4.7 Review

A systematic analysis of failures in protecting personal health data: A scoping review

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Artificial Intelligence (AI) and Information Systems: Perspectives to Responsible AI

Denis Dennehy et al.

INFORMATION SYSTEMS FRONTIERS (2023)

Article Information Science & Library Science

The role of collectivism and moderating effect of IT proficiency on intention to disclose protected health information

Eun Hee Park et al.

Summary: This paper aims to identify and understand factors affecting insiders' intention to disclose patients' medical information and how these factors affect the intention. The study found that collectivism and IT proficiency are significant factors in the model. Collectivism affects two components of health information security awareness, which in turn influence the intention to disclose, while IT proficiency moderates the relationship between health information security awareness and intention to disclose.

INFORMATION TECHNOLOGY & MANAGEMENT (2023)

Article Computer Science, Information Systems

Building data management capabilities to address data protection regulations: Learnings from EU-GDPR

Clement Labadie et al.

Summary: The EU-GDPR has brought about a paradigm shift in data protection, emphasizing individual choice and organizational accountability. However, many organizations struggle with compliance, requiring a fundamental reconceptualization of their data management practices. This paper introduces a resource-based view and proposes a capability model for the EU-GDPR, offering theoretical and empirical support for organizations aiming to achieve compliance with increasing data protection regulations.

JOURNAL OF INFORMATION TECHNOLOGY (2023)

Article Information Science & Library Science

Employee responses to information security related stress: Coping and violation intention

Adel Yazdanmehr et al.

Summary: Studies show that employees respond to information security policy (ISP) demands by using emotion-focused coping to alleviate stress, which may lead to ISP violations. However, their intent to engage in problem-focused coping to meet the demands and reduce violations has not been analyzed. This study examines how security-related stress triggers different coping responses and how ISP-related self-efficacy and organizational support moderate these responses. The results indicate that both emotion-focused and problem-focused coping coexist, and organizational support and self-efficacy can reduce the effects of stress on coping responses. Problem-focused coping decreases intention to violate ISP, while emotion-focused coping increases it. Understanding these coping responses and their influencing factors can help managers effectively design and implement ISP to reduce violations.

INFORMATION SYSTEMS JOURNAL (2023)

Article Computer Science, Information Systems

COVID-19 pandemic-induced organisational cultural shifts and employee information security compliance behaviour: a South African case study

Kiara Jordan Butler et al.

Summary: This study aims to understand how environmental disruption, such as the COVID-19 pandemic, leads to shifts in organizational culture, information security culture, and employee information security compliance behavior. A single-organization case study was conducted using both quantitative and qualitative data collection methods. The findings reveal that the pandemic-induced environmental disruption resulted in a sudden shift to remote work for employees and an increase in cybercrime, leading to adjustments in organizational and information security culture and an overall increase in employee information security compliance.

INFORMATION AND COMPUTER SECURITY (2023)

Editorial Material Medicine, General & Internal

AI-Generated Medical Advice-GPT and Beyond

Claudia E. Haupt et al.

Summary: This Viewpoint discusses the usage of generative pretrained transformers (GPTs) and AI technologies in medical applications, and considers the need for new regulations to ensure safety and legal compliance for patients and healthcare professionals.

JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION (2023)

Editorial Material Business

ChatGPT and consumers: Benefits, Pitfalls and Future Research Agenda

Justin Paul et al.

Summary: This article discusses the multidimensional benefits and potential pitfalls of using artificial intelligence-based ChatGPT in consumer studies and marketing. It provides numerous ideas for future research in this area. ChatGPT offers algorithm-generated conversational responses and has generated significant debate since its launch. It can enhance consumer engagement, improve customer service, provide insights into consumer behavior, and facilitate improved marketing campaigns. However, concerns about consumer well-being, bias, misinformation, privacy, ethics, and security need to be addressed.

INTERNATIONAL JOURNAL OF CONSUMER STUDIES (2023)

Article Information Science & Library Science

?So what if ChatGPT wrote it?? Multidisciplinary perspectives on opportunities, challenges and implications of generative conversational AI for research, practice and policy

Yogesh K. Dwivedi et al.

Summary: This article brings together contributions from 43 experts to discuss the advantages and limitations of ChatGPT, as well as its potential impacts in various industries. The article identifies areas for further research, including knowledge, transparency, and ethics; digital transformation of organizations and societies; and teaching, learning, and scholarly research.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2023)

Article Computer Science, Artificial Intelligence

Blockchain for healthcare data management: opportunities, challenges, and future recommendations

Ibrar Yaqoob et al.

Summary: Blockchain technology has the potential to significantly revolutionize healthcare data management systems, bringing innovation and improvements. However, the adoption of blockchain technology also faces challenges that require further research and exploration.

NEURAL COMPUTING & APPLICATIONS (2022)

Article Automation & Control Systems

Analyzing the Implications of Healthcare Data Breaches through Computational Technique

Ahmed H. Almulihi et al.

Summary: This research examines the types and categories of healthcare big data breaches, aiming to improve the confidentiality of healthcare big data. The COVID-19 pandemic has significantly increased the use of technology, resulting in more typical attacks behind healthcare data breaches. The number of healthcare big data breaches and commercial losses are continuously increasing.

INTELLIGENT AUTOMATION AND SOFT COMPUTING (2022)

Article Chemistry, Multidisciplinary

Assistive Multimodal Robotic System (AMRSys): Security and Privacy Issues, Challenges, and Possible Solutions

Jims Marchang et al.

Summary: Assistive robotic systems can support health and care services, assist older people in living independently, and reduce loneliness. Adoption of these systems is restricted by ethics, data security, and privacy concerns. To protect user privacy, safer interaction methods should be designed, with blockchain and multi-factor authentication mechanisms as potential solutions.

APPLIED SCIENCES-BASEL (2022)

Article Computer Science, Information Systems

Digital Healthcare-Cyberattacks in Asian Organizations: An Analysis of Vulnerabilities, Risks, NIST Perspectives, and Recommendations

Kamalanathan Kandasamy et al.

Summary: The rise of cyberattacks on healthcare institutions in Asia highlights the need for stronger security measures, enhanced awareness, and risk management strategies to protect valuable healthcare data. The study explores the dominant types of cyberattacks in Asian healthcare institutions, analyzing vulnerabilities and associated risks to provide recommendations for risk mitigation and improvement.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

Distributed IT championing: A process theory

Bogdan Negoita et al.

Summary: In the process of IT implementation, multiple individuals' championing behaviors constitute a distributed IT championing process, which evolves over time and goes through stages such as bonding, bonding, and bridging out under the influence of different dimensions of social capital.

JOURNAL OF INFORMATION TECHNOLOGY (2022)

Article Ethics

Trust and digital privacy in healthcare: a cross-sectional descriptive study of trust and attitudes towards uses of electronic health data among the general public in Sweden

Sara Belfrage et al.

Summary: This study explored the relationship between the general public's trust in healthcare's ability to protect electronic health data and their attitudes towards the use of health data in Sweden. The majority of respondents showed high levels of trust in healthcare's ability to protect patient data. Those with low trust were less willing to allow their personal data to be used and perceived higher risks of unauthorized access.

BMC MEDICAL ETHICS (2022)

Article Computer Science, Information Systems

Understanding dark side of artificial intelligence (AI) integrated business analytics: assessing firm's operational inefficiency and competitiveness

Nripendra P. Rana et al.

Summary: The study examines the impact of AI-integrated business analytics on a firm's competitive advantage, finding that opacity, suboptimal business decisions, and perceived risk may result in operational inefficiency and competitive disadvantage.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2022)

Article Information Science & Library Science

The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities

Lai-Wan Wong et al.

Summary: This paper investigates the impact of general cybersecurity and cybersecurity policy awareness on the supply chain cyber resilience reactive capabilities of Small and Medium Enterprises (SMEs), emphasizing the importance of preventive measures and employee cyber hygiene.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2022)

Article Political Science

Citizens' Attitudes to Contact Tracing Apps

Laszlo Horvath et al.

Summary: Citizens' concerns about data privacy and security breaches may impact the adoption of COVID-19 contact tracing mobile apps, but the level of privacy priority varies among individuals. The study found that a mixture of digital and human contact tracing is supported, and the COVID-19 pandemic and trust in the national public health service system alleviate public concerns about privacy.

JOURNAL OF EXPERIMENTAL POLITICAL SCIENCE (2022)

Article Information Science & Library Science

Prosocial rule breaking on health information security at healthcare organisations in South Korea

Jongwoo Kim et al.

Summary: Regulations like HIPAA are in place to protect patients' medical records from security breaches. The study finds that both altruistic and egoistic motivations influence nursing students' intention to disclose patient health information. Egoistic motivation plays a role in shaping individuals' perception of responsibility.

INFORMATION SYSTEMS JOURNAL (2022)

Article Health Policy & Services

Hospital characteristics associated with HIPAA breaches

Michele Heath et al.

Summary: This study aims to explore the relationship between hospital organizational characteristics and HIPAA breaches. The results indicate that EMR capabilities, hospital size, system membership, and teaching status have an impact on various types of HIPAA breaches.

INTERNATIONAL JOURNAL OF HEALTHCARE MANAGEMENT (2022)

Article Computer Science, Information Systems

Consumer Acceptance and Use of Information Technology: A Meta-Analytic Evaluation of UTAUT2

Kuttimani Tamilmani et al.

Summary: Despite UTAUT2 theory being considered as the most comprehensive in understanding individual technology adoption, it has faced strong criticism on its usage. Meta-analysis results from 60 studies with over 122,000 cumulative observations found that the BI→UB path was the strongest, with all significant values. The most utilized path was PE→BI, highlighting the emphasis placed by consumers on utilitarian value, while caution was raised about the future usage of the EE→BI path due to mostly non-significant values. Trust, personal innovativeness, perceived risk, attitude, and self-efficacy were identified as the top five UTAUT2 extensions.

INFORMATION SYSTEMS FRONTIERS (2021)

Article Information Science & Library Science

Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model

Yan Chen et al.

Summary: With the increase in ISec threats, organizations are searching for technical and behavioral methods to enhance security, focusing on encouraging employees to understand and comply with ISPs. Research should consider a tipping point between compliance and noncompliance to effectively address organizational information security.

INFORMATION SYSTEMS RESEARCH (2021)

Article Information Science & Library Science

Engaging with uncertainty: Information practices in the context of disease surveillance in Burkina Faso

Stine Loft Rasmussen et al.

Summary: Uncertainty is inherent to outbreaks of infectious diseases, and addressing global outbreaks requires well-functioning information systems. This paper aims to understand uncertainty in information systems and analyze formal, informal, and emerging information practices in developing countries. Through the study of a dengue outbreak in Burkina Faso in 2016, the concepts of general and specific metis were found to play important roles in responding to emerging diseases, contributing to the understanding of uncertainty in information systems research.

INFORMATION AND ORGANIZATION (2021)

Article Management

Perception of privacy issues and awareness in health-care knowledge management systems: empirical study in Indian health-care context

Prathamesh Churi et al.

Summary: In the context of Indian healthcare management systems, privacy concerns arise due to factors such as culture, politics, budget limitations, and infrastructure, leading to potential data security issues. Cultural norms in India may hinder the accurate disclosure of sensitive healthcare data, impacting the level of treatment received and resulting in discrepancies in recorded data. As technology plays a significant role in healthcare KM systems, understanding privacy perceptions and data sharing awareness is crucial for effective management of healthcare data.

INTERNATIONAL JOURNAL OF ORGANIZATIONAL ANALYSIS (2021)

Article Computer Science, Information Systems

DATA BREACH MANAGEMENT: AN INTEGRATED RISK MODEL

Freeha Khan et al.

Summary: This study presents an integrated risk model for data breach management based on a systematic review of the literature, extending the body of knowledge in this area. It provides key insights for practitioners to organize and orchestrate effective data breach management.

INFORMATION & MANAGEMENT (2021)

Review Computer Science, Information Systems

Which factors affect the scientific impact of review papers in IS research? A scientometric study

Gerit Wagner et al.

Summary: Review papers play a crucial role in knowledge development in Information Systems, highlighting transparency in methodology and the development of research agendas.

INFORMATION & MANAGEMENT (2021)

Letter Computer Science, Information Systems

Telemedicine, privacy, and information security in the age of COVID-19

Mohammad S. Jalali et al.

JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2021)

Review Engineering, Biomedical

Cardiac implantable electronic devices and cybersecurity

Bhakti Patel et al.

Summary: The field of cardiac devices faces increasing concerns over cybersecurity threats and data breaches. Collaboration between the FDA, device manufacturers, and professional cardiology societies is essential to assess vulnerabilities and improve software updates for patient safety. As research in potential vulnerabilities progresses, multiple stakeholders continue to review and enhance cybersecurity safeguards to prevent hacking threats in medical devices and cardiac technology.

EXPERT REVIEW OF MEDICAL DEVICES (2021)

Article Health Care Sciences & Services

The Epidemiology of Patients' Email Addresses in a French University Hospital: Case-Control Study

Vincent Looten et al.

Summary: This study aimed to analyze the demographic characteristics of patients providing an email, and study the distribution of emails' domain names. The results showed that patients treated for chronic diseases were more likely to provide an email address. Most collected email addresses were associated with well-known email providers, while some were business emails or personalized domain names.

JOURNAL OF MEDICAL INTERNET RESEARCH (2021)

Article Health Care Sciences & Services

Privacy Concerns About Health Information Disclosure in Mobile Health: Questionnaire Study Investigating the Moderation Effect of Social Support

Yuanyuan Dang et al.

Summary: The study explores the relationships between privacy concerns, health information disclosure intention in mHealth, and social support from mHealth, revealing that social support can reduce patients' privacy concerns and mitigate the negative impact of privacy concerns on information disclosure intention. The results also show that different dimensions of social support have varying effects in mHealth, providing theoretical and practical implications for its development.

JMIR MHEALTH AND UHEALTH (2021)

Review Green & Sustainable Science & Technology

Security and Privacy Issues in Medical Internet of Things: Overview, Countermeasures, Challenges and Future Directions

Mohamed Elhoseny et al.

Summary: The rapid growth of Internet of Things (IoT) technology has enhanced our way of life and quality of life. Medical Internet of Things (MIoT) is a booming trend that aims to improve the health and well-being of billions of people.

SUSTAINABILITY (2021)

Article Computer Science, Information Systems

Identifying and prioritizing benefits and risks of using privacy-enhancing software through participatory design: a nominal group technique study with patients living with chronic conditions

Theodoros Giannouchos et al.

Summary: The study found that patients consider the most important benefits of privacy-enhancing prototype software to be minimum disclosure and comprehensive privacy protection, and expressed a desire for information on how their data are used and protected. Additionally, patients also expressed concerns about the additional checks needed beyond the software for privacy protection and the potential misuse of data by authorized users.

JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2021)

Article Computer Science, Information Systems

Herd behavior in information security decision-making

Ali Vedadi et al.

Summary: The study found that uncertainty about security technologies leads users to imitate others rather than rely on their personal perceived efficacy when dealing with security threats. Researchers and managers should take into consideration the influence of herd behavior effect on users' security decisions.

INFORMATION & MANAGEMENT (2021)

Review Health Policy & Services

Cybersecurity in the Internet of Medical Things

Nicole M. Thomasian et al.

Summary: This study focuses on the robustness of existing policy measures in securing Internet of Medical Things technologies, primarily discussing the regulatory ecosystem in the US. Regulatory guidance documents for medical IoT primarily address device identification, legacy device management, physical security, and breach detection, but additional regulation is needed to mitigate risks.

HEALTH POLICY AND TECHNOLOGY (2021)

Article Computer Science, Information Systems

The relationship between cybersecurity ratings and the risk of hospital data breaches

Sung J. Choi et al.

Summary: The study revealed that hospitals generally had lower cybersecurity ratings than Fortune 1000 firms, although they have been closing the gap in recent years. Hospitals with lower security ratings were found to have a significantly higher risk of experiencing a data breach, with the probability ranging from 14% to 33% annually.

JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2021)

Article Information Science & Library Science

Learning from Enforcement Cases to Manage GDPR Risks

Saeed Akhlaghpour et al.

Summary: The General Data Protection Regulation (GDPR) is a groundbreaking law that affects organizations globally, with potential hefty penalties for noncompliance. Compliance requires a risk-based approach to manage GDPR risks effectively.

MIS QUARTERLY EXECUTIVE (2021)

Article Computer Science, Information Systems

Individuals' privacy concerns and adoption of contact tracing mobile applications in a pandemic: A situational privacy calculus perspective

Farkhondeh Hassandoust et al.

Summary: This study developed and validated a holistic model for explaining potential users' privacy concerns and intention to install a contact tracing mobile application, highlighting factors such as risk beliefs, perceived benefits, privacy concerns, and technology features. Public health agencies can use this model to address identified issues and increase CTMA adoption.

JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2021)

Article Computer Science, Information Systems

The Roles of IT Strategies and Security Investments in Reducing Organizational Security Breaches

He Li et al.

Summary: This research explores the joint effects of IT strategies and security investments on organizational security breaches. Different IT strategies and security measures have complex impacts on security breaches within organizations.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2021)

Article Computer Science, Information Systems

Estimating Security Risk of Healthcare Web Applications: A Design Perspective

Fahad A. Alzahrani

Summary: In recent years, the security risks of WBHMS have been increasing rapidly, with the healthcare industry facing inherent risks to data and assets. Assessing the security risk of WBHMS is crucial for maintaining the security of patients' medical information. The research utilized a hybrid technique, Fuzzy Analytic Hierarchy Process-Technique for Order of Preference by Similarity to Ideal Solution (F-AHPTOPSIS), to assist future researchers and specialists in organizing web applications with advanced security support.

CMC-COMPUTERS MATERIALS & CONTINUA (2021)

Article Computer Science, Information Systems

Anger or fear? Effects of discrete emotions on employee's computer-related deviant behavior

Feng Xu et al.

INFORMATION & MANAGEMENT (2020)

Review Computer Science, Information Systems

An exhaustive survey on security and privacy issues in Healthcare 4.0

Jigna J. Hathaliya et al.

COMPUTER COMMUNICATIONS (2020)

Article Health Policy & Services

An event study of data breaches and hospital IT spending

Sung J. Choi et al.

HEALTH POLICY AND TECHNOLOGY (2020)

Review Health Care Sciences & Services

Hospital Bring-Your-Own-Device Security Challenges and Solutions: Systematic Review of Gray Literature

Tafheem Ahmad Wani et al.

JMIR MHEALTH AND UHEALTH (2020)

Article Public, Environmental & Occupational Health

Too Much Information: Assessing Privacy Risks of Contact Trace Data Disclosure on People With COVID-19 in South Korea

Gyuwon Jung et al.

FRONTIERS IN PUBLIC HEALTH (2020)

Article Health Care Sciences & Services

Public Disclosure on Social Media of Identifiable Patient Information by Health Professionals: Content Analysis of Twitter Data

Wasim Ahmed et al.

JOURNAL OF MEDICAL INTERNET RESEARCH (2020)

Review Computer Science, Information Systems

Towards a contextual theory of Mobile Health Data Protection (MHDP): A realist perspective

Javad Pool et al.

INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS (2020)

Article Computer Science, Software Engineering

Finding faults: A scoping study of fault diagnostics for Industrial Cyber-Physical Systems

Barry Dowdeswell et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2020)

Review Computer Science, Information Systems

Literature review: Understanding information systems strategy in the digital age

R. Alexander Teubner et al.

JOURNAL OF STRATEGIC INFORMATION SYSTEMS (2020)

Article Information Science & Library Science

The Influence of Professional Subculture on Information Security Policy Violations: A Field Study in a Healthcare Context

Sumantra Sarkar et al.

INFORMATION SYSTEMS RESEARCH (2020)

Article Information Science & Library Science

Impact of COVID-19 pandemic on information management research and practice: Transforming education, work and life

Yogesh K. Dwivedi et al.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2020)

Article Computer Science, Information Systems

Bringing Context Inside Process Research with Digital Trace Data

Brian T. Pentland et al.

JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS (2020)

Review Information Science & Library Science

Role of visual analytics in supporting mental healthcare systems research and policy: A systematic scoping review

Younjin Chung et al.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2020)

Article Information Science & Library Science

Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment

Chenhui Liu et al.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2020)

Article Information Science & Library Science

Changing the conversation on evaluating digital transformation in healthcare: Insights from an institutional analysis

Andrew Burton-Jones et al.

INFORMATION AND ORGANIZATION (2020)

Review Health Care Sciences & Services

Healthcare Data Breaches: Insights and Implications

Adil Hussain Seh et al.

HEALTHCARE (2020)

Review Information Science & Library Science

Digital health eco-systems: An epochal review of practice-oriented research

Lena Stephanie et al.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2020)

Review Computer Science, Information Systems

Design of review systems - A strategic instrument to shape online reviewing behavior and economic outcomes

Dominik Gutt et al.

JOURNAL OF STRATEGIC INFORMATION SYSTEMS (2019)

Article Medicine, General & Internal

Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis

Quinn Grundy et al.

BMJ-BRITISH MEDICAL JOURNAL (2019)

Article Emergency Medicine

Use of personal mobile devices to record patient data by Canadian emergency physicians and residents

Kerry E. Walker et al.

CANADIAN JOURNAL OF EMERGENCY MEDICINE (2019)

Article Pharmacology & Pharmacy

Pharmacy ethical reasoning: a comparison of Australian pharmacists and interns

H. Laetitia Hattingh et al.

INTERNATIONAL JOURNAL OF CLINICAL PHARMACY (2019)

Article Health Care Sciences & Services

Data breach remediation efforts and their implications for hospital quality

Sung J. Choi et al.

HEALTH SERVICES RESEARCH (2019)

Article Computer Science, Information Systems

Local health department adoption of electronic health records and health information exchanges and its impact on population health

Tina Yeung

INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS (2019)

Editorial Material Medicine, General & Internal

Big Data, Big Tech, and Protecting Patient Privacy

I. Glenn Cohen et al.

JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION (2019)

Article Health Care Sciences & Services

Healthcare Data Breaches: Implications for Digital Forensic Readiness

Maxim Chernyshev et al.

JOURNAL OF MEDICAL SYSTEMS (2019)

Review Computer Science, Information Systems

A review of the practical relevance of IS strategy scholarly research

Mohammad Moeini et al.

JOURNAL OF STRATEGIC INFORMATION SYSTEMS (2019)

Article Computer Science, Interdisciplinary Applications

A trade-off dual-factor model to investigate discontinuous intention of health app users: From the perspective of information disclosure

Cheng-Kui Huang et al.

JOURNAL OF BIOMEDICAL INFORMATICS (2019)

Article Ethics

Assessment of Doctors' Knowledge and Attitudes Towards Confidentiality in Hospital Care

Cristina M. Beltran-Aroca et al.

SCIENCE AND ENGINEERING ETHICS (2019)

Letter Medicine, General & Internal

Evaluation of Causes of Protected Health Information Breaches

John (Xuefeng) Jiang et al.

JAMA INTERNAL MEDICINE (2019)

Review Computer Science, Information Systems

CONTEXTUAL EXPLANATION: ALTERNATIVE APPROACHES AND PERSISTENT CHALLENGES

Chrisanthi Avgerou

MIS QUARTERLY (2019)

Article Computer Science, Information Systems

Disposition toward privacy and information disclosure in the context of emerging health technologies

Cynthia E. Schairer et al.

JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2019)

Article Information Science & Library Science

Toward a Theory of Information Systems Security Behaviors of Organizational Employees: A Dialectical Process Perspective

Mari Karjalainen et al.

INFORMATION SYSTEMS RESEARCH (2019)

Article Social Sciences, Interdisciplinary

Electronic Health Record Breaches as Social Indicators

Waldemar W. Koczkodaj et al.

SOCIAL INDICATORS RESEARCH (2019)

Article Health Care Sciences & Services

Assessing staff awareness and effectiveness of educational training on IT security and privacy in a large healthcare organization

Mubashir Aslam Arain et al.

JOURNAL OF MULTIDISCIPLINARY HEALTHCARE (2019)

Article Computer Science, Information Systems

Evaluation of a mandatory phishing training program for high-risk employees at a US healthcare system

William J. Gordon et al.

JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2019)

Article Information Science & Library Science

How Do EHRs and a Meaningful Use Initiative Affect Breaches of Patient Information?

Seung Hyun Kim et al.

INFORMATION SYSTEMS RESEARCH (2019)

Review Computer Science, Information Systems

Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices-A Review

Tehreem Yaqoob et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

It Takes a Village: Understanding the Collective Security Efficacy of Employee Groups

Allen C. Johnston et al.

JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS (2019)

Article Computer Science, Information Systems

How Paternalistic Leadership Influences IT Security Policy Compliance: The Mediating Role of the Social Bond

Gengzhong Feng et al.

JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS (2019)

Review Computer Science, Information Systems

Information Systems as Representations: A Review of the Theory and Evidence

Jan Recker et al.

JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS (2019)

Article Information Science & Library Science

Investigating the impact of cybersecurity policy awareness on employees' cybersecurity behavior

Ling Li et al.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2019)

Article Health Policy & Services

Evaluation of the awareness and effectiveness of IT security programs in a large publicly funded health care system

Shelanne L. Hepp et al.

HEALTH INFORMATION MANAGEMENT JOURNAL (2018)

Article Public, Environmental & Occupational Health

Factors Influencing People's Personal Information Disclosure Behaviors in Online Health Communities: A Pilot Study

Junjie Zhou

ASIA-PACIFIC JOURNAL OF PUBLIC HEALTH (2018)

Article Computer Science, Artificial Intelligence

Cyber-analytics: Modeling factors associated with healthcare data breaches

Alexander McLeod et al.

DECISION SUPPORT SYSTEMS (2018)

Article Dermatology

Clinical Texting Among Medical Trainees of the University of British Columbia

Danny Guo et al.

JOURNAL OF CUTANEOUS MEDICINE AND SURGERY (2018)

Review Geriatrics & Gerontology

Cybersecurity in healthcare: A narrative review of trends, threats and ways forward

Lynne Coventry et al.

MATURITAS (2018)

Letter Medicine, General & Internal

Temporal Trends and Characteristics of Reportable Health Data Breaches, 2010-2017

Thomas H. McCoy et al.

JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION (2018)

Article Computer Science, Information Systems

Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances

Heng Xu et al.

Journal of the Association for Information Systems (2018)

Article Computer Science, Information Systems

Research in Information Systems: Intra-Disciplinary and Inter-Disciplinary Approaches

Monideepa Tarafdar et al.

JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS (2018)

Article Computer Science, Information Systems

Don't Even Think About It! The Effects of Antineutralization, Informational, and Normative Communication on Information Security Compliance

Jordan B. Barlow et al.

JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS (2018)

Article Biochemistry & Molecular Biology

FHIRChain: Applying Blockchain to Securely and Scalably Share Clinical Data

Peng Zhang et al.

COMPUTATIONAL AND STRUCTURAL BIOTECHNOLOGY JOURNAL (2018)

Article Medical Informatics

Continuance compliance of privacy policy of electronic medical records: the roles of both motivation and habit

Kuang Ming Kuo et al.

BMC MEDICAL INFORMATICS AND DECISION MAKING (2018)

Article Health Care Sciences & Services

Health IT, hacking, and cybersecurity: national trends in data breaches of protected health information

Jay G. Ronquillo et al.

JAMIA OPEN (2018)

Article Information Science & Library Science

Opening the envelope of health care information systems research

Elizabeth Davidson et al.

INFORMATION AND ORGANIZATION (2018)

Article Computer Science, Software Engineering

Misuse of 'Break-the-Glass' Policies in Hospitals: Detecting Unauthorized Access to Sensitive Patient Health Data

Benjamin Stark et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY (2018)

Article Business

Telemedicine for low resource settings: Exploring the generative mechanisms

Rajesh Chandwani et al.

TECHNOLOGICAL FORECASTING AND SOCIAL CHANGE (2018)

Article Information Science & Library Science

Mobile health technology adoption across generations: Narrowing the digital divide

Grace Fox et al.

INFORMATION SYSTEMS JOURNAL (2018)

Article Psychology, Multidisciplinary

The impact of information security threat awareness on privacy-protective behaviors

Stanislav Mamonov et al.

COMPUTERS IN HUMAN BEHAVIOR (2018)

Article Psychology, Applied

A Systematic Scoping Review of the Choice Architecture Movement: Toward Understanding When and Why Nudges Work

Barnabas Szaszi et al.

JOURNAL OF BEHAVIORAL DECISION MAKING (2018)

Article Computer Science, Information Systems

Examining the intended and unintended consequences of organisational privacy safeguards

Rachida Parks et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2017)

Editorial Material Computer Science, Information Systems

Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda

Paul Benjamin Lowry et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2017)

Article Orthopedics

Electronic Communication of rotected ealth Infstrmatitsrm Privacy, Security, and HIPAA Compliance

Brian C. Drolet et al.

JOURNAL OF HAND SURGERY-AMERICAN VOLUME (2017)

Article Health Care Sciences & Services

Trust Me, I'm a Doctor: Examining Changes in How Privacy Concerns Affect Patient Withholding Behavior

Daniel M. Walker et al.

JOURNAL OF MEDICAL INTERNET RESEARCH (2017)

Article Health Care Sciences & Services

A Deterrence Approach to Regulate Nurses' Compliance with Electronic Medical Records Privacy Policy

Kuang-Ming Kuo et al.

JOURNAL OF MEDICAL SYSTEMS (2017)

Article Computer Science, Information Systems

User Compensation as a Data Breach Recovery Action: An Investigation of the Sony PlayStation Network Breach

Sigi Goode et al.

MIS QUARTERLY (2017)

Article Computer Science, Information Systems

Assessing Representation Theory with a Framework for Pursuing Success and Failure

Andrew Burton-Jones et al.

MIS QUARTERLY (2017)

Editorial Material Medicine, General & Internal

Threats to Information Security - Public Health Implications

William J. Gordon et al.

NEW ENGLAND JOURNAL OF MEDICINE (2017)

Letter Medicine, General & Internal

The Need for Better Data Breach Statistics Reply

Ge Bai et al.

JAMA INTERNAL MEDICINE (2017)

Letter Medicine, General & Internal

Hospital Risk of Data Breaches

Ge Bai et al.

JAMA INTERNAL MEDICINE (2017)

Article Health Policy & Services

Going Beyond Compliance: A Strategic Framework for Promoting Information Security in Hospitals

David J. Zandona et al.

HEALTH CARE MANAGER (2017)

Article Psychiatry

Confidentiality and Privacy for Smartphone Applications in Child and Adolescent Psychiatry Unmet Needs and Practical Solutions

Emily Wu et al.

CHILD AND ADOLESCENT PSYCHIATRIC CLINICS OF NORTH AMERICA (2017)

Article Medical Informatics

Prevalence of Sharing Access Credentials in Electronic Medical Records

Ayal Hassidim et al.

HEALTHCARE INFORMATICS RESEARCH (2017)

Article Computer Science, Information Systems

Understanding the Why, What, and How of Theories in IS Research

Benjamin Mueller et al.

COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS (2017)

Article Information Science & Library Science

How Can We Develop Contextualized Theories of Effective Use? A Demonstration in the Context of Community-Care Electronic Health Records

Andrew Burton-Jones et al.

INFORMATION SYSTEMS RESEARCH (2017)

Article Information Science & Library Science

Factors influencing adoption of mobile banking by Jordanian bank customers: Extending UTAUT2 with trust

Ali Abdallah Alalwan et al.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2017)

Review Public, Environmental & Occupational Health

Social isolation, loneliness and health in old age: a scoping review

Emilie Courtin et al.

HEALTH & SOCIAL CARE IN THE COMMUNITY (2017)

Article Radiology, Nuclear Medicine & Medical Imaging

Security of patient data when decommissioning ultrasound systems

James Moggridge

ULTRASOUND (2017)

Article Health Care Sciences & Services

Integrated knowledge translation (IKT) in health care: a scoping review

Anna R. Gagliardi et al.

IMPLEMENTATION SCIENCE (2016)

Article Computer Science, Information Systems

Why different trust relationships matter for information systems users

Matthias Soellner et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2016)

Article Computer Science, Information Systems

Contextualizing the twin concepts of systematicity and transparency in information systems literature reviews

Guy Pare et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2016)

Article Computer Science, Information Systems

Context is king! Considering particularism in research design and reporting

Robert M. Davison et al.

JOURNAL OF INFORMATION TECHNOLOGY (2016)

Article Health Care Sciences & Services

Security Attacks and Solutions in Electronic Health (E-health) Systems

Sherali Zeadally et al.

JOURNAL OF MEDICAL SYSTEMS (2016)

Article Health Care Sciences & Services

Too Much or Too Little? How Much Control Should Patients Have Over EHR Data?

Soumitra Sudip Bhuyan et al.

JOURNAL OF MEDICAL SYSTEMS (2016)

Article Computer Science, Information Systems

Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations under Conditions of Strain and Excess

Jeffrey D. Wall et al.

JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS (2016)

Article Computer Science, Information Systems

ELECTRONIC HEALTH RECORDS: HOW CAN IS RESEARCHERS CONTRIBUTE TO TRANSFORMING HEALTHCARE?

Rajiv Kohli et al.

MIS QUARTERLY (2016)

Article Cell Biology

A cybersecurity primer for translational research

Eric D. Perakslis et al.

SCIENCE TRANSLATIONAL MEDICINE (2016)

Review Health Care Sciences & Services

Cyber threats to health information systems: A systematic review

Raul Luna et al.

TECHNOLOGY AND HEALTH CARE (2016)

Article Computer Science, Information Systems

Context is king! Considering particularism in research design and reporting

Robert M. Davison et al.

JOURNAL OF INFORMATION TECHNOLOGY (2016)

Article Health Care Sciences & Services

Reasons for Picture Archiving and Communication System (PACS) data security breaches: Intentional versus non-intentional breaches

Tintswalo Brenda Mahlaola et al.

HEALTH SA GESONDHEID (2016)

Article Public, Environmental & Occupational Health

Social networks, privacy, confidentiality and ethics: exhibition of pictures of patients on Facebook

Leandro Brambilla Martorell et al.

INTERFACE-COMUNICACAO SAUDE EDUCACAO (2016)

Article Information Science & Library Science

Information security management needs more holistic approach: A literature review

Zahoor Ahmed Soomro et al.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2016)

Article Information Science & Library Science

Antecedents of privacy calculus components in virtual health communities

Nima Kordzadeh et al.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2016)

Article Computer Science, Information Systems

Theoretical perspectives in IS research: from variance and process to conceptual latitude and conceptual fit

Andrew Burton-Jones et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2015)

Article Computer Science, Information Systems

Exploring information privacy regulation, risks, trust, and behavior

Caroline Lancelot Miltgen et al.

INFORMATION & MANAGEMENT (2015)

Review Computer Science, Information Systems

Synthesizing information systems knowledge: A typology of literature reviews

Guy Pare et al.

INFORMATION & MANAGEMENT (2015)

Article Computer Science, Information Systems

Designing for privacy management in hospitals: Understanding the gap between user activities and IT staff's understandings

Elizabeth V. Eikey et al.

INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS (2015)

Letter Medicine, General & Internal

Data Breaches of Protected Health Information in the United States

Vincent Liu et al.

JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION (2015)

Article Computer Science, Information Systems

Big other: surveillance capitalism and the prospects of an information civilization

Shoshana Zuboff

JOURNAL OF INFORMATION TECHNOLOGY (2015)

Article Health Care Sciences & Services

Barriers and Facilitators to Online Portal Use Among Patients and Caregivers in a Safety Net Health Care System: A Qualitative Study

Lina Tieu et al.

JOURNAL OF MEDICAL INTERNET RESEARCH (2015)

Article Computer Science, Information Systems

Contextualist Inquiry into IT-enabled Hospital Revenue Cycle Management: Bridging Research and Practice

Vitali Mindel et al.

JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS (2015)

Article Computer Science, Artificial Intelligence

An integrated framework for securing semi-structured health records

Flora Amato et al.

KNOWLEDGE-BASED SYSTEMS (2015)

Article Computer Science, Information Systems

Big other: surveillance capitalism and the prospects of an information civilization

Shoshana Zuboff

JOURNAL OF INFORMATION TECHNOLOGY (2015)

Article Psychology, Multidisciplinary

How Secure Is Mental Health Providers' Electronic Patient Communication? An Empirical Investigation

Jon D. Elhai et al.

PROFESSIONAL PSYCHOLOGY-RESEARCH AND PRACTICE (2015)

Article Computer Science, Information Systems

Disaster easily averted? - Data confidentiality and the hospital desktop computer

Neeraj Sethi et al.

INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS (2014)

Article Computer Science, Information Systems

Concern about security and privacy, and perceived control over collection and use of health information are related to withholding of health information from healthcare providers

Israel T. Agaku et al.

JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2014)

Article Computer Science, Information Systems

PROACTIVE VERSUS REACTIVE SECURITY INVESTMENTS IN THE HEALTHCARE SECTOR

Juhee Kwon et al.

MIS QUARTERLY (2014)

Article Computer Science, Information Systems

Privacy and Security Issues for Mobile Health Platforms

Melissa J. Harvey et al.

JOURNAL OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY (2014)

Article Medical Informatics

Human and Organizational Factors of Healthcare Data Breaches: The Swiss Cheese Model of Data Breach Causation And Prevention

Faouzi Kamoun et al.

INTERNATIONAL JOURNAL OF HEALTHCARE INFORMATION SYSTEMS AND INFORMATICS (2014)

Article Information Science & Library Science

A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research

Weiyin Hong et al.

INFORMATION SYSTEMS RESEARCH (2014)

Article Health Care Sciences & Services

Managing information and knowledge within maternity services: Privacy and consent issues

Vikraman Baskaran et al.

INFORMATICS FOR HEALTH & SOCIAL CARE (2013)

Article Computer Science, Information Systems

Health-Care Security Strategies for Data Protection and Regulatory Compliance

Juhee Kwon et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2013)

Article Computer Science, Information Systems

Security practices and regulatory compliance in the healthcare industry

Juhee Kwon et al.

JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2013)

Article Criminology & Penology

Medical Data Breaches: What the Reported Data Illustrates, and Implications for Transitioning to Electronic Medical Records

Akshat Kapoor et al.

JOURNAL OF APPLIED SECURITY RESEARCH (2013)

Article Psychology, Applied

Seeking Qualitative Rigor in Inductive Research: Notes on the Gioia Methodology

Dennis A. Gioia et al.

ORGANIZATIONAL RESEARCH METHODS (2013)

Article Information Science & Library Science

From Use to Effective Use: A Representation Theory Perspective

Andrew Burton-Jones et al.

INFORMATION SYSTEMS RESEARCH (2013)

Article Computer Science, Information Systems

HIPAA Privacy Rule compliance: An interpretive study using Norman's action theory

Divakaran Liginlal et al.

COMPUTERS & SECURITY (2012)

Article Computer Science, Information Systems

Toward a better understanding of behavioral intention and system usage constructs

Jiming Wu et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2012)

Article Computer Science, Information Systems

Blaming Noncompliance Is Too Convenient: What Really Causes Information Breaches?

Karen Renaud

IEEE SECURITY & PRIVACY (2012)

Article Criminology & Penology

Determinants of Data Breaches: A Categorization-Based Empirical Investigation

Manish Gupta et al.

JOURNAL OF APPLIED SECURITY RESEARCH (2012)

Article Law

Medical data breaches: Notification delayed is notification denied

Patrick Kierkegaard

COMPUTER LAW & SECURITY REVIEW (2012)

Article Medicine, General & Internal

Defining Health Information Technology-Related Errors New Developments Since To Err Is Human

Dean F. Sittig et al.

ARCHIVES OF INTERNAL MEDICINE (2011)

Article Public, Environmental & Occupational Health

Physician privacy concerns when disclosing patient data for public health purposes during a pandemic influenza outbreak

Khaled El Emam et al.

BMC PUBLIC HEALTH (2011)

Article Computer Science, Information Systems

The influence of the informal social learning environment on information privacy policy compliance efficacy and intention

Merrill Warkentin et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2011)

Article Computer Science, Information Systems

Determining the privacy policy deficiencies of health ICT applications through semi-formal modelling

Peter R. Croll

INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS (2011)

Review Computer Science, Information Systems

Personal health records: a scoping review

N. Archer et al.

JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2011)

Article Computer Science, Artificial Intelligence

The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online

Gaurav Bansal et al.

DECISION SUPPORT SYSTEMS (2010)

Article Health Care Sciences & Services

Scoping studies: advancing the methodology

Danielle Levac et al.

IMPLEMENTATION SCIENCE (2010)

Article Information Science & Library Science

The Digital Transformation of Healthcare: Current Status and the Road Ahead

Ritu Agarwal et al.

INFORMATION SYSTEMS RESEARCH (2010)

Article Health Care Sciences & Services

Information security foundations for the interoperability of electronic health records

Wm. Arthur Conklin et al.

INTERNATIONAL JOURNAL OF HEALTHCARE TECHNOLOGY AND MANAGEMENT (2010)

Article Primary Health Care

Violations of medical confidentiality: opinions of primary care physicians

Bernice S. Elger

BRITISH JOURNAL OF GENERAL PRACTICE (2009)

Article Computer Science, Information Systems

The health information system security threat lifecycle: An informatics theory

Juanita I. Fernando et al.

INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS (2009)

Review Nursing

What are scoping studies? A review of the nursing literature

Kathy Davis et al.

INTERNATIONAL JOURNAL OF NURSING STUDIES (2009)

Article Health Care Sciences & Services

Patients' Attitudes Toward Electronic Health Information Exchange: Qualitative Study

Steven R. Simon et al.

JOURNAL OF MEDICAL INTERNET RESEARCH (2009)

Review Information Science & Library Science

User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach

John D'Arcy et al.

INFORMATION SYSTEMS RESEARCH (2009)