Search Articles

View query in Help articles search

Search Results (1 to 10 of 75 Results)

Download search results: CSV END BibTex RIS

CSV download: Download all 75 search results (up to 5,000 articles maximum)

Using Vibration for Secure Pairing With Implantable Medical Devices: Development and Usability Study

Using Vibration for Secure Pairing With Implantable Medical Devices: Development and Usability Study

However, it also poses new security and privacy threats, such as eavesdropping on sensitive medical data or hijacking life-critical functions. The consequences of such attacks can be severe because they can cause serious injuries or even death. However, these risks have often been overlooked.

Mo Zhang, Chaofan Wang, Weiwei Jiang, David Oswald, Toby Murray, Eduard Marin, Jing Wei, Mark Ryan, Vassilis Kostakos

JMIR Biomed Eng 2025;10:e57091


A Sociotechnical Approach to Bring-Your-Own-Device Security in Hospitals: Development and Pilot Testing of a Maturity Model Using Mixed Methods Action Research

A Sociotechnical Approach to Bring-Your-Own-Device Security in Hospitals: Development and Pilot Testing of a Maturity Model Using Mixed Methods Action Research

and fully embedded in hospital practices, with performance linked to adherence Level 1: no visible support from leadership for BYOD security initiatives Level 2: limited acknowledgment of BYOD security risks Level 3: moderate support, with funding allocated for basic BYOD security measures Level 4: high-level support with strategic investments in BYOD security Level 5: unrestricted commitment, with BYOD security as a priority in organizational strategy Level 1: no involvement of stakeholders in BYOD decisions

Tafheem Ahmad Wani, Antonette Mendoza, Kathleen Gray

JMIR Hum Factors 2025;12:e71912


Education and Symptom Reporting in an mHealth App for Patients With Cancer: Mixed Methods Development and Validation Study

Education and Symptom Reporting in an mHealth App for Patients With Cancer: Mixed Methods Development and Validation Study

Security measures, such as management through Cloudflare, were integrated to prevent potential distributed denial-of-service (DDo S) attacks. Data encryption techniques were also applied to ensure information security. An open-source, high-performance Postgre SQL relational database management system was defined. A backup program was established every 3 hours using incremental backup copies to ensure data integrity and availability.

Carolina Muñoz Olivar, Miguel Pineiro, Juan Sebastián Gómez Quintero, Carlos Javier Avendaño-Vásquez, Pablo Ormeño-Arriagada, Silvia Palma Rivadeneira, Carla Taramasco Toro

JMIR Hum Factors 2025;12:e60169


Ensuring General Data Protection Regulation Compliance and Security in a Clinical Data Warehouse From a University Hospital: Implementation Study

Ensuring General Data Protection Regulation Compliance and Security in a Clinical Data Warehouse From a University Hospital: Implementation Study

While this regulatory framework ensures data security, it is also cumbersome to implement. Compliance with these stringent regulations is both a prerequisite and a necessity, but it poses significant challenges in practical application. The aim of the GDPR is to protect citizens’ privacy in the context of widespread digitization while facilitating the circulation of data.

Christine Riou, Mohamed El Azzouzi, Anne Hespel, Emeric Guillou, Gouenou Coatrieux, Marc Cuggia

JMIR Med Inform 2025;13:e63754


Smart Contracts and Shared Platforms in Sustainable Health Care: Systematic Review

Smart Contracts and Shared Platforms in Sustainable Health Care: Systematic Review

In this new technological landscape, recent studies have highlighted that blockchain technology with smart contracts (SCs) provides the most reliable data security, cryptographic capacities, and decentralized storage and can lead to a low-cost ecosystem and sustainability in the medical setting [4,5]. The health care value chain is another research area where SCs have consistently shown effectiveness in avoiding counterfeiting and ensuring product security and safety.

Carlos Antonio Marino, Claudia Diaz Paz

JMIR Med Inform 2025;13:e58575


Regulation and Compliance in Telemedicine: Viewpoint

Regulation and Compliance in Telemedicine: Viewpoint

HIPAA—known for its privacy and security rules establishing national standards for protecting personal health information (PHI)—mandates providers use telemedicine platforms that provide privacy and security by not storing or having sufficient ways to prevent breaches of PHI [9]. The PHE flexibilities waived the need to use HIPAA-compliant telemedicine platforms. This flexibility eased the rapid, large-scale transition to telemedicine use during COVID-19 [9,10].

Julia Ivanova, Mollie R Cummins, Triton Ong, Hiral Soni, Janelle Barrera, Hattie Wilczewski, Brandon Welch, Brian Bunnell

J Med Internet Res 2025;27:e53558


The Role of the Organization in Promoting Information Security–Related Behavior Among Resident Physicians in Hospitals in Germany: Cross-Sectional Questionnaire Study

The Role of the Organization in Promoting Information Security–Related Behavior Among Resident Physicians in Hospitals in Germany: Cross-Sectional Questionnaire Study

Several researchers have found that in addition to the technological equipment of the organization to ensure information security, it is also necessary for the employees to follow security policies and consciously use information technology (compliance), because noncompliance can lead to security breaches with far-reaching consequences for the organization.

Judith Kraushaar, Sabine Bohnet-Joschko

J Med Internet Res 2025;27:e46257


Mental Health Benefits of Listening to Music During COVID-19 Quarantine: Cross-Sectional Study

Mental Health Benefits of Listening to Music During COVID-19 Quarantine: Cross-Sectional Study

During COVID-19 quarantine, individuals may fear becoming unwell or being unable to cope with unexpected events, thus giving them a low sense of security. A sense of security is shaped by experiences, and the feeling of insecurity is often associated with the experience of being in a risky environment [37].

Xuechang Xian, Xiaoran Zhang, Danhe Zheng, Yanlin Wang

JMIR Form Res 2024;8:e46497