References
- Pichai, Sundar. “Introducing Google Drive…yes, really.” Google Official Blog (blog). April 24, 2012. https://googleblog.blogspot.com/2012/04/introducing-google-drive-yes-really.html
- Newsom, Carrie and Kathryn Kennedy. “Google Scholar and More.” Journal of Library Administration 46, no. 3–4 (2008): 87–97. doi:https://doi.org/10.1300/J111v46n03_08
- Fowler, Susan. “Restricted Network Access in Hospitals –Why?” MEDLIB-L, Medical Libraries Listserv (listserv). July 6, 2010. https://list.uvm.edu/cgi-bin/wa?A1=ind1007A&L=MEDLIB-L#76
- U.S. Cybersecurity & Infrastructure Security Agency. Ransomware Activity Targeting the Healthcare and Public Health Sector, AA20-302A. Washington DC, November 2, 2020. https://us-cert.cisa.gov/ncas/alerts/aa20-302a
- Dyrda, Laura. “400 Hospitals Allegedly in Hackers’ Crosshairs: 7 Updates.” Becker’s Health IT. October 30, 2020. https://www.beckershospitalreview.com/cybersecurity/400-hospitals-allegedly-in-hackers-crosshairs-7-updates.html
- Adams, Carrie D. “Losing Access to Google Docs.” Hospital Libraries Discussions. (listserv). October 30, 2020 https://www.mlanet.org/p/fo/st/thread=28875
- William J. Gordon, Adam Wright, Ranjit Aiyagari, Leslie Corbo, Robert J. Glynn, Jigar Kadakia, Jack Kufahl, Christina Mazzone, James Noga, Mark Parkulo, et al. “Assessment of Employee Susceptibility to Phishing Attacks at US Health Care Institutions.” JAMA Network Open 2, no. 3 (2019): e19039. doi:https://doi.org/10.1001/jamanetworkopen.2019.0393
- Mohammad S. Jalali, Maike Bruckes, Daniel Westmattelmann, and Gerhard Schewe, “Why Employees (Still) Click on Phishing Links: Investigation in Hospitals.”Journal of Medical Internet Research 22, no. 1 (2020): e16775. doi:https://doi.org/10.2196/16775
- Wolff, Josephine. “Criminals are Using Google Drive to Infect Hospitals with Ransomware.” Slate. November 2, 2020. https://slate.com/technology/2020/11/ryuk-trickbot-hospital-ransomware-google-drive.html.
- Pifer, Rebecca. “Microsoft Teams Integrates with EHRs for Provider Telehealth.” Healthcare Dive. September 22, 2020. https://www.healthcaredive.com/news/microsoft-teams-integrates-with-ehrs-for-provider-telehealth/585521/.
- Sandra E. Swanson, “Access Management: Living with Firewalls.”Journal of Hospital Librarianship 1, no. 1 (2001): 41–50. https://www.tandfonline.com/doi/abs/10.1300/J186v01n01_04 doi:https://doi.org/10.1300/J186v01n01_04
- Georg Disterer, and Carsten Kleiner. “BYOD—Bring Your Own Device.” Procedia Technology 9, (2013): 43–53. doi:https://doi.org/10.1016/j.protcy.2013.12.005
- Khutsafalo Kadimo, Masego B. Kebaetse, Dineo Ketshogileng, Lovie Edwin Seru, Kagiso B. Sebina, Carrie Kovarik, and Kutlo Balotlegi, “ Bring-Your-Own-Device in Medical Schools and Healthcare Facilities: A Review of the Literature.” International Journal of Medical Informatics 119, (2018): 94–102. doi:https://doi.org/10.1016/j.ijmedinf.2018.09.013