"8_CR126","doi-asserted-by":"crossref","unstructured":"Maji, A.K., et al.: Security analysis and implementation of web-based telemedicine services with a four-tier architecture, pp. 46\u201354 (2008)","DOI":"10.4108\/ICST.PERVASIVEHEALTH2008.2518"},{"key":"8_CR127","doi-asserted-by":"crossref","unstructured":"Majumdar, R., Das, S.: Sok: an evaluation of quantum authentication through systematic literature review. In: Proceedings of the Workshop on Usable Security and Privacy (USEC) (2021)","DOI":"10.2139\/ssrn.3859056"},{"key":"8_CR128","doi-asserted-by":"publisher","unstructured":"Mashima, D., Ahamad, M.: Enhancing accountability of electronic health record usage via patient-centric monitoring (2012). https:\/\/doi.org\/10.1145\/2110363.2110410","DOI":"10.1145\/2110363.2110410"},{"issue":"4","key":"8_CR129","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1016\/j.tele.2017.12.020","volume":"35","author":"I Masood","year":"2018","unstructured":"Masood, I., Wang, Y., Daud, A., Aljohani, N.R., Dawood, H.: Privacy management of patient physiological parameters. Telematics Inf. 35(4), 677\u2013701 (2018)","journal-title":"Telematics Inf."},{"key":"8_CR130","doi-asserted-by":"crossref","unstructured":"Masood, I., Wang, Y., Daud, A., Aljohani, N.R., Dawood, H.: Towards smart healthcare: patient data privacy and security in sensor-cloud infrastructure. Wirel. Commun. Mob. Comput. 2018 (2018)","DOI":"10.1155\/2018\/2143897"},{"key":"8_CR131","doi-asserted-by":"crossref","unstructured":"Mbonihankuye, S., Nkunzimana, A., Ndagijimana, A.: Healthcare data security technology: hipaa compliance. Wirel. Commun. Mob. Comput. 2019 (2019)","DOI":"10.1155\/2019\/1927495"},{"key":"8_CR132","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.dss.2018.02.007","volume":"108","author":"A McLeod","year":"2018","unstructured":"McLeod, A., Dolezel, D.: Cyber-analytics: modeling factors associated with healthcare data breaches. Decis. Support Syst. 108, 57\u201368 (2018)","journal-title":"Decis. Support Syst."},{"issue":"1","key":"8_CR133","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.healthpol.2017.08.006","volume":"122","author":"MG Melchiorre","year":"2018","unstructured":"Melchiorre, M.G., Papa, R., Rijken, M., van Ginneken, E., Hujala, A., Barbabella, F.: eHealth in integrated care programs for people with multimorbidity in Europe: insights from the ICARE4EU project. Health Policy 122(1), 53\u201363 (2018)","journal-title":"Health Policy"},{"issue":"1","key":"8_CR134","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/j.tele.2016.05.008","volume":"34","author":"SJ Miah","year":"2017","unstructured":"Miah, S.J., Hasan, J., Gammack, J.G.: On-cloud healthcare clinic: an e-health consultancy approach for remote communities in a developing country. Telematics Inf. 34(1), 311\u2013322 (2017)","journal-title":"Telematics Inf."},{"key":"8_CR135","doi-asserted-by":"crossref","unstructured":"Mirto, M., Cafaro, M., Aloisio, G.: Peer-to-peer data discovery in health centers, pp. 343\u2013348 (2013)","DOI":"10.1109\/CBMS.2013.6627813"},{"key":"8_CR136","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1016\/j.procs.2015.08.387","volume":"63","author":"B Mounia","year":"2015","unstructured":"Mounia, B., Habiba, C.: Big data privacy in healthcare Moroccan context. Procedia Comput. Sci. 63, 575\u2013580 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"8_CR137","doi-asserted-by":"publisher","unstructured":"Naseem, M.T., Qureshi, I.M., Muzaffar, M.Z., et al.: Robust watermarking for medical images resistant to geometric attacks, pp. 224\u2013228 (2012). https:\/\/doi.org\/10.1109\/INMIC.2012.6511496","DOI":"10.1109\/INMIC.2012.6511496"},{"key":"8_CR138","doi-asserted-by":"crossref","unstructured":"Nausheen, F., Begum, S.H.: Healthcare IoT: benefits, vulnerabilities and solutions, pp. 517\u2013522 (2018)","DOI":"10.1109\/ICISC.2018.8399126"},{"key":"8_CR139","doi-asserted-by":"crossref","unstructured":"Noah, N., Das, S.: Exploring evolution of augmented and virtual reality education space in 2020 through systematic literature review. Comput. Animation Virtual Worlds e2020 (2021)","DOI":"10.2139\/ssrn.3825974"},{"key":"8_CR140","doi-asserted-by":"crossref","unstructured":"Noel, K., Yagudayev, S., Messina, C., Schoenfeld, E., Hou, W., Kelly, G.: Tele-transitions of care. a 12-month, parallel-group, superiority randomized controlled trial protocol, evaluating the use of telehealth versus standard transitions of care in the prevention of avoidable hospital readmissions. Contemp. Clin. Trials Commun. 12, 9\u201316 (2018)","DOI":"10.1016\/j.conctc.2018.08.006"},{"issue":"3","key":"8_CR141","first-page":"183","volume":"59","author":"M Nofer","year":"2017","unstructured":"Nofer, M., Gomber, P., Hinz, O., Schiereck, D.: Blockchain Bus. Inf. Syst. Eng. 59(3), 183\u2013187 (2017)","journal-title":"Syst. Eng."},{"key":"8_CR142","doi-asserted-by":"crossref","unstructured":"Olaronke, I., Oluwaseun, O.: Big data in healthcare: Prospects, challenges and resolutions, pp. 1152\u20131157 (2016)","DOI":"10.1109\/FTC.2016.7821747"},{"key":"8_CR143","doi-asserted-by":"crossref","unstructured":"Pai, R.R., Alathur, S.: Determinants of mobile health application awareness and use in India: an empirical analysis, pp. 576\u2013584 (2020)","DOI":"10.1145\/3428502.3428589"},{"key":"8_CR144","doi-asserted-by":"crossref","unstructured":"Paksuniemi, M., Sorvoja, H., Alasaarela, E., Myllyla, R.: Wireless sensor and data transmission needs and technologies for patient monitoring in the operating room and intensive care unit, pp. 5182\u20135185 (2006)","DOI":"10.1109\/IEMBS.2005.1615645"},{"key":"8_CR145","doi-asserted-by":"crossref","unstructured":"Palta, J.R., Frouhar, V.A., Dempsey, J.F.: Web-based submission, archive, and review of radiotherapy data for clinical quality assurance: a new paradigm. Int. J. Radiat. Oncol.* Biol.* Phys. 57(5), 1427\u20131436 (2003)","DOI":"10.1016\/S0360-3016(03)01624-9"},{"key":"8_CR146","doi-asserted-by":"publisher","first-page":"40612","DOI":"10.1109\/ACCESS.2020.2976687","volume":"8","author":"AK Pandey","year":"2020","unstructured":"Pandey, A.K., et al.: Key issues in healthcare data integrity: analysis and recommendations. IEEE Access 8, 40612\u201340628 (2020)","journal-title":"IEEE Access"},{"key":"8_CR147","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.future.2020.04.034","volume":"111","author":"HM Pandey","year":"2020","unstructured":"Pandey, H.M.: Secure medical data transmission using a fusion of bit mask oriented genetic algorithm, encryption and steganography. Future Gener. Comput. Syst. 111, 213\u2013225 (2020)","journal-title":"Future Gener. Comput. Syst."},{"key":"8_CR148","first-page":"241","volume":"2","author":"R Parameswari","year":"2016","unstructured":"Parameswari, R., Latha, R.: Analysis of wavelet transform approach for healthcare data security in cloud framework. Int. J. Sci. Res. Sci. Eng. Technol. 2, 241\u2013246 (2016)","journal-title":"Int. J. Sci. Res. Sci. Eng. Technol."},{"key":"8_CR149","doi-asserted-by":"publisher","unstructured":"Parmar, M., Shah, S.: Reinforcing security of medical data using blockchain, pp. 1233\u20131239 (2019). https:\/\/doi.org\/10.1109\/ICCS45141.2019.9065830","DOI":"10.1109\/ICCS45141.2019.9065830"},{"issue":"1","key":"8_CR150","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1049\/htl.2018.5114","volume":"7","author":"AM Perumal","year":"2020","unstructured":"Perumal, A.M., Nadar, E.R.S.: Architectural framework of a group key management system for enhancing e-healthcare data security. Healthcare Technol. Lett. 7(1), 13\u201317 (2020)","journal-title":"Healthcare Technol. Lett."},{"key":"8_CR151","doi-asserted-by":"crossref","unstructured":"Petkovi\u0107, M.: Remote patient monitoring: Information reliability challenges, pp. 295\u2013301 (2009)","DOI":"10.1109\/TELSKS.2009.5339520"},{"key":"8_CR152","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1016\/j.future.2019.01.008","volume":"95","author":"S Pirbhulal","year":"2019","unstructured":"Pirbhulal, S., Samuel, O.W., Wu, W., Sangaiah, A.K., Li, G.: A joint resource-aware and medical data security framework for wearable healthcare systems. Future Gener. Comput. Syst. 95, 382\u2013391 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"8_CR153","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1016\/j.compeleceng.2018.08.004","volume":"71","author":"S Pirbhulal","year":"2018","unstructured":"Pirbhulal, S., Shang, P., Wu, W., Sangaiah, A.K., Samuel, O.W., Li, G.: Fuzzy vault-based biometric security method for tele-health monitoring systems. Comput. Electr. Eng. 71, 546\u2013557 (2018)","journal-title":"Comput. Electr. Eng."},{"key":"8_CR154","first-page":"102748","volume":"58","author":"D Po\u0142ap","year":"2021","unstructured":"Po\u0142ap, D., Srivastava, G., Yu, K.: Agent architecture of an intelligent medical system based on federated learning and blockchain technology. J. Inf. Secur. Appl. 58, 102748 (2021)","journal-title":"J. Inf. Secur. Appl."},{"key":"8_CR155","doi-asserted-by":"publisher","unstructured":"Po\u0142ap, D., Srivastava, G., Jolfaei, A., Parizi, R.M.: Blockchain technology and neural networks for the internet of medical things, pp. 508\u2013513 (2020). https:\/\/doi.org\/10.1109\/INFOCOMWKSHPS50562.2020.9162735","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162735"},{"key":"8_CR156","unstructured":"PraveenKumar, R., Divya, P.: Medical data processing and prediction of future health condition using sensors data mining techniques and r programming. Int. J. Sci. Res. Eng. Dev. 3(4) (2020)"},{"key":"8_CR157","doi-asserted-by":"crossref","unstructured":"Psarra, E., Patiniotakis, I., Verginadis, Y., Apostolou, D., Mentzas, G.: Securing access to healthcare data with context-aware policies, pp. 1\u20136 (2020)","DOI":"10.1109\/IISA50023.2020.9284393"},{"key":"8_CR158","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.cmpb.2018.06.005","volume":"164","author":"U Qazi","year":"2018","unstructured":"Qazi, U., Haq, M., Rashad, N., Rashid, K., Ullah, S., Raza, U.: Availability and use of in-patient electronic health records in low resource setting. Comput. Methods Program. Biomed. 164, 23\u201329 (2018)","journal-title":"Comput. Methods Program. Biomed."},{"key":"8_CR159","doi-asserted-by":"crossref","unstructured":"Rajagopalan, S., Dhamodaran, B., Ramji, A., Francis, C., Venkatraman, S., Amirtharajan, R.: Confusion and diffusion on FPGA-Onchip solution for medical image security, pp. 1\u20136 (2017)","DOI":"10.1109\/ICCCI.2017.8117770"},{"issue":"3","key":"8_CR160","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/j.ijmedinf.2003.11.022","volume":"73","author":"G Reni","year":"2004","unstructured":"Reni, G., Molteni, M., Arlotti, S., Pinciroli, F.: Chief medical officer actions on information security in an Italian rehabilitation centre. Int. J. Med. Inf. 73(3), 271\u2013279 (2004)","journal-title":"Int. J. Med. Inf."},{"key":"8_CR161","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1016\/j.eswa.2016.02.001","volume":"54","author":"AM del Rey","year":"2016","unstructured":"del Rey, A.M., Pastora, J.H., S\u00e1nchez, G.R.: 3d medical data security protection. Exp. Syst. Appl. 54, 379\u2013386 (2016)","journal-title":"Exp. Syst. Appl."},{"key":"8_CR162","unstructured":"Richardson, J.E., Ancker, J.S.: Public perspectives of mobile phones\u2019 effects on healthcare quality and medical data security and privacy: A 2-year nationwide survey, vol. 2015, p. 1076 (2015)"},{"key":"8_CR163","doi-asserted-by":"crossref","unstructured":"Rocha, A., et al.: Innovations in health care services: the caalyx system. Int. J. Med. Inf. 82(11), e307\u2013e320 (2013)","DOI":"10.1016\/j.ijmedinf.2011.03.003"},{"key":"8_CR164","unstructured":"Rodrigues, H.A.M., Antunes, L., Correia, M.E.: Proposal of a secure electronic prescription system, pp. 165\u2013168 (2013)"},{"key":"8_CR165","doi-asserted-by":"publisher","unstructured":"Rodriguez-Colin, R., Claudia, F.D.J., Trinidad-Blas, G.: Data hiding scheme for medical images, pp. 32\u201332 (2007). https:\/\/doi.org\/10.1109\/CONIELECOMP.2007.14","DOI":"10.1109\/CONIELECOMP.2007.14"},{"key":"8_CR166","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107558","volume":"181","author":"M Safkhani","year":"2020","unstructured":"Safkhani, M., Rostampour, S., Bendavid, Y., Bagheri, N.: IoT in medical & pharmaceutical: designing lightweight RFID security protocols for ensuring supply chain integrity. Comput. Netw. 181, 107558 (2020)","journal-title":"Comput. Netw."},{"key":"8_CR167","doi-asserted-by":"publisher","first-page":"101838","DOI":"10.1016\/j.cose.2020.101838","volume":"96","author":"A Sammoud","year":"2020","unstructured":"Sammoud, A., Chalouf, M.A., Hamdi, O., Montavont, N., Bouallegue, A.: A new biometrics-based key establishment protocol in Wban: Energy efficiency and security robustness analysis. Comput. Secur. 96, 101838 (2020)","journal-title":"Comput. Secur."},{"key":"8_CR168","doi-asserted-by":"crossref","unstructured":"Sartipi, K., Yarmand, M.H., Down, D.G.: Mined-knowledge and decision support services in electronic health, pp. 1\u20136 (2007)","DOI":"10.1109\/SDSOA.2007.9"},{"key":"8_CR169","doi-asserted-by":"crossref","unstructured":"Schmeelk, S.: Where is the risk? analysis of government reported patient medical data breaches, pp. 269\u2013272 (2019)","DOI":"10.1145\/3358695.3361754"},{"key":"8_CR170","doi-asserted-by":"publisher","first-page":"103936","DOI":"10.1016\/j.ijmedinf.2019.07.015","volume":"130","author":"I Shaarani","year":"2019","unstructured":"Shaarani, I., et al.: Attitudes of patients towards digital information retrieval by their physician at point of care in an ambulatory setting. Int. J. Med. Inf. 130, 103936 (2019)","journal-title":"Int. J. Med. Inf."},{"key":"8_CR171","doi-asserted-by":"publisher","unstructured":"Shahbaz, S., Mahmood, A., Anwar, Z.: Soad: securing oncology EMR by anonymizing DICOM images, pp. 125\u2013130 (2013). https:\/\/doi.org\/10.1109\/FIT.2013.30","DOI":"10.1109\/FIT.2013.30"},{"issue":"1","key":"8_CR172","first-page":"57","volume":"32","author":"KA Shakil","year":"2020","unstructured":"Shakil, K.A., Zareen, F.J., Alam, M., Jabin, S.: Bamhealthcloud: a biometric authentication and data management system for healthcare data in cloud. J. King Saud Univ. Comput. Inf. Sci. 32(1), 57\u201364 (2020)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"issue":"1","key":"8_CR173","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1016\/j.cmpb.2013.09.008","volume":"113","author":"H Shen","year":"2014","unstructured":"Shen, H., et al.: Miaps: a web-based system for remotely accessing and presenting medical images. Comput. Methods Program. Biomed. 113(1), 266\u2013283 (2014)","journal-title":"Comput. Methods Program. Biomed."},{"key":"8_CR174","doi-asserted-by":"crossref","unstructured":"Shere, A.R., Nurse, J.R., Flechais, I.: Security should be there by default: investigating how journalists perceive and respond to risks from the internet of things, pp. 240\u2013249 (2020)","DOI":"10.1109\/EuroSPW51379.2020.00039"},{"issue":"5","key":"8_CR175","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MC.2016.145","volume":"49","author":"W Shi","year":"2016","unstructured":"Shi, W., Dustdar, S.: The promise of edge computing. Computer 49(5), 78\u201381 (2016)","journal-title":"Computer"},{"key":"8_CR176","doi-asserted-by":"crossref","unstructured":"Shrivastava, S., Srikanth, T., VS, D.: e-Governance for healthcare service delivery in India: challenges and opportunities in security and privacy, pp. 180\u2013183 (2020)","DOI":"10.1145\/3428502.3428527"},{"key":"8_CR177","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2021.104401","volume":"148","author":"U Shrivastava","year":"2021","unstructured":"Shrivastava, U., Song, J., Han, B.T., Dietzman, D.: Do data security measures, privacy regulations, and communication standards impact the interoperability of patient health information? a cross-country investigation. Int. J. Med. Inf. 148, 104401 (2021)","journal-title":"Int. J. Med. Inf."},{"key":"8_CR178","doi-asserted-by":"crossref","unstructured":"da Silva Etges, A.P.B., et al.: Development of an enterprise risk inventory for healthcare. BMC Health Serv. Res. 18(1), 1\u201316 (2018)","DOI":"10.1186\/s12913-018-3400-7"},{"issue":"3","key":"8_CR179","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.jhin.2018.07.034","volume":"100","author":"A Sim\u00f5es","year":"2018","unstructured":"Sim\u00f5es, A., et al.: Participatory implementation of an antibiotic stewardship programme supported by an innovative surveillance and clinical decision-support system. J. Hosp. Infect. 100(3), 257\u2013264 (2018)","journal-title":"J. Hosp. Infect."},{"issue":"2","key":"8_CR180","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1109\/JBHI.2014.2320444","volume":"19","author":"MA Simplicio","year":"2014","unstructured":"Simplicio, M.A., Iwaya, L.H., Barros, B.M., Carvalho, T.C., N\u00e4slund, M.: Secourhealth: a delay-tolerant security framework for mobile health data collection. IEEE J. Biomed. Health Inf. 19(2), 761\u2013772 (2014)","journal-title":"IEEE J. Biomed. Health Inf."},{"key":"8_CR181","doi-asserted-by":"publisher","unstructured":"Sosu, R.N.A., Quist-Aphetsi, K., Nana, L.: A decentralized cryptographic blockchain approach for health information system, pp. 120\u20131204 (2019). https:\/\/doi.org\/10.1109\/ICCMA.2019.00027","DOI":"10.1109\/ICCMA.2019.00027"},{"key":"8_CR182","doi-asserted-by":"publisher","unstructured":"Soualmi, A., Alti, A., Laouamer, L.: A blind image watermarking method for personal medical data security, pp. 1\u20135 (2019). https:\/\/doi.org\/10.1109\/ICNAS.2019.8807442","DOI":"10.1109\/ICNAS.2019.8807442"},{"issue":"7","key":"8_CR183","first-page":"148","volume":"3","author":"S Sreeji","year":"2020","unstructured":"Sreeji, S., Shiji, S., Vysagh, M., Amma, T.A.: Security and privacy preserving deep learning framework that protect healthcare data breaches. Int. J. Res. Eng. Sci. Manage. 3(7), 148\u2013152 (2020)","journal-title":"Int. J. Res. Eng. Sci. Manage."},{"key":"8_CR184","doi-asserted-by":"crossref","unstructured":"Stobert, E., Barrera, D., Homier, V., Kollek, D.: Understanding cybersecurity practices in emergency departments, pp. 1\u20138 (2020)","DOI":"10.1145\/3313831.3376881"},{"key":"8_CR185","doi-asserted-by":"crossref","unstructured":"Stowell, E., et al.: Designing and evaluating mhealth interventions for vulnerable populations: a systematic review, pp. 1\u201317 (2018)","DOI":"10.1145\/3173574.3173589"},{"key":"8_CR186","doi-asserted-by":"crossref","unstructured":"Sudha, G., Ganesan, R.: Secure transmission medical data for pervasive healthcare system using android, pp. 433\u2013436 (2013)","DOI":"10.1109\/iccsp.2013.6577090"},{"issue":"2","key":"8_CR187","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1016\/j.ejrad.2010.05.012","volume":"78","author":"LN Sutton","year":"2011","unstructured":"Sutton, L.N.: PACS and diagnostic imaging service delivery-A UK perspective. Eur. J. Radiol. 78(2), 243\u2013249 (2011)","journal-title":"Eur. J. Radiol."},{"key":"8_CR188","doi-asserted-by":"crossref","unstructured":"Tan, C.C., Wang, H., Zhong, S., Li, Q.: Body sensor network security: an identity-based cryptography approach, pp. 148\u2013153 (2008)","DOI":"10.1145\/1352533.1352557"},{"issue":"6","key":"8_CR189","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1109\/TITB.2009.2033055","volume":"13","author":"CC Tan","year":"2009","unstructured":"Tan, C.C., Wang, H., Zhong, S., Li, Q.: Ibe-lite: a lightweight identity-based cryptography for body sensor networks. IEEE Trans. Inf. Technol. Biomed. 13(6), 926\u2013932 (2009)","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"key":"8_CR190","doi-asserted-by":"publisher","unstructured":"Thamilarasu, G., Lakin, C.: A security framework for mobile health applications, pp. 221\u2013226 (2017). https:\/\/doi.org\/10.1109\/FiCloudW.2017.96","DOI":"10.1109\/FiCloudW.2017.96"},{"key":"8_CR191","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jbi.2018.08.008","volume":"86","author":"Y Tian","year":"2018","unstructured":"Tian, Y., et al.: Popcorn: a web service for individual prognosis prediction based on multi-center clinical data collaboration without patient-level data sharing. J. Biomed. Inf. 86, 1\u201314 (2018)","journal-title":"J. Biomed. Inf."},{"key":"8_CR192","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.future.2020.11.008","volume":"117","author":"A Tolba","year":"2021","unstructured":"Tolba, A., Al-Makhadmeh, Z.: Predictive data analysis approach for securing medical data in smart grid healthcare systems. Future Gener. Comput. Syst. 117, 87\u201396 (2021)","journal-title":"Future Gener. Comput. Syst."},{"key":"8_CR193","doi-asserted-by":"crossref","unstructured":"Tyler, J.L.: The healthcare information technology context: a framework for viewing legal aspects of telemedicine and teleradiology, pp. 1\u201310 (2001)","DOI":"10.1109\/HICSS.2001.926562"},{"key":"8_CR194","unstructured":"U.S. Department of Health & Human Services: Anthem pays OCR \\$16 Million in record HIPAA settlement following largest health data breach in history, 15 Oct 2018. https:\/\/www.hhs.gov\/hipaa\/for-professionals\/compliance-enforcement\/agreements\/anthem\/index.html"},{"key":"8_CR195","doi-asserted-by":"publisher","unstructured":"Usman, M.A., Usman, M.R.: Using image steganography for providing enhanced medical data security, pp. 1\u20134 (2018). https:\/\/doi.org\/10.1109\/CCNC.2018.8319263","DOI":"10.1109\/CCNC.2018.8319263"},{"key":"8_CR196","doi-asserted-by":"crossref","unstructured":"Uy, R.C.Y., Kury, F.S., Fontelo, P.: Wireless networks, physician handhelds use, and medical devices in us hospitals, pp. 1\u20136 (2015)","DOI":"10.1145\/2811780.2811956"},{"key":"8_CR197","doi-asserted-by":"publisher","unstructured":"Vallathan, G., Rajamani, V., Harinee, M.P.: Enhanced medical data security and perceptual quality for healthcare services, pp. 1\u20136 (2020). https:\/\/doi.org\/10.1109\/ICSCAN49426.2020.9262309","DOI":"10.1109\/ICSCAN49426.2020.9262309"},{"key":"8_CR198","doi-asserted-by":"crossref","unstructured":"Vassis, D., Belsis, P., Skourlas, C.: Secure management of medical data in wireless environments, pp. 427\u2013432 (2012)","DOI":"10.1109\/PCi.2012.37"},{"issue":"7","key":"8_CR199","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1111\/bioe.12711","volume":"34","author":"C V\u00e9liz","year":"2020","unstructured":"V\u00e9liz, C.: Not the doctor\u2019s business: privacy, personal responsibility and data rights in medical settings. Bioethics 34(7), 712\u2013718 (2020)","journal-title":"Bioethics"},{"issue":"4","key":"8_CR200","doi-asserted-by":"publisher","first-page":"10660","DOI":"10.1016\/j.matpr.2017.12.341","volume":"5","author":"M Vidya","year":"2018","unstructured":"Vidya, M., Padmaja, K.: Enhancing security of electronic patient record using watermarking technique. Mater. Today Proc. 5(4), 10660\u201310664 (2018)","journal-title":"Mater. Today Proc."},{"key":"8_CR201","doi-asserted-by":"crossref","unstructured":"Vijayalakshmi, A.V., Arockiam, L.: Hybrid security techniques to protect sensitive data in e-healthcare systems, pp. 39\u201343 (2018)","DOI":"10.1109\/ICSSIT.2018.8748298"},{"key":"8_CR202","doi-asserted-by":"crossref","unstructured":"Wagner, P.: Third party breaches-a survey of threats and recommendations, SSRN 3782822 (2021)","DOI":"10.2139\/ssrn.3782822"},{"key":"8_CR203","doi-asserted-by":"publisher","first-page":"25167","DOI":"10.1109\/ACCESS.2018.2817560","volume":"6","author":"S Walker-Roberts","year":"2018","unstructured":"Walker-Roberts, S., Hammoudeh, M., Dehghantanha, A.: A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure. IEEE Access 6, 25167\u201325177 (2018)","journal-title":"IEEE Access"},{"key":"8_CR204","doi-asserted-by":"crossref","unstructured":"Wang, C.X.: Security issues to tele-medicine system design, pp. 106\u2013109 (1999)","DOI":"10.1109\/SECON.1999.766102"},{"key":"8_CR205","doi-asserted-by":"crossref","unstructured":"Wang, D., Kale, S.D., O\u2019Neill, J.: Please call the specialism: Using wechat to support patient care in china, pp. 1\u201313 (2020)","DOI":"10.1145\/3313831.3376274"},{"key":"8_CR206","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.comcom.2020.01.070","volume":"153","author":"D Wang","year":"2020","unstructured":"Wang, D., Huang, Q., Chen, X., Ji, L.: Location of three-dimensional movement for a human using a wearable multi-node instrument implemented by wireless body area networks. Comput. Commun. 153, 34\u201341 (2020)","journal-title":"Comput. Commun."},{"key":"8_CR207","doi-asserted-by":"publisher","unstructured":"Weaver, A.C., et al.: Federated, secure trust networks for distributed healthcare it services, pp. 162\u2013169 (2003). https:\/\/doi.org\/10.1109\/INDIN.2003.1300264","DOI":"10.1109\/INDIN.2003.1300264"},{"issue":"11","key":"8_CR208","doi-asserted-by":"publisher","first-page":"1291","DOI":"10.1016\/j.acra.2004.07.020","volume":"11","author":"V Yaghmai","year":"2004","unstructured":"Yaghmai, V., Salehi, S.A., Kuppuswami, S., Berlin, J.W.: Rapid wireless transmission of head CT images to a personal digital assistant for remote consultation1. Acad. Radiol. 11(11), 1291\u20131293 (2004)","journal-title":"Acad. Radiol."},{"key":"8_CR209","doi-asserted-by":"publisher","first-page":"36939","DOI":"10.1109\/ACCESS.2018.2844182","volume":"6","author":"W Yang","year":"2018","unstructured":"Yang, W., et al.: Securing mobile healthcare data: a smart card based cancelable finger-vein bio-cryptosystem. IEEE Access 6, 36939\u201336947 (2018)","journal-title":"IEEE Access"},{"key":"8_CR210","doi-asserted-by":"publisher","first-page":"96900","DOI":"10.1109\/ACCESS.2019.2929298","volume":"7","author":"Y Yang","year":"2019","unstructured":"Yang, Y., Xiao, X., Cai, X., Zhang, W.: A secure and high visual-quality framework for medical images by contrast-enhancement reversible data hiding and homomorphic encryption. IEEE Access 7, 96900\u201396911 (2019)","journal-title":"IEEE Access"},{"key":"8_CR211","doi-asserted-by":"publisher","first-page":"96900","DOI":"10.1109\/ACCESS.2019.2929298","volume":"7","author":"Y Yang","year":"2019","unstructured":"Yang, Y., Xiao, X., Cai, X., Zhang, W.: A secure and high visual-quality framework for medical images by contrast-enhancement reversible data hiding and homomorphic encryption. IEEE Access 7, 96900\u201396911 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2929298","journal-title":"IEEE Access"},{"key":"8_CR212","doi-asserted-by":"publisher","first-page":"104123","DOI":"10.1016\/j.ijmedinf.2020.104123","volume":"138","author":"T Yesmin","year":"2020","unstructured":"Yesmin, T., Carter, M.W.: Evaluation framework for automatic privacy auditing tools for hospital data breach detections: a case study. Int. J. Med. Inf. 138, 104123 (2020)","journal-title":"Int. J. Med. Inf."},{"key":"8_CR213","doi-asserted-by":"publisher","unstructured":"Zatout, Y., Campo, E., Llibre, J.F.: Toward hybrid WSN architectures for monitoring people at home, pp. 308\u2013314 (2009). https:\/\/doi.org\/10.1145\/1643823.1643880","DOI":"10.1145\/1643823.1643880"},{"issue":"7","key":"8_CR214","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1002\/acm2.12886","volume":"21","author":"B Zhang","year":"2020","unstructured":"Zhang, B., Chen, S., Nichols, E., D\u2019Souza, W., Prado, K., Yi, B.: A practical cyberattack contingency plan for radiation oncology. J. Appl. Clin. Med. Phys. 21(7), 181\u2013186 (2020)","journal-title":"J. Appl. Clin. Med. Phys."}],"container-title":["Lecture Notes in Computer Science","Socio-Technical Aspects in Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-10183-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,29]],"date-time":"2024-09-29T01:53:45Z","timestamp":1727574825000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-10183-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031101823","9783031101830"],"references-count":214,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-10183-0_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"14 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"STAST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Socio-Technical Aspects in Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"stast2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/stast.uni.lu\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}