Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment
暂无分享,去创建一个
Mehmet A. Orgun | Kashif Saleem | Jalal Al-Muhtadi | Basit Shahzad | Wasif Jameel | J. Al-Muhtadi | M. Orgun | K. Saleem | B. Shahzad | W. Jameel
[1] Sophia Alim,et al. Impact of social media usage on students academic performance in Saudi Arabia , 2015, Comput. Hum. Behav..
[2] Adriana Vlad,et al. Unifying running-key approach and logistic map to generate enciphering sequences , 2013, Ann. des Télécommunications.
[3] Walter Willinger,et al. 10 Lessons from 10 Years of Measuring and Modeling the Internet's Autonomous Systems , 2011, IEEE Journal on Selected Areas in Communications.
[4] Haider Abbas,et al. A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata , 2013, J. Netw. Comput. Appl..
[5] Azzedine Boukerche,et al. A secure mobile healthcare system using trust-based multicast scheme , 2009, IEEE Journal on Selected Areas in Communications.
[6] Yong Chen,et al. Security Risks and Protection in Online Learning: A Survey. , 2013 .
[7] Helvi Kyngäs,et al. The effects of a counselling intervention on lifestyle change in people at risk of cardiovascular disease , 2015, European journal of cardiovascular nursing : journal of the Working Group on Cardiovascular Nursing of the European Society of Cardiology.
[8] Abdelouahid Derhab,et al. Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society , 2015, Comput. Hum. Behav..
[9] Wu He,et al. A review of social media security risks and mitigation techniques , 2012, J. Syst. Inf. Technol..
[10] Ian Brissette,et al. The role of optimism in social network development, coping, and psychological adjustment during a life transition. , 2002, Journal of personality and social psychology.
[11] Yongqiang Sun,et al. The privacy-personalization paradox in mHealth services acceptance of different age groups , 2016, Electron. Commer. Res. Appl..
[12] Yiwen Gao,et al. International Journal of Medical Informatics , 2016 .
[13] Marcin Luckner,et al. On the testing of network cyber threat detection methods on spam example , 2014, Ann. des Télécommunications.
[14] Mark Terry,et al. Twittering healthcare: social media and medicine. , 2009, Telemedicine journal and e-health : the official journal of the American Telemedicine Association.
[15] Duncan Chambers,et al. Social Network Analysis in Healthcare Settings: A Systematic Scoping Review , 2012, PloS one.
[16] I. Ajzen. The theory of planned behavior , 1991 .
[17] F. Griffiths,et al. Social networks--the future for health care delivery. , 2012, Social science & medicine.
[18] InduShobha N. Chengalur-Smith,et al. An overview of social engineering malware: Trends, tactics, and implications , 2010 .
[19] J. Sarasohn-Kahn. The Wisdom of Patients: Health Care Meets Online Social Media , 2008 .
[20] Joel J. P. C. Rodrigues,et al. Mobile-health: A review of current state in 2015 , 2015, J. Biomed. Informatics.
[21] Min-Shiang Hwang,et al. Challenges in E-Government and Security of Information , 2004 .
[22] Wojciech Mazurczyk,et al. Network forensics and challenges for cybersecurity , 2014, Ann. des Télécommunications.
[23] Daniel J. Brass,et al. Social Networks and Perceptions of Intergroup Conflict: The Role of Negative Relationships and Third Parties , 1998 .
[24] Basit Shahzad,et al. Does a Change in Weekend Days Have an Impact on Social Networking Activity? , 2014, J. Univers. Comput. Sci..
[25] Patricia A. H. Williams,et al. Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem , 2015, Medical devices.
[26] Lada A. Adamic,et al. The role of social networks in information diffusion , 2012, WWW.
[27] Sonia Livingstone,et al. Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy and self-expression , 2008, New Media Soc..
[28] Robert H. Deng,et al. Privacy leakage analysis in online social networks , 2015, Comput. Secur..
[29] Yuguang Fang,et al. Privacy and security for online social networks: challenges and opportunities , 2010, IEEE Network.
[30] G. S. O'Keeffe,et al. The Impact of Social Media on Children, Adolescents, and Families , 2011, Pediatrics.
[31] Bruno S. Silvestre,et al. Unpacking the Social Media Phenomenon: Towards a Research Agenda , 2012 .
[32] Maumita Bhattacharya,et al. Countering Social Engineering Through Social Media: An Enterprise Security Perspective , 2015, ICCCI.
[33] Gary L. Kreps,et al. New directions in eHealth communication: opportunities and challenges. , 2010, Patient education and counseling.
[34] Haider Abbas,et al. Cloud Computing Risk Assessment: A Systematic Literature Review , 2014 .
[35] Özgür Külcü,et al. Privacy in social networks: An analysis of Facebook , 2014, Int. J. Inf. Manag..
[36] W. Dressler,et al. The Health Consequences of Cultural Consonance: Cultural Dimensions of Lifestyle, Social Support, and Arterial Blood Pressure in an African American Community , 2000 .
[37] Mehmet A. Orgun,et al. Secure transfer of environmental data to enhance human decision accuracy , 2015, Comput. Hum. Behav..
[38] Soner Yıldırım,et al. Understanding the perception towards using mHealth applications in practice , 2018 .
[39] Jessica Castner,et al. Health care provider social network analysis: A systematic review. , 2015, Nursing outlook.
[40] W. Chou,et al. Social Media Use in the United States: Implications for Health Communication , 2009, Journal of medical Internet research.
[41] Cem Ersoy,et al. Wireless sensor networks for healthcare: A survey , 2010, Comput. Networks.
[42] Kalina Bontcheva,et al. Making sense of social media streams through semantics: A survey , 2014, Semantic Web.
[43] B Balamurugan,et al. Social Network Analysis in Healthcare , 2017 .
[44] John-Paul Hatala. Social Network Analysis in Human Resource Development: A New Methodology , 2006 .
[45] Brandon Van Der Heide,et al. Too Much of a Good Thing? The Relationship Between Number of Friends and Interpersonal Impressions on Facebook , 2008, J. Comput. Mediat. Commun..
[46] M. Hendryx,et al. Access to health care and community social capital. , 2002, Health services research.
[47] Daniel E. Geer,et al. Mobile Code Security , 1998, IEEE Internet Comput..
[48] C. Kruse,et al. Cybersecurity in healthcare: A systematic review of modern threats and trends. , 2017, Technology and health care : official journal of the European Society for Engineering and Medicine.