References
Abouelmehdi, K., Beni-Hessane, A., & Khaloufi, H. (2018). Big healthcare data: Preserving security and privacy. Journal of Big Data, 5(1), 1. https://link.springer.com/article/10.1186/s40537-017-0110-7
Adat, V., Dahiya, A., & Gupta, B. B. (2018). Economic incentive-based solution against distributed denial of service attacks for IoT customers. In 2018 IEEE International Conference on Consumer Electronics (ICCE) (pp. 1-5). https://link.springer.com/article/10.1007/s11235-019-00599-z?shared-articlerenderer
Allwood, C. M. (2012). The distinction between qualitative and quantitative research methods is problematic. Quality & Quantity, 46(5), 1417-1429. https://doi.org/10.1007/s11135-011-9455-8
Banegas, M. P., Guy, G. P., de Moor, J. S., Ekwueme, D. U., Virgo, K. S., Kent, E. E., & Yabroff, K. R. (2016). For working-age cancer survivors, medical debt and bankruptcy create financial hardships. Health Affairs, 35(1), 54-61. https://doi.org/10.1377/hlthaff.2015.0830
Barr, D. A. (2016). Introduction to US health policy: The organization, financing, and delivery of health care in America. JHU Press.
Başaran, S., & Hama, G. O. (2018). Exploring faculty members’ views on adoption of cloud computing in education. Society, Integration and Integration Confernce, 5, 227-237. https://doi.org/10.17770/sie2018vol1.3290
Berwick, D. M., & Gaines, M. E. (2018). How HIPAA harms care, and how to stop it. Journal of the American Medical Association, 320(3), 215-245. https://doi.org/10.1001/jama.2018.8829
Bhavnani, S. P., Narula, J., & Sengupta, P. P. (2016). Mobile technology and the digitization of healthcare. European Heart Journal, 37(18), 1428-1438. https://academic.oup.com/eurheartj
Biener, C., Eling, M., & Wirfs, J. H. (2015). Insurability of cyber risk: An empirical analysis. The Geneva Papers on Risk and Insurance-Issues and Practice, 40(1), 131-158. https://www.palgrave.com/us/journal/41288
Bronfenbrenner, U. (1992). Ecological systems theory. Jessica Kingsley Publishers. Chen, H. S., & Jai, T. M. C. (2019). Cyber alarm: Determining the impacts of hotel’s data breach messages. International Journal of Hospitality Management, 82, 326-334. https://doi.org/10.1016/j.ijhm.2018.10.002
Dietz, W. H., Douglas, C. E., & Brownson, R. C. (2016). Chronic disease prevention: Tobacco avoidance, physical activity, and nutrition for a healthy start. JAMA, 316(16), 1645-1646. https://doi.org/10.1001/jama.2016.14370
Digital Guardian. (2019, January 03). What is data loss prevention (DLP)? A definition of data loss prevention. https://digitalguardian.com/blog/what-data-loss-preventiondlp-definition-data-loss-prevention
Duffany, J. L. (2018). Computer and network security essentials. Springer.
Esser, M. (2018). Identify, protect, detect, respond, and recover: The NIST cybersecurity framework. https://www.nist.gov/blogs/taking-measure/identify-protect-detectrespond-and-recover-nist-cybersecurity-framework
Frost, J. (2019). Classical assumptions of ordinary least squares (OLS) linear regression. https://statisticsbyjim.com/regression/ols-linear-regression-assumptions/
Gall, M. D., Gall, J. P., & Borg, W. R. (2010). Applying educational research: How to read, do, and use research to solve problems of practice (6th ed.). Pearson.
Gomillion, D. L. (2017). Teaching case: ComprehensiveCare and the failed implementation of an electronic health records system. Journal of Information Systems Education, 28(2), 71-81. http://jise.org/
Health Care Cost Institute. (2019). 2017 health care cost and utilization report. https://www.healthcostinstitute.org/images/pdfs/HCCI_2017%20Health%20Care_Cost_and_Utilization_Report
Hertler, S. C., Figueredo, A. J., Peñaherrera-Aguirre, M., & Fernandes, H. B. (2018). Urie Bronfenbrenner: Toward an evolutionary ecological systems theory. In Life history evolution (pp. 323-339). Palgrave Macmillan.
Hiller, J., & Russell, R. (2017). Privacy in crises: The NIST privacy framework. Journal of Contingencies and Crisis Management, 25(1), 31-38. https://doi.org/10.1111/1468-5973.12143
Irons, A., Savage, N., Maple, C., & Davies, A. (2016). Embedding cybersecurity in the computer science curriculum. IT Now, 1, 56-57. https://academic.oup.com/itnow
Jarrett, H. M., Bailie, M. W., Hagen, E., & Judish, N. (2009). Searching and seizing computers and obtaining electronic evidence in criminal investigations. U.S. Department of Justice, Computer Crime and Intellectual Property Section Criminal Division. https://scholarworks.uno.edu/honors_theses/20/
Keller, J. P. (2017). Patient safety implications with the rapid adoption of IT-based health technologies. Digital Medicine, 3(3), 115. https://doi.org/10.4103/digm.digm_20_17
Kim, D. D., & Basu, A. (2016). Estimating the medical care costs of obesity in the United States: Systematic review, meta-analysis, and empirical analysis. Value in Health, 19(5), 602-613. https://doi.org/10.1016/j.jval.2016.02.008
Kimani, K., Oduol, V., & Langat, K. (2019). Cyber security challenges for IoT-based smart grid networks. International Journal of Critical Infrastructure Protection, 25, 36-49. https://doi.org/10.1016/j.ijcip.2019.01.001
Kruse, C. S., Frederick, B., Jacobson, T., & Monticone, D. K. (2017). Cybersecurity in healthcare: A systematic review of modern threats and trends. Technology and Health Care, 25(1), 1-10. http://doi.org/10.3233/thc-161263
Langer, S. G. (2017). Cyber-security issues in healthcare information technology. Journal of Digital Imaging, 30(1), 117–125. https://doi.org/10.1007/s10278-016-9913-x
Li, L., He, W., Xu, L., Ash, I., Anwar, M., & Yuan, X. (2019). Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. International Journal of Information Management, 45, 13-24. https://doi.org/10.1016/j.ijinfomgt.2018.10.017
Lineberry, S. (2007). The human element: the weakest link in information security. Journal of Accountancy, 204(5), 44–49. https://www.journalofaccountancy.com/
Mallela, S. S., & Jonnalagadda, S. K. (2018). Microelectronics, electromagnetics, and telecommunications. Springer.
Makridis, C., & Dean, B. (2018). Measuring the economic effects of data breaches on firm outcomes: Challenges and opportunities. Journal of Economic and Social Measurement, 43(1-2), 59-83. https://doi.org/10.3233/JEM-180450
Margulis, S. (2003). On the status and contribution of Westin’s and Altman’s theories of privacy. Journal of Social Issues, 59(2). https://doi.org/10.1111/1540-4560.00071
Martin, G., Martin, P., Hankin, C., Darzi, A., & Kinross, J. (2017). Cybersecurity and healthcare: How safe are we?. British Medical Journal, 358, j3179. https://doi.org/10.1136/bmj.j3179
Miron, W., & Muita, K. (2014). Cybersecurity capability maturity models for providers of critical infrastructure. Technology Innovation Management Review, 4(10). https://timreview.ca/
Mishra, N., Sharma, T. K., Sharma, V., & Vimal, V. (2018). Secure framework for data security in cloud computing. In M. Pant, T. K. Sharma, O. P. Verma, R. Singla, & A. Sikander (Eds.). Soft computing: Theories and applications (pp. 61-71). Springer.
Mustafa, R. F. (2011). The P.O.E.M.s of educational research: A beginners’ concise guide. International Education Studies, 4(3), 23-30. http://www.ccsenet.org/journal/index.php/ies
Nimkar, S. (2016). Promoting individual health using information technology: Trends in the US health system. Health Education Journal, 75(6).
https://doi.org/10.1177/0017896916632790
Papanicolas, I., Woskie, L. R., & Jha, A. K. (2018). Health care spending in the United States and other high-income countries. Jama, 319(10), 1024-1039. https://jamanetwork.com/journals/jama/article-abstract/2674671
Pekala, S. (2017). Privacy and user experience in 21st century library discovery. Information Technology and Libraries, 36(2), 48. https://doi.org/10.6017/ital.v36i2.9817
Rice, S., Tamilselvan, G., Winter, S. R., Milner, M. N., Anania, E. C., Sperlak, L., & Marte, D. A. (2018). Public perception of UAS privacy concerns: A gender comparison. Journal of Unmanned Vehicle Systems, 6(2), 83-99. https://www.nrcresearchpress.com/journal/juvs?mobileUi=0&
SearchSecurity. (2019). What is a data breach? https://searchsecurity.techtarget.com/definition/data-breach
Scofield, M. (2016). Benefiting from the NIST cybersecurity framework. Information Management, 50(2), 25. https://www.information-management.com/
Scott, J. W., Raykar, N. P., Rose, J. A., Tsai, T. C., Zogg, C. K., Haider, A. H., Salim, A, Meara, J., & Shrime, M. G. (2018). Cured into destitution: Catastrophic health expenditure risk among uninsured trauma patients in the United States. Annals of Surgery, 267(6), 1093-1099. https://doi.org/10.1097/SLA.0000000000002254
Shackelford, S. J., Proia, A. A., Martell, B., & Craig, A. N. (2015). Toward a global cybersecurity standard of care: Exploring the implications of the 2014 NIST cybersecurity framework on shaping reasonable national and international cybersecurity practices. Texas International Law Journal. https://tilj.org/
Shahri, A. B., Ismail, Z., & Rahim, N. Z. A. B. (2012). Security effectiveness in health information system: through improving the human factors by education and training. Australian Journal of Basic and Applied Sciences, 6(12), 226-233. http://ajbasweb.com/
Shen, L. (2014). The NIST cybersecurity framework: Overview and potential impacts. Scitech Lawyer, 10(4), 16. https://www.americanbar.org/groups/science_technology/publications/scitech_lawyer/
Singh, D. A. (2015). Essentials of the US health care system. Jones & Bartlett.
Toé, C. A. (2013). An examination of the explicit costs of sensitive information security breaches [Doctoral dissertation, Capella University]. ProQuest Dissertations and Theses Global. https://search.proquest.com/docview/1427864219
Tuptuk, N., & Hailes, S. (2018). Security of smart manufacturing systems. Journal of Manufacturing Systems, 47, 93-106. https://doi.org/10.1016/j.jmsy.2018.04.007
U.S. Department of Health and Human Services. (n.d.) Cases currently under investigation. https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf
VanderWielen, L. M., & Ozcan, Y. A. (2015). An assessment of the health care safety net: Performance evaluation of free clinics. Nonprofit and Voluntary Sector Quarterly, 44(3), 474-486. https://doi.org/10.1177/0899764013520235
Walser, R. (2018). Evaluation of cybersecurity management controls and metrics of critical infrastructures: A literature review considering the NIST cybersecurity framework. Secure IT Systems: 23rd Nordic Conference Proceedings, 11252, 369. Springer.
Woolhandler, S., & Himmelstein, D. U. (2017). The relationship of health insurance and mortality: Is lack of insurance deadly?.* Annals of Internal Medicine, 167*(6), 424- 431. https://doi.org/10.7326/M17-1403
World Health Organization. (2016). World health statistics 2016: Monitoring health for the SDGs sustainable development goals. https://apps.who.int/iris/bitstream/handle/10665/324835/9789241565707-eng.pdf
Wright, A., Aaron, S., & Bates, D. W. (2016). The big phish: Cyberattacks against U.S. healthcare systems. Journal of General Internal Medicine, 31(10), 1115-1118. http://doi.org/10.1007/s11606-016-3741-z
Yeganeh, H. (2019). An analysis of emerging trends and transformations in global healthcare. International Journal of Health Governance, 24(2), 169-180. https://doi.org/10.1108/IJHG-02-2019-0012
Table of Contents
- Chapter 1 - Introduction to the Study
- Chapter 2 - Literature Review
- Chapter 3 - Research Method
- Chapter 4 - Results
- Chapter 5 - Discussion, Conclusions, and Recommendations
- References