R. Haux, Health information systems ??? past, present, future, International Journal of Medical Informatics, vol.75, issue.3-4, pp.268-281, 2006.
DOI : 10.1016/j.ijmedinf.2005.08.002

A. Appari and M. E. Johnson, Information security and privacy in healthcare: current state of research, International Journal of Internet and Enterprise Management, vol.6, issue.4, 2008.
DOI : 10.1504/IJIEM.2010.035624

O. Maseti, A model for role-based security education, training and awareness in the South African healthcare environment. Unpublished M dissertation, 2008.

K. T. Win, A Review of Security of Electronic Health Records, Health Information Management, vol.2, issue.3, pp.13-18, 2005.
DOI : 10.1136/bmj.322.7290.858

M. Meingast, T. Roosta, and S. Sastry, Security and Privacy Issues with Health Care Information Technology, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society, 2006.
DOI : 10.1109/IEMBS.2006.260060

S. Africa, Protection of Personal Information Act No 4 of 2013. Government gazette, p.37067, 2013.

B. D. Medlin and J. A. Cazier, Social Engineering Techniques and Password Security, International Journal of Cyber Warfare and Terrorism, vol.3, issue.2, pp.58-70
DOI : 10.4018/ijcwt.2013040104

N. Van-deursen, W. J. Buchanan, and A. Duff, Monitoring information security risks within health care, Computers & Security, vol.37, pp.31-45, 2013.
DOI : 10.1016/j.cose.2013.04.005

A. Appari and M. E. Johnson, Information security and privacy in healthcare: current state of research, International Journal of Internet and Enterprise Management, vol.6, issue.4, pp.279-314, 2010.
DOI : 10.1504/IJIEM.2010.035624

J. L. Fernando and L. L. Dawson, The health information system security threat lifecycle: An informatics theory, International Journal of Medical Informatics, vol.78, issue.12, pp.815-826, 2009.
DOI : 10.1016/j.ijmedinf.2009.08.006

J. L. Fernandez-aleman, I. C. Senor, P. A. Lozoya, and A. Toval, Security and privacy in electronic health records: A systematic literature review, Journal of Biomedical Informatics, vol.46, issue.3, pp.541-562, 2013.
DOI : 10.1016/j.jbi.2012.12.003

E. Cavalli, A. Mattasoglio, F. Pinciroli, and P. Spaggiari, Information security concepts and practices: the case of a provincial multi-specialty hospital, International Journal of Medical Informatics, vol.73, issue.3, pp.297-303, 2004.
DOI : 10.1016/j.ijmedinf.2003.12.008

L. Janczewski and F. X. Shi, Development of Information Security Baselines for Healthcare Information Systems in New Zealand, Computers & Security, vol.21, issue.2, pp.172-192, 2002.
DOI : 10.1016/S0167-4048(02)00212-2

E. Smith and J. H. Eloff, Security in health-care information systems???current trends, International Journal of Medical Informatics, vol.54, issue.1, pp.39-54, 1999.
DOI : 10.1016/S1386-5056(98)00168-3

. Redspin, Breach report 2015: Protected Health Information (PHI) Redspin, 2016.

D. Munro, Data breaches in healthcare totaled over 112 million records in 2015data-breaches-in-healthcare- total-over-112-million-records-in-2015, Forbes, vol.1231, 2015.

G. Ogutcu, O. M. Testik, and O. Chouseinoglou, Analysis of personal information security behavior and awareness, Computers & Security, vol.56, pp.83-93, 2016.
DOI : 10.1016/j.cose.2015.10.002

S. K. Katsikas, Health care management and information systems security: awareness, training or education?, International Journal of Medical Informatics, vol.60, issue.2, pp.129-135, 2000.
DOI : 10.1016/S1386-5056(00)00112-X

H. A. Kruger, L. Drevin, and T. Steyn, A vocabulary test to assess information security awareness, Information Management & Computer Security, vol.18, issue.5, pp.316-327, 2010.
DOI : 10.1108/09685229810240158

V. A. Fromkin, Linguistics: An introduction to linguistic theory, 2001.

N. Jansen-van-vuuren, Ondersoek na die gebruik van wiskunde-woordeskat en metakognitiewe strategieë tydens probleemoplossing by Graad 7-leerders, 2014.

M. S. Van-der-walt, K. Maree, and S. Ellis, A mathematics vocabulary questionnaire for use in the intermediate phase, South African Journal of Education, vol.28, pp.489-504, 2008.

G. Robinson-riegler and B. Robinson-riegler, Cognitive psychology. Applying the science of mind, 2008.

M. S. Van-der-walt, Aanpassing van die studie oriëntasievraelys in Wiskunde vir gebruik in die intermediêre fase. Unpublished PhD dissertation, 2008.

S. M. Furnell, P. Bryant, and A. D. Phippen, Assessing the security perceptions of personal Internet users, Computers & Security, vol.26, issue.5, pp.410-417, 2007.
DOI : 10.1016/j.cose.2007.03.001

F. N. Kerlinger, Foundations of Behavioral Research, 1986.

J. Cohen, Statistical power analysis for the behavioral sciences, 1988.