{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T21:32:50Z","timestamp":1773264770790,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,12]]},"DOI":"10.1109\/icdmw69685.2025.00031","type":"proceedings-article","created":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T19:50:39Z","timestamp":1773172239000},"page":"215-222","source":"Crossref","is-referenced-by-count":0,"title":["Evolving Risks in US Healthcare Breaches"],"prefix":"10.1109","author":[{"given":"Li","family":"Xu","sequence":"first","affiliation":[{"name":"College of Information Science, The University of Arizona,Tucson,AZ,USA"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Healthcare Data Breach Statistics","author":"Alder","year":"2025"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2020.103392"},{"issue":"11","key":"ref3","first-page":"2856","article-title":"Modeling and Predicting Cyber Hacking Breaches","volume-title":"IEEE Transactions on Information Forensics and Security","volume":"13","author":"Xu"},{"key":"ref4","volume-title":"Cost of a data breach 2024"},{"key":"ref5","first-page":"1936","article-title":"Health Insurance Portability and Accountability Act of 1996","volume-title":"Public Law 104\u2013191","volume":"110","year":"1996"},{"key":"ref6","first-page":"226","article-title":"Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009","volume-title":"Public Law 111\u20135","volume":"123","year":"2009"},{"key":"ref7","volume-title":"Breach Portal: Notice to the Secretary of HHS Breach of Unsecured Protected Health Information","year":"2025"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3358695.3361754"},{"key":"ref9","first-page":"0204","article-title":"Top Reported Data Security Risks in the Age of COVID-19","volume-title":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","author":"Schmeelk"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1108\/OCJ-01-2023-0001"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04507-2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1001\/jama.2018.9222"},{"key":"ref13","first-page":"1081","article-title":"Trends and characteristics of protected health information breaches in the United States","volume-title":"AMIA\u2026 Annual Symposium proceedings","volume":"2019","author":"Hossain","year":"2019"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.18502\/ijph.v48i2.826"},{"issue":"Spring","key":"ref15","first-page":"1i","article-title":"Human Factors in Electronic Health Records Cybersecurity Breach: An Exploratory Analysis","volume":"19","author":"Yeo","year":"2022","journal-title":"Perspectives in Health Information Management"},{"key":"ref16","volume-title":"Healthcare Security Breaches in the United States: Insights and their Socio-Technical Implications","author":"Moncy","year":"2023"},{"key":"ref17","article-title":"Composite risk index methodology","volume-title":"EUROCONTROL, Technical Note PRC Technical Note","year":"2020"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-011-2546-8_20"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2307\/1907187"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1023\/b:warm.0000043140.61082.60"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/s0022-1694(01)00594-7"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1968.10480934"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/75.2.335"},{"key":"ref24","first-page":"39","article-title":"Chapter 2: Schematic Summaries","volume-title":"Exploratory Data Analysis","author":"Tukey","year":"1977"},{"key":"ref25","volume-title":"Healthcare industry cybersecurity practices: Managing threats and protecting patients","year":"2023"}],"event":{"name":"2025 IEEE International Conference on Data Mining Workshops (ICDMW)","location":"Washington, DC, USA","start":{"date-parts":[[2025,11,12]]},"end":{"date-parts":[[2025,11,15]]}},"container-title":["2025 IEEE International Conference on Data Mining Workshops (ICDMW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11415623\/11415713\/11415864.pdf?arnumber=11415864","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T05:30:41Z","timestamp":1773207041000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11415864\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,12]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icdmw69685.2025.00031","relation":{},"subject":[],"published":{"date-parts":[[2025,11,12]]}}}