| Literature DB >> 30767908 |
Mohammad S Jalali1,2, Sabina Razak2, William Gordon3,4,5, Eric Perakslis6, Stuart Madnick2.
Abstract
BACKGROUND: Over the past decade, clinical care has become globally dependent on information technology. The cybersecurity of health care information systems is now an essential component of safe, reliable, and effective health care delivery.Entities:
Keywords: bibliometric review; cybersecurity; health care; literature analysis; text mining
Mesh:
Year: 2019 PMID: 30767908 PMCID: PMC6396074 DOI: 10.2196/12644
Source DB: PubMed Journal: J Med Internet Res ISSN: 1438-8871 Impact factor: 5.428
Figure 1Search method and results.
Figure 2Annual number of published papers at the intersection of health care and cybersecurity (fitted trend line: y=0.9166e0.1252x; R²=0.82).
Figure 3Cluster distributions.
Figure 4Trend of 10 clusters over time.
Journals with the most articles.
| Journal | Number of published papers | Indexed categories (according to Journal Citation Reports) [ |
| Studies in Health Technology and Informatics | 47 | Not indexed |
| International Journal of Medical Informatics | 24 | Computer Science, Information Systems; Health Care Sciences & Services; Medical Informatics |
| Journal of Medical Systems | 17 | Health Care Sciences & Services; Medical Informatics |
| Journal of Diabetes Science and Technology | 9 | Not indexed |
| Healthcare Financial Management | 8 | Not indexed |
| Medical Informatics | 8 | Computer Science, Information Systems; Computer Science, Interdisciplinary Applications; Medical Informatics |
| International Journal of Bio-Medical Computing | 8 | Computer Science, Interdisciplinary Applications; Computer Science, Theory & Methods; Engineering, Biomedical; Medical Informatics |
| Computers & Security | 7 | Computer Science, Information Systems |
| Journal of the American Medical Informatics Association | 7 | Computer Science, Information Systems; Computer Science, Interdisciplinary Applications; Health Care Sciences & Services; Medical Informatics |
| Journal of Healthcare Protection Management | 7 | Not indexed |
| Telemedicine Journal and E-Health | 5 | Health Care Sciences & Services |
| IEEEa Journal of Biomedical and Health Informatics | 4 | Computer Science, Information Systems; Computer Science, Interdisciplinary Applications; Mathematical & Computational Biology; Medical Informatics |
| Journal of the American Health Information Management Association | 4 | Not indexed |
| Journal of Digital Imaging | 4 | Radiology, Nuclear Medicine & Medical Imaging |
| Journal of Healthcare Information Management | 4 | Not indexed |
| Journal of Medical Internet Research | 4 | Health Care Sciences & Services; Medical Informatics |
| Journal of Medical Practice Management | 4 | Not indexed |
aIEEE: Institute of Electrical and Electronics Engineers.
Top 15 most cited articles.
| Rank | Number of citations | Title | Authors | Year | Journal | Clusters | Author-denoted keywords |
| 1 | 443 | Data security and privacy in wireless body area networks | Li M, Lou WJ, and Ren K | 2010 | IEEEa Wireless Communications | Telecommunications and Network Security | Data security; Data privacy; Body sensor networks; Biomedical monitoring; Wireless sensor networks; Wearable sensors; Wireless communication; Medical services; Application software; Patient monitoring |
| 2 | 304 | Analyzing regulatory rules for privacy and security requirements | Breaux TD and Anton AI | 2008 | IEEEa Transactions on Software Engineering | Legal, Regulations, Investigations and Compliance | Data security and privacy; Laws and regulations; Compliance; Accountability; Requirements engineering |
| 3 | 173 | Medical image security in a HIPAAb mandated PACSc environment | Cao F, Huang HK, and Zhou XQ | 2003 | Computerized Medical Imaging and Graphics | Legal, Regulations, Investigations and Compliance; Security Architecture and Design | Data encryption; Picture archiving and communication system security; Image integrity; Digital imaging and communication in medicine; Compliance; Health insurance portability and accountability act |
| 4 | 168 | SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency | Lu RX, Lin XD, and Shen XM | 2013 | IEEEa Transactions on Parallel and Distributed Systems | Access Control; Security Architecture and Design | Mobile-healthcare emergency; Opportunistic computing; User-centric privacy access control; PPSPC |
| 5 | 158 | Authenticity and integrity of digital mammography images | Zhou XQ, Huang HK, and Lou SL | 2001 | IEEEa Transactions on Medical Imaging | Cryptography; Telecommunications and Network Security | Data embedding and cryptography; Digital mammography; Image authenticity and integrity; Telemammography |
| 6 | 131 | Security in health-care information systems--current trends | Smith E and Eloff JH | 1999 | International Journal of Medical Informatics | Access Control; Information Security Governance and Risk Management | Health-care information systems security; Risk-analysis in health-care information systems; Access control for computerized health-care; Electronic patient record; International Medical Informatics Association; Managed health-care |
| 7 | 112 | How to ensure data security of an epidemiological follow-up: quality assessment of an anonymous record linkage procedure | Quantin C, Bouzelat H, Allaert FA, Benhamiche AM, Faivre J, and Dusserre L | 1998 | International Journal of Medical Informatics | Cryptography; Security Architecture and Design | Data security; Computerized record; Linkage procedure |
| 8 | 103 | IBE-Lite: a lightweight identity-based cryptography for body sensor networks | Tan CC, Wang HD, Zhong S, and Li Q | 2009 | IEEEa Transactions on Information Technology in Biomedicine | Security Architecture and Design; Cryptography | Body sensor network; Identity-based encryption; Privacy; Security |
| 9 | 89 | A security architecture for interconnecting health information systems | Gritzalis D and Lambrinoudakis C | 2004 | International Journal of Medical Informatics | Access Control; Security Architecture and Design | Information systems security; Computer security; Medical data security; Medical Data Protection; Electronic healthcare records; Role-based access control |
| 10 | 85 | Biometric methods for secure communications in body sensor networks: Resource-efficient key management and signal-level data scrambling | Bui FM and Hatzinakos D | 2008 | Eurasip Journal on Advances in Signal Processing | Security Architecture and Design; Cryptography | Not available |
| 11 | 84 | mHealth data security: the need for HIPAAb-compliant standardization | Luxton DD, Kayl RA, and Mishkind MC | 2012 | Telemedicine Journal and E-Health | Software Development Security; Legal, Regulations, Investigations and Compliance | Security; HIPAAb; Encryption; Telehealth; Mobile health |
| 12 | 82 | Analysis of the security and privacy requirements of cloud-based electronic health records systems | Rodrigues JJ, de la Torre I, Fernandez G, and Lopez-Coronado M | 2013 | Journal of Medical Internet Research | Security Architecture and Design | Cloud-computing; eHealth; Electronic health records (EHRs); Privacy; Security |
| 13 | 82 | Health care management and information systems security: awareness, training or education? | Katsikas SK | 2000 | International Journal of Medical Informatics | Information Security Governance and Risk Management | Health information systems; Information systems security; Health care management; Education; Training; Awareness |
| 14 | 82 | Securing m-healthcare social networks: challenges, countermeasures and future directions | Zhou J, Cao ZF, Dong XL, Lin XD, and Vasilakos AV | 2013 | IEEEa Wireless Communications | Security Architecture and Design | Mobile communication; Social network services; Medical services; Mobile computing; Personal digital assistants; Privacy; Network security; Electronic medical records |
| 15 | 80 | Privacy and data security in E-health: requirements from the user's perspective | Wilkowska W and Ziefle M | 2012 | Health Informatics Journal | Security Architecture and Design | E-health; Gender; Medical assistive technologies; Privacy; Security |
aIEEE: Institute of Electrical and Electronics Engineers.
bHIPAA: Health Insurance Portability and Accountability Act.
cPACS: picture archiving and communication system.
Figure 5Thematic map of all titles and abstracts (A) and concept cloud of all titles and abstracts (B).
Figure 6Thematic maps of titles and abstracts of articles in four time periods.