메뉴 건너뛰기




Volumn 44, Issue 9, 2001, Pages 89-94

Security issues for implementation of e-medical records

(1)  Huston, Terry a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords


EID: 0042834000     PISSN: 00010782     EISSN: None     Source Type: Journal    
DOI: 10.1145/383694.383712     Document Type: Article
Times cited : (46)

References (12)
  • 1
    • 0011939493 scopus 로고    scopus 로고
    • Security and electronic signature standards
    • Aug. 12
    • Department of Health and Human Services. Security and electronic signature standards. Federal Register 63, 55 (Aug. 12, 1998).
    • (1998) Federal Register , vol.63 , Issue.55
  • 3
    • 0002042413 scopus 로고
    • The 9 to 5 underground: Are you policing computer crimes?
    • Summer
    • Hoffer, J.A. and Straub, D.E. The 9 to 5 underground: Are you policing computer crimes? Sloan Management Review (Summer 1989), 35-43.
    • (1989) Sloan Management Review , pp. 35-43
    • Hoffer, J.A.1    Straub, D.E.2
  • 4
    • 0024682190 scopus 로고
    • Security and control issues in local area network design
    • June
    • Jamieson, R. and Low, G. Security and control issues in local area network design. Computers and Security. (June 1989), 305-316.
    • (1989) Computers and Security , pp. 305-316
    • Jamieson, R.1    Low, G.2
  • 5
    • 0031208615 scopus 로고    scopus 로고
    • An international collaboratory based on virtual patient records
    • Aug.
    • Kilman, D.G. and Forslund, D.W. An international collaboratory based on virtual patient records. Commun. ACM 40, 8 (Aug. 1997), 111-117.
    • (1997) Commun. ACM , vol.40 , Issue.8 , pp. 111-117
    • Kilman, D.G.1    Forslund, D.W.2
  • 6
    • 0029353282 scopus 로고
    • Crossing the privacy minefield
    • Aug.
    • Kohl, D. Crossing the privacy minefield. Health Management Technology 16, 9 (Aug. 1995), 50.
    • (1995) Health Management Technology , vol.16 , Issue.9 , pp. 50
    • Kohl, D.1
  • 7
    • 0002779304 scopus 로고    scopus 로고
    • Privacy, information technology, and health care
    • Aug.
    • Rindfleisch, T.C. Privacy, information technology, and health care. Commun. ACM 40, 8 (Aug. 1997), 93-100.
    • (1997) Commun. ACM , vol.40 , Issue.8 , pp. 93-100
    • Rindfleisch, T.C.1
  • 9
    • 0030331559 scopus 로고    scopus 로고
    • Security threats are usually an inside job
    • Dec.
    • Simpson, R.L. Security threats are usually an inside job. Nursing Management 27, 12 (Dec. 1996), 43.
    • (1996) Nursing Management , vol.27 , Issue.12 , pp. 43
    • Simpson, R.L.1
  • 10
    • 84932413875 scopus 로고
    • Ensuring patient data, privacy, confidentiality, and security
    • July
    • Simpson, R.L. Ensuring patient data, privacy, confidentiality, and security. Nursing Management 25, 7 (July 1994), 18-20.
    • (1994) Nursing Management , vol.25 , Issue.7 , pp. 18-20
    • Simpson, R.L.1
  • 11
    • 0031306444 scopus 로고    scopus 로고
    • The legal and ethical aspects of telemedicine: Confidentiality and the patient's right to access
    • Stanberry, B. The legal and ethical aspects of telemedicine: Confidentiality and the patient's right to access. Journal of Telemedicine and Telecare 3 (1997), 179-187.
    • (1997) Journal of Telemedicine and Telecare , vol.3 , pp. 179-187
    • Stanberry, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.