• Reference Citation Analysis
  • v
  • v
  • Find an Article
  • Find an Author
Download
Number Citation Analysis
1
Cervera García A, Goussens A. [Cybersecurity and use of ICT in the health sector]. Aten Primaria 2024;56:102854. [PMID: 38219392 PMCID: PMC10823061 DOI: 10.1016/j.aprim.2023.102854] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/01/2023] [Revised: 12/11/2023] [Accepted: 12/12/2023] [Indexed: 01/16/2024]  Open
2
Zhan Y, Ahmad SF, Irshad M, Al-Razgan M, Awwad EM, Ali YA, Ahmad Ayassrah AYB. Investigating the role of Cybersecurity's perceived threats in the adoption of health information systems. Heliyon 2024;10:e22947. [PMID: 38148811 PMCID: PMC10750060 DOI: 10.1016/j.heliyon.2023.e22947] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/05/2023] [Revised: 11/14/2023] [Accepted: 11/22/2023] [Indexed: 12/28/2023]  Open
3
Tarka M, Blankstein M, Schottel P. The crippling effects of a cyberattack at an academic level 1 trauma center: An orthopedic perspective. Injury 2023;54:1095-1101. [PMID: 36801172 DOI: 10.1016/j.injury.2023.02.022] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Received: 01/02/2023] [Revised: 02/07/2023] [Accepted: 02/08/2023] [Indexed: 02/23/2023]
4
Keshavarzi M, Ghaffary HR. An ontology-driven framework for knowledge representation of digital extortion attacks. Comput Human Behav 2023;139:107520. [PMID: 36268220 PMCID: PMC9557090 DOI: 10.1016/j.chb.2022.107520] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/06/2022] [Revised: 10/02/2022] [Accepted: 10/07/2022] [Indexed: 11/22/2022]
5
Haner M, Sloan MM, Graham A, Pickett JT, Cullen FT. Ransomware and the Robin Hood effect?: Experimental evidence on Americans' willingness to support cyber-extortion. J Exp Criminol 2022;19:1-28. [PMID: 35729977 PMCID: PMC9190457 DOI: 10.1007/s11292-022-09515-z] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Accepted: 05/05/2022] [Indexed: 06/15/2023]
6
Stowman AM, Cacciatore LS, Cortright V, McConnell J, Wilburn C, Bryant B, Frisch N, Kalof AN. Anatomy of a Cyberattack. Am J Clin Pathol 2022;157:814-822. [PMID: 35188562 DOI: 10.1093/ajcp/aqab162] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/13/2021] [Accepted: 09/21/2021] [Indexed: 11/12/2022]  Open
7
Beaman C, Barkworth A, Akande TD, Hakak S, Khan MK. Ransomware: Recent advances, analysis, challenges and future research directions. Comput Secur 2021;111:102490. [PMID: 34602684 PMCID: PMC8463105 DOI: 10.1016/j.cose.2021.102490] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/08/2021] [Revised: 08/15/2021] [Accepted: 09/21/2021] [Indexed: 10/31/2022]
8
Chen PH, Bodak R, Gandhi NS. Ransomware Recovery and Imaging Operations: Lessons Learned and Planning Considerations. J Digit Imaging 2021;34:731-740. [PMID: 34159418 PMCID: PMC8218969 DOI: 10.1007/s10278-021-00466-x] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/29/2020] [Revised: 05/05/2021] [Accepted: 05/17/2021] [Indexed: 12/04/2022]  Open
9
Aurangzeb S, Rais RNB, Aleem M, Islam MA, Iqbal MA. On the classification of Microsoft-Windows ransomware using hardware profile. PeerJ Comput Sci 2021;7:e361. [PMID: 33817011 PMCID: PMC7959641 DOI: 10.7717/peerj-cs.361] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/21/2020] [Accepted: 12/28/2020] [Indexed: 06/12/2023]
10
Zhao JY, Kessler EG, Yu J, Jalal K, Cooper CA, Brewer JJ, Schwaitzberg SD, Guo WA. Impact of Trauma Hospital Ransomware Attack on Surgical Residency Training. J Surg Res 2018;232:389-397. [PMID: 30463746 DOI: 10.1016/j.jss.2018.06.072] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/24/2018] [Revised: 06/01/2018] [Accepted: 06/20/2018] [Indexed: 10/28/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA