References
- Appar A, Johnson ME. Information security and privacy in healthcare: Current state of research.Int. J Internet Enter Manag. 2010;6:279–314. doi:10.1504/IJIEM.2010.035624
- Samy GN, Ahmad R, Ismail Z. Security threats categories in healthcare information systems. Health Informat J. 2010;16:201–209. doi:10.1177/1460458210377468
- Tapuria A, Porat T, Kalra D, Dsouza G, Xiaohui S, Curcin V. Impact of patient access to their electronic health record: systematic review. Inform Health Soc Care. 2021;46(2):192–204. doi:10.1080/17538157.2021.1879810
- Petrovskaya O, Karpman A, Schilling J, et al. patient and health care provider perspectives on patient access to test results via web portals: Scoping review. JMIR Med Inform. 2022;10(7):7.
- Antonio MG, Petrovskaya O, Lau F. The state of evidence in patient portals: Umbrella review. J Med Internet Res. 2020;22(11):e23851. doi:10.2196/23851
- Lyles CR, Nelson EC, Frampton S, Dykes PC, Cemballi AG, Sarkar U. Using electronic health record portals to improve patient engagement: research priorities and best practices. Ann Intern Med. 2020;172(11 Suppl):S123–S129. doi:10.7326/M19-0876
- Wen HC, Chang WP, Hsu MH, Ho CH, Chu CM. An Assessment of the Interoperability of Electronic Health Record Exchanges Among Hospitals and Clinics in Taiwan. JMIR Med Inform. 2019;7(1):e12630. doi:10.2196/12630
- Gandhi VK. An Overview Study on Cyber crimes in Internet. J Inform EngAppl. 2012;2:1–5.
- Parikh TP, Patel AR. Cyber security: study on Attack, Threat, Vulnerability. Int J Res Mod Eng Emerg Tech. 2017;5:1–7.
- Bhatia P, Sehrawat R. Type of security threats and its prevention. Int J Sci Res Dev. 2012; 2.
- Abomhara M, Kien GM. Cyber Security and the Internet of Things: vulnerabilities, Threats, Intruders and Attacks. J Cyber Secur Mobil. 2015;4:65–88. doi:10.13052/jcsm2245-1439.414
- Conteh NY, Schmick PJ. Cybersecurity: risks, vulnerabilities and countermeasures to prevent social engineering attacks. Int J Adv Comput Res. 2016;6:31–38. doi:10.19101/IJACR.2016.623006
- Choo KR. The cyber threat landscape: challenges and future research directions. ComputSecur. 2011;30:719–731.
- Amarendra K, Mandhala VN, Damecharla S, Gollapudi P, Ponuganti PK. Modern Era Hacking. Int J Sci Technol Res. 2019;8:920.
- Alsalim M, Alsalim A, Al-madhagi A, Shahen S. INFORMATION SECURITY THREATS: COMPUTER HACKING. Int J Adv Res. 2017;5:349–356. doi:10.21474/IJAR01/2753
- Dashora K. Cyber Crime in the Society: problems and Preventions. J Alter Perspect SociSci. 2011;3:240–259.
- Pavlik K. Cybercrime, Hacking, And Legislation. J Cyber Res. 2017;1:13–16.
- Madarie R. Hackers’ motivations: Testing Schwartz’s theory of motivational types of values in a sample of hackers. Int J Cyber Crim. 2017;11:78–97.
- Fan CM Security policy for hospitals and medical Industry influence. Available from https://s.itho.me/cybersec/2020/slides/8622.pdf. [accessed Nov 9, 2023].
- Shah N, Farik M. Ransomware - Threats, vulnerabilities and recommendations. Int J Sci Technol Res. 2017;6:307–309.
- Aurangzeb S, Aleem M, Iqbal MA, Islam MA. Ransomware: a Survey and Trends. J Inf Assur Secur. 2017;12:48–58.
- Kansagra D, Kumhar M. Ransomware: a Threat to Cyber security. Int J Comp Sci Communic. 2016;7:224–227.
- Idrissi SE, Berbiche N, Guerouate F, Sbihi M. Performance evaluation of web application security scanners for prevention and protection against vulnerabilities. Int J ApplEng Res. 2017;12:11068–11076.
- Sheikh BA, Rajmohan P. Internet banking, security models and weakness. Int J Res Manag Bus Stud. 2015;2:17–22.
- Bhatt D. Cyber security risks for modern web applications: Case study paper for developers and security testers. Int J Sci Technol Res. 2018;7:232–235.
- Alabady S. Design and Implementation of a network security model for cooperative network. Int Arab J e-Tech. 2009;1:26–36.
- Charoen D. Password Security. Int J Secur. 2014;8:1–14.
- Gitanjali ST, Sasikala D. Vulnerability assessment of web applications using penetration testing. Int J Recent Tech Eng. 2019;8:1552–1556.
- Sukumar A, Mahdiraji HA, Jafari-Sadeghi V. Cyber risk assessment in small and medium-sized enterprises: a multilevel decision-making approach for small e-tailors. Risk Anal. 2023;43(10):2082–2098. doi:10.1111/risa.14092
- NIST. The NIST Cybersecurity Framework (CSF) 2.0. Available from https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.29.pdf. Accessed May 11, 2024.
- Patil HP, Gosavi PB. web vulnerability scanner by using HTTP method. Int J Comput Sci Mobile Comput. 2015;4:255–260.
- Mike B. Free Website Security Scan. Available fromhttps://webscan.upguard.com/. Accessed May 11, 2024.
- Hosseini N, Fakhar F, Kiani B, Eslami S. Enhancing the security of patients’ portals and websites by detecting malicious web crawlers using machine learning techniques. Int J Med Inform. 2019;132:103976. doi:10.1016/j.ijmedinf.2019.103976
- Manzoor J, Waleed A, Jamali AF, Masood A, Kovtun V. Cybersecurity on a budget: evaluating security and performance of open-source SIEM solutions for SMEs. PLoS One. 2024;19(3):e0301183. doi:10.1371/journal.pone.0301183
- Ilca LF, Lucian OP, Balan TC. Enhancing cyber-resilience for small and medium-sized organizations with prescriptive malware analysis, Detection and response. Sensors. 2023;23(15):6757. doi:10.3390/s23156757
- Li YC, Yen JC, Chiu WT, Jian WS, Syed-Abdul S, Hsu MH. Building a national electronic medical record exchange system - experiences in Taiwan. Comput Meth Progr Biomed. 2015;121(1):14–20. doi:10.1016/j.cmpb.2015.04.013
- Seh AH, Zarour M, Alenezi M, et al. Healthcare Data Breaches: insights and Implications. Healthcare. 2020;8(2):133. doi:10.3390/healthcare8020133
- Stanimirovic D. eHealth Patient Portal - Becoming an Indispensable Public Health Tool in the Time of Covid-19. Stud Health Technol Inform. 2021;281:880–884. doi:10.3233/SHTI210305
- Portz JD, Brungardt A, Shanbhag P, et al. Advance Care Planning Among Users of a Patient Portal During the COVID-19 Pandemic: retrospective Observational Study. J Med Internet Res. 2020;22(8):e21385. doi:10.2196/21385
- Shi Y, Chang X, Rodríguez RJ, Zhang Z, Trivedi KS. Quantitative security analysis of a dynamic network system under lateral movement-based attacks. Reliab Eng Syst Saf. 2019;183:213–225. doi:10.1016/j.ress.2018.11.022