Search Articles

View query in Help articles search

Search Results (1 to 10 of 33 Results)

Download search results: CSV END BibTex RIS


Media Framing and Portrayals of Ransomware Impacts on Informatics, Employees, and Patients: Systematic Media Literature Review

Media Framing and Portrayals of Ransomware Impacts on Informatics, Employees, and Patients: Systematic Media Literature Review

Ransomware attacks on health care providers have demonstrated that cybersecurity threats have the potential to be severe public health threats. These events have proven to be targeted operational disruptions compared to other types of cybersecurity events, such as data breaches [23,24].

Atiya Avery, Elizabeth White Baker, Brittany Wright, Ishmael Avery, Dream Gomez

J Med Internet Res 2025;27:e59231

Identifying Contextual Factors That Shape Cybersecurity Risk Perception for Assisted Living and Health Care Technologies and Wearables: Mixed Methods Study

Identifying Contextual Factors That Shape Cybersecurity Risk Perception for Assisted Living and Health Care Technologies and Wearables: Mixed Methods Study

This trend introduces multiple challenges, particularly in cybersecurity. Medical devices and assisted living technologies have been the subject of cybersecurity incidents [8-11]. Recently, several hundred insulin pumps were called back by the Food and Drug Administration (responsible for regulating medical devices in the United States) due to software weaknesses, resulting in the battery depletion of insulin pumps [12,13].

Alvhild Skjelvik, Nicholas West, Matthias Görges

J Med Internet Res 2025;27:e64388

Challenges and Opportunities for Data Sharing Related to Artificial Intelligence Tools in Health Care in Low- and Middle-Income Countries: Systematic Review and Case Study From Thailand

Challenges and Opportunities for Data Sharing Related to Artificial Intelligence Tools in Health Care in Low- and Middle-Income Countries: Systematic Review and Case Study From Thailand

Possible solutions include separating personal and professional computer use, using 2-factor authentication, and using password-protected log-in and log out: To enable responsible data sharing in digital health, cybersecurity of the health information systems will have to be strengthened. The country will also need to come up with a clear structure to compensate victims whose data are compromised.

Aprajita Kaushik, Capucine Barcellona, Nikita Kanumoory Mandyam, Si Ying Tan, Jasper Tromp

J Med Internet Res 2025;27:e58338

Consideration of Cybersecurity Risks in the Benefit-Risk Analysis of Medical Devices: Scoping Review

Consideration of Cybersecurity Risks in the Benefit-Risk Analysis of Medical Devices: Scoping Review

Devices (For industry); NIST_CSF: National Institute of Standards and Technology Cybersecurity Framework; TGA_Cyber: Cybersecurity Guidance from the Therapeutic Goods Administration.

Oscar Freyer, Fatemeh Jahed, Max Ostermann, Christian Rosenzweig, Pascal Werner, Stephen Gilbert

J Med Internet Res 2024;26:e65528

Cybersecurity Interventions in Health Care Organizations in Low- and Middle-Income Countries: Scoping Review

Cybersecurity Interventions in Health Care Organizations in Low- and Middle-Income Countries: Scoping Review

The incidents led the Thai National Cyber Security Agency to announce 3 subordinate laws under the Cybersecurity Act to develop stronger cybersecurity. Among these laws was a mandate to provide cybersecurity training and conduct risk assessments for those dealing with critical information [16].

Kaede Hasegawa, Niki O'Brien, Mabel Prendergast, Chris Agape Ajah, Ana Luisa Neves, Saira Ghafur

J Med Internet Res 2024;26:e47311

Unintended Consequences of Data Sharing Under the Meaningful Use Program

Unintended Consequences of Data Sharing Under the Meaningful Use Program

Reference 21: Cybersecurity resource center(https://www.opm.gov/cybersecurity-resource-center/)cybersecurity

Irmgard Ursula Willcockson, Ignacio Herman Valdes

JMIR Med Inform 2024;12:e52675

Cybersecurity and Privacy Issues in Extended Reality Health Care Applications: Scoping Review

Cybersecurity and Privacy Issues in Extended Reality Health Care Applications: Scoping Review

A scoping review was conducted to answer the following two research questions: Research question 1 (RQ1): What cybersecurity and privacy risks are there to XR components, in particular VR? Research question 2 (RQ2): How can cybersecurity risks to clinical XR systems, in particular VR systems, be reduced? To determine the potential cybersecurity risks and mitigations for a health care VR system, the cyber threat landscape of XR was first established through RQ1.

Kaitlyn Lake, Andrea Mc Kittrick, Mathilde Desselle, Antonio Padilha Lanari Bo, R Achintha M Abayasiri, Jennifer Fleming, Nilufar Baghaei, Dan Dongseong Kim

JMIR XR Spatial Comput 2024;1:e59409

Transforming Health Care Through Chatbots for Medical History-Taking and Future Directions: Comprehensive Systematic Review

Transforming Health Care Through Chatbots for Medical History-Taking and Future Directions: Comprehensive Systematic Review

Cybersecurity is paramount, as chatbots handle sensitive medical information that must be protected from unauthorized access or data breaches [21,22]. Furthermore, despite the remarkable capabilities of chatbots in effectively processing and generating responses through predefined algorithms, they often lack the empathetic understanding and emotional intelligence inherent in human interactions [23].

Michael Hindelang, Sebastian Sitaru, Alexander Zink

JMIR Med Inform 2024;12:e56628

Vulnerability to Cyberattacks and Sociotechnical Solutions for Health Care Systems: Systematic Review

Vulnerability to Cyberattacks and Sociotechnical Solutions for Health Care Systems: Systematic Review

Cybersecurity education is seriously lacking [14,15]. Moreover, a critical problem with cybersecurity in health care systems is the lack of involvement or recruitment of people with expertise and training in cybersecurity [16], resulting in considerable neglect of the cybersecurity infrastructure [17]. A systematic literature review (SLR) revealed that, between 2018 and 2019, more than 24% of the data breaches in all industries happened within the health care context [18,19].

Pius Ewoh, Tero Vartiainen

J Med Internet Res 2024;26:e46904

Usability and Feasibility Evaluation of a Web-Based and Offline Cybersecurity Resource for Health Care Organizations (The Essentials of Cybersecurity in Health Care Organizations Framework Resource): Mixed Methods Study

Usability and Feasibility Evaluation of a Web-Based and Offline Cybersecurity Resource for Health Care Organizations (The Essentials of Cybersecurity in Health Care Organizations Framework Resource): Mixed Methods Study

Although most cybersecurity toolkits and frameworks focus on practices across all critical sectors and are not specific to the health care context, more guidance for the health sector has been developed in recent years, including the Health Care and Public Health Sector Cybersecurity Framework Implementation Guide [10].

Niki O'Brien, Roberto Fernandez Crespo, Fiona O'Driscoll, Mabel Prendergast, Deeph Chana, Ara Darzi, Saira Ghafur

JMIR Form Res 2024;8:e50968