<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Protection of Information in Telecommunication Medical Systems based on a Risk-Oriented Approach</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Svitlana Shevchenko</string-name>
          <email>s.shevchenko@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yuliia Zhdanova</string-name>
          <email>y.zhdanova@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yurii Dreis</string-name>
          <email>dreisyuri@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Roman Kyrychok</string-name>
          <email>r.kyrychok@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Diana Tsyrkaniuk</string-name>
          <email>d.tsyrkaniuk.asp@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., Kyiv, 04053</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Polissia National University</institution>
          ,
          <addr-line>7 Staryi ave., Zhytomyr, 10008</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>158</fpage>
      <lpage>167</lpage>
      <abstract>
        <p>The changes brought by informatization to society have a qualitative effect on the process of modernization of medical care. At the same time, the digitization of big data in healthcare creates numerous risks from the point of view of ensuring the confidentiality, integrity, and availability of information. Inadequate security is due to both objective and subjective reasons. Among them: are the lack of a sufficient number of qualified specialists in the field of information protection; budget restrictions; software conflict; lack of training in information security rules and skills of medical personnel; non-compliance with traditional cyber security practices; legal and ethical issues related to patient data. Determining the minimum and maximum possible degrees of risk of security breaches in information and telecommunication medical systems is the key to ensuring the protection of medical information. This confirms the significance and timeliness of this research, which is based on a risk-oriented approach. The analysis of the scientific literature, having allowed the designation of the components, is how the information-telecommunication system and the links between them are put together. For each asset, the source of the threat, the threat itself, and the variants of reaction to it are identified. The following violations are most common: theft of the patient's medical information (confidentiality threats); modification of the patient's medical information (threats to integrity); failure of individual components of the medical system (availability threat). A graphic and quantitative approach to the assessment of information security risks and methods and means of processing these risks are proposed. This study can serve cyber security specialists for modeling information protection in medical systems and be used in the educational process of students of 125 Cyber Security specialties.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Information risks</kwd>
        <kwd>risk-oriented approach</kwd>
        <kwd>risk management</kwd>
        <kwd>information-telecommunication medical system</kwd>
        <kwd>telemedicine</kwd>
        <kwd>threats</kwd>
        <kwd>vulnerabilities</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Thanks to automation and programming,
artificial intelligence, and machine learning, the
modern medical world has received great
opportunities to effectively interact with patients
in making clinical decisions in both diagnosis and
treatment. However, at the same time, there is an
increase in cases of information security
violations in such systems [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1–4</xref>
        ]. The main part of
the medical information processed in the medical
information system, in the process of
implementing telemedicine activities, is the
personal data of patients. This category of
information is the most sensitive and vulnerable to
information security threats. Information about
the health status of patients is the most valuable
information, in the processing of which some
individuals are interested, and can use it for
criminal purposes [
        <xref ref-type="bibr" rid="ref10 ref11 ref5 ref6 ref7 ref8 ref9">5–11</xref>
        ]. First of all, attackers
choose small medical institutions, seeing that they
have an insufficient level of protection for
confidential information. Healthcare breach
report for the 1st and 2nd half of 2022 [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ] in the
analysis of information security in healthcare
determines that 80.3% of violations are hacker
attacks, and 14.2% are unauthorized access.
Although the number of incidents did not
increase, more patients became victims of
breaches: in the second half of 2022, 28.5 million
medical records were breached and accessed,
which is 35% more than in previous years.
      </p>
      <p>
        Inadequate security is caused by several
reasons [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref14 ref15 ref16 ref17 ref18 ref5 ref6 ref7 ref8 ref9">5–18</xref>
        ]:
• Lack of a sufficient number of qualified
specialists in the field of information
protection.
• Budget limitations (only 4–7% of
ІТbudget of a medical establishment is
allocated to cyber security).
• Conflict of new software and hardware
devices and security software systems.
• Non-compliance with traditional cyber
security practices.
• Lack of training in information security
rules and skills of medical personnel.
• Legal and ethical issues related to patient
data (confidentiality is one of the factors
that makes it impossible to access the
patient database without their consent. It
prevents the machine collection of
information to create a suitable base for
research [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]).
      </p>
      <p>It is obvious that an organization’s security
policy is a complex, routine process, but the ways
to overcome security controls are becoming
increasingly filigree, which urges scientists and
practitioners to improve and create the most
sustainable countermeasures.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Medical Information Systems</title>
      <p>
        With the birth of the Internet in the 1990s, the
possibilities of using personal computers and
mobile phones determined the rapid digitalization
in the medical field. A large database of
healthrelated data needs to be analyzed, stored, and
processed in real-time to make effective urgent
decisions, which is not possible without powerful
information technology. Modern medical
information systems are considered in the
integration of two directions:
• Information systems are used to store and
provide accessible data about services
made available by healthcare organizations
and other health-related organizations.
• Information systems store and provide
access to population data that are important
for surveillance, program evaluation,
policy development, and public health
priority setting [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
      </p>
      <p>Examples of Health Information Systems:
Electronic Medical Records (EMR); Electronic
Health Records (EHR); Practice Management
Software; Master Patient Index (MPI); Patient
Portals; Remote Patient Monitoring (RPM);
Clinical Decision Support (CDS); Telemedicine.</p>
      <p>
        There is no stable defined concept of
“telemedicine”. We will take as a basis the
definition presented by the World Health
Organization, Telemedicine—the provision of
medical services at a distance using information
and telecommunication technologies by all
medical workers to exchange reliable information
for the diagnosis, treatment, and prevention of
diseases and injuries, research and assessment, as
well as for the learning process of health care
workers, which takes place to improve the health
of individuals and communities [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. “Tele” is a
Greek word meaning distance, “mederi” is a Latin
word meaning to heal.
      </p>
      <p>
        The history of telemedicine began in 1964 at
the University of Nebraska School of Medicine
using a closed television system and continued to
be used in psychology [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. This is the first case
of health professionals using the telephone to send
and receive medical documents across long
distances. The development of telemedicine in the
world is presented in studies [
        <xref ref-type="bibr" rid="ref22 ref23 ref24 ref25">22–25</xref>
        ].
      </p>
      <p>
        The analysis of literary sources shows that
telemedicine has evolved through different
research stages, starting from telemedicine as a
simple communication environment that
complements traditional services, to automation
technologies and decision-making tools that
expand the scope and range of medical
services [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ].
      </p>
      <p>
        In Ukraine, the direction of telemedicine
started in 1935 with the organization of
teleelectrocardiography by the doctor and
scientist Maryan Franke in the city of Lviv.
However, stagnation had been observed for a long
time, though point research and clinical centers
were formed. In 2007, the State Clinical Scientific
and Practical Center of Telemedicine of the
Ministry of Health of Ukraine was established—
the only specialized healthcare institution created
for the implementation and development of
telemedicine in Ukraine. The sectoral normative
document on the use of telemedicine in Ukraine is
the Order of the Ministry of Health of March 26,
2010 No. 261 “On the implementation of
telemedicine in health care institutions” alongside
the methodological recommendations [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ].
      </p>
      <p>
        At the legislative level, telemedicine was
approved in 2015 by the Order of the Ministry of
Health of October 19, 2015 No. 681 [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. It defines
telemedicine as a complex of actions,
technologies, and measures used in the provision
of medical care, using means of remote
communication in the form of the exchange of
electronic messages. In 2016, the eHealth
information and telecommunication system for
automating the record keeping of medical services
and management of medical information and the
Helsi medical service were created to provide
patients with access to their medical information
and the choice of medical services (medical
facilities and doctors).
      </p>
      <p>
        Analysis of the literature [
        <xref ref-type="bibr" rid="ref11 ref13 ref14 ref16 ref17 ref27 ref28 ref29 ref30 ref31 ref32 ref33">11, 13, 14, 16, 17,
27–34</xref>
        ] made it possible to distinguish six main
components of the information and
telecommunication medical system (Fig. 1):
1. Patient portal (sub-modules containing
personal data, statements, referrals,
statuses, and other medical information of
the patient, and the patient can view it).
2. Laboratory-diagnostic information system
(Ambulatory information system, Clinical
information system, Laboratory
information system, Radiological
information system).
1. Pharmaceutical information system (related
to processing, distribution, and monitoring
of drug safety).
2. Providers of medical services (government,
insurance companies, manufacturers of
medical equipment, health care managers,
research organizations).
3. Database (management, exchange, search,
analytical reports, etc.).
4. Service personnel of the medical system
(information protection specialists,
programmers, cloud storage services).
      </p>
      <p>Informatin-telecommunication</p>
      <p>medical system
Patient portal</p>
      <p>Laboratorydiagnostic ІS</p>
      <p>Pharmaceutical
ІS</p>
      <p>Providers of
medical
services</p>
      <p>Database
Service
personnel</p>
      <p>One of the goals of the telemedicine system is
to preserve medical secrecy and confidentiality,
the integrity of medical information about the
patient’s health and statistical data, and the
possibility of access to information at any time by
authorized personnel. In other words, the priority
task at the state level is to ensure the protection of
information in telecommunication medical
systems.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Model of Information Protection in</title>
    </sec>
    <sec id="sec-4">
      <title>Information and Telecommunication Medical Systems</title>
      <p>To build a protection system in information
and telecommunication medical systems, it is
necessary to identify threats and vulnerabilities of
system elements, analyze and process information
risks with the aim of managing them.</p>
      <p>Information security risk is a numerical
(verbal) function that describes the probability of
the implementation of IS threats and the amount
of damage from their implementation due to the
use of asset vulnerabilities by these threats in
order to harm the organization [35]. In this case,
material damage to the patient or reputational
damage is possible. IS risk management is
understood as a continuous cyclic process that
includes the following stages: risk identification
(collection of information on assets, sources of
threats, classification of threats and
vulnerabilities; ranking of risks); risk analysis
(qualitative and quantitative approach to risk
assessment); risk assessment (the process of
comparing the quantified risk with given risk
criteria to determine the significance of IS risk);
risk processing and acceptance. Fig. 2 presents the
IS risk management process algorithm [36].</p>
      <p>The effectiveness of IS risk management
depends significantly on the assessment of these
risks. A qualitative and quantitative approach to
establishing IS risk values is distinguished. A
qualitative approach can be carried out using a
SWOT analysis [37], a quantitative result—a
statistical method (if a sufficiently large amount
of homogeneous data is given), the Monte Carlo
method [38], the fuzzy set method [39], an expert
method, and others. After a specific IS risk is
identified and assessed, a decision must be made
regarding its treatment—the selection and
implementation of risk minimization measures.
Information security risk management includes
reducing, accepting (retaining), preventing, or
transferring IS risk. This approach to creating an
organization’s information security system is
called risk-oriented.</p>
    </sec>
    <sec id="sec-5">
      <title>4. Properties of Protected Information</title>
      <p>Information systems are used in virtually all
activities inherent in the field of medical services.
This is the storage, access, processing, sharing,
and transfer of health information; support in case
of providing medical assistance to the patient;
consultation and training of medical personnel;
management of the healthcare system and
business processes in it. This information is not
static, it changes, and its quantity grows, this
information environment needs protection from
the point of view of ensuring confidentiality,
integrity, and availability in real-time.</p>
      <p>
        Confidentiality is defined as the property of
information such that it cannot be accessed by
unauthorized users and/or processes. Medical
Privacy: All medical records are subject to strict
laws governing user access privileges. According
to the law, security, and authentication systems
are required for those who process and store
medical records [40]. Violation of privacy is
called theft or disclosure of information. The most
typical ways of implementing this threat in
distributed systems are listening to
communication channels ("sniffing") and
changing the authorized entity. Violators can also
attack the end nodes of the system - file servers,
database servers, as well as user workstations
[
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>
        Information integrity is the property that
cannot be modified by users and/or processes that
do not have the appropriate authority to do so. The
integrity of the medical documentation implies the
accuracy of the complete medical record. This
category covers information management, patient
identification, verification of authorship, making
changes and corrections to records, and checking
records for documentation validity during
reimbursement claims [41]. A violation of this
category is called message falsification. It can be
implemented as a result of equipment failures and
failures, as well as due to careless or intentional
actions of users, including due to the action of
computer viruses and other malicious software.
Purposeful falsification in medical systems is not
so likely, but it can have very significant
consequences (for example, possible falsification
of information about a person's health, changing
the prescription or dosage of drugs) [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>
        Availability of information is a property that
consists of the possibility of its use according to
the requirements of a user who has the appropriate
authority. Availability of medical documentation
is the property that electronic medical information
is available and suitable for use at the request of
an authorized person [42]. Denial of service (DoS)
is very common in distributed information
systems and can be implemented through DoS
attacks aimed both at end nodes in the
telecommunications system and at intermediate
nodes (routers). Also, a violation of the
availability of information can occur due to
equipment failures and malfunctions, which is
especially relevant for remote access systems, as
well as due to damage to communication channels
[
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>
        A breach of information security in medical
systems can cause not only material and
reputational damage to the patient. But also to the
deterioration of his health or even death in the case
of the use of medical products of the Internet of
Things. It should also be noted that the number of
attacks on groups of doctors increased from 2% of
the total number of violations in the first half of
2021 to 12% in the first half of 2022 [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
    </sec>
    <sec id="sec-6">
      <title>5. Identification of Threats and</title>
    </sec>
    <sec id="sec-7">
      <title>Implementation in the Information</title>
      <p>and Telecommunication Medical</p>
    </sec>
    <sec id="sec-8">
      <title>System</title>
      <p>The functioning of the information and
telecommunication medical system is carried out
through the following processes:
• Information.</p>
      <p>• Telecommunication.
• Processes of implementing operations
using algorithms.</p>
      <p>
        Fig. 3 presents a typical diagram of the
network of the information and
telecommunication medical system and shows the
flow of information through the various
components of the system. The source of
information security threats in this medical system
can be changed in the external environment
(natural disasters and accidents, earthquakes,
floods, fires, and other random events that are
unlikely), failures and failures of software and
hardware equipment, the consequences of errors
during the design and development of the system,
as well as the actions of medical workers, service
personnel, medical service as well as the actions
of medical professionals, service personnel,
medical service providers, patients, and external
offenders [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>The main threats to information security in this
medical system include:
• Failure of software and hardware (threat of
availability).
• Theft, interception, leakage of information
(threat to privacy).
• Abuse of privileged access (threat to
integrity and confidentiality).
• Introduction of malicious software (threat
to confidentiality, integrity, availability).
• Insider activity (threat to privacy).</p>
      <p>Identification of threats and assets affected by
these threats is presented in Fig. 4.</p>
      <p>
        It is especially necessary to outline the problem
of big data security in information and
telecommunication medical systems. The storage
of the patient’s personalized medical information
is complicated by its large volume, especially the
graphic type, and its heterogeneous structure. In
the study [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], the authors propose a life cycle of
big data security in health care: the data collection
stage, the data transformation stage, the data
modeling stage, and the knowledge creation stage.
At each stage, an analysis of threats and attacks is
carried out, as well as countermeasures and
possible methods are proposed in the context of
privacy and integrity of big data in the field of
healthcare: implementation of authentication,
encryption, and access control.
      </p>
      <p>HD IP camera
Videocamera</p>
      <p>Database
ПК
PC of a
patient</p>
      <p>TherapeuticDiagnostic IC</p>
      <p>Pharmaceutical
IC
ІС of providers
of medical
services
ІС of service
personnel</p>
      <sec id="sec-8-1">
        <title>Type of identification Violation</title>
      </sec>
      <sec id="sec-8-2">
        <title>Violation of privacy</title>
      </sec>
      <sec id="sec-8-3">
        <title>Violation of integrity</title>
      </sec>
      <sec id="sec-8-4">
        <title>Violation of accessibility</title>
      </sec>
      <sec id="sec-8-5">
        <title>Threat and its</title>
        <p>source
Leakage of
information</p>
        <p>through
communication
channels
(hacker attacks,
introduction of
malicious
software,
noncompliance
with privileged
access
requirements)В
Provision of</p>
        <p>patient
information to
third parties
(insider
activity)
Theft of media
Modification of
medical
information,
software and</p>
        <p>hardware
(introduction of
virus software);
non-compliance
with privileged
access
requirements
Blocking access
to medical
information
(introduction of
malicious
software);
software and
hardware errors
Destruction of
media</p>
      </sec>
      <sec id="sec-8-6">
        <title>Assets subject to threats</title>
      </sec>
      <sec id="sec-8-7">
        <title>Consequences</title>
      </sec>
      <sec id="sec-8-8">
        <title>PC, sensor device of a user</title>
      </sec>
      <sec id="sec-8-9">
        <title>Servers of medical assistance</title>
      </sec>
      <sec id="sec-8-10">
        <title>Servers of pharmaceutical assistance</title>
      </sec>
      <sec id="sec-8-11">
        <title>Servers of medical services providers P providers</title>
      </sec>
      <sec id="sec-8-12">
        <title>Medical hardware means</title>
      </sec>
      <sec id="sec-8-13">
        <title>Database</title>
      </sec>
      <sec id="sec-8-14">
        <title>Servers of service personnel</title>
      </sec>
      <sec id="sec-8-15">
        <title>Cloud environment</title>
        <p>Network devices and
communication channels
та канали зв’язку
1) Complete or
partial disability
of information</p>
        <p>systems</p>
      </sec>
      <sec id="sec-8-16">
        <title>2) Material damage</title>
      </sec>
      <sec id="sec-8-17">
        <title>3) Moral damage (blackmail, bribery, reputational risks)</title>
      </sec>
    </sec>
    <sec id="sec-9">
      <title>6. Calculation of the Risks of the</title>
    </sec>
    <sec id="sec-10">
      <title>Information and Telecommunication</title>
    </sec>
    <sec id="sec-11">
      <title>Medical System</title>
      <p>To assess the risks of information security in
the information and telecommunication medical
system, we will apply a model in the form of a
graph of attacks. Attack graphs are a method that
can be used to explore the interactions between
vulnerabilities in an entire system. On the other
hand, the attack graph is a directed graph
G = G(V, E), on which a set of scenarios (paths of
attacks) simulating the infliction of damage by a
malicious agent on the information system to be
protected is studied [43].</p>
      <p>The following types of attack graphs are
distinguished [44]:
• State enumeration graph (state enumeration
graph)—in such graphs vertices correspond
to triples (s, d, а), where s is the source of
the attack, d is the target of the attack, and
а is an elementary attack (or the use of a
vulnerability); arcs indicate transitions
from one state to another (Fig. 5).
• Condition-oriented dependency graph—
vertices correspond to the results of attacks,
and arcs correspond to elementary attacks
that lead to such results (Fig. 6).
• Exploit dependency graph (graph of the
conditions for the implementation of
exploit opportunities)— vertices
correspond to the results of attacks or
elementary attacks, arcs reflect
dependencies between vertices—the
conditions necessary for the execution of
the attack and the consequence of the attack
(Fig. 7).</p>
      <p>Next, we present a risk-oriented model based
on the theory of graph attacks. Information and
telecommunication medical systems will be
presented in the form of an oriented graph
 ⃗ ( ,  ⃗⃗ ), where  = {  },  = ̅1̅̅,̅̅, are threats to
the assets,  ⃗⃗ is the connection between them. Arc
(  ,   ) corresponds to the connection of the
threat   with the threat   , the probability of
which is the result of the realization of the
threat   .</p>
      <p>For each threat   ,  = ̅1̅̅,̅̅, let us determine
the following parameters:
•   is the frequency of the threat   .
•   is the probability of the threat being
realized   .
•   is the coefficient of damage from the
realization of the threat   .
•  (  ) is the value of the asset   ,   ⊂  ,
where  is the set of assets targeted by the
threat   .</p>
      <p>is the probability of choosing the
Then the quantitative indicator of risk is
implementation path of the threat  ,

connected to the threat   .
calculated according to the formulas:
  = ∑    
  (  ),


 
=   + ∑</p>
      <p>,</p>
      <p>For example, Fig. 8 presents a part of the
information system,
(1)
(2)
number of patients.
for the PC of a patient
 1 is personal data of a patientпер;  2 is a threat
to
the
databaseз,
therefore
 2 =
 2( 2 ,  2 ,  2,  (  )), where   is personal data
іUsing the formula (1), we get the degree of risk
 1 =  1 1 1 ( 1);
The degree of risk for the database
 2 =  2 2 2 ∑  (  ).</p>
      <p />
      <p>Thus, according to formula (2), the degree of
risk to the database through the patient's PC is
equal to</p>
      <p>12 =  1 +  12 2.</p>
      <p>Statistical methods or expert evaluations are
used to
probability
determine the value</p>
      <p>of assets, the
of threat
realization,
and
their
frequency. It is also possible to prioritize threats
using the CVSS system. It is an open industry
standard for assessing computer system security
vulnerabilities. This toolkit assesses vulnerability
on a ten-point scale (low: 0.1–2.0; medium: 2.1–
5.0; high: 5.1–8.0; critical: 8.1–10). As a result, a
ranked list is formed, starting with the highest risk
indicator;
software methods and tools for assessing and
managing information risks.</p>
      <p>The direction of further research will be aimed
at the step-by-step implementation of this model
with the presentation of calculations and methods
at each stage.</p>
      <p>Ensuring the protection of information in
medical systems is offered by various methods
(cryptographic, hardware, software). Neglecting
information
security
means
denying all the
advantages of information and telecommunication
medical technologies since citizens' trust in new
technologies
depends
on
the
degree
of
information security, their willingness to hand
over an extremely important area of their lives to
computers,
information
communication
systems
and
the
“hands”</p>
      <p>of
networks,
algorithms.</p>
      <p>and</p>
    </sec>
    <sec id="sec-12">
      <title>7. Conclusions</title>
      <p>In the future, they compare the risk indicators
with the standard adopted in the organization. For
those indicators that have exceeded the standard,
the
methods
of
risk
processing
(reduction,
prevention, transmission, such as insurance) are
used. The current stage is characterized by a
sufficient number of international standards on
which
the information
security
management
process in the world is based, in particular, NIST
800-30, BSI-Standard 100-3, ISO/IEC 27005, and
DSTU ISO/IEC 27005: 2019. Different software
techniques and tools are also used in practice to
evaluate and</p>
      <p>manage information risks. The
direction of further research will be aimed at the
gradual implementation of this model with the
presentation of calculations and methods at each
stage. The provision of information protection in
medical systems is offered by different methods
(cryptographic, hardware, software). Neglecting
information safety-means to refute all the benefits
of information and telecommunication medical
technologies, since the degree of information
security
depends on citizens’ trust in
new
technologies, their</p>
      <p>willingness to transfer an
extremely important sphere of their life in the
“hands” of computers, communication networks,
information systems, and algorithms.</p>
    </sec>
    <sec id="sec-13">
      <title>8. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>V.</given-names>
            <surname>Zhebka</surname>
          </string-name>
          , et al.,
          <article-title>Optimization of Machine Learning Method to Improve the Management Efficiency of Heterogeneous Telecommunication Network</article-title>
          ,
          <source>in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3288</volume>
          (
          <year>2022</year>
          )
          <fpage>149</fpage>
          -
          <lpage>155</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>P.</given-names>
            <surname>Anakhov</surname>
          </string-name>
          , et al.,
          <article-title>Evaluation Method of the Physical Compatibility of Equipment in a Hybrid Information Transmission Network</article-title>
          ,
          <source>Journal of Theoretical and Applied Information Technology</source>
          <volume>100</volume>
          (
          <issue>22</issue>
          ) (
          <year>2022</year>
          )
          <fpage>6635</fpage>
          -
          <lpage>6644</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>O.</given-names>
            <surname>Kopiika</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <article-title>Use of ServiceOriented Information Technology to Solve Problems of Sustainable Environmental Management</article-title>
          .
          <source>Information Technology and Mathematical Modeling for Environmental Safety</source>
          <volume>3021</volume>
          (
          <year>2021</year>
          )
          <fpage>66</fpage>
          -
          <lpage>75</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Kalimoldayev</surname>
          </string-name>
          , et al.,
          <source>The Device for Multiplying Polynomials Modulo an Irreducible Polynomial, News of the National Academy of Sciences of the Republic of Kazakhstan, Series of Geology and Technical Sciences</source>
          <volume>2</volume>
          (
          <issue>434</issue>
          ) (
          <year>2019</year>
          )
          <fpage>199</fpage>
          -
          <lpage>205</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <source>[5] Healthcare breach report</source>
          <year>2022</year>
          ,
          <article-title>Н1</article-title>
          . Security Research and
          <string-name>
            <surname>Data Analysis URL</surname>
          </string-name>
          :https://www.criticalinsight.com/
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <fpage>2022</fpage>
          <string-name>
            <surname>H2 Healthcare Data Breach Report</surname>
            <given-names>URL</given-names>
          </string-name>
          :https://cybersecurity.criticalinsight.com /healthcare-breach
          <source>-report-h2-2022</source>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <article-title>[7] On the Approval of Regulatory Documents Regarding the Use of Telemedicine in the Field of Health Care</article-title>
          .
          <source>Ministry of Health of Ukraine; Order from 19.10</source>
          .2015 No. 681. URL:https://zakon.rada.gov.ua/laws/sho w/z1400-15#top
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Information</surname>
            <given-names>security strategy</given-names>
          </string-name>
          (Ukraine),
          <volume>28</volume>
          .
          <fpage>12</fpage>
          .
          <year>2021</year>
          , No 685/
          <year>2021</year>
          . URL: https://zakon.rada.gov.ua/laws/show/685/2 021#Text (in Ukrainian)
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <source>[9] On the Protection of Information in Communication Systems (Ukraine)</source>
          ,
          <volume>05</volume>
          .
          <fpage>07</fpage>
          .
          <year>1994</year>
          , No.
          <volume>80</volume>
          /94-ВР. URL: https://zakon.rada.gov.ua/laws/show/80/94 -%
          <source>D0%B2%D1%80#Text</source>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>G.</given-names>
            <surname>Pawlowski</surname>
          </string-name>
          , et. al.,
          <source>Legal Aspects of Information Security in Telemedicine in Ukraine, Path of Sci. 8</source>
          (
          <year>2022</year>
          )
          <fpage>1011</fpage>
          -
          <lpage>1017</lpage>
          . doi:
          <volume>10</volume>
          .22178/pos.87-
          <fpage>2</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>V.</given-names>
            <surname>Martsenyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Klymuk</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Gvozdetska</surname>
          </string-name>
          ,
          <article-title>On Problem of Telemedical Information Protection: Regulatory and Organizational Aspects From the Experience of the Republic of Poland, Med</article-title>
          . Informs. Eng.
          <volume>3</volume>
          (
          <year>2016</year>
          )
          <fpage>44</fpage>
          -
          <lpage>55</lpage>
          . doi:
          <volume>10</volume>
          .11603/mie.1996-
          <fpage>1960</fpage>
          .
          <year>2016</year>
          .
          <volume>3</volume>
          .
          <fpage>6753</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>J.</given-names>
            <surname>Yoon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Drumright</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. Van der Schaar</surname>
          </string-name>
          ,
          <article-title>Anonymization Through Data Synthesis Using Generative Adversarial Networks (ADS-GAN)</article-title>
          ,
          <source>IEEE J. of Biomedical and Health Informs</source>
          .
          <volume>24</volume>
          (
          <issue>8</issue>
          ) (
          <year>2020</year>
          )
          <fpage>2378</fpage>
          -
          <lpage>2388</lpage>
          . doi:
          <volume>10</volume>
          .1109/JBHI.
          <year>2020</year>
          .2980262
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>O.</given-names>
            <surname>Yudin</surname>
          </string-name>
          , et. al.,
          <article-title>Protection of Critical Medical Information in GSM-type Telecommunication Networks Based on Elliptic Curves, Probls</article-title>
          . Inf. Manag.
          <volume>4</volume>
          (
          <issue>52</issue>
          ) (
          <year>2015</year>
          )
          <fpage>125</fpage>
          -
          <lpage>131</lpage>
          . doi:
          <volume>10</volume>
          .18372/2073- 4751.4.
          <fpage>10351</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kulyk</surname>
          </string-name>
          , et. al.,
          <source>Telemedicine. Computer Systems and Information Technologies</source>
          ,
          <string-name>
            <surname>VNMU</surname>
          </string-name>
          , Vinnytsia,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>M.</given-names>
            <surname>Graivoronsky</surname>
          </string-name>
          ,
          <source>Protection of Confidential Information in Telemedicine Systems. Legal, Regulatory and Metrological Support of the Information Protection System in Ukraine</source>
          ,
          <volume>11</volume>
          (
          <year>2005</year>
          )
          <fpage>191</fpage>
          -
          <lpage>195</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>K.</given-names>
            <surname>Abouelmehdi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Beni-Hessane</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Saadi</surname>
          </string-name>
          ,
          <article-title>Security Model for Big Healthcare Data Lifecycle, Proced</article-title>
          .
          <source>Comput. Sci</source>
          .
          <volume>141</volume>
          (
          <year>2018</year>
          )
          <fpage>294</fpage>
          -
          <lpage>301</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Dw. Kim</surname>
          </string-name>
          , J. Choi, Kh. Han,
          <article-title>Risk Management-Based Security Evaluation Model For Telemedicine Systems</article-title>
          ,
          <source>BMC Med</source>
          . Inf. Decis. Mak.
          <volume>20</volume>
          (
          <issue>106</issue>
          ) (
          <year>2020</year>
          ).
          <source>Doi:10.1186/s12911-020-01145-7</source>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>K.</given-names>
            <surname>Abouelmehdi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Beni-Hessane</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Khaloufi</surname>
          </string-name>
          ,
          <article-title>Big Healthcare Data: Preserving Security and Privacy</article-title>
          ,
          <source>J. Big Data</source>
          .
          <volume>5</volume>
          (
          <issue>1</issue>
          ) (
          <year>2018</year>
          ).
          <source>doi:10.1186/s40537- 017-0110-7</source>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>C.</given-names>
            <surname>Magruder</surname>
          </string-name>
          , et. al.,
          <article-title>Using Information Technology to Improve the Public Health System</article-title>
          ,
          <source>J. Public Health Manag. and Pract.: JPHMP</source>
          .
          <volume>11</volume>
          (
          <issue>2</issue>
          ) (
          <year>2005</year>
          )
          <fpage>123</fpage>
          -
          <lpage>130</lpage>
          . doi:
          <volume>10</volume>
          .1097/
          <fpage>00124784</fpage>
          -200503000-00005
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>A</given-names>
            <surname>Health Telematics</surname>
          </string-name>
          <article-title>Policy in Support of WHO's Health-For-</article-title>
          <source>All Strategy for Global Health Development: Report of the WHO Group Consultation on Health Telematics</source>
          ,
          <fpage>11</fpage>
          -
          <lpage>16</lpage>
          December, Geneva,
          <year>1997</year>
          , Geneva, World Health Organization,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>R.</given-names>
            <surname>Bashshur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Reardon</surname>
          </string-name>
          , G. Shannon,
          <article-title>Telemedicine: A New Health Care Delivery System</article-title>
          ,
          <source>Annu. Rev. Public. Health, 21 Med</source>
          . Ethics.
          <volume>22</volume>
          (
          <issue>122</issue>
          ) (
          <year>2021</year>
          ). doi: (
          <year>2000</year>
          )
          <fpage>613</fpage>
          -
          <lpage>637</lpage>
          . doi:
          <volume>10</volume>
          .1186/s12910-021
          <source>-00687-3 10</source>
          .1146/annurev.publhealth.
          <volume>21</volume>
          .1.613 [34]
          <string-name>
            <given-names>J.</given-names>
            <surname>Rodrigues</surname>
          </string-name>
          , et. al.,
          <source>Analysis of the</source>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>N.</given-names>
            <surname>Brown</surname>
          </string-name>
          ,
          <article-title>A Brief History of Security and Privacy Requirements of Telemedicine, Telemed</article-title>
          .
          <source>Inf. Exch. 105 Cloud-Based Electronic Health Records</source>
          (
          <year>1995</year>
          )
          <fpage>833</fpage>
          -
          <lpage>5</lpage>
          . Systems,
          <string-name>
            <given-names>J.</given-names>
            <surname>Med</surname>
          </string-name>
          . Internet Research.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>K.</given-names>
            <surname>Kravets</surname>
          </string-name>
          ,
          <article-title>Development and Application of 15(8):e186 (</article-title>
          <year>2013</year>
          ). doi:
          <volume>10</volume>
          .2196/jmir.2494 Telemedicine in the World and in Ukraine, [35]
          <string-name>
            <given-names>S.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          , et. al.,
          <source>Conducting a Dermatol. Venereol</source>
          .
          <volume>4</volume>
          (
          <year>2017</year>
          )
          <fpage>94</fpage>
          -
          <lpage>98</lpage>
          .
          <article-title>SWOT-analysis of Information Risk</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>O.</given-names>
            <surname>Escobar</surname>
          </string-name>
          , et. al.,
          <article-title>The Effect of Telemedi- Assessment as a Means of Formation of cine on Patients' Wellbeing: A Systematic Practical Skills of Students Specialty 125 Review</article-title>
          ,
          <string-name>
            <surname>J. Innov. Economs. Manag.</surname>
          </string-name>
          35
          <string-name>
            <given-names>Cyber</given-names>
            <surname>Security</surname>
          </string-name>
          , Cybersecur. Educ. Sci. (
          <year>2021</year>
          )
          <fpage>9</fpage>
          -
          <lpage>31</lpage>
          . doi:
          <volume>10</volume>
          .3917/jie.
          <source>pr1.0098 Technol</source>
          .
          <volume>2</volume>
          (
          <issue>10</issue>
          ) (
          <year>2020</year>
          )
          <fpage>158</fpage>
          -
          <lpage>168</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>O.</given-names>
            <surname>Ikumapayi</surname>
          </string-name>
          , et. al.,
          <source>Telehealth and doi:10</source>
          .28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2020</year>
          .10
          <string-name>
            <surname>Telemedicine-An</surname>
            <given-names>Overview</given-names>
          </string-name>
          ,
          <source>International [36] DSTU ISO/IEC 27005:2019 (ISO/IEC Conference on Industrial Engineering and 27005:</source>
          <year>2018</year>
          , ІDТ) “
          <article-title>Information Technologies</article-title>
          . Operations Management Nsukka, Nigeria,
          <string-name>
            <given-names>Protection</given-names>
            <surname>Methods</surname>
          </string-name>
          .
          <source>Information Security Risk 5-7 April</source>
          ,
          <year>2022</year>
          ,
          <fpage>1347</fpage>
          -
          <lpage>1358</lpage>
          . Management”,
          <year>2019</year>
          , URL:
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <article-title>Order of the Ministry of Health of March http</article-title>
          ://online.budstandart.com/ua/catalog/doc26,
          <year>2010</year>
          № 261 “
          <article-title>On the Introduction of page</article-title>
          .
          <source>html?id_doc=85797 Telemedicine in Health Care Institutions</source>
          <volume>”</volume>
          [37]
          <string-name>
            <given-names>H.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          , et. al.,
          <string-name>
            <surname>Information Security</surname>
            <given-names>URL</given-names>
          </string-name>
          :https://zakononline.com.
          <source>ua/document Risk Analysis SWOT</source>
          , vol.
          <volume>2923</volume>
          (
          <year>2021</year>
          ) s/show/70816___70816
          <fpage>309</fpage>
          -
          <lpage>317</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>J.</given-names>
            <surname>Tummers</surname>
          </string-name>
          , et. al.,
          <source>Designing a Reference</source>
          [38]
          <string-name>
            <given-names>S.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhdanova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Kravchuk</surname>
          </string-name>
          ,
          <source>Architecture for Health Information Sys- Information Protection Model Based on tems, BMC Med</source>
          . Inf. Decis. Mak.
          <volume>21</volume>
          (
          <issue>210</issue>
          )
          <article-title>Information Security Risk Assessment for (</article-title>
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .1186/s12911-021-01570-2 Small and
          <string-name>
            <surname>Medium-Sized</surname>
            <given-names>Business</given-names>
          </string-name>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>A.</given-names>
            <surname>Appari</surname>
          </string-name>
          , M. Johnson, Information Cybersecur.
          <source>Educ. Sci. Technol</source>
          .
          <volume>2</volume>
          (
          <issue>14</issue>
          )
          <article-title>Security</article-title>
          and Privacy in Healthcare: Current (
          <year>2021</year>
          )
          <fpage>158</fpage>
          -
          <lpage>175</lpage>
          . doi:
          <volume>110</volume>
          .28925/2663- State of Research1,
          <source>Int. J. Internet Enterp</source>
          .
          <volume>4023</volume>
          .
          <year>2021</year>
          .
          <volume>13</volume>
          .158157 Manag.
          <volume>6</volume>
          (
          <year>2010</year>
          )
          <fpage>279</fpage>
          -
          <lpage>314</lpage>
          . doi: [39]
          <string-name>
            <given-names>L.</given-names>
            <surname>Dubchak</surname>
          </string-name>
          ,
          <source>Fuzzy Information Protection</source>
          <volume>10</volume>
          .1504/IJIEM.
          <year>2010</year>
          .035624 System in Telemedicine, Inf. Process.
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>A.</given-names>
            <surname>Rajput</surname>
          </string-name>
          , et. al.
          <source>EACMS: Emergency Access Systs</source>
          .
          <volume>8</volume>
          (
          <issue>133</issue>
          ) (
          <year>2015</year>
          )
          <fpage>97</fpage>
          -
          <lpage>101</lpage>
          .
          <source>Control Management System for Personal doi:10.13140/RG.2.1.2242.7361 Health Record Based on Blockchain</source>
          , IEEE [40]
          <string-name>
            <given-names>B.</given-names>
            <surname>Anas</surname>
          </string-name>
          ,
          <source>Data privacy (Information privacy) Access</source>
          .
          <volume>7</volume>
          (
          <year>2019</year>
          )
          <fpage>84304</fpage>
          -
          <lpage>84317</lpage>
          . doi: URL:https://www.techopedia.
          <source>com/definition 10.1109/ACCESS</source>
          .
          <year>2019</year>
          .
          <volume>2917976</volume>
          /10380/information-privacy
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>J.</given-names>
            <surname>Biskup</surname>
          </string-name>
          , G. Bleumer, Cryptographic [41]
          <article-title>Integrity of the Healthcare Record: Best Protection of Health Information: Cost and Practices for EHR Documentation</article-title>
          . Benefit, Int. J.
          <string-name>
            <surname>Bio-Medical Comput</surname>
          </string-name>
          .
          <volume>43</volume>
          (
          <issue>1</issue>
          -
          <fpage>2</fpage>
          ) URL:https://library.ahima.org/doc?oid=
          <volume>3002</volume>
          (
          <year>1996</year>
          )
          <fpage>61</fpage>
          -
          <lpage>67</lpage>
          , doi: 10.1016/S0020- 57#.Y_p2XHZBxPY
          <volume>7101</volume>
          (
          <issue>96</issue>
          )
          <fpage>01228</fpage>
          -
          <lpage>7</lpage>
          [42]
          <string-name>
            <given-names>Reassessing</given-names>
            <surname>Your</surname>
          </string-name>
          Security Practices in a
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>S.</given-names>
            <surname>Pirbhulal</surname>
          </string-name>
          , et. al.,
          <string-name>
            <given-names>A Joint</given-names>
            <surname>Resource-Aware Health IT</surname>
          </string-name>
          <article-title>Environment: A Guide for Small and Medical Data Security Framework for Health Care Practices, URL: Wearable Healthcare Systems</article-title>
          , Future Gener. https://www.coursehero.com/file/76902828/s Comput.
          <source>Systs</source>
          .
          <volume>95</volume>
          (
          <year>2019</year>
          )
          <fpage>382</fpage>
          -
          <lpage>391</lpage>
          , doi: mall
          <article-title>-practice-security-</article-title>
          <string-name>
            <surname>guide-</surname>
          </string-name>
          11
          <source>-1pdf/ 10</source>
          .1016/j.future.
          <year>2019</year>
          .
          <volume>01</volume>
          .
          <volume>008</volume>
          [43]
          <string-name>
            <given-names>S.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          , et. al.,
          <source>Mathematical</source>
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>S.</given-names>
            <surname>Hoffman</surname>
          </string-name>
          ,
          <article-title>Cybersecurity Threats in Methods in Cibernetic Security: Graphs and Healthcare Organizations: Exposing Their Application in Information and Vulnerabilities in the Healthcare Cybernetic Security, Cybersecur</article-title>
          . Educ. Sci. Information Infrastructure, World Technol.
          <volume>1</volume>
          (
          <issue>13</issue>
          ) (
          <year>2021</year>
          )
          <fpage>133</fpage>
          -
          <lpage>144</lpage>
          . doi: Libraries,
          <volume>24</volume>
          (
          <issue>1</issue>
          )
          <year>2020</year>
          .
          <volume>10</volume>
          .28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2021</year>
          .
          <volume>13</volume>
          .133144
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>B.</given-names>
            <surname>Murdoch</surname>
          </string-name>
          , Privacy and Artificial [44]
          <string-name>
            <given-names>M.</given-names>
            <surname>Danforth</surname>
          </string-name>
          ,
          <article-title>Models for Threat Intelligence: Challenges for Protecting Assessment in Networks, Comput</article-title>
          . Sci.
          <article-title>Health Information in a New Era, BMC (</article-title>
          <year>2006</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>