Fig. 1From: Underestimating attacks: comparing two sources of publicly-available data about attacks on health care in 2017Data preparation process with summary of event data and inclusion filtersBack to article page