Fig. 2From: Risk management-based security evaluation model for telemedicine systemsSeven areas related to telemedicine security threatsBack to article page