132
Lin, C., Abdul, S. S., Clinciu, D. L., Scholl, J., Jin, X., Lu, H., … Li, Y. (2014).
Empowering village doctors and enhancing rural healthcare using cloud security
in a rural area of mainland China. Computer Methods and Programs in
Biomedicine, 113(2), 585-592. doi:10.1016/j.cmpb.2013.10.005
Liu, V., Musen, M. A., & Chou, T. (2015). Data breaches of protected health
information in the United States. JAMA, 313(14), 1471-1473.
doi:10.1001/jama.2015.2252
Lloyd, T. (2015). Access management: the overlooked but critical enabler. Learned
Publishing, 28(4), 292-298. doi:10.1087/20150408
Luna, R., Rhine, E., Myhra, M., Sullivan, R., & Kruse, C. S. (2016). Cyber threats to
health information systems: A systematic review. Technology and
Healthcare, 24(1), 1-9. doi:10.3233/thc151102
Lusinga, S., & Kyobe, M. (2017). Testing a typology of mobile phone victimisation
using cluster analysis. The Electronic Journal of Information Systems in
Developing Countries, 78(1), 1-36. doi:10.1002/j.1681-4835.2017.tb00574.x
Madarkar, J., Anuradha, D., & Waghmare, S. (2014). Security issues of patient health
records in e Hospital management in cloud. International Journal of Emerging
Research in Management & Technology, 3(6), 46-51. Retrieved from
http://www.ermt.net/docs/papers/Volume_3/6_June2014/V3N5 199.pdf
Madni, S. H., Latiff, M. S., Coulibaly, Y., & Abdulhamid, S. M. (2016). Resource
scheduling for infrastructure as a service (IaaS) in cloud security: Challenges and