{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T11:23:36Z","timestamp":1774610616398,"version":"3.50.1"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031613784","type":"print"},{"value":"9783031613791","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-61379-1_10","type":"book-chapter","created":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T01:06:11Z","timestamp":1717203971000},"page":"138-158","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["BYOD Security Practices in Australian Hospitals \u2013 A Qualitative Study"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9884-0563","authenticated-orcid":false,"given":"Tafheem Ahmad","family":"Wani","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6903-1169","authenticated-orcid":false,"given":"Antonette","family":"Mendoza","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1616-2170","authenticated-orcid":false,"given":"Kathleen","family":"Gray","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,1]]},"reference":[{"key":"10_CR1","unstructured":"Luk, G.: Mobile Workforce Reports. Strategy Analytics (2018)"},{"key":"10_CR2","doi-asserted-by":"publisher","first-page":"327","DOI":"10.2345\/0899-8205-48.5.327","volume":"48","author":"J Williams","year":"2014","unstructured":"Williams, J.: Left to their own devices how healthcare organizations are tackling the BYOD trend. Biomed. Instrum. Technol. 48, 327 (2014)","journal-title":"Biomed. Instrum. Technol."},{"key":"10_CR3","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.3528","volume":"16","author":"KA Armstrong","year":"2014","unstructured":"Armstrong, K.A., Semple, J.L., Coyte, P.C.: Replacing ambulatory surgical follow-up visits with mobile app home monitoring: modeling cost-effective scenarios. J. Med. Internet Res. 16, e213 (2014). https:\/\/doi.org\/10.2196\/jmir.3528","journal-title":"J. Med. Internet Res."},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Nerminathan, A., Harrison, A., Phelps, M., Scott, K.M., Alexander, S.: Doctors\u2019 use of mobile devices in the clinical setting: a mixed methods study (2017)","DOI":"10.1111\/imj.13349"},{"key":"10_CR5","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1186\/s40814-020-00637-7","volume":"6","author":"M Moreau","year":"2020","unstructured":"Moreau, M., Par\u00e9, G.: Early clinical management of severe burn patients using telemedicine: a pilot study protocol. Pilot Feasibility Stud. 6, 93 (2020). https:\/\/doi.org\/10.1186\/s40814-020-00637-7","journal-title":"Pilot Feasibility Stud."},{"key":"10_CR6","doi-asserted-by":"publisher","DOI":"10.2196\/mhealth.3732","volume":"3","author":"B Schooley","year":"2015","unstructured":"Schooley, B., Nicolas-Rocca, T.S., Burkhard, R.: Patient-provider communications in outpatient clinic settings: a clinic-based evaluation of mobile device and multimedia mediated communications for patient education. JMIR Mhealth Uhealth 3, e2 (2015). https:\/\/doi.org\/10.2196\/mhealth.3732","journal-title":"JMIR Mhealth Uhealth"},{"key":"10_CR7","unstructured":"Davis, J.: Must-Have Telehealth, Remote Work Privacy and Security for COVID-19 (2020). https:\/\/healthitsecurity.com\/news\/must-have-telehealth-remote-work-privacy-and-security-for-covid-19"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Marshall, S.: IT consumerization: a case study of BYOD in a healthcare setting. Technol. Innov. Manag. Rev. 14 (2014)","DOI":"10.22215\/timreview771"},{"key":"10_CR9","unstructured":"Spannbauer, B.: How can healthcare organizations remedy their cybersecurity ailments? https:\/\/www.helpnetsecurity.com\/2019\/03\/11\/healthcare-organizations-cybersecurity\/. Accessed 09 Oct 2019"},{"key":"10_CR10","unstructured":"Verizon: 2023 Data Breach Investigations Report (2023)"},{"key":"10_CR11","doi-asserted-by":"publisher","unstructured":"Sansurooh, K., Williams, P.: BYOD in ehealth: herding cats and stable doors, or a catastrophe waiting to happen? In: Australian eHealth Informatics and Security Conference (2014). https:\/\/doi.org\/10.4225\/75\/5798284331b46","DOI":"10.4225\/75\/5798284331b46"},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1080\/15323269.2013.798768","volume":"13","author":"JE Moyer","year":"2013","unstructured":"Moyer, J.E.: Managing mobile devices in hospitals: a literature review of byod policies and usage. J. Hosp. Librariansh. 13, 197\u2013208 (2013). https:\/\/doi.org\/10.1080\/15323269.2013.798768","journal-title":"J. Hosp. Librariansh."},{"key":"10_CR13","doi-asserted-by":"publisher","unstructured":"Wani, T.A., Mendoza, A., Gray, K.: BYOD in hospitals-security issues and mitigation strategies. In: Proceedings of the Australasian Computer Science Week Multiconference on - ACSW 2019, pp. 25:1\u201325:10. ACM, New York (2019). https:\/\/doi.org\/10.1145\/3290688.3290729","DOI":"10.1145\/3290688.3290729"},{"key":"10_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102212","volume":"56","author":"Y Barlette","year":"2021","unstructured":"Barlette, Y., Jaouen, A., Baillette, P.: Bring your own device (BYOD) as reversed IT adoption: insights into managers\u2019 coping strategies. Int. J. Inf. Manag. 56, 102212 (2021). https:\/\/doi.org\/10.1016\/j.ijinfomgt.2020.102212","journal-title":"Int. J. Inf. Manag."},{"key":"10_CR15","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.ijinfomgt.2015.11.009","volume":"36","author":"ZA Soomro","year":"2016","unstructured":"Soomro, Z.A., Shah, M.H., Ahmed, J.: Information security management needs more holistic approach: a literature review. Int. J. Inf. Manag. 36, 215\u2013225 (2016). https:\/\/doi.org\/10.1016\/j.ijinfomgt.2015.11.009","journal-title":"Int. J. Inf. Manag."},{"key":"10_CR16","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.cose.2015.06.011","volume":"55","author":"N Zahadat","year":"2015","unstructured":"Zahadat, N., Blessner, P., Blackburn, T., Olson, B.A.: BYOD security engineering: a framework and its analysis. Comput. Secur. 55, 81\u201399 (2015). https:\/\/doi.org\/10.1016\/j.cose.2015.06.011","journal-title":"Comput. Secur."},{"key":"10_CR17","doi-asserted-by":"publisher","DOI":"10.2196\/18175","volume":"8","author":"TA Wani","year":"2020","unstructured":"Wani, T.A., Mendoza, A., Gray, K.: Hospital bring-your-own-device security challenges and solutions: systematic review of gray literature. JMIR Mhealth Uhealth 8, e18175 (2020). https:\/\/doi.org\/10.2196\/18175","journal-title":"JMIR Mhealth Uhealth"},{"key":"10_CR18","doi-asserted-by":"publisher","unstructured":"Wani, T.A., Mendoza, A., Gray, K., Smolenaers, F.: Status of bring-your-own-device (BYOD) security practices in Australian hospitals \u2013 a national survey. Health Policy Technol., 100627 (2022). https:\/\/doi.org\/10.1016\/j.hlpt.2022.100627","DOI":"10.1016\/j.hlpt.2022.100627"},{"key":"10_CR19","doi-asserted-by":"publisher","unstructured":"Wani, T.A., Mendoza, A., Gray, K.: Bring-your-own-device usage trends in Australian hospitals \u2013 a national survey. In: Healthier Lives, Digitally Enabled, pp. 1\u20136 (2021). https:\/\/doi.org\/10.3233\/SHTI210002","DOI":"10.3233\/SHTI210002"},{"key":"10_CR20","doi-asserted-by":"publisher","unstructured":"Fujs, D., Miheli\u010d, A., Vrhovec, S.L.R.: The power of interpretation: qualitative methods in cybersecurity research. In: Proceedings of the 14th International Conference on Availability, Reliability and Security, pp. 1\u201310. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3339252.3341479","DOI":"10.1145\/3339252.3341479"},{"key":"10_CR21","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/s10488-013-0528-y","volume":"42","author":"LA Palinkas","year":"2015","unstructured":"Palinkas, L.A., Horwitz, S.M., Green, C.A., Wisdom, J.P., Duan, N., Hoagwood, K.: Purposeful sampling for qualitative data collection and analysis in mixed method implementation research. Adm. Policy Ment. Health 42, 533\u2013544 (2015)","journal-title":"Adm. Policy Ment. Health"},{"key":"10_CR22","unstructured":"Baker, S.E., Edwards, R.: How many qualitative interviews is enough. NCRM (2012)"},{"key":"10_CR23","volume-title":"InterViews: Learning the Craft of Qualitative Research Interviewing","author":"S Brinkmann","year":"2015","unstructured":"Brinkmann, S., Kvale, S.: InterViews: Learning the Craft of Qualitative Research Interviewing. SAGE Publications, Thousand Oaks (2015)"},{"key":"10_CR24","doi-asserted-by":"publisher","first-page":"1893","DOI":"10.1007\/s11135-017-0574-8","volume":"52","author":"B Saunders","year":"2018","unstructured":"Saunders, B., et al.: Saturation in qualitative research: exploring its conceptualization and operationalization. Qual. Quant. 52, 1893\u20131907 (2018). https:\/\/doi.org\/10.1007\/s11135-017-0574-8","journal-title":"Qual. Quant."},{"key":"10_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1201\/1086\/43315.10.5.20011101\/31719.6","volume":"10","author":"S Schlarman","year":"2006","unstructured":"Schlarman, S.: The people, policy, technology (PPT) model: core elements of the security process. Inf. Syst. Secur. 10, 1\u20136 (2006). https:\/\/doi.org\/10.1201\/1086\/43315.10.5.20011101\/31719.6","journal-title":"Inf. Syst. Secur."},{"key":"10_CR26","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1186\/1471-2288-13-117","volume":"13","author":"NK Gale","year":"2013","unstructured":"Gale, N.K., Heath, G., Cameron, E., Rashid, S., Redwood, S.: Using the framework method for the analysis of qualitative data in multi-disciplinary health research. BMC Med. Res. Methodol. 13, 117 (2013). https:\/\/doi.org\/10.1186\/1471-2288-13-117","journal-title":"BMC Med. Res. Methodol."},{"key":"10_CR27","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1093\/intqhc\/mzm042","volume":"19","author":"A Tong","year":"2007","unstructured":"Tong, A., Sainsbury, P., Craig, J.: Consolidated criteria for reporting qualitative research (COREQ): a 32-item checklist for interviews and focus groups. Int. J. Qual. Health Care 19, 349\u2013357 (2007). https:\/\/doi.org\/10.1093\/intqhc\/mzm042","journal-title":"Int. J. Qual. Health Care"},{"key":"10_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2022.104839","volume":"165","author":"TA Wani","year":"2022","unstructured":"Wani, T.A., Mendoza, A., Gray, K., Smolenaers, F.: BYOD usage and security behaviour of hospital clinical staff: an Australian survey. Int. J. Med. Inform. 165, 104839 (2022). https:\/\/doi.org\/10.1016\/j.ijmedinf.2022.104839","journal-title":"Int. J. Med. Inform."}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-61379-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T01:57:26Z","timestamp":1717207046000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-61379-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031613784","9783031613791"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-61379-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"1 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Washington DC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2024.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}