<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v25i1e48824</article-id>
      <article-id pub-id-type="pmid">37616048</article-id>
      <article-id pub-id-type="doi">10.2196/48824</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Viewpoint</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Viewpoint</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Strengthening Cybersecurity for Patient Data Protection in Europe</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Mavragani</surname>
            <given-names>Amaryllis</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Gong</surname>
            <given-names>Mengchun</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Marshall</surname>
            <given-names>Robert</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author">
          <name name-style="western">
            <surname>van Kessel</surname>
            <given-names>Robin</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-6309-6343</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Haig</surname>
            <given-names>Madeleine</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0009-0008-4925-6898</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Mossialos</surname>
            <given-names>Elias</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>LSE Health</institution>
            <institution>Department of Health Policy</institution>
            <institution>London School of Economics and Political Science</institution>
            <addr-line>Houghton Street</addr-line>
            <addr-line>London, WC2A 2AE</addr-line>
            <country>United Kingdom</country>
            <phone>44 7772 707841</phone>
            <email>e.a.mossialos@lse.ac.uk</email>
          </address>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-8664-9297</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>LSE Health</institution>
        <institution>Department of Health Policy</institution>
        <institution>London School of Economics and Political Science</institution>
        <addr-line>London</addr-line>
        <country>United Kingdom</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Institute of Global Health Innovation</institution>
        <institution>Imperial College London</institution>
        <addr-line>London</addr-line>
        <country>United Kingdom</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Elias Mossialos <email>e.a.mossialos@lse.ac.uk</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2023</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>24</day>
        <month>8</month>
        <year>2023</year>
      </pub-date>
      <volume>25</volume>
      <elocation-id>e48824</elocation-id>
      <history>
        <date date-type="received">
          <day>8</day>
          <month>5</month>
          <year>2023</year>
        </date>
        <date date-type="rev-request">
          <day>18</day>
          <month>7</month>
          <year>2023</year>
        </date>
        <date date-type="rev-recd">
          <day>7</day>
          <month>8</month>
          <year>2023</year>
        </date>
        <date date-type="accepted">
          <day>16</day>
          <month>8</month>
          <year>2023</year>
        </date>
      </history>
      <copyright-statement>©Robin van Kessel, Madeleine Haig, Elias Mossialos. Originally published in the Journal of Medical Internet Research (https://www.jmir.org), 24.08.2023.</copyright-statement>
      <copyright-year>2023</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on https://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://www.jmir.org/2023/1/e48824" xlink:type="simple"/>
      <abstract>
        <p>The health care sector experiences 76% of cybersecurity breaches due to basic web application attacks, miscellaneous errors, and system intrusions, resulting in compromised health data or disrupted health services. The European Commission proposed the European Health Data Space (EHDS) in 2022 to enhance care delivery and improve patients’ lives by offering all European Union (EU) citizens control over their personal health data in a private and secure environment. The EU has taken an important step in homogenizing the health data environment of the European health ecosystem, although more attention needs to be paid to keeping the health data of EU citizens safe and secure within the EHDS. The pooling of health data across countries can have tremendous benefits, but it may also become a target for cybercriminals or state-sponsored hackers. State-of-the-art security measures are essential, and the current EHDS proposal lacks sufficient measures to warrant a cybersecure and resilient environment.</p>
      </abstract>
      <kwd-group>
        <kwd>cybersecurity</kwd>
        <kwd>Europe</kwd>
        <kwd>European Health Data Space</kwd>
        <kwd>digital health</kwd>
        <kwd>mHealth</kwd>
        <kwd>medical informatics</kwd>
        <kwd>data privacy</kwd>
        <kwd>patient safety</kwd>
        <kwd>privacy</kwd>
        <kwd>health service</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <p>Globally, 1463 cyberattacks were reported per week in 2022, with an average cost per breach of approximately US $10 million [<xref ref-type="bibr" rid="ref1">1</xref>]. The European Union Agency for Cybersecurity (ENISA) reported that the health care sector in the European Union (EU) experienced 76% of cybersecurity breaches due to basic web application attacks, miscellaneous errors, and system intrusions in 2021. Internal threat actors also remained prominent, accounting for 39% of cybersecurity breaches [<xref ref-type="bibr" rid="ref2">2</xref>]. The health care sector also faced numerous high-impact cybersecurity incidents that compromised sensitive data or disrupted health services, currently amounting to a median cost of €300,000 (US $325,000) per major security incident [<xref ref-type="bibr" rid="ref3">3</xref>]. Additionally, the health care sector is one of the less mature sectors in the field of cybersecurity [<xref ref-type="bibr" rid="ref4">4</xref>]. Disruptive attacks and lack of network segmentation allow foreign bodies to access the entire network instead of subsections, as well as exfiltrate sensitive information about the digital environment, which had a significant impact on the health sector. The societal migration to the digital world because of the COVID-19 pandemic worsened this situation, as fear and uncertainty among the public rose, resulting in a higher susceptibility to being exposed to harmful digital content and cybersecurity threats [<xref ref-type="bibr" rid="ref5">5</xref>-<xref ref-type="bibr" rid="ref8">8</xref>]. In fact, a 5-fold increase in cybercrimes was observed by the World Health Organization during the first 2 months of the pandemic [<xref ref-type="bibr" rid="ref9">9</xref>]. This was further compounded by the distribution of counterfeit COVID-19 products on the dark web [<xref ref-type="bibr" rid="ref10">10</xref>].</p>
    <p>The European Commission proposed the European Health Data Space (EHDS) in 2022 to enhance care delivery and improve patients’ lives by offering all EU citizens control over their personal health data in a private and secure environment. The goal was to eliminate information barriers and establish a single market for digital health services [<xref ref-type="bibr" rid="ref11">11</xref>]. More specifically, the EHDS enabled EU citizens to provide health professionals throughout the EU with access to their personal health data via a digital interface. This system would streamline the use of health data for purposes like research, innovation, policy making, and regulatory tasks, all the while upholding complete adherence to the EU’s data protection standards [<xref ref-type="bibr" rid="ref11">11</xref>]. Rooted in the fundamental principles of civic participation and empowerment that define the EU, the EHDS also addresses obstacles hindering the broad acceptance of digital health methods in conventional health care [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref13">13</xref>]. Although concerns have been raised about the current iteration of the EHDS proposal, including its potential to exacerbate health inequalities instead of remedying them [<xref ref-type="bibr" rid="ref14">14</xref>] and potential changes to data-sharing practices [<xref ref-type="bibr" rid="ref15">15</xref>], the concept of cybersecurity has received limited attention.</p>
    <p>The EHDS proposal only briefly mentions cybersecurity as a field that should be coordinated and collaborated with throughout the proposal (articles 10 [2], 39 [1], and 64 [5]) [<xref ref-type="bibr" rid="ref5">5</xref>]. However, a global shortage of cybersecurity professionals in all domains was reported in a recent review on improving cybersecurity education [<xref ref-type="bibr" rid="ref16">16</xref>]. One example of this is the recent release of the Cybersecurity Skills Academy by the European Commission, which was created to help close the cybersecurity talent gap and boost the EU’s competitiveness, growth, and resilience in cybersecurity [<xref ref-type="bibr" rid="ref17">17</xref>]. Still, relying on a single supply source for cybersecurity professionals may be challenging due to significant labour market demand. One possible solution is to explore the feasibility of incorporating cybersecurity modules into medical, public health, and digital health curricula and providing retraining and upskilling opportunities for practicing professionals [<xref ref-type="bibr" rid="ref16">16</xref>]. However, to achieve this, cybersecurity must be recognized and added as a core competency of digital health professionals, similar to what NHS Health Education England has implemented [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref19">19</xref>].</p>
    <p>The EHDS proposal refers to the updated Network and Information Security Directive as a common cybersecurity framework [<xref ref-type="bibr" rid="ref20">20</xref>], which requires EU member states to adopt various measures to improve their national cybersecurity environments. However, as a Directive, it leaves the responsibility to the member states to determine the means by which the objectives outlined in the Directive are achieved. This could pose a significant cybersecurity threat to the EU due to the divergent national cybersecurity strategies and resources allocated to achieve them [<xref ref-type="bibr" rid="ref21">21</xref>]. EU member states with limited digital and cybersecurity capabilities, such as Southern or Eastern member states or small states, may be particularly vulnerable to coordinated attacks aimed at denying service and gaining unauthorized access [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref22">22</xref>]. To begin rectifying these disparities in digital infrastructure within the EU, one potential approach could involve the European Commission leveraging its extensive track record of infrastructure investments. This could entail establishing a dedicated investment portfolio aimed at extending digital infrastructure into underserved nations and communities.</p>
    <p>A uniform cybersecurity system across the EU, and in particular, in the context of the EHDS, could provide a more comprehensive security net and enable the introduction of an EU-wide cybersecurity training curriculum. This system can include segmentation, multifactor authentication, and the use of virtual local area networks and cloud computing as well as training employees, monitoring behaviour, reducing human error, and enhancing stakeholder alignment [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref24">24</xref>]. Regarding segmentation, it is important to highlight that even though the system might be segmented on a national, regional, or local scale, all these segments would still operate within a unified federated network. In essence, despite being divided into numerous segmented networks, the system retains the ability to function as a cohesive, comprehensive network. In cases of cybersecurity threats, it is also feasible to isolate certain parts of the system to prevent the threat from infiltrating the federated network. Notably, recent technological advancements have demonstrated promising progress in the realm of cybersecurity. Technologies like blockchain [<xref ref-type="bibr" rid="ref25">25</xref>-<xref ref-type="bibr" rid="ref27">27</xref>] and a community solid server, which furnishes individuals with their personal data storage spaces [<xref ref-type="bibr" rid="ref28">28</xref>], have been effective in addressing concerns related to patient privacy breaches. Furthermore, technologies such as Fast Healthcare Interoperability Resources (which dictate rules for exchanging electronic health care data) [<xref ref-type="bibr" rid="ref29">29</xref>-<xref ref-type="bibr" rid="ref31">31</xref>], the Observational Medical Outcomes Partnership Common Data Models (a standardized data format to facilitate consistent analysis of observational data) [<xref ref-type="bibr" rid="ref32">32</xref>], and cross-enterprise document sharing (enabling cataloguing and sharing of patient records across health care institutions) are also capable of addressing cybersecurity issues tied to electronic health records [<xref ref-type="bibr" rid="ref33">33</xref>]. Nevertheless, implementing effective cybersecurity measures may come at an additional cost; however, these costs are relatively insignificant compared to the direct costs of cybersecurity threats (mentioned above) and the potential direct and indirect repercussions of exposing the health data of EU citizens to substandard cybersecurity practices [<xref ref-type="bibr" rid="ref2">2</xref>].</p>
    <p>ENISA was created in 2019 to develop a high uniform level of cybersecurity within the EU and standardize and improve cybersecurity across its member states. However, its mandate is currently limited to providing technical and human resources to support EU member states, conducting reviews of cybersecurity policies and threats in the EU, and facilitating the exchange of best practices among the member states [<xref ref-type="bibr" rid="ref22">22</xref>]. Although ENISA was established to enhance EU cybersecurity, the scope of its mandate prevents it from taking a leading role in the development of cybersecurity policies and resources. To achieve a homogeneous cybersecurity environment, ENISA's mandate needs to be expanded to proactively build and coordinate cybersecurity policies within EU member states and create a set of common cybersecurity standards. This would require the European Commission and EU member states to acknowledge the importance of addressing cybersecurity at the EU level [<xref ref-type="bibr" rid="ref34">34</xref>]. By doing so, the EU can reduce potential negative consequences of divergent cybersecurity policies and build a stronger cybersecurity workforce to ensure the security of sensitive data within the EHDS and the health care sector. Additionally, this approach would enable ENISA to use its expertise and data related to cybersecurity threats. This could involve creating precise benchmarks for evaluating the affordability and sustainability of the EU cybersecurity system and assessing its cost-effectiveness—an area that currently lacks established criteria. Moreover, this strategy would empower ENISA to draw upon its industry-specific insights, enabling it to propose exemplary practices that harmonize with the digital capacities and preparedness of distinct industries.</p>
    <p>The EU has taken a significant step toward homogenizing the health data environment in the European health ecosystem, but more attention is needed to ensure the safety and security of the health data of EU citizens within the EHDS. Although pooling health data across countries can bring tremendous public health benefits, it can also become a prime target for cybercriminals or state-sponsored hackers, posing a significant risk to EU citizens. Therefore, state-of-the-art security measures are essential, and the current iteration of the EHDS proposal does not contain sufficient measures to create a cybersecure and resilient environment.</p>
  </body>
  <back>
    <app-group/>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">EHDS</term>
          <def>
            <p>European Health Data Space</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">ENISA</term>
          <def>
            <p>European Union Agency for Cybersecurity</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">EU</term>
          <def>
            <p>European Union</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="web">
          <article-title>Cost of a Data Breach Report 2023: fight back against data breaches</article-title>
          <source>IBM</source>
          <access-date>2023-08-22</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ibm.com/reports/data-breach">https://www.ibm.com/reports/data-breach</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="web">
          <article-title>ENISA threat landscape 2022: July 2021 to July 2022</article-title>
          <source>EU Publications</source>
          <access-date>2023-08-22</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://op.europa.eu/en/publication-detail/-/publication/791dcc19-922e-11ed-b508-01aa75ed71a1/language-en">https://op.europa.eu/en/publication-detail/-/publication/791dcc19-922e-11ed-b508-01aa75ed71a1/language-en</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="web">
          <article-title>NIS investments: November 2022</article-title>
          <source>EU PUblications</source>
          <access-date>2023-08-22</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://data.europa.eu/doi/10.2824/433214">https://data.europa.eu/doi/10.2824/433214</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tasheva</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Kunkel</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>In a hyperconnected world, is the EU cybersecurity framework connected?</article-title>
          <source>European View</source>
          <year>2022</year>
          <month>11</month>
          <day>20</day>
          <volume>21</volume>
          <issue>2</issue>
          <fpage>186</fpage>
          <lpage>195</lpage>
          <pub-id pub-id-type="doi">10.1177/17816858221136106</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Williams</surname>
              <given-names>CM</given-names>
            </name>
            <name name-style="western">
              <surname>Chaturvedi</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Chakravarthy</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity risks in a pandemic</article-title>
          <source>J Med Internet Res</source>
          <year>2020</year>
          <month>09</month>
          <day>17</day>
          <volume>22</volume>
          <issue>9</issue>
          <fpage>e23692</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2020/9/e23692/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/23692</pub-id>
          <pub-id pub-id-type="medline">32897869</pub-id>
          <pub-id pub-id-type="pii">v22i9e23692</pub-id>
          <pub-id pub-id-type="pmcid">PMC7528623</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Alawida</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Omolara</surname>
              <given-names>AE</given-names>
            </name>
            <name name-style="western">
              <surname>Abiodun</surname>
              <given-names>OI</given-names>
            </name>
            <name name-style="western">
              <surname>Al-Rajab</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>A deeper look into cybersecurity issues in the wake of Covid-19: a survey</article-title>
          <source>J King Saud Univ Comput Inf Sci</source>
          <year>2022</year>
          <month>11</month>
          <volume>34</volume>
          <issue>10</issue>
          <fpage>8176</fpage>
          <lpage>8206</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1319-1578(22)00276-2"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jksuci.2022.08.003</pub-id>
          <pub-id pub-id-type="medline">37521180</pub-id>
          <pub-id pub-id-type="pii">S1319-1578(22)00276-2</pub-id>
          <pub-id pub-id-type="pmcid">PMC9367180</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Holly</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Wong</surname>
              <given-names>BLH</given-names>
            </name>
            <name name-style="western">
              <surname>van Kessel</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Awah</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Agrawal</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Ndili</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Optimising adolescent wellbeing in a digital age</article-title>
          <source>BMJ</source>
          <year>2023</year>
          <month>03</month>
          <day>20</day>
          <volume>380</volume>
          <fpage>e068279</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.bmj.com/lookup/pmidlookup?view=long&#38;pmid=36940933"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/bmj-2021-068279</pub-id>
          <pub-id pub-id-type="medline">36940933</pub-id>
          <pub-id pub-id-type="pmcid">PMC10019455</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Roman-Urrestarazu</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kinsey</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>van Kessel</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>A bill of children's digital rights is required to improve and sustain children's futures globally</article-title>
          <source>JAMA Pediatr</source>
          <year>2022</year>
          <month>11</month>
          <day>01</day>
          <volume>176</volume>
          <issue>11</issue>
          <fpage>1064</fpage>
          <lpage>1066</lpage>
          <pub-id pub-id-type="doi">10.1001/jamapediatrics.2022.3418</pub-id>
          <pub-id pub-id-type="medline">36155616</pub-id>
          <pub-id pub-id-type="pii">2796424</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="web">
          <article-title>WHO reports fivefold increase in cyber attacks, urges vigilance</article-title>
          <source>World Health Organization</source>
          <year>2020</year>
          <month>4</month>
          <day>3</day>
          <access-date>2023-08-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.who.int/news/item/23-04-2020-who-reports-fivefold-increase-in-cyber-attacks-urges-vigilance">https://www.who.int/news/item/23-04-2020-who-reports-fivefold-increase-in-cyber-attacks-urges-vigilance</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Catalani</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Townshend</surname>
              <given-names>HD</given-names>
            </name>
            <name name-style="western">
              <surname>Prilutskaya</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Roman-Urrestarazu</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>van Kessel</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Chilcott</surname>
              <given-names>RP</given-names>
            </name>
            <name name-style="western">
              <surname>Banayoti</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>McSweeney</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Corazza</surname>
              <given-names>O</given-names>
            </name>
          </person-group>
          <article-title>Profiling the vendors of COVID-19 related product on the Darknet: an observational study</article-title>
          <source>Emerg Trends Drugs Addict Health</source>
          <year>2023</year>
          <volume>3</volume>
          <fpage>100051</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S2667-1182(23)00002-8"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.etdah.2023.100051</pub-id>
          <pub-id pub-id-type="medline">37020522</pub-id>
          <pub-id pub-id-type="pii">S2667-1182(23)00002-8</pub-id>
          <pub-id pub-id-type="pmcid">PMC10030259</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="web">
          <article-title>European Health Union: A European Health Data Space for people and science Internet</article-title>
          <source>European Commission</source>
          <access-date>2022-05-04</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ec.europa.eu/commission/presscorner/detail/en/ip_22_2711">https://ec.europa.eu/commission/presscorner/detail/en/ip_22_2711</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wong</surname>
              <given-names>BLH</given-names>
            </name>
            <name name-style="western">
              <surname>Maaß</surname>
              <given-names>Laura</given-names>
            </name>
            <name name-style="western">
              <surname>Vodden</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>van Kessel</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Sorbello</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Buttigieg</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Odone</surname>
              <given-names>A</given-names>
            </name>
            <collab>European Public Health Association (EUPHA) Digital Health Section</collab>
          </person-group>
          <article-title>The dawn of digital public health in Europe: implications for public health policy and practice</article-title>
          <source>Lancet Reg Health Eur</source>
          <year>2022</year>
          <month>03</month>
          <volume>14</volume>
          <fpage>100316</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S2666-7762(22)00009-6"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.lanepe.2022.100316</pub-id>
          <pub-id pub-id-type="medline">35132399</pub-id>
          <pub-id pub-id-type="pii">S2666-7762(22)00009-6</pub-id>
          <pub-id pub-id-type="pmcid">PMC8811486</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Marelli</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Stevens</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Sharon</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Van Hoyweghen</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Boeckhout</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Colussi</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Degelsegger-Márquez</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>El-Sayed</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Hoeyer</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>van Kessel</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Zając</surname>
              <given-names>DK</given-names>
            </name>
            <name name-style="western">
              <surname>Matei</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Roda</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Prainsack</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Schlünder</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Shabani</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Southerington</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>The European health data space: too big to succeed?</article-title>
          <source>Health Policy</source>
          <year>2023</year>
          <month>09</month>
          <volume>135</volume>
          <fpage>104861</fpage>
          <pub-id pub-id-type="doi">10.1016/j.healthpol.2023.104861</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>van Kessel</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Wong</surname>
              <given-names>BLH</given-names>
            </name>
            <name name-style="western">
              <surname>Forman</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Gabrani</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Mossialos</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>The European Health Data Space fails to bridge digital divides</article-title>
          <source>BMJ</source>
          <year>2022</year>
          <month>07</month>
          <day>08</day>
          <volume>378</volume>
          <fpage>e071913</fpage>
          <pub-id pub-id-type="doi">10.1136/bmj-2022-071913</pub-id>
          <pub-id pub-id-type="medline">35803600</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shabani</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Will the European Health Data Space change data sharing rules?</article-title>
          <source>Science</source>
          <year>2022</year>
          <month>03</month>
          <day>25</day>
          <volume>375</volume>
          <issue>6587</issue>
          <fpage>1357</fpage>
          <lpage>1359</lpage>
          <pub-id pub-id-type="doi">10.1126/science.abn4874</pub-id>
          <pub-id pub-id-type="medline">35324305</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>AlDaajeh</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Saleous</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Alrabaee</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Barka</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Breitinger</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Raymond Choo</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>The role of national cybersecurity strategies on the improvement of cybersecurity education</article-title>
          <source>Comput Secur</source>
          <year>2022</year>
          <month>08</month>
          <volume>119</volume>
          <fpage>102754</fpage>
          <pub-id pub-id-type="doi">10.1016/j.cose.2022.102754</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="web">
          <article-title>Cyber Skills Academy</article-title>
          <source>Digital Skills &#38; Jobs Platform</source>
          <year>2023</year>
          <access-date>2023-05-08</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://digital-skills-jobs.europa.eu/en/cybersecurity-skills-academy">https://digital-skills-jobs.europa.eu/en/cybersecurity-skills-academy</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="web">
          <article-title>Artificial intelligence (AI) and digital healthcare technologies capability framework</article-title>
          <source>NHS Health Education England: Digital Transformations</source>
          <access-date>2023-05-08</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://digital-transformation.hee.nhs.uk/building-a-digital-workforce/dart-ed/horizon-scanning/ai-and-digital-healthcare-technologies">https://digital-transformation.hee.nhs.uk/building-a-digital-workforce/dart-ed/horizon-scanning/ai-and-digital-healthcare-technologies</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>van Kessel</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Roman-Urrestarazu</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Anderson</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kyriopoulos</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Field</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Monti</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Reed</surname>
              <given-names>SD</given-names>
            </name>
            <name name-style="western">
              <surname>Pavlova</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Wharton</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Mossialos</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Mapping factors that affect the uptake of digital therapeutics within health systems: scoping review</article-title>
          <source>J Med Internet Res</source>
          <year>2023</year>
          <month>07</month>
          <day>25</day>
          <volume>25</volume>
          <fpage>e48000</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2023//e48000/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/48000</pub-id>
          <pub-id pub-id-type="medline">37490322</pub-id>
          <pub-id pub-id-type="pii">v25i1e48000</pub-id>
          <pub-id pub-id-type="pmcid">PMC10410406</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="web">
          <article-title>NIS2 Directive</article-title>
          <source>European Commission</source>
          <access-date>2023-04-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://eur-lex.europa.eu/eli/dir/2022/2555">https://eur-lex.europa.eu/eli/dir/2022/2555</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Markopoulou</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Papakonstantinou</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>de Hert</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>The new EU cybersecurity framework: the NIS Directive, ENISA's role and the General Data Protection Regulation</article-title>
          <source>CLSR</source>
          <year>2019</year>
          <month>11</month>
          <volume>35</volume>
          <issue>6</issue>
          <fpage>105336</fpage>
          <pub-id pub-id-type="doi">10.1016/j.clsr.2019.06.007</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Martti</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Cyber-attacks against critical infrastructure</article-title>
          <source>Cyber Security</source>
          <year>2022</year>
          <publisher-loc>Cham, Switzerland</publisher-loc>
          <publisher-name>Springer International Publishing</publisher-name>
          <fpage>3</fpage>
          <lpage>42</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Stern</surname>
              <given-names>AD</given-names>
            </name>
            <name name-style="western">
              <surname>Gordon</surname>
              <given-names>WJ</given-names>
            </name>
            <name name-style="western">
              <surname>Landman</surname>
              <given-names>AB</given-names>
            </name>
            <name name-style="western">
              <surname>Kramer</surname>
              <given-names>DB</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity features of digital medical devices: an analysis of FDA product summaries</article-title>
          <source>BMJ Open</source>
          <year>2019</year>
          <month>06</month>
          <day>28</day>
          <volume>9</volume>
          <issue>6</issue>
          <fpage>e025374</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmjopen.bmj.com/lookup/pmidlookup?view=long&#38;pmid=31256020"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/bmjopen-2018-025374</pub-id>
          <pub-id pub-id-type="medline">31256020</pub-id>
          <pub-id pub-id-type="pii">bmjopen-2018-025374</pub-id>
          <pub-id pub-id-type="pmcid">PMC6609083</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kruse</surname>
              <given-names>CS</given-names>
            </name>
            <name name-style="western">
              <surname>Frederick</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Jacobson</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Monticone</surname>
              <given-names>DK</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity in healthcare: a systematic review of modern threats and trends</article-title>
          <source>THC</source>
          <year>2017</year>
          <month>02</month>
          <day>21</day>
          <volume>25</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>10</lpage>
          <pub-id pub-id-type="doi">10.3233/thc-161263</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Roehrs</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>da Costa</surname>
              <given-names>CA</given-names>
            </name>
            <name name-style="western">
              <surname>da Rosa Righi</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>OmniPHR: a distributed architecture model to integrate personal health records</article-title>
          <source>J Biomed Inform</source>
          <year>2017</year>
          <month>07</month>
          <volume>71</volume>
          <fpage>70</fpage>
          <lpage>81</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1532-0464(17)30108-9"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jbi.2017.05.012</pub-id>
          <pub-id pub-id-type="medline">28545835</pub-id>
          <pub-id pub-id-type="pii">S1532-0464(17)30108-9</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Madine</surname>
              <given-names>MM</given-names>
            </name>
            <name name-style="western">
              <surname>Salah</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Jayaraman</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Yaqoob</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Al-Hammadi</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Ellahham</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Calyam</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Fully decentralized multi-party consent management for secure sharing of patient health records</article-title>
          <source>IEEE Access</source>
          <year>2020</year>
          <volume>8</volume>
          <fpage>225777</fpage>
          <lpage>225791</lpage>
          <pub-id pub-id-type="doi">10.1109/access.2020.3045048</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Misbhauddin</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>AlAbdulatheam</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Aloufi</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Al-Hajji</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>AlGhuwainem</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>MedAccess: a scalable architecture for blockchain-based health record management</article-title>
          <year>2020</year>
          <conf-name>2nd International Conference on Computer and Information Sciences (ICCIS)</conf-name>
          <conf-date>Oct 13-15</conf-date>
          <conf-loc>Sakaka, Saudi Arabia</conf-loc>
          <fpage>A</fpage>
          <pub-id pub-id-type="doi">10.1109/ICCIS49240.2020.9257720</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Celuchova Bosanska</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Huptych</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Lhotská</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Decentralized EHRs in the semantic web for better health data management</article-title>
          <source>Stud Health Technol Inform</source>
          <year>2022</year>
          <month>11</month>
          <day>03</day>
          <volume>299</volume>
          <fpage>157</fpage>
          <lpage>162</lpage>
          <pub-id pub-id-type="doi">10.3233/SHTI220975</pub-id>
          <pub-id pub-id-type="medline">36325857</pub-id>
          <pub-id pub-id-type="pii">SHTI220975</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Spratt</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Ravneberg</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Derstine</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Granger</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Feasibility of electronic health record integration of a SMART application to facilitate patient-provider communication for medication management</article-title>
          <source>Comput Inform Nurs</source>
          <year>2022</year>
          <month>08</month>
          <day>01</day>
          <volume>40</volume>
          <issue>8</issue>
          <fpage>538</fpage>
          <lpage>546</lpage>
          <pub-id pub-id-type="doi">10.1097/CIN.0000000000000891</pub-id>
          <pub-id pub-id-type="medline">35234708</pub-id>
          <pub-id pub-id-type="pii">00024665-900000000-99187</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lobach</surname>
              <given-names>DF</given-names>
            </name>
            <name name-style="western">
              <surname>Boxwala</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kashyap</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Heaney-Huls</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Chiao</surname>
              <given-names>AB</given-names>
            </name>
            <name name-style="western">
              <surname>Rafter</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Lomotan</surname>
              <given-names>EA</given-names>
            </name>
            <name name-style="western">
              <surname>Harrison</surname>
              <given-names>MI</given-names>
            </name>
            <name name-style="western">
              <surname>Dymek</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Swiger</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Dullabh</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Integrating a patient engagement app into an electronic health record-enabled workflow using interoperability standards</article-title>
          <source>Appl Clin Inform</source>
          <year>2022</year>
          <month>10</month>
          <day>14</day>
          <volume>13</volume>
          <issue>5</issue>
          <fpage>1163</fpage>
          <lpage>1171</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.thieme-connect.com/DOI/DOI?10.1055/s-0042-1758736"/>
          </comment>
          <pub-id pub-id-type="doi">10.1055/s-0042-1758736</pub-id>
          <pub-id pub-id-type="medline">36516969</pub-id>
          <pub-id pub-id-type="pmcid">PMC9750793</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bender</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Sartipi</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>HL7 FHIR: an agile and RESTful approach to healthcare information exchange</article-title>
          <year>2013</year>
          <conf-name>26th IEEE International Symposium on Computer-Based Medical Systems</conf-name>
          <conf-date>June 20 - 22</conf-date>
          <conf-loc>Porto, Portugal</conf-loc>
          <pub-id pub-id-type="doi">10.1109/cbms.2013.6627810</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="web">
          <article-title>Standardized data: the OMOP common data model</article-title>
          <source>OHDSI</source>
          <access-date>2023-07-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ohdsi.org/data-standardization/">https://www.ohdsi.org/data-standardization/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Noumeir</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Renaud</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>IHE cross-enterprise document sharing for imaging: interoperability testing software</article-title>
          <source>Source Code Biol Med</source>
          <year>2010</year>
          <month>09</month>
          <day>21</day>
          <volume>5</volume>
          <issue>1</issue>
          <fpage>9</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://scfbm.biomedcentral.com/articles/10.1186/1751-0473-5-9"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/1751-0473-5-9</pub-id>
          <pub-id pub-id-type="medline">20858241</pub-id>
          <pub-id pub-id-type="pii">1751-0473-5-9</pub-id>
          <pub-id pub-id-type="pmcid">PMC2954912</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="web">
          <article-title>Regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act) (Text with EEA relevance) Internet</article-title>
          <source>European Commission</source>
          <year>2019</year>
          <month>04</month>
          <access-date>2023-04-17</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://data.europa.eu/eli/reg/2019/881/oj/eng">http://data.europa.eu/eli/reg/2019/881/oj/eng</ext-link>
          </comment>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
