<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="review-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v26i1e47311</article-id>
      <article-id pub-id-type="pmid">39566062</article-id>
      <article-id pub-id-type="doi">10.2196/47311</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Review</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Review</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Cybersecurity Interventions in Health Care Organizations in Low- and Middle-Income Countries: Scoping Review</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Leung</surname>
            <given-names>Tiffany</given-names>
          </name>
        </contrib>
        <contrib contrib-type="editor">
          <name>
            <surname>Mavragani</surname>
            <given-names>Amaryllis</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Zandesh</surname>
            <given-names>Zahra</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Dykstra</surname>
            <given-names>Josiah</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Hölbl</surname>
            <given-names>Marko</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author">
          <name name-style="western">
            <surname>Hasegawa</surname>
            <given-names>Kaede</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0009-0000-6764-671X</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>O'Brien</surname>
            <given-names>Niki</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Institute of Global Health Innovation</institution>
            <institution>Imperial College London</institution>
            <addr-line>10th Floor, St Mary's Hospital</addr-line>
            <addr-line>Praed Street</addr-line>
            <addr-line>London, W2 1NY</addr-line>
            <country>United Kingdom</country>
            <phone>44 020 7594 1419</phone>
            <email>n.obrien@imperial.ac.uk</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-8389-1448</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Prendergast</surname>
            <given-names>Mabel</given-names>
          </name>
          <degrees>MBBS</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-4060-7216</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author">
          <name name-style="western">
            <surname>Ajah</surname>
            <given-names>Chris Agape</given-names>
          </name>
          <degrees>MBBS, MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0009-0000-6390-1971</ext-link>
        </contrib>
        <contrib id="contrib5" contrib-type="author">
          <name name-style="western">
            <surname>Neves</surname>
            <given-names>Ana Luisa</given-names>
          </name>
          <degrees>MBChB, MSc, PhD</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-7107-7211</ext-link>
        </contrib>
        <contrib id="contrib6" contrib-type="author">
          <name name-style="western">
            <surname>Ghafur</surname>
            <given-names>Saira</given-names>
          </name>
          <degrees>MBChB, MRCP, MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-4487-6904</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Institute of Global Health Innovation</institution>
        <institution>Imperial College London</institution>
        <addr-line>London</addr-line>
        <country>United Kingdom</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Department of Primary Care and Public Health</institution>
        <institution>Imperial College London</institution>
        <addr-line>London</addr-line>
        <country>United Kingdom</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>RISE-Health</institution>
        <institution>Faculty of Medicine of the University of Porto</institution>
        <addr-line>Porto</addr-line>
        <country>Portugal</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Niki O'Brien <email>n.obrien@imperial.ac.uk</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2024</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>20</day>
        <month>11</month>
        <year>2024</year>
      </pub-date>
      <volume>26</volume>
      <elocation-id>e47311</elocation-id>
      <history>
        <date date-type="received">
          <day>15</day>
          <month>3</month>
          <year>2023</year>
        </date>
        <date date-type="rev-request">
          <day>7</day>
          <month>9</month>
          <year>2023</year>
        </date>
        <date date-type="rev-recd">
          <day>1</day>
          <month>11</month>
          <year>2023</year>
        </date>
        <date date-type="accepted">
          <day>7</day>
          <month>9</month>
          <year>2024</year>
        </date>
      </history>
      <copyright-statement>©Kaede Hasegawa, Niki O'Brien, Mabel Prendergast, Chris Agape Ajah, Ana Luisa Neves, Saira Ghafur. Originally published in the Journal of Medical Internet Research (https://www.jmir.org), 20.11.2024.</copyright-statement>
      <copyright-year>2024</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research (ISSN 1438-8871), is properly cited. The complete bibliographic information, a link to the original publication on https://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://www.jmir.org/2024/1/e47311" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Health care organizations globally have seen a significant increase in the frequency of cyberattacks in recent years. Cyberattacks cause massive disruptions to health service delivery and directly impact patient safety through disruption and treatment delays. Given the increasing number of cyberattacks in low- and middle-income countries (LMICs), there is a need to explore the interventions put in place to plan for cyberattacks and develop cyber resilience.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>This study aimed to describe cybersecurity interventions, defined as any intervention to improve cybersecurity in a health care organization, including but not limited to organizational strategy(ies); policy(ies); protocol(s), incident plan(s), or assessment process(es); framework(s) or guidelines; and emergency planning, implemented in LMICs to date and to evaluate their impact on the likelihood and impact of attacks. The secondary objective was to describe the main barriers and facilitators for the implementation of such interventions, where reported.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>A systematic search of the literature published between January 2017 and July 2024 was performed on Ovid Medline, Embase, Global Health, and Scopus using a combination of controlled terms and free text. A search of the gray literature within the same time parameters was undertaken on the websites of relevant stakeholder organizations to identify possible additional studies that met the inclusion criteria. Findings from included papers were mapped against the dimensions of the Essentials of Cybersecurity in Health Care Organizations (ECHO) framework and presented as a narrative synthesis.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>We included 20 studies in this review. The sample size of the majority of studies (13/20, 65%) was 1 facility to 5 facilities, and the studies were conducted in 14 countries. Studies were categorized into the thematic dimensions of the ECHO framework, including context; governance; organizational strategy; risk management; awareness, education, and training; and technical capabilities. Few studies (6/20, 30%) discussed cybersecurity intervention(s) as the primary focus of the paper; therefore, information on intervention(s) implemented had to be deduced. There was no attempt to report on the impact and outcomes in all papers except one. Facilitators and barriers identified were grouped and presented across national or regional, organizational, and individual staff levels.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>This scoping review’s findings highlight the limited body of research published on cybersecurity interventions implemented in health care organizations in LMICs and large heterogeneity across existing studies in interventions, research objectives, methods, and outcome measures used. Although complex and challenging, future research should specifically focus on the evaluation of cybersecurity interventions and their impact in order to build a robust evidence base to inform evidence-based policy and practice.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>computer security</kwd>
        <kwd>internet security</kwd>
        <kwd>network security</kwd>
        <kwd>digital health</kwd>
        <kwd>digital health technology</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>health data</kwd>
        <kwd>global health</kwd>
        <kwd>security</kwd>
        <kwd>data science</kwd>
        <kwd>LMIC</kwd>
        <kwd>low income</kwd>
        <kwd>low resource</kwd>
        <kwd>scoping review</kwd>
        <kwd>review methodology</kwd>
        <kwd>implementation</kwd>
        <kwd>barrier</kwd>
        <kwd>facilitator</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>Health systems globally are incorporating technology into every aspect of the delivery of care [<xref ref-type="bibr" rid="ref1">1</xref>]. The health sector is also one of the most targeted and profitable sectors for cyberattacks [<xref ref-type="bibr" rid="ref2">2</xref>], defined as the malicious attempt to gain unauthorized access to online systems or computers [<xref ref-type="bibr" rid="ref3">3</xref>]. The United States National Institute of Standards and Technology (NIST) expands upon this definition, describing a cyberattack as “any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself” [<xref ref-type="bibr" rid="ref4">4</xref>]. Medical records are more valuable than credit card details on the dark web in some countries, due to the inclusion of both patient identifiers and financial information [<xref ref-type="bibr" rid="ref5">5</xref>]. Health care organizations globally have seen a significant increase in the frequency of cyberattacks in recent years as technology plays more of a central role in the delivery of care [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref7">7</xref>].</p>
        <p>In 2017, the WannaCry malware attack targeted computers running with an unsupported Microsoft Windows operating system [<xref ref-type="bibr" rid="ref8">8</xref>]. The impact on the UK health system was far-reaching, and the incident remains the largest cyberattack to affect the National Health Service (NHS), with 34 hospital trusts and 603 primary care and other NHS organizations directly affected [<xref ref-type="bibr" rid="ref8">8</xref>]. In 2021, Ireland’s health service faced a ransomware attack after an employee in the Irish Health Service Executive opened a spreadsheet email attachment compromised with malware [<xref ref-type="bibr" rid="ref9">9</xref>]. In 2023, Pennsylvania Lehigh Valley Health Network was also the target of a ransomware attack in which the clinical images of individuals receiving cancer treatment were released [<xref ref-type="bibr" rid="ref10">10</xref>]. These attacks serve only as examples of the many cyberattacks the health sector has faced. Health care cybersecurity is underpinned by staff understanding of the significance of threats, as most security breaches occur through human error.</p>
        <p>Cyberattacks not only cause massive disruption to health service delivery but also directly impact patient safety. They disrupt and delay treatment, as well as threaten the safe use of personal data, which can lead to mistrust by patients and the public toward health care providers [<xref ref-type="bibr" rid="ref11">11</xref>]. In extreme cases, cyberattacks may lead to patient morbidity and mortality. For example, analysis of the impacts of the UK NHS WannaCry attack showed a 6% decrease in total admissions per infected hospital per day during WannaCry, with 4% fewer emergency admissions and 9% fewer elective admissions [<xref ref-type="bibr" rid="ref12">12</xref>]. Research has shown that delays to hospital inpatient admissions in excess of 5 hours from time of arrival at the emergency department are associated with an increase in all-cause 30-day mortality. Furthermore, for every 82 admitted patients whose time to inpatient bed transfer is delayed beyond 6 hours to 8 hours from arrival time, there is 1 additional death [<xref ref-type="bibr" rid="ref13">13</xref>]. In a separate study, delayed elective surgery patients also reported a loss of working days for themselves and family members; increased disappointment, frustration, and stress; concern for continued symptoms; and deteriorating conditions [<xref ref-type="bibr" rid="ref14">14</xref>]. Such downstream impacts outline the potential far-reaching impacts cybersecurity attacks and the disruption caused have on patients.</p>
        <p>Health care cybersecurity is increasingly relevant to health systems globally, including in low- and middle-income countries (LMICs). In LMICs, the implementation of digital technologies in health care service provision is rapidly accelerating [<xref ref-type="bibr" rid="ref15">15</xref>] and becoming an increasing part of the health agenda [<xref ref-type="bibr" rid="ref7">7</xref>]. Health care systems in LMICs are progressively using digital innovations, including health care informatics systems, electronic health care records, and wearables [<xref ref-type="bibr" rid="ref11">11</xref>].</p>
        <p>Health systems in LMICs have also seen an increase in cyber threats [<xref ref-type="bibr" rid="ref3">3</xref>]. East Asia Saraburi Hospital in Thailand was the target of a ransomware attack in 2020, followed by another cyberattack on the Public Health Ministry. Together, these resulted in the potential theft of 16 million patient records [<xref ref-type="bibr" rid="ref16">16</xref>]. The incidents led the Thai National Cyber Security Agency to announce 3 subordinate laws under the Cybersecurity Act to develop stronger cybersecurity. Among these laws was a mandate to provide cybersecurity training and conduct risk assessments for those dealing with critical information [<xref ref-type="bibr" rid="ref16">16</xref>]. Similarly, Life Healthcare, a private provider in South Africa, was attacked in 2020, disrupting the admissions systems, business processing systems, and email servers, though patient care was not impacted due to a swift switch to backup systems [<xref ref-type="bibr" rid="ref17">17</xref>].</p>
        <p>Despite the increase in cyberattacks in the health sector in LMICs, there is limited evidence on the number and nature of cyberattacks as well as interventions put in place to plan for cyberattacks and develop cyber resilience in these settings. Cybersecurity interventions are defined as any intervention to improve cybersecurity in a health care organization. These include but are not limited to organizational strategy(ies); policy(ies) (eg, policy for installation of appropriate malware and virus protection software, access management policy); protocol(s), incident plan(s), or process(es) (eg, processes around identity management, threat detection); framework(s) or guidelines; education (eg, courses, training); and emergency planning. Given increasing cybersecurity threats, it is essential to develop a knowledge base on interventions found to be effective at improving cyber preparedness in the health sector. A first step in achieving this is to understand which interventions have been developed and what their impact has been,</p>
      </sec>
      <sec>
        <title>Objectives</title>
        <p>The primary objectives of this scoping review were to (1) describe cybersecurity interventions implemented in LMICs to date and (2) evaluate their impact on the likelihood and impact of attacks. As a secondary objective, we aimed to identify the main barriers and facilitators for the implementation of such interventions, where reported.</p>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <p>This scoping review followed the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) reporting guidelines [<xref ref-type="bibr" rid="ref18">18</xref>].</p>
      <sec>
        <title>Search Strategy</title>
        <p>A systematic search of the literature published between January 2017 and July 2024 (current) was performed on Ovid Medline, Embase, Global Health, and Scopus using a combination of controlled terms and free text, depending on the database functionality. The detailed search strategy is provided in <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>. Searches were conducted in 3 health-specific (Ovid Medline, Embase, and Global Health) databases, and as such, no health care keywords were used in the search. Given the multidisciplinary topic area and the importance of capturing literature from information and communication technology (ICT) and computer science disciplines, Scopus was also searched with specific health care keywords (“health,” “healthcare,” “medical,” “hospital,” and “clinic”). We selected Scopus because the IEEE Xplore Library, a leading source of cybersecurity-focused research, is indexed by the database.</p>
        <p>A search of the gray literature within the same time parameters was undertaken to identify possible additional studies that met the inclusion criteria. Searches were conducted on the websites of relevant stakeholder organizations (ie, the World Bank and the World Health Organization [WHO] including WHO regional offices and the WHO International Clinical Trials Registry Platform Search Portal), Ponemon Institute, Cybersecurity and Infrastructure Security Agency, CyberPeace Institute, Gartner, and Verizon) and conference proceedings from related conferences (ie, Healthcare Information and Management Systems Society, Global Forum on Cyber Expertise).</p>
      </sec>
      <sec>
        <title>Selection Criteria</title>
        <p>We included any health care–focused study undertaken in (1) an LMIC country that (2) described 1 or multiple interventions related to cyberattacks or cybersecurity (<xref ref-type="boxed-text" rid="box1">Textbox 1</xref>). Only studies published in English were included. Feasibility studies, commentaries, and editorial papers were excluded.</p>
        <boxed-text id="box1" position="float">
          <title>Inclusion and exclusion criteria.</title>
          <p>Article type</p>
          <list list-type="bullet">
            <list-item>
              <p>Inclusion criterion: original research study, including systematic reviews</p>
            </list-item>
            <list-item>
              <p>Exclusion criteria: feasibility studies, commentaries, and editorial papers</p>
            </list-item>
          </list>
          <p>Language</p>
          <list list-type="bullet">
            <list-item>
              <p>Inclusion criterion: English</p>
            </list-item>
            <list-item>
              <p>Exclusion criterion: any other language</p>
            </list-item>
          </list>
        </boxed-text>
        <p>LMICs are defined by the World Bank based on gross national income per capita [<xref ref-type="bibr" rid="ref19">19</xref>]; however, it has been noted that the categorization should only be used when relevant to the research study [<xref ref-type="bibr" rid="ref20">20</xref>]. Health systems in LMICs are often challenged by resourcing constraints at a national level, which filter down to local systems and providers, and, as such, likely face common resourcing challenges for developing and implementing cybersecurity interventions. Given these shared challenges, focusing the research on LMICs as a general group was agreed by the authors. Notably, our use of the term serves as a starting point to explore cybersecurity interventions rather than an end point, as further nuanced research and evidence generation will be required.</p>
        <p>Cybersecurity interventions were defined as any intervention to improve cybersecurity in a health care organization, including but not limited to organizational strategy(ies); policy(ies); protocol(s), incident plan(s), or assessment process(es); framework(s) or guidelines; education (eg, courses, training); and emergency planning.</p>
        <p>Title and abstract screening followed by full-text screening were performed by 3 independent researchers (NO, KH, CAA) based on the inclusion and exclusion criteria described. Conflicts were resolved by consensus at each stage of the screening process. Intercoder agreement was measured by calculating the Cohen kappa at each screening phase. The quality of included publications was not assessed.</p>
      </sec>
      <sec>
        <title>Data Extraction and Analysis</title>
        <p>Studies that met the inclusion criteria were extracted by the first independent researcher (KH) using a standardized Microsoft Excel spreadsheet and reviewed by 2 other independent researchers (NO, ALN) to ensure data quality and consistency. Data extracted included author names, year of publication, study design, setting, population, outcome measures, and main findings.</p>
      </sec>
      <sec>
        <title>Analysis Framework</title>
        <p>Identified cybersecurity interventions were mapped against the Essentials of Cybersecurity in Health Care Organizations (ECHO) framework, a guide for policymakers and health and care organizations to strengthen their cybersecurity infrastructure, which positions cybersecurity interventions across 6 dimensions including context, the wider conditions within which organizations’ cyber planning operates; governance, which includes the policies and protocols to reduce the threat of cyberattacks; organizational strategy, involving policies, planning, and the allocation of responsibility at the organizational level; risk management, which involves identifying, assessing, and mitigating cyber risks; awareness, education, and training, which are actions to ensure that all stakeholders within the organization have at least core knowledge on cybersecurity; and technical capabilities, or technical requirements needed to safeguard cybersecurity [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref22">22</xref>]. The ECHO framework was developed in 2020 as a health sector–specific framework for ICT professionals and nonexpert stakeholders. The was recently included as a recommended resource in the World Bank’s knowledge notes series, entitled “Implementation Know-how Briefs to Support Countries to Prioritize, Connect and Scale for a Digital-in-Health Future (Cybersecurity in health brief)” [<xref ref-type="bibr" rid="ref23">23</xref>].</p>
        <p>A narrative synthesis of the findings was conducted. Relevant findings and outcome measures were grouped into subcategories and organized based on the 6 dimensions of the ECHO framework. Due to heterogeneity of the populations, interventions, comparators, and outcomes across the included studies, a meta-analysis was not performed, and no attempt was made to compare cybersecurity interventions described.</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Studies Included in the Analysis</title>
        <p>The database search identified a total of 3134 publications. After removal of 1294 duplicates and 38 publications marked as ineligible by automation tools (eg, Covidence automatic deduplication function), 1802 papers underwent screening. Of these, 164 studies underwent full-text screening, and 20 eventually were finally included in the review (<xref rid="figure1" ref-type="fig">Figure 1</xref>). Cohen kappa values were 0.29 in the abstract screening and 0.64 in the full-text review.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) flowchart. LMIC: low- and middle-income country.</p>
          </caption>
          <graphic xlink:href="jmir_v26i1e47311_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Description of Included Studies</title>
        <p><xref ref-type="table" rid="table1">Table 1</xref> presents the country and economic classification status of each of the papers. Notably 1 research study was conducted in both Libya and Yemen, so this was counted as 2 studies for this analysis, resulting in 21 total studies. The countries most represented in the studies included were Peru (3/21, 14%) and South Africa (3/21, 14%), followed by China, Iran, and Indonesia (2/21, 10% each). All other countries included (Brazil, Ecuador, Ghana, Indonesia, Jordan, Libya, Nepal, Turkey, Vietnam, Yemen) were represented in only 1 study each (1/21, 5%). Two-thirds (14/21, 67%) of the studies were conducted in upper middle-income countries, and 6 (6/21, 29%) were conducted in lower-middle income countries, with 1 (5%) conducted in a low-income country setting. One study was conducted in 2 countries (Libya and Yemen). The sample size (ie, number of institutions involved in the study) ranged from 1 facility to 312 facilities: 7 (7/20, 35%) studies were based in a single facility, 6 studies (6/20, 30%) were conducted in 2 facilities to 5 facilities, and 7 (7/20, 35%) studies were conducted in 6 or more facilities.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Description of studies by country, World Bank economic classification, and number of facilities.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="470"/>
            <col width="500"/>
            <thead>
              <tr valign="top">
                <td colspan="2">Characteristic</td>
                <td>Studies, n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="3">
                  <bold>Country</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Peru</td>
                <td>3 (14)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>South Africa</td>
                <td>3 (14)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>China</td>
                <td>2 (10)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Indonesia</td>
                <td>2 (10)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Iran</td>
                <td>2 (10)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Brazil</td>
                <td>1 (5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Ecuador</td>
                <td>1 (5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Ghana</td>
                <td>1 (5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Jordan</td>
                <td>1 (5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Libya</td>
                <td>1 (5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Nepal</td>
                <td>1 (5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Turkey</td>
                <td>1 (5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Vietnam</td>
                <td>1 (5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Yemen</td>
                <td>1 (5)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Economic classification<sup>a</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>UMIC<sup>b</sup></td>
                <td>14 (67)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>LMIC<sup>c</sup></td>
                <td>6 (29)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>LIC<sup>d</sup></td>
                <td>1 (5)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Number of facilities</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>1</td>
                <td>7 (35)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>2-5</td>
                <td>6 (30)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>≥6</td>
                <td>7 (35)</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table1fn1">
              <p><bold><sup>a</sup></bold>Country status based on the World Bank economic classification [<xref ref-type="bibr" rid="ref19">19</xref>].</p>
            </fn>
            <fn id="table1fn2">
              <p><sup>b</sup>UMIC: upper middle-income country.</p>
            </fn>
            <fn id="table1fn3">
              <p><sup>c</sup>LMIC: low- and middle-income country.</p>
            </fn>
            <fn id="table1fn4">
              <p><sup>d</sup>LIC: low-income country.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
      <sec>
        <title>Description of Cybersecurity Interventions Implemented in LMICs</title>
        <p>Of the 20 studies, only 6 (30%) discussed the intervention(s) as the primary focus of the paper. Information on intervention(s) implemented had to be deduced from the remaining papers through analysis of responses to staff or hospital-level surveys (12/20, 60%) and case studies (1/20, 5%). The gray literature search undertaken with the same parameters did not find any additional papers to include. Detailed information of the included studies, including a description of cybersecurity intervention(s), is presented in <xref ref-type="table" rid="table2">Table 2</xref>. Technical capabilities (14/55, 25%) and awareness, education, and training (11/55, 20%) were the 2 most common interventions mentioned in the studies, followed by governance (9/55, 16%), organizational strategy (9/55, 16%), risk management (7/55, 13%), and context (5/55, 9%). <xref ref-type="table" rid="table3">Table 3</xref> presents the description of studies by ECHO framework dimension.</p>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Detailed information (authors, year, country, institution, intervention) of the included studies.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="130"/>
            <col width="80"/>
            <col width="100"/>
            <col width="240"/>
            <col width="450"/>
            <thead>
              <tr valign="top">
                <td>Authors</td>
                <td>Year</td>
                <td>Country(s)</td>
                <td>Institution name</td>
                <td>Description of intervention</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Ali Alferjanya et al [<xref ref-type="bibr" rid="ref24">24</xref>]</td>
                <td>2022</td>
                <td>Libya, Yemen</td>
                <td>Not stated; 5 private hospitals in Libya and the 5 biggest private hospitals in Yemen</td>
                <td>No direct discussion of intervention; some of the organizational staff survey reported attendance of ICT<sup>a</sup> security training. Similarly, some staff reported the use of “different passwords across multiple web portals, systems, or applications” suggesting organizational technology-based cybersecurity measures, such as access control.</td>
              </tr>
              <tr valign="top">
                <td>Ayatollahi and Shagerdi [<xref ref-type="bibr" rid="ref25">25</xref>]</td>
                <td>2017</td>
                <td>Iran</td>
                <td>Not stated; 27 hospitals located in 1 city in northwest Iran</td>
                <td>Organizational staff reported on information security safeguards, including technical, administrative, and physical safeguards. The most common technical safeguards included access control and user authentication and detective control tests.</td>
              </tr>
              <tr valign="top">
                <td>Chuma and Ngoepe [<xref ref-type="bibr" rid="ref26">26</xref>]</td>
                <td>2022</td>
                <td>South Africa</td>
                <td>Not stated; 1 public hospital in South Africa</td>
                <td>Direct discussion of interventions; an organizational staff survey found the adoption of relevant legislation and the ISO27799 standard. The hospital established policies such as an administrative policy, records management policy, and medicine policy but had no formal security policy. Technical safeguards implemented at the hospital included password and username, data encryption, firewall and antivirus, and risk management activities such as maintaining a security audit log.</td>
              </tr>
              <tr valign="top">
                <td>Daraghmeh and Brown [<xref ref-type="bibr" rid="ref27">27</xref>]</td>
                <td>2021</td>
                <td>Jordan</td>
                <td>Not stated; 39 private hospitals in Jordan</td>
                <td>Organizational staff reported on various cybersecurity interventions. Some hospitals reported complying with relevant regulations and standards; having business continuity, disaster recovery, and risk management plans in place; and measuring the maturity of cyber measures. Some hospitals also reported requiring their staff to undergo training and various technological measures, including patching, firewalls, and authentication.</td>
              </tr>
              <tr valign="top">
                <td>Dönmez et al [<xref ref-type="bibr" rid="ref28">28</xref>]</td>
                <td>2020</td>
                <td>Turkey</td>
                <td>Not stated; 15 public health institutions in Kocaeli, Marmara region</td>
                <td>No direct discussion of intervention; organizational staff survey found attendance at ICT security training. Similarly, some staff reported “access to the information security policy documents at the hospital,” suggesting organizational planning and strategy; “Personal information is stored via information technologies securely”; and password management systems, suggesting technical controls in some institutions.</td>
              </tr>
              <tr valign="top">
                <td>Hou et al [<xref ref-type="bibr" rid="ref29">29</xref>]</td>
                <td>2018</td>
                <td>China</td>
                <td>Not stated; 1 public hospital in Shaanxi province, China</td>
                <td>No direct discussion of intervention; an in-depth case study presented the hospital's information security management measures, including regulatory and standards adherence, risk management activities and procedures, staff information security awareness training, technical controls, and organizational security strategies.</td>
              </tr>
              <tr valign="top">
                <td>Jara et al [<xref ref-type="bibr" rid="ref30">30</xref>]</td>
                <td>2021</td>
                <td>Peru</td>
                <td>Not stated; 1 private hospital in Lima, Peru</td>
                <td>Implementation of a model of cybersecurity capability measurement, calculated by the level of compliance with controls</td>
              </tr>
              <tr valign="top">
                <td>Kandabongee Yeng et al [<xref ref-type="bibr" rid="ref31">31</xref>]</td>
                <td>2023</td>
                <td>Ghana</td>
                <td>Not stated; 2 hospitals in Ghana</td>
                <td>No direct discussion of intervention; staff “shared their knowledge of security measures related to password use, access control, vulnerability reporting and logging of users’ access” as part of the research methodology, suggesting these interventions were in place at the 2 hospitals. Additionally, ICT and administration staff shared their knowledge on security governance, virus control, data backup, and training. Hospital A also reported having a draft security policy.</td>
              </tr>
              <tr valign="top">
                <td>Khac Hai et al [<xref ref-type="bibr" rid="ref32">32</xref>]</td>
                <td>2017</td>
                <td>Vietnam</td>
                <td>Not stated; 312 HIV outpatient clinics in Vietnam</td>
                <td>No direct discussion of intervention; some of the organizational staff survey reported attendance at ICT security training.</td>
              </tr>
              <tr valign="top">
                <td>Maeko and Van Der Haar [<xref ref-type="bibr" rid="ref33">33</xref>]</td>
                <td>2018</td>
                <td>South Africa</td>
                <td>Charlotte Maxeke Academic Hospital, Johannesburg, South Africa</td>
                <td>No direct discussion of intervention; some staff reported adhering “to the control procedures of locking or logging off their computers,” suggesting organizational technology-based cybersecurity measures, such as access control, and some reported attendance at ICT security training.</td>
              </tr>
              <tr valign="top">
                <td>Meng et al [<xref ref-type="bibr" rid="ref34">34</xref>]</td>
                <td>2018</td>
                <td>China</td>
                <td>1 anonymous organization in China implemented the approach</td>
                <td>Implementation of a trust-based approach based on Bayesian inference to identify malicious devices in a health care environment</td>
              </tr>
              <tr valign="top">
                <td>Nistrina and Bin Bon [<xref ref-type="bibr" rid="ref35">35</xref>]</td>
                <td>2019</td>
                <td>Indonesia</td>
                <td>Soreang Hospital, Bandung, Indonesia</td>
                <td>Undertaking of a maturity assessment based on the COBIT<sup>b</sup> 5 capability levels</td>
              </tr>
              <tr valign="top">
                <td>Quimiz-Moreira et al [<xref ref-type="bibr" rid="ref36">36</xref>]</td>
                <td>2022</td>
                <td>Ecuador</td>
                <td>Verdi Cevallos Balda Hospital, IESS<sup>c</sup> Hospital, and Rodríguez Zambrano Hospital, Ecuador</td>
                <td>No direct discussion of intervention; some of the hospitals reported on the use of 14 cybersecurity intervention areas including information security policies, roles and responsibilities, organization of information security, safety linked to human resources, asset management, access control, management of patient data (eg, pseudonymization), physical security of ICT equipment, operations security (eg, back-up, event logging), communications security (eg, network security management), acquisition, development and maintenance of information systems, supplier and third-party policies, incident management planning, business continuity, and compliance with security standards, policies, laws, and regulations.</td>
              </tr>
              <tr valign="top">
                <td>Rijo et al [<xref ref-type="bibr" rid="ref37">37</xref>]</td>
                <td>2020</td>
                <td>Brazil</td>
                <td>Not stated; 11 hospitals in Brazil</td>
                <td>No direct discussion of intervention; some of the hospitals surveyed reported on the use of 12 aspects of cybersecurity: IT security (eg, installing security patches), interoperability, hardware infrastructure, network infrastructure, business process management, use of standards, use of ISO<sup>d</sup> standards and certifications, research and development activities, IT team profile, alignment with strategy, decision-making and procurement, IT investment.</td>
              </tr>
              <tr valign="top">
                <td>Serrano Rojas et al [<xref ref-type="bibr" rid="ref38">38</xref>]</td>
                <td>2022</td>
                <td>Peru</td>
                <td>Not stated; 1 health center in Lima, Peru</td>
                <td>Implementation of a cybersecurity maturity model for health data privacy and protection</td>
              </tr>
              <tr valign="top">
                <td>Sanchez Rubio et al [<xref ref-type="bibr" rid="ref39">39</xref>]</td>
                <td>2022</td>
                <td>Peru</td>
                <td>Not stated; 2 clinics in Lima, Peru</td>
                <td>Implementation of a model to identify the level of maturity of the health clinics for preventing data leak scenarios</td>
              </tr>
              <tr valign="top">
                <td>Sarbaz et al [<xref ref-type="bibr" rid="ref40">40</xref>]</td>
                <td>2019</td>
                <td>Iran</td>
                <td>Not stated; 12 academic hospitals in Mashhad, northeastern Iran</td>
                <td>No direct discussion of intervention; some of the organizational staff survey reported the provision of information security training for staff and use of access control methods within their hospitals. Similarly, some staff reported “My organization runs security controls (such as firewall, antivirus, encryption, etc.) to protect sensitive information” and “My organization has used security procedures to protect important information from being stolen by malware (such as decoder, trojans, and spyware),” suggesting organizational technology-based cybersecurity measures and organizational planning.</td>
              </tr>
              <tr valign="top">
                <td>Kencana Sari et al [<xref ref-type="bibr" rid="ref41">41</xref>]</td>
                <td>2023</td>
                <td>Indonesia</td>
                <td>National Cardiovascular Center Harapan Kita (RSPJNHK), a specialized public hospital</td>
                <td>No direct discussion of intervention; implementation of interventions was mapped against ISO 27799:2016, and staff surveys were undertaken. The listed interventions included HIS<sup>e</sup> implementation policy, including information security management, set up of a System Maintenance and Security Sub-unit in the IT Department, establishment of procedures for incident reporting, ICT security training, access controls, establishment of a safe area for the data center room, and various technological measures, including anti-virus, firewalls, and authentication.</td>
              </tr>
              <tr valign="top">
                <td>Singh and Singh [<xref ref-type="bibr" rid="ref42">42</xref>]</td>
                <td>2022</td>
                <td>South Africa</td>
                <td>Not stated; 2 hospitals in northern Kwa-Zulu Natal, South Africa</td>
                <td>No direct discussion of intervention; some of the organizational staff survey reported attendance at ICT security training. Most reported this training taking place at the hospital, though others reported training at school or a university or college.</td>
              </tr>
              <tr valign="top">
                <td>Upadhyaya et al [<xref ref-type="bibr" rid="ref43">43</xref>]</td>
                <td>2018</td>
                <td>Nepal</td>
                <td>Tertiary hospital for Children, Eye, ENT<sup>f</sup> and Rehabilitation Services and associated community hospital in Chapagaun, Nepal</td>
                <td>Implementation of a centralized, permissioned blockchain-based, secured health care data system using hyperledger alongside information security measures including training and adoption of quality and safety standards</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table2fn1">
              <p><sup>a</sup>ICT: information and communication technology.</p>
            </fn>
            <fn id="table2fn2">
              <p><sup>b</sup>COBIT: Control Objectives for Information and Related Technologies.</p>
            </fn>
            <fn id="table2fn3">
              <p><sup>c</sup>IESS: Hospital de Especialidades Carlos Andrade Marín.</p>
            </fn>
            <fn id="table2fn4">
              <p><sup>d</sup>ISO: International Organization for Standardization.</p>
            </fn>
            <fn id="table2fn5">
              <p><sup>e</sup>HIS: health information system.</p>
            </fn>
            <fn id="table2fn6">
              <p><sup>f</sup>ENT: ear, nose, throat.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>Mapping of the 20 included studies against the dimensions of the Essentials of Cybersecurity in Health Care Organizations (ECHO) framework.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="200"/>
            <col width="170"/>
            <col width="630"/>
            <thead>
              <tr valign="top">
                <td>ECHO dimension</td>
                <td>Studies including the dimension, n (%)<sup>a</sup></td>
                <td>Papers</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>D1: Context</td>
                <td>5 (9)</td>
                <td>Daraghmeh and Brown [<xref ref-type="bibr" rid="ref27">27</xref>], Jara et al [<xref ref-type="bibr" rid="ref30">30</xref>], Nistrina and Bin Bon [<xref ref-type="bibr" rid="ref35">35</xref>], Serrano Rojas et al [<xref ref-type="bibr" rid="ref38">38</xref>], Sanchez Rubio et al [<xref ref-type="bibr" rid="ref39">39</xref>]</td>
              </tr>
              <tr valign="top">
                <td>D2: Governance</td>
                <td>9 (16)</td>
                <td>Chuma and Ngoepe [<xref ref-type="bibr" rid="ref26">26</xref>], Daraghmeh and Brown [<xref ref-type="bibr" rid="ref27">27</xref>], Hou et al [<xref ref-type="bibr" rid="ref29">29</xref>], Kandabongee Yeng et al [<xref ref-type="bibr" rid="ref31">31</xref>], Quimiz-Moreira et al [<xref ref-type="bibr" rid="ref36">36</xref>], Rijo et al [<xref ref-type="bibr" rid="ref37">37</xref>], Sarbaz et al [<xref ref-type="bibr" rid="ref40">40</xref>], Kencana Sari et al [<xref ref-type="bibr" rid="ref41">41</xref>], Upadhyaya et al [<xref ref-type="bibr" rid="ref43">43</xref>]</td>
              </tr>
              <tr valign="top">
                <td>D3: Organizational strategy</td>
                <td>9 (16)</td>
                <td>Chuma and Ngoepe [<xref ref-type="bibr" rid="ref26">26</xref>], Daraghmeh and Brown [<xref ref-type="bibr" rid="ref27">27</xref>], Dönmez et al [<xref ref-type="bibr" rid="ref28">28</xref>], Hou et al [<xref ref-type="bibr" rid="ref29">29</xref>], Kandabongee Yeng et al [<xref ref-type="bibr" rid="ref31">31</xref>], Quimiz-Moreira et al [<xref ref-type="bibr" rid="ref36">36</xref>], Rijo et al [<xref ref-type="bibr" rid="ref37">37</xref>], Sarbaz et al [<xref ref-type="bibr" rid="ref40">40</xref>], Kencana Sari et al [<xref ref-type="bibr" rid="ref41">41</xref>]</td>
              </tr>
              <tr valign="top">
                <td>D4: Risk management</td>
                <td>7 (13)</td>
                <td>Ayatollahi and Shagerdi [<xref ref-type="bibr" rid="ref25">25</xref>], Chuma and Ngoepe [<xref ref-type="bibr" rid="ref26">26</xref>], Daraghmeh and Brown [<xref ref-type="bibr" rid="ref27">27</xref>], Hou et al [<xref ref-type="bibr" rid="ref29">29</xref>], Quimiz-Moreira et al [<xref ref-type="bibr" rid="ref36">36</xref>], Rijo et al [<xref ref-type="bibr" rid="ref37">37</xref>], Sarbaz et al [<xref ref-type="bibr" rid="ref40">40</xref>]</td>
              </tr>
              <tr valign="top">
                <td>D5: Awareness, education, and training</td>
                <td>11 (20)</td>
                <td>Ali Alferjanya et al [<xref ref-type="bibr" rid="ref24">24</xref>], Daraghmeh and Brown [<xref ref-type="bibr" rid="ref27">27</xref>], Hou et al [<xref ref-type="bibr" rid="ref29">29</xref>], Kandabongee Yeng et al [<xref ref-type="bibr" rid="ref31">31</xref>], Khac Hai et al [<xref ref-type="bibr" rid="ref32">32</xref>], Maeko and Van Der Haar [<xref ref-type="bibr" rid="ref33">33</xref>], Quimiz-Moreira et al [<xref ref-type="bibr" rid="ref36">36</xref>], Sarbaz et al [<xref ref-type="bibr" rid="ref40">40</xref>], Kencana Sari et al [<xref ref-type="bibr" rid="ref41">41</xref>], Singh and Singh [<xref ref-type="bibr" rid="ref42">42</xref>], Upadhyaya et al [<xref ref-type="bibr" rid="ref43">43</xref>]</td>
              </tr>
              <tr valign="top">
                <td>D6: Technical capabilities</td>
                <td>14 (25)</td>
                <td>Ali Alferjanya et al [<xref ref-type="bibr" rid="ref24">24</xref>], Ayatollahi and Shagerdi [<xref ref-type="bibr" rid="ref25">25</xref>], Chuma and Ngoepe [<xref ref-type="bibr" rid="ref26">26</xref>], Daraghmeh and Brown [<xref ref-type="bibr" rid="ref27">27</xref>], Dönmez et al [<xref ref-type="bibr" rid="ref28">28</xref>], Hou et al [<xref ref-type="bibr" rid="ref29">29</xref>], Kandabongee Yeng et al [<xref ref-type="bibr" rid="ref31">31</xref>],<break/>Maeko and Van Der Haar [<xref ref-type="bibr" rid="ref33">33</xref>], Meng et al [<xref ref-type="bibr" rid="ref34">34</xref>], Quimiz-Moreira et al [<xref ref-type="bibr" rid="ref36">36</xref>], Rijo et al [<xref ref-type="bibr" rid="ref37">37</xref>], Sarbaz et al [<xref ref-type="bibr" rid="ref40">40</xref>], Kencana Sari et al [<xref ref-type="bibr" rid="ref41">41</xref>], Upadhyaya et al [<xref ref-type="bibr" rid="ref43">43</xref>]</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table3fn1">
              <p><sup>a</sup>Some studies mentioned multiple interventions that corresponded to different dimensions of the ECHO framework, resulting in an N of 55.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
      <sec>
        <title>Impact on Interventions of the Likelihood and Impact of Attacks, Clinical Outcomes, or the Quality and Safety of Care</title>
        <p>Of the 6 studies that described the implementation of interventions, 5 did not report on outcomes, either related to impact on frequency or scale of cyberattacks, clinical outcomes, or the quality and safety of care; therefore, the impact remains unknown [<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref38">38</xref>]. One study, however [<xref ref-type="bibr" rid="ref43">43</xref>], reported on the impact of a blockchain-based, secured health care data system using hyperledger alongside information security measures (the intervention) on patient satisfaction and noted that the health care organization “did not undergo repetitive work like history taking, investigations etc.,” suggesting that administrative waste was decreased, a key component of efficiency as described by the Institute of Medicine Six Domains of Health Quality Care [<xref ref-type="bibr" rid="ref44">44</xref>]. There was no attempt to report on the impact and outcomes following the interventions in the remaining 14 papers from which interventions had to be deduced.</p>
      </sec>
      <sec>
        <title>Main Barriers and Facilitators for the Implementation of Cybersecurity Interventions</title>
        <p>The main facilitators and barriers identified are presented in <xref ref-type="table" rid="table4">Table 4</xref>. Facilitators to implementation were directly reported in only 1 study [<xref ref-type="bibr" rid="ref43">43</xref>]. Upadhyaya et al [<xref ref-type="bibr" rid="ref43">43</xref>] noted success factors (facilitators) in the implementation of a blockchain-based, secured health care data system, which included ease of use, improved security and reliability, and training to develop knowledge on its use to enhance diagnosis and treatment.</p>
        <table-wrap position="float" id="table4">
          <label>Table 4</label>
          <caption>
            <p>Main facilitators and barriers to implementation identified from the 20 included studies.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="220"/>
            <col width="420"/>
            <col width="360"/>
            <thead>
              <tr valign="top">
                <td>Level</td>
                <td>Facilitators</td>
                <td>Barriers</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>National or regional</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Clear national legislation and policies (supported in organizations by active monitoring, evaluation, and learning)</p>
                    </list-item>
                  </list>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Lack of national or regional policies and guidance for organizations</p>
                    </list-item>
                    <list-item>
                      <p>Threat of natural disasters</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>Organizational</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Staff engagement and training</p>
                    </list-item>
                    <list-item>
                      <p>Management support</p>
                    </list-item>
                  </list>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Lack of knowledge among staff</p>
                    </list-item>
                    <list-item>
                      <p>Lack of ICT<sup>a</sup> experts</p>
                    </list-item>
                    <list-item>
                      <p>Exclusion of top-level managers</p>
                    </list-item>
                    <list-item>
                      <p>Cost of implementation</p>
                    </list-item>
                    <list-item>
                      <p>Political or high-level influence</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>Individual</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Perception of the importance of cybersecurity</p>
                    </list-item>
                    <list-item>
                      <p>Intervention’s ease of use</p>
                    </list-item>
                    <list-item>
                      <p>Security and reliability of intervention</p>
                    </list-item>
                  </list>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Disregard of cultural differences</p>
                    </list-item>
                    <list-item>
                      <p>Lack of time</p>
                    </list-item>
                  </list>
                </td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table4fn1">
              <p><sup>a</sup>ICT: information and communication technology.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <p>Facilitators to implementation of cybersecurity interventions could be deduced from the discussion in 11 studies but were not directly reported [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref28">28</xref>-<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref41">41</xref>,<xref ref-type="bibr" rid="ref42">42</xref>]. At an organizational level, one of the main facilitators found in 4 studies was that national legislation and policies enabled health care organizations to create their own information security management guidelines and subsequent interventions [<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref34">34</xref>]. However, national legislation and policy was most effective when it was supported by active monitoring and penalization, for example with hospital inspections [<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref29">29</xref>]. Jara et al [<xref ref-type="bibr" rid="ref30">30</xref>] suggested that routine collection of data on information security by organizations enabled better cybersecurity practices due to a continuous process of evaluation and improvement. In addition, the most important factors for positive staff engagement with cybersecurity software are reportedly the appearance features, screen interface, and volume of information on the screen [<xref ref-type="bibr" rid="ref42">42</xref>]. At an individual level, one of the main facilitators identified by 4 studies was that a perception of the importance of cybersecurity positively influenced cybersecurity intervention adherence [<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref31">31</xref>-<xref ref-type="bibr" rid="ref33">33</xref>]. This perception was influenced by different factors; for instance, Dönmez et al [<xref ref-type="bibr" rid="ref28">28</xref>] suggested that health care workers recognized the need for improved cybersecurity, while Maeko and Van Der Haar [<xref ref-type="bibr" rid="ref33">33</xref>] suggested that health care workers recognized the importance of safeguarding their patients. Studies recognized that a facilitator for successful cybersecurity training was when employees created their own cybersecurity goals and action plans [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref29">29</xref>]. Ali Alferjanya et al [<xref ref-type="bibr" rid="ref24">24</xref>] expanded on this point by suggesting that this was facilitated by the inclusion of staff supervisors to aid staff with creating their goals.</p>
        <p>Barriers to implementation were directly reported in 2 studies [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref41">41</xref>]. Maeko and Van Der Haar [<xref ref-type="bibr" rid="ref33">33</xref>] noted barriers associated with awareness, education, and training and technical capability–focused interventions. Cost was perceived by 49% of respondents as a major barrier to training being offered at the hospital, and implementation barriers associated with multimodal access control systems included cost; political influence, as high-level decision-making can result in employee resistance; and existing cyber hygiene practices. Kencana Sari et al [<xref ref-type="bibr" rid="ref41">41</xref>] noted that barriers associated with health care worker adoption of security behaviors included perceived downsides (eg, multifactor authentication taking more time) and workload constraints. Barriers to implementation of cybersecurity interventions could be deduced from the discussion in 9 studies [<xref ref-type="bibr" rid="ref24">24</xref>-<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref32">32</xref>-<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref42">42</xref>]. One of the main barriers to implementing interventions was the lack of knowledge among all levels of health care staff [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref32">32</xref>-<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref42">42</xref>]. Hou et al [<xref ref-type="bibr" rid="ref29">29</xref>] noted that a barrier to effective training is that national policies do not outline how information security awareness training should be carried out. Meng et al [<xref ref-type="bibr" rid="ref34">34</xref>] also mentioned that a lack of IT experts within health care organizations hindered cybersecurity practice. With regards to the successful implementation of cybersecurity training, disregard for cultural differences, a lack of time among health care staff, and exclusion of top-level managers were identified as major barriers [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref33">33</xref>]. The threat of natural and man-made disasters such as floods and fires, specifically electrical fires that impact electric power transmission, were found to be additional barriers [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref26">26</xref>]. Finally, Chuma and Ngoepe [<xref ref-type="bibr" rid="ref26">26</xref>] identified a lack of resources such as power and system failures, poor network, and outdated systems as key challenges.</p>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Main Findings</title>
        <p>The primary outcome of this scoping review was the description of cybersecurity interventions implemented in the LMIC health care organizations described in the 20 studies. Our results indicate that there is limited research focusing directly on identifying and evaluating cybersecurity interventions in our research context. Only 6 of the 20 studies focused directly on cybersecurity interventions [<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref43">43</xref>]. The remaining 14 studies included an indirect discussion by using surveys or questionnaires to investigate the state of cybersecurity in health care organizations [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref27">27</xref>-<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref31">31</xref>-<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref39">39</xref>-<xref ref-type="bibr" rid="ref42">42</xref>].</p>
        <p>From the included studies, which directly investigated cybersecurity interventions [<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref43">43</xref>], 1 study proposed a way of calculating devices’ trust values and identifying trusted devices by means of a Bayesian inference approach, and another implemented a blockchain-based, secured health care system to transfer data. Five studies focused on ECHO Dimension 1, specifically investigating cybersecurity capability and maturity, implementing models and frameworks to assess security capabilities [<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref39">39</xref>], with 1 study using an existing framework called Control Objectives for Information and Related Technologies (COBIT) 5 [<xref ref-type="bibr" rid="ref35">35</xref>].The studies that indirectly discussed cybersecurity interventions through surveys or questionnaires most frequently described cybersecurity staff training (ECHO Dimension 5) as an intervention, followed by access control, including use of a password and user authentication (ECHO Dimension 6). Only 1 study reported on impact and outcomes of the interventions, specifically on patient satisfaction.</p>
        <p>Despite the high frequency of staff training interventions being described, one of the main barriers mentioned was a lack of cybersecurity knowledge among health care staff [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref32">32</xref>-<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref42">42</xref>]. This may indicate that existing ICT training is either sporadic or not effective in educating its staff members on cybersecurity and their roles and responsibilities. In this context, it is important to note that evidence is contradictory in what concerns the effectiveness of ICT training [<xref ref-type="bibr" rid="ref44">44</xref>-<xref ref-type="bibr" rid="ref46">46</xref>]. One of the main facilitators of training engagement was when staff were aware of the value of training and its importance to their patients [<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref33">33</xref>]. This could suggest that the problem lies within the health care culture, rather than the training itself. We recommend that interventions should hold a larger focus on changing the culture around the importance of cybersecurity. Given that cybersecurity training is a nontechnical intervention that most staff will be exposed to, it is also likely that this was overreported in staff surveys.</p>
        <p>National and regional policy and legislation play an important role in creating a setting for cybersecurity interventions to be implemented [<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref34">34</xref>]. The facilitators of cybersecurity interventions mentioned in the studies often suggested that national legislation on cybersecurity gives health care organizations a direction for the development and implementation of their own policies and interventions. Hou et al [<xref ref-type="bibr" rid="ref29">29</xref>] specifically mentioned that one of the barriers to effective cybersecurity staff training is that national policy does not outline how information security awareness training should be carried out. It is recommended that health care organizations in LMICs collaborate with government stakeholders not only in the development of national and regional policy but also in the implementation of cybersecurity interventions. For instance, in the United Kingdom, the NHS England cybersecurity team collaborates with the UK National Cyber Security Centre on interventions to outline what effective digital practice is [<xref ref-type="bibr" rid="ref47">47</xref>]. LMICs can similarly build on their national policies and collaborate with governments to develop effective cybersecurity interventions.</p>
        <p>There was a spread of World Bank economic classifications in the country settings across the included studies. However, upper middle-income countries were most represented, as it is likely that they generally have greater access to resources and technology, as compared with LMIC contexts. Furthermore, 5 of the 20 studies were conducted in private hospitals [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref39">39</xref>], with Daraghmeh and Brown [<xref ref-type="bibr" rid="ref27">27</xref>] performing a study of 39 private hospitals. These settings are not fully representative of the low-resource contexts in which many cybersecurity interventions must be implemented in public, non-for-profit, and faith-based facilities. More studies need to be conducted in low-resource settings that directly measure the impact of cybersecurity interventions.</p>
      </sec>
      <sec>
        <title>Comparison With the Previous Literature</title>
        <p>Findings of this scoping review are consistent with previous evidence suggesting that health care organizations globally are scaling up their responses to cyberattacks, particularly in the post-COVID-19 pandemic context [<xref ref-type="bibr" rid="ref48">48</xref>,<xref ref-type="bibr" rid="ref49">49</xref>]. However, it is notable that the limited evidence focused on investigation within LMIC health systems makes an in-depth comparison with previous literature in LMICs challenging. In the global context, including high-income country (HIC) health systems, He et al [<xref ref-type="bibr" rid="ref48">48</xref>] also found that interventions used in the health sector during COVID-19 included increasing security awareness, enabling business continuity, and applying technical controls.</p>
        <p>As <xref ref-type="table" rid="table4">Table 4</xref> indicates, there were a range of facilitators and barriers to the implementation of cybersecurity interventions in LMIC settings reported or deduced from the evidence base. These findings are consistent with research undertaken in HICs. Coventry et al [<xref ref-type="bibr" rid="ref50">50</xref>] found that barriers to secure behavior in health care among staff at 3 health care sites in Ireland, Italy, and Greece were a result of a lack of policies and reinforcement of secure behavior, poor awareness of consequences, and security as a barrier to productivity or patient care. Branley-Bell et al [<xref ref-type="bibr" rid="ref51">51</xref>] also noted time pressures and fatigue as barriers to secure behavior in the health care context. Financial barriers to implementation of cybersecurity interventions identified in this study were also echoed in findings from interviews with cybersecurity experts working in hospitals in Canada and the United States [<xref ref-type="bibr" rid="ref52">52</xref>]. Notably, a lack of comparable research on facilitators suggests more research is required across HIC and LMIC contexts.</p>
        <p>Given the nascent literature on the impact of interventions on likelihood and impact of attacks, clinical outcomes, or the quality and safety of care in the wider literature, analysis of the 1 study outlining an impact on patient satisfaction and efficiency [<xref ref-type="bibr" rid="ref43">43</xref>] remains limited. It is hoped that the evidence gap will be addressed given the increasing incidences of cyberattacks in health care and the growing use of digital technologies in health service delivery, making cybersecurity an essential element of patient safety in the health sector context.</p>
      </sec>
      <sec>
        <title>Strengths and Limitations</title>
        <p>This scoping review has several strengths [<xref ref-type="bibr" rid="ref53">53</xref>]. The review represents the first known attempt to gather information systematically on cybersecurity interventions in health care organizations in LMICs. The broad nature of the scoping review methodology enabled the inclusion of a range of studies with varied aims and using varied methods. The search terms also contributed to the inclusion of 17 papers, enabled discussion on the topic of interest, and identified facilitators and barriers to the implementation of cybersecurity initiatives.</p>
        <p>This review has several limitations. First, the scoping review was not registered in a database (eg, PROSPERO) because few results were expected to have detailed information to enable the application of synthesis methods to determine outcomes and effects. It is possible that some papers were missed in the search. However, we sought to mitigate this limitation by developing broad search terms, screening multiple databases both inside and outside medicine and health care, involving a team in the screening process, checking references in the included papers, and undertaking a search of the gray literature. Although care was taken to ensure that technical cybersecurity publications were captured by searching Scopus, some papers may have been missed as the Scopus catalog provides only 89% coverage of the ACM Digital Library, a common database of cybersecurity results. There was no assessment of bias in the included studies. Given our inclusion and exclusion criteria, it is likely that non-English studies published on this topic were missed. This limitation is particularly pertinent as a large number of LMICs are non-English speaking.</p>
      </sec>
      <sec>
        <title>Implications for Research and Policy</title>
        <p>This scoping review is the first of its kind and identifies a critical lack of investigation on cybersecurity interventions implemented in health care organizations. One of the main gaps in the literature is the direct evaluation of interventions, including the assessment of outcomes and impact, and studies focusing primarily on this as their main focus. As such, there is a need for robust evaluation of impact and outcomes. It is also important that further research is conducted across public, private, not-for-profit, and faith-based health providers in LMICs with a focus on primary data collection as opposed to further literature reviews.</p>
        <p>A greater focus on interventions beyond cybersecurity training must be investigated. Expanding primary research methodologies beyond staff surveys and questionnaires also offers the opportunity to capture more information on technical interventions related to cybersecurity. Additionally, further research should evaluate the culture change around the importance of cybersecurity and implications for impact and outcomes. We believe greater research is required, using learnings from the field of implementation science and seeking to build a robust and generalizable evidence base to inform implementation practice [<xref ref-type="bibr" rid="ref54">54</xref>].</p>
        <p>This review also identified the important role of national and regional policy and legislation as an enabler of cybersecurity intervention implementation. Clear national legislation and regulation, with accompanying guidance on cybersecurity, provides health care organizations with a mandate and direction to develop and implement organizational policies and interventions accordingly. It is also recommended that health care organizations in LMICs collaborate with government stakeholders in the implementation of cybersecurity interventions where possible, to enable government stakeholders to understand the practice-level challenges toward improved policy and guidance long term.</p>
      </sec>
      <sec>
        <title>Conclusion</title>
        <p>This scoping review presents a comprehensive description of cybersecurity interventions implemented in LMICs. The small number of studies identified highlights the limited body of research published in this topic area and shows large heterogeneity in interventions, research objectives, methods, and outcome measures used. Consistent with wider literature on the impacts of cybersecurity interventions, the impact of cybersecurity interventions on the likelihood and impact of cyberattacks in health care organizations remains unclear, making a reliable analysis of evidence difficult. Nonetheless, it is important to continue research to explore the impact, although complex and difficult to assess, to enable targeted cybersecurity initiatives to be used for the benefit of patients, providers, and health systems.</p>
        <p>Current evidence points to clear national legislation and policies, supported in organizations by active monitoring, evaluation, and learning, and provider-level staff engagement and training as facilitators of cybersecurity interventions. Staff perception of the importance of cybersecurity, intervention ease of use, and security and reliability of interventions facilitate successful implementation. However, a lack of policy and guidance for organizations, a lack of knowledge among staff and health ICT experts, and the costs of implementation challenge greater implementation of cybersecurity initiatives in health care organizations. Future research should directly evaluate cybersecurity interventions and expand methodologies to build a robust and generalizable evidence base to inform policy and practice.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>Search terms.</p>
        <media xlink:href="jmir_v26i1e47311_app1.docx" xlink:title="DOCX File , 32 KB"/>
      </supplementary-material>
      <supplementary-material id="app2">
        <label>Multimedia Appendix 2</label>
        <p>PRISMA-ScR checklist.</p>
        <media xlink:href="jmir_v26i1e47311_app2.pdf" xlink:title="PDF File  (Adobe PDF File), 105 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">COBIT</term>
          <def>
            <p>Control Objectives for Information and Related Technologies</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">ECHO</term>
          <def>
            <p>Essentials of Cybersecurity in Health Care Organizations</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">HIC</term>
          <def>
            <p>high-income country</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">ICT</term>
          <def>
            <p>information and communication technology</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">LMIC</term>
          <def>
            <p>low- and middle-income country</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">NHS</term>
          <def>
            <p>National Health Service</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">NIST</term>
          <def>
            <p>National Institute of Standards and Technology</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb8">PRISMA</term>
          <def>
            <p>Preferred Reporting Items for Systematic Reviews and Meta-Analyses</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb9">WHO</term>
          <def>
            <p>World Health Organization</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>ALN is funded by the National Institute for Health and Care (NIHR) Applied Research Collaboration North West London (ARC NWL) and NIHR NWL Patient Safety Research Collaboration (NWL PSRC), with infrastructure support from the NIHR Imperial Biomedical Research Centre. The views expressed in this publication are those of the author(s) and not necessarily those of the NIHR or the Department of Health and Social Care.</p>
    </ack>
    <notes>
      <sec>
        <title>Data Availability</title>
        <p>The data sets generated during and/or analyzed during this study are available from the corresponding author on reasonable request.</p>
      </sec>
    </notes>
    <fn-group>
      <fn fn-type="con">
        <p>KH, NO, and SG conceptualized the manuscript. KH developed search terms, with input from NO, and ran the database searches. KH, NO, and CAA undertook the systematic review screening, and ALN completed the quality assessment. KH, NO, and MP wrote the original draft with support from ALN and SG. All authors equally contributed to the reviewing and editing.</p>
      </fn>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gopal</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Suter-Crazzolara</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Toldo</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Eberhardt</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Digital transformation in healthcare - architectures of present and future information technologies</article-title>
          <source>Clin Chem Lab Med</source>
          <year>2019</year>
          <month>02</month>
          <day>25</day>
          <volume>57</volume>
          <issue>3</issue>
          <fpage>328</fpage>
          <lpage>335</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.degruyter.com/document/doi/10.1515/cclm-2018-0658"/>
          </comment>
          <pub-id pub-id-type="doi">10.1515/cclm-2018-0658</pub-id>
          <pub-id pub-id-type="medline">30530878</pub-id>
          <pub-id pub-id-type="pii">cclm-2018-0658</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Coventry</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Branley</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity in healthcare: A narrative review of trends, threats and ways forward</article-title>
          <source>Maturitas</source>
          <year>2018</year>
          <month>07</month>
          <volume>113</volume>
          <fpage>48</fpage>
          <lpage>52</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://core.ac.uk/reader/157854043?utm_source=linkout"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.maturitas.2018.04.008</pub-id>
          <pub-id pub-id-type="medline">29903648</pub-id>
          <pub-id pub-id-type="pii">S0378-5122(18)30165-8</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="web">
          <article-title>Cyber Threats 2020: A Year in Retrospect</article-title>
          <source>PWC</source>
          <access-date>2024-09-28</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.pwc.co.uk/cyber-security/pdf/pwc-cyber-threats-2020-a-year-in-retrospect.pdf">https://www.pwc.co.uk/cyber-security/pdf/pwc-cyber-threats-2020-a-year-in-retrospect.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="web">
          <article-title>Attack</article-title>
          <source>National Institute of Standards and Technology (NIST) Information Technology Laboratory Computer Security Resource Center</source>
          <access-date>2024-09-28</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://csrc.nist.gov/glossary/term/attack">https://csrc.nist.gov/glossary/term/attack</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Martin</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Martin</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Hankin</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Darzi</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kinross</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity and healthcare: how safe are we?</article-title>
          <source>BMJ</source>
          <year>2017</year>
          <month>07</month>
          <day>06</day>
          <volume>358</volume>
          <fpage>j3179</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://hdl.handle.net/10044/1/51379"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/bmj.j3179</pub-id>
          <pub-id pub-id-type="medline">28684400</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Neprash</surname>
              <given-names>HT</given-names>
            </name>
            <name name-style="western">
              <surname>McGlave</surname>
              <given-names>CC</given-names>
            </name>
            <name name-style="western">
              <surname>Cross</surname>
              <given-names>DA</given-names>
            </name>
            <name name-style="western">
              <surname>Virnig</surname>
              <given-names>BA</given-names>
            </name>
            <name name-style="western">
              <surname>Puskarich</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Huling</surname>
              <given-names>JD</given-names>
            </name>
            <name name-style="western">
              <surname>Rozenshtein</surname>
              <given-names>AZ</given-names>
            </name>
            <name name-style="western">
              <surname>Nikpay</surname>
              <given-names>SS</given-names>
            </name>
          </person-group>
          <article-title>Trends in ransomware attacks on US hospitals, clinics, and other health care delivery organizations, 2016-2021</article-title>
          <source>JAMA Health Forum</source>
          <year>2022</year>
          <month>12</month>
          <day>02</day>
          <volume>3</volume>
          <issue>12</issue>
          <fpage>e224873</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/36580326"/>
          </comment>
          <pub-id pub-id-type="doi">10.1001/jamahealthforum.2022.4873</pub-id>
          <pub-id pub-id-type="medline">36580326</pub-id>
          <pub-id pub-id-type="pii">2799961</pub-id>
          <pub-id pub-id-type="pmcid">PMC9856685</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Javaid</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Haleem</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Singh</surname>
              <given-names>RP</given-names>
            </name>
            <name name-style="western">
              <surname>Suman</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends</article-title>
          <source>Cyber Security and Applications</source>
          <year>2023</year>
          <month>12</month>
          <volume>1</volume>
          <fpage>100016</fpage>
          <pub-id pub-id-type="doi">10.1016/j.csa.2023.100016</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="web">
          <article-title>Investigation: WannaCry cyber attack and the NHS</article-title>
          <source>National Audit Office</source>
          <year>2018</year>
          <access-date>2024-09-28</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.nao.org.uk/wp-content/uploads/2017/10/Investigation-WannaCry-cyber-attack-and-the-NHS.pdf">https://www.nao.org.uk/wp-content/uploads/2017/10/Investigation-WannaCry-cyber-attack-and-the-NHS.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Corera</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Irish health cyber-attack could have been even worse, report says</article-title>
          <source>BBC</source>
          <year>2021</year>
          <month>12</month>
          <day>10</day>
          <access-date>2024-09-28</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.bbc.co.uk/news/technology-59612917">https://www.bbc.co.uk/news/technology-59612917</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Devi</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Cyber-attacks on health-care systems</article-title>
          <source>The Lancet Oncology</source>
          <year>2023</year>
          <month>04</month>
          <volume>24</volume>
          <issue>4</issue>
          <fpage>e148</fpage>
          <pub-id pub-id-type="doi">10.1016/s1470-2045(23)00119-5</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>O’Brien</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Ghafur</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Durkin</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity in health is an urgent patient safety concern: We can learn from existing patient safety improvement strategies to address it</article-title>
          <source>Journal of Patient Safety and Risk Management</source>
          <year>2021</year>
          <month>03</month>
          <day>03</day>
          <volume>26</volume>
          <issue>1</issue>
          <fpage>5</fpage>
          <lpage>10</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://journals.sagepub.com/doi/full/10.1177/2516043520975926.doi:"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/2516043520975926</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ghafur</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Kristensen</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Honeyford</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Martin</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Darzi</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Aylin</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>A retrospective impact analysis of the WannaCry cyberattack on the NHS</article-title>
          <source>NPJ Digit Med</source>
          <year>2019</year>
          <volume>2</volume>
          <fpage>98</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1038/s41746-019-0161-6"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/s41746-019-0161-6</pub-id>
          <pub-id pub-id-type="medline">31602404</pub-id>
          <pub-id pub-id-type="pii">161</pub-id>
          <pub-id pub-id-type="pmcid">PMC6775064</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jones</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Moulton</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Swift</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Molyneux</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Black</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Mason</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Oakley</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Mann</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Association between delays to patient admission from the emergency department and all-cause 30-day mortality</article-title>
          <source>Emerg Med J</source>
          <year>2022</year>
          <month>03</month>
          <day>18</day>
          <volume>39</volume>
          <issue>3</issue>
          <fpage>168</fpage>
          <lpage>173</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://emj.bmj.com/lookup/pmidlookup?view=long&#38;pmid=35042695"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/emermed-2021-211572</pub-id>
          <pub-id pub-id-type="medline">35042695</pub-id>
          <pub-id pub-id-type="pii">emermed-2021-211572</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Herrod</surname>
              <given-names>PJJ</given-names>
            </name>
            <name name-style="western">
              <surname>Adiamah</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Boyd-Carson</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Daliya</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>El-Sharkawy</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>Sarmah</surname>
              <given-names>PB</given-names>
            </name>
            <name name-style="western">
              <surname>Hossain</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Couch</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Sian</surname>
              <given-names>TS</given-names>
            </name>
            <name name-style="western">
              <surname>Wragg</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Andrew</surname>
              <given-names>DR</given-names>
            </name>
            <name name-style="western">
              <surname>Parsons</surname>
              <given-names>SL</given-names>
            </name>
            <name name-style="western">
              <surname>Lobo</surname>
              <given-names>DN</given-names>
            </name>
            <collab>WES-Pi Study Group on behalf of the East Midlands Surgical Academic Network (EMSAN)</collab>
            <collab>WES-Pi Study Group</collab>
          </person-group>
          <article-title>Winter cancellations of elective surgical procedures in the UK: a questionnaire survey of patients on the economic and psychological impact</article-title>
          <source>BMJ Open</source>
          <year>2019</year>
          <month>09</month>
          <day>13</day>
          <volume>9</volume>
          <issue>9</issue>
          <fpage>e028753</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmjopen.bmj.com/lookup/pmidlookup?view=long&#38;pmid=31519672"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/bmjopen-2018-028753</pub-id>
          <pub-id pub-id-type="medline">31519672</pub-id>
          <pub-id pub-id-type="pii">bmjopen-2018-028753</pub-id>
          <pub-id pub-id-type="pmcid">PMC6747666</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Holeman</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Cookson</surname>
              <given-names>TP</given-names>
            </name>
            <name name-style="western">
              <surname>Pagliari</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Digital technology for health sector governance in low and middle income countries: a scoping review</article-title>
          <source>J Glob Health</source>
          <year>2016</year>
          <month>12</month>
          <volume>6</volume>
          <issue>2</issue>
          <fpage>020408</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/27648255"/>
          </comment>
          <pub-id pub-id-type="doi">10.7189/jogh.06.020408</pub-id>
          <pub-id pub-id-type="medline">27648255</pub-id>
          <pub-id pub-id-type="pii">jogh-06-020408</pub-id>
          <pub-id pub-id-type="pmcid">PMC5017033</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Leesa-Nguansuk</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Warning over cyberattack threats</article-title>
          <source>Bangkok Post</source>
          <year>2021</year>
          <month>09</month>
          <day>08</day>
          <access-date>2024-09-28</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.bangkokpost.com/business/2178051/warning-over-cyberattack-threats">https://www.bangkokpost.com/business/2178051/warning-over-cyberattack-threats</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="web">
          <article-title>South Africa's Life Healthcare hit by cyber attack</article-title>
          <source>Reuters</source>
          <year>2020</year>
          <month>06</month>
          <day>09</day>
          <access-date>2024-09-28</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.reuters.com/article/us-life-healthcare-cyber-idUSKBN23G0MY">https://www.reuters.com/article/us-life-healthcare-cyber-idUSKBN23G0MY</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Moher</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Liberati</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Tetzlaff</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Altman</surname>
              <given-names>DG</given-names>
            </name>
            <collab>the PRISMA Group</collab>
          </person-group>
          <article-title>Reprint—Preferred Reporting Items for Systematic Reviews and Meta-Analyses: The PRISMA Statement</article-title>
          <source>Physical Therapy</source>
          <year>2009</year>
          <volume>89</volume>
          <issue>9</issue>
          <fpage>873</fpage>
          <lpage>880</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://academic.oup.com/ptj/article/89/9/873/2737590"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/ptj/89.9.873</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="web">
          <article-title>World Bank Country and Lending Groups</article-title>
          <source>The World Bank</source>
          <access-date>2024-09-28</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://datahelpdesk.worldbank.org/knowledgebase/articles/906519-world-bank-country-and-lending-groups.Accessed">https://datahelpdesk.worldbank.org/knowledgebase/articles/906519-world-bank-country-and-lending-groups.Accessed</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lencucha</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Neupane</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>The use, misuse and overuse of the 'low-income and middle-income countries' category</article-title>
          <source>BMJ Glob Health</source>
          <year>2022</year>
          <month>06</month>
          <day>07</day>
          <volume>7</volume>
          <issue>6</issue>
          <fpage>e009067</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://gh.bmj.com/lookup/pmidlookup?view=long&#38;pmid=35672116"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/bmjgh-2022-009067</pub-id>
          <pub-id pub-id-type="medline">35672116</pub-id>
          <pub-id pub-id-type="pii">bmjgh-2022-009067</pub-id>
          <pub-id pub-id-type="pmcid">PMC9185671</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>O'Brien</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Grass</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Martin</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Durkin</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Darzi</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Ghafur</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Developing a globally applicable cybersecurity framework for healthcare: a Delphi consensus study</article-title>
          <source>BMJ Innov</source>
          <year>2020</year>
          <month>11</month>
          <day>23</day>
          <volume>7</volume>
          <issue>1</issue>
          <fpage>199</fpage>
          <lpage>207</lpage>
          <pub-id pub-id-type="doi">10.1136/bmjinnov-2020-000572</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>O'Brien</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Martin</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Grass</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Durkin</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ghafur</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Safeguarding our Healthcare Systems: A Global Framework for Cybersecurity</article-title>
          <source>World Innovation Summit for Health</source>
          <year>2020</year>
          <access-date>2024-09-28</access-date>
          <publisher-loc>Doha, Qatar</publisher-loc>
          <publisher-name>World Innovation Summit for Health</publisher-name>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://2020.wish.org.qa/app/uploads/2020/09/WISH-2020_Forum-Reports_Cyber-Security-and-Healthcare-Systems_ENG.pdf">https://2020.wish.org.qa/app/uploads/2020/09/WISH-2020_Forum-Reports_Cyber-Security-and-Healthcare-Systems_ENG.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="web">
          <article-title>Implementation Know-how Briefs to Support Countries to Prioritize, Connect and Scale for a Digital-in-Health Future</article-title>
          <source>The World Bank</source>
          <access-date>2024-09-28</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://openknowledge.worldbank.org/handle/10986/40215">https://openknowledge.worldbank.org/handle/10986/40215</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ali Alferjanya</surname>
              <given-names>MAO</given-names>
            </name>
            <name name-style="western">
              <surname>Musaed Al-mwald</surname>
              <given-names>MN</given-names>
            </name>
            <name name-style="western">
              <surname>Alias</surname>
              <given-names>RB</given-names>
            </name>
          </person-group>
          <article-title>The effect of cyber security knowledge on employees' personal growth: An empirical study in private hospitals in libya and yemen</article-title>
          <source>Health Education and Health Promotion</source>
          <year>2022</year>
          <volume>10</volume>
          <issue>2</issue>
          <fpage>369</fpage>
          <lpage>375</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://hehp.modares.ac.ir/browse.php?a_id=61748&#38;sid=5&#38;slc_lang=en&#38;html=1"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ayatollahi</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Shagerdi</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Information security risk assessment in hospitals</article-title>
          <source>Open Med Inform J</source>
          <year>2017</year>
          <volume>11</volume>
          <fpage>37</fpage>
          <lpage>43</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/29204226"/>
          </comment>
          <pub-id pub-id-type="doi">10.2174/1874431101711010037</pub-id>
          <pub-id pub-id-type="medline">29204226</pub-id>
          <pub-id pub-id-type="pii">TOMINFOJ-11-37</pub-id>
          <pub-id pub-id-type="pmcid">PMC5688383</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chuma</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Ngoepe</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Security of electronic personal health information in a public hospital in South Africa</article-title>
          <source>Information Security Journal: A Global Perspective</source>
          <year>2021</year>
          <month>03</month>
          <day>01</day>
          <volume>31</volume>
          <issue>2</issue>
          <fpage>179</fpage>
          <lpage>195</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.tandfonline.com/doi/abs/10.1080/19393555.2021.1893410.doi:"/>
          </comment>
          <pub-id pub-id-type="doi">10.1080/19393555.2021.1893410</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Daraghmeh</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Brown</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>A big data maturity model for electronic health records in hospitals</article-title>
          <year>2021</year>
          <conf-name>International Conference on Information Technology (ICIT)</conf-name>
          <conf-date>July 14-15, 2021</conf-date>
          <conf-loc>Amman, Jordan</conf-loc>
          <pub-id pub-id-type="doi">10.1109/ICIT52682.2021.9491781</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dönmez</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Kitapçı</surname>
              <given-names>NŞ</given-names>
            </name>
            <name name-style="western">
              <surname>Kitapçı</surname>
              <given-names>OC</given-names>
            </name>
            <name name-style="western">
              <surname>Yay</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Aksu</surname>
              <given-names>PK</given-names>
            </name>
            <name name-style="western">
              <surname>Köksal</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Mumcu</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Readiness for health information technology is associated to information security in healthcare institutions</article-title>
          <source>Acta Inform Med</source>
          <year>2020</year>
          <month>12</month>
          <volume>28</volume>
          <issue>4</issue>
          <fpage>265</fpage>
          <lpage>271</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/33627928"/>
          </comment>
          <pub-id pub-id-type="doi">10.5455/aim.2020.28.265-271</pub-id>
          <pub-id pub-id-type="medline">33627928</pub-id>
          <pub-id pub-id-type="pii">AIM-28-265</pub-id>
          <pub-id pub-id-type="pmcid">PMC7879439</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hou</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Gao</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Nicholson</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Understanding organisational responses to regulative pressures in information security management: The case of a Chinese hospital</article-title>
          <source>Technological Forecasting and Social Change</source>
          <year>2018</year>
          <month>01</month>
          <volume>126</volume>
          <fpage>64</fpage>
          <lpage>75</lpage>
          <pub-id pub-id-type="doi">10.1016/j.techfore.2017.03.023</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jara</surname>
              <given-names>HLS</given-names>
            </name>
            <name name-style="western">
              <surname>Navarro</surname>
              <given-names>HBP</given-names>
            </name>
            <name name-style="western">
              <surname>Armas-Aguirre</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Iano</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Saotome</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Kemper</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Mendes de Seixas</surname>
              <given-names>AC</given-names>
            </name>
            <name name-style="western">
              <surname>Gomes de Oliveira</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity and Privacy Capabilities Model for Data Management Against Cyber-Attacks in the Health Sector</article-title>
          <source>Proceedings of the 6th Brazilian Technology Symposium (BTSym’20). BTSym 2020. Smart Innovation, Systems and Technologies, vol 233</source>
          <year>2021</year>
          <publisher-loc>Cham, Switzerland</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>359</fpage>
          <lpage>367</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kandabongee Yeng</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>BM</given-names>
            </name>
            <name name-style="western">
              <surname>Stolt Pedersen</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Assessing cyber-security compliance level in paperless hospitals: An ethnographic approach</article-title>
          <year>2023</year>
          <conf-name>9th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)</conf-name>
          <conf-date>November 29-December 1, 2022</conf-date>
          <conf-loc>Milan, Italy</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ieeexplore.ieee.org/document/10061936"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/iotsms58070.2022.10061936</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Khac Hai</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Lawpoolsri</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Jittamala</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Thi Thu Huong</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Kaewkungwal</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Practices in security and confidentiality of HIV/AIDS patients' information: A national survey among staff at HIV outpatient clinics in Vietnam</article-title>
          <source>PLoS One</source>
          <year>2017</year>
          <volume>12</volume>
          <issue>11</issue>
          <fpage>e0188160</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dx.plos.org/10.1371/journal.pone.0188160"/>
          </comment>
          <pub-id pub-id-type="doi">10.1371/journal.pone.0188160</pub-id>
          <pub-id pub-id-type="medline">29136017</pub-id>
          <pub-id pub-id-type="pii">PONE-D-17-19693</pub-id>
          <pub-id pub-id-type="pmcid">PMC5685590</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Maeko</surname>
              <given-names>ME</given-names>
            </name>
            <name name-style="western">
              <surname>Van Der Haar</surname>
              <given-names>DT</given-names>
            </name>
          </person-group>
          <article-title>A framework for user awareness and acceptance of smart card and fingerprint-based access control to medical information systems in South Africa</article-title>
          <year>2018</year>
          <conf-name>IST-Africa Week Conference (IST-Africa)</conf-name>
          <conf-date>May 9-11, 2018</conf-date>
          <conf-loc>Gaborone, Botswana</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ieeexplore.ieee.org/document/8417340"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Meng</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Choo</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Furnell</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Vasilakos</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Probst</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Towards bayesian-based trust management for insider attacks in healthcare software-defined networks</article-title>
          <source>T-NSM</source>
          <year>2018</year>
          <fpage>761</fpage>
          <lpage>773</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ieeexplore.ieee.org/document/8315151.doi:"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/tnsm.2018.2815280</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nistrina</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Bin Bon</surname>
              <given-names>HAT</given-names>
            </name>
          </person-group>
          <article-title>Information security for hospital information system using COBIT 5 framework</article-title>
          <year>2019</year>
          <conf-name>International Conference on Industrial Engineering and Operations Management</conf-name>
          <conf-date>March 5-7, 2019</conf-date>
          <conf-loc>Bangkok, Thailand</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://ieomsociety.org/ieom2019/papers/767.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Quimiz-Moreira</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Zambrano-Romero</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Moreira-Zambrano</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Mendoza-Zambrano</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Cedeño-Palma</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Botto-Tobar</surname>
              <given-names>MS</given-names>
            </name>
            <name name-style="western">
              <surname>Gómez</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Rosero Miranda</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Díaz Cadena</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Montes León</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Luna-Encalada</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity mechanisms for information security in patients of public hospitals in Ecuador</article-title>
          <source>Trends in Artificial Intelligence and Computer Engineering. ICAETT 2021. Lecture Notes in Networks and Systems, vol 407</source>
          <year>2022</year>
          <publisher-loc>Cham, Switzerland</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>211</fpage>
          <lpage>224</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rijo</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Martinho</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Aparecida Oliveira</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Alves</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Silveira Nogueira Reis</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Santos-Pereira</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Correia</surname>
              <given-names>ME</given-names>
            </name>
            <name name-style="western">
              <surname>Antunes</surname>
              <given-names>LF</given-names>
            </name>
            <name name-style="western">
              <surname>Cruz-Correia</surname>
              <given-names>RJ</given-names>
            </name>
          </person-group>
          <article-title>Profiling IT security and interoperability in brazilian health organisations from a business perspective</article-title>
          <source>International Journal of E-Health and Medical Communications (IJEHMC)</source>
          <year>2020</year>
          <volume>11</volume>
          <issue>2</issue>
          <fpage>96</fpage>
          <lpage>114</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.igi-global.com/gateway/article/246080"/>
          </comment>
          <pub-id pub-id-type="doi">10.4018/IJEHMC.2020040106</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Serrano Rojas</surname>
              <given-names>AJ</given-names>
            </name>
            <name name-style="western">
              <surname>Paniura Valencia</surname>
              <given-names>EF</given-names>
            </name>
            <name name-style="western">
              <surname>Armas-Aguirre</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Madrid Molina</surname>
              <given-names>JM</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity maturity model for the protection and privacy of personal health data</article-title>
          <year>2022</year>
          <conf-name>IEEE 2nd International Conference on Advanced Learning Technologies on Education &#38; Research (ICALTER)</conf-name>
          <conf-date>November 16-19, 2022</conf-date>
          <conf-loc>Lima, Peru</conf-loc>
          <pub-id pub-id-type="doi">10.1109/ICALTER57193.2022.9964729</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sanchez Rubio</surname>
              <given-names>CJ</given-names>
            </name>
            <name name-style="western">
              <surname>Villacorta</surname>
              <given-names>GG</given-names>
            </name>
            <name name-style="western">
              <surname>Choque</surname>
              <given-names>JO</given-names>
            </name>
            <name name-style="western">
              <surname>Armas-Aguirre</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Personal health data: A security capabilities model to prevent data leakage in big data environments</article-title>
          <year>2022</year>
          <conf-name>17th Iberian Conference on Information Systems and Technologies (CISTI)</conf-name>
          <conf-date>June 22-25, 2022</conf-date>
          <conf-loc>Madrid, Spain</conf-loc>
          <pub-id pub-id-type="doi">10.23919/CISTI54924.2022.9820432</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sarbaz</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Manouchehri Monazah</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Banaye Yazdipour</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kimiafar</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Views of health information management staff on non-technical security management factors, Mashhad, Iran</article-title>
          <source>Stud Health Technol Inform</source>
          <year>2019</year>
          <volume>258</volume>
          <fpage>65</fpage>
          <lpage>69</lpage>
          <pub-id pub-id-type="medline">30942716</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kencana Sari</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Wuri Handayani</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Nizar Hidayanto</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Wiranda Busro</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>How information security management systems influence the healthcare professionals’ security behavior in a public hospital in Indonesia</article-title>
          <source>IJIKM</source>
          <year>2023</year>
          <volume>18</volume>
          <fpage>583</fpage>
          <lpage>607</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.28945/5185"/>
          </comment>
          <pub-id pub-id-type="doi">10.28945/5185</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Singh</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Singh</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Cyber-security knowledge and practice of nurses in private hospitals in northern Durban, Kwazulu-Natal</article-title>
          <source>Journal of Theoretical and Applied Information Technology</source>
          <year>2022</year>
          <volume>100</volume>
          <issue>1</issue>
          <fpage>246</fpage>
          <lpage>247</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jatit.org/volumes/Vol100No1/21Vol100No1.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Upadhyaya</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Upadhyay</surname>
              <given-names>SK</given-names>
            </name>
            <name name-style="western">
              <surname>Subedi</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Subedi</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Gaire</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Revolutionizing healthcare systems of a developing country using blockchain</article-title>
          <year>2019</year>
          <conf-name>IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)</conf-name>
          <conf-date>December 13-15, 2018</conf-date>
          <conf-loc>Madurai, India</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ieeexplore.ieee.org/document/8782417"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/ICCIC.2018.8782417</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Alhuwail</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Al-Jafar</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Abdulsalam</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>AlDuaij</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Information security awareness and behaviors of health care professionals at public health care facilities</article-title>
          <source>Appl Clin Inform</source>
          <year>2021</year>
          <month>08</month>
          <day>29</day>
          <volume>12</volume>
          <issue>4</issue>
          <fpage>924</fpage>
          <lpage>932</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.thieme-connect.com/DOI/DOI?10.1055/s-0041-1735527"/>
          </comment>
          <pub-id pub-id-type="doi">10.1055/s-0041-1735527</pub-id>
          <pub-id pub-id-type="medline">34587638</pub-id>
          <pub-id pub-id-type="pmcid">PMC8481013</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nifakos</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Chandramouli</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Nikolaou</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Papachristou</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Koch</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Panaousis</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Bonacina</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Influence of human factors on cyber security within healthcare organisations: a systematic review</article-title>
          <source>Sensors (Basel)</source>
          <year>2021</year>
          <month>07</month>
          <day>28</day>
          <volume>21</volume>
          <issue>15</issue>
          <fpage>A</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mdpi.com/resolver?pii=s21155119"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/s21155119</pub-id>
          <pub-id pub-id-type="medline">34372354</pub-id>
          <pub-id pub-id-type="pii">s21155119</pub-id>
          <pub-id pub-id-type="pmcid">PMC8348467</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Arain</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Tarraf</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Ahmad</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Assessing staff awareness and effectiveness of educational training on IT security and privacy in a large healthcare organization</article-title>
          <source>J Multidiscip Healthc</source>
          <year>2019</year>
          <volume>12</volume>
          <fpage>73</fpage>
          <lpage>81</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/30666123"/>
          </comment>
          <pub-id pub-id-type="doi">10.2147/JMDH.S183275</pub-id>
          <pub-id pub-id-type="medline">30666123</pub-id>
          <pub-id pub-id-type="pii">jmdh-12-073</pub-id>
          <pub-id pub-id-type="pmcid">PMC6331063</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="web">
          <article-title>What Good Looks Like framework</article-title>
          <source>NHS England</source>
          <year>2021</year>
          <month>10</month>
          <day>4</day>
          <access-date>2024-09-28</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://transform.england.nhs.uk/digitise-connect-transform/what-good-looks-like/what-good-looks-like-publication/">https://transform.england.nhs.uk/digitise-connect-transform/what-good-looks-like/what-good-looks-like-publication/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>He</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Aliyu</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Evans</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Luo</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Health care cybersecurity challenges and solutions under the climate of COVID-19: scoping review</article-title>
          <source>J Med Internet Res</source>
          <year>2021</year>
          <month>04</month>
          <day>20</day>
          <volume>23</volume>
          <issue>4</issue>
          <fpage>e21747</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2021/4/e21747/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/21747</pub-id>
          <pub-id pub-id-type="medline">33764885</pub-id>
          <pub-id pub-id-type="pii">v23i4e21747</pub-id>
          <pub-id pub-id-type="pmcid">PMC8059789</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Feeley</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Crowley</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Feeley</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Roopnarinesingh</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Geraghty</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Cosgrave</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Sheehan</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Merghani</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Under viral attack: An orthopaedic response to challenges faced by regional referral centres during a national cyber-attack</article-title>
          <source>Surgeon</source>
          <year>2022</year>
          <month>10</month>
          <volume>20</volume>
          <issue>5</issue>
          <fpage>334</fpage>
          <lpage>338</lpage>
          <pub-id pub-id-type="doi">10.1016/j.surge.2021.09.007</pub-id>
          <pub-id pub-id-type="medline">34782238</pub-id>
          <pub-id pub-id-type="pii">S1479-666X(21)00164-5</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Coventry</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Branley-Bell</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Sillence</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Magalini</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Mari</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Magkanaraki</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Anastasopoulou</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Cyber-Risk in Healthcare: Exploring Facilitators and Barriers to Secure Behaviour</article-title>
          <year>2020</year>
          <conf-name>HCI for Cybersecurity, Privacy and Trust: Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference</conf-name>
          <conf-date>July 19-24, 2020</conf-date>
          <conf-loc>Copenhagen, Denmark</conf-loc>
          <pub-id pub-id-type="doi">10.1007/978-3-030-50309-3_8</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Branley-Bell</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Coventry</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Sillence</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Promoting cybersecurity culture change in healthcare</article-title>
          <source>Northumbria University Research Portal</source>
          <year>2021</year>
          <access-date>2024-09-28</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://researchportal.northumbria.ac.uk/ws/portalfiles/portal/54632089/PETRA_Branley_Bell_et_al_2021_.pdf">https://researchportal.northumbria.ac.uk/ws/portalfiles/portal/54632089/PETRA_Branley_Bell_et_al_2021_.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wilner</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Luce</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Ouellet</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Williams</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Costa</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>From public health to cyber hygiene: Cybersecurity and Canada’s healthcare sector</article-title>
          <source>International Journal</source>
          <year>2022</year>
          <month>02</month>
          <day>21</day>
          <volume>76</volume>
          <issue>4</issue>
          <fpage>522</fpage>
          <lpage>543</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://journals.sagepub.com/doi/full/10.1177/00207020211067946.doi:"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/00207020211067946</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pham</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Rajić</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Greig</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Sargeant</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Papadopoulos</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>McEwen</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>A scoping review of scoping reviews: advancing the approach and enhancing the consistency</article-title>
          <source>Res Synth Methods</source>
          <year>2014</year>
          <month>12</month>
          <volume>5</volume>
          <issue>4</issue>
          <fpage>371</fpage>
          <lpage>85</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/26052958"/>
          </comment>
          <pub-id pub-id-type="doi">10.1002/jrsm.1123</pub-id>
          <pub-id pub-id-type="medline">26052958</pub-id>
          <pub-id pub-id-type="pmcid">PMC4491356</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Klaic</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kapp</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Hudson</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Chapman</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Denehy</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Story</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Francis</surname>
              <given-names>JJ</given-names>
            </name>
          </person-group>
          <article-title>Implementability of healthcare interventions: an overview of reviews and development of a conceptual framework</article-title>
          <source>Implement Sci</source>
          <year>2022</year>
          <month>01</month>
          <day>27</day>
          <volume>17</volume>
          <issue>1</issue>
          <fpage>10</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://implementationscience.biomedcentral.com/articles/10.1186/s13012-021-01171-7"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s13012-021-01171-7</pub-id>
          <pub-id pub-id-type="medline">35086538</pub-id>
          <pub-id pub-id-type="pii">10.1186/s13012-021-01171-7</pub-id>
          <pub-id pub-id-type="pmcid">PMC8793098</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
