[5] Kim, L., Cybersecurity awareness: Protecting
data and patients. Nursing, Vol. 47, No. 6,
2022, pp.65-67.
[6] ViewSonic, Screen Privacy: How to protect
yourself from visual hacking, January 17,
2021, [Online],
https://www.viewsonic.com/library/tech/scree
n-privacy-how-to-protect-yourself-from-
visual-hacking/ (Accessed Date: 6 March
2023).
[7] Rajamäki, J. & Hummelholm, A. Ethical
Resilience Management Framework for
Critical Healthcare Information Infrastructure,
WSEAS Transactions on Biology and
Biomedicine, Vol. 19, 2022, pp.67-76.
https://doi.org/10.37394/23208.2022.19.9.
[8] Statista, Most commonly reported cyber crime
categories in the United States in 2022, by
number of individuals affected,
https://www.statista.com/statistics/184083/co
mmonly-reported-types-of-cyber-crime-
global/ (Accessed Date: 6 May 2023).
[9] Baxter, P. & Jack, S., Quality case study
methodology: Study design and
implementation for novice researchers, The
Qualitative Report, Vol. 13, No. 4, 2008,
pp.544-559.
[10] Yin, R. K., Case study research design and
methods (4th ed.), Sage Publications, 2009.
[11] Patton, M., Qualitative evaluation and
research methods (2nd ed.), Sage
Publications, 1990.
[12] Miles, M. B. & Huberman, A. M., Qualitative
data analysis: An expanded sourcebook, Sage
Publications, 1994.
[13] Robson, C., Real world research (2nd ed.),
Blackwell Publishing, 2002.
[14] Jalali, M. S., Bruckes, M., Westmattelmann,
D. & Schewe, G., Why Employees (Still)
Click on Phishing Links: Investigation in
Hospitals. Journal of Medical Internet
Research, Vol. 22, No. 1, 2020, e16775.
[15] Rajamäki, J., Rathod, P., & Kioskli, K.,
Demand Analysis of the Cybersecurity
Knowledge Areas and Skills for the Nurses:
Preliminary Findings, European Conference
on Cyber Warfare and Security, Vol. 22, No.
1, 2023, pp.711-716.
[16] Yeng, P. K., Fauzi, M.A., Yang, B. & Nimbe,
P., Investigation into Phishing Risk Behaviour
among Healthcare Staff, Information, Vol. 13,
Issue 8, 2022, pp.392.
[17] Rizzoni, F., Magalini, S., Casaroli, A.,
Pasquale, M., Dixon, M., & Coventry, L.,
Phishing simulation exercise in a large
hospital: A case study, Digital Health, Vol. 8,
2022, pp.1–13.
[18] Rozentals. E., Email load and stress impact
on susceptibility to phishing and scam emails,
Luleå University of Technology, 2021.
[19] Halevi. T., Memon. N. & Nov, O, Spear-
phishing in the wild: a real-world study of
personality, phishing self-efficacy and
vulnerability to spear-phishing attacks, SSRN
eJournal, January 2, 2015, [Online],
https://ssrn.com/abstract=2544742 (Accessed
Date: 5 May 2023).
[20] ViewSonic, Screen Privacy: How to protect
yourself from visual hacking, Jan 17, 2021,
[Online],
https://www.viewsonic.com/library/tech/scree
n-privacy-how-to-protect-yourself-from-
visual-hacking/ (Accessed Date: 22
September 2023).
[21] Sobh, T. S., Networks security and accessing
control, International Journal of Computer
Network and Information Security, Vol. 5,
Issue 7, 2013, pp.9-20.
[22] Nissim, N., Yahalom, R. & Elovici, Y., USB-
based attacks, Computers & Security, Vol. 70,
2017, pp.675-688.
[23] Politou, E., Michota, A., Alepis, E., Pocs, M.
& Patsakis, C., Backups and the right to be
forgotten in the GDPR: An uneasy
relationship, Computer Law & Security
Review, Vol. 34, Iss. 6, 2018, pp.1247-1257.
[24] Rajamäki, J. "Resilience Management
Concept for Railways and Metro Cyber-
Physical Systems," in Proceeding of the 20th
European Conference on Cyber Warfare and
Security ECCWS, T. Eze, Ed., Reading,
Academic Conferences International Limited,
2021, pp.337-345.
[25] National Security Authority of Finland,
KATAKRI 2020 Information Security Audit
Tool for Authorities, National Security
Authority, Helsinki, 2020.
WSEAS TRANSACTIONS on COMPUTERS
DOI: 10.37394/23205.2023.22.23
Jyri Rajamäki, Niroj Chaulagain,
Markus Kukkonen, Pessi Nurmi,
Mikko Honkonen, Samu Saarinen, Torsti Kinnunen