{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:54:04Z","timestamp":1767707644930,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T00:00:00Z","timestamp":1626220800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T00:00:00Z","timestamp":1626220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T00:00:00Z","timestamp":1626220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,14]]},"DOI":"10.1109\/icit52682.2021.9491781","type":"proceedings-article","created":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T01:29:46Z","timestamp":1627349386000},"page":"826-833","source":"Crossref","is-referenced-by-count":14,"title":["A Big Data Maturity Model for Electronic Health Records in Hospitals"],"prefix":"10.1109","author":[{"given":"Rania","family":"Daraghmeh","sequence":"first","affiliation":[]},{"given":"Raymond","family":"Brown","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-020-01161-7"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.04.004"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-03-2019-0039"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0597-z"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0486-5"},{"key":"ref15","article-title":"A Maturity model for hospital information systems","author":"carvalho","year":"2017","journal-title":"Journal of Business Research"},{"journal-title":"Health Information Network (HIN) Maturity Model","year":"2015","key":"ref16"},{"key":"ref17","article-title":"A Maturity model for hospital information systems","author":"carvalho","year":"2017","journal-title":"Journal of Business Research"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-1143-y"},{"volume":"2","journal-title":"Information Security Management Maturity Model","year":"2017","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13835-0_31"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8551.00375"},{"key":"ref27","article-title":"Understanding the main phases of developing a maturity as tems.sessment model","author":"de bruin","year":"2005","journal-title":"ACIS 2005 Proceedings - 16th Australasian Conference on Information Systems"},{"journal-title":"Electronic Health Records | CMS","year":"2021","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2005.07.017"},{"year":"2021","author":"koluk?sa tarhan","key":"ref29"},{"journal-title":"Gartner&#x2019;S Big Data Definition Consists Of Three Parts Not To Be Confused With Three &#x201C;V&#x201D;S - Svetlana Sicular","year":"2011","author":"sicular","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IEEEGCC.2017.8448206"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/HealthCom.2013.6720677"},{"journal-title":"The Rising Danger of Cyber Crime in Healthcare","year":"2021","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISMICT.2019.8744003"},{"journal-title":"IFSEC Global Security and Fire News (New) - IFSEC Global | Security And Fire News And Resources","year":"2020","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-66r1"},{"key":"ref22","first-page":"1","article-title":"Cybersecurity Capability Maturity Model (C2M2)","author":"christopher","year":"2014","journal-title":"Department of Homeland Security (February)"},{"journal-title":"COBIT 2019 Framework-Introduction and Methodology","year":"2019","key":"ref21"},{"journal-title":"ISO\/IEC 21827 2008","year":"2021","key":"ref24"},{"journal-title":"Building a Maturity Framework for Big Data Cybersecurity Analytics","year":"2019","author":"pham","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.maturitas.2018.04.008"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3396956.3396980"}],"event":{"name":"2021 International Conference on Information Technology (ICIT)","start":{"date-parts":[[2021,7,14]]},"location":"Amman, Jordan","end":{"date-parts":[[2021,7,15]]}},"container-title":["2021 International Conference on Information Technology (ICIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9491111\/9491112\/09491781.pdf?arnumber=9491781","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:48:17Z","timestamp":1652197697000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9491781\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,14]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icit52682.2021.9491781","relation":{},"subject":[],"published":{"date-parts":[[2021,7,14]]}}}