1. Le Cunff AL. Mind framing: a proposed framework for personal growth [Internet]. NESS LABS; 2019 [Cited 2022 Mar 3]. Available from: https://nesslabs.com/mindframing [
Link] [
DOI:10.2139/ssrn.3443568]
2. Senn MJE, editor. Symposium on the healthy personality. Josiah Macy, Jr. Foundation; 1950. [
Link]
3. McLeod S. Erik Erikson's stages of psychosocial development. Simply Psychol [Internet]. New York: Simply Psychology; 2018 [Cited 2022 Mar 3]. Available from: https://www.simplypsychology.org/Erik-Erikson.html [
Link]
4. Ryff CD, Boylan JM, Kirsch JA. Disagreement about recommendations for measurement of well-being. Prev Med. 2020;139:106049. [
Link] [
DOI:10.1016/j.ypmed.2020.106049]
5. Pakrosnis R, Cepukiene V. Solution-focused self-help for improving university students' wellbeing. Innov Educ Teach Int. 2015;52(4):437-47. [
Link] [
DOI:10.1080/14703297.2014.930352]
6. Shoukry H, Cox E. Coaching as a social process. Manag Learn. 2018;49(4):413-28. [
Link] [
DOI:10.1177/1350507618762600]
7. World Health Organization. Primary Care. Geneva: World Health Organization; 2022 [Cited 2022 Mar 5]. Available from: https://www.who.int/teams/integrated-health-services/clinical-services-and-systems/primary-care. [
Link]
8. Wani TA, Mendoza A, Gray K. Hospital bring-your-own-device security challenges and solutions: systematic review of gray literature. JMIR mHealth uHealth. 2020;8(6):e18175. [
Link] [
DOI:10.2196/18175]
9. Seh AH, Zarour M, Alenezi M, Sarkar AK, Agrawal A, Kumar R, et al. Healthcare data breaches: insights and implications. Healthcare. 2020;8(2):133. [
Link] [
DOI:10.3390/healthcare8020133]
10. Yari IA, Dehling T, Kluge F, Geck J, Sunyaev A, Eskofier B. Security engineering of patient-centered health care information systems in peer-to-peer environments: systematic review. J Med Internet Res. 2021;23(11):e24460. [
Link] [
DOI:10.2196/24460]
11. Karyda M, Mitrou L. Data breach notification: issues and challenges for security management. MCIS. 2016:60. [
Link]
12. Dong K, Ali RF, Dominic PDD, Ali SEA. The effect of organizational information security climate on information security policy compliance: the mediating effect of social bonding towards healthcare nurses. Sustainability. 2021;13(5):2800. [
Link] [
DOI:10.3390/su13052800]
13. Cram WA, Proudfoot JG, D'arcy J. Organizational information security policies: a review and research framework. Eur J Inf Syst. 2017;26(6):605-41. [
Link] [
DOI:10.1057/s41303-017-0059-9]
14. Anwar M, He W, Ash I, Yuan X, Li L, Xu LD. Gender difference and employees' cybersecurity behaviors. Comput Hum Behav. 2017;69:437-43. [
Link] [
DOI:10.1016/j.chb.2016.12.040]
15. Mitosis KD, Lamnisos D, Talias MA. Talent management in healthcare: a systematic qualitative review. Sustainability. 2021;13(8):4469. [
Link] [
DOI:10.3390/su13084469]
16. van Woerkom M, Meyers MC. Strengthening personal growth: The effects of a strength's intervention on personal growth initiative. J Occup Organiz Psychol. 2019;92(1):98-121. [
Link] [
DOI:10.1111/joop.12240]
17. Argaw ST, Troncoso-Pastoriza JR, Lacey D, Florin MV, Calcavecchia F, Anderson D, et al. Cybersecurity of Hospitals: discussing the challenges and working towards mitigating the risks. BMC Med Inf Decis Mak. 2020;20(1). [
Link] [
DOI:10.1186/s12911-020-01161-7]
18. Song JY, Park JE. The effects of strategy of enhanced metacognition on the improvement of creative problem solving skills. J Digit Converg. 2017;15(7):1-2. [
Link]
19. Offner KL, Sitnikova E, Joiner K, MacIntyre CR. Towards understanding cybersecurity capability in Australian healthcare organizations: a systematic review of recent trends, threats and mitigation. Intell Nat Secur. 2020;35(4):556-85. [
Link] [
DOI:10.1080/02684527.2020.1752459]
20. Al-Muhtadi J, Shahzad B, Saleem K, Jameel W, Orgun MA. Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment. Health Inform J. 2019;315-29. [
Link] [
DOI:10.1177/1460458217706184]
21. Alonso SG, Arambarri J, López-Coronado M, de la Torre Díez I. Proposing new blockchain challenges in eHealth. J Med Syst. 2019;43:64. [
Link] [
DOI:10.1007/s10916-019-1195-7]
22. Bhuyan SS, Kabir UY, Escareno JM, Ector K, Palakodeti S, Wyant D, Kumar S, Levy M, Kedia S, Dasgupta D, Dobalian A. Transforming healthcare cybersecurity from reactive to proactive: current status and future recommendations. J med syst. 2020;44(5):1-9. [
Link] [
DOI:10.1007/s10916-019-1507-y]
23. Yeng PK, Yang B, Snekkenes EA. Healthcare staffs' information security practices towards mitigating data breaches: a literature survey. Stud Health Technol Inform. 2019;261:239-45. [
Link]
24. O'Connor P. O'Connor P, Benţa MI, editors. The technologisation of the social: a political anthropology of the digital machine. London: Routledge; 2021. [
Link]
25. Galinec D, Moznik D, Guberina B. Cybersecurity and cyber defense: national level strategic approach. Automatika. 2017;58(3):273-86. [
Link] [
DOI:10.1080/00051144.2017.1407022]
26. Wong LW, Lee VH, Tan GW, Ooi KB, Sohal A. The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities. Int J Inf Manag. 2022;66:102520. [
Link] [
DOI:10.1016/j.ijinfomgt.2022.102520]
27. Chen P, Chavez O, Ong DC, Gunderson B. Strategic resource use for learning: a self-administered intervention that guides self-reflection on effective resource use enhances academic performance. Psychol Sci. 2017;28(6):774-85. [
Link] [
DOI:10.1177/0956797617696456]
28. Sekaran U, Bougie R. Research methods for business: a skill building approach. 7th Edition. Hoboken: Wily; 2016. [
Link]