• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4719281)   Today's Articles (1036)
For: Jalali MS, Bruckes M, Westmattelmann D, Schewe G. Why Employees (Still) Click on Phishing Links: Investigation in Hospitals. J Med Internet Res 2020;22:e16775. [PMID: 32012071 PMCID: PMC7005690 DOI: 10.2196/16775] [Citation(s) in RCA: 31] [Impact Index Per Article: 6.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/23/2019] [Revised: 12/11/2019] [Accepted: 12/16/2019] [Indexed: 12/25/2022]  Open
Number Cited by Other Article(s)
1
Clusmann J, Ferber D, Wiest IC, Schneider CV, Brinker TJ, Foersch S, Truhn D, Kather JN. Prompt injection attacks on vision language models in oncology. Nat Commun 2025;16:1239. [PMID: 39890777 PMCID: PMC11785991 DOI: 10.1038/s41467-024-55631-x] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/02/2024] [Accepted: 12/17/2024] [Indexed: 02/03/2025]  Open
2
Schürmann F, Westmattelmann D, Schewe G. Factors Influencing Telemedicine Adoption Among Health Care Professionals: Qualitative Interview Study. JMIR Form Res 2025;9:e54777. [PMID: 39869885 PMCID: PMC11811669 DOI: 10.2196/54777] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/21/2023] [Revised: 10/01/2024] [Accepted: 12/01/2024] [Indexed: 01/29/2025]  Open
3
Elendu C, Omeludike EK, Oloyede PO, Obidigbo BT, Omeludike JC. Legal implications for clinicians in cybersecurity incidents: A review. Medicine (Baltimore) 2024;103:e39887. [PMID: 39331908 PMCID: PMC11441973 DOI: 10.1097/md.0000000000039887] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Received: 03/03/2024] [Accepted: 09/11/2024] [Indexed: 09/29/2024]  Open
4
Argyridou E, Nifakos S, Laoudias C, Panda S, Panaousis E, Chandramouli K, Navarro-Llobet D, Mora Zamorano J, Papachristou P, Bonacina S. Cyber Hygiene Methodology for Raising Cybersecurity and Data Privacy Awareness in Health Care Organizations: Concept Study. J Med Internet Res 2023;25:e41294. [PMID: 37498644 PMCID: PMC10415935 DOI: 10.2196/41294] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/21/2022] [Revised: 12/23/2022] [Accepted: 01/19/2023] [Indexed: 01/21/2023]  Open
5
Merhavy ZI, Bassett L, Melchiorre M, Hall MPM. The impact of lecture playback speeds on concentration and memory. BMC MEDICAL EDUCATION 2023;23:515. [PMID: 37464312 DOI: 10.1186/s12909-023-04491-y] [Citation(s) in RCA: 5] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/09/2023] [Accepted: 07/02/2023] [Indexed: 07/20/2023]
6
Dey J. State-of-the-art session key generation on priority-based adaptive neural machine (PANM) in telemedicine. Neural Comput Appl 2023;35:9517-9533. [PMID: 37077617 PMCID: PMC10032630 DOI: 10.1007/s00521-022-08169-2] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/31/2022] [Accepted: 12/06/2022] [Indexed: 03/24/2023]
7
What are the trend and core knowledge of information security? A citation and co-citation analysis. INFORMATION & MANAGEMENT 2023. [DOI: 10.1016/j.im.2023.103774] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/17/2023]
8
Sturman D, Valenzuela C, Plate O, Tanvir T, Auton JC, Bayl-Smith P, Wiggins MW. The role of cue utilization in the detection of phishing emails. APPLIED ERGONOMICS 2023;106:103887. [PMID: 36037654 DOI: 10.1016/j.apergo.2022.103887] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/19/2021] [Revised: 08/17/2022] [Accepted: 08/18/2022] [Indexed: 06/15/2023]
9
Information Security Behavior in Health Information Systems: A Review of Research Trends and Antecedent Factors. Healthcare (Basel) 2022;10:healthcare10122531. [PMID: 36554055 PMCID: PMC9777837 DOI: 10.3390/healthcare10122531] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/18/2022] [Revised: 12/09/2022] [Accepted: 12/12/2022] [Indexed: 12/23/2022]  Open
10
Zhuo S, Biddle R, Koh YS, Lottridge D, Russello G. SoK: Human-Centered Phishing Susceptibility. ACM TRANSACTIONS ON PRIVACY AND SECURITY 2022. [DOI: 10.1145/3575797] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/13/2022]
11
Explaining information seeking intentions: Insights from a Slovenian social engineering awareness campaign. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.103038] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/03/2022]
12
Al‐Qahtani AF, Cresci S. The COVID-19 scamdemic: A survey of phishing attacks and their countermeasures during COVID-19. IET INFORMATION SECURITY 2022;16:324-345. [PMID: 35942004 PMCID: PMC9349804 DOI: 10.1049/ise2.12073] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/09/2021] [Revised: 06/01/2022] [Accepted: 06/06/2022] [Indexed: 06/15/2023]
13
Investigation into Phishing Risk Behaviour among Healthcare Staff. INFORMATION 2022. [DOI: 10.3390/info13080392] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]  Open
14
Wasserman L, Wasserman Y. Hospital cybersecurity risks and gaps: Review (for the non-cyber professional). Front Digit Health 2022;4:862221. [PMID: 36033634 PMCID: PMC9403058 DOI: 10.3389/fdgth.2022.862221] [Citation(s) in RCA: 19] [Impact Index Per Article: 6.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/25/2022] [Accepted: 07/07/2022] [Indexed: 11/13/2022]  Open
15
Gioulekas F, Stamatiadis E, Tzikas A, Gounaris K, Georgiadou A, Michalitsi-Psarrou A, Doukas G, Kontoulis M, Nikoloudakis Y, Marin S, Cabecinha R, Ntanos C. A Cybersecurity Culture Survey Targeting Healthcare Critical Infrastructures. Healthcare (Basel) 2022;10:healthcare10020327. [PMID: 35206941 PMCID: PMC8871847 DOI: 10.3390/healthcare10020327] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/07/2022] [Revised: 01/31/2022] [Accepted: 02/07/2022] [Indexed: 01/27/2023]  Open
16
Petrič G, Roer K. The impact of formal and informal organizational norms on susceptibility to phishing: Combining survey and field experiment data. TELEMATICS AND INFORMATICS 2022. [DOI: 10.1016/j.tele.2021.101766] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
17
Rizzoni F, Magalini S, Casaroli A, Mari P, Dixon M, Coventry L. Phishing simulation exercise in a large hospital: A case study. Digit Health 2022;8:20552076221081716. [PMID: 35321019 PMCID: PMC8935590 DOI: 10.1177/20552076221081716] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/01/2021] [Accepted: 01/30/2022] [Indexed: 11/21/2022]  Open
18
Batista E, Moncusi MA, López-Aguilar P, Martínez-Ballesté A, Solanas A. Sensors for Context-Aware Smart Healthcare: A Security Perspective. SENSORS (BASEL, SWITZERLAND) 2021;21:6886. [PMID: 34696099 PMCID: PMC8537585 DOI: 10.3390/s21206886] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/27/2021] [Revised: 10/12/2021] [Accepted: 10/14/2021] [Indexed: 12/24/2022]
19
Georgiadou A, Michalitsi-Psarrou A, Gioulekas F, Stamatiadis E, Tzikas A, Gounaris K, Doukas G, Ntanos C, Landeiro Ribeiro L, Askounis D. Hospitals' Cybersecurity Culture during the COVID-19 Crisis. Healthcare (Basel) 2021;9:1335. [PMID: 34683015 PMCID: PMC8544388 DOI: 10.3390/healthcare9101335] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/25/2021] [Revised: 09/30/2021] [Accepted: 10/01/2021] [Indexed: 11/23/2022]  Open
20
Alhuwail D, Al-Jafar E, Abdulsalam Y, AlDuaij S. Information Security Awareness and Behaviors of Health Care Professionals at Public Health Care Facilities. Appl Clin Inform 2021;12:924-932. [PMID: 34587638 DOI: 10.1055/s-0041-1735527] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]  Open
21
Kraft MA. Alternatives to Google Suite Applications. Med Ref Serv Q 2021;40:303-310. [PMID: 34495800 DOI: 10.1080/02763869.2021.1945865] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
22
Nifakos S, Chandramouli K, Nikolaou CK, Papachristou P, Koch S, Panaousis E, Bonacina S. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review. SENSORS 2021;21:s21155119. [PMID: 34372354 PMCID: PMC8348467 DOI: 10.3390/s21155119] [Citation(s) in RCA: 26] [Impact Index Per Article: 6.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/29/2021] [Revised: 07/15/2021] [Accepted: 07/16/2021] [Indexed: 01/05/2023]
23
He Y, Aliyu A, Evans M, Luo C. Health Care Cybersecurity Challenges and Solutions Under the Climate of COVID-19: Scoping Review. J Med Internet Res 2021;23:e21747. [PMID: 33764885 PMCID: PMC8059789 DOI: 10.2196/21747] [Citation(s) in RCA: 43] [Impact Index Per Article: 10.8] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/23/2020] [Revised: 12/08/2020] [Accepted: 02/21/2021] [Indexed: 01/14/2023]  Open
24
Jalali MS, Landman A, Gordon WJ. Telemedicine, privacy, and information security in the age of COVID-19. J Am Med Inform Assoc 2021;28:671-672. [PMID: 33325533 PMCID: PMC7798938 DOI: 10.1093/jamia/ocaa310] [Citation(s) in RCA: 39] [Impact Index Per Article: 9.8] [Reference Citation Analysis] [Track Full Text] [Download PDF] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/18/2020] [Accepted: 11/30/2020] [Indexed: 11/16/2022]  Open
25
Aleroud A, Abu-Shanab E, Al-Aiad A, Alshboul Y. An examination of susceptibility to spear phishing cyber attacks in non-English speaking communities. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2020. [DOI: 10.1016/j.jisa.2020.102614] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
26
Montañez R, Golob E, Xu S. Human Cognition Through the Lens of Social Engineering Cyberattacks. Front Psychol 2020;11:1755. [PMID: 33101096 PMCID: PMC7554349 DOI: 10.3389/fpsyg.2020.01755] [Citation(s) in RCA: 14] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/19/2020] [Accepted: 06/25/2020] [Indexed: 11/13/2022]  Open
27
Williams CM, Chaturvedi R, Chakravarthy K. Cybersecurity Risks in a Pandemic. J Med Internet Res 2020;22:e23692. [PMID: 32897869 PMCID: PMC7528623 DOI: 10.2196/23692] [Citation(s) in RCA: 40] [Impact Index Per Article: 8.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/19/2020] [Accepted: 09/07/2020] [Indexed: 12/28/2022]  Open
28
Abdelhamid M. The Role of Health Concerns in Phishing Susceptibility: Survey Design Study. J Med Internet Res 2020;22:e18394. [PMID: 32364511 PMCID: PMC7235804 DOI: 10.2196/18394] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/24/2020] [Revised: 03/29/2020] [Accepted: 03/30/2020] [Indexed: 01/10/2023]  Open
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA