CLC Number:
[1] Kang J,Seomun G.Information security in nursing: a concept analysis[J]. ANS Adv Nurs Sci, 2021, 44(1):16-30. DOI:10.1097/ANS.0000000000000330. [2] Bruck D.Professional secrecy in nursing[J]. Med Welt, 1951, 20(44): 1388. [3] Zachary MC.Confidentiality of medical records: role of the nurse[J]. Occup Health Nurs, 1969, 17(12): 18-20. DOI:10.1177/216507996901701203. [4] Kang P, Kang J, Monsen KA.Nurse information security policy compliance, information competence, and information security attitudes predict information security behavior[J]. Comput Inform Nurs,2023,41(8).DOI:10.1097/CIN.0000000000000981. [5] Kang J, Seomun G.Development and validation of the information security attitude questionnaire(ISA-Q) for nurses[J]. Nurs Open, 2022: nop2.1353. DOI:10.1002/nop2.1353. [6] 徐王权,姚乐融,李锐,等.基于行为分阶段转变理论的医护人员信息安全素养评价指标体系构建[J]. 医学信息,2021, 34(7):19-21. DOI:10.3969/j.issn.1006-1959.2021.07.005. [7] 赵婷,李红玉.健康中国背景下临床护理人员信息能力评估指标体系的构建[J].护理研究, 2020, 34(14):2452-2456.DOI:10.12102/j.issn.1009-6493.2020.14.004. [8] 张密. 病房陪护床设计与研究[D].石家庄:河北科技大学, 2018. [9] 张剑,钱伟中,万里冰. 医疗服务信息安全[M].成都: 电子科技大学出版社, 2017. [10] Zamzam AH,Abdul Wahab AK,Azizan MM, et al.A systematic review of medical equipment reliability assessment in improving the quality of healthcare services[J].Front Public Health,2021,9:753951.DOI:10.3389/fpubh.2021.753951. [11] Lin T.Mobile nursing information system utilization the task-technology fit perspective[J]. Comput Inform Nurs,2014,32(3):129-137.DOI:10.1097/CIN.0000000000000039. [12] 王玉坦,陈燕茹,苏文丽,等.我国医院护理信息系统相关研究的文献计量学分析[J].中华护理教育,2022,19(1):64-70.DOI:10.3761/j.issn.1672-9234.2022.01.011. [13] 刘云. 医院信息安全实用技术与案例应用[M].南京:东南大学出版社,2016. [14] Ehrenfeld JM. WannaCry, Cybersecurity and health information technology: a time to act[J].J Med Syst,2017,41(7):104,s10916-017-0752-1.DOI:10.1007/s10916-017-0752-1. [15] 梁蓉,石共文.护理信息化管理中的问题及其伦理对策[J].中国现代医学杂志,2014, 24(34):110-112.DOI:10.3969/j.issn.1005-8982.2014.34.027. [16] Bhuyan SS, Kabir UY, Escareno JM, et al.Transforming healthcare cybersecurity from reactive to proactive: current status and future recommendations[J]. J Med Syst,2020,44(5):98.DOI:10.1007/s10916-019-1507-y. [17] Zandona DJ, Thompson JM.Going beyond compliance: a strategic framework for promoting information security in hospitals[J].Health Care Manag,2017,36(4): 364-371. DOI:10.1097/HCM.0000000000000189. [18] Kessler SR, Pindek S, Kleinman G, et al.Information security climate and the assessment of information security risk among healthcare employees[J].Health Informatics J, 2020, 26(1): 461-473. DOI:10.1177/1460458219832048. [19] Nahm ES, Poe S, Lacey D, et al.Cybersecurity essentials for nursing informaticists[J]. Comput Inform Nurs,2019,37(8):389-393.DOI:10.1097/CIN.0000000000000570. [20] Yeng PK, Fauzi MA, Yang B.A comprehensive assessment of human factors in cyber security compliance toward enhancing the security practice of healthcare staff in paperless hospitals[J].Information, 2022, 13(7):335.DOI:10.3390/info13070335. [21] Kamerer JL, McDermott D. Cybersecurity: nurses on the front line of prevention and education[J].J Nurs Regul, 2020, 10(4): 48-53. DOI:10.1016/S2155-8256(20)30014-4. [22] Farzandipour M, Meidani Z, Riazi H, et al.Nursing information systems requirements: a milestone for patient outcome and patient safety improvement[J]. Comput Inform Nurs,2016,34(12):601-612.DOI:10.1097/CIN.0000000000000260. [23] Park WS, Seo SW, Son SS, et al.Analysis of information security management systems at 5 domestic hospitals with more than 500 beds[J]. Healthc Inform Res, 2010,16(2): 89-99.DOI:10.4258/hir.2010.16.2.89. [24] 冯雅娴,杨顺心.“互联网+医疗”背景下的医院信息安全管理措施探析[J].中国卫生产业,2019, 16(6):167-169.DOI:10.16659/j.cnki.1672-5654.2019.06.167. [25] Piotrowski A, Nikkhah-farkhani Z. Does nationality affect nurses’information security participation? a comparative study in Iran and Poland[J]. Health Psychol Rep, 2022,3(10):203-211.DOI:10.5114/hpr.2022.115690. [26] Uwizeyemungu S, Poba-Nzaou P, Cantinotti M.European hospitals’ transition toward fully electronic-based systems: do information technology security and privacy practices follow?[J].JMIR Med Inform,2019, 7(1):e11211. DOI:10.2196/11211. [27] 李大鹏. 基于等级保护要求加强医院信息安全管理[J].网络安全技术与应用, 2019(7):103-104.DOI:10.3969/j.issn.1672-5166.2017.06.018. [28] Argaw ST, Troncoso-Pastoriza JR, Lacey D, et al.Cybersecurity of hospitals: discussing the challenges and working towards mitigating the risks[J]. BMC Med Inform Decis Mak,2020,20(1):146.DOI:10.1186/s12911-020-01161-7. [29] Lin HC.Understanding the impact of nurses’ perception and technological capability on nurses’ satisfaction with nursing information system usage: a holistic perspective of alignment[J].Comput Human Behav, 2016,57: 143-152. DOI:10.1016/j.chb.2015.12.001. [30] 李雁,贺嘉,郑袁平,等.互联网时代条件下计算机网络数据安全管理措施[J].网络安全技术与应用,2021(8):173-175.DOI:10.3969/j.issn.1009-5489.2013.04.267. [31] Magdalinou A, Kalokairinou A, Malamateniou F,et al.SNA: the optimal nodes to raise nurses’ infosec awareness[J].Stud Health Technol Inform,2023,305: 321-322. DOI:10.3233/SHTI230494. [32] Staggers N, Gassert CA, Curran C.A delphi study to determine informatics competencies for nurses at four levels of practice[J].Nurs Res,2002,51(6):383-390. [33] Argaw ST, Bempong NE, Eshaya-Chauvin B, et al.The state of research on cyberattacks against hospitals and available best practice recommendations: a scoping review[J]. BMC Med Inf Decis Making, 2019, 19(1):10.DOI:10.1186/s12911-018-0724-5. [34] 宋世贵. 医院护理工作管理规范[M].成都: 电子科技大学出版社, 2019. [35] 刘小青,沈敏,王金玉,等.护理信息小组的建立与实践成效[J].护士进修杂志,2019,34(11): 995-998. DOI:10.16821/j.cnki.hsjx.2019.11.010. [36] 全国人民代表大会.中华人民共和国民法典[EB/OL]. (2020-06-02)[2022-07-04].http://www.npc.gov.cn/npc/c30834/202006/75ba6483b8344591abd07917e1d25cc8.shtml. |
[1] | ZHANG Yu-lin, ZHU Xiang-wei, HONG Hui-fang, LU Gen-di. Development of Ethical Dilemma Scale for Nurses in major infectious disease emergencies and its reliability and validity [J]. Journal of Nursing, 2024, 31(4): 1-6. |
[2] | . [J]. Journal of Nursing, 2024, 31(4): 7-11. |
[3] | . [J]. Journal of Nursing, 2024, 31(4): 12-16. |
[4] | WEN Chang, XU Zhi-hui, GUO Qian, YANG Dong, WANG Li. Practice of Jeffries simulation-based teaching model in dental care teaching [J]. Journal of Nursing, 2024, 31(4): 17-20. |
[5] | FAN Yi-meng, LIU Qiao-yan, CAO Song-mei, WANG Shu-hua, ZHONG Yu, WANG Jing-jing, XIA Zhuo-ran, LI Teng. Construction of nursing knowledge base for PICC-related thrombosis prevention based on clinical nursing classification system [J]. Journal of Nursing, 2024, 31(4): 21-24. |
[6] | XIONG Juan, TAN Li-ping. Application of two-dimensional code combined with color management in management of clinical internal medicine rescue vehicle [J]. Journal of Nursing, 2024, 31(4): 25-28. |
[7] | FANG Tian-lu, LIU Li-hui. Practice and effect of SWOT-CLPV model-based management strategy in “internet plus nursing service” [J]. Journal of Nursing, 2024, 31(4): 29-32. |
[8] | . [J]. Journal of Nursing, 2024, 31(4): 38-41. |
[9] | WANG Wei, ZHOU Yan-ling, XUE Wen-ping, ZHANG Lin-lin, LIN Shu-qiu. Frailty assessment tools for elderly patients with hip fracture [J]. Journal of Nursing, 2024, 31(4): 42-47. |
[10] | YANG Jian-guo, HE Xi-fei, YAN Jian-jun, ZHANG Meng, YANG Chun-zi, XU Rong, WANG Yan-fang. Best evidence summary for application and management of regional citrate anticoagulation in continuous renal replacement therapy [J]. Journal of Nursing, 2024, 31(4): 48-53. |
[11] | . [J]. Journal of Nursing, 2024, 31(4): 54-59. |
[12] | . [J]. Journal of Nursing, 2024, 31(4): 60-64. |
[13] | WU Qian, JIANG Yu, JIN Meng-jie, FAN En, SHI Li, WANG Mei-xin. Current status of social alienation of young patients with newly-treated pulmonary tuberculosis and its influencing factors: a 321-case study [J]. Journal of Nursing, 2024, 31(4): 65-69. |
[14] | . [J]. Journal of Nursing, 2024, 31(4): 70-74. |
[15] | . [J]. Journal of Nursing, 2024, 31(3): 1-5. |
|