Das, S., & Mukhopadhyay, A. (2012). Security and Privacy Challenges in Telemedicine. CSI Communications.
Eissazadeh, A. A. (2015). Ranking of key success factors in implementing the Information Security Management System of the General Administration of Ports and Maritime Affairs International Conference on New Research in Industrial Management and Engineering, Guilan Province. [In Persian]
Guillen, E., Estupiñan, P., Lemus, C., & Ramirez, L. (2010). Analysis of security requirements in telemedicine networks. In Proceedings of annual international conference of telecommunications engineering, Colombia.
Kahooei, M., & Abbasi, Z. (2015). Prioritizing factors affecting the security of electronic health information in medical centers. Information Management, 2(12), 162-170. [In Persian]
Kahouei, M., & Abbasi, Z. ( 2015). The Prioritization of Effective Factors on Electronic Health Information Security in Medical Centers. Health Inf Manage, 12(2), 170.
Mehraeen, E., Ayatollahi, H., & Ahmadi, M. (2014). A Study of Information Security in Hospital Information Systems. Health Information Management, 10(6), 779-788. [In Persian]
Parks, C., Chu, H., Xu, L., & Adams, D. A. (2011). Understanding the drivers and outcomes of healthcare organizational privacy responses Proceedings of the Thirty Second International Conference on Information Systems, Shanghai.
Sheikh Abu Masoudi, Ruhollah, Kouhi Habibi, S., Ataei, M., & Ismaili, N. (2015). Evaluation of Information Management Systems of Isfahan University of Medical Sciences Using the Standard ISO/IEC 27001. Information Security Management, 3(12), 306-316. [In Persian]
Singh, A. N., Gupta, M. P., & Ojha, A. (2014). Identifying factors of organizational information security management. Journal of Enterprise Information Management, 27(5), 644-667.
Siponen, A., & Vance, B. (2014). Neutralization: new insights into the problem of employee information systems security policy violations. MIS Quarterly, 34(3), 487–502.
Tajfar, A. (2014). Ranking the barriers to implementing information security management systems and assessing the level of exploration management readiness [Master's thesis, Tabriz.
Tallon, P. P., & Pinsonnault, A. (2011). Competing perspectives on the link between strategic information technology alignment and organizational agility: insights from a mediation model. MIS Quarterly, 35(2), 463-486.
Tseng, S. M. (2008). The effects of Control of information security. on knowledge management systems. Expert Systems with Applications(35), 150–160.