{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T08:58:36Z","timestamp":1774601916380,"version":"3.50.1"},"reference-count":144,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T00:00:00Z","timestamp":1713744000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Cisco"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Comput. Healthcare"],"published-print":{"date-parts":[[2024,4,30]]},"abstract":"<jats:p>\n            Interactions in healthcare, by necessity, involve sharing sensitive information to achieve high-quality patient outcomes. Therefore, sensitive data must be carefully protected. This article explores existing privacy and security research conducted in the context of healthcare organizations. We conducted a systematic literature review of\n            <jats:italic>N<\/jats:italic>\n            =1,553 articles that examine the security and privacy of healthcare data and focus on 80 articles addressing human factors. Key findings show that much of the healthcare security and privacy research is focused on technology (44.11%, 712 articles), with a lack of emphasis on the human element (4.96%, 80 articles). In the subset of user studies, we find that patients and the general public express concerns about privacy and security with technologies like electronic health records (EHRs). Furthermore, our analysis shows that healthcare professionals often have low awareness of risks related to data security. Additionally, our analysis revealed that most research focuses narrowly on large hospitals, neglecting private practices and the unique challenges they face. We conclude by identifying research gaps and providing potential solutions to enable robust data security for sensitive patient data.\n          <\/jats:p>","DOI":"10.1145\/3650116","type":"journal-article","created":{"date-parts":[[2024,3,4]],"date-time":"2024-03-04T12:23:56Z","timestamp":1709555036000},"page":"1-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["SoK: Analyzing Privacy and Security of Healthcare Data from the User Perspective"],"prefix":"10.1145","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9781-2694","authenticated-orcid":false,"given":"Faiza","family":"Tazi","sequence":"first","affiliation":[{"name":"University of Denver, Denver, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6446-5331","authenticated-orcid":false,"given":"Archana","family":"Nandakumar","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3455-2562","authenticated-orcid":false,"given":"Josiah","family":"Dykstra","sequence":"additional","affiliation":[{"name":"Designer Security, LLC, Fort Meade, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8596-085X","authenticated-orcid":false,"given":"Prashanth","family":"Rajivan","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1299-7867","authenticated-orcid":false,"given":"Sanchari","family":"Das","sequence":"additional","affiliation":[{"name":"University of Denver, Denver, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,4,22]]},"reference":[{"issue":"2","key":"e_1_3_4_2_2","doi-asserted-by":"crossref","first-page":"326","DOI":"10.3390\/s19020326","article-title":"A decentralized privacy-preserving healthcare blockchain for IoT","volume":"19","author":"Dwivedi Ashutosh Dhar","year":"2019","unstructured":"Ashutosh Dhar Dwivedi, Gautam Srivastava, Shalini Dhar, and Rajani Singh. 2019. A decentralized privacy-preserving healthcare blockchain for IoT. Sensors 19, 2 (2019), 326.","journal-title":"Sensors"},{"key":"e_1_3_4_3_2","volume-title":"A Qualitative Exploration of the Security Practices of Registered Nurses","author":"Savage Beth Ann","year":"2017","unstructured":"Beth Ann Savage. 2017. A Qualitative Exploration of the Security Practices of Registered Nurses. Ph.D. Dissertation. Walden University."},{"issue":"1","key":"e_1_3_4_4_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3233\/THC-161263","article-title":"Cybersecurity in healthcare: A systematic review of modern threats and trends","volume":"25","author":"Kruse Clemens Scott","year":"2017","unstructured":"Clemens Scott Kruse, Benjamin Frederick, Taylor Jacobson, and D. Kyle Monticone. 2017. Cybersecurity in healthcare: A systematic review of modern threats and trends. Technology and Health Care 25, 1 (2017), 1\u201310.","journal-title":"Technology and Health Care"},{"key":"e_1_3_4_5_2","doi-asserted-by":"crossref","first-page":"464","DOI":"10.1109\/ACCESS.2017.2767561","article-title":"Privacy preservation in e-healthcare environments: State-of-the-art and future directions","volume":"6","author":"Sahi Muneeb Ahmed","year":"2017","unstructured":"Muneeb Ahmed Sahi, Haider Abbas, Kashif Saleem, Xiaodong Yang, Abdelouahid Derhab, Mehmet A. Orgun, Waseem Iqbal, Imran Rashid, and Asif Yaseen. 2017. Privacy preservation in e-healthcare environments: State-of-the-art and future directions. IEEE Access 6 (2017), 464\u2013478.","journal-title":"IEEE Access"},{"key":"e_1_3_4_6_2","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.maturitas.2018.04.008","article-title":"Cybersecurity in healthcare: A narrative review of trends, threats and ways forward","volume":"113","author":"Coventry Lynne","year":"2018","unstructured":"Lynne Coventry and Dawn Branley. 2018. Cybersecurity in healthcare: A narrative review of trends, threats and ways forward. Maturitas 113 (2018), 48\u201352.","journal-title":"Maturitas"},{"key":"e_1_3_4_7_2","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1109\/EuroSPW.2019.00028","volume-title":"Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","author":"Demjaha Albese","year":"2019","unstructured":"Albese Demjaha, Tristan Caulfield, M. Angela Sasse, and David Pym. 2019. 2 fast 2 secure: A case study of post-breach security changes. In Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, IEEE, Stockholm, Sweden, 192\u2013201."},{"issue":"3","key":"e_1_3_4_8_2","first-page":"e190393\u2013e190393","article-title":"Assessment of employee susceptibility to phishing attacks at US health care institutions","volume":"2","author":"Gordon William J.","year":"2019","unstructured":"William J. Gordon, Adam Wright, Ranjit Aiyagari, Leslie Corbo, Robert J. Glynn, Jigar Kadakia, Jack Kufahl, Christina Mazzone, James Noga, Mark Parkulo, et\u00a0al. 2019. Assessment of employee susceptibility to phishing attacks at US health care institutions. JAMA Network Open 2, 3 (2019), e190393\u2013e190393.","journal-title":"JAMA Network Open"},{"issue":"1","key":"e_1_3_4_9_2","first-page":"i13\u2013i17","article-title":"Lessons learned from usability testing of the VA\u2019s personal health record","volume":"18","author":"Haggstrom David A.","year":"2011","unstructured":"David A. Haggstrom, Jason J. Saleem, Alissa L. Russ, Josette Jones, Scott A. Russell, and Neale R. Chumbler. 2011. Lessons learned from usability testing of the VA\u2019s personal health record. Journal of the American Medical Informatics Association 18, Supplement_1 (2011), i13\u2013i17.","journal-title":"Journal of the American Medical Informatics Association"},{"issue":"3","key":"e_1_3_4_10_2","doi-asserted-by":"crossref","first-page":"216","DOI":"10.2345\/0899-8205-54.3.216","article-title":"Cyberinsights: COVID-19 and what it means for cybersecurity","volume":"54","author":"Wirth Axel","year":"2020","unstructured":"Axel Wirth. 2020. Cyberinsights: COVID-19 and what it means for cybersecurity. Biomedical Instrumentation and Technology 54, 3 (2020), 216\u2013219.","journal-title":"Biomedical Instrumentation and Technology"},{"key":"e_1_3_4_11_2","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1016\/j.sbspro.2013.10.509","article-title":"Linking strategic and market orientations to organizational performance: The role of innovation in private healthcare organizations","volume":"99","author":"Altunta\u015f G\u00fcltekin","year":"2013","unstructured":"G\u00fcltekin Altunta\u015f, Fatih Semerci\u00f6z, and Hanife Eregez. 2013. Linking strategic and market orientations to organizational performance: The role of innovation in private healthcare organizations. Procedia-Social and Behavioral Sciences 99 (2013), 413\u2013419.","journal-title":"Procedia-Social and Behavioral Sciences"},{"issue":"6","key":"e_1_3_4_12_2","doi-asserted-by":"crossref","first-page":"699","DOI":"10.1016\/j.healthpol.2017.03.016","article-title":"The role of private non-profit healthcare organizations in NHS systems: Implications for the Portuguese hospital devolution program","volume":"121","author":"Almeida \u00c1lvaro S.","year":"2017","unstructured":"\u00c1lvaro S. Almeida. 2017. The role of private non-profit healthcare organizations in NHS systems: Implications for the Portuguese hospital devolution program. Health Policy 121, 6 (2017), 699\u2013707.","journal-title":"Health Policy"},{"issue":"3","key":"e_1_3_4_13_2","first-page":"603","article-title":"The purpose and relevance of a scientific literature review: A holistic approach to research","volume":"41","author":"Majam Tasneem","year":"2006","unstructured":"Tasneem Majam and Francois Theron. 2006. The purpose and relevance of a scientific literature review: A holistic approach to research. Journal of Public Administration 41, 3 (2006), 603\u2013615.","journal-title":"Journal of Public Administration"},{"key":"e_1_3_4_14_2","volume-title":"Proceedings of the TPRC47: The 47th Research Conference on Communication, Information and Internet Policy","author":"Hadan Hilda","year":"2019","unstructured":"Hilda Hadan, Nicolas Serrano, Sanchari Das, and L Jean Camp. 2019. Making IoT worthy of human trust. In Proceedings of the TPRC47: The 47th Research Conference on Communication, Information and Internet Policy. Washington College of Law, Washington, DC, 12."},{"key":"e_1_3_4_15_2","volume-title":"A Risk-reduction-based Incentivization Model for Human-centered Multi-factor Authentication","author":"Das Sanchari","year":"2020","unstructured":"Sanchari Das. 2020. A Risk-reduction-based Incentivization Model for Human-centered Multi-factor Authentication. Ph.D. Dissertation. Indiana University."},{"issue":"10","key":"e_1_3_4_16_2","doi-asserted-by":"crossref","first-page":"e0204417","DOI":"10.1371\/journal.pone.0204417","article-title":"A systematic literature review of individuals\u2019 perspectives on privacy and genetic information in the United States","volume":"13","author":"Clayton Ellen W.","year":"2018","unstructured":"Ellen W. Clayton, Colin M. Halverson, Nila A. Sathe, and Bradley A. Malin. 2018. A systematic literature review of individuals\u2019 perspectives on privacy and genetic information in the United States. PLOS One 13, 10 (2018), e0204417.","journal-title":"PLOS One"},{"key":"e_1_3_4_17_2","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1016\/j.ijmedinf.2019.03.014","article-title":"Factors that affect the use of electronic personal health records among patients: A systematic review","volume":"126","author":"Abd-Alrazaq Alaa A.","year":"2019","unstructured":"Alaa A. Abd-Alrazaq, Bridgette M. Bewick, Tracey Farragher, and Peter Gardner. 2019. Factors that affect the use of electronic personal health records among patients: A systematic review. International Journal of Medical Informatics 126 (2019), 164\u2013175.","journal-title":"International Journal of Medical Informatics"},{"issue":"2","key":"e_1_3_4_18_2","first-page":"e3703","article-title":"Patient and provider attitudes toward the use of patient portals for the management of chronic disease: A systematic review","volume":"17","author":"Kruse Clemens Scott","year":"2015","unstructured":"Clemens Scott Kruse, Darcy A. Argueta, Lynsey Lopez, and Anju Nair. 2015. Patient and provider attitudes toward the use of patient portals for the management of chronic disease: A systematic review. Journal of Medical Internet Research 17, 2 (2015), e3703.","journal-title":"Journal of Medical Internet Research"},{"issue":"2","key":"e_1_3_4_19_2","doi-asserted-by":"crossref","first-page":"e12644","DOI":"10.2196\/12644","article-title":"Health care and cybersecurity: Bibliometric analysis of the literature","volume":"21","author":"Jalali Mohammad S.","year":"2019","unstructured":"Mohammad S. Jalali, Sabina Razak, William Gordon, Eric Perakslis, and Stuart Madnick. 2019. Health care and cybersecurity: Bibliometric analysis of the literature. Journal of Medical Internet Research 21, 2 (2019), e12644.","journal-title":"Journal of Medical Internet Research"},{"issue":"15","key":"e_1_3_4_20_2","doi-asserted-by":"crossref","first-page":"5119","DOI":"10.3390\/s21155119","article-title":"Influence of human factors on cyber security within healthcare organisations: A systematic review","volume":"21","author":"Nifakos Sokratis","year":"2021","unstructured":"Sokratis Nifakos, Krishna Chandramouli, Charoula Konstantina Nikolaou, Panagiotis Papachristou, Sabine Koch, Emmanouil Panaousis, and Stefano Bonacina. 2021. Influence of human factors on cyber security within healthcare organisations: A systematic review. Sensors 21, 15 (2021), 5119.","journal-title":"Sensors"},{"key":"e_1_3_4_21_2","doi-asserted-by":"crossref","first-page":"e414","DOI":"10.7717\/peerj-cs.414","article-title":"A systematic review of security and privacy issues in the internet of medical things; the role of machine learning approaches","volume":"7","author":"Hameed Shilan S.","year":"2021","unstructured":"Shilan S. Hameed, Wan Haslina Hassan, Liza Abdul Latiff, and Fahad Ghabban. 2021. A systematic review of security and privacy issues in the internet of medical things; the role of machine learning approaches. PeerJ Computer Science 7 (2021), e414.","journal-title":"PeerJ Computer Science"},{"issue":"6","key":"e_1_3_4_22_2","doi-asserted-by":"crossref","first-page":"e15654","DOI":"10.2196\/15654","article-title":"Challenges with developing secure mobile health applications: Systematic review","volume":"9","author":"Aljedaani Bakheet","year":"2021","unstructured":"Bakheet Aljedaani and M. Ali Babar. 2021. Challenges with developing secure mobile health applications: Systematic review. JMIR mHealth and uHealth 9, 6 (2021), e15654.","journal-title":"JMIR mHealth and uHealth"},{"issue":"6","key":"e_1_3_4_23_2","doi-asserted-by":"crossref","first-page":"e23250","DOI":"10.2196\/23250","article-title":"State-of-the-art in adoption of contact tracing apps and recommendations regarding privacy protection and public health: Systematic review","volume":"9","author":"Kolasa Katarzyna","year":"2021","unstructured":"Katarzyna Kolasa, Francesca Mazzi, Ewa Leszczuk-Czubkowska, Zsombor Zrubka, and M\u00e1rta P\u00e9ntek. 2021. State-of-the-art in adoption of contact tracing apps and recommendations regarding privacy protection and public health: Systematic review. JMIR mHealth and uHealth 9, 6 (2021), e23250.","journal-title":"JMIR mHealth and uHealth"},{"issue":"2","key":"e_1_3_4_24_2","doi-asserted-by":"crossref","first-page":"39","DOI":"10.5195\/ijt.2017.6231","article-title":"A systematic review of research studies examining telehealth privacy and security practices used by healthcare providers","volume":"9","author":"Watzlaf Valerie J. M.","year":"2017","unstructured":"Valerie J. M. Watzlaf, Leming Zhou, Dilhari R. DeAlmeida, and Linda M. Hartman. 2017. A systematic review of research studies examining telehealth privacy and security practices used by healthcare providers. International Journal of Telerehabilitation 9, 2 (2017), 39.","journal-title":"International Journal of Telerehabilitation"},{"issue":"4","key":"e_1_3_4_25_2","doi-asserted-by":"crossref","first-page":"264","DOI":"10.7326\/0003-4819-151-4-200908180-00135","article-title":"Preferred reporting items for systematic reviews and meta-analyses: The PRISMA statement","volume":"151","author":"Moher David","year":"2009","unstructured":"David Moher, Alessandro Liberati, Jennifer Tetzlaff, Douglas G. Altman, and PRISMA Group*. 2009. Preferred reporting items for systematic reviews and meta-analyses: The PRISMA statement. Annals of Internal Medicine 151, 4 (2009), 264\u2013269.","journal-title":"Annals of Internal Medicine"},{"key":"e_1_3_4_26_2","first-page":"1","volume-title":"Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems","author":"Stowell Elizabeth","year":"2018","unstructured":"Elizabeth Stowell, Mercedes C. Lyson, Herman Saksono, Rene\u00e9 C. Wurth, Holly Jimison, Misha Pavel, and Andrea G. Parker. 2018. Designing and evaluating mHealth interventions for vulnerable populations: A systematic review. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, Montreal, Canada, 1\u201317."},{"key":"e_1_3_4_27_2","volume-title":"Proceedings of the 13th International Symposium on Human Aspects of Information Security and Assurance (HAISA 2019)","author":"Das Sanchari","year":"2019","unstructured":"Sanchari Das, Andrew Kim, Zachary Tingle, and Christena Nippert-Eng. 2019. All about phishing exploring user research through a systematic literature review. In Proceedings of the 13th International Symposium on Human Aspects of Information Security and Assurance (HAISA 2019). Springer, Nicosia, Cyprus, 10."},{"key":"e_1_3_4_28_2","volume-title":"Proceedings of the 13th International Symposium on Human Aspects of Information Security and Assurance (HAISA 2019)","author":"Das Sanchari","year":"2019","unstructured":"Sanchari Das, Bingxing Wang, Zachary Tingle, and L. Jean Camp. 2019. Evaluating user perception of multi-factor authentication: A systematic review. In Proceedings of the 13th International Symposium on Human Aspects of Information Security and Assurance (HAISA 2019). Springer, Nicosia, Cyprus, 10."},{"issue":"3","key":"e_1_3_4_29_2","doi-asserted-by":"crossref","first-page":"e2020","DOI":"10.1002\/cav.2020","article-title":"Exploring evolution of augmented and virtual reality education space in 2020 through systematic literature review","volume":"32","author":"Noah Naheem","year":"2021","unstructured":"Naheem Noah and Sanchari Das. 2021. Exploring evolution of augmented and virtual reality education space in 2020 through systematic literature review. Computer Animation and Virtual Worlds 32, 3-4 (2021), e2020.","journal-title":"Computer Animation and Virtual Worlds"},{"key":"e_1_3_4_30_2","volume-title":"Proceedings of the 15th International Symposium on Human Aspects of Information Security and Assurance (HAISA 2021)-Virtual Conference","author":"Jones John M.","year":"2021","unstructured":"John M. Jones, Reyhan Duezguen, Peter Mayer, Melanie Volkamer, and Sanchari Das. 2021. A literature review on virtual reality authentication. In Proceedings of the 15th International Symposium on Human Aspects of Information Security and Assurance (HAISA 2021)-Virtual Conference. Springer, Virtual, 10."},{"key":"e_1_3_4_31_2","volume-title":"Proceedings of the Workshop on Usable Security and Privacy (USEC)","author":"Majumdar Ritajit","year":"2021","unstructured":"Ritajit Majumdar and Sanchari Das. 2021. SOK: An evaluation of quantum authentication through systematic literature review. In Proceedings of the Workshop on Usable Security and Privacy (USEC). Internet Society, Auckland, New Zealand, 10."},{"issue":"2","key":"e_1_3_4_32_2","doi-asserted-by":"crossref","first-page":"329","DOI":"10.3390\/jcp2020018","article-title":"Sok: An evaluation of the secure end user experience on the dark net through systematic literature review","volume":"2","author":"Tazi Faiza","year":"2022","unstructured":"Faiza Tazi, Sunny Shrestha, Junibel De La Cruz, and Sanchari Das. 2022. Sok: An evaluation of the secure end user experience on the dark net through systematic literature review. Journal of Cybersecurity and Privacy 2, 2 (2022), 329\u2013357.","journal-title":"Journal of Cybersecurity and Privacy"},{"key":"e_1_3_4_33_2","first-page":"866","volume-title":"Proceedings of the 2018 8th International Conference on Cloud Computing, Data Science and Engineering (Confluence)","author":"Gupta Vibhor","year":"2018","unstructured":"Vibhor Gupta and Garima Metha. 2018. Medical data security using cryptography. In Proceedings of the 2018 8th International Conference on Cloud Computing, Data Science and Engineering (Confluence). IEEE, IEEE, Noida, India, 866\u2013869."},{"key":"e_1_3_4_34_2","doi-asserted-by":"crossref","first-page":"1787","DOI":"10.1016\/j.procs.2019.09.350","article-title":"A blockchain based proposal for protecting healthcare systems through formal methods","volume":"159","author":"Brunese Luca","year":"2019","unstructured":"Luca Brunese, Francesco Mercaldo, Alfonso Reginelli, and Antonella Santone. 2019. A blockchain based proposal for protecting healthcare systems through formal methods. Procedia Computer Science 159 (2019), 1787\u20131794.","journal-title":"Procedia Computer Science"},{"key":"e_1_3_4_35_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jbi.2018.08.008","article-title":"POPCORN: A web service for individual PrognOsis prediction based on multi-center clinical data CollabORatioN without patient-level data sharing","volume":"86","author":"Tian Yu","year":"2018","unstructured":"Yu Tian, Yong Shang, Dan-Yang Tong, Sheng-Qiang Chi, Jun Li, Xiang-Xing Kong, Ke-Feng Ding, and Jing-Song Li. 2018. POPCORN: A web service for individual PrognOsis prediction based on multi-center clinical data CollabORatioN without patient-level data sharing. Journal of Biomedical Informatics 86 (2018), 1\u201314.","journal-title":"Journal of Biomedical Informatics"},{"key":"e_1_3_4_36_2","first-page":"221","volume-title":"Proceedings of the 2017 5th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","author":"Thamilarasu Geethapriya","year":"2017","unstructured":"Geethapriya Thamilarasu and Christopher Lakin. 2017. A security framework for mobile health applications. In Proceedings of the 2017 5th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW). IEEE, Prague, Czech Republic, 221\u2013226. DOI:10.1109\/FiCloudW.2017.96"},{"key":"e_1_3_4_37_2","first-page":"1","volume-title":"Proceedings of the 2016 IEEE International Conference on Serious Games and Applications for Health (SeGAH)","author":"Ibrahim Ahmed","year":"2016","unstructured":"Ahmed Ibrahim, Baban Mahmood, and Mukesh Singhal. 2016. A secure framework for sharing electronic health records over clouds. In Proceedings of the 2016 IEEE International Conference on Serious Games and Applications for Health (SeGAH). IEEE, Orlando, FL, 1\u20138. DOI:10.1109\/SeGAH.2016.7586273"},{"key":"e_1_3_4_38_2","first-page":"429","volume-title":"Proceedings of the 2020 IEEE International Conference on Communication, Networks and Satellite (Comnetsat)","author":"Zalloum Mutaz","year":"2020","unstructured":"Mutaz Zalloum and Hosam Alamleh. 2020. Privacy preserving architecture for healthcare information systems. In Proceedings of the 2020 IEEE International Conference on Communication, Networks and Satellite (Comnetsat). IEEE, Batam, Indonesia, 429\u2013432. DOI:10.1109\/Comnetsat50391.2020.9328985"},{"key":"e_1_3_4_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.smhl.2018.07.012"},{"key":"e_1_3_4_40_2","doi-asserted-by":"crossref","first-page":"25167","DOI":"10.1109\/ACCESS.2018.2817560","article-title":"A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure","volume":"6","author":"Walker-Roberts Steven","year":"2018","unstructured":"Steven Walker-Roberts, Mohammad Hammoudeh, and Ali Dehghantanha. 2018. A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure. IEEE Access 6 (2018), 25167\u201325177.","journal-title":"IEEE Access"},{"key":"e_1_3_4_41_2","first-page":"5182","volume-title":"Proceedings of the 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference","author":"Paksuniemi M.","year":"2006","unstructured":"M. Paksuniemi, Hannu Sorvoja, Esko Alasaarela, and Risto Myllyla. 2006. Wireless sensor and data transmission needs and technologies for patient monitoring in the operating room and intensive care unit. In Proceedings of the 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference. IEEE, IEEE, Shanghai, China, 5182\u20135185."},{"key":"e_1_3_4_42_2","first-page":"106","volume-title":"Proceedings of the IEEE Southeastcon\u201999. Technology on the Brink of 2000 (Cat. No. 99CH36300)","author":"Wang Cliff X.","year":"1999","unstructured":"Cliff X. Wang. 1999. Security issues to tele-medicine system design. In Proceedings of the IEEE Southeastcon\u201999. Technology on the Brink of 2000 (Cat. No. 99CH36300). IEEE, IEEE, Lexington, Kentucky, 106\u2013109."},{"key":"e_1_3_4_43_2","first-page":"5705","volume-title":"Proceedings of the 2020 42nd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)","author":"Spanakis Emmanouil G.","year":"2020","unstructured":"Emmanouil G. Spanakis, Silvia Bonomi, Stelios Sfakianakis, Giuseppe Santucci, Simone Lenti, Mara Sorella, Florin D. Tanasache, Alessia Palleschi, Claudio Ciccotelli, and Vangelis Sakkalis. 2020. Cyber-attacks and threats for healthcare\u2013a multi-layer thread analysis. In Proceedings of the 2020 42nd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). IEEE, IEEE, Virtual, 5705\u20135708."},{"key":"e_1_3_4_44_2","first-page":"1","volume-title":"Proceedings of the 2021 International Conference on Engineering Management of Communication and Technology (EMCTECH)","author":"Lopatina Kate","year":"2021","unstructured":"Kate Lopatina, V. A. Dokuchaev, and V. V. Maklachkova. 2021. Data risks identification in healthcare sensor networks. In Proceedings of the 2021 International Conference on Engineering Management of Communication and Technology (EMCTECH). IEEE, IEEE, Vienna, Austria, 1\u20137."},{"key":"e_1_3_4_45_2","first-page":"1","volume-title":"Proceedings of the 2020 IEEE 8th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)","author":"Romanovs Andrejs","year":"2021","unstructured":"Andrejs Romanovs, Edgars Sultanovs, Egons Buss, Yuri Merkuryev, and Ginta Majore. 2021. Challenges and solutions for resilient telemedicine services. In Proceedings of the 2020 IEEE 8th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE). IEEE, IEEE, Vilnius, Lithuania, 1\u20137."},{"issue":"1","key":"e_1_3_4_46_2","first-page":"1","article-title":"Survey of patient and public perceptions of electronic health records for healthcare, policy and research: Study protocol","volume":"12","author":"Luchenski Serena","year":"2012","unstructured":"Serena Luchenski, Anjali Balasanthiran, Cicely Marston, Kaori Sasaki, Azeem Majeed, Derek Bell, and Julie E. Reed. 2012. Survey of patient and public perceptions of electronic health records for healthcare, policy and research: Study protocol. BMC Medical Informatics and Decision Making 12, 1 (2012), 1\u20136.","journal-title":"BMC Medical Informatics and Decision Making"},{"issue":"1","key":"e_1_3_4_47_2","first-page":"1","article-title":"Psychological factors shaping public responses to COVID-19 digital contact tracing technologies in Germany","volume":"11","author":"Kozyreva Anastasia","year":"2021","unstructured":"Anastasia Kozyreva, Philipp Lorenz-Spreen, Stephan Lewandowsky, Paul M. Garrett, Stefan M. Herzog, Thorsten Pachur, and Ralph Hertwig. 2021. Psychological factors shaping public responses to COVID-19 digital contact tracing technologies in Germany. Scientific Reports 11, 1 (2021), 1\u201319.","journal-title":"Scientific Reports"},{"issue":"4","key":"e_1_3_4_48_2","first-page":"e1781","article-title":"Analysis of the definition and utility of personal health records using Q methodology","volume":"13","author":"Kim Jeongeun","year":"2011","unstructured":"Jeongeun Kim and David W. Bates. 2011. Analysis of the definition and utility of personal health records using Q methodology. Journal of Medical Internet Research 13, 4 (2011), e1781.","journal-title":"Journal of Medical Internet Research"},{"key":"e_1_3_4_49_2","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.nedt.2019.05.007","article-title":"Perceptions of Turkish health professional students toward the effects of the internet of things (IOT) technology in the future","volume":"79","author":"Bodur Gonul","year":"2019","unstructured":"Gonul Bodur, Secim Gumus, and Nazli Gul Gursoy. 2019. Perceptions of Turkish health professional students toward the effects of the internet of things (IOT) technology in the future. Nurse Education Today 79 (2019), 98\u2013104.","journal-title":"Nurse Education Today"},{"key":"e_1_3_4_50_2","doi-asserted-by":"crossref","first-page":"102864","DOI":"10.1016\/j.nepr.2020.102864","article-title":"Simulated electronic health documentation: A cross-sectional exploration of factors influencing nursing students\u2019 intention to use","volume":"48","author":"Chan Kim Geok","year":"2020","unstructured":"Kim Geok Chan, Saloma Pawi, Mei Fong Ong, Yanika Kowitlawakul, and Siew Ching Goy. 2020. Simulated electronic health documentation: A cross-sectional exploration of factors influencing nursing students\u2019 intention to use. Nurse Education in Practice 48 (2020), 102864.","journal-title":"Nurse Education in Practice"},{"issue":"3","key":"e_1_3_4_51_2","doi-asserted-by":"crossref","first-page":"195","DOI":"10.14236\/jhi.v13i3.597","article-title":"Pandora\u2019s electronic box: GPs reflect upon e-mail communication with their patients","volume":"13","author":"Goodyear-Smith Felicity","year":"2005","unstructured":"Felicity Goodyear-Smith, Andy Wearn, Hans Everts, Peter Huggard, and Joan Halliwell. 2005. Pandora\u2019s electronic box: GPs reflect upon e-mail communication with their patients. Journal of Innovation in Health Informatics 13, 3 (2005), 195\u2013202.","journal-title":"Journal of Innovation in Health Informatics"},{"issue":"3","key":"e_1_3_4_52_2","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1177\/1460458209337435","article-title":"New Zealanders\u2019 attitudes towards access to their electronic health records: Preliminary results from a national study using vignettes","volume":"15","author":"Hunter Inga M.","year":"2009","unstructured":"Inga M. Hunter, Richard J. Whiddett, Anthony C. Norris, Barry W. McDonald, and John A. Waldon. 2009. New Zealanders\u2019 attitudes towards access to their electronic health records: Preliminary results from a national study using vignettes. Health Informatics Journal 15, 3 (2009), 212\u2013228.","journal-title":"Health Informatics Journal"},{"issue":"1","key":"e_1_3_4_53_2","first-page":"1","article-title":"Young people\u2019s views on the potential use of telemedicine consultations for sexual health: Results of a national survey","volume":"11","author":"Garrett Cameryn C.","year":"2011","unstructured":"Cameryn C. Garrett, Jane Hocking, Marcus Y. Chen, Christopher K. Fairley, and Maggie Kirkman. 2011. Young people\u2019s views on the potential use of telemedicine consultations for sexual health: Results of a national survey. BMC Infectious Diseases 11, 1 (2011), 1\u201311.","journal-title":"BMC Infectious Diseases"},{"key":"e_1_3_4_54_2","doi-asserted-by":"crossref","first-page":"826","DOI":"10.1109\/ICIT52682.2021.9491781","volume-title":"Proceedings of the 2021 International Conference on Information Technology (ICIT)","author":"Daraghmeh Rania","year":"2021","unstructured":"Rania Daraghmeh and Raymond Brown. 2021. A big data maturity model for electronic health records in hospitals. In Proceedings of the 2021 International Conference on Information Technology (ICIT). IEEE, IEEE, Amman, Jordan, 826\u2013833."},{"key":"e_1_3_4_55_2","doi-asserted-by":"crossref","first-page":"721","DOI":"10.2147\/IJGM.S301800","article-title":"Physicians\u2019 knowledge, perceptions, and attitudes related to patient confidentiality and data sharing","volume":"14","author":"Karasneh Reema","year":"2021","unstructured":"Reema Karasneh, Abdel-Hameed Al-Mistarehi, Sayer Al-Azzam, Sawsan Abuhammad, Suhaib M. Muflih, Sahar Hawamdeh, and Karem H. Alzoubi. 2021. Physicians\u2019 knowledge, perceptions, and attitudes related to patient confidentiality and data sharing. International Journal of General Medicine 14 (2021), 721.","journal-title":"International Journal of General Medicine"},{"issue":"1","key":"e_1_3_4_56_2","first-page":"1","article-title":"WhatsApp Tele-Medicine\u2013usage patterns and physicians views on the platform","volume":"10","author":"Barayev Edward","year":"2021","unstructured":"Edward Barayev, Omri Shental, Dotan Yaari, Elchanan Zloczower, Itai Shemesh, Michael Shapiro, Elon Glassberg, and Racheli Magnezi. 2021. WhatsApp Tele-Medicine\u2013usage patterns and physicians views on the platform. Israel Journal of Health Policy Research 10, 1 (2021), 1\u20139.","journal-title":"Israel Journal of Health Policy Research"},{"issue":"6","key":"e_1_3_4_57_2","doi-asserted-by":"crossref","first-page":"1040","DOI":"10.1007\/s10278-013-9618-3","article-title":"The information security needs in radiological information systemsan insight on state hospitals of iran, 2012","volume":"26","author":"Farhadi Akram","year":"2013","unstructured":"Akram Farhadi and Maryam Ahmadi. 2013. The information security needs in radiological information systemsan insight on state hospitals of iran, 2012. Journal of Digital Imaging 26, 6 (2013), 1040\u20131044.","journal-title":"Journal of Digital Imaging"},{"key":"e_1_3_4_58_2","doi-asserted-by":"crossref","first-page":"103936","DOI":"10.1016\/j.ijmedinf.2019.07.015","article-title":"Attitudes of patients towards digital information retrieval by their physician at point of care in an ambulatory setting","volume":"130","author":"Shaarani Issam","year":"2019","unstructured":"Issam Shaarani, Hussein Berjaoui, Alaa Daher, Mayar Khalil, Abed El Rahman Al Rifai, Radwan Saati, and Jumana Antoun. 2019. Attitudes of patients towards digital information retrieval by their physician at point of care in an ambulatory setting. International Journal of Medical Informatics 130 (2019), 103936.","journal-title":"International Journal of Medical Informatics"},{"issue":"5","key":"e_1_3_4_59_2","first-page":"1","article-title":"Sustaining patient portal continuous use intention and enhancing deep structure usage: Cognitive dissonance effects of health professional encouragement and security concerns","volume":"24","author":"Moqbel Murad","year":"2021","unstructured":"Murad Moqbel, Barbara Hewitt, Fiona Fui-Hoon Nah, and Rosann M. McLean. 2021. Sustaining patient portal continuous use intention and enhancing deep structure usage: Cognitive dissonance effects of health professional encouragement and security concerns. Information Systems Frontiers 24, 5 (2021), 1\u201314.","journal-title":"Information Systems Frontiers"},{"key":"e_1_3_4_60_2","first-page":"1","volume-title":"Proceedings of the 2020 5th International Conference on Informatics and Computing (ICIC)","author":"Fitriani Widia Resti","year":"2020","unstructured":"Widia Resti Fitriani, Arief Fadli Wicaksono, Danang Gagastama Joewono, Muhammad Zidane Zaffar, Reza Akbar Shahputra, Zieggy Ronnavelly, Achmad Nizar Hidayanto, and Lim Yohanes Stefanus. 2020. The antecedents of trust and their influence on M-health adoption. In Proceedings of the 2020 5th International Conference on Informatics and Computing (ICIC). IEEE, IEEE, Virtual, 1\u20136."},{"issue":"5","key":"e_1_3_4_61_2","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1097\/JHQ.0000000000000115","article-title":"Promoting secure provider-to-provider communication with electronic health record messaging: An educational outreach study","volume":"40","author":"Walsh Kathleen E.","year":"2018","unstructured":"Kathleen E. Walsh, Jessica L. Secor, Jon S. Matsumura, Margaret L. Schwarze, Beth E. Potter, Peter Newcomer, Michael K. Kim, and Christie M. Bartels. 2018. Promoting secure provider-to-provider communication with electronic health record messaging: An educational outreach study. Journal for Healthcare Quality 40, 5 (2018), 283.","journal-title":"Journal for Healthcare Quality"},{"issue":"12","key":"e_1_3_4_62_2","doi-asserted-by":"crossref","first-page":"e15870","DOI":"10.2196\/15870","article-title":"Attitudes toward blockchain technology in managing medical information: Survey study","volume":"21","author":"Hau Yong Sauk","year":"2019","unstructured":"Yong Sauk Hau, Jae Min Lee, Jaechan Park, and Min Cheol Chang. 2019. Attitudes toward blockchain technology in managing medical information: Survey study. Journal of Medical Internet Research 21, 12 (2019), e15870.","journal-title":"Journal of Medical Internet Research"},{"key":"e_1_3_4_63_2","doi-asserted-by":"crossref","first-page":"104401","DOI":"10.1016\/j.ijmedinf.2021.104401","article-title":"Do data security measures, privacy regulations, and communication standards impact the interoperability of patient health information? A cross-country investigation","volume":"148","author":"Shrivastava Utkarsh","year":"2021","unstructured":"Utkarsh Shrivastava, Jiahe Song, Bernard T. Han, and Doug Dietzman. 2021. Do data security measures, privacy regulations, and communication standards impact the interoperability of patient health information? A cross-country investigation. International Journal of Medical Informatics 148 (2021), 104401.","journal-title":"International Journal of Medical Informatics"},{"issue":"1","key":"e_1_3_4_64_2","first-page":"1","article-title":"The intention to use an electronic health record and its antecedents among three different categories of clinical staff","volume":"18","author":"Vitari Claudio","year":"2018","unstructured":"Claudio Vitari and Roxana Ologeanu-Taddei. 2018. The intention to use an electronic health record and its antecedents among three different categories of clinical staff. BMC Health Services Research 18, 1 (2018), 1\u20139.","journal-title":"BMC Health Services Research"},{"issue":"567","key":"e_1_3_4_65_2","first-page":"e344\u2013e352","article-title":"Violations of medical confidentiality: Opinions of primary care physicians","volume":"59","author":"Elger Bernice S.","year":"2009","unstructured":"Bernice S. Elger. 2009. Violations of medical confidentiality: Opinions of primary care physicians. British Journal of General Practice 59, 567 (2009), e344\u2013e352.","journal-title":"British Journal of General Practice"},{"key":"e_1_3_4_66_2","first-page":"443","volume-title":"Proceedings of the 2020 IEEE 33rd International Symposium on Computer-Based Medical Systems (CBMS)","author":"Alaqra Ala Sarah","year":"2020","unstructured":"Ala Sarah Alaqra and Bridget Kane. 2020. Wearable devices and measurement data: An empirical study on ehealth and data sharing. In Proceedings of the 2020 IEEE 33rd International Symposium on Computer-Based Medical Systems (CBMS). IEEE, Virtual, 443\u2013448."},{"issue":"488","key":"e_1_3_4_67_2","first-page":"204","article-title":"Electronic transfer of prescription-related information: Comparing views of patients, general practitioners, and pharmacists.","volume":"53","author":"Porteous Terry","year":"2003","unstructured":"Terry Porteous, Christine Bond, Roma Robertson, Philip Hannaford, and Ehud Reiter. 2003. Electronic transfer of prescription-related information: Comparing views of patients, general practitioners, and pharmacists. The British Journal of General Practice 53, 488 (2003), 204.","journal-title":"The British Journal of General Practice"},{"issue":"1","key":"e_1_3_4_68_2","first-page":"1","article-title":"Patient access to complex chronic disease records on the Internet","volume":"12","author":"Bartlett Cherry","year":"2012","unstructured":"Cherry Bartlett, Keith Simpson, and A. Neil Turner. 2012. Patient access to complex chronic disease records on the Internet. BMC Medical Informatics and Decision Making 12, 1 (2012), 1\u20137.","journal-title":"BMC Medical Informatics and Decision Making"},{"issue":"04","key":"e_1_3_4_69_2","doi-asserted-by":"crossref","first-page":"983","DOI":"10.4338\/ACI-2016-07-RA-0107","article-title":"Improving individual acceptance of health clouds through confidentiality assurance","volume":"7","author":"Ermakova Tatiana","year":"2016","unstructured":"Tatiana Ermakova, Benjamin Fabian, and R\u00fcdiger Zarnekow. 2016. Improving individual acceptance of health clouds through confidentiality assurance. Applied Clinical Informatics 7, 04 (2016), 983\u2013993.","journal-title":"Applied Clinical Informatics"},{"issue":"2","key":"e_1_3_4_70_2","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/0167-4048(91)90008-2","article-title":"Data security in medical information systems: The Greek case","volume":"10","author":"Gritzalis Dimitris","year":"1991","unstructured":"Dimitris Gritzalis, A. Tomaras, S. Katsikas, and J. Keklikoglou. 1991. Data security in medical information systems: The Greek case. Computers and Security 10, 2 (1991), 141\u2013159.","journal-title":"Computers and Security"},{"issue":"2","key":"e_1_3_4_71_2","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/0167-4048(92)90042-P","article-title":"Determining access rights for medical information systems","volume":"11","author":"Gritzalis Dimitris","year":"1992","unstructured":"Dimitris Gritzalis, S. Katsikas, J. Keklikoglou, and A. Tomaras. 1992. Determining access rights for medical information systems. Computers and Security 11, 2 (1992), 149\u2013161.","journal-title":"Computers and Security"},{"key":"e_1_3_4_72_2","first-page":"482","volume-title":"Proceedings of the 2020 International Conference on Information Management and Technology (ICIMTech)","author":"Meigasari Dira Ayu","year":"2020","unstructured":"Dira Ayu Meigasari, Putu Wuri Handayani, Achmad Nizar Hidayanto, and Dumilah Ayuningtyas. 2020. Do electronic personal health records (E-PHR) influence people behavior to manage their health?. In Proceedings of the 2020 International Conference on Information Management and Technology (ICIMTech). IEEE, IEEE, Bandung, Indonesia, 482\u2013487."},{"key":"e_1_3_4_73_2","first-page":"1","volume-title":"Proceedings of the 2021 IEEE International Conference on Health, Instrumentation and Measurement, and Natural Sciences (InHeNce)","author":"Ramli Kalamullah","year":"2021","unstructured":"Kalamullah Ramli. 2021. HIPAA-based analysis on the awareness level of medical personnel in indonesia to secure electronic protected health information (ePHI). In Proceedings of the 2021 IEEE International Conference on Health, Instrumentation and Measurement, and Natural Sciences (InHeNce). IEEE, IEEE, Medan, Indonesia, 1\u20136."},{"issue":"4","key":"e_1_3_4_74_2","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1016\/j.tele.2017.12.020","article-title":"Privacy management of patient physiological parameters","volume":"35","author":"Masood Isma","year":"2018","unstructured":"Isma Masood, Yongli Wang, Ali Daud, Naif Radi Aljohani, and Hassan Dawood. 2018. Privacy management of patient physiological parameters. Telematics and Informatics 35, 4 (2018), 677\u2013701.","journal-title":"Telematics and Informatics"},{"issue":"4","key":"e_1_3_4_75_2","doi-asserted-by":"crossref","first-page":"2084","DOI":"10.3390\/ijerph18042084","article-title":"Structural model of the healthcare information security behavior of nurses applying protection motivation theory","volume":"18","author":"Lee EunWon","year":"2021","unstructured":"EunWon Lee and GyeongAe Seomun. 2021. Structural model of the healthcare information security behavior of nurses applying protection motivation theory. International Journal of Environmental Research and Public Health 18, 4 (2021), 2084.","journal-title":"International Journal of Environmental Research and Public Health"},{"issue":"8","key":"e_1_3_4_76_2","doi-asserted-by":"crossref","first-page":"604","DOI":"10.1089\/tmj.2011.0261","article-title":"Physicians\u2019 perceptions and use of a health information exchange: A pilot program in South Korea","volume":"18","author":"Lee Sang-il","year":"2012","unstructured":"Sang-il Lee, Hayoung Park, Jeong-Whun Kim, Hee Hwang, Eun-Young Cho, Yoon Kim, and Kyooseob Ha. 2012. Physicians\u2019 perceptions and use of a health information exchange: A pilot program in South Korea. Telemedicine and e-Health 18, 8 (2012), 604\u2013612.","journal-title":"Telemedicine and e-Health"},{"issue":"1","key":"e_1_3_4_77_2","first-page":"1","article-title":"Factors influencing consumer adoption of USB-based Personal Health Records in Taiwan","volume":"12","author":"Jian Wen-Shan","year":"2012","unstructured":"Wen-Shan Jian, Shabbir Syed-Abdul, Sanjay P. Sood, Peisan Lee, Min-Huei Hsu, Cheng-Hsun Ho, Yu-Chuan Li, and Hsyien-Chia Wen. 2012. Factors influencing consumer adoption of USB-based Personal Health Records in Taiwan. BMC Health Services Research 12, 1 (2012), 1\u20138.","journal-title":"BMC Health Services Research"},{"key":"e_1_3_4_78_2","first-page":"576","volume-title":"Proceedings of the 13th International Conference on Theory and Practice of Electronic Governance","author":"Pai Rajesh R.","year":"2020","unstructured":"Rajesh R. Pai and Sreejith Alathur. 2020. Determinants of mobile health application awareness and use in India: An empirical analysis. In Proceedings of the 13th International Conference on Theory and Practice of Electronic Governance. ACM, Athens Greece, 576\u2013584."},{"issue":"1","key":"e_1_3_4_79_2","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.eujim.2014.09.134","article-title":"Chinese medicine students\u2019 views on electronic prescribing: A survey in Hong Kong","volume":"7","author":"Hsu Warrington Wen Qiang","year":"2015","unstructured":"Warrington Wen Qiang Hsu, Esther Wai Yin Chan, Zhang Jin Zhang, Zhi Xiu Lin, Zhao Xiang Bian, and Ian Chi Kei Wong. 2015. Chinese medicine students\u2019 views on electronic prescribing: A survey in Hong Kong. European Journal of Integrative Medicine 7, 1 (2015), 47\u201354.","journal-title":"European Journal of Integrative Medicine"},{"key":"e_1_3_4_80_2","first-page":"169","volume-title":"Proceedings of the 2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC)","author":"Dykstra Josiah","year":"2020","unstructured":"Josiah Dykstra, Rohan Mathur, and Alicia Spoor. 2020. Cybersecurity in medical private practice: Results of a survey in audiology. In Proceedings of the 2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC). IEEE, Virtual, 169\u2013176."},{"issue":"3","key":"e_1_3_4_81_2","doi-asserted-by":"crossref","first-page":"e28501","DOI":"10.2196\/28501","article-title":"Examining how internet users trust and access electronic health record patient portals: Survey study","volume":"8","year":"2021","unstructured":"Rong Yin, Katherine Law, and David Neyens. 2021. Examining how internet users trust and access electronic health record patient portals: Survey study. JMIR Human Factors 8, 3 (2021), e28501.","journal-title":"JMIR Human Factors"},{"issue":"1","key":"e_1_3_4_82_2","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1136\/amiajnl-2012-000906","article-title":"Security practices and regulatory compliance in the healthcare industry","volume":"20","author":"Kwon Juhee","year":"2013","unstructured":"Juhee Kwon and M. Eric Johnson. 2013. Security practices and regulatory compliance in the healthcare industry. Journal of the American Medical Informatics Association 20, 1 (2013), 44\u201351.","journal-title":"Journal of the American Medical Informatics Association"},{"issue":"8","key":"e_1_3_4_83_2","first-page":"e487","article-title":"Trends in public perceptions of electronic health records during early years of meaningful use","volume":"21","author":"Ancker Jessica S.","year":"2015","unstructured":"Jessica S. Ancker, Samantha Brenner, Joshua E. Richardson, Michael Silver, and Rainu Kaushal. 2015. Trends in public perceptions of electronic health records during early years of meaningful use. The American Journal of Managed Care 21, 8 (2015), e487.","journal-title":"The American Journal of Managed Care"},{"issue":"1","key":"e_1_3_4_84_2","doi-asserted-by":"crossref","first-page":"e16775","DOI":"10.2196\/16775","article-title":"Why employees (still) click on phishing links: investigation in hospitals","volume":"22","author":"Jalali Mohammad S.","year":"2020","unstructured":"Mohammad S. Jalali, Maike Bruckes, Daniel Westmattelmann, and Gerhard Schewe. 2020. Why employees (still) click on phishing links: investigation in hospitals. Journal of Medical Internet Research 22, 1 (2020), e16775.","journal-title":"Journal of Medical Internet Research"},{"issue":"1","key":"e_1_3_4_85_2","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1197\/jamia.M3341","article-title":"Openness of patients\u2019 reporting with use of electronic records: Psychiatric clinicians\u2019 views","volume":"17","author":"Salomon Ronald M.","year":"2010","unstructured":"Ronald M. Salomon, Jennifer Urbano Blackford, S. Trent Rosenbloom, Sandra Seidel, Ellen Wright Clayton, David M. Dilts, and Stuart G. Finder. 2010. Openness of patients\u2019 reporting with use of electronic records: Psychiatric clinicians\u2019 views. Journal of the American Medical Informatics Association 17, 1 (2010), 54\u201360.","journal-title":"Journal of the American Medical Informatics Association"},{"issue":"4","key":"e_1_3_4_86_2","first-page":"e1668","article-title":"Consumers\u2019 perceptions about and use of the internet for personal health records and health information exchange: analysis of the 2007 Health Information National Trends Survey","volume":"12","year":"2010","unstructured":"Kuang-Yi Wen, Gary Kreps, Fang Zhu, and Suzanne Miller. 2010. Consumers\u2019 perceptions about and use of the internet for personal health records and health information exchange: analysis of the 2007 Health Information National Trends Survey. Journal of Medical Internet Research 12, 4 (2010), e1668.","journal-title":"Journal of Medical Internet Research"},{"issue":"6","key":"e_1_3_4_87_2","first-page":"e2278","article-title":"Patient perceptions of a personal health record: A test of the diffusion of innovation model","volume":"14","author":"Emani Srinivas","year":"2012","unstructured":"Srinivas Emani, Cyrus K. Yamin, Ellen Peters, Andrew S. Karson, Stuart R. Lipsitz, Jonathan S. Wald, Deborah H. Williams, David W. Bates, et\u00a0al. 2012. Patient perceptions of a personal health record: A test of the diffusion of innovation model. Journal of Medical Internet Research 14, 6 (2012), e2278.","journal-title":"Journal of Medical Internet Research"},{"issue":"02","key":"e_1_3_4_88_2","doi-asserted-by":"crossref","first-page":"224","DOI":"10.4338\/ACI-2014-11-RA-0107","article-title":"Testing the electronic personal health record acceptance model by nurses for managing their own health","volume":"6","author":"Gartrell Kyungsook","year":"2015","unstructured":"Kyungsook Gartrell, A. M. Trinkoff, C. L. Storr, M. L. Wilson, and A. P. Gurses. 2015. Testing the electronic personal health record acceptance model by nurses for managing their own health. Applied clinical informatics 6, 02 (2015), 224\u2013247.","journal-title":"Applied clinical informatics"},{"issue":"04","key":"e_1_3_4_89_2","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.4338\/ACI-2017-05-RA-0088","article-title":"Clinical practice informs secure messaging benefits and best practices","volume":"8","author":"Haun Jolie N.","year":"2017","unstructured":"Jolie N. Haun, Wendy Hathaway, Margeaux Chavez, Nicole Antinori, Brian Vetter, Brian K. Miller, Tracey L. Martin, Lisa Kendziora, Kim M. Nazi, and Christine Melillo. 2017. Clinical practice informs secure messaging benefits and best practices. Applied Clinical Informatics 8, 04 (2017), 1003\u20131011.","journal-title":"Applied Clinical Informatics"},{"issue":"23","key":"e_1_3_4_90_2","doi-asserted-by":"crossref","first-page":"2202","DOI":"10.1056\/NEJMsa1713258","article-title":"Clinical trial participants\u2019 views of the risks and benefits of data sharing","volume":"378","author":"Mello Michelle M.","year":"2018","unstructured":"Michelle M. Mello, Van Lieou, and Steven N. Goodman. 2018. Clinical trial participants\u2019 views of the risks and benefits of data sharing. New England Journal of Medicine 378, 23 (2018), 2202\u20132211.","journal-title":"New England Journal of Medicine"},{"key":"e_1_3_4_91_2","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/j.ijmedinf.2019.04.003","article-title":"Patient perspectives on the linkage of health data for research: Insights from an online patient community questionnaire","volume":"127","author":"O\u2019Brien Emily C.","year":"2019","unstructured":"Emily C. O\u2019Brien, Ana Maria Rodriguez, Hye-Chung Kum, Laura E. Schanberg, Marcy Fitz-Randolph, Sean M. O\u2019Brien, and Soko Setoguchi. 2019. Patient perspectives on the linkage of health data for research: Insights from an online patient community questionnaire. International Journal of Medical Informatics 127 (2019), 9\u201317.","journal-title":"International Journal of Medical Informatics"},{"key":"e_1_3_4_92_2","first-page":"1076","volume-title":"Proceedings of the AMIA Annual Symposium.","author":"Richardson Joshua E.","year":"2015","unstructured":"Joshua E. Richardson and Jessica S. Ancker. 2015. Public perspectives of mobile phones\u2019 effects on healthcare quality and medical data security and privacy: A 2-year nationwide survey. In Proceedings of the AMIA Annual Symposium. American Medical Informatics Association, American Medical Informatics Association, San Francisco, CA, 1076."},{"issue":"11","key":"e_1_3_4_93_2","doi-asserted-by":"crossref","first-page":"1927","DOI":"10.2105\/AJPH.2005.071720","article-title":"Patient privacy and conflicting legal and ethical obligations in El Salvador: Reporting of unlawful abortions","volume":"96","author":"McNaughton Heathe Luz","year":"2006","unstructured":"Heathe Luz McNaughton, Ellen M. H. Mitchell, Emilia G. Hernandez, Karen Padilla, and Marta Maria Blandon. 2006. Patient privacy and conflicting legal and ethical obligations in El Salvador: Reporting of unlawful abortions. American Journal of Public Health 96, 11 (2006), 1927\u20131933.","journal-title":"American Journal of Public Health"},{"issue":"5","key":"e_1_3_4_94_2","doi-asserted-by":"crossref","first-page":"e01735","DOI":"10.1016\/j.heliyon.2019.e01735","article-title":"Health information technology acceptance framework for diabetes management","volume":"5","author":"Ayanlade O. S.","year":"2019","unstructured":"O. S. Ayanlade, T. O. Oyebisi, and B. A. Kolawole. 2019. Health information technology acceptance framework for diabetes management. Heliyon 5, 5 (2019), e01735.","journal-title":"Heliyon"},{"key":"e_1_3_4_95_2","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1016\/j.procs.2016.09.063","article-title":"Health organizations\u2019 adoption and use of mobile technology in France, the USA and UK","volume":"98","author":"Currie Wendy","year":"2016","unstructured":"Wendy Currie. 2016. Health organizations\u2019 adoption and use of mobile technology in France, the USA and UK. Procedia Computer Science 98 (2016), 413\u2013418.","journal-title":"Procedia Computer Science"},{"issue":"3","key":"e_1_3_4_96_2","doi-asserted-by":"crossref","first-page":"e26399","DOI":"10.2196\/26399","article-title":"Health care students\u2019 knowledge of and attitudes, beliefs, and practices toward the French COVID-19 app: Cross-sectional questionnaire study","volume":"23","year":"2021","unstructured":"Ilaria Montagni, Nicolas Roussel, Rodolphe Thi\u00e9baut, and Christophe Tzourio. 2021. Health care students\u2019 knowledge of and attitudes, beliefs, and practices toward the French COVID-19 app: Cross-sectional questionnaire study. Journal of Medical Internet Research 23, 3 (2021), e26399.","journal-title":"Journal of Medical Internet Research"},{"issue":"1","key":"e_1_3_4_97_2","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.healthpol.2017.08.006","article-title":"eHealth in integrated care programs for people with multimorbidity in Europe: Insights from the ICARE4EU project","volume":"122","author":"Melchiorre Maria Gabriella","year":"2018","unstructured":"Maria Gabriella Melchiorre, Roberta Papa, Mieke Rijken, Ewout van Ginneken, Anneli Hujala, and Francesco Barbabella. 2018. eHealth in integrated care programs for people with multimorbidity in Europe: Insights from the ICARE4EU project. Health Policy 122, 1 (2018), 53\u201363.","journal-title":"Health Policy"},{"key":"e_1_3_4_98_2","doi-asserted-by":"crossref","first-page":"104439","DOI":"10.1016\/j.ijmedinf.2021.104439","article-title":"Co-creating social licence for sharing health and care data","volume":"149","author":"Fylan Fiona","year":"2021","unstructured":"Fiona Fylan and Beth Fylan. 2021. Co-creating social licence for sharing health and care data. International Journal of Medical Informatics 149 (2021), 104439.","journal-title":"International Journal of Medical Informatics"},{"issue":"498","key":"e_1_3_4_99_2","first-page":"38","article-title":"Patients\u2019 experiences when accessing their on-line electronic patient records in primary care.","volume":"54","author":"Pyper Cecilia","year":"2004","unstructured":"Cecilia Pyper, Justin Amery, Marion Watson, and Claire Crook. 2004. Patients\u2019 experiences when accessing their on-line electronic patient records in primary care. The British Journal of General Practice 54, 498 (2004), 38.","journal-title":"The British Journal of General Practice"},{"issue":"3","key":"e_1_3_4_100_2","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1177\/1460458212442933","article-title":"Privacy and data security in E-health: Requirements from the user\u2019s perspective","volume":"18","author":"Wilkowska Wiktoria","year":"2012","unstructured":"Wiktoria Wilkowska and Martina Ziefle. 2012. Privacy and data security in E-health: Requirements from the user\u2019s perspective. Health Informatics Journal 18, 3 (2012), 191\u2013201.","journal-title":"Health Informatics Journal"},{"issue":"4","key":"e_1_3_4_101_2","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1370\/afm.1136","article-title":"Gradual electronic health record implementation: new insights on physician and patient adaptation","volume":"8","author":"Shield Ren\u00e9e R.","year":"2010","unstructured":"Ren\u00e9e R. Shield, Roberta E. Goldman, David A. Anthony, Nina Wang, Richard J. Doyle, and Jeffrey Borkan. 2010. Gradual electronic health record implementation: new insights on physician and patient adaptation. The Annals of Family Medicine 8, 4 (2010), 316\u2013326.","journal-title":"The Annals of Family Medicine"},{"issue":"1","key":"e_1_3_4_102_2","first-page":"1","article-title":"Trust, confidentiality, and the acceptability of sharing HIV-related patient data: Lessons learned from a mixed methods study about Health Information Exchanges","volume":"7","author":"Maiorana Andre","year":"2012","unstructured":"Andre Maiorana, Wayne T. Steward, Kimberly A. Koester, Charles Pearson, Starley B. Shade, Deepalika Chakravarty, and Janet J. Myers. 2012. Trust, confidentiality, and the acceptability of sharing HIV-related patient data: Lessons learned from a mixed methods study about Health Information Exchanges. Implementation Science 7, 1 (2012), 1\u201314.","journal-title":"Implementation Science"},{"issue":"4","key":"e_1_3_4_103_2","first-page":"1","article-title":"Rural New Zealand health professionals\u2019 perceived barriers to greater use of the internet for learning","volume":"5","author":"Janes Ron","year":"2005","unstructured":"Ron Janes, Bruce Arroll, Stephen Buetow, Gregor Coster, Ross McCormick, and Iain Hague. 2005. Rural New Zealand health professionals\u2019 perceived barriers to greater use of the internet for learning. Rural and Remote Health 5, 4 (2005), 1\u201311.","journal-title":"Rural and Remote Health"},{"key":"e_1_3_4_104_2","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.genhosppsych.2020.10.004","article-title":"Care manager perspectives on integrating an mHealth app system into clinical workflows: A mixed methods study","volume":"68","author":"Bechtel Jared M.","year":"2021","unstructured":"Jared M. Bechtel, Erin Lepoire, Amy M. Bauer, Deborah J. Bowen, and John C. Fortney. 2021. Care manager perspectives on integrating an mHealth app system into clinical workflows: A mixed methods study. General Hospital Psychiatry 68 (2021), 38\u201345.","journal-title":"General Hospital Psychiatry"},{"key":"e_1_3_4_105_2","article-title":"Exploring medical identity theft","volume":"6","author":"Mancilla Desla","year":"2009","unstructured":"Desla Mancilla and Jackie Moczygemba. 2009. Exploring medical identity theft. Perspectives in Health Information Management\/AHIMA, American Health Information Management Association 6, Fall (2009), 11.","journal-title":"Perspectives in Health Information Management\/AHIMA, American Health Information Management Association"},{"key":"e_1_3_4_106_2","doi-asserted-by":"crossref","first-page":"104571","DOI":"10.1016\/j.ijmedinf.2021.104571","article-title":"Investigating the effective factors of using mHealth apps for monitoring COVID-19 symptoms and contact tracing: A survey among Iranian citizens","volume":"155","year":"2021","unstructured":"Rezvan Rahimi and Batoul Khoundabi. 2021. Investigating the effective factors of using mHealth apps for monitoring COVID-19 symptoms and contact tracing: A survey among Iranian citizens. International Journal of Medical Informatics 155 (2021), 104571.","journal-title":"International Journal of Medical Informatics"},{"issue":"4","key":"e_1_3_4_107_2","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1093\/jamia\/ocx081","article-title":"Are participants concerned about privacy and security when using short message service to report product adherence in a rectal microbicide trial?","volume":"25","year":"2018","unstructured":"Rebecca Giguere, William Brown III, Ivan C. Bal\u00e1n, Curtis Dolezal, Titcha Ho, Alan Sheinfil, Mobolaji Ibitoye, Javier R. Lama, Ian McGowan, and Ross D. Cranston. 2018. Are participants concerned about privacy and security when using short message service to report product adherence in a rectal microbicide trial? Journal of the American Medical Informatics Association 25, 4 (2018), 393\u2013400.","journal-title":"Journal of the American Medical Informatics Association"},{"key":"e_1_3_4_108_2","doi-asserted-by":"crossref","first-page":"809","DOI":"10.1016\/j.procs.2017.11.105","article-title":"A ground-up approach to mHealth in Nigeria: A study of primary healthcare workers\u2019 attitude to mHealth adoption","volume":"121","author":"Kenny Grace","year":"2017","unstructured":"Grace Kenny, Yvonne O\u2019Connor, Emmanuel Eze, Edmund Ndibuagu, and Ciara Heavin. 2017. A ground-up approach to mHealth in Nigeria: A study of primary healthcare workers\u2019 attitude to mHealth adoption. Procedia Computer Science 121 (2017), 809\u2013816.","journal-title":"Procedia Computer Science"},{"key":"e_1_3_4_109_2","first-page":"1266","volume-title":"Proceedings of the AMIA Annual Symposium","author":"Yu Hongru","year":"2019","unstructured":"Hongru Yu, Haiyang Sun, Danyi Wu, and Tsung-Ting Kuo. 2019. Comparison of smart contract blockchains for healthcare applications. In Proceedings of the AMIA Annual Symposium. American Medical Informatics Association, American Medical Informatics Association, Washington, DC, 1266."},{"issue":"9","key":"e_1_3_4_110_2","doi-asserted-by":"crossref","first-page":"e30596","DOI":"10.2196\/30596","article-title":"Investigating mental health service user opinions on clinical data sharing: Qualitative focus group study","volume":"8","year":"2021","unstructured":"Abimbola Adanijo, Caoimhe McWilliams, Til Wykes, and Sagar Jilka. 2021. Investigating mental health service user opinions on clinical data sharing: Qualitative focus group study. JMIR Mental Health 8, 9 (2021), e30596.","journal-title":"JMIR Mental Health"},{"issue":"1","key":"e_1_3_4_111_2","first-page":"1","article-title":"Patient apprehensions about the use of artificial intelligence in healthcare","volume":"4","author":"Richardson Jordan P.","year":"2021","unstructured":"Jordan P. Richardson, Cambray Smith, Susan Curtis, Sara Watson, Xuan Zhu, Barbara Barry, and Richard R. Sharp. 2021. Patient apprehensions about the use of artificial intelligence in healthcare. NPJ Digital Medicine 4, 1 (2021), 1\u20136.","journal-title":"NPJ Digital Medicine"},{"key":"e_1_3_4_112_2","first-page":"467","article-title":"Trust, perceived risk, perceived ease of use and perceived usefulness as factors related to mHealth technology use","volume":"216","author":"Schnall Rebecca","year":"2015","unstructured":"Rebecca Schnall, Tracy Higgins, William Brown, Alex Carballo-Dieguez, and Suzanne Bakken. 2015. Trust, perceived risk, perceived ease of use and perceived usefulness as factors related to mHealth technology use. Studies in Health Technology and Informatics 216 (2015), 467.","journal-title":"Studies in Health Technology and Informatics"},{"key":"e_1_3_4_113_2","first-page":"105","volume-title":"Proceedings of the International Conference on Human-Computer Interaction","author":"Coventry Lynne","year":"2020","unstructured":"Lynne Coventry, Dawn Branley-Bell, Elizabeth Sillence, Sabina Magalini, Pasquale Mari, Aimilia Magkanaraki, and Kalliopi Anastasopoulou. 2020. Cyber-risk in healthcare: Exploring facilitators and barriers to secure behaviour. In Proceedings of the International Conference on Human-Computer Interaction. Springer, Springer, Copenhagen, Denmark, 105\u2013122."},{"issue":"1","key":"e_1_3_4_114_2","first-page":"1","article-title":"Patient and physician perspectives of a smartphone application for depression: A qualitative study","volume":"21","author":"Patoz Marie-Camille","year":"2021","unstructured":"Marie-Camille Patoz, Diego Hidalgo-Mazzei, Olivier Blanc, Norma Verdolini, Isabella Pacchiarotti, Andrea Murru, Laurent Zukerwar, Eduard Vieta, Pierre-Michel Llorca, and Ludovic Samalin. 2021. Patient and physician perspectives of a smartphone application for depression: A qualitative study. BMC Psychiatry 21, 1 (2021), 1\u201312.","journal-title":"BMC Psychiatry"},{"issue":"1","key":"e_1_3_4_115_2","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1177\/1073110519840486","article-title":"Hopeful and concerned: Public input on building a trustworthy medical information commons","volume":"47","author":"Deverka Patricia A.","year":"2019","unstructured":"Patricia A. Deverka, Dierdre Gilmore, Jennifer Richmond, Zachary Smith, Rikki Mangrum, Barbara A. Koenig, Robert Cook-Deegan, Angela G. Villanueva, Mary A. Majumder, and Amy L. McGuire. 2019. Hopeful and concerned: Public input on building a trustworthy medical information commons. Journal of Law, Medicine and Ethics 47, 1 (2019), 70\u201387.","journal-title":"Journal of Law, Medicine and Ethics"},{"issue":"3","key":"e_1_3_4_116_2","doi-asserted-by":"crossref","first-page":"e21810","DOI":"10.2196\/21810","article-title":"Machine learning\u2013based analysis of encrypted medical data in the cloud: Qualitative study of expert stakeholders\u2019 perspectives","volume":"8","author":"Alaqra Ala Sarah","year":"2021","unstructured":"Ala Sarah Alaqra, Bridget Kane, and Simone Fischer-H\u00fcbner. 2021. Machine learning\u2013based analysis of encrypted medical data in the cloud: Qualitative study of expert stakeholders\u2019 perspectives. JMIR Human Factors 8, 3 (2021), e21810.","journal-title":"JMIR Human Factors"},{"issue":"1","key":"e_1_3_4_117_2","first-page":"1","article-title":"Security and privacy requirements for a multi-institutional cancer research data grid: An interview-based study","volume":"9","author":"Manion Frank J.","year":"2009","unstructured":"Frank J. Manion, Robert J. Robbins, William A. Weems, and Rebecca S. Crowley. 2009. Security and privacy requirements for a multi-institutional cancer research data grid: An interview-based study. BMC Medical Informatics and Decision Making 9, 1 (2009), 1\u201340.","journal-title":"BMC Medical Informatics and Decision Making"},{"issue":"2","key":"e_1_3_4_118_2","first-page":"e368","article-title":"Privacy vs. usability: A qualitative exploration of patients\u2019 experiences with secure Internet communication with their general practitioner","volume":"7","year":"2005","unstructured":"Aksel Tjora, Trung Tran, and Arild Faxvaag. 2005. Privacy vs. usability: A qualitative exploration of patients\u2019 experiences with secure Internet communication with their general practitioner. Journal of Medical Internet Research 7, 2 (2005), e368.","journal-title":"Journal of Medical Internet Research"},{"issue":"2","key":"e_1_3_4_119_2","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1007\/s10916-010-9524-x","article-title":"Provider stakeholders\u2019 perceived benefit from a nascent health information exchange: A qualitative analysis","volume":"36","author":"Pevnick Joshua M.","year":"2012","unstructured":"Joshua M. Pevnick, Maria Claver, Aram Dobalian, Steven M. Asch, Harris R. Stutman, Alan Tomines, and Paul Fu. 2012. Provider stakeholders\u2019 perceived benefit from a nascent health information exchange: A qualitative analysis. Journal of Medical Systems 36, 2 (2012), 601\u2013613.","journal-title":"Journal of Medical Systems"},{"issue":"12","key":"e_1_3_4_120_2","first-page":"e2793","article-title":"Aligning medication reconciliation and secure messaging: Qualitative study of primary care providers\u2019 perspectives","volume":"15","year":"2013","unstructured":"Leonie Heyworth, Justice Clark, Thomas B. Marcello, Allison M. Paquin, Max Stewart, Cliona Archambeault, and Steven R. Simon. 2013. Aligning medication reconciliation and secure messaging: Qualitative study of primary care providers\u2019 perspectives. Journal of Medical Internet Research 15, 12 (2013), e2793.","journal-title":"Journal of Medical Internet Research"},{"key":"e_1_3_4_121_2","doi-asserted-by":"crossref","first-page":"100002","DOI":"10.1016\/j.cmpbup.2021.100002","article-title":"Patients and healthcare workers experience with a mobile application for self-management of diabetes in Qatar: A qualitative study","volume":"1","author":"Abd-alrazaq Alaa A.","year":"2021","unstructured":"Alaa A. Abd-alrazaq, Noor Suleiman, Khaled Baagar, Noor Jandali, Dari Alhuwail, Ibrahem Abdalhakam, Saad Shahbal, Abdul-Badi Abou-Samra, and Mowafa Househ. 2021. Patients and healthcare workers experience with a mobile application for self-management of diabetes in Qatar: A qualitative study. Computer Methods and Programs in Biomedicine Update 1 (2021), 100002.","journal-title":"Computer Methods and Programs in Biomedicine Update"},{"key":"e_1_3_4_122_2","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/978-3-642-21716-6_11","volume-title":"Proceedings of the International Conference on Ergonomics and Health Aspects of Work with Computers","author":"Baker Aubrey","year":"2011","unstructured":"Aubrey Baker, Laurian Vega, Tom DeHart, and Steve Harrison. 2011. Healthcare and security: Understanding and evaluating the risks. In Proceedings of the International Conference on Ergonomics and Health Aspects of Work with Computers. Springer, Springer-Verlag, Orlando, FL, 99\u2013108."},{"issue":"3","key":"e_1_3_4_123_2","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1197\/jamia.M1037","article-title":"Desiderata for personal electronic communication in clinical systems","volume":"9","author":"Sarkar Indra Neil","year":"2002","unstructured":"Indra Neil Sarkar and Justin Starren. 2002. Desiderata for personal electronic communication in clinical systems. Journal of the American Medical Informatics Association 9, 3 (2002), 209\u2013216.","journal-title":"Journal of the American Medical Informatics Association"},{"issue":"1","key":"e_1_3_4_124_2","first-page":"1","article-title":"Patient preferences for notification of normal laboratory test results: A report from the ASIPS Collaborative","volume":"6","author":"Baldwin Donna M.","year":"2005","unstructured":"Donna M. Baldwin, Jav\u00e1n Quintela, Christine Duclos, Elizabeth W. Staton, and Wilson D. Pace. 2005. Patient preferences for notification of normal laboratory test results: A report from the ASIPS Collaborative. BMC Family Practice 6, 1 (2005), 1\u20137.","journal-title":"BMC Family Practice"},{"issue":"3","key":"e_1_3_4_125_2","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1016\/j.hlpt.2020.04.008","article-title":"An event study of data breaches and hospital IT spending","volume":"9","author":"Choi Sung J.","year":"2020","unstructured":"Sung J. Choi, M. Eric Johnson, and Jinhyung Lee. 2020. An event study of data breaches and hospital IT spending. Health Policy and Technology 9, 3 (2020), 372\u2013378.","journal-title":"Health Policy and Technology"},{"key":"e_1_3_4_126_2","first-page":"197","volume-title":"Proceedings of the 14th Symposium on Usable Privacy and Security (SOUPS 2018)","author":"Zou Yixin","year":"2018","unstructured":"Yixin Zou, Abraham H. Mhaidli, Austin McCall, and Florian Schaub. 2018. \u201cI\u2019ve got nothing to lose\u201d: Consumers\u2019 risk perceptions and protective actions after the equifax data breach. In Proceedings of the 14th Symposium on Usable Privacy and Security (SOUPS 2018). IEEE, Baltimore, MD, 197\u2013216."},{"key":"e_1_3_4_127_2","first-page":"192","volume-title":"Proceedings of the Australasian Data Mining Conference","author":"Ahmed Mohiuddin","year":"2017","unstructured":"Mohiuddin Ahmed and Abu S. S. M. Barkat Ullah. 2017. False data injection attacks in healthcare. In Proceedings of the Australasian Data Mining Conference. Springer, Springer Singapore, Singapore, 192\u2013202."},{"key":"e_1_3_4_128_2","first-page":"1","volume-title":"Proceedings of the 2018 2nd Cyber Security in Networking Conference (CSNet)","author":"Djenna Amir","year":"2018","unstructured":"Amir Djenna and Diamel Eddine Sa\u00efdouni. 2018. Cyber attacks classification in IoT-based-healthcare infrastructure. In Proceedings of the 2018 2nd Cyber Security in Networking Conference (CSNet). IEEE, IEEE, Paris, France, 1\u20134."},{"issue":"5","key":"e_1_3_4_129_2","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1089\/hs.2021.0004","article-title":"Terrorist attacks against healthcare facilities: A review","volume":"19","author":"Cavaliere Garrett A.","year":"2021","unstructured":"Garrett A. Cavaliere, Reem Alfalasi, Gregory N. Jasani, Gregory R. Ciottone, and Benjamin J. Lawner. 2021. Terrorist attacks against healthcare facilities: A review. Health Security 19, 5 (2021), 546\u2013550.","journal-title":"Health Security"},{"issue":"1","key":"e_1_3_4_130_2","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/s13246-014-0315-4","article-title":"Mobile healthcare applications: System design review, critical issues and challenges","volume":"38","author":"Baig Mirza Mansoor","year":"2015","unstructured":"Mirza Mansoor Baig, Hamid GholamHosseini, and Martin J. Connolly. 2015. Mobile healthcare applications: System design review, critical issues and challenges. Australasian Physical and Engineering Sciences in Medicine 38, 1 (2015), 23\u201338.","journal-title":"Australasian Physical and Engineering Sciences in Medicine"},{"key":"e_1_3_4_131_2","doi-asserted-by":"crossref","first-page":"106718","DOI":"10.1016\/j.chb.2021.106718","article-title":"Privacy concerns can explain unwillingness to download and use contact tracing apps when COVID-19 concerns are high","volume":"119","author":"Chan Eugene Y.","year":"2021","unstructured":"Eugene Y. Chan and Najam U. Saqib. 2021. Privacy concerns can explain unwillingness to download and use contact tracing apps when COVID-19 concerns are high. Computers in Human Behavior 119 (2021), 106718.","journal-title":"Computers in Human Behavior"},{"issue":"3","key":"e_1_3_4_132_2","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1093\/jamia\/ocaa240","article-title":"Individuals\u2019 privacy concerns and adoption of contact tracing mobile applications in a pandemic: A situational privacy calculus perspective","volume":"28","author":"Hassandoust Farkhondeh","year":"2021","unstructured":"Farkhondeh Hassandoust, Saeed Akhlaghpour, and Allen C. Johnston. 2021. Individuals\u2019 privacy concerns and adoption of contact tracing mobile applications in a pandemic: A situational privacy calculus perspective. Journal of the American Medical Informatics Association 28, 3 (2021), 463\u2013471.","journal-title":"Journal of the American Medical Informatics Association"},{"key":"e_1_3_4_133_2","first-page":"1","volume-title":"Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems","author":"Stobert Elizabeth","year":"2020","unstructured":"Elizabeth Stobert, David Barrera, Val\u00e9rie Homier, and Daniel Kollek. 2020. Understanding cybersecurity practices in emergency departments. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. ACM, Honolulu, Hawaii, 1\u20138."},{"issue":"4","key":"e_1_3_4_134_2","doi-asserted-by":"crossref","first-page":"3759","DOI":"10.1007\/s40747-022-00756-z","article-title":"A systematic review of homomorphic encryption and its contributions in healthcare industry","volume":"9","author":"Munjal Kundan","year":"2023","unstructured":"Kundan Munjal and Rekha Bhatia. 2023. A systematic review of homomorphic encryption and its contributions in healthcare industry. Complex and Intelligent Systems 9, 4 (2023), 3759\u20133786.","journal-title":"Complex and Intelligent Systems"},{"key":"e_1_3_4_135_2","doi-asserted-by":"crossref","first-page":"108500","DOI":"10.1016\/j.comnet.2021.108500","article-title":"HealthBlock: A secure blockchain-based healthcare data management system","volume":"200","author":"Zaabar Bessem","year":"2021","unstructured":"Bessem Zaabar, Omar Cheikhrouhou, Faisal Jamil, Meryem Ammi, and Mohamed Abid. 2021. HealthBlock: A secure blockchain-based healthcare data management system. Computer Networks 200 (2021), 108500.","journal-title":"Computer Networks"},{"key":"e_1_3_4_136_2","doi-asserted-by":"crossref","first-page":"101079","DOI":"10.1109\/ACCESS.2020.2997831","article-title":"Edge-cloud computing and artificial intelligence in internet of medical things: Architecture, technology and application","volume":"8","author":"Sun Lanfang","year":"2020","unstructured":"Lanfang Sun, Xin Jiang, Huixia Ren, and Yi Guo. 2020. Edge-cloud computing and artificial intelligence in internet of medical things: Architecture, technology and application. IEEE Access 8 (2020), 101079\u2013101092.","journal-title":"IEEE Access"},{"issue":"5","key":"e_1_3_4_137_2","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/s42979-020-00246-4","article-title":"Privacy enforced access control model for secured data handling in cloud-based pervasive health care system","volume":"1","author":"Prince P. Blessed","year":"2020","unstructured":"P. Blessed Prince and S. P. Jeno Lovesum. 2020. Privacy enforced access control model for secured data handling in cloud-based pervasive health care system. SN Computer Science 1, 5 (2020), 239.","journal-title":"SN Computer Science"},{"issue":"3","key":"e_1_3_4_138_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3314023","article-title":"Leveraging user-related internet of things for continuous authentication: A survey","volume":"52","author":"Gonzalez-Manzano Lorena","year":"2019","unstructured":"Lorena Gonzalez-Manzano, Jose M. De Fuentes, and Arturo Ribagorda. 2019. Leveraging user-related internet of things for continuous authentication: A survey. ACM Computing Surveys 52, 3 (2019), 1\u201338.","journal-title":"ACM Computing Surveys"},{"issue":"02","key":"e_1_3_4_139_2","doi-asserted-by":"crossref","first-page":"49","DOI":"10.4236\/jis.2016.72004","article-title":"Investing in cybersecurity: Insights from the Gordon-Loeb model","volume":"7","year":"2016","unstructured":"Lawrence A. Gordon, Martin P. Loeb, and Lei Zhou. 2016. Investing in cybersecurity: Insights from the Gordon-Loeb model. Journal of Information Security 7, 02 (2016), 49.","journal-title":"Journal of Information Security"},{"key":"e_1_3_4_140_2","doi-asserted-by":"crossref","first-page":"815573","DOI":"10.3389\/fdgth.2022.815573","article-title":"The disruption of trust in the digital transformation leading to health 4.0","volume":"4","author":"Guckert Michael","year":"2022","unstructured":"Michael Guckert, Kristina Milanovic, Jennifer Hannig, David Simon, Tamara Wettengl, Daniel Evers, Arnd Kleyer, Till Keller, and Jeremy Pitt. 2022. The disruption of trust in the digital transformation leading to health 4.0. Frontiers in Digital Health 4 (2022), 815573.","journal-title":"Frontiers in Digital Health"},{"key":"e_1_3_4_141_2","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1109\/SP.2019.00060","volume-title":"Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP)","author":"Krombholz Katharina","year":"2019","unstructured":"Katharina Krombholz, Karoline Busse, Katharina Pfeffer, Matthew Smith, and Emanuel von Zezschwitz. 2019. \u201cIf HTTPS were secure, i wouldn\u2019t need 2FA\u201d-end user and administrator mental models of HTTPS. In Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP). IEEE, IEEE, San Francisco, CA, 246\u2013263."},{"issue":"1","key":"e_1_3_4_142_2","first-page":"1","article-title":"Analysis and evaluation of training effectiveness","volume":"1","author":"Kunche Akhila","year":"2011","unstructured":"Akhila Kunche, R. Kumar Puli, Sunitha Guniganti, and Danaiah Puli. 2011. Analysis and evaluation of training effectiveness. Human Resource Management Research 1, 1 (2011), 1\u20137.","journal-title":"Human Resource Management Research"},{"key":"e_1_3_4_143_2","first-page":"239","volume-title":"Proceedings of the 6th International Conference on Design Creativity (ICDC 2020), 26-28 August, 2020, Oulu, Finland","author":"Lugnet Johan","year":"2020","unstructured":"Johan Lugnet, \u00c5sa Ericson, Martin Lundgren, and Johan Wenngren. 2020. On the design of playful training material for information security awareness. In Proceedings of the 6th International Conference on Design Creativity (ICDC 2020), 26-28 August, 2020, Oulu, Finland. The Design Society, 239\u2013246."},{"key":"e_1_3_4_144_2","doi-asserted-by":"crossref","first-page":"101827","DOI":"10.1016\/j.cose.2020.101827","article-title":"Riskio: A serious game for cyber security awareness and education","volume":"95","author":"Hart Stephen","year":"2020","unstructured":"Stephen Hart, Andrea Margheri, Federica Paci, and Vladimiro Sassone. 2020. Riskio: A serious game for cyber security awareness and education. Computers and Security 95 (2020), 101827.","journal-title":"Computers and Security"},{"key":"e_1_3_4_145_2","doi-asserted-by":"crossref","first-page":"108709","DOI":"10.1016\/j.knosys.2022.108709","article-title":"Contextual security awareness: A context-based approach for assessing the security awareness of users","volume":"246","author":"Solomon Adir","year":"2022","unstructured":"Adir Solomon, Michael Michaelshvili, Ron Bitton, Bracha Shapira, Lior Rokach, Rami Puzis, and Asaf Shabtai. 2022. Contextual security awareness: A context-based approach for assessing the security awareness of users. Knowledge-Based Systems 246 (2022), 108709.","journal-title":"Knowledge-Based Systems"}],"container-title":["ACM Transactions on Computing for Healthcare"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650116","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3650116","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:31Z","timestamp":1750291411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650116"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,22]]},"references-count":144,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4,30]]}},"alternative-id":["10.1145\/3650116"],"URL":"https:\/\/doi.org\/10.1145\/3650116","relation":{},"ISSN":["2691-1957","2637-8051"],"issn-type":[{"value":"2691-1957","type":"print"},{"value":"2637-8051","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,22]]},"assertion":[{"value":"2022-11-11","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-01-18","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-04-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}