{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T22:07:26Z","timestamp":1761948446816,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,1,29]],"date-time":"2019-01-29T00:00:00Z","timestamp":1548720000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,1,29]]},"DOI":"10.1145\/3290688.3290721","type":"proceedings-article","created":{"date-parts":[[2019,1,14]],"date-time":"2019-01-14T13:15:25Z","timestamp":1547471725000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Cybersecurity Indexes for eHealth"],"prefix":"10.1145","author":[{"given":"Wendy","family":"Burke","sequence":"first","affiliation":[{"name":"School of Science, Engineering and Information Technology, Federation University Australia, Mt Helen, Victoria, Australia"}]},{"given":"Taiwo","family":"Oseni","sequence":"additional","affiliation":[{"name":"School of Science, Engineering and Information Technology, Federation University Australia, Mt Helen, Victoria, Australia"}]},{"given":"Alireza","family":"Jolfaei","sequence":"additional","affiliation":[{"name":"School of Science, Engineering and Information Technology, Federation University Australia, Mt Helen, Victoria, Australia"}]},{"given":"Iqbal","family":"Gondal","sequence":"additional","affiliation":[{"name":"School of Science, Engineering and Information Technology, Federation University Australia, Mt Helen, Victoria, Australia"}]}],"member":"320","published-online":{"date-parts":[[2019,1,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Key findings from The Global State of Information Security Survey","author":"Pw C.","year":"2018","unstructured":"Pw C. Revitalizing privacy and trust in a data-driven world : Key findings from The Global State of Information Security Survey 2018 . 2018. PwC. Revitalizing privacy and trust in a data-driven world: Key findings from The Global State of Information Security Survey 2018. 2018."},{"key":"e_1_3_2_1_2_1","volume-title":"Cybersecurity and healthcare: how safe are we? BMJ, 385","author":"Martin G.","year":"2017","unstructured":"Martin , G. , Martin , P. , Hankin , C. , Darzi , A. and Kinross , J . Cybersecurity and healthcare: how safe are we? BMJ, 385 . 2017 . Martin, G., Martin, P., Hankin, C., Darzi, A. and Kinross, J. Cybersecurity and healthcare: how safe are we? BMJ, 385. 2017."},{"key":"e_1_3_2_1_3_1","volume-title":"seamless and secure: evolving health and care to meet the needs of modern Australia","author":"Australian Digital Health Agency","year":"2017","unstructured":"Australian Digital Health Agency . Safe , seamless and secure: evolving health and care to meet the needs of modern Australia . 2017 . Australian Digital Health Agency. Safe, seamless and secure: evolving health and care to meet the needs of modern Australia. 2017."},{"key":"e_1_3_2_1_4_1","volume-title":"Electronic Patient Records to Save Lives","author":"Victorian Government","year":"2018","unstructured":"Victorian Government . Electronic Patient Records to Save Lives . 2018 . Victorian Government. Electronic Patient Records to Save Lives. 2018."},{"key":"e_1_3_2_1_5_1","volume-title":"My Health Record","author":"Commonwealth","year":"2017","unstructured":"Commonwealth of Australia. My Health Record . 2017 . Commonwealth of Australia. My Health Record. 2017."},{"key":"e_1_3_2_1_6_1","volume-title":"My Health Record Statistics as at","author":"Australian Government","year":"2018","unstructured":"Australian Government . My Health Record Statistics as at 12 August 2018 . 2018. Australian Government. My Health Record Statistics as at 12 August 2018. 2018."},{"key":"e_1_3_2_1_7_1","volume-title":"About the Agency","author":"Australian Digital Health Agency","year":"2018","unstructured":"Australian Digital Health Agency . About the Agency . 2018 . Australian Digital Health Agency. About the Agency. 2018."},{"key":"e_1_3_2_1_8_1","volume-title":"Digital Health Cyber Security Centre","author":"Australian Digital Health Agency","year":"2018","unstructured":"Australian Digital Health Agency . Digital Health Cyber Security Centre . 2018 . Australian Digital Health Agency. Digital Health Cyber Security Centre. 2018."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.3233\/THC-151102"},{"key":"e_1_3_2_1_10_1","volume-title":"National Safety and Quality Health Service Standard 2: Partnering with Consumers","author":"Australian Commission on Safety and Quality in Health Care.","year":"2017","unstructured":"Australian Commission on Safety and Quality in Health Care. National Safety and Quality Health Service Standard 2: Partnering with Consumers . 2017 . Australian Commission on Safety and Quality in Health Care. National Safety and Quality Health Service Standard 2: Partnering with Consumers. 2017."},{"key":"e_1_3_2_1_11_1","volume-title":"Digital Trust: Building Digital Trust with Australian Healthcare Consumers","author":"Accenture Consulting","year":"2017","unstructured":"Accenture Consulting . Digital Trust: Building Digital Trust with Australian Healthcare Consumers . 2017 . Accenture Consulting. Digital Trust: Building Digital Trust with Australian Healthcare Consumers. 2017."},{"key":"e_1_3_2_1_13_1","volume-title":"Index of Cybersecurity Indices","author":"International Telecommunication Union","year":"2017","unstructured":"International Telecommunication Union . Index of Cybersecurity Indices . 2017 . International Telecommunication Union. Index of Cybersecurity Indices. 2017."},{"key":"e_1_3_2_1_14_1","volume-title":"Enabling innovation, growth & prosperity","author":"Commonwealth","year":"2016","unstructured":"Commonwealth of Australia Australia's Cyber Security Strategy : Enabling innovation, growth & prosperity . 2016 . Commonwealth of Australia Australia's Cyber Security Strategy: Enabling innovation, growth & prosperity. 2016."},{"key":"e_1_3_2_1_15_1","volume-title":"Cybersecurity Index of Indices","author":"Global Cybersecurity Index","year":"2015","unstructured":"Global Cybersecurity Index . Cybersecurity Index of Indices . 2015 . Global Cybersecurity Index. Cybersecurity Index of Indices. 2015."},{"key":"e_1_3_2_1_16_1","volume-title":"Kaspersky Cybersecurity Index","author":"Kaspersky Lab","year":"2018","unstructured":"Kaspersky Lab . Kaspersky Cybersecurity Index . 2018 . Kaspersky Lab. Kaspersky Cybersecurity Index. 2018."},{"key":"e_1_3_2_1_17_1","volume-title":"Cyber Power Index: Findings and Methodology","author":"Booz Allen Hamilton","year":"2011","unstructured":"Booz Allen Hamilton . Cyber Power Index: Findings and Methodology . 2011 . Booz Allen Hamilton. Cyber Power Index: Findings and Methodology. 2011."},{"key":"e_1_3_2_1_18_1","volume-title":"Methodology and criteria for the cybersecurity reports - EU Cybersecurity Dashboard","author":"The Software Alliance","year":"2015","unstructured":"BSA | The Software Alliance . Methodology and criteria for the cybersecurity reports - EU Cybersecurity Dashboard . 2015 . BSA | The Software Alliance. Methodology and criteria for the cybersecurity reports - EU Cybersecurity Dashboard. 2015."},{"key":"e_1_3_2_1_19_1","volume-title":"Methodology and criteria for the cybersecurity reports - Asia-Pacific Cybersecurity Dashboard","author":"The Software Alliance","year":"2015","unstructured":"BSA | The Software Alliance . Methodology and criteria for the cybersecurity reports - Asia-Pacific Cybersecurity Dashboard . 2015 . BSA | The Software Alliance. Methodology and criteria for the cybersecurity reports - Asia-Pacific Cybersecurity Dashboard. 2015."},{"key":"e_1_3_2_1_20_1","volume-title":"EU Cybersecurity Dashboard. A path to a secure European cyberspace","author":"The Software Alliance","year":"2015","unstructured":"BSA | The Software Alliance . EU Cybersecurity Dashboard. A path to a secure European cyberspace . 2015 . BSA | The Software Alliance. EU Cybersecurity Dashboard. A path to a secure European cyberspace. 2015."},{"key":"e_1_3_2_1_21_1","volume-title":"Asia-Pacific Cybersecurity Dashboard. A path to a secure global cyberspace","author":"The Software Alliance","year":"2015","unstructured":"BSA | The Software Alliance . Asia-Pacific Cybersecurity Dashboard. A path to a secure global cyberspace . 2015 . BSA | The Software Alliance. Asia-Pacific Cybersecurity Dashboard. A path to a secure global cyberspace. 2015."},{"key":"e_1_3_2_1_22_1","volume-title":"Cyber Readiness Index 2.0. A plan for cyber readiness: A baseline and an index","author":"Hathaway M.","year":"2015","unstructured":"Hathaway , M. , Demchak , C. , Kerben , J. , McArdle , J. and Spidalieri , F . Cyber Readiness Index 2.0. A plan for cyber readiness: A baseline and an index . 2015 . Hathaway, M., Demchak, C., Kerben, J., McArdle, J. and Spidalieri, F. Cyber Readiness Index 2.0. A plan for cyber readiness: A baseline and an index. 2015."},{"key":"e_1_3_2_1_23_1","first-page":"2017","author":"International Telecommunication Union","year":"2017","unstructured":"International Telecommunication Union . Global Cybersecurity Index 2017 . 2017 . International Telecommunication Union. Global Cybersecurity Index 2017. 2017.","journal-title":"Global Cybersecurity Index"},{"unstructured":"e-Governance Academy Foundation. Methodology. n.d.  e-Governance Academy Foundation. Methodology. n.d.","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","volume-title":"Cyber maturity in the Asia-Pacific region","author":"Australian Strategic Policy Institute","year":"2017","unstructured":"Australian Strategic Policy Institute . Cyber maturity in the Asia-Pacific region 2017 . 2017. Australian Strategic Policy Institute. Cyber maturity in the Asia-Pacific region 2017. 2017."},{"unstructured":"Global Cyber Security Capacity Centre Cybersecurity Capacity Maturity Model for Nations (CMM) - Revised Edition. 2016.  Global Cyber Security Capacity Centre Cybersecurity Capacity Maturity Model for Nations (CMM) - Revised Edition. 2016.","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","volume-title":"The Accenture Security Index","author":"Bissell K.","year":"2017","unstructured":"Bissell , K. , LaSalle , R. and Richards , K . The Accenture Security Index . 2017 . Bissell, K., LaSalle, R. and Richards, K. The Accenture Security Index. 2017."},{"key":"e_1_3_2_1_28_1","volume-title":"Cybersecurity Capability Maturity Model","author":"U.S. Department of Energy.","year":"2014","unstructured":"U.S. Department of Energy. Cybersecurity Capability Maturity Model . 2014 . U.S. Department of Energy. Cybersecurity Capability Maturity Model. 2014."},{"key":"e_1_3_2_1_29_1","volume-title":"RSA Cybersecurity Poverty Index -","author":"RSA.","year":"2016","unstructured":"RSA. RSA Cybersecurity Poverty Index - 2016 . 2016. RSA. RSA Cybersecurity Poverty Index - 2016. 2016."},{"key":"e_1_3_2_1_30_1","volume-title":"2017 Global Cybersecurity Assurance Report Card","author":"Tenable Network Security and CyberEdge Group","year":"2017","unstructured":"Tenable Network Security and CyberEdge Group . 2017 Global Cybersecurity Assurance Report Card . 2017 . Tenable Network Security and CyberEdge Group. 2017 Global Cybersecurity Assurance Report Card. 2017."},{"key":"e_1_3_2_1_31_1","volume-title":"An introduction to the 2014 Information Risk Maturity Index","author":"Pw C.","year":"2014","unstructured":"Pw C. Beyond good intentions : An introduction to the 2014 Information Risk Maturity Index . 2014 . PwC. Beyond good intentions: An introduction to the 2014 Information Risk Maturity Index. 2014."},{"key":"e_1_3_2_1_32_1","volume-title":"Beyond cyber threats: Europe's first information risk maturity index","author":"Pw C","year":"2012","unstructured":"Pw C and Iron Mountain . Beyond cyber threats: Europe's first information risk maturity index . 2012 . PwC and Iron Mountain. Beyond cyber threats: Europe's first information risk maturity index. 2012."},{"unstructured":"International Telecommunication Union Global Cybersecurity Index (GCI) 2018 Questionnaire Guide. 2018.  International Telecommunication Union Global Cybersecurity Index (GCI) 2018 Questionnaire Guide. 2018.","key":"e_1_3_2_1_33_1"},{"unstructured":"e-Governance Academy Foundation. Ranking. 2018.  e-Governance Academy Foundation. Ranking. 2018.","key":"e_1_3_2_1_34_1"},{"volume-title":"Understanding the public and private hospital system","year":"2017","unstructured":"healthdirect. Understanding the public and private hospital system . 2017 . healthdirect. Understanding the public and private hospital system. 2017.","key":"e_1_3_2_1_35_1"},{"key":"e_1_3_2_1_36_1","volume-title":"The G20","author":"Australian Government","year":"2018","unstructured":"Australian Government . The G20 . 2018 . Australian Government. The G20. 2018."}],"event":{"sponsor":["CORE - Computing Research and Education","Macquarie University-Sydney"],"acronym":"ACSW 2019","name":"ACSW 2019: Australasian Computer Science Week 2019","location":"Sydney NSW Australia"},"container-title":["Proceedings of the Australasian Computer Science Week Multiconference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290688.3290721","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3290688.3290721","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:17Z","timestamp":1750204397000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290688.3290721"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,29]]},"references-count":35,"alternative-id":["10.1145\/3290688.3290721","10.1145\/3290688"],"URL":"https:\/\/doi.org\/10.1145\/3290688.3290721","relation":{},"subject":[],"published":{"date-parts":[[2019,1,29]]},"assertion":[{"value":"2019-01-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}