{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T20:31:30Z","timestamp":1773433890580,"version":"3.50.1"},"reference-count":78,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2020,4,2]],"date-time":"2020-04-02T00:00:00Z","timestamp":1585785600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,2]],"date-time":"2020-04-02T00:00:00Z","timestamp":1585785600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1007\/s10916-019-1507-y","type":"journal-article","created":{"date-parts":[[2020,4,2]],"date-time":"2020-04-02T01:02:31Z","timestamp":1585789351000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":110,"title":["Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations"],"prefix":"10.1007","volume":"44","author":[{"given":"Soumitra Sudip","family":"Bhuyan","sequence":"first","affiliation":[]},{"given":"Umar Y","family":"Kabir","sequence":"additional","affiliation":[]},{"given":"Jessica M.","family":"Escareno","sequence":"additional","affiliation":[]},{"given":"Kenya","family":"Ector","sequence":"additional","affiliation":[]},{"given":"Sandeep","family":"Palakodeti","sequence":"additional","affiliation":[]},{"given":"David","family":"Wyant","sequence":"additional","affiliation":[]},{"given":"Sajeesh","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Marian","family":"Levy","sequence":"additional","affiliation":[]},{"given":"Satish","family":"Kedia","sequence":"additional","affiliation":[]},{"given":"Dipankar","family":"Dasgupta","sequence":"additional","affiliation":[]},{"given":"Aram","family":"Dobalian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,2]]},"reference":[{"key":"1507_CR1","unstructured":"HealthIT (2018). Benefits of Electronic Health Records (EHRs). Retrieved from https:\/\/www.healthit.gov\/providers-professionals\/benefits-electronic-health-records-ehrs"},{"key":"1507_CR2","unstructured":"American Hospital Association (n.d.). Cybersecurity; Cybersecurity vulnerabilities and intrusions pose risks for every hospital, and its reputation. Retrieved from https:\/\/www.aha.org\/advocacy\/leveraging-technology\/cybersecurity"},{"key":"1507_CR3","unstructured":"Department of Health and Human Services (2013). Summary of the HIPAA privacy rule. Retrieved from https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/."},{"issue":"5","key":"1507_CR4","first-page":"390","volume":"15","author":"M Uma","year":"2013","unstructured":"Uma, M., & Padmavathi, G. (2013). A Survey on Various Cyber Attacks and their Classification. International journal of Network Security, 15(5), 390\u2013396.","journal-title":"International journal of Network Security"},{"key":"1507_CR5","unstructured":"Filkins, B. (2014). Health Care Cyberthreat report: Widespread compromises detected, compliance nightmare on horizon. SANS Norse. Retrieved from https:\/\/www.sans.org\/reading-room\/whitepapers\/analyst\/health-care-cyberthreat-report-widespread-compromises-detected-compliance-nightmare-horizon-34735"},{"key":"1507_CR6","unstructured":"Berger, D. W. (2016). Breach Report 2015: Protected health information (PHI). Redspin. Retrieved from https:\/\/www.redspin.com\/resources\/download\/breach-report-2015-protected-health-information-phi\/"},{"key":"1507_CR7","unstructured":"McCue, A. (2008). Beware the insider security threat, CIO jury. Retrieved from http:\/\/www.silicon.com\/management\/cio-insights\/2008\/04\/17\/bewaretheinsider-security-threat-39188671\/"},{"issue":"5","key":"1507_CR8","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1056\/NEJMp1404358","volume":"371","author":"ED Perakslis","year":"2014","unstructured":"Perakslis, E. D. (2014). Cybersecurity in health care. N Engl J Med, 371(5), 395\u2013397. Retrieved from https:\/\/pdfs.semanticscholar.org\/286f\/f60b6740da758bb47340d83ca409c72fc906.pdf","journal-title":"N Engl J Med"},{"key":"1507_CR9","unstructured":"Akpan, A. (2016). Has health care hacking become an epidemic? The Public Broadcasting Service. Retrieved from https:\/\/www.pbs.org\/newshour\/science\/has-health-care-hacking-become-an-epidemic"},{"key":"1507_CR10","unstructured":"Chicago Tribune (2017). Homeland Security warns that certain heart devices can be hacked. Retrieved from http:\/\/www.chicagotribune.com\/lifestyles\/health\/ct-cybersecurity-flaw-in-heart-devices-20170111-story.html"},{"issue":"2","key":"1507_CR11","doi-asserted-by":"publisher","DOI":"10.2196\/12644","volume":"21","author":"MS Jalali","year":"2019","unstructured":"Jalali, M. S., Razak, S., Gordon, W., Perakslis, E., & Madnick, S. (2019). Health care and cybersecurity: bibliometric analysis of the literature. Journal of medical Internet research, 21(2), e12644.","journal-title":"Journal of medical Internet research"},{"key":"1507_CR12","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1016\/j.procs.2014.05.452","volume":"32","author":"M Jouini","year":"2014","unstructured":"Jouini, M., Rabai, L. B. A., & Aissa, A. B. (2014). Classification of security threats in information systems. Procedia Computer Science, 32, 489\u2013496.","journal-title":"Procedia Computer Science"},{"key":"1507_CR13","unstructured":"Unite States Computer Emergency Readiness Team (2009). Security Tips (ST04\u2013015): Understanding Denial-of-Service Attacks. Retrieved from https:\/\/www.us-cert.gov\/ncas\/tips\/ST04-015"},{"issue":"5","key":"1507_CR14","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1056\/NEJMp1407326","volume":"371","author":"DJ Nigrin","year":"2014","unstructured":"Nigrin, D. J. (2014). When \u201cHacktivists\u201d Target Your Hospital. New England Journal of Medicine 371(5), 393\u2013395. Retrieved from https:\/\/doi.org\/10.1056\/NEJMp1407326","journal-title":"New England Journal of Medicine"},{"key":"1507_CR15","unstructured":"Long, M.C. (2016). Attack and Defend: Linux privilege escalation techniques in 2016. The SANS Institute. Retrieved from https:\/\/www.sans.org\/reading-room\/whitepapers\/testing\/attack-defend-linux-privilege-escalation-techniques-2016-37562"},{"key":"1507_CR16","unstructured":"Piscitello, D. (2016). What is Privilege Escalation? Retrieved from https:\/\/www.icann.org\/news\/blog\/what-is-privilege-escalation"},{"key":"1507_CR17","unstructured":"Lab, K. (n.d.). Man in the Middle Attack -Kaspersky Daily. Retrieved from https:\/\/www.kaspersky.com\/blog\/man-in-the-middle-attack\/1613\/"},{"key":"1507_CR18","unstructured":"Cain, C. (2014). Analyzing Man-in-the-Browser (MITB) Attacks. SANS Institute. https:\/\/www.sans.org\/reading-room\/whitepapers\/forensics\/analyzing-man-in-the-browser-mitb-attacks-35687"},{"issue":"1","key":"1507_CR19","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s10278-016-9913-x","volume":"30","author":"G Langer","year":"2017","unstructured":"Langer, G. (2017). Cybersecurity Issues in Healthcare Information Technology. J Digit Imaging 30(1):117\u2013125. doi: https:\/\/doi.org\/10.1007\/s10278-016-9913-x","journal-title":"J Digit Imaging"},{"key":"1507_CR20","unstructured":"Encyclopedia Britannica (n.d.). Cryptography. Encyclopedia Britannica online. Retrieved from https:\/\/www.britannica.com\/topic\/cryptography"},{"key":"1507_CR21","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1126\/science.343.6170.482","volume":"343","author":"A Cho","year":"2014","unstructured":"Cho, A. (2014). Quantum spy games. Science, 343, 482\u2013283. DOI:https:\/\/doi.org\/10.1126\/science.343.6170.482","journal-title":"Science"},{"key":"1507_CR22","doi-asserted-by":"publisher","first-page":"305","DOI":"10.2147\/MDER.S50048","volume":"8","author":"PA Williams","year":"2015","unstructured":"Williams, P. A., & Woodward, A. J. (2015). Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem. Medical Devices (Auckland, N.Z.), 8, 305\u2013316 https:\/\/doi.org\/10.2147\/MDER.S50048","journal-title":"Medical Devices (Auckland, N.Z.)"},{"key":"1507_CR23","unstructured":"Unite States Computer Emergency Readiness Team (2015). Vulnerability Note VU#630239: Epiphany cardio server is vulnerable to SQL and LDAP injection. Retrieved from https:\/\/www.kb.cert.org\/vuls\/id\/630239"},{"key":"1507_CR24","unstructured":"Federal Trade Commission (2015). Consumer Information; Malware. Retrieved from https:\/\/www.consumer.ftc.gov\/articles\/0011-malware"},{"key":"1507_CR25","unstructured":"Cisco Systems, Inc. (n.d.). What Is the Difference: Viruses, Worms, Trojans, and Bots? Retrieved from https:\/\/www.cisco.com\/c\/en\/us\/about\/security-center\/virus-differences.html"},{"key":"1507_CR26","unstructured":"Virus. (n.d.). In Merriam-Webster\u2019s dictionary. Retrieved from https:\/\/www.merriam-webster.com\/dictionary\/virus"},{"key":"1507_CR27","unstructured":"HealthITSecurity (2017). NY Computer Virus Raises Healthcare Data Security Concerns. Retrieved from https:\/\/healthitsecurity.com\/news\/erie-county-medical-center-continues-four-day-battle-with-virus"},{"key":"1507_CR28","unstructured":"Symantec (2016). What is the difference between viruses, worms, and Trojans? Retrieved from https:\/\/support.symantec.com\/en_US\/article.TECH98539.html"},{"key":"1507_CR29","unstructured":"Davis, J. (2017). Alaska DHSS facing potential breach after two Trojan malware attacks. Retrieved from http:\/\/www.healthcareitnews.com\/news\/alaska-dhss-facing-potential-breach-after-two-trojan-malware-attacks"},{"key":"1507_CR30","unstructured":"Spyware. (n.d.). In Merriam-Webster\u2019s dictionary. Retrieved from https:\/\/www.merriam-webster.com\/dictionary\/spyware"},{"key":"1507_CR31","unstructured":"Unite States Computer Emergency Readiness Team (2009). Security Tip (ST04\u2013016): Recognizing and avoiding spyware. Retrieved from https:\/\/www.us-cert.gov\/ncas\/tips\/ST04-016"},{"key":"1507_CR32","doi-asserted-by":"publisher","unstructured":"National Institute of Standards and Technology (NIST) (2013). Glossary of key information security terms. doi: https:\/\/doi.org\/10.6028\/NIST.IR.729r2. Retrieved from https:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf","DOI":"10.6028\/NIST.IR.729r2"},{"key":"1507_CR33","first-page":"02","volume":"05","author":"R Sharma","year":"2018","unstructured":"Sharma, R. & Purohit, M. (2018). Emerging Cyber Threats and the Challenges Associated with them. International Research Journal of Engineering and Technology (IRJET) 05, 02. Retrieved from https:\/\/www.irjet.net\/archives\/V5\/i2\/IRJET-V5I2127.pdf","journal-title":"International Research Journal of Engineering and Technology (IRJET)"},{"key":"1507_CR34","doi-asserted-by":"publisher","unstructured":"Ehrenfeld, J. M. (2017). WannaCry, Cybersecurity and Health Information Technology: A time to act. Journal of Medical Systems, 41(7), 104. Retrieved from https:\/\/doi.org\/10.1007\/s10916-017-0752-1","DOI":"10.1007\/s10916-017-0752-1"},{"key":"1507_CR35","unstructured":"US-CERT (n.d.). Incident Reporting System. Retrieved from https:\/\/www.us-cert.gov\/report-phishing"},{"key":"1507_CR36","volume-title":"SANS Institute","author":"R Hummel","year":"2017","unstructured":"Hummel, R. (2017). Securing Against the Most Common Vectors of Cyber Attacks. SANS Institute. Retrieved from https:\/\/www.sans.org\/reading-room\/whitepapers\/riskmanagement\/securing-common-vectors-cyber-attacks-37995"},{"key":"1507_CR37","unstructured":"The Federal Bureau of Investigation (2009). Spear Phishing. Retrieved from https:\/\/www.fbi.gov\/news\/stories\/2009\/april\/spearphishing_040109"},{"key":"1507_CR38","unstructured":"Davis, J. (2017). Hackers breach New York\u2019s largest provider with phishing attacks. Retrieved from http:\/\/www.healthcareitnews.com\/news\/hackers-breach-new-yorks-largest-provider-phishing-attacks)"},{"key":"1507_CR39","unstructured":"Hacker. (2016). In Butterfield, A., & Ngondi, G.(Eds.), A Dictionary of Computer Science. : Oxford University Press. Retrieved from http:\/\/www.oxfordreference.com\/view\/10.1093\/acref\/9780199688975.001.0001\/acref-9780199688975-e-2283."},{"key":"1507_CR40","unstructured":"Ethical hacker (2010). In Stevenson, A., & Lindberg, C.(Eds.), New Oxford American Dictionary. : Oxford University Press. Retrieved http:\/\/www.oxfordreference.com\/view\/10.1093\/acref\/9780195392883.001.0001\/m_en_us1444244."},{"key":"1507_CR41","volume-title":"Congressional Research Service","author":"EA Fischer","year":"2016","unstructured":"Fischer, E. A. (2016). Cybersecurity Issues and Challenges: In Brief. Congressional Research Service. Retrieved from https:\/\/pdfs.semanticscholar.org\/65e3\/4c9bb7330fcfec378394b5d308b6a323947d.pdf"},{"key":"1507_CR42","volume-title":"Data Exchange Agency Ministry of Justice of Georgia","author":"N Goderdzishvili","year":"2010","unstructured":"Goderdzishvili, N. (2010). Legal Assessment of Cyber Attacks on Georgia, Data Exchange Agency Ministry of Justice of Georgia. Retrieved from https:\/\/pdfs.semanticscholar.org\/ba7b\/234738e80b027240e9bfd837bfba61c13e17.pdf"},{"key":"1507_CR43","unstructured":"Winkler, I. & Hayden, L. (2005). Social engineering through human intelligence. The Information Systems Security Association Journal 6\u20138"},{"key":"1507_CR44","unstructured":"Baker, W., Goudie, M., Hutton, A., Hylender, C. D., Niemantsverdriet, J., Novak, C., \u2026 Tippett, P (2010). 2010 Data Breach Investigation Report: A study conducted by the Verizon RISK Team in cooperation with the United States Secret Service. Retrieved from http:\/\/www.verizonenterprise.com\/resources\/reports\/rp_2010-data-breach-report_en_xg.pdf"},{"key":"1507_CR45","unstructured":"American National Standards Institute (2012). The financial impact of breached protected health information: A Business Case for Enhanced PHI Security. Retrieved from https:\/\/webstore.ansi.org\/phi\/"},{"key":"1507_CR46","doi-asserted-by":"crossref","unstructured":"Camp, L. J. (2011). Reconceptualizing the role of security user. Daedalus, 140(4), 93\u2013107. Retrieved from https:\/\/www.mitpressjournals.org\/doi\/abs\/10.1162\/DAED_a_00117","DOI":"10.1162\/DAED_a_00117"},{"key":"1507_CR47","volume-title":"SANS Institute","author":"B Filkins","year":"2014","unstructured":"Filkins, B. (2014). New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. SANS Institute. Retrieved from https:\/\/www.sans.org\/reading-room\/whitepapers\/analyst\/threats-drive-improved-practices-state-cybersecurity-health-care-organizations-35652"},{"key":"1507_CR48","unstructured":"Compliance Specialists Inc. [CSeye] (2015). 5 Mistakes in Training the Workforce on Healthcare Privacy and Security. Retrieved from http:\/\/www.cseye.biz\/single-post\/2015\/06\/08\/Title-of-Something-That-Happened-Place-Holder?request_appointment=1"},{"key":"1507_CR49","unstructured":"Evans, M.,Maglaras, L. A., He, Y. & Janickle, H. (n.d.). Human Behaviour as an aspect of Cyber Security Assurance. Retrieved from https:\/\/arxiv.org\/ftp\/arxiv\/papers\/1601\/1601.03921.pdf"},{"key":"1507_CR50","unstructured":"SANS Institute (2014). Cybersecurity Professional Trends: A SANS Survey. Retrieved from https:\/\/www.sans.org\/reading-room\/whitepapers\/analyst\/cybersecurity-professional-trends-survey-34615"},{"key":"1507_CR51","unstructured":"U.S. Bureau of Labor Statistics (2018). Information Security Analysts : Occupational Outlook Handbook. Retrieved from https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm"},{"key":"1507_CR52","volume-title":"Low pay hinders healthcare's hunt for cyber cops. Modern Healthcare","author":"J Conn","year":"2017","unstructured":"Conn, J (2017). Low pay hinders healthcare's hunt for cyber cops. Modern Healthcare. Retrieved from http:\/\/www.modernhealthcare.com\/article\/20170121\/MAGAZINE\/301219984"},{"key":"1507_CR53","unstructured":"National Institute of Standards and Technology [NIST] (2017). Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1. Retrieved from https:\/\/www.nist.gov\/cyberframework\/draft-version-11"},{"key":"1507_CR54","unstructured":"Zorabedian, J. (2014). How malware works: Anatomy of drive-by download web attack. Retrieved from https:\/\/news.sophos.com\/en-us\/2014\/03\/26\/how-malware-works-anatomy-of-a-drive-by-download-web-attack-infographic\/"},{"key":"1507_CR55","doi-asserted-by":"publisher","unstructured":"Rowe, D. C., Lunt, B. M. & Ekstrom, J. J. (2011). The Role of Cyber-Security in Information Technology Education. SIGITE\u201911, West Point, New York, USA. DoI:https:\/\/doi.org\/10.1145\/2047594.2047628","DOI":"10.1145\/2047594.2047628"},{"key":"1507_CR56","unstructured":"US Department OF Homeland Security (n.d.). Software Assurance. Retrieved from https:\/\/www.us-cert.gov\/sites\/default\/files\/publications\/infosheet_SoftwareAssurance.pdf"},{"key":"1507_CR57","unstructured":"New Jersey Cybersecurity and Communications Integration Cell (2017). WannaCry. Retrieved from https:\/\/www.cyber.nj.gov\/threat-profiles\/ransomware-variants\/wannacry"},{"key":"1507_CR58","unstructured":"National Institute of Standard (n.d.). NVD - NVD Dashboard. Retrieved from https:\/\/nvd.nist.gov\/general\/nvd-dashboard"},{"key":"1507_CR59","unstructured":"Morgan, S. (2015). Is Poor Software Development the Biggest Cyber Threat? Retrieved from https:\/\/www.csoonline.com\/article\/2978858\/application-security\/is-poor-software-development-the-biggest-cyber-threat.html"},{"key":"1507_CR60","unstructured":"Bird, J., Johnson, E., & Kim, F. (2015). 2015 State of Application Security: Closing the Gap. Retrieved from https:\/\/www.sans.org\/reading-room\/whitepapers\/analyst\/2015-state-application-security-closing-gap-35942"},{"key":"1507_CR61","unstructured":"Teto, J. K., Bearden, R. & Lo, D. C. (2017). The Impact of Defensive Programming on I\/O Cybersecurity Attacks retrieved from http:\/\/delivery.acm.org\/10.1145\/3080000\/3077571\/p102-teto.pdf?ip=141.225.16.235&id=3077571&acc=NO%20RULES&key=EDE12515F121C113%2E4D4702B0C3E38B35%2E4D4702B0C3E38B35%2E4D4702B0C3E38B35&__acm__=1521740112_a902a525895ff5c658edb3ccef9eb07e"},{"key":"1507_CR62","unstructured":"Mancilla, D., Moczygemba J., Fenton S & Biedermann, S. (2014). Chapter 11 Security for Health Information in Biedermann, S., & Fenton, S. H. (Eds.), Introduction to Healthcare Informatics. AHiMA."},{"key":"1507_CR63","first-page":"2017","volume":"13","author":"M Miliard","year":"2018","unstructured":"Miliard, M. (2018). How does blockchain actually work for healthcare? Healthcare IT News April 13, 2017 Retrieved from http:\/\/www.healthcareitnews.com\/author\/mike-miliard","journal-title":"Healthcare IT News April"},{"key":"1507_CR64","first-page":"2017","volume":"13","author":"M Miliard","year":"2018","unstructured":"Miliard, M. (2018). Blockchain faces tough roadblocks in healthcare. Healthcare IT News April 13, 2017. Retrieved from http:\/\/www.healthcareitnews.com\/author\/mike-miliard","journal-title":"Healthcare IT News April"},{"issue":"7","key":"1507_CR65","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/s10916-016-0533-2","volume":"40","author":"SS Bhuyan","year":"2016","unstructured":"Bhuyan, S. S., Bailey-DeLeeuw, S., Wyant, D. K., & Chang, C. F. (2016). Too Much or Too Little? How Much Control Should Patients Have Over EHR Data?. Journal of Medical Systems, 40(7), 174.","journal-title":"Journal of Medical Systems"},{"key":"1507_CR66","unstructured":"Schwalbe, K., & Furlong, D. (2013). Healthcare project management. Schwalbe Publishing."},{"key":"1507_CR67","unstructured":"Duncan, M., Rishel, W., Kleinberg, K., & Klein, J. (2001). A common sense approach to HIPAA. GartnerGroup. Retrieved from http:\/\/alecpalmer.tripod.com\/HTMLobj-211\/Gartner_Report.pdf"},{"key":"1507_CR68","unstructured":"Schneier, B. (2018). Schneier on Security. Retrieved from https:\/\/www.schneier.com\/books\/secrets_and_lies\/pref.html"},{"key":"1507_CR69","unstructured":"Caralli, R. A., Allen, J. H., & White, D. W. (2010). CERT Resilience Management Model: A Maturity Model for Managing Operational Resilience. Addison-Wesley Professional."},{"key":"1507_CR70","unstructured":"Pyke, G. (2013). Risk assessment and management. In McCormick, K. and Gugerty, G., (Ed.), Healthcare Information Technology. McGraw Hill pp 589\u2013610."},{"key":"1507_CR71","unstructured":"Carroll, R., & Norris, G. (2011). Chapter 1 enterprise risk management in healthcare - the basics in Roberta Carroll (Editor) risk management handbook for health care organizations, volume 1. John Wiley & Sons."},{"key":"1507_CR72","unstructured":"International Risk Management Institute (2018). Cyber and privacy insurance. Retrieved from https:\/\/www.irmi.com\/term\/insurance-definitions\/cyber-and-privacy"},{"key":"1507_CR73","unstructured":"Vaughan, E. J.,& Vaughan, T.M. (1995). Essentials of insurance: A risk management perspective. Wiley. pp 34\u201337. Retrieved from https:\/\/www.wiley.com\/en-us\/Essentials+of+Insurance%3A+A+Risk+Management+Perspective%2C+3rd+Edition-p-9780470128961"},{"key":"1507_CR74","unstructured":"Bensaou, M., & Earl, M. (1998). The right mind-set for managing information technology. Harvard Business Review, 76(5), 118\u201328"},{"key":"1507_CR75","unstructured":"Baker, D. (2015). Chapter 10 \u201cTrustworthy Systems for Safe and Private Healthcare\u201d in Saba, Virginia, and Kathleen McCormick (Eds). Essentials of nursing informatics second ed. McGraw Hill Professional."},{"key":"1507_CR76","unstructured":"American Hospital Association (2018). Top six actions to manage hospital cybersecurity risks. Retrieved from https:\/\/www.aha.org\/system\/files\/2017-12\/aha-cyber-top6.pdf"},{"key":"1507_CR77","unstructured":"National Institute of Standards and Technology (2018). Cybersecurity framework. Retrieved from https:\/\/www.nist.gov\/cyberframework"},{"key":"1507_CR78","unstructured":"Peretti K. & Burgess C. (2018). FDA issues final cybersecurity guidance October 10, 2014. Retrieved from https:\/\/www.alston.com\/-\/media\/files\/insights\/publications\/2014\/10\/icyber-alerti-fda-issues-final-cybersecurity-guida\/files\/view-alert-as-pdf\/fileattachment\/14818fdacybersecurity.pdf"}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-019-1507-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-019-1507-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-019-1507-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T23:27:42Z","timestamp":1617319662000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-019-1507-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,2]]},"references-count":78,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,5]]}},"alternative-id":["1507"],"URL":"https:\/\/doi.org\/10.1007\/s10916-019-1507-y","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,2]]},"assertion":[{"value":"31 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 November 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 April 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"FedEx Institute of Technology University of Memphis funded this study. For this type of study, formal consent is not required.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and Animal Studies"}},{"value":"The authors have no conflict of interest to declare.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"98"}}