{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T04:13:09Z","timestamp":1749701589629,"version":"3.41.0"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031928390","type":"print"},{"value":"9783031928406","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-92840-6_15","type":"book-chapter","created":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T16:48:25Z","timestamp":1749660505000},"page":"263-292","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Assessing BYOD Security Maturity: A Survey of Australian Hospitals"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9884-0563","authenticated-orcid":false,"given":"Tafheem Ahmad","family":"Wani","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6903-1169","authenticated-orcid":false,"given":"Antonette","family":"Mendoza","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1616-2170","authenticated-orcid":false,"given":"Kathleen","family":"Gray","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,12]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","first-page":"327","DOI":"10.2345\/0899-8205-48.5.327","volume":"48","author":"J Williams","year":"2014","unstructured":"Williams, J.: Left to their own devices how healthcare organizations are tackling the BYOD trend. Biomed. Instrum. Technol. 48, 327 (2014)","journal-title":"Biomed. Instrum. Technol."},{"key":"15_CR2","unstructured":"Luk, G.: Mobile Workforce Reports. Strategy Analytics (2018)"},{"key":"15_CR3","unstructured":"Davis, J.: Must-Have Telehealth, Remote Work Privacy and Security for COVID-19 (2020). https:\/\/healthitsecurity.com\/news\/must-have-telehealth-remote-work-privacy-and-security-for-covid-19"},{"key":"15_CR4","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.3528","volume":"16","author":"KA Armstrong","year":"2014","unstructured":"Armstrong, K.A., Semple, J.L., Coyte, P.C.: Replacing ambulatory surgical follow-up visits with mobile app home monitoring: modeling cost-effective scenarios. J. Med. Internet Res. 16, e213 (2014). https:\/\/doi.org\/10.2196\/jmir.3528","journal-title":"J. Med. Internet Res."},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Nerminathan, A., Harrison, A., Phelps, M., Scott, K.M., Alexander, S.: Doctors\u2019 use of mobile devices in the clinical setting: a mixed methods study (2017)","DOI":"10.1111\/imj.13349"},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1186\/s40814-020-00637-7","volume":"6","author":"M Moreau","year":"2020","unstructured":"Moreau, M., Par\u00e9, G.: Early clinical management of severe burn patients using telemedicine: a pilot study protocol. Pilot Feasibility Studies. 6, 93 (2020). https:\/\/doi.org\/10.1186\/s40814-020-00637-7","journal-title":"Pilot Feasibility Studies."},{"key":"15_CR7","doi-asserted-by":"publisher","DOI":"10.2196\/mhealth.3732","volume":"3","author":"B Schooley","year":"2015","unstructured":"Schooley, B., Nicolas-Rocca, T.S., Burkhard, R.: Patient-provider communications in outpatient clinic settings: a clinic-based evaluation of mobile device and multimedia mediated communications for patient education. JMIR Mhealth Uhealth 3, e2 (2015). https:\/\/doi.org\/10.2196\/mhealth.3732","journal-title":"JMIR Mhealth Uhealth"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Marshall, S.: IT consumerization: a case study of BYOD in a healthcare setting. Technology innovation management review, vol. 14 (2014)","DOI":"10.22215\/timreview\/771"},{"key":"15_CR9","unstructured":"Spannbauer, B.: How can healthcare organizations remedy their cybersecurity ailments? https:\/\/www.helpnetsecurity.com\/2019\/03\/11\/healthcare-organizations-cybersecurity\/. Accessed 10 Sept 2019"},{"key":"15_CR10","unstructured":"Verizon: 2023 Data Breach Investigations Report (2023)"},{"key":"15_CR11","doi-asserted-by":"publisher","unstructured":"Sansurooh, K., Williams, P.: BYOD in e-health: herding cats and stable doors, or a catastrophe waiting to happen? In: Australian eHealth Informatics and Security Conference (2014). https:\/\/doi.org\/10.4225\/75\/5798284331b46","DOI":"10.4225\/75\/5798284331b46"},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1080\/15323269.2013.798768","volume":"13","author":"JE Moyer","year":"2013","unstructured":"Moyer, J.E.: Managing mobile devices in hospitals: a literature review of BYOD policies and usage. J. Hosp. Librariansh. 13, 197\u2013208 (2013). https:\/\/doi.org\/10.1080\/15323269.2013.798768","journal-title":"J. Hosp. Librariansh."},{"key":"15_CR13","doi-asserted-by":"publisher","unstructured":"Wani, T.A., Mendoza, A., Gray, K.: BYOD in hospitals-security issues and mitigation strategies. Presented at the Proceedings of the Australasian Computer Science Week Multiconference on - ACSW 2019 (2019). https:\/\/doi.org\/10.1145\/3290688.3290729","DOI":"10.1145\/3290688.3290729"},{"key":"15_CR14","unstructured":"Akinsanya, O.O., Papadaki, M., Sun, L.: Current cybersecurity maturity models: how effective in healthcare cloud? (2019)"},{"key":"15_CR15","doi-asserted-by":"publisher","unstructured":"Le, N.T., Hoang, D.B.: Capability maturity model and metrics framework for cyber cloud security. Scalable Comput. Pract. Exp. 18, 277\u2013290 (2017). https:\/\/doi.org\/10.12694\/scpe.v18i4.1329","DOI":"10.12694\/scpe.v18i4.1329"},{"key":"15_CR16","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.eij.2020.08.001","volume":"22","author":"OMM Al-Matari","year":"2021","unstructured":"Al-Matari, O.M.M., Helal, I.M.A., Mazen, S.A., Elhennawy, S.: Adopting security maturity model to the organizations\u2019 capability model. Egypt. Inf. J. 22, 193\u2013199 (2021). https:\/\/doi.org\/10.1016\/j.eij.2020.08.001","journal-title":"Egypt. Inf. J."},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Bowen, P., Kissel, R.: Program Review for Information Security Management Assistance (PRISMA). NIST (2007)","DOI":"10.6028\/NIST.IR.7358"},{"key":"15_CR18","unstructured":"Mohammed, I., Bade, A.M.: Cybersecurity capability maturity model for network system. Int. J. Dev. Res. (IJDR) 09 (2019)"},{"key":"15_CR19","first-page":"171","volume":"45","author":"MC Davis","year":"2014","unstructured":"Davis, M.C., Challenger, R., Jayewardene, D., Clegg, C.W.: Advancing socio-technical systems thinking: a call for bravery. Appl. Ergon. Hum. Fac. Technol. Soc. 45, 171\u2013180 (2014)","journal-title":"Appl. Ergon. Hum. Fac. Technol. Soc."},{"key":"15_CR20","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-03-2018-0031","author":"M Malatji","year":"2019","unstructured":"Malatji, M., Solms, S.V., Marnewick, A.: Socio-technical systems cybersecurity framework. Inf. Comput. Secur. (2019). https:\/\/doi.org\/10.1108\/ICS-03-2018-0031","journal-title":"Inf. Comput. Secur."},{"key":"15_CR21","doi-asserted-by":"publisher","unstructured":"Sabbagh, B.A., Kowalski, S.: ST(CS)2 - featuring socio-technical cyber security warning systems. In: Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), pp. 312\u2013316 (2012). https:\/\/doi.org\/10.1109\/CyberSec.2012.6246110","DOI":"10.1109\/CyberSec.2012.6246110"},{"key":"15_CR22","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.ijinfomgt.2015.11.009","volume":"36","author":"ZA Soomro","year":"2016","unstructured":"Soomro, Z.A., Shah, M.H., Ahmed, J.: Information security management needs more holistic approach: a literature review. Int. J. Inf. Manage. 36, 215\u2013225 (2016). https:\/\/doi.org\/10.1016\/j.ijinfomgt.2015.11.009","journal-title":"Int. J. Inf. Manage."},{"key":"15_CR23","doi-asserted-by":"publisher","first-page":"i50","DOI":"10.1136\/qshc.2005.015842","volume":"15","author":"P Carayon","year":"2006","unstructured":"Carayon, P., et al.: Work system design for patient safety: the SEIPS model. Qual. Saf. Health Care 15, i50\u2013i58 (2006). https:\/\/doi.org\/10.1136\/qshc.2005.015842","journal-title":"Qual. Saf. Health Care"},{"key":"15_CR24","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1197\/jamia.M2384","volume":"14","author":"MI Harrison","year":"2007","unstructured":"Harrison, M.I., Koppel, R., Bar-Lev, S.: Unintended consequences of information technologies in health care\u2014an interactive sociotechnical analysis. J. Am. Med. Inform. Assoc. 14, 542\u2013549 (2007). https:\/\/doi.org\/10.1197\/jamia.M2384","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"15_CR25","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1136\/bmj.316.7138.1154","volume":"316","author":"C Vincent","year":"1998","unstructured":"Vincent, C., Taylor-Adams, S., Stanhope, N.: Framework for analysing risk and safety in clinical medicine. BMJ 316, 1154\u20131157 (1998)","journal-title":"BMJ"},{"key":"15_CR26","doi-asserted-by":"publisher","unstructured":"Sittig, D.F., Singh, H.: A new socio-technical model for studying health information technology in complex adaptive healthcare systems. In: Patel, V.L., Kannampallil, T.G., Kaufman, D.R. (eds.) Cognitive Informatics for Biomedicine: Human Computer Interaction in Healthcare, pp. 59\u201380. Springer International Publishing, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-17272-9_4","DOI":"10.1007\/978-3-319-17272-9_4"},{"key":"15_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1201\/1086\/43315.10.5.20011101\/31719.6","volume":"10","author":"S Schlarman","year":"2006","unstructured":"Schlarman, S.: The people, policy, technology (PPT) model: core elements of the security process. Inf. Syst. Secur. 10, 1\u20136 (2006). https:\/\/doi.org\/10.1201\/1086\/43315.10.5.20011101\/31719.6","journal-title":"Inf. Syst. Secur."},{"key":"15_CR28","doi-asserted-by":"publisher","unstructured":"Burns, A.J., Johnson, M.E.: Securing health information. IT Prof. 23 (2015). https:\/\/doi.org\/10.1109\/MITP.2015.13","DOI":"10.1109\/MITP.2015.13"},{"key":"15_CR29","doi-asserted-by":"publisher","DOI":"10.2196\/18175","volume":"8","author":"TA Wani","year":"2020","unstructured":"Wani, T.A., Mendoza, A., Gray, K.: Hospital bring-your-own-device security challenges and solutions: systematic review of gray literature. JMIR Mhealth Uhealth 8, e18175 (2020). https:\/\/doi.org\/10.2196\/18175","journal-title":"JMIR Mhealth Uhealth"},{"key":"15_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2024.105606","volume":"192","author":"TA Wani","year":"2024","unstructured":"Wani, T.A., Mendoza, A., Gray, K.: BYOD security behaviour and preferences among hospital clinicians \u2013 a qualitative study. Int. J. Med. Inf. 192, 105606 (2024). https:\/\/doi.org\/10.1016\/j.ijmedinf.2024.105606","journal-title":"Int. J. Med. Inf."},{"key":"15_CR31","doi-asserted-by":"publisher","unstructured":"Fernandez-Aleman, J.L., Belen Sanchez Garcia, A., Garcia-Mateos, G., Toval, A.: Technical solutions for mitigating security threats caused by health professionals in clinical settings. In: Annual International Conference of the IEEE Engineering in Medicine and Biology Society 2015, pp. 1389\u20131392 (2015). https:\/\/doi.org\/10.1109\/EMBC.2015.7318628","DOI":"10.1109\/EMBC.2015.7318628"},{"key":"15_CR32","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.ijinfomgt.2018.10.017","volume":"45","author":"L Li","year":"2019","unstructured":"Li, L., He, W., Xu, L., Ash, I., Anwar, M., Yuan, X.: Investigating the impact of cybersecurity policy awareness on employees\u2019 cybersecurity behavior. Int. J. Inf. Manage. 45, 13\u201324 (2019). https:\/\/doi.org\/10.1016\/j.ijinfomgt.2018.10.017","journal-title":"Int. J. Inf. Manage."}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-92840-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T16:48:30Z","timestamp":1749660510000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-92840-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031928390","9783031928406"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-92840-6_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"12 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"None declared.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gothenburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}