Main Article Content
Abstract
Indonesia’s digital health push has fostered an integrated telemedicine ecosystem centered on SATUSEHAT Mobile and major private platforms, intensifying cross-system clinical data exchange. This raises the salience of three dimensions: behavior (human factors), compliance (regulatory/standards alignment), and cyber resilience (prevent, respond, and recover). This study maps the evidence on these dimensions in Indonesia’s telemedicine context and develops a maturity evaluation model with baseline operational practices. We conducted a Systematic Literature Review guided by PRISMA, covering publications from 2020 to 2025 in major scholarly databases under inclusion criteria specific to Indonesian telemedicine. Eligible studies were extracted and analyzed qualitatively using NVivo, with open axial selective coding, to produce a thematic synthesis and a concept map across the three focal dimensions. The synthesis yields four theme clusters: (1) behavior & security literacy (credential hygiene, social engineering awareness, BYOD/remote access); (2) audit & operational compliance (logging/audit trails, breach reporting, adoption of standards/certifications); and (3) incident response & resilience (runbooks, backup/restore, failover, BCP/DRP testing). Key gaps include consent traceability across FHIR-based interoperability flows, end-to-end resilience indicators (e.g., integration MTTR, standardized failover tests), and comparative cross-platform assessments. Outputs comprise a behavior→compliance→resilience conceptual model, a maturity evaluation framework, and non-policy baseline operational practices.
Keywords
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
References
- A. Yi, M. Al-Emran, and K. Shaalan, "Theories in Cybersecurity Behavior Studies," MDPI Applied Sciences, vol. 13, no. 9, 2023. [Online]. Available: https://www.mdpi.com/2076-3417/13/9/5700/pdf
- Agusiady, R., Dwiputrianti, S., Kusumastuti, D., Sedarmayanti. (2021). Mewujudkan Good Corporate Governance – Tata Kelola Perushaan yang Baik, Di Era Industri 4.0 dan Masyarakat 5.0. ISBN: 978-623-02-3324-1. Deepublish Publisher.
- Agusiady, R., Sedarmayanti, Sunarsi, D., Mulyani. S., R. (2022). Manajemen Rumah Sakit. ISBN: 978-623-02-5066-8. Deepublish Publisher.
- Ajzen, I. (1991). The theory of planned behavior. *Organizational Behavior and Human Decision Processes, 50*(2), 179–211. https://doi.org/10.1016/0749-5978(91)90020-T
- Almansoori, A., Al-Emran, M., & Shaalan, K. (2023). Exploring the frontiers of cybersecurity behavior: A systematic review of studies and theories. Applied Sciences, 13(9), 5700. https://www.mdpi.com/2076-3417/13/9/5700
- Alodokter. Kebijakan Privasi (Privasi). Alodokter
- Ameen, A. H., & Mohammed, M. A. (2023). Dimensions of artificial intelligence techniques, blockchain, and cybersecurity in the Internet of Medical Things: Opportunities, Challenges, and Future Directions. *Journal of Intelligent Systems*, 32(3), 567–589. https://doi.org/10.1515/jisys-2022-0267
- American Psychological Association. (2017). Ethical principles of psychologists and code of conduct. https://www.apa.org/ethics/code
- Antara. (2023, 27 Februari). Kemenkes: Aplikasi PeduliLindungi jadi SatuSehat Mobile mulai 1 Maret. Antara News
- Argaw, S. T., Troncoso-Pastoriza, J. R., Lacey, D., & Flury, R. (2020). Cybersecurity of hospitals: Discussing the challenges and working towards mitigating the risks. BMC Medical Informatics and Decision Making, 20(1), 146. https://doi.org/10.1186/s12911-020-01161-7
- ASIS International. (2024, 26. Juni). Indonesia Refuses to Pay $8M Ransom in Data Center Cyberattack (insiden PDN). ASIS International
- AWS. (2025). Halodoc: Optimizing Resource Use for 20% Improvement on AWS Graviton3 (studi kasus). Amazon Web Services, Inc.
- Azwar, A. R., & Sirait, E. S. (2025). The legal framework for personal data protection amidst hospital competition. Proceedings of ICOSEND 2025. https://www.atlantis-press.com/article/126008670.pdf
- Bazeley, P., & Jackson, K. (2013). Qualitative Data Analysis with NVivo (2nd ed.). SAGE Publications.
- Boell, S. K., & Cecez-Kecmanovic, D. (2015). On being ‘systematic’ in literature reviews. Information Systems Journal, 25(4), 613–635. https://doi.org/10.1016/j.is.2014.07.001
- Booth, A., Sutton, A., & Papaioannou, D. (2016). Systematic approaches to a successful literature review (2nd ed.). Sage.
- Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77–101. https://doi.org/10.1191/1478088706qp063oa
- Creswell, J. W., & Poth, C. N. (2018). Qualitative inquiry and research design: Choosing among five approaches (4th ed.). Sage Publications.
- Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. *MIS Quarterly, 13*(3), 319–340. https://doi.org/10.2307/249008
- DeLone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: A ten-year update. *Journal of Management Information Systems, 19*(4), 9–30. https://doi.org/10.1080/07421222.2003.11045748
- Guest, G., Namey, E., & Chen, M. (2020). A simple method to assess thematic saturation. PLOS ONE, 15(5), e0232076.
- Haleem, A., Javaid, M., Singh, R. P., & Suman, R. (2021). Telemedicine for healthcare: Capabilities, features, barriers, and applications. Sensors International, 2, 100117. https://doi.org/10.1016/j.sintl.2021.100117
- Halodoc Blog. (2024, 6 September). How Halodoc Achieved ISO/IEC 27701:2019 Certification. Halodoc Blog
- Health Sector Coordinating Council. (2023). Health Industry Cybersecurity – Securing Telehealth and Telemedicine (HIC-STAT). healthsectorcouncil.org
- Hernandez-Jaimes, M. L., & Martinez-Cruz, A. (2023). Artificial intelligence for IoMT security: A review of intrusion detection systems, attacks, datasets, and Cloud–Fog–Edge architectures. *Journal of Biomedical Informatics*, 136, 104206. https://www.sciencedirect.com/science/article/pii/S254266052300210X
- Irwandy, I., Suharti, N., & Fadillah, R. (2024). Cybersecurity culture among healthcare workers in Indonesia. Research Square. https://www.researchsquare.com/article/rs-5421169/latest.pdf
- ISO/IEC 27001:2013 - Information Security Management Systems. ISO/IEC 27001:2022 - Information security management systems
- Jain, S., Ashok, P., & Prabhu, S. (2024). Emerging Technologies for Cybersecurity in Healthcare: Evaluating Risks and Implementing Standards. *IEEE Xplore*. https://ieeexplore.ieee.org/abstract/document/10803219/
- Jannink, K. J. B. (2025). How do the protection motivation theory and the self-determination theory influence healthcare employees' intention to perform safe cyber behaviour? http://essay.utwente.nl/105210/
- JBI. (2020). JBI manual for evidence synthesis. Scoping Reviews - Resources | JBI
- K. Hasegawa, N. O'Brien, and M. Prendergast, "Cybersecurity Interventions in Health Care Organizations in Low-and Middle-Income Countries: Scoping Review," JMIR, vol. 26, no. 1, 2024. [Online]. Available: https://www.jmir.org/2024/1/e47311/
- Kruse, C. S., Karem, P., Shifflett, K., Vegi, L., Ravi, K., & Brooks, M. (2017). Evaluating barriers to adopting telemedicine worldwide: A systematic review. Journal of Telemedicine and Telecare, 24(1), 4–12. https://doi.org/10.1177/1357633X16674087
- Kadarisman, S. dkk. (2020). The Impact of Human Resource Management Implementation in Business Strategy in Creating Sustainable Competitive Advantage. Proceedings of the 2nd Annual Conference on Blended Learning, Educational Technology and Innovation (ACBLETI 2020). https://www.atlantis-press.com/proceedings/acbleti-20/125957860
- Linkov, I., Trump, B. D., Keisler, J. M., & Collier, Z. A. (2018). Resilience and risk: Methods and application in environment, cyber, and social domains. Risk Analysis, 38(9), 1834–1845. https://doi.org/10.1111/risa.12991
- Liu, X. (2024). Data ownership in the AI-powered integrated health care. JMIR Medical Informatics, 12, e57754.
- Makarim, E. (2024). Telemedicine in the legal system in Indonesia. Dialogia Iuridica, 16(1).
- Miles, M. B., Huberman, A. M., & Saldaña, J. (2014). Qualitative Data Analysis: A Methods Sourcebook (3rd ed.). SAGE Publications.
- Monteiro, A. C. B., França, R. P., Arthur, R., & Iano, Y. (2021). An overview of the medical Internet of Things, artificial intelligence, and cloud computing employed in health care from a modern panorama. In *Healthcare Technology* (pp. xx–xx). Springer. https://link.springer.com/chapter/10.1007/978-3-030-75220-0_1
- OECD. (2020). Digital security and data protection in health: Building resilience and trust. OECD Publishing. https://doi.org/10.1787/9789264812003-en
- Ordonez, A. (2020). Cybersecurity in the healthcare industry (Honors thesis). DePauw University.
- P. K. Sari et al.,, "Information security behavior in health information systems: a review," Healthcare, vol. 10, no. 12, 2022. [Online]. Available: https://www.mdpi.com/2227-9032/10/12/2531
- P. K. Yeng, M. A. Fauzi, and B. Yang, "Human factors in cybersecurity compliance in paperless hospitals," MDPI Info, vol. 13, no. 7, 2022. [Online]. Available: https://www.mdpi.com/2078-2489/13/7/335
- Page, M. J., et al., (2021). PRISMA 2020 statement. PLOS Medicine, 18(3), e1003583.
- Parker, C. (2002). *The open corporation: Effective self-regulation and democracy*. Cambridge University Press. https://doi.org/10.1017/CBO9780511495194
- Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. *The Journal of Psychology, 91*(1), 93–114. https://doi.org/10.1080/00223980.1975.9915803
- Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. *The Journal of Psychology, 91*(1), 93–114.
- Roobini, S., Kavitha, M., & Sujaritha, M. (2022). Cybersecurity threats to IoMT-enabled healthcare systems. In *Cybersecurity in IoMT* (pp. xx–xx). Taylor & Francis. https://www.taylorfrancis.com/chapters/edit/10.1201/9781003256243-6
- Salas, J. A., et al., (2022). Guarding the digital health data as the front gate. Journal of Legal, Ethical & Regulatory Issues, 24(S4), 47–60.
- Saleh & Winata (2023). Indonesia's Cyber Security Strategy: Problems and Challenges – IJCAH Proceedings.
- Snigdha et al.,, 2025. Cybersecurity in Healthcare IT Systems: Business Risk Management and Data Privacy Strategies – TAJET Journal.
- Snyder, H. (2019). Literature reviews as a research methodology: An overview and guidelines. Journal of Business Research, 104, 333–339. https://doi.org/10.1016/j.jbusres.2019.07.039
- Suci, R. P., & Dhamanti, I. (2024). Cybersecurity dalam sistem informasi rumah sakit Indonesia. Journal Innovative. https://j-innovative.org/index.php/Innovative/article/download/12632/8537
- Sudarsana, I. P., & Ramli, K. (2023). Information security risk assessment using factor analysis of information risk (FAIR) in the healthcare sector: Scoping review. Jurnal Darma Agung, 31(4). https://jurnal.darmaagung.ac.id/index.php/jurnaluda/article/download/3236/3198
- Thomasian, N. M., & Adashi, E. Y. (2021). Cybersecurity in the Internet of Medical Things. *Clinical Therapeutics*, 43(1), 1–10. https://www.sciencedirect.com/science/article/pii/S2211883721000721
- Torraco, R. J. (2016). Writing integrative literature reviews: Using the past and present to explore the future. Human Resource Development Review, 15(4), 404–428. https://doi.org/10.1177/1534484316671606
- Tranfield, D., Denyer, D., & Smart, P. (2003). Towards a methodology for developing evidence-informed management knowledge by means of systematic review. British Journal of Management, 14(3), 207–222. https://doi.org/10.1111/1467-8551.00375
- Tyler, T. R. (1990). Why do people obey the law? Yale University Press.
- Undang-Undang Nomor 11 Tahun 2008 tentang Informasi dan Transaksi Elektronik (UU ITE).
- Wong, G., Greenhalgh, T., Westhorp, G., et al., (2013). RAMESES publication standards: Realist syntheses. BMC Medicine, 11(1), 21. https://doi.org/10.1186/1741-7015-11-21
- World Health Organization (WHO). (2021). Global strategy on digital health 2020–2025. World Health Organization. https://apps.who.int/iris/handle/10665/344249
- Xiao, Y., & Watson, M. (2019). Guidance on conducting a systematic literature review. Journal of Planning Education and Research, 39(1), 93–112. https://doi.org/10.1177/0739456X17723971
- Yeng, P. K., et al., (2022). Assessing the legal aspects of information security requirements for health care in 3 countries. JMIR Human Factors, 9(2). https://humanfactors.jmir.org/2022/2/e30050/
- Yeng, P. K., Fauzi, M. A., & Yang, B. (2022). A comprehensive assessment of human factors in relation to cybersecurity compliance of healthcare staff in a paperless hospital. Preprints. https://www.academia.edu/download/89549893/preprints202203.0247.v1.pdf
- Yuliaty, F. (2017). Employee Empowering Through Information Technology And Creativity In Organizations. International Journal Of Economic Perspectives. 11. 54–59.
References
A. Yi, M. Al-Emran, and K. Shaalan, "Theories in Cybersecurity Behavior Studies," MDPI Applied Sciences, vol. 13, no. 9, 2023. [Online]. Available: https://www.mdpi.com/2076-3417/13/9/5700/pdf
Agusiady, R., Dwiputrianti, S., Kusumastuti, D., Sedarmayanti. (2021). Mewujudkan Good Corporate Governance – Tata Kelola Perushaan yang Baik, Di Era Industri 4.0 dan Masyarakat 5.0. ISBN: 978-623-02-3324-1. Deepublish Publisher.
Agusiady, R., Sedarmayanti, Sunarsi, D., Mulyani. S., R. (2022). Manajemen Rumah Sakit. ISBN: 978-623-02-5066-8. Deepublish Publisher.
Ajzen, I. (1991). The theory of planned behavior. *Organizational Behavior and Human Decision Processes, 50*(2), 179–211. https://doi.org/10.1016/0749-5978(91)90020-T
Almansoori, A., Al-Emran, M., & Shaalan, K. (2023). Exploring the frontiers of cybersecurity behavior: A systematic review of studies and theories. Applied Sciences, 13(9), 5700. https://www.mdpi.com/2076-3417/13/9/5700
Alodokter. Kebijakan Privasi (Privasi). Alodokter
Ameen, A. H., & Mohammed, M. A. (2023). Dimensions of artificial intelligence techniques, blockchain, and cybersecurity in the Internet of Medical Things: Opportunities, Challenges, and Future Directions. *Journal of Intelligent Systems*, 32(3), 567–589. https://doi.org/10.1515/jisys-2022-0267
American Psychological Association. (2017). Ethical principles of psychologists and code of conduct. https://www.apa.org/ethics/code
Antara. (2023, 27 Februari). Kemenkes: Aplikasi PeduliLindungi jadi SatuSehat Mobile mulai 1 Maret. Antara News
Argaw, S. T., Troncoso-Pastoriza, J. R., Lacey, D., & Flury, R. (2020). Cybersecurity of hospitals: Discussing the challenges and working towards mitigating the risks. BMC Medical Informatics and Decision Making, 20(1), 146. https://doi.org/10.1186/s12911-020-01161-7
ASIS International. (2024, 26. Juni). Indonesia Refuses to Pay $8M Ransom in Data Center Cyberattack (insiden PDN). ASIS International
AWS. (2025). Halodoc: Optimizing Resource Use for 20% Improvement on AWS Graviton3 (studi kasus). Amazon Web Services, Inc.
Azwar, A. R., & Sirait, E. S. (2025). The legal framework for personal data protection amidst hospital competition. Proceedings of ICOSEND 2025. https://www.atlantis-press.com/article/126008670.pdf
Bazeley, P., & Jackson, K. (2013). Qualitative Data Analysis with NVivo (2nd ed.). SAGE Publications.
Boell, S. K., & Cecez-Kecmanovic, D. (2015). On being ‘systematic’ in literature reviews. Information Systems Journal, 25(4), 613–635. https://doi.org/10.1016/j.is.2014.07.001
Booth, A., Sutton, A., & Papaioannou, D. (2016). Systematic approaches to a successful literature review (2nd ed.). Sage.
Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77–101. https://doi.org/10.1191/1478088706qp063oa
Creswell, J. W., & Poth, C. N. (2018). Qualitative inquiry and research design: Choosing among five approaches (4th ed.). Sage Publications.
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. *MIS Quarterly, 13*(3), 319–340. https://doi.org/10.2307/249008
DeLone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: A ten-year update. *Journal of Management Information Systems, 19*(4), 9–30. https://doi.org/10.1080/07421222.2003.11045748
Guest, G., Namey, E., & Chen, M. (2020). A simple method to assess thematic saturation. PLOS ONE, 15(5), e0232076.
Haleem, A., Javaid, M., Singh, R. P., & Suman, R. (2021). Telemedicine for healthcare: Capabilities, features, barriers, and applications. Sensors International, 2, 100117. https://doi.org/10.1016/j.sintl.2021.100117
Halodoc Blog. (2024, 6 September). How Halodoc Achieved ISO/IEC 27701:2019 Certification. Halodoc Blog
Health Sector Coordinating Council. (2023). Health Industry Cybersecurity – Securing Telehealth and Telemedicine (HIC-STAT). healthsectorcouncil.org
Hernandez-Jaimes, M. L., & Martinez-Cruz, A. (2023). Artificial intelligence for IoMT security: A review of intrusion detection systems, attacks, datasets, and Cloud–Fog–Edge architectures. *Journal of Biomedical Informatics*, 136, 104206. https://www.sciencedirect.com/science/article/pii/S254266052300210X
Irwandy, I., Suharti, N., & Fadillah, R. (2024). Cybersecurity culture among healthcare workers in Indonesia. Research Square. https://www.researchsquare.com/article/rs-5421169/latest.pdf
ISO/IEC 27001:2013 - Information Security Management Systems. ISO/IEC 27001:2022 - Information security management systems
Jain, S., Ashok, P., & Prabhu, S. (2024). Emerging Technologies for Cybersecurity in Healthcare: Evaluating Risks and Implementing Standards. *IEEE Xplore*. https://ieeexplore.ieee.org/abstract/document/10803219/
Jannink, K. J. B. (2025). How do the protection motivation theory and the self-determination theory influence healthcare employees' intention to perform safe cyber behaviour? http://essay.utwente.nl/105210/
JBI. (2020). JBI manual for evidence synthesis. Scoping Reviews - Resources | JBI
K. Hasegawa, N. O'Brien, and M. Prendergast, "Cybersecurity Interventions in Health Care Organizations in Low-and Middle-Income Countries: Scoping Review," JMIR, vol. 26, no. 1, 2024. [Online]. Available: https://www.jmir.org/2024/1/e47311/
Kruse, C. S., Karem, P., Shifflett, K., Vegi, L., Ravi, K., & Brooks, M. (2017). Evaluating barriers to adopting telemedicine worldwide: A systematic review. Journal of Telemedicine and Telecare, 24(1), 4–12. https://doi.org/10.1177/1357633X16674087
Kadarisman, S. dkk. (2020). The Impact of Human Resource Management Implementation in Business Strategy in Creating Sustainable Competitive Advantage. Proceedings of the 2nd Annual Conference on Blended Learning, Educational Technology and Innovation (ACBLETI 2020). https://www.atlantis-press.com/proceedings/acbleti-20/125957860
Linkov, I., Trump, B. D., Keisler, J. M., & Collier, Z. A. (2018). Resilience and risk: Methods and application in environment, cyber, and social domains. Risk Analysis, 38(9), 1834–1845. https://doi.org/10.1111/risa.12991
Liu, X. (2024). Data ownership in the AI-powered integrated health care. JMIR Medical Informatics, 12, e57754.
Makarim, E. (2024). Telemedicine in the legal system in Indonesia. Dialogia Iuridica, 16(1).
Miles, M. B., Huberman, A. M., & Saldaña, J. (2014). Qualitative Data Analysis: A Methods Sourcebook (3rd ed.). SAGE Publications.
Monteiro, A. C. B., França, R. P., Arthur, R., & Iano, Y. (2021). An overview of the medical Internet of Things, artificial intelligence, and cloud computing employed in health care from a modern panorama. In *Healthcare Technology* (pp. xx–xx). Springer. https://link.springer.com/chapter/10.1007/978-3-030-75220-0_1
OECD. (2020). Digital security and data protection in health: Building resilience and trust. OECD Publishing. https://doi.org/10.1787/9789264812003-en
Ordonez, A. (2020). Cybersecurity in the healthcare industry (Honors thesis). DePauw University.
P. K. Sari et al.,, "Information security behavior in health information systems: a review," Healthcare, vol. 10, no. 12, 2022. [Online]. Available: https://www.mdpi.com/2227-9032/10/12/2531
P. K. Yeng, M. A. Fauzi, and B. Yang, "Human factors in cybersecurity compliance in paperless hospitals," MDPI Info, vol. 13, no. 7, 2022. [Online]. Available: https://www.mdpi.com/2078-2489/13/7/335
Page, M. J., et al., (2021). PRISMA 2020 statement. PLOS Medicine, 18(3), e1003583.
Parker, C. (2002). *The open corporation: Effective self-regulation and democracy*. Cambridge University Press. https://doi.org/10.1017/CBO9780511495194
Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. *The Journal of Psychology, 91*(1), 93–114. https://doi.org/10.1080/00223980.1975.9915803
Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. *The Journal of Psychology, 91*(1), 93–114.
Roobini, S., Kavitha, M., & Sujaritha, M. (2022). Cybersecurity threats to IoMT-enabled healthcare systems. In *Cybersecurity in IoMT* (pp. xx–xx). Taylor & Francis. https://www.taylorfrancis.com/chapters/edit/10.1201/9781003256243-6
Salas, J. A., et al., (2022). Guarding the digital health data as the front gate. Journal of Legal, Ethical & Regulatory Issues, 24(S4), 47–60.
Saleh & Winata (2023). Indonesia's Cyber Security Strategy: Problems and Challenges – IJCAH Proceedings.
Snigdha et al.,, 2025. Cybersecurity in Healthcare IT Systems: Business Risk Management and Data Privacy Strategies – TAJET Journal.
Snyder, H. (2019). Literature reviews as a research methodology: An overview and guidelines. Journal of Business Research, 104, 333–339. https://doi.org/10.1016/j.jbusres.2019.07.039
Suci, R. P., & Dhamanti, I. (2024). Cybersecurity dalam sistem informasi rumah sakit Indonesia. Journal Innovative. https://j-innovative.org/index.php/Innovative/article/download/12632/8537
Sudarsana, I. P., & Ramli, K. (2023). Information security risk assessment using factor analysis of information risk (FAIR) in the healthcare sector: Scoping review. Jurnal Darma Agung, 31(4). https://jurnal.darmaagung.ac.id/index.php/jurnaluda/article/download/3236/3198
Thomasian, N. M., & Adashi, E. Y. (2021). Cybersecurity in the Internet of Medical Things. *Clinical Therapeutics*, 43(1), 1–10. https://www.sciencedirect.com/science/article/pii/S2211883721000721
Torraco, R. J. (2016). Writing integrative literature reviews: Using the past and present to explore the future. Human Resource Development Review, 15(4), 404–428. https://doi.org/10.1177/1534484316671606
Tranfield, D., Denyer, D., & Smart, P. (2003). Towards a methodology for developing evidence-informed management knowledge by means of systematic review. British Journal of Management, 14(3), 207–222. https://doi.org/10.1111/1467-8551.00375
Tyler, T. R. (1990). Why do people obey the law? Yale University Press.
Undang-Undang Nomor 11 Tahun 2008 tentang Informasi dan Transaksi Elektronik (UU ITE).
Wong, G., Greenhalgh, T., Westhorp, G., et al., (2013). RAMESES publication standards: Realist syntheses. BMC Medicine, 11(1), 21. https://doi.org/10.1186/1741-7015-11-21
World Health Organization (WHO). (2021). Global strategy on digital health 2020–2025. World Health Organization. https://apps.who.int/iris/handle/10665/344249
Xiao, Y., & Watson, M. (2019). Guidance on conducting a systematic literature review. Journal of Planning Education and Research, 39(1), 93–112. https://doi.org/10.1177/0739456X17723971
Yeng, P. K., et al., (2022). Assessing the legal aspects of information security requirements for health care in 3 countries. JMIR Human Factors, 9(2). https://humanfactors.jmir.org/2022/2/e30050/
Yeng, P. K., Fauzi, M. A., & Yang, B. (2022). A comprehensive assessment of human factors in relation to cybersecurity compliance of healthcare staff in a paperless hospital. Preprints. https://www.academia.edu/download/89549893/preprints202203.0247.v1.pdf
Yuliaty, F. (2017). Employee Empowering Through Information Technology And Creativity In Organizations. International Journal Of Economic Perspectives. 11. 54–59.