Search Articles

View query in Help articles search

Search Results (1 to 6 of 6 Results)

Download search results: CSV END BibTex RIS


Artificial Intelligence–Based Framework for Analyzing Health Care Staff Security Practice: Mapping Review and Simulation Study

Artificial Intelligence–Based Framework for Analyzing Health Care Staff Security Practice: Mapping Review and Simulation Study

Yeng et al [4] analyzed observational measures toward profiling health care staff security practices, and also identified various sources, including EHR logs, browser history, network logs, and patterns of keystroke dynamics [4]. Most EHR systems use an emergency access control mechanism known as “break-the-glass” or self-authorization” [1,2].

Prosper Kandabongee Kandabongee Yeng, Livinus Obiora Nweke, Bian Yang, Muhammad Ali Fauzi, Einar Arthur Snekkenes

JMIR Med Inform 2021;9(12):e19250

Mapping the Psychosocialcultural Aspects of Healthcare Professionals’ Information Security Practices: Systematic Mapping Study

Mapping the Psychosocialcultural Aspects of Healthcare Professionals’ Information Security Practices: Systematic Mapping Study

Similarly, Yeng et al surveyed for related theories, security practices, and evaluation methods [4]. They found various theories that can be employed in modeling and analyzing health care security practices, as shown in Multimedia Appendix 1; however, the approach was less systematic and lacked a framework.

Prosper Kandabongee Kandabongee Yeng, Adam Szekeres, Bian Yang, Einar Arthur Snekkenes

JMIR Hum Factors 2021;8(2):e17604