Fig. 6From: Comprehensive user requirements engineering methodology for secure and interoperable health data exchangeAnswers to question “Do you feel well-informed regarding possible health data security risks?”Back to article page