-
1
-
-
85014069013
-
-
Centers for Medicare & Medicaid Services [Internet]. Electronic health records (EHR) incentive programs Baltimore, MD: CMS. Accessed: 2016-08-09. (Archived by WebCite R- at http://www.webcitation. org/6je8QNlo0)
-
Centers for Medicare & Medicaid Services [Internet]. Electronic health records (EHR) incentive programs Baltimore, MD: CMS; 2016. URL:https://www.cms.gov/Regulations-and-Guidance/Legislation/EHRIncentivePrograms/index.html?redirect=/ehrincentiveprograms. Accessed: 2016-08-09. (Archived by WebCite R- at http://www.webcitation. org/6je8QNlo0).
-
(2016)
-
-
-
2
-
-
85014066973
-
-
CW Jobs [Internet]. London, UK: 2016. Cyber crime timeline; URL:http://www.cwjobs.co.uk/careers-advice/itglossary/cyber-crime-timeline. Accessed: 2016-08-09. (Archived by WebCite R- at
-
CW Jobs [Internet]. London, UK: 2016. Cyber crime timeline; URL:http://www.cwjobs.co.uk/careers-advice/itglossary/cyber-crime-timeline. Accessed: 2016-08-09. (Archived by WebCite R- at http://www.webcitation.org/6je8V9 cyI).
-
-
-
-
3
-
-
85014102662
-
-
U.S. Department of Health and Human Services. Security standards: technical safeguards [Internet]. Baltimore, MD: CMS; URL:. Accessed: 2016-08-09. (Archived by WebCite R- at http://www.webcitation.org/6je8cfMpZ)
-
U.S. Department of Health and Human Services. Security standards: technical safeguards [Internet]. Baltimore, MD: CMS; URL:http://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/administrative/securityrule/techsafeguards.pdf. Accessed: 2016-08-09. (Archived by WebCite R- at http://www.webcitation.org/6je8cfMpZ).
-
-
-
-
4
-
-
85014119057
-
-
U.S. Department of Health and Human Services. Fact sheet: ransomware and HIPAA [Internet]. Baltimore, MD: CMS;. Accessed: 2016-08-09. (Archived byWeb Cite R- at http://www.webcitation.org/6je8iBYI5)
-
U.S. Department of Health and Human Services. Fact sheet: ransomware and HIPAA [Internet]. Baltimore, MD: CMS; URL:http://www.hhs.gov/sites/default/files/RansomwareFactSheet.pdf. Accessed: 2016-08-09. (Archived byWeb Cite R- at http://www.webcitation.org/6je8iBYI5).
-
-
-
-
5
-
-
85014115692
-
-
AHC Media LLC. Hackers target hospitals with ransomware. ED LEGAL LETT. 2016 Apr; 27(4): 1-4
-
AHC Media LLC. Hackers target hospitals with ransomware. ED LEGAL LETT. 2016 Apr; 27(4): 1-4.
-
-
-
-
7
-
-
84957884477
-
Cyber threats to health information systems: A systematic review
-
Jan 27
-
Luna R, Rhine E, Myhra M, Sullivan R, Kruse CS. Cyber threats to health information systems: A systematic review. Technol Health Care. 2016 Jan 27;24(1): 1-9. Available from: 10.3233/THC-151102.
-
(2016)
Technol Health Care.
, vol.24
, Issue.1
, pp. 1-9
-
-
Luna, R.1
Rhine, E.2
Myhra, M.3
Sullivan, R.4
Kruse, C.S.5
-
8
-
-
85014113476
-
Ransomware attacks are on the rise, and hackers are getting better
-
May
-
AHC Media LLC. Ransomware attacks are on the rise, and hackers are getting better. ED LEGAL LETT. 2016 May; 1(4): 1-4.
-
(2016)
ED LEGAL LETT.
, vol.1
, Issue.4
, pp. 1-4
-
-
-
9
-
-
84988838453
-
Cybersecurity for medical device manufacturers: Ensuring safety and functionality
-
Jan 20
-
Wu F, Eagles S. Cybersecurity for medical device manufacturers: Ensuring safety and functionality. Biomed Instrum Technol. 2016 Jan 20; 50(1): 23-33. Available from: 10.2345/0899-8205-50.1.23.
-
(2016)
Biomed Instrum Technol.
, vol.50
, Issue.1
, pp. 23-33
-
-
Wu, F.1
Eagles, S.2
-
10
-
-
85014106615
-
-
HCPro.com Ransomware a new threat to healthcare sector. Physician Practice Perspective. May 2016; 11-12
-
HCPro.com Ransomware a new threat to healthcare sector. Physician Practice Perspective. May 2016; 11-12.
-
-
-
-
11
-
-
85014118477
-
-
Modern Healthcare. URL:. Accessed: 2016-08-09. (Archived by WebCite R- at http://www.webcita tion.org/6jdtejLCt) April 16
-
Conn J. Federal task force takes on healthcare cybersecurity. Modern Healthcare. URL:http://www.modernhealthcare. com/article/20160416/MAGAZINE/304169890. Accessed: 2016-08-09. (Archived by WebCite R- at http://www.webcita tion.org/6jdtejLCt) April 16, 2016.
-
(2016)
Federal Task Force Takes on Healthcare Cybersecurity
-
-
Conn, J.1
-
12
-
-
85014062634
-
Healthcare IT transformation: How has ransomware shifted the landscape of healthcare data security?
-
May
-
Rowe K. Healthcare IT transformation: how has ransomware shifted the landscape of healthcare data security? Healthc Inform. 2016 May; 33(3): 44-45.
-
(2016)
Healthc Inform.
, vol.33
, Issue.3
, pp. 44-45
-
-
Rowe, K.1
-
13
-
-
85014114888
-
When it comes to securing patient health information from breaches, your best medicine is a dose of prevention: A cybersecurity risk assessment checklist
-
Jul
-
Blanke SJ, McGrady E. When it comes to securing patient health information from breaches, your best medicine is a dose of prevention: a cybersecurity risk assessment checklist. J Healthc Risk Manag. 2016 Jul; 36(1): 14-24. Available from: 10.1002/jhrm.21230.
-
(2016)
J Healthc Risk Manag.
, vol.36
, Issue.1
, pp. 14-24
-
-
Blanke, S.J.1
McGrady, E.2
-
14
-
-
85014081068
-
With the ransomware crisis, the landscape of data security shifts in healthcare
-
May
-
Hagland M. With the ransomware crisis, the landscape of data security shifts in healthcare. Healthc Inform. 2016 May; 33(3): 41-47.
-
(2016)
Healthc Inform.
, vol.33
, Issue.3
, pp. 41-47
-
-
Hagland, M.1
-
15
-
-
85014124113
-
Healthcare increasingly targeted by ransomware attacks
-
American Health Information Management Association
-
American Health Information Management Association. Healthcare increasingly targeted by ransomware attacks. J AHIMA. 2016 May; 87(5): 12.
-
(2016)
J AHIMA.
, vol.87
, Issue.5
, pp. 12
-
-
-
17
-
-
85014107380
-
Ransomware poses major threat to hospitals
-
American Association of Critical-Care Nurses Jun
-
American Association of Critical-Care Nurses. Ransomware poses major threat to hospitals. AACN BOLD VOICES. 2016 Jun; 8(6): 14.
-
(2016)
AACN BOLD VOICES.
, vol.8
, Issue.6
, pp. 14
-
-
-
20
-
-
85014106148
-
Security: The ransomware nightmare
-
Apr
-
Goedert J. Security: the ransomware nightmare. HEALTH DATA MANAGE. 2016 Apr; 24(3): 10.
-
(2016)
HEALTH DATA MANAGE.
, vol.24
, Issue.3
, pp. 10
-
-
Goedert, J.1
-
21
-
-
84989768787
-
Ransomware scare: Will hospitals pay for protection?
-
Apr 11
-
Conn J. Ransomware scare: Will hospitals pay for protection? Modern Healthcare. 2016 Apr 11; 46(15): 8.
-
(2016)
Modern Healthcare.
, vol.46
, Issue.15
, pp. 8
-
-
Conn, J.1
-
22
-
-
85014114186
-
Hospitals become major target for ransomware
-
Hospitals become major target for ransomware. Network Security 2016 4; 2016 (4): 1-2.
-
(2016)
Network Security
, vol.4
, Issue.4
, pp. 1-2
-
-
-
23
-
-
85014122428
-
Ransomware attacks pose growing threat
-
May 1
-
Tuttle H. Ransomware Attacks Pose Growing Threat. Risk Management. 2016 May 1; 63(4): 4.
-
(2016)
Risk Management.
, vol.63
, Issue.4
, pp. 4
-
-
Tuttle, H.1
-
24
-
-
85014122803
-
What to do after a ransomware attack
-
Jun 1
-
Valach AP. What to Do After a Ransomware Attack. Risk Management. 2016 Jun 1; 63(5): 12.
-
(2016)
Risk Management.
, vol.63
, Issue.5
, pp. 12
-
-
Valach, A.P.1
-
25
-
-
84924808471
-
Workarounds to computer access in healthcare organizations: You want my password or a dead patient?
-
Koppel R, Smith S, Blythe J, Kothari V. Workarounds to computer access in healthcare organizations: you want my password or a dead patient? Stud Health Technol Inform. 2015; 208: 215-220. Available from: 10.3233/978-1-61499-488-6-215.
-
(2015)
Stud Health Technol Inform.
, vol.208
, pp. 215-220
-
-
Koppel, R.1
Smith, S.2
Blythe, J.3
Kothari, V.4
-
26
-
-
84937003217
-
Cloud-based privacy-preserving remot ECGmonitoring and surveillance
-
Jul 1
-
Page A, Kocabas O, Soyata T, AktasM, Couderc JP. Cloud-based privacy-preserving remot ECGmonitoring and surveillance. Annals ofNnoninvasive Electrocardiology. 2015 Jul 1; 20(4): 328-37.
-
(2015)
Annals OfNnoninvasive Electrocardiology.
, vol.20
, Issue.4
, pp. 328-337
-
-
Page, A.1
Kocabas, O.2
Soyata, T.3
Aktas, M.4
Couderc, J.P.5
-
27
-
-
84930014417
-
Cybersecurity expert: Medical devices have 'a long way to go'
-
May 20
-
Rios B. Cybersecurity expert: medical devices have 'a long way to go'. Biomed Instrum Technol. 2015 May 20; 49(3): 197-200. Available from: 10.2345/0899-8205-49.3.197.
-
(2015)
Biomed Instrum Technol.
, vol.49
, Issue.3
, pp. 197-200
-
-
Rios, B.1
-
29
-
-
84946752664
-
Five things providers need to know about cybersecurity
-
Welch SS. Five things providers need to know about cybersecurity. Journal of the Medical Association of Georgia. 2015; 104(1): 40-2.
-
(2015)
Journal of the Medical Association of Georgia.
, vol.104
, Issue.1
, pp. 40-42
-
-
Welch, S.S.1
-
30
-
-
85014078119
-
Ransomeware: Tales from the cryptolocker
-
Jun
-
McDermott IE. Ransomeware: Tales from the cryptolocker. Internet Express. Jun 2015: 35-37.
-
(2015)
Internet Express
, pp. 35-37
-
-
McDermott, I.E.1
-
31
-
-
84983667699
-
TIM lecture series-The expanding cybersecurity threat
-
Mar 1
-
McGuire CF. TIM Lecture Series-The Expanding Cybersecurity Threat. Technology Innovation Management Review. 2015 Mar 1; 5(3): 56.
-
(2015)
Technology Innovation Management Review.
, vol.5
, Issue.3
, pp. 56
-
-
McGuire, C.F.1
-
32
-
-
84902590409
-
Healthcare cybersecurity risk management: Keys to an effective plan
-
Coronado AJ,Wong TL. Healthcare cybersecurity risk management: keys to an effective plan. Biomed Instrum Technol. 2014;(Suppl): 26-30. Available from: 10.2345/0899-8205-48.s1.26.
-
(2014)
Biomed Instrum Technol
, pp. 26-30
-
-
Coronado, A.J.1
Wong, T.L.2
-
33
-
-
84902578385
-
A roundtable discussion: Safeguarding information and resources against emerging cybersecurity threats
-
Loughlin S, Fu K, Gee T, Gieras I, Hoyme K, Rajagopalan SR, et al. A roundtable discussion: safeguarding information and resources against emerging cybersecurity threats. Biomed Instrum Technol. 2014; 8-17. Available from: 10.2345/0899-8205-48.s1.8.
-
(2014)
Biomed Instrum Technol
, pp. 8-17
-
-
Loughlin, S.1
Fu, K.2
Gee, T.3
Gieras, I.4
Hoyme, K.5
Rajagopalan, S.R.6
-
34
-
-
85014121741
-
New Ransomware and Cyber extortion Schemes Hold Businesses Hostage
-
Oct 1
-
Bangs G. New Ransomware and Cyber extortion Schemes Hold Businesses Hostage. Risk Management. 2014 Oct 1; 61(8): 30.
-
(2014)
Risk Management.
, vol.61
, Issue.8
, pp. 30
-
-
Bangs, G.1
-
35
-
-
84885719603
-
Controlling for cybersecurity risks of medical device software
-
Oct
-
Fu K, Blum J. Controlling for cybersecurity risks of medical device software. Commun ACM. 2013 Oct; 56(10): 35-37. Available from: 10.1145/2508701.
-
(2013)
Commun ACM.
, vol.56
, Issue.10
, pp. 35-37
-
-
Fu, K.1
Blum, J.2
-
36
-
-
77952142827
-
Awareness education as the key to ransomware prevention
-
Jul
-
Luo X, Liao Q. Awareness education as the key to ransomware prevention. Information Systems Security. 2007 Jul; 16(4): 195-202. Available from: 10.1080/10658980701576412.
-
(2007)
Information Systems Security.
, vol.16
, Issue.4
, pp. 195-202
-
-
Luo, X.1
Liao, Q.2
-
37
-
-
33748599844
-
Webjacking, and how to boot it out
-
Aug 31
-
Mueller L. Webjacking, and how to boot it out. Network Security. 2006 Aug 31; (8): 15-8.
-
(2006)
Network Security.
, Issue.8
, pp. 15-18
-
-
Mueller, L.1
-
38
-
-
85014073121
-
-
Health Resources and Services Administration. Baltimore, MD: HHS; 2016. What is meaningful use?; URL:. Accessed: 201 6-08-09. (Archived byWeb Cite R- at http://www.webcitation.org/6je785Ed5)
-
Health Resources and Services Administration. Baltimore, MD: HHS; 2016. What is meaningful use?; URL:http://www.hrsa.gov/healthit/meaningfuluse/MU%20Stage1%20CQM/whatis.html. Accessed: 201 6-08-09. (Archived byWeb Cite R- at http://www.webcitation.org/6je785Ed5)
-
-
-
|