Sok: A framework for unifying at-risk user research
At-risk users are people who experience risk factors that augment or amplify their chances of
being digitally attacked and/or suffering disproportionate harms. In this systematization work …
being digitally attacked and/or suffering disproportionate harms. In this systematization work …
A comprehensive assessment of human factors in cyber security compliance toward enhancing the security practice of healthcare staff in paperless hospitals
Recent reports indicate that over 85% of data breaches are still caused by a human element,
of which healthcare is one of the organizations that cyber criminals target. As healthcare IT …
of which healthcare is one of the organizations that cyber criminals target. As healthcare IT …
SoK: Analyzing privacy and security of healthcare data from the user perspective
Interactions in healthcare, by necessity, involve sharing sensitive information to achieve high-
quality patient outcomes. Therefore, sensitive data must be carefully protected. This article …
quality patient outcomes. Therefore, sensitive data must be carefully protected. This article …
[HTML][HTML] Status of bring-your-own-device (BYOD) security practices in Australian hospitals–a national survey
Objective The use of personal devices for work purposes (BYOD) is in high demand among
healthcare professionals as it improves productivity. However, it can also lead to an …
healthcare professionals as it improves productivity. However, it can also lead to an …
BYOD usage and security behaviour of hospital clinical staff: An Australian survey
Objective Healthcare professionals are known to use their personal devices extensively for
work purposes (Bring-Your-Own-Device). However, it is also a source of major concern for …
work purposes (Bring-Your-Own-Device). However, it is also a source of major concern for …
" We Have No Security Concerns": Understanding the Privacy-Security Nexus in Telehealth for Audiologists and Speech-Language Pathologists: Understanding the …
The advent of telehealth revolutionizes healthcare by enabling remote consultations, yet
poses complex security and privacy challenges. These are often acutely felt by lower …
poses complex security and privacy challenges. These are often acutely felt by lower …
[HTML][HTML] BYOD security behaviour and preferences among hospital clinicians–A qualitative study
Abstract Background/Objective The use of personal devices for work purposes (Bring-your-
own-device) has increased in hospitals, as it facilitates productivity and mobility for …
own-device) has increased in hospitals, as it facilitates productivity and mobility for …
A decade of development of mental models in cybersecurity and lessons for the future
Mental models are essential in learning how to adapt to new and evolving circumstances.
The landscape of best practices in cybersecurity is a constantly changing area, as the list of …
The landscape of best practices in cybersecurity is a constantly changing area, as the list of …
Cybersecurity in medical private practice: Results of a survey in Audiology
J Dykstra, R Mathur, A Spoor - 2020 IEEE 6th International …, 2020 - ieeexplore.ieee.org
Despite well-documented cyber threats to patients' protected health information (PHI),
sparse evidence exists about the state of cybersecurity behavior of health care workers and …
sparse evidence exists about the state of cybersecurity behavior of health care workers and …
A comprehensive assessment of human factors in relation to cyber security compliance of healthcare staff in a paperless hospital
Recent reports have it that over 85\% of data breaches are still caused by the human
element, of which healthcare is one of the suitable organizations mostly targeted by …
element, of which healthcare is one of the suitable organizations mostly targeted by …