Fig. 1From: Integrated personal health record (PHR) security: requirements and mechanismsDiagram of the research method phasesBack to article page