[
Accenture Federal Services. (2018). The nature of effective defense: Shifting from cybersecurity to cyber resilience. Author. Available at: https://www.accenture.com/_acnmedia/Accenture/Conversion-Assets/DotCom/Documents/Local/en/Accenture-Shifting-from-Cybersecurity-to-Cyber-Resilience-POV.pdf
]Search in Google Scholar
[
American Telemedicine Association (ATA). (2013). Telemedicine Case Studies. Author. Available at: www.americantelemed.org
]Search in Google Scholar
[
American Telemedicine Association (ATA). (2021, June 15). IMPACT announces new definition of virtual first care at ATA 2021. Author. Available at: https://www.americantelemed.org/member-partner-news/impact-announces-new-definition-of-virtual-first-care-at-ata-2021/
]Search in Google Scholar
[
Bailey, S.R. (2021, February 10). Pandemic exposes dire need to rebuild public health infrastructure. American Medical Association, available at: https://www.amaassn.org/about/leadership/pandemic-exposes-dire-need-rebuild-public-health-infrastructure.
]Search in Google Scholar
[
Brown-Jackson, K.L. (2017). Disrupting and retooling: A model for an effective community-based telehealth program. The National Graduate School of Quality Management, ProQuest Dissertations Publishing, 28144638.
]Search in Google Scholar
[
Burrell, D.N. (2021). Cybersecurity leadership from a talent management organizational development lens. [Unpublished Exegesis]. Capitol Technology University.
]Search in Google Scholar
[
Burrell, D.N., Aridi, A.S., & Nobles, C. (2018). The critical need for formal leadership development programs for cybersecurity and information technology professionals. Reading: Academic Conferences International Limited, available at: https://www.proquest.com/conference-papers-proceedings/critical-need-formal-leadership-development/docview/2018926662/se-2?accountid=167615
]Search in Google Scholar
[
Burton, S.L. (2019). Grasping the cyber-world: Artificial intelligence and human capital meet to inform leadership. International Journal of Economics, Commerce, and Management, Vol. 7, Issue 12, 707-759.
]Search in Google Scholar
[
Burton, S.L. (2020). Protection via business impact analysis in a cyber world: A 3-Part series. In Latifi S. (eds) 17th International Conference on Information Technology-New Generations (ITNG 2020). Advances in Intelligent Systems and Computing, 1134. Springer, Cham, available at: https://doi.org/10.1007/978-3-030-43020-7_1
]Search in Google Scholar
[
Burton, S.L. (2021). Artificial intelligence (AI) and augmented reality (AR): Disambiguated in the telemedicine/telehealth sphere. DOI: 10.2478/bsalt-2021-0001.
]Open DOISearch in Google Scholar
[
Burton, S.L. (2017). Transitioning to I can from I canʼt. Lulu Publications.
]Search in Google Scholar
[
Camlek, V. (2020). Telehealth – A technology-based weapon in the war against the Coronavirus. Frost & Sullivan, available at: https://store.frost.com/telehealth-atechnology-based-weapon-in-the-war-against-thecoronavirus-2020.html
]Search in Google Scholar
[
Collier, K., Dilanian, K., & Winter, T. (2020, October 30). More hospitals hit by ransomware as feds warn about cyberattacks. NBC News, available at: https://www.nbcnews.com/tech/tech-news/more-hospitals-hit-ransomware-feds-warn-about-cyberattacks-n1245292
]Search in Google Scholar
[
Cho, S. (2007). A contextualist approach to telehealth innovations (Order No. 3292697). Healthcare Administration Database. (304877569). Available at: https://www.proquest.com/dissertations-theses/contextualist-approach-telehealth-innovations/docview/304877569/se-2?accountid=167615
]Search in Google Scholar
[
Cohen, E. (2019). Global life sciences & healthcare. Appian. Available at: https://appian.com/blog/2019/four-challenges-facing-the-life-sciences-industry-in-2020.html
]Search in Google Scholar
[
Kotter, J.P., & Cohen, D.S. (2005). The heart of change field guide. Boston, MA: Harvard Business Press.
]Search in Google Scholar
[
Daemmrich, A. (2017). Invention, innovation systems, and the Fourth Industrial Revolution. Technology and Innovation, Vol. 18, Issue 4, 257-265. doi: http://dx.doi.org.proxy.cecybrary.com/10.21300/18.4.2017.25710.21300/18.4.2017.257
]Search in Google Scholar
[
Davis, J. (2021, March 5). FBI probing 2 hospital ransomware attacks; hackers remove health data. Health IT Security. Available at: https://healthitsecurity.com/news/fbi-probing-2-hospital-ransomware-attacks-hackers-remove-health-data
]Search in Google Scholar
[
Dawson, M., Bacius, R., Gouveia, L.B., & Vassilakos, A. (2021). Understanding the challenge of cybersecurity in critical infrastructure sectors. Land Forces Academy Review, Vol. 251, Issue 101, 69-75. DOI: 10.2478/raft-2021-0011.
]Open DOISearch in Google Scholar
[
DeSalvo, K., Parekh, A., Hoagland, G. Wet. et al. (2019). Developing a financing system to support public health infrastructure. American Journal of Public Health, Vol. 109, Issue 10,1358-136110.2105/AJPH.2019.305214
]Search in Google Scholar
[
Douglas, C., & Thomas, H. (2020, October 21). The pandemic affecting the healthcare sector-a call for amending the HITECH Act. CPO Magazine. https://www.cpomagazine.com/cyber-security/the-pandemic-affecting-the-healthcare-sector-a-call-for-amending-the-hitech-act/
]Search in Google Scholar
[
Drees, J. (2020, May 19). Telehealth to grow nearly 65% in 2020, report finds. Becker Hospital Review, available at: https://www.beckershospitalreview.com/telehealth/telehealthto-grow-nearly-65-in-2020-report-finds.html
]Search in Google Scholar
[
FAIR Health. (2021). Monthly Telehealth Regional Tracker. Author. Available at: https://www.fairhealth.org/states-by-the-numbers/telehealth
]Search in Google Scholar
[
Franco, E.G., Schwab, K., Brende, B., Dusek, M., & Howell, L. (2020). The global risks report 2020. World Economic Forum. Cologny/Geneva, Switzerland. Available at: http://www3.weforum.org/docs/WEF_Global_Risk_Report_2020.pdf
]Search in Google Scholar
[
Garrison, C., & Hamilton, C. (2019, January 02). A comparative analysis of the EU GDPR to the USʼs breach notifications. Information & Communications Technology Law, Vol. 28, Issue 1, 99-114. doi:10.1080/13600834.2019.1571473.hdl:10535/10737. ISSN 1360-0834
]Open DOISearch in Google Scholar
[
Healthcare & Public Health Sector Coordinating Councils. (2020, May). Health Industry Cybersecurity Tactical Crisis Response Guide (HIC-TCR). Author. Available at: https://healthsectorcouncil.org/hic-tcr/
]Search in Google Scholar
[
Healthcare & Public Health Sector Coordinating Councils. (2021, April). Health industry cybersecurity-securing telehealth and telemedicine (HIC-STAT). Author. Available at: https://healthsectorcouncil.org/securingtelehealth/
]Search in Google Scholar
[
Horne, III, J.F., & Orr, J.E. (2011). Assessing behaviors that create resilient organizations. Employment Relations Today, Vol. 24, Issue 4, 29-39. https://doi.org/10.1002/ert.3910240405
]Search in Google Scholar
[
Holt, B., Evernham, A. Armstrong, S., Boling, C., Butler, O., Coleman, C., Meehan, H., Morrison, W., Mulligan, M., Scarola, M., Weese, M., & DePersia, T. (2015). Presidential Policy Directive 21 Implementation: An Interagency Security Committee White Paper. Available at: https://www.cisa.gov/sites/default/files/publications/ISC-PPD-21-Implementation-White-Paper-2015-508.pdf
]Search in Google Scholar
[
Illusive. (2021). The top threats targeting pharma and life sciences. Author. Available at: https://go.illusive.com/top-pharma-life-sciences-threats-whitepaper
]Search in Google Scholar
[
Isenberg, R., Kristensen, I., Mihir, M., & Weinstein, D. (2021, June 30). Building cyber resilience in national critical infrastructure. McKinsey & Company. Available at: https://www.mckinsey.com/business-functions/risk-and-resilience/our-insights/building-cyber-resilience-in-national-critical-infrastructure
]Search in Google Scholar
[
Jercich, K. (2020a, October 21). CMS reports 34.5M telehealth services delivered March through June. HIMSS HealthcareIT News. Available at: https://www.healthcareitnews.com/news/cms-reports-345m-telehealth-services-delivered-march-through-june
]Search in Google Scholar
[
Jercich, K. (2020b, November 2). CDC: Telehealth visits more than doubled in March 2020. HIMSS HealthcareIT News. Available at: https://www.healthcareitnews.com/news/cdc-telehealth-visits-more-doubled-march-2020
]Search in Google Scholar
[
Kozina, M., & Barun, A. (2016). Implementation of the business impact analysis for the business continuity in the organization. Varazdin Development and Entrepreneurship Agency (VADEA), Varazdin. Available at: https://proxy.cecybrary.com/login?url= https://search-proquest-419com.proxy.cybrary.com/docview/1793195819?accountid=420144459
]Search in Google Scholar
[
Maani, N., & Galea, S. (2020 June). COVID-19 and underinvestment in the public health infrastructure of the United States. The Milbank Quarterly, Vol. 98. Available at: https://www.milbank.org/quarterly/articles/covid-19-and-underinvestment-in-the-public-health-infrastructure-of-the-united-states/#_edn710.1111/1468-0009.12463
]Search in Google Scholar
[
Madni, A.M., & Jackson, S. (2009 June). Towards a conceptual framework for resilience engineering. IEEE Systems Journal, Vol. 3, Issue 2, 181-191. DOI: 10.1109/JSYST.2009.2017397.
]Open DOISearch in Google Scholar
[
Mallak, L.A. (1999). Toward a theory of organizational resilience. Management of Engineering and Technology, 1999. Technology and Innovation Management. PICMET ‘99. Portland International Conference on, Portland, OR, USA, 223.10.1109/PICMET.1999.808142
]Search in Google Scholar
[
Martin, G., Martin, P., Hankin, C., Darzi, A., & Kinross, J. (2017). Cybersecurity and healthcare: how safe are we? BMJ: British Medical Journal (Online), Vol. 358. Available at: http://franklin.captechu.edu:2123/10.1136/bmj.j317910.1136/bmj.j3179
]Search in Google Scholar
[
Masood, T. & Egger, J. (2020). Adopting augmented reality in the age of industrial digitalization. Computers in Industry, 115. Available at: https://doi.org/10.1016/j.compind.2019.07.002
]Search in Google Scholar
[
Metricstream. (2021). Cyber resilience best practices: Connecting the dots beyond cybersecurity. Author. Available at: https://www.metricstream.com/insights/best-practices-cyber-resilience.htm
]Search in Google Scholar
[
Morris-Reade, R. (2021). New research finds 93 % of security leaders don’t repeat to the CEO. Security Brief New Zealand. Available at: https://securitybrief.co.nz/story/new-research-finds-93-of-security-leaders-don’t-report-to-the-ceo
]Search in Google Scholar
[
Muller, S.R. (2020). A Perspective On the intersection of information security policies and IA awareness, factoring in end-user behavior. Proceedings of the International Conference on Research in Management & Technovation, 137-142. DOI: 10.15439/2020KM1
]Open DOISearch in Google Scholar
[
Müller, A., & Pfleger, R. (2014). Business transformation towards sustainability. Business Research, Vol. 7, Issue 2, 313-350. DOI: http://dx.doi.org/10.1007/s40685-014-0011-y10.1007/s40685-014-0011-y
]Search in Google Scholar
[
National Institute of Standards and Technology (NIST). (2014, February 12). Framework for improving critical infrastructure security, Version 1.0. Available at: http://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214.pdf
]Search in Google Scholar
[
National Institute of Standards and Technology (NIST). (2018, April 16). Cybersecurity framework v1.1. Author. Available at: https://csf.tools/reference/nist-cybersecurity-framework/v1-1/
]Search in Google Scholar
[
Nobles, C. (2018). Botching human factors in cybersecurity in business organizations. Holistica – Journal of Business and Public Administration, Vol. 9, Issue 3, 71-88. Available at: https://doi.org/10.2478/hjbpa-2018-0024
]Search in Google Scholar
[
Obama, B. (2013, February 12). Presidential Policy Directive 21: Critical Infrastructure Security and Resilience. Presidential Policy Directive (PPD) Series. United States. White House. Available at: https://www.hsdl.org/?view&did=731087
]Search in Google Scholar
[
Pellathy, D., & Stank, T. (2020, July 09). Commentary: Cybersecurity safeguards should extend to supply-chain partners; companies must treat cybersecurity as a supply chain as work changes under the coronavirus pandemic create new vulnerabilities, say two supply-chain educators. Wall Street Journal (Online). Available at: https://www.proquest.com/newspapers/commentary-cybersecurity-safeguards-should-extend/docview/2421518350/se-2?accountid=167615
]Search in Google Scholar
[
Perlroth, N. & Satariano, A. (2021, May 20). Irish hospitals are latest to be hit by ransomware attacks. NY Times. Available at: https://www.nytimes.com/2021/05/20/technology/ransomware-attack-ireland-hospitals.html
]Search in Google Scholar
[
PR Wire. (2020, September 10). SecurityScorecard names telehealth biggest healthcare threat in new report. Author. Available at: https://www.prnewswire.com/news-releases/securityscorecard-names-telehealth-biggest-healthcare-threat-in-new-report-301127130.html
]Search in Google Scholar
[
Research 2 Guidance 2021. (2021 June). 2021 Global COVID-19 Survey. Author. Available at: https://research2guidance.com/
]Search in Google Scholar
[
RSI Security. (2019, August 14). What is cyber resilience and why is it important? Author. Available at: https://blog.rsisecurity.com/what-is-cyber-resilience-and-why-is-it-important/
]Search in Google Scholar
[
Schuchat, A. (2020). Public health response to the initiation and spread of pandemic COVID-19 in the United States, February 24 – April 21, 2020. MMWR Morbidity and Mortality Weekly Report 2020, Vol. 69, Issue 18, 551-556. DOI: http://dx.doi.org/10.15585/mmwr.mm6918e2 10.15585/mmwr.mm6918e2
]Search in Google Scholar
[
Security and Privacy, 45 C.F.R. (§) Part 164 Subparts A and C. (2022).
]Search in Google Scholar
[
Sterbenz, J.P.G., Hutchinson, D., Cetinkaya, E.K., Jabbar, A., Rohrer, J.P., Scholler, M., & Smith, P. (2010, March 17). Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines. Computer Networks, Vol. 54, Issue 8, 1245-1265. Available at: https://doi.org/10.1016/j.comnet.2010.03.005
]Search in Google Scholar
[
Syafrizal, M., Selamat, S. R., & Zakaria, N. A. (2020). Analysis of cybersecurity standard and framework components. International Journal of Communication Networks and Information Security, Vol. 12, Issue 3, 417-432. Available at: https://www.proquest.com/scholarly-journals/analysis-cybersecurity-standard-framework/docview/2483980790/se-2?accountid=16761510.17762/ijcnis.v12i3.4817
]Search in Google Scholar
[
Sykes, N. (2019, April 25). Cybersecurity: What every telemedicine practitioner needs to know. Arizona Telemedicine Program. Available at: https://telemedicine.arizona.edu/blog/cybersecurity-what-every-telemedicine-practitioner-needs-know#:~:text=But%20because%20of%20the%20nature%20of%20the%20platform,health%20professional%20via%20a%20mobile%20app%2C%20for%20instance
]Search in Google Scholar
[
Taylor, C., & Burton, S.L. (2018). Advanced certified telemedicine/telehealth professional (A-CTTP). Lulu Publications.
]Search in Google Scholar
[
The Security Rule, 45 C.F.R. (§) Part 160. (2010).
]Search in Google Scholar
[
UNESCO. (2020a). Education in a past-COVID-19 world: Nine ideas for public action. Available at: https://en.unesco.org/sites/default/files/education_in_a_post-covid_world-nine_ideas_for_public_action.pdf
]Search in Google Scholar
[
Verma, S. (2020, July 15). Early impact of CMS expansion of Medicare telehealth during COVID-19. Health Affairs Blog. doi: 10.1377/hblog20200715.454789
]Open DOISearch in Google Scholar
[
White House (WH). (2010, May). White House, National Security Strategy. Available at: https://www.whitehouse.gov/sites/default/files/rss_viewer/national_security_strategy.pdf
]Search in Google Scholar
[
World Economic Forum. (2020). Global risks report 2020: An unsettled world. Available at: https://reports.weforum.org/global-risks-report-2020/chapter-one-risks-landscape/
]Search in Google Scholar
[
Zielinski, L., & Marino, D. J. (2020). How to leverage the telemedicine surge to create a profitable telehealth model. Healthcare Financial Management, Vol. 74, Issue 6, 36-40.
]Search in Google Scholar
[
Zorabedian, J. (2020 July 31). Facing growing cyber risks, hereʼs how organizations are mitigating the cost of a data breach. Forbes. Available at: https://www.forbes.com/sites/ibmsecurity/2020/07/31/facing-growing-cyber-risks-heres-how-organizations-are-mitigating-the-cost-of-a-data-breach/?sh=49579fcb4025
]Search in Google Scholar