{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:11:57Z","timestamp":1755839517573,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T00:00:00Z","timestamp":1681862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,19]]},"DOI":"10.1145\/3544549.3585597","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T07:31:18Z","timestamp":1681975878000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Accomplishing More With Less: The Practice of Cybersecure Health Technology Design Among Danish Startups"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4665-351X","authenticated-orcid":false,"given":"Ziru","family":"Li","sequence":"first","affiliation":[{"name":"Department of Technology, Management and Economics, Technical University of Denmark, Denmark"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1292-0747","authenticated-orcid":false,"given":"Simon Nam Thanh","family":"Vu","sequence":"additional","affiliation":[{"name":"Department of Applied Mathematics and Computer Science, Technical University of Denmark, Denmark"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9575-2990","authenticated-orcid":false,"given":"Nicola","family":"Dragoni","sequence":"additional","affiliation":[{"name":"Technical University of Denmark, Denmark"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7647-5139","authenticated-orcid":false,"given":"Kevin","family":"Doherty","sequence":"additional","affiliation":[{"name":"Department of Health Technology, Technical University of Denmark, Denmark and School of Information and Communication Studies, University College Dublin, Ireland"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_3_3_1_1","doi-asserted-by":"publisher","DOI":"10.1055\/s-0041-1735527"},{"key":"e_1_3_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.2196\/15654"},{"volume-title":"\u2019Think Secure from the Beginning\u2019: A Survey with Software Developers","author":"Assal Hala","key":"e_1_3_3_3_3_1","unstructured":"Hala Assal and Sonia Chiasson. 2019. \u2019Think Secure from the Beginning\u2019: A Survey with Software Developers. Association for Computing Machinery, New York, NY, USA, 1\u201313. https:\/\/doi-org.proxy.findit.dtu.dk\/10.1145\/3290605.3300519"},{"key":"e_1_3_3_3_4_1","unstructured":"Atlas.ti. 2022. ATLAS.ti - The Qualitative Data Analysis & Research Software. https:\/\/atlasti.com\/. Accessed: 2022-05-13."},{"key":"e_1_3_3_3_5_1","volume-title":"Medibank: Hackers release abortion data after stealing Australian medical records. https:\/\/www.bbc.com\/news\/world-australia-63579985. Accessed: 2022-12-04.","author":"BBC.","year":"2022","unstructured":"BBC. 2022. Medibank: Hackers release abortion data after stealing Australian medical records. https:\/\/www.bbc.com\/news\/world-australia-63579985. Accessed: 2022-12-04."},{"key":"e_1_3_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-019-1507-y"},{"key":"e_1_3_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.3399\/bjgp15X684865"},{"key":"e_1_3_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/23738871.2020.1856902"},{"key":"e_1_3_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517613"},{"key":"e_1_3_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290688.3290721"},{"key":"e_1_3_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3381436"},{"key":"e_1_3_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555537"},{"key":"e_1_3_3_3_13_1","volume-title":"Thematic Analysis: A Practical Guide","author":"Clarke Victoria","year":"2021","unstructured":"Victoria Clarke and Virginia Braun. 2021. Thematic Analysis: A Practical Guide (first ed.). Sage Publications Ltd."},{"volume-title":"Agile Development in the Real World","author":"Cline Alan","key":"e_1_3_3_3_14_1","unstructured":"Alan Cline. 2015. Agile Development in the Real World. Apress, New York."},{"key":"e_1_3_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.2818\/546193"},{"key":"e_1_3_3_3_16_1","unstructured":"Cyberjuice. 2022. Cyberjuice - Cybersecurity Reimagined. https:\/\/www.cyberjuice.io\/. Accessed: 2022-06-09."},{"key":"e_1_3_3_3_17_1","unstructured":"D-Maerket. 2022. D-m\u00e6rket - Danmarks nye IT-m\u00e6rkningsordning. https:\/\/d-maerket.dk\/. Accessed: 2022-06-09."},{"key":"e_1_3_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1125864.1125889"},{"key":"e_1_3_3_3_19_1","unstructured":"Dotmocracy. 2022. Dotmocracy. https:\/\/dotmocracy.org\/. Accessed: 2022-06-20."},{"key":"e_1_3_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70578-1_13"},{"key":"e_1_3_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40278-022-09543-2"},{"key":"e_1_3_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2468356.2468807"},{"key":"e_1_3_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1177\/1073110519898046"},{"key":"e_1_3_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445164"},{"key":"e_1_3_3_3_25_1","unstructured":"FDA. 2023. Cybersecurity Safety Communications and Other Alerts.https:\/\/www.fda.gov\/medical-devices\/digital-health-center-excellence\/cybersecurity. Accessed: 2023-01-12."},{"key":"e_1_3_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445148"},{"key":"e_1_3_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-804179-6.00018-6"},{"key":"e_1_3_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare9101335"},{"key":"e_1_3_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare9010062"},{"key":"e_1_3_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare10020327"},{"key":"e_1_3_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376142"},{"key":"e_1_3_3_3_32_1","unstructured":"Hackerstop. 2022. Hackerstop - Rejsen til sikker digital kultur starter her. https:\/\/www.cyberjuice.io\/. Accessed: 2022-06-09."},{"key":"e_1_3_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006224603830388"},{"key":"e_1_3_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-019-02869-x"},{"key":"e_1_3_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75680-2_40"},{"key":"e_1_3_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.3233\/978-1-61499-781-8-76"},{"key":"e_1_3_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.22215\/timreview"},{"key":"e_1_3_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445587"},{"key":"e_1_3_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1177\/19322968211043498"},{"key":"e_1_3_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1108\/JICES-12-2018-0095"},{"key":"e_1_3_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.3233\/THC-151102"},{"key":"e_1_3_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.3233\/978-1-61499-635-4-25"},{"key":"e_1_3_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.3233\/978-1-60750-752-9-27"},{"key":"e_1_3_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2006.260060"},{"key":"e_1_3_3_3_45_1","unstructured":"Mindtools. 2022. Brainstorming. https:\/\/www.mindtools.com\/brainstm.html. Accessed: 2022-06-20."},{"key":"e_1_3_3_3_46_1","unstructured":"Mindtools. 2022. Weighted decision matrix. https:\/\/www.mindtools.com\/pages\/article\/newTED_03.htm. Accessed: 2022-06-20."},{"key":"e_1_3_3_3_47_1","unstructured":"Mindtools. 2023. Mind maps. https:\/\/www.mindtools.com\/pages\/article\/newISS_01.htm. Accessed: 2022-06-20."},{"key":"e_1_3_3_3_48_1","unstructured":"Miro. 2022. Miro | Online Whiteboard for Visual Collaboration. https:\/\/www.miro.com. Accessed: 2022-06-10."},{"key":"e_1_3_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445078"},{"key":"e_1_3_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2014.6918926"},{"key":"e_1_3_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2999934"},{"key":"e_1_3_3_3_52_1","first-page":"155","article-title":"Startup governance","volume":"168","author":"Pollman Elizabeth","year":"2020","unstructured":"Elizabeth Pollman. 2020. Startup governance. University of Pennsylvania Law Review 168, 1 (2020), 155\u2013221.","journal-title":"University of Pennsylvania Law Review"},{"key":"e_1_3_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.3233\/SHTI200716"},{"key":"e_1_3_3_3_54_1","unstructured":"PWC. 2023. Conti Cyber Attack on The HSE. Independent Post Incident Review - Executive Summary and Learnings for Other Organisations.https:\/\/www.hse.ie\/eng\/services\/publications\/conti-cyber-attack-on-the-hse-executive-summary.pdf. Accessed: 2023-01-12."},{"key":"e_1_3_3_3_55_1","unstructured":"Riskio. 2022. Riskio.co.uk. https:\/\/www.riskio.co.uk\/. Accessed: 2022-06-09."},{"key":"e_1_3_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare9091114"},{"key":"e_1_3_3_3_57_1","volume-title":"Understanding cyber security perceptions related to information risk in a healthcare setting (San Diego, CA, USA) (AMCIS","author":"Sedlack J.","year":"2016","unstructured":"Derek\u00a0J. Sedlack. 2016. Understanding Cyber Security Perceptions Related to Information Risk in a Healthcare Setting. In Understanding cyber security perceptions related to information risk in a healthcare setting (San Diego, CA, USA) (AMCIS 2016). Association for Information Systems, San Diego, CA, USA, 1\u201310."},{"volume-title":"The State of Ransomware in Healthcare","year":"2022","key":"e_1_3_3_3_58_1","unstructured":"Sophos. 2022. The State of Ransomware in Healthcare 2022. Accessed: 2023-02-22."},{"key":"e_1_3_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517444"},{"key":"e_1_3_3_3_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMAPP.2018.8460454"},{"key":"e_1_3_3_3_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445768"},{"key":"e_1_3_3_3_62_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi13080198"},{"volume-title":"Security During Application Development: An Application Security Expert Perspective","author":"Thomas W.","key":"e_1_3_3_3_63_1","unstructured":"Tyler\u00a0W. Thomas, Madiha Tabassum, Bill Chu, and Heather Lipford. 2018. Security During Application Development: An Application Security Expert Perspective. Association for Computing Machinery, New York, NY, USA, 1\u201312. https:\/\/doi-org.proxy.findit.dtu.dk\/10.1145\/3173574.3173836"},{"key":"e_1_3_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.hlpt.2021.100549"},{"key":"e_1_3_3_3_65_1","unstructured":"Hasaryk Unievrsity. 2022. Cybercompass. https:\/\/security.muni.cz\/en\/cybercompass. Accessed: 2022-06-09."},{"key":"e_1_3_3_3_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-813467-2.00040-7"},{"key":"e_1_3_3_3_67_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0261954"},{"key":"e_1_3_3_3_68_1","unstructured":"ZDNET. 2022. More than half of medical devices found to have critical vulnerabilities. https:\/\/www.zdnet.com\/article\/more-than-half-of-medical-devices-have-critical-vulnerabilities\/. Accessed: 2022-04-25."}],"event":{"name":"CHI '23: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Hamburg Germany","acronym":"CHI '23"},"container-title":["Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544549.3585597","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544549.3585597","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:33Z","timestamp":1750178793000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544549.3585597"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,19]]},"references-count":68,"alternative-id":["10.1145\/3544549.3585597","10.1145\/3544549"],"URL":"https:\/\/doi.org\/10.1145\/3544549.3585597","relation":{},"subject":[],"published":{"date-parts":[[2023,4,19]]},"assertion":[{"value":"2023-04-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}