Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem PAH Williams, AJ Woodward Medical Devices: Evidence and Research, 305-316, 2015 | 301 | 2015 |
In a ‘trusting’environment, everyone is responsible for information security PAH Williams Information Security Technical Report 13 (4), 207-215, 2008 | 119 | 2008 |
Health literacy, digital health literacy and the implementation of digital health technologies in cancer care: the need for a strategic approach E Kemp, J Trigg, L Beatty, C Christensen, HM Dhillon, A Maeder, ... Health Promotion Journal of Australia 32, 104-114, 2021 | 115 | 2021 |
A revised UTAUT model to investigate E-health acceptance of health professionals in Africa JT Ami-Narh, PAH Williams Journal of Emerging Trends in Computing and Information Sciences 3 (10 …, 2012 | 91 | 2012 |
Big data in healthcare: What is it used for? R Hermon, PAH Williams SRI Security Research Institute, Edith Cowan University, 2014 | 89 | 2014 |
Always connected: The security challenges of the healthcare Internet of Things PAH Williams, V McCauley 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 30-35, 2016 | 85 | 2016 |
Improving digital hospital transformation: development of an outcomes-based infrastructure maturity assessment framework PAH Williams, B Lovelock, T Cabarrus, M Harvey JMIR medical informatics 7 (1), e12465, 2019 | 63 | 2019 |
When trust defies common security sense PAH Williams Health Informatics Journal 14 (3), 211-221, 2008 | 51 | 2008 |
A practical application of CMM to medical security capability P Williams Information Management & Computer Security 16 (1), 58-73, 2008 | 46 | 2008 |
Out of the Mouths of Babes: What do Secondary Students Believe About Outstanding Teachers? P Williams, S Sullivan, L Kohn American Secondary Education, 104-119, 2012 | 42 | 2012 |
For the uninitiated: How to succeed in classroom DD Johnson, MP Rice, WD Edgington, P Williams Kappa Delta Pi Record 42 (1), 28-32, 2005 | 34 | 2005 |
What does security culture look like for small organizations? PA Williams Security Research Centre, School of Computer and Security Science, Edith …, 2009 | 33 | 2009 |
Looking at clouds from both sides: The advantages and disadvantages of placing personal narratives in the cloud L Coles-Kemp, J Reddington, PAH Williams Information security technical report 16 (3-4), 115-122, 2011 | 32 | 2011 |
Rejuvenating Retirees: Mentoring First-Year Teachers. MD Hammer Delta Kappa Gamma Bulletin 71 (4), 2005 | 30 | 2005 |
Cybersecurity and medical devices: Are the ISO/IEC 80001-2-2 technical controls up to the challenge? S Anderson, T Williams Computer Standards & Interfaces 56, 134-143, 2018 | 27 | 2018 |
Small business-a cyber resilience vulnerability PAH Williams, RJ Manheke School of Computer and Information Science, Security Research Centre, Edith …, 2010 | 26 | 2010 |
Digital forensics and the legal system: A dilemma of our times JT Ami-Narh, PAH Williams School of Computer and Information Science, Edith Cowan University, Perth …, 2008 | 26 | 2008 |
Consumer perspectives on MyHealth Record: A review Y Van Kasteren, A Maeder, PA Williams, R Damarell Integrating and Connecting Care, 146-152, 2017 | 24 | 2017 |
Managing secondary classrooms: Principles and strategies for effective management and instruction P Williams, RD Alley, KT Henson Allyn & Bacon, 1999 | 24 | 1999 |
Health smart homes: New challenges AJ Maeder, PAH Williams MEDINFO 2017: Precision Healthcare through Informatics, 166-169, 2017 | 23 | 2017 |