-
1
-
-
67650713941
-
The delivery of public health interventions via the Internet: Actualizing their potential
-
Apr. 29;, doi: 10.1146/annurev. publhealth.031308.100235
-
Bennett GG, Glasgow RE. The delivery of public health interventions via the Internet: actualizing their potential. Annu Rev Public Health 2009 Apr. 29;30:273-292. [doi: 10.1146/annurev. publhealth.031308.100235]
-
(2009)
Annu. Rev. Public Health
, vol.30
, pp. 273-292
-
-
Bennett, G.G.1
Glasgow, R.E.2
-
2
-
-
0141708000
-
Internet-mediated psychological services and the American psychological association ethics code
-
doi: 10.1037/0033-3204.40.1/2.103
-
Fisher CB, Fried AL. Internet-mediated psychological services and the American Psychological Association Ethics Code. Psychotherapy Theory, Research, Practice, Training 2003;40(1-2): 103-111. [doi: 10.1037/0033-3204.40.1/2.103]
-
(2003)
Psychotherapy Theory, Research, Practice, Training
, vol.40
, Issue.1-2
, pp. 103-111
-
-
Fisher, C.B.1
Fried, A.L.2
-
3
-
-
78651345497
-
British psychological society
-
2nd edition URL:, WebCite Cache ID 5sw7WbHKP
-
British Psychological Society Professional Practice Board. British Psychological Society. 2009. The provision of psychological services via the Internet and other non-direct means. 2nd edition URL: http://www.bps.org.uk/ document-download-area/document-download$.cfm?file-uuid= 2EBE71C3-BB34-2107-8DF4-B07EF8B2BF7A&ext=pdf [WebCite Cache ID 5sw7WbHKP]
-
(2009)
The Provision of Psychological Services Via the Internet and Other Non-direct Means
-
-
-
4
-
-
78449239486
-
-
URL:, accessed 2010-09-22 WebCite Cache ID 5sw7l0i5L
-
Australian Psychological Society. 2004. Guidelines for providing psychological services and products on the Internet URL: http://www.psychology. org.au/Assets/Files/EG-Internet.pdf [accessed 2010-09-22] [WebCite Cache ID 5sw7l0i5L]
-
(2004)
Guidelines for Providing Psychological Services and Products on the Internet
-
-
-
6
-
-
0033314753
-
Overview of PKI trust models
-
DOI 10.1109/65.806987
-
Perlman R. An overview of PKI trust models. IEEE Network 1999 Dec; 13(6):38-43. [doi: 10.1109/65.806987] (Pubitemid 30526482)
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 38-43
-
-
Perlman, R.1
-
7
-
-
3042823607
-
Why security testing is hard
-
Aug;, doi: 10.1109/MSECP.2003.1219078
-
Thompson H. Why security testing is hard. IEEE Security & Privacy Magazine 2003 Aug; 1(4):83-86. [doi: 10.1109/MSECP.2003.1219078]
-
(2003)
IEEE Security & Privacy Magazine
, vol.1
, Issue.4
, pp. 83-86
-
-
Thompson, H.1
-
8
-
-
78651316056
-
-
Engineering Security Requirements URL:, accessed 2010-09-22 WebCite Cache ID 5sw88lMBv
-
Firesmith DG. The Journal of Object Technology. 2003. Engineering Security Requirements URL: http://www.jot.fm/issues/issue-2003-01/column6/ [accessed 2010-09-22] [WebCite Cache ID 5sw88lMBv]
-
(2003)
The Journal of Object Technology
-
-
Firesmith, D.G.1
-
9
-
-
78651272803
-
-
URL:, accessed 2010-01-12 WebCite Cache ID 5mipYtCKh
-
National Vulnerability Database. URL: http://nvd.nist.gov/[accessed 2010-01-12] [WebCite Cache ID 5mipYtCKh]
-
-
-
-
12
-
-
78651338956
-
-
URL:, accessed 2010-01-12 WebCite Cache ID 5miqTQjEW
-
CVE. 2009. CVE-2009-2412 URL: http://cve.mitre.org/cgi-bin/cvename.cgi? name=CVE-2009-2412 [accessed 2010-01-12] [WebCite Cache ID 5miqTQjEW]
-
(2009)
CVE-2009-2412
-
-
-
13
-
-
78651271528
-
-
URL:, accessed 2010-01-12 WebCite Cache ID 5miqqtycT
-
CVE. 2008. PHP: Multiple vulnerabilities URL: http://www.gentoo.org/ security/en/glsa/glsa-200811-05.xml [accessed 2010-01-12] [WebCite Cache ID 5miqqtycT]
-
(2008)
PHP: Multiple Vulnerabilities
-
-
-
14
-
-
78651287709
-
GulfTech research and development
-
URL:, accessed 2010-01-12 WebCite Cache ID 5mir9xtjb
-
Bercegay JE. GulfTech Research and Development. 2005. Multiple Invision Power Board Vulnerabilities URL: http://www.gulftech.org/?node= research&article-id=00073-05052005 [accessed 2010-01-12] [WebCite Cache ID 5mir9xtjb]
-
(2005)
Multiple Invision Power Board Vulnerabilities
-
-
Bercegay, J.E.1
-
15
-
-
78651315165
-
-
URL:, accessed 2010-01-12 WebCite Cache ID 5mirTSFZ2
-
SecurityFocus. Invision Power Board Login. PHP SQL Injection Vulnerability. 2005. URL: http://www.securityfocus.com/bid/13529/exploit [accessed 2010-01-12] [WebCite Cache ID 5mirTSFZ2]
-
(2005)
Invision Power Board Login. PHP SQL Injection Vulnerability
-
-
-
16
-
-
0038304275
-
-
URL:, accessed 2010-01-12 WebCite Cache ID 5miraQ7Qu
-
Anley C. Advanced SQL Injection In SQL Server Applications. 2002. URL: http://www.cgisecurity.com/lib/advanced-sql-injection.pdf [accessed 2010-01-12] [WebCite Cache ID 5miraQ7Qu]
-
(2002)
Advanced SQL Injection in SQL Server Applications
-
-
Anley, C.1
-
17
-
-
14944340027
-
Identifying cross site scripting vulnerabilities in web applications
-
Presented at:, Sep. 11, 2004; Chicago, IL. doi: 10.1109/WSE.2004.10013
-
Di Lucca GA, Fasolino AR, Mastoianni M, Tramontana P. Identifying cross site scripting vulnerabilities in web applications. 2004 Presented at: the 6th IEEE International Workshop on Web Site Evolution; Sep. 11, 2004; Chicago, IL. [doi: 10.1109/WSE.2004.10013]
-
(2004)
The 6th IEEE International Workshop on Web Site Evolution
-
-
Di Lucca, G.A.1
Fasolino, A.R.2
Mastoianni, M.3
Tramontana, P.4
-
18
-
-
78651343960
-
-
URL:, accessed 2010-01-12 WebCite Cache ID 5mit0Km0M
-
OWASP. 2009. Data Validation URL: http://www.owasp.org/index.php/Data- Validation [accessed 2010-01-12] [WebCite Cache ID 5mit0Km0M]
-
(2009)
Data Validation
-
-
-
19
-
-
78651277292
-
-
URL:, accessed 2010-01-12 WebCite Cache ID 5misp8ym1
-
Rudolph A, Curphey M. Getting It Right: Data Validation. 2007. URL: http://www.softwaremag.com/l.cfm?doc=1006-12/2006 [accessed 2010-01-12] [WebCite Cache ID 5misp8ym1]
-
(2007)
Getting It Right: Data Validation
-
-
Rudolph, A.1
Curphey, M.2
-
20
-
-
70349285742
-
-
URL:, accessed 2010-01-12 WebCite Cache ID 5mit8BePU
-
CERT. 2008. Multiple DNS implementations vulnerable to cache poisoning URL: http://www.kb.cert.org/vuls/id/800113 [accessed 2010-01-12] [WebCite Cache ID 5mit8BePU]
-
(2008)
Multiple DNS Implementations Vulnerable to Cache Poisoning
-
-
-
22
-
-
4344569744
-
Risk analysis in software design
-
doi: 10.1109/MSP.2004.55
-
Verdon D, McGraw G. Risk analysis in software design. IEEE Security and Privacy Magazine 2004;2(4):79-84. [doi: 10.1109/MSP.2004.55]
-
(2004)
IEEE Security and Privacy Magazine
, vol.2
, Issue.4
, pp. 79-84
-
-
Verdon, D.1
McGraw, G.2
-
24
-
-
78651297341
-
-
URL:, accessed 2010-01-12 WebCite Cache ID 5mithsiaf
-
CVE. 2006. CVE Documents URL: http://cve.mitre.org/about/documents.html [accessed 2010-01-12] [WebCite Cache ID 5mithsiaf]
-
(2006)
CVE Documents
-
-
-
26
-
-
43049154856
-
Privacy and public health at risk: Public health confidentiality in the digital age
-
DOI 10.2105/AJPH.2006.107706
-
Myers J, Frieden TR, Bherwani KM, Henning KJ. Ethics in public health research: privacy and public health at risk: public health confidentiality in the digital age. Am J Public Health 2008 May; 98(5):793-801 [FREE Full text] [doi: 10.2105/AJPH.2006.107706] (Pubitemid 351671568)
-
(2008)
American Journal of Public Health
, vol.98
, Issue.5
, pp. 793-801
-
-
Myers, J.1
Frieden, T.R.2
Bherwani, K.M.3
Henning, K.J.4
-
27
-
-
33745446307
-
National Institute of Standards and Technology, US Department of Commerce
-
NIST Special Publication 800-50 URL:, accessed 2010-09-22 WebCite Cache ID 5swBf0IVw
-
Wilson M, Hash J. National Institute of Standards and Technology, US Department of Commerce. 2003. Building An Information Technology Security Awareness and Training Program. NIST Special Publication 800-50 URL: http://csrc. nist.gov/publications/nistpubs/800-50/NIST-SP800-50.pdf [accessed 2010-09-22] [WebCite Cache ID 5swBf0IVw]
-
(2003)
Building an Information Technology Security Awareness and Training Program
-
-
Wilson, M.1
Hash, J.2
-
28
-
-
78651342733
-
National Institute of Institute of Standards and Technology, US Department of Commerce
-
NIST Special Publication 800-16 URL:, accessed 2010-09-22 WebCite Cache ID 5swFmfNei
-
Wilson M, de Zafra DE, Pitcher SI, Tressler JD, Ippolito JB. National Institute of Institute of Standards and Technology, US Department of Commerce. Information Technology Security Training Requirements: A Role-and Performance-Based Model. NIST Special Publication 800-16 URL: http://csrc.nist.gov/publications/nistpubs/800-16/800-16.pdf [accessed 2010-09-22] [WebCite Cache ID 5swFmfNei]
-
Information Technology Security Training Requirements: A Role-and Performance-Based Model
-
-
Wilson, M.1
De Zafra, D.E.2
Pitcher, S.I.3
Tressler, J.D.4
Ippolito, J.B.5
-
29
-
-
3042782049
-
What is computer security?
-
doi: 10.1109/MSECP.2003.1176998
-
Bishop M. What is computer security? IEEE Security & Privacy Magazine 2003;1(1):67-69. [doi: 10.1109/MSECP.2003.1176998]
-
(2003)
IEEE Security & Privacy Magazine
, vol.1
, Issue.1
, pp. 67-69
-
-
Bishop, M.1
-
30
-
-
34250192590
-
Design and evaluation in ehealth: Challenges and implications for an interdisciplinary field
-
DOI 10.2196/jmir.9.2.e15
-
Pagliari C. Design and evaluation in eHealth: challenges and implications for an interdisciplinary field. J Med Internet Res 2007;9(2):e15 [FREE Full text] [doi: 10.2196/jmir.9.2.e15] (Pubitemid 47450399)
-
(2007)
Journal of Medical Internet Research
, vol.9
, Issue.2
-
-
Pagliari, C.1
-
31
-
-
33646822781
-
Systematic review: Impact of health information technology on quality, efficiency, and costs of medical care
-
May 16;, FREE Full text
-
Chaudhry B, Wang J, Wu S, Maglione M, Mojica W, Roth E, et al. Systematic review: impact of health information technology on quality, efficiency, and costs of medical care. Ann Intern Med 2006 May 16; 144(10):742-752 [FREE Full text]
-
(2006)
Ann. Intern. Med.
, vol.144
, Issue.10
, pp. 742-752
-
-
Chaudhry, B.1
Wang, J.2
Wu, S.3
Maglione, M.4
Mojica, W.5
Roth, E.6
-
32
-
-
33846379191
-
Consumers are ready to accept the transition to online and electronic records if they can be assured of the security measures
-
FREE Full text
-
Chhanabhai P, Holt A. Consumers are ready to accept the transition to online and electronic records if they can be assured of the security measures. MedGenMed 2007;9(1):8 [FREE Full text]
-
(2007)
MedGenMed
, vol.9
, Issue.1
, pp. 8
-
-
Chhanabhai, P.1
Holt, A.2
-
33
-
-
61349108696
-
Using the Internet to provide cognitive behaviour therapy
-
Mar;, doi: 10.1016/j.brat.2009.01.010
-
Andersson G. Using the Internet to provide cognitive behaviour therapy. Behav Res Ther 2009 Mar; 47(3):175-180. [doi: 10.1016/j.brat.2009.01.010]
-
(2009)
Behav. Res. Ther.
, vol.47
, Issue.3
, pp. 175-180
-
-
Andersson, G.1
|