1.Mehraeen E, Ayatollahi H, Ahmadi M. A study on information security in hospital information systems. Journal of Health Information Management 2014; 10(6): 788.
2. Mehraeen E, Ahmadi M, Shajarat M, Khoshgam M. Assessment of hospital information system in selected hospitals in tehran. Payavard Salamat 2013; 6(6):458-466.
3. Zain JM. Threats and challenges in securing telemedicine system. Int J Med Inform 2006; 15(2): 1-7.
4. Hein MA. Telemedicine: an important force in the transformation of healthcare. Int J Med Inform 2009; 9(2): 1-26.
5. Zhang GH, Poon CY, Li Y, Zhang YT. A biometric method to secure telemedicine systems. In:Proceedings of annual international conference of the IEEE EMBS Minneapolis; Minnesota USA; 2009: 2-6.
6. Wozak F, Schabetsberger T, Ammmenwerth E. End-to-end security in telemedical networks – A practical guideline. Int J Med Inform 2007; 76(1): 484-90.
7. Telemedicine Global. [Online]. [Accessed 2012 Sep 18]. Available from: http: // teledoctornet. lamula.pe/2009/11/03/telemedicine-in-healthcare-2-the-legal-and-ethical-aspects-of-using-new technology /unmedicoaventurero 2010.
8. Guillen E, Estupiñan P, Lemus C, Ramirez L. Analysis of security requirements in telemedicine networks. In:Proceedings of annual international conference of telecommunications engineering, Colombia: 2010.
9. Jack C, Mars M. Telemedicine a need for ethical and legal guidelines in South Africa. SA Fam Pract 2008; 50(2): 60-60d.
10. Broadband & Telemedicine. [Online]. 2011 [Accessed 2013 July 22]. Available from: http://www.nyls.edu/user_files/1/3/4/30/83/Broadband%20%20Telemedicine%20%20Policy%20Reccs.pdf.
11. Telemedicine, Telehealth, and Health Information Technology. [Online]. 2006 [Accessed 2013 July 20]. Available from: http://www.americantelemed.org/docs/default-source/policy/telemedicine-telehealth-and-health-information-technology.pdf?sfvrsn=8.
12. Asadi H, Akhlaghi H. Ethical and legal aspects of telemedicine and telecare tehran. In: proceedings of 1st international conference on information and knowledge technology, Iran, Tehran 2002.
13. Healthcare information and management systems society (HIMSS). Information systems security.[Online]. 2011 [Accessed 2011 Apr 14].Available from:http://www.himss.org/content/files/applicationsecurityv2.3.pdf.
15. Garg V, Brewer J. Telemedicine Security: A Systematic Review. J Diabetes Sci Technol 2011; 5(3): 768-77.
16. Rezgui Y, Marks A. Informatio security awareness in higher education: An exploratory study. Com and Sec 2008;27(7-8): 243.
17. Rialle V, Lamy JB, Noury N, Bajolle L. Telemonitoring of patients at home: a software agent approach. Com Meth & Prog Biomed 2003;72(1): 257-68.
18. Olanrewaju RF, Ali NB, Khalifa O, Manaf AA. ICT in Telemedicine: conquering privacy and security issues in health care services. electronic Journal of Computer Science and Information Technology (eJCSIT) 2013; 4(1): 19-24.
19. Harnett H. Telemedicine systems and telecommunications. J Telemed and Telecare 2006; 12: 1-12.
21. Pendergrass JC, Heart K, Ranganathan C,Venkatakrishnan VN. A threat table based approach to telemedicine security. In: Transactions of the International Conference on Health Information Technology Advancement; 2013: Paper 38.
22. Garg V. Security concerns in telecare and telemedicine, [M.Sc. Dissertation]. Purdue University, Graduate School. 2009; 14-20.