Literature - Chapter 7.

  1. Guy M, Blary A, Ladner J, Gilliaux M. Ethical Issues Linked to the Development of Telerehabilitation: A Qualitative Study. Int J Telerehab [Internet]. 2021 May 20 [cited 2024 Mar 25];13(1). Available from: http://telerehab.pitt.edu/ojs/Telerehab/article/view/6367
  2. Keenan AJ, Tsourtos G, Tieman J. The Value of Applying Ethical Principles in Telehealth Practices: Systematic Review. J Med Internet Res. 2021 Mar 30;23(3):e25698. 
  3. East African Community. Draft EAC legal framework for cyberlaws [Internet]. 2008. Available from: http://hdl.handle.net/11671/1815
  4. Republic of Kenya. Data protection Act, 2019 [Internet]. 2019. Available from: https://www.odpc.go.ke/download/kenya-gazette-data-protection-act-2019/?wpdmdl=3235&refresh=65b789b046ec81706527152
  5. Republic of Rwanda. Data Protection and Privacy Law [Internet]. 2021. Available from: https://www.risa.gov.rw/data-protection-and-privacy-law
  6. THE UNITED REPUBLIC OF TANZANIA. The Personal Data Protection Act, 2022 [Internet]. 2022. Available from: https://oagmis.agctz.go.tz/portal/acts/237
  7. European Union. Art. 5 GDPR - Principles relating to processing of personal data [Internet]. Available from: https://gdpr-info.eu/art-5-gdpr/
  8. National Cyber Security Authority. Law No 058/2021 of 13/10/2021 relating to the protection of personal data and privacy. 2021. 
  9. Lehto M. Kybermaailma ja turvallisuus [Cyber environment and safety]. Lecture handout. University of Jyväskylä, Faculty of IT; 2019. 
  10. European Union Agency for Cybersecurity (ENISA). Cybersecurity [Internet]. 2024. Available from: https://www.enisa.europa.eu/
  11. Henriksen E, Burkow TM, Johnsen E, Vognild LK. Privacy and information security risks in a technology platform for home-based chronic disease rehabilitation and education. BMC Med Inform Decis Mak. 2013 Dec;13(1):85. 
  12. Barker WC. Guideline for Identifying and Information System as a National Security System. [Internet]. National Institute of Standards and Technology.; 2003. Available from: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-59.pdf
  13. Von Solms R, Van Niekerk J. From information security to cyber security. Computers & Security. 2013 Oct;38:97–102. 
  14. Hughton F. Cybersecurity, Ransomware Attacks and Health: Exploring the Public Health Implications of the Recent Cyberattack on Ireland’s Health Service. 2021 Aug 3;29(116):160–3. 
  15. Reeder R, Ion J, Consolvo S. 152 Simple Steps to Stay Safe Online: Security Advice for Non-Tech-Savvy Users. IEEE Security and Privacy. 2017;55–64. 
  16. European Data Protection Supervisor. Data Protection [Internet]. [cited 2024 Apr 8]. Available from: https://www.edps.europa.eu/data-protection/data-protection_en
  17. United Nations. Universal Declaration of Human Rights. [Internet]. 1948 [cited 2024 Apr 8]. Available from: https://www.un.org/en/about-us/universal-declaration-of-human-rights