相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Artificial Intelligence (AI) and Information Systems: Perspectives to Responsible AI
Denis Dennehy et al.
INFORMATION SYSTEMS FRONTIERS (2023)
The role of collectivism and moderating effect of IT proficiency on intention to disclose protected health information
Eun Hee Park et al.
INFORMATION TECHNOLOGY & MANAGEMENT (2023)
Building data management capabilities to address data protection regulations: Learnings from EU-GDPR
Clement Labadie et al.
JOURNAL OF INFORMATION TECHNOLOGY (2023)
Employee responses to information security related stress: Coping and violation intention
Adel Yazdanmehr et al.
INFORMATION SYSTEMS JOURNAL (2023)
COVID-19 pandemic-induced organisational cultural shifts and employee information security compliance behaviour: a South African case study
Kiara Jordan Butler et al.
INFORMATION AND COMPUTER SECURITY (2023)
AI-Generated Medical Advice-GPT and Beyond
Claudia E. Haupt et al.
JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION (2023)
ChatGPT and consumers: Benefits, Pitfalls and Future Research Agenda
Justin Paul et al.
INTERNATIONAL JOURNAL OF CONSUMER STUDIES (2023)
?So what if ChatGPT wrote it?? Multidisciplinary perspectives on opportunities, challenges and implications of generative conversational AI for research, practice and policy
Yogesh K. Dwivedi et al.
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2023)
Blockchain for healthcare data management: opportunities, challenges, and future recommendations
Ibrar Yaqoob et al.
NEURAL COMPUTING & APPLICATIONS (2022)
Analyzing the Implications of Healthcare Data Breaches through Computational Technique
Ahmed H. Almulihi et al.
INTELLIGENT AUTOMATION AND SOFT COMPUTING (2022)
Assistive Multimodal Robotic System (AMRSys): Security and Privacy Issues, Challenges, and Possible Solutions
Jims Marchang et al.
APPLIED SCIENCES-BASEL (2022)
Digital Healthcare-Cyberattacks in Asian Organizations: An Analysis of Vulnerabilities, Risks, NIST Perspectives, and Recommendations
Kamalanathan Kandasamy et al.
IEEE ACCESS (2022)
Distributed IT championing: A process theory
Bogdan Negoita et al.
JOURNAL OF INFORMATION TECHNOLOGY (2022)
Trust and digital privacy in healthcare: a cross-sectional descriptive study of trust and attitudes towards uses of electronic health data among the general public in Sweden
Sara Belfrage et al.
BMC MEDICAL ETHICS (2022)
Understanding dark side of artificial intelligence (AI) integrated business analytics: assessing firm's operational inefficiency and competitiveness
Nripendra P. Rana et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2022)
The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities
Lai-Wan Wong et al.
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2022)
Citizens' Attitudes to Contact Tracing Apps
Laszlo Horvath et al.
JOURNAL OF EXPERIMENTAL POLITICAL SCIENCE (2022)
Prosocial rule breaking on health information security at healthcare organisations in South Korea
Jongwoo Kim et al.
INFORMATION SYSTEMS JOURNAL (2022)
Hospital characteristics associated with HIPAA breaches
Michele Heath et al.
INTERNATIONAL JOURNAL OF HEALTHCARE MANAGEMENT (2022)
Consumer Acceptance and Use of Information Technology: A Meta-Analytic Evaluation of UTAUT2
Kuttimani Tamilmani et al.
INFORMATION SYSTEMS FRONTIERS (2021)
Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model
Yan Chen et al.
INFORMATION SYSTEMS RESEARCH (2021)
Engaging with uncertainty: Information practices in the context of disease surveillance in Burkina Faso
Stine Loft Rasmussen et al.
INFORMATION AND ORGANIZATION (2021)
Perception of privacy issues and awareness in health-care knowledge management systems: empirical study in Indian health-care context
Prathamesh Churi et al.
INTERNATIONAL JOURNAL OF ORGANIZATIONAL ANALYSIS (2021)
DATA BREACH MANAGEMENT: AN INTEGRATED RISK MODEL
Freeha Khan et al.
INFORMATION & MANAGEMENT (2021)
Which factors affect the scientific impact of review papers in IS research? A scientometric study
Gerit Wagner et al.
INFORMATION & MANAGEMENT (2021)
Telemedicine, privacy, and information security in the age of COVID-19
Mohammad S. Jalali et al.
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2021)
Cardiac implantable electronic devices and cybersecurity
Bhakti Patel et al.
EXPERT REVIEW OF MEDICAL DEVICES (2021)
The Epidemiology of Patients' Email Addresses in a French University Hospital: Case-Control Study
Vincent Looten et al.
JOURNAL OF MEDICAL INTERNET RESEARCH (2021)
Privacy Concerns About Health Information Disclosure in Mobile Health: Questionnaire Study Investigating the Moderation Effect of Social Support
Yuanyuan Dang et al.
JMIR MHEALTH AND UHEALTH (2021)
Security and Privacy Issues in Medical Internet of Things: Overview, Countermeasures, Challenges and Future Directions
Mohamed Elhoseny et al.
SUSTAINABILITY (2021)
Identifying and prioritizing benefits and risks of using privacy-enhancing software through participatory design: a nominal group technique study with patients living with chronic conditions
Theodoros Giannouchos et al.
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2021)
Herd behavior in information security decision-making
Ali Vedadi et al.
INFORMATION & MANAGEMENT (2021)
Cybersecurity in the Internet of Medical Things
Nicole M. Thomasian et al.
HEALTH POLICY AND TECHNOLOGY (2021)
The relationship between cybersecurity ratings and the risk of hospital data breaches
Sung J. Choi et al.
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2021)
Learning from Enforcement Cases to Manage GDPR Risks
Saeed Akhlaghpour et al.
MIS QUARTERLY EXECUTIVE (2021)
Individuals' privacy concerns and adoption of contact tracing mobile applications in a pandemic: A situational privacy calculus perspective
Farkhondeh Hassandoust et al.
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2021)
The Roles of IT Strategies and Security Investments in Reducing Organizational Security Breaches
He Li et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2021)
Estimating Security Risk of Healthcare Web Applications: A Design Perspective
Fahad A. Alzahrani
CMC-COMPUTERS MATERIALS & CONTINUA (2021)
Anger or fear? Effects of discrete emotions on employee's computer-related deviant behavior
Feng Xu et al.
INFORMATION & MANAGEMENT (2020)
An exhaustive survey on security and privacy issues in Healthcare 4.0
Jigna J. Hathaliya et al.
COMPUTER COMMUNICATIONS (2020)
An event study of data breaches and hospital IT spending
Sung J. Choi et al.
HEALTH POLICY AND TECHNOLOGY (2020)
Hospital Bring-Your-Own-Device Security Challenges and Solutions: Systematic Review of Gray Literature
Tafheem Ahmad Wani et al.
JMIR MHEALTH AND UHEALTH (2020)
Genetic Privacy and Data Protection: A Review of Chinese Direct-to-Consumer Genetic Test Services
Li Du et al.
FRONTIERS IN GENETICS (2020)
Too Much Information: Assessing Privacy Risks of Contact Trace Data Disclosure on People With COVID-19 in South Korea
Gyuwon Jung et al.
FRONTIERS IN PUBLIC HEALTH (2020)
Public Disclosure on Social Media of Identifiable Patient Information by Health Professionals: Content Analysis of Twitter Data
Wasim Ahmed et al.
JOURNAL OF MEDICAL INTERNET RESEARCH (2020)
In Defence of informed consent for health record research - why arguments from 'easy rescue', 'no harm' and 'consent bias' fail
Thomas Ploug
BMC MEDICAL ETHICS (2020)
Towards a contextual theory of Mobile Health Data Protection (MHDP): A realist perspective
Javad Pool et al.
INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS (2020)
Finding faults: A scoping study of fault diagnostics for Industrial Cyber-Physical Systems
Barry Dowdeswell et al.
JOURNAL OF SYSTEMS AND SOFTWARE (2020)
Literature review: Understanding information systems strategy in the digital age
R. Alexander Teubner et al.
JOURNAL OF STRATEGIC INFORMATION SYSTEMS (2020)
The Influence of Professional Subculture on Information Security Policy Violations: A Field Study in a Healthcare Context
Sumantra Sarkar et al.
INFORMATION SYSTEMS RESEARCH (2020)
Impact of COVID-19 pandemic on information management research and practice: Transforming education, work and life
Yogesh K. Dwivedi et al.
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2020)
Bringing Context Inside Process Research with Digital Trace Data
Brian T. Pentland et al.
JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS (2020)
Role of visual analytics in supporting mental healthcare systems research and policy: A systematic scoping review
Younjin Chung et al.
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2020)
Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment
Chenhui Liu et al.
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2020)
Towards understanding cybersecurity capability in Australian healthcare organisations: a systematic review of recent trends, threats and mitigation
K. L. Offner et al.
INTELLIGENCE AND NATIONAL SECURITY (2020)
Changing the conversation on evaluating digital transformation in healthcare: Insights from an institutional analysis
Andrew Burton-Jones et al.
INFORMATION AND ORGANIZATION (2020)
Healthcare Data Breaches: Insights and Implications
Adil Hussain Seh et al.
HEALTHCARE (2020)
Digital health eco-systems: An epochal review of practice-oriented research
Lena Stephanie et al.
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2020)
Design of review systems - A strategic instrument to shape online reviewing behavior and economic outcomes
Dominik Gutt et al.
JOURNAL OF STRATEGIC INFORMATION SYSTEMS (2019)
Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis
Quinn Grundy et al.
BMJ-BRITISH MEDICAL JOURNAL (2019)
Use of personal mobile devices to record patient data by Canadian emergency physicians and residents
Kerry E. Walker et al.
CANADIAN JOURNAL OF EMERGENCY MEDICINE (2019)
Pharmacy ethical reasoning: a comparison of Australian pharmacists and interns
H. Laetitia Hattingh et al.
INTERNATIONAL JOURNAL OF CLINICAL PHARMACY (2019)
Data breach remediation efforts and their implications for hospital quality
Sung J. Choi et al.
HEALTH SERVICES RESEARCH (2019)
Local health department adoption of electronic health records and health information exchanges and its impact on population health
Tina Yeung
INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS (2019)
Big Data, Big Tech, and Protecting Patient Privacy
I. Glenn Cohen et al.
JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION (2019)
Healthcare Data Breaches: Implications for Digital Forensic Readiness
Maxim Chernyshev et al.
JOURNAL OF MEDICAL SYSTEMS (2019)
A review of the practical relevance of IS strategy scholarly research
Mohammad Moeini et al.
JOURNAL OF STRATEGIC INFORMATION SYSTEMS (2019)
A trade-off dual-factor model to investigate discontinuous intention of health app users: From the perspective of information disclosure
Cheng-Kui Huang et al.
JOURNAL OF BIOMEDICAL INFORMATICS (2019)
Assessment of Doctors' Knowledge and Attitudes Towards Confidentiality in Hospital Care
Cristina M. Beltran-Aroca et al.
SCIENCE AND ENGINEERING ETHICS (2019)
Evaluation of Causes of Protected Health Information Breaches
John (Xuefeng) Jiang et al.
JAMA INTERNAL MEDICINE (2019)
CONTEXTUAL EXPLANATION: ALTERNATIVE APPROACHES AND PERSISTENT CHALLENGES
Chrisanthi Avgerou
MIS QUARTERLY (2019)
Disposition toward privacy and information disclosure in the context of emerging health technologies
Cynthia E. Schairer et al.
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2019)
Toward a Theory of Information Systems Security Behaviors of Organizational Employees: A Dialectical Process Perspective
Mari Karjalainen et al.
INFORMATION SYSTEMS RESEARCH (2019)
Electronic Health Record Breaches as Social Indicators
Waldemar W. Koczkodaj et al.
SOCIAL INDICATORS RESEARCH (2019)
How private is your mental health app data? An empirical study of mental health app privacy policies and practices
Lisa Parker et al.
INTERNATIONAL JOURNAL OF LAW AND PSYCHIATRY (2019)
Assessing staff awareness and effectiveness of educational training on IT security and privacy in a large healthcare organization
Mubashir Aslam Arain et al.
JOURNAL OF MULTIDISCIPLINARY HEALTHCARE (2019)
Evaluation of a mandatory phishing training program for high-risk employees at a US healthcare system
William J. Gordon et al.
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2019)
How Do EHRs and a Meaningful Use Initiative Affect Breaches of Patient Information?
Seung Hyun Kim et al.
INFORMATION SYSTEMS RESEARCH (2019)
Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices-A Review
Tehreem Yaqoob et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
It Takes a Village: Understanding the Collective Security Efficacy of Employee Groups
Allen C. Johnston et al.
JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS (2019)
How Paternalistic Leadership Influences IT Security Policy Compliance: The Mediating Role of the Social Bond
Gengzhong Feng et al.
JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS (2019)
Information Systems as Representations: A Review of the Theory and Evidence
Jan Recker et al.
JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS (2019)
Investigating the impact of cybersecurity policy awareness on employees' cybersecurity behavior
Ling Li et al.
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2019)
Evaluation of the awareness and effectiveness of IT security programs in a large publicly funded health care system
Shelanne L. Hepp et al.
HEALTH INFORMATION MANAGEMENT JOURNAL (2018)
Factors Influencing People's Personal Information Disclosure Behaviors in Online Health Communities: A Pilot Study
Junjie Zhou
ASIA-PACIFIC JOURNAL OF PUBLIC HEALTH (2018)
Cyber-analytics: Modeling factors associated with healthcare data breaches
Alexander McLeod et al.
DECISION SUPPORT SYSTEMS (2018)
Clinical Texting Among Medical Trainees of the University of British Columbia
Danny Guo et al.
JOURNAL OF CUTANEOUS MEDICINE AND SURGERY (2018)
The Effectiveness of Health Care Information Technologies: Evaluation of Trust, Security Beliefs, and Privacy as Determinants of Health Care Outcomes
Victoria Kisekka et al.
JOURNAL OF MEDICAL INTERNET RESEARCH (2018)
Cybersecurity in healthcare: A narrative review of trends, threats and ways forward
Lynne Coventry et al.
MATURITAS (2018)
The Role of HIPAA Omnibus Rules in Reducing the Frequency of Medical Data Breaches: Insights From an Empirical Study
Niam Yaraghi et al.
MILBANK QUARTERLY (2018)
Using Texting for Clinical Communication in Surgery: A Survey of Academic Staff Surgeons
Mohammed Firdouse et al.
SURGICAL INNOVATION (2018)
Temporal Trends and Characteristics of Reportable Health Data Breaches, 2010-2017
Thomas H. McCoy et al.
JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION (2018)
Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances
Heng Xu et al.
Journal of the Association for Information Systems (2018)
Research in Information Systems: Intra-Disciplinary and Inter-Disciplinary Approaches
Monideepa Tarafdar et al.
JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS (2018)
Don't Even Think About It! The Effects of Antineutralization, Informational, and Normative Communication on Information Security Compliance
Jordan B. Barlow et al.
JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS (2018)
FHIRChain: Applying Blockchain to Securely and Scalably Share Clinical Data
Peng Zhang et al.
COMPUTATIONAL AND STRUCTURAL BIOTECHNOLOGY JOURNAL (2018)
Continuance compliance of privacy policy of electronic medical records: the roles of both motivation and habit
Kuang Ming Kuo et al.
BMC MEDICAL INFORMATICS AND DECISION MAKING (2018)
Health IT, hacking, and cybersecurity: national trends in data breaches of protected health information
Jay G. Ronquillo et al.
JAMIA OPEN (2018)
Opening the envelope of health care information systems research
Elizabeth Davidson et al.
INFORMATION AND ORGANIZATION (2018)
Misuse of 'Break-the-Glass' Policies in Hospitals: Detecting Unauthorized Access to Sensitive Patient Health Data
Benjamin Stark et al.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY (2018)
Telemedicine for low resource settings: Exploring the generative mechanisms
Rajesh Chandwani et al.
TECHNOLOGICAL FORECASTING AND SOCIAL CHANGE (2018)
Mobile health technology adoption across generations: Narrowing the digital divide
Grace Fox et al.
INFORMATION SYSTEMS JOURNAL (2018)
The impact of information security threat awareness on privacy-protective behaviors
Stanislav Mamonov et al.
COMPUTERS IN HUMAN BEHAVIOR (2018)
A MATTER OF LIFE OR DEATH: HOW EXTREME CONTEXT RESEARCH MATTERS FOR MANAGEMENT AND ORGANIZATION STUDIES
Markus Hallgren et al.
ACADEMY OF MANAGEMENT ANNALS (2018)
A Systematic Scoping Review of the Choice Architecture Movement: Toward Understanding When and Why Nudges Work
Barnabas Szaszi et al.
JOURNAL OF BEHAVIORAL DECISION MAKING (2018)
How can hospitals better protect the privacy of electronic medical records? Perspectives from staff members of health information management departments
Ming-Ling Sher et al.
HEALTH INFORMATION MANAGEMENT JOURNAL (2017)
Examining the intended and unintended consequences of organisational privacy safeguards
Rachida Parks et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2017)
Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda
Paul Benjamin Lowry et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2017)
Electronic Communication of rotected ealth Infstrmatitsrm Privacy, Security, and HIPAA Compliance
Brian C. Drolet et al.
JOURNAL OF HAND SURGERY-AMERICAN VOLUME (2017)
Trust Me, I'm a Doctor: Examining Changes in How Privacy Concerns Affect Patient Withholding Behavior
Daniel M. Walker et al.
JOURNAL OF MEDICAL INTERNET RESEARCH (2017)
A Deterrence Approach to Regulate Nurses' Compliance with Electronic Medical Records Privacy Policy
Kuang-Ming Kuo et al.
JOURNAL OF MEDICAL SYSTEMS (2017)
User Compensation as a Data Breach Recovery Action: An Investigation of the Sony PlayStation Network Breach
Sigi Goode et al.
MIS QUARTERLY (2017)
When Do IT Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches
Corey M. Angst et al.
MIS QUARTERLY (2017)
Assessing Representation Theory with a Framework for Pursuing Success and Failure
Andrew Burton-Jones et al.
MIS QUARTERLY (2017)
Threats to Information Security - Public Health Implications
William J. Gordon et al.
NEW ENGLAND JOURNAL OF MEDICINE (2017)
The Need for Better Data Breach Statistics Reply
Ge Bai et al.
JAMA INTERNAL MEDICINE (2017)
Hospital Risk of Data Breaches
Ge Bai et al.
JAMA INTERNAL MEDICINE (2017)
Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues
Jannis Muething et al.
JMIR MHEALTH AND UHEALTH (2017)
Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion
Angst et al.
MIS QUARTERLY (2017)
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
Bulgurcu et al.
MIS QUARTERLY (2017)
Going Beyond Compliance: A Strategic Framework for Promoting Information Security in Hospitals
David J. Zandona et al.
HEALTH CARE MANAGER (2017)
Confidentiality and Privacy for Smartphone Applications in Child and Adolescent Psychiatry Unmet Needs and Practical Solutions
Emily Wu et al.
CHILD AND ADOLESCENT PSYCHIATRIC CLINICS OF NORTH AMERICA (2017)
Prevalence of Sharing Access Credentials in Electronic Medical Records
Ayal Hassidim et al.
HEALTHCARE INFORMATICS RESEARCH (2017)
Understanding the Why, What, and How of Theories in IS Research
Benjamin Mueller et al.
COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS (2017)
How Can We Develop Contextualized Theories of Effective Use? A Demonstration in the Context of Community-Care Electronic Health Records
Andrew Burton-Jones et al.
INFORMATION SYSTEMS RESEARCH (2017)
Factors influencing adoption of mobile banking by Jordanian bank customers: Extending UTAUT2 with trust
Ali Abdallah Alalwan et al.
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2017)
Social isolation, loneliness and health in old age: a scoping review
Emilie Courtin et al.
HEALTH & SOCIAL CARE IN THE COMMUNITY (2017)
Security of patient data when decommissioning ultrasound systems
James Moggridge
ULTRASOUND (2017)
Integrated knowledge translation (IKT) in health care: a scoping review
Anna R. Gagliardi et al.
IMPLEMENTATION SCIENCE (2016)
Why different trust relationships matter for information systems users
Matthias Soellner et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2016)
Contextualizing the twin concepts of systematicity and transparency in information systems literature reviews
Guy Pare et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2016)
Context is king! Considering particularism in research design and reporting
Robert M. Davison et al.
JOURNAL OF INFORMATION TECHNOLOGY (2016)
Security Attacks and Solutions in Electronic Health (E-health) Systems
Sherali Zeadally et al.
JOURNAL OF MEDICAL SYSTEMS (2016)
Too Much or Too Little? How Much Control Should Patients Have Over EHR Data?
Soumitra Sudip Bhuyan et al.
JOURNAL OF MEDICAL SYSTEMS (2016)
Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations under Conditions of Strain and Excess
Jeffrey D. Wall et al.
JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS (2016)
ELECTRONIC HEALTH RECORDS: HOW CAN IS RESEARCHERS CONTRIBUTE TO TRANSFORMING HEALTHCARE?
Rajiv Kohli et al.
MIS QUARTERLY (2016)
A cybersecurity primer for translational research
Eric D. Perakslis et al.
SCIENCE TRANSLATIONAL MEDICINE (2016)
Cyber threats to health information systems: A systematic review
Raul Luna et al.
TECHNOLOGY AND HEALTH CARE (2016)
Context is king! Considering particularism in research design and reporting
Robert M. Davison et al.
JOURNAL OF INFORMATION TECHNOLOGY (2016)
Reasons for Picture Archiving and Communication System (PACS) data security breaches: Intentional versus non-intentional breaches
Tintswalo Brenda Mahlaola et al.
HEALTH SA GESONDHEID (2016)
Social networks, privacy, confidentiality and ethics: exhibition of pictures of patients on Facebook
Leandro Brambilla Martorell et al.
INTERFACE-COMUNICACAO SAUDE EDUCACAO (2016)
Information security management needs more holistic approach: A literature review
Zahoor Ahmed Soomro et al.
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2016)
Technology versus humanism: how patients perceive the use of electronic health records in physicians' offices-a qualitative study
Ari K. Mwachofi et al.
HEALTH COMMUNICATION (2016)
Antecedents of privacy calculus components in virtual health communities
Nima Kordzadeh et al.
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2016)
On the risk of studying practices in isolation: Linking what, who, and how in strategy research
Paula Jarzabkowski et al.
STRATEGIC ORGANIZATION (2016)
Theoretical perspectives in IS research: from variance and process to conceptual latitude and conceptual fit
Andrew Burton-Jones et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2015)
Exploring information privacy regulation, risks, trust, and behavior
Caroline Lancelot Miltgen et al.
INFORMATION & MANAGEMENT (2015)
Synthesizing information systems knowledge: A typology of literature reviews
Guy Pare et al.
INFORMATION & MANAGEMENT (2015)
Designing for privacy management in hospitals: Understanding the gap between user activities and IT staff's understandings
Elizabeth V. Eikey et al.
INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS (2015)
Data Breaches of Protected Health Information in the United States
Vincent Liu et al.
JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION (2015)
Big other: surveillance capitalism and the prospects of an information civilization
Shoshana Zuboff
JOURNAL OF INFORMATION TECHNOLOGY (2015)
Barriers and Facilitators to Online Portal Use Among Patients and Caregivers in a Safety Net Health Care System: A Qualitative Study
Lina Tieu et al.
JOURNAL OF MEDICAL INTERNET RESEARCH (2015)
Contextualist Inquiry into IT-enabled Hospital Revenue Cycle Management: Bridging Research and Practice
Vitali Mindel et al.
JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS (2015)
An integrated framework for securing semi-structured health records
Flora Amato et al.
KNOWLEDGE-BASED SYSTEMS (2015)
Big other: surveillance capitalism and the prospects of an information civilization
Shoshana Zuboff
JOURNAL OF INFORMATION TECHNOLOGY (2015)
How Secure Is Mental Health Providers' Electronic Patient Communication? An Empirical Investigation
Jon D. Elhai et al.
PROFESSIONAL PSYCHOLOGY-RESEARCH AND PRACTICE (2015)
Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies
Paul Benjamin Lowry et al.
INFORMATION SYSTEMS JOURNAL (2015)
Disaster easily averted? - Data confidentiality and the hospital desktop computer
Neeraj Sethi et al.
INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS (2014)
Concern about security and privacy, and perceived control over collection and use of health information are related to withholding of health information from healthcare providers
Israel T. Agaku et al.
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2014)
PROACTIVE VERSUS REACTIVE SECURITY INVESTMENTS IN THE HEALTHCARE SECTOR
Juhee Kwon et al.
MIS QUARTERLY (2014)
Privacy and Security Issues for Mobile Health Platforms
Melissa J. Harvey et al.
JOURNAL OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY (2014)
Human and Organizational Factors of Healthcare Data Breaches: The Swiss Cheese Model of Data Breach Causation And Prevention
Faouzi Kamoun et al.
INTERNATIONAL JOURNAL OF HEALTHCARE INFORMATION SYSTEMS AND INFORMATICS (2014)
A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research
Weiyin Hong et al.
INFORMATION SYSTEMS RESEARCH (2014)
Managing information and knowledge within maternity services: Privacy and consent issues
Vikraman Baskaran et al.
INFORMATICS FOR HEALTH & SOCIAL CARE (2013)
Health-Care Security Strategies for Data Protection and Regulatory Compliance
Juhee Kwon et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2013)
Security practices and regulatory compliance in the healthcare industry
Juhee Kwon et al.
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2013)
Medical Data Breaches: What the Reported Data Illustrates, and Implications for Transitioning to Electronic Medical Records
Akshat Kapoor et al.
JOURNAL OF APPLIED SECURITY RESEARCH (2013)
Seeking Qualitative Rigor in Inductive Research: Notes on the Gioia Methodology
Dennis A. Gioia et al.
ORGANIZATIONAL RESEARCH METHODS (2013)
From Use to Effective Use: A Representation Theory Perspective
Andrew Burton-Jones et al.
INFORMATION SYSTEMS RESEARCH (2013)
HIPAA Privacy Rule compliance: An interpretive study using Norman's action theory
Divakaran Liginlal et al.
COMPUTERS & SECURITY (2012)
Toward a better understanding of behavioral intention and system usage constructs
Jiming Wu et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2012)
Blaming Noncompliance Is Too Convenient: What Really Causes Information Breaches?
Karen Renaud
IEEE SECURITY & PRIVACY (2012)
Determinants of Data Breaches: A Categorization-Based Empirical Investigation
Manish Gupta et al.
JOURNAL OF APPLIED SECURITY RESEARCH (2012)
Medical data breaches: Notification delayed is notification denied
Patrick Kierkegaard
COMPUTER LAW & SECURITY REVIEW (2012)
Defining Health Information Technology-Related Errors New Developments Since To Err Is Human
Dean F. Sittig et al.
ARCHIVES OF INTERNAL MEDICINE (2011)
Physician privacy concerns when disclosing patient data for public health purposes during a pandemic influenza outbreak
Khaled El Emam et al.
BMC PUBLIC HEALTH (2011)
The influence of the informal social learning environment on information privacy policy compliance efficacy and intention
Merrill Warkentin et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2011)
Determining the privacy policy deficiencies of health ICT applications through semi-formal modelling
Peter R. Croll
INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS (2011)
Personal health records: a scoping review
N. Archer et al.
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2011)
The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online
Gaurav Bansal et al.
DECISION SUPPORT SYSTEMS (2010)
Scoping studies: advancing the methodology
Danielle Levac et al.
IMPLEMENTATION SCIENCE (2010)
The Digital Transformation of Healthcare: Current Status and the Road Ahead
Ritu Agarwal et al.
INFORMATION SYSTEMS RESEARCH (2010)
Information security foundations for the interoperability of electronic health records
Wm. Arthur Conklin et al.
INTERNATIONAL JOURNAL OF HEALTHCARE TECHNOLOGY AND MANAGEMENT (2010)
Violations of medical confidentiality: opinions of primary care physicians
Bernice S. Elger
BRITISH JOURNAL OF GENERAL PRACTICE (2009)
The health information system security threat lifecycle: An informatics theory
Juanita I. Fernando et al.
INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS (2009)
What are scoping studies? A review of the nursing literature
Kathy Davis et al.
INTERNATIONAL JOURNAL OF NURSING STUDIES (2009)
Patients' Attitudes Toward Electronic Health Information Exchange: Qualitative Study
Steven R. Simon et al.
JOURNAL OF MEDICAL INTERNET RESEARCH (2009)
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
John D'Arcy et al.
INFORMATION SYSTEMS RESEARCH (2009)