{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T11:34:53Z","timestamp":1763811293536,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,5]],"date-time":"2023-12-05T00:00:00Z","timestamp":1701734400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,5]],"date-time":"2023-12-05T00:00:00Z","timestamp":1701734400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,5]]},"DOI":"10.1109\/bibm58861.2023.10385391","type":"proceedings-article","created":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T18:27:43Z","timestamp":1705602463000},"page":"3273-3279","source":"Crossref","is-referenced-by-count":1,"title":["Use Predictive Learning Model to Tackle Data Breaches in Healthcare Domain"],"prefix":"10.1109","author":[{"given":"Giuseppe","family":"Agapito","sequence":"first","affiliation":[{"name":"University Magna Gr&#x00E6;cia,Economics and Social Sciences,Dept. of Law,Catanzaro,Italy"}]},{"given":"Mario","family":"Cannataro","sequence":"additional","affiliation":[{"name":"University Magna Gr&#x00E6;cia,Dept. of Medical and Surgical Sciences,Catanzaro,Italy"}]},{"given":"Pietro","family":"Cinaglia","sequence":"additional","affiliation":[{"name":"University Magna Gr&#x00E6;cia,Dept. of Health Sciences,Catanzaro,Italy"}]},{"given":"Gaetano","family":"Guardasole","sequence":"additional","affiliation":[{"name":"University of Calabria,Systems &amp; Data Analyst, ex Expert ICT,Rende (CS),Italy"}]},{"given":"Marianna","family":"Milano","sequence":"additional","affiliation":[{"name":"University Magna Gr&#x00E6;cia,Dept. of Experimental and Clinical Medicine,Catanzaro,Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2018.02.007"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1089\/hs.2019.0123"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-3799-1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.o1126"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare8020133"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2012.10845654"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1111\/1468-0009.12314"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph16061070"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4018\/ijhisi.2014010103"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2012.01.003"},{"issue":"Fall","key":"ref11","article-title":"What caused the breach? an examination of use of information technology and health data breaches","volume":"11","author":"Wikina","year":"2014","journal-title":"Perspectives in health information management"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/jhrm.21088"},{"key":"ref13","article-title":"Information technology laboratory, national institute of standards and technology","author":"Barker","year":"2001","journal-title":"Computer"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.09.310"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45982-0_22"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-2053-8"},{"key":"ref18","article-title":"Data breaches in healthcare security systems","volume-title":"Ph.D. dissertation, University of Cincinnati","author":"Reddy","year":"2021"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1093\/jamiaopen\/ooy019"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3394788.3394789"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.7176\/ceis\/14-2-03"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-23269-5_15"},{"issue":"4","key":"ref23","doi-asserted-by":"crossref","first-page":"295","DOI":"10.69554\/WJVU3177","article-title":"Preventing a data breach from becoming a disaster","volume":"6","author":"Goldberg","year":"2013","journal-title":"Journal of business continuity & emergency planning"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1136\/ebnurs-2022-103582"},{"volume-title":"Project risk management guidelines.","year":"2005","author":"Cooper","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1186\/s12913-022-07887-6"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2021.104401"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.11.006"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2020.104123"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-13-84"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-022-11536-0"}],"event":{"name":"2023 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)","start":{"date-parts":[[2023,12,5]]},"location":"Istanbul, Turkiye","end":{"date-parts":[[2023,12,8]]}},"container-title":["2023 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10385250\/10385251\/10385391.pdf?arnumber=10385391","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T09:54:17Z","timestamp":1731059657000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10385391\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,5]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/bibm58861.2023.10385391","relation":{},"subject":[],"published":{"date-parts":[[2023,12,5]]}}}