1. Akinsanya, O. O., Papadaki, M., & Sun, L. (2019). Current cybersecurity maturity models: How effective in the healthcare cloud? CEUR Workshop Proc. Accessed Aug 21, 2023, from http://pearl.plymouth.ac.uk/handle/10026.1/20912
2. Anderson, R. E., Jr (2018). Low-cost strategies to strengthen cybersecurity: Low-cost strategies can help healthcare organizations avoid the high price of a data breach. https://go.gale.com › i.do https://go.gale.com › i.do 72, 60+. Available at: https://go.gale.com/ps/i.do?id=GALE%7CA544403401&sid=googleScholar&v=2.1&it=r&linkaccess=abs&issn=07350732&p=AONE&sw=w
3. Arfaoui, A., Kribeche, A., & Senouci, S.-M. (2019). Context-aware anonymous authentication protocols in the internet of things dedicated to e-health applications. Computer Networks, 159, 23–36. https://doi.org/10.1016/j.comnet.2019.04.031
4. Azeez, N. A., & Van der Vyver, C. (2019). Security and privacy issues in e-health cloud-based system: A comprehensive content analysis. Egyptian Informatics Journal, 20, 97–108. https://doi.org/10.1016/j.eij.2018.12.001
5. Bartholomeusz Sarah. (2023). Cyber threats in healthcare. Governance Directions, 75, 867–870. https://doi.org/10.3316/informit.013665247149702