1. Adegbenle, A., Rotimi, U. N. O. & James, A. O. A. 2020. Ethics In Biometrics Authentication. GSJ, 8.
2. Ahmed, I., Sullivan, K. & Priye, A. 2022. Multi-resin masked stereolithography (MSLA) 3D printing for rapid and inexpensive prototyping of
microfluidic chips with integrated functional components. Biosensors, 12, 652.
3. Allhoff, F. & Henschke, A. 2018. The internet of things: Foundational ethical issues. Internet of Things, 1, 55-66.
4. ALSAADI, I. M. 2015. Physiological biometric authentication systems, advantages, disadvantages and future development: A review. International
Journal of Scientific & Technology Research, 4, 285-289.
5. Alsaadi, I. M. 2021. Study on most popular behavioral biometrics, advantages, disadvantages and recent applications: A review. Int. J. Sci.
6. Anne, N., Dunbar, M. D., Abuna, F., Simpson, P., Macharia, P., Betz, B., Cherutich, P., Bukusi, D. & Carey, F. 2020. Feasibility and acceptability of an iris biometric system for unique patient identification in routine HIV services in Kenya. International journal of medical informatics, 133, 104006.
7. Aramendía, J. M. High Grade of Authentication.
8. Aurigemma, S., Mattson, T. & Leonard, L. 2017. So much promise, so little use: What is stopping home end-users from using password manager applications?
9. Ball, M. J., Hannah, K. J., Cortes-Comerer, N. & Douglas, J. V. 2023. The health informatics series: Evolving with a new discipline. International Journal of Medical Informatics, 105008.
10. Basil, N. N., Ambe, S., Ekhator, C., Fonkem, E., Nduma, B. N. & Ekhator, C. 2022. Health Records Database and Inherent Security Concerns: A Review of the Literature. Cureus, 14.
11. Bhagavatula, R., Ur, B., Iacovino, K., Kywe, S. M., Cranor, L. F. & Savvides, M. 2015. Biometric authentication on iphone and android: Usability, perceptions, and influences on adoption.
12. Bhattacharyya, D., Ranjan, R., Alisherov, F. & Choi, M. 2009. Biometric authentication: A review. International Journal of u-and e-Service, Science and Technology, 2, 13-28.
13. Brown, C. L. 2012. Health‐Care Data Protection and Biometric Authentication Policies: Comparative Culture and Technology Acceptance in China and in the United States. Review of Policy Research, 29, 141-159.
14. Campbell, J. C. 1999. A comparative analysis of mainframe and network computer security: From 1975 to present. Quinnipiac University.
15. Carter, J. H. 2001. Electronic medical records: a guide for clinicians and administrators, ACP Press.
16. Chowhan, R. S. & Tanwar, R. 2019. Password-less authentication: methods for user verification and identification to login securely over remote sites. Machine Learning and Cognitive Science Applications in Cyber Security. IGI global.
17. Chuma, K. G. & Ngoepe, M. 2022. Security of electronic personal health information in a public hospital in South Africa. Information Security Journal: A Global Perspective, 31, 179-195.
18. Dantcheva, A., Elia, P. & Ross, A. 2015. What else does your biometric data reveal? A survey on soft biometrics. IEEE Transactions on Information Forensics and Security, 11, 441-467.
19. Dauner, K. N. & Loomer, L. 2021. A qualitative assessment of barriers and facilitators associated with addressing social determinants of health among members of a health collaborative in the rural Midwest. BMC Health Services Research, 21, 1-12.
20. Doucek, P., Pavlíček, L., Sedláček, J. & Nedomová, L. 2020. Adaptation of password strength estimators to a non-English environment—the Czech experience. Computers & security, 95, 101757.
21. Effah, J., Owusu-Oware, E. & Boateng, R. 2020. Biometric identification for socioeconomic development in Ghana. Information Systems Management, 37, 136-149.
22. El-Sayed, A. 2015. Multi-biometric systems: a state of the art survey and research directions. IJACSA) International Journal of Advanced Computer Science and Applications, 6.
23. Fernández-Alemán, J. L., Señor, I. C., Lozoya, P. Á. O. & Toval, A. 2013. Security and privacy in electronic health records: A systematic literature review. Journal of Biomedical Informatics, 46, 541-562.
24. Filkins, B. L., Kim, J. Y., Roberts, B., Armstrong, W., Miller, M. A., Hultner, M. L., Castillo, A. P., Ducom, J. C., Topol, E. J. & Steinhubl, S. R. 2016. Privacy and security in the era of digital health: what should translational researchers know and do about it? Am J Transl Res, 8, 1560-80.
25. Fye, W. B. 1994. A history of the origin, evolution, and impact of electrocardiography. The American journal of cardiology, 73, 937-949.
26. Garg, M. & Goel, A. 2022. A systematic literature review on online assessment security: Current challenges and integrity strategies. Computers & Security, 113, 102544.
27. Hagener, M. 2015. Beautiful Data/The Democratic Surround. NECSUS. European Journal of Media Studies, 4, 223-227.
28. Jin, G. Z. 2018. Artificial intelligence and consumer privacy. The Economics of Artificial Intelligence: An Agenda. University of Chicago Press.
29. Johnson, A. E., Bulgarelli, L., Shen, L., Gayles, A., Shammout, A., Horng, S., Pollard, T. J., Hao, S., Moody, B. & Gow, B. 2023. Mimic-IV, a freely accessible electronic health record dataset. Scientific data, 10, 1.
30. Kassab, M. K. I., Naser, S. S. A. & Al Shobaki, M. J. 2017. An analytical study of the reality of electronic documents and electronic archiving in the management of electronic documents in the palestinian pension agency (PPA).
31. Kogetsu, A., Ogishima, S. & Kato, K. 2018. Authentication of patients and participants in health information exchange and consent for medical research: a key step for privacy protection, respect for autonomy, and trustworthiness. Frontiers in genetics, 9, 167.
32. Kreindler, S. A. 2017. The three paradoxes of patient flow: an explanatory case study. BMC Health Services Research, 17, 1-14.
33. Kumar, D., Maurya, A. K. & Baranwal, G. 2021. IoT services in healthcare industry with fog/edge and cloud computing. IoT-based data analytics for the healthcare industry. Elsevier.
34. Maeko, M. E. & Van Der Haar, D. Technical Requirements Survey on Multimodal Biometric Selection for Deployment in Governments. International Congress on Information and Communication Technology, 2023. Springer, 1057-1073.
35. Marohn, D. 2006. Biometrics in healthcare. Biometric Technology Today, 14, 9-11.
36. Merdenyan, B. & Petrie, H. 2022. Two studies of the perceptions of risk, benefits and likelihood of undertaking password management behaviours. Behaviour & Information Technology, 41, 2514-2527.
37. Mogli, G. 2012. Role of Biometrics in healthcare privacy and security management system. Sri Lanka Journal of Bio-Medical Informatics, 2.
38. Moolla, Y., De Kock, A., Mabuza-Hocquet, G., Ntshangase, C. S., Nelufule, N. & Khanyile, P. 2021. Biometric recognition of infants using fingerprint, iris, and ear biometrics. IEEE Access, 9, 38269-38286.
39. Nelson, G. S. Practical implications of sharing data: a primer on data privacy, anonymization, and de-identification. SAS global forum proceedings, 2015. 1-23.
40. NG, A. C. K. 2018. Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities: Emerging Research and Opportunities.
41. Nigam, D., Patel, S. N., Raj Vincent, P., Srinivasan, K. & Arunmozhi, S. 2022. Biometric authentication for intelligent and privacy-preserving healthcare systems. Journal of Healthcare Engineering, 2022.
42. North-Samardzic, A. 2020. Biometric technology and ethics: Beyond security applications. Journal of Business Ethics, 167, 433-450.
43. Oosthuizen, W. T. 2017. Reconciling patient safety and liability: lessons from a just culture. University of Pretoria.
44. Paul, M., Maglaras, L., Ferrag, M. A. & Almomani, I. 2023. Digitization of healthcare sector: A study on privacy and security concerns. ICT Express.
45. Politou, E., Alepis, E. & Patsakis, C. 2018. Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions. Journal of cybersecurity, 4, tyy001.
46. Razzak, M. I., Imran, M. & Xu, G. 2020. Big data analytics for preventive medicine. Neural Computing and Applications, 32, 4417-4451.
47. Reese, K., Smith, T., Dutson, J., Armknecht, J., Cameron, J. & Seamons, K. A usability study of five {two-factor} authentication methods. Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), 2019. 357-370.
48. Rodrigues, P. & Santos, H. Health users' perception of biometric authentication technologies. Proceedings of the 26th ieee international symposium on computer-based medical systems, 2013. IEEE, 320-325.
49. Ruthven, I. & Chowdhury, G. G. 2015. Cultural heritage information: Access and management, Facet publishing.
50. Sibbald, S. L., Wathen, C. N. & Kothari, A. 2016. An empirically based model for knowledge management in health care organizations. Health care management review, 41, 64-74.
51. Singh, G., Bhardwaj, G., Singh, S. V. & Garg, V. 2021a. Biometric Identification System: Security and Privacy Concern. In: AWASTHI, S., TRAVIESO- González, C. M., Sanyal, G. & Kumar Singh, D. (eds.) Artificial Intelligence for a Sustainable Industry 4.0. Cham: Springer International Publishing.
52. Singh, G., Bhardwaj, G., Singh, S. V. & Garg, V. 2021b. Biometric identification system: security and privacy concern. Artificial intelligence for a sustainable industry 4.0, 245-264.
53. Singh, H. & Sittig, D. F. 2016. Measuring and improving patient safety through health information technology: The Health IT Safety Framework. BMJ Quality & Safety, 25, 226-232.
54. Solano, J., Camacho, L., Correa, A., Deiro, C., Vargas, J. & Ochoa, M. Risk-based static authentication in web applications with behavioral biometrics and session context analytics. Applied Cryptography and Network Security Workshops: ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings 17, 2019. Springer, 3-23.
55. Sousa, M. J., Pesqueira, A. M., Lemos, C., Sousa, M. & Rocha, Á. 2019. Decision-making based on big data analytics for people management in healthcare organizations. Journal of medical systems, 43, 1-10.
56. Sula, C. A. 2015. Digital humanities and digital cultural heritage (alt-history and future directions). Cultural Heritage Information: Access and Management. London: Facet, 13-36.
57. Sutrop, M. Ethical issues in governing biometric technologies. Ethics and Policy of Biometrics: Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, ICEB 2010, Hong Kong, January 4-5, 2010. Revised Papers, 2010. Springer, 102-114.
58. Thiel, A. 2020. Biometric identification technologies and the Ghanaian ‘data revolution’. The Journal of Modern African Studies, 58, 115-136.
59. Wang, L. & Alexander, C. A. 2013. Medical applications and healthcare based on cloud computing. International Journal of Cloud Computing and Services Science, 2, 217.
60. Wells, G. A., Shea, B., O’connell, D., Peterson, J., Welch, V., Losos, M. & Tugwell, P. 2000. The Newcastle-Ottawa Scale (NOS) for assessing the quality of nonrandomised studies in meta-analyses. Oxford.
61. Zhu, H., Jin, W., Xiao, M., Murali, S. & Li, M. 2020. Blinkey: A two-factor user authentication method for virtual reality devices. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 4, 1-29.