Author:
Sharma Dilli Prasad,Habibi Lashkari Arash,Parizadeh Mona
Publisher
Springer Nature Switzerland
Reference43 articles.
1. Abawajy, J. (2014). User preference of cyber security awareness delivery methods. Behavior & Information Technology, 237–248. https://doi.org/10.1080/0144929X.2012.708787
2. AHIMA. (2022). Healthcare data governance. The American Health Information Management Association (AHIMA). Retrieved from https://www.ahima.org/media/pmcb0fr5/healthcare-data-governance-practice-brief-final.pdf
3. Alder, S. (2024, Feb 20). What is healthcare regulatory compliance? The HIPAA Journal. Retrieved from https://www.hipaajournal.com/healthcare-regulatory-compliance/
4. Asma, A., & Alhashmi, A. D. (2021). Taxonomy of cybersecurity awareness delivery methods: A countermeasure for phishing threats. International Journal of Advanced Computer Science and Applications., 12. https://doi.org/10.14569/IJACSA.2021.0121004
5. Ayres, E. J. (2013). The impact of social media on business and ethical practices in dietetics. Journal of the Academy of Nutrition and Dietetics, 113, 1539–1543. https://doi.org/10.1016/j.jand.2013.09.020