Health information systems ??? past, present, future, International Journal of Medical Informatics, vol.75, issue.3-4, pp.268-281, 2006. ,
DOI : 10.1016/j.ijmedinf.2005.08.002
Information security and privacy in healthcare: current state of research, International Journal of Internet and Enterprise Management, vol.6, issue.4, 2008. ,
DOI : 10.1504/IJIEM.2010.035624
A model for role-based security education, training and awareness in the South African healthcare environment. Unpublished M dissertation, 2008. ,
A Review of Security of Electronic Health Records, Health Information Management, vol.2, issue.3, pp.13-18, 2005. ,
DOI : 10.1136/bmj.322.7290.858
Security and Privacy Issues with Health Care Information Technology, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society, 2006. ,
DOI : 10.1109/IEMBS.2006.260060
Protection of Personal Information Act No 4 of 2013. Government gazette, p.37067, 2013. ,
Social Engineering Techniques and Password Security, International Journal of Cyber Warfare and Terrorism, vol.3, issue.2, pp.58-70 ,
DOI : 10.4018/ijcwt.2013040104
Monitoring information security risks within health care, Computers & Security, vol.37, pp.31-45, 2013. ,
DOI : 10.1016/j.cose.2013.04.005
Information security and privacy in healthcare: current state of research, International Journal of Internet and Enterprise Management, vol.6, issue.4, pp.279-314, 2010. ,
DOI : 10.1504/IJIEM.2010.035624
The health information system security threat lifecycle: An informatics theory, International Journal of Medical Informatics, vol.78, issue.12, pp.815-826, 2009. ,
DOI : 10.1016/j.ijmedinf.2009.08.006
Security and privacy in electronic health records: A systematic literature review, Journal of Biomedical Informatics, vol.46, issue.3, pp.541-562, 2013. ,
DOI : 10.1016/j.jbi.2012.12.003
Information security concepts and practices: the case of a provincial multi-specialty hospital, International Journal of Medical Informatics, vol.73, issue.3, pp.297-303, 2004. ,
DOI : 10.1016/j.ijmedinf.2003.12.008
Development of Information Security Baselines for Healthcare Information Systems in New Zealand, Computers & Security, vol.21, issue.2, pp.172-192, 2002. ,
DOI : 10.1016/S0167-4048(02)00212-2
Security in health-care information systems???current trends, International Journal of Medical Informatics, vol.54, issue.1, pp.39-54, 1999. ,
DOI : 10.1016/S1386-5056(98)00168-3
Breach report 2015: Protected Health Information (PHI) Redspin, 2016. ,
Data breaches in healthcare totaled over 112 million records in 2015data-breaches-in-healthcare- total-over-112-million-records-in-2015, Forbes, vol.1231, 2015. ,
Analysis of personal information security behavior and awareness, Computers & Security, vol.56, pp.83-93, 2016. ,
DOI : 10.1016/j.cose.2015.10.002
Health care management and information systems security: awareness, training or education?, International Journal of Medical Informatics, vol.60, issue.2, pp.129-135, 2000. ,
DOI : 10.1016/S1386-5056(00)00112-X
A vocabulary test to assess information security awareness, Information Management & Computer Security, vol.18, issue.5, pp.316-327, 2010. ,
DOI : 10.1108/09685229810240158
Linguistics: An introduction to linguistic theory, 2001. ,
Ondersoek na die gebruik van wiskunde-woordeskat en metakognitiewe strategieë tydens probleemoplossing by Graad 7-leerders, 2014. ,
A mathematics vocabulary questionnaire for use in the intermediate phase, South African Journal of Education, vol.28, pp.489-504, 2008. ,
Cognitive psychology. Applying the science of mind, 2008. ,
Aanpassing van die studie oriëntasievraelys in Wiskunde vir gebruik in die intermediêre fase. Unpublished PhD dissertation, 2008. ,
Assessing the security perceptions of personal Internet users, Computers & Security, vol.26, issue.5, pp.410-417, 2007. ,
DOI : 10.1016/j.cose.2007.03.001
Foundations of Behavioral Research, 1986. ,
Statistical power analysis for the behavioral sciences, 1988. ,