Fig. 6From: Risk management-based security evaluation model for telemedicine systemsTelemedicine system risk assessment phaseBack to article page