has been cited by the following article(s):
[1]
|
Verticals in 5G MEC-use cases and security challenges
|
|
2021 |
|
|
[2]
|
Providing a rational conceptual model for classifying critical infrastructure cyber threats
|
|
2019 |
|
|
[3]
|
PLASMA–Platform for Service Management in Digital Remote Maintenance Applications
|
|
2019 |
|
|
[4]
|
Business continuity-inspired fuzzy risk assessment framework for hospital information systems
|
|
2019 |
|
|
[5]
|
Comparative Analysis of Hospital Information Management Systems Among Healthcare Workers in Two Selected Hospitals in Kenya
|
|
2018 |
|
|
[6]
|
Practical security aspects of the internet of things
|
|
Cybersecurity for Industry 4.0,
2017 |
|
|
[7]
|
Secure IoT Devices for the Maintenance of Machine Tools
|
|
Procedia CIRP,
2017 |
|
|
[8]
|
Designing and implementing an information accountability framework for usable and useful eHealth systems
|
|
2017 |
|
|
[9]
|
Information security risk management for computerized health information systems in hospitals: a case study of Iran
|
|
Risk Management and Healthcare Policy,
2016 |
|
|
[10]
|
Study to Identify Threats to Information Systems in Organizations and Possible Countermeasures through Policy Decisions and Awareness Programs to Ensure …
|
|
2016 |
|
|
[11]
|
Study to identify threats to Information Systems in organizations and possible countermeasures through policy decisions and awareness programs to ensure the …
|
|
2016 |
|
|
[12]
|
Security analysis of a patient monitoring system for the Internet of Things in eHealth
|
|
2015 |
|
|
[13]
|
Оценка состояния защищенности данных организации в условиях возможности реализации угроз информационной безопасности
|
|
2015 |
|
|
[14]
|
Exploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Apps on iOS and Android
|
|
JMIR mHealth and uHealth,
2015 |
|
|
[15]
|
Use of hospital management information systems among healthcare workers at Kenyatta national and Mater hospitals
|
|
Thesis,
2015 |
|
|
[16]
|
Information Privacy Concerns in the Use of Social Media Among Healthcare Practitioners: A Systematic Literature Review
|
|
Advanced Science Letters,
2014 |
|
|
[17]
|
Secure provision of patient-centered health information technology services in public networks—leveraging security and privacy features provided by the German nationwide health information technology infrastructure
|
|
Electronic Markets,
2014 |
|
|
[18]
|
Cultivating of Human's Behavior Toward Security Effectiveness in Health Information System
|
|
AB Shahri, Z Ismail, NZ Rahim,
2014 |
|
|
[19]
|
Secure provision of patient-centered health information technology services in public networks—leveraging security and privacy features provided by the German …
|
|
Electronic Markets,
2014 |
|
|
[20]
|
Privacy challenges in electronic medical records: A systematic review
|
|
Proceedings of the Knowledge …,
2014 |
|
|
[21]
|
Security Effectiveness in Health Information System: Through Improving the Human Factors by Education and Training.
|
|
Australian Journal of Basic & Applied Sciences,
2012 |
|
|
[1]
|
Business continuity-inspired fuzzy risk assessment framework for hospital information systems
Enterprise Information Systems,
2019
DOI:10.1080/17517575.2019.1686657
|
|
|
[2]
|
Secure IoT Devices for the Maintenance of Machine Tools
Procedia CIRP,
2017
DOI:10.1016/j.procir.2016.10.002
|
|
|
[3]
|
Cybersecurity for Industry 4.0
Springer Series in Advanced Manufacturing,
2017
DOI:10.1007/978-3-319-50660-9_9
|
|
|
[4]
|
Exploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Apps on iOS and Android
JMIR mHealth and uHealth,
2015
DOI:10.2196/mhealth.3672
|
|
|
[5]
|
Secure provision of patient-centered health information technology services in public networks—leveraging security and privacy features provided by the German nationwide health information technology infrastructure
Electronic Markets,
2014
DOI:10.1007/s12525-013-0150-6
|
|
|