메뉴 건너뛰기




Volumn 12, Issue 5, 2010, Pages

Security considerations for e-mental health interventions

Author keywords

Computer security; Confidentiality; Data collection; Health technology; Implementation; Internet; Mental health; Privacy

Indexed keywords

ACCESS TO INFORMATION; ARTICLE; COMPUTER ASSISTED THERAPY; COMPUTER NETWORK; COMPUTER SECURITY; CONFIDENTIALITY; ELECTRONIC MEDICAL RECORD; HEALTH CARE QUALITY; HUMAN; MENTAL DISEASE; ORGANIZATION AND MANAGEMENT; PATIENT IDENTIFICATION;

EID: 78651279967     PISSN: None     EISSN: 14388871     Source Type: Journal    
DOI: 10.2196/jmir.1468     Document Type: Article
Times cited : (60)

References (33)
  • 1
    • 67650713941 scopus 로고    scopus 로고
    • The delivery of public health interventions via the Internet: Actualizing their potential
    • Apr. 29;, doi: 10.1146/annurev. publhealth.031308.100235
    • Bennett GG, Glasgow RE. The delivery of public health interventions via the Internet: actualizing their potential. Annu Rev Public Health 2009 Apr. 29;30:273-292. [doi: 10.1146/annurev. publhealth.031308.100235]
    • (2009) Annu. Rev. Public Health , vol.30 , pp. 273-292
    • Bennett, G.G.1    Glasgow, R.E.2
  • 2
    • 0141708000 scopus 로고    scopus 로고
    • Internet-mediated psychological services and the American psychological association ethics code
    • doi: 10.1037/0033-3204.40.1/2.103
    • Fisher CB, Fried AL. Internet-mediated psychological services and the American Psychological Association Ethics Code. Psychotherapy Theory, Research, Practice, Training 2003;40(1-2): 103-111. [doi: 10.1037/0033-3204.40.1/2.103]
    • (2003) Psychotherapy Theory, Research, Practice, Training , vol.40 , Issue.1-2 , pp. 103-111
    • Fisher, C.B.1    Fried, A.L.2
  • 3
    • 78651345497 scopus 로고    scopus 로고
    • British psychological society
    • 2nd edition URL:, WebCite Cache ID 5sw7WbHKP
    • British Psychological Society Professional Practice Board. British Psychological Society. 2009. The provision of psychological services via the Internet and other non-direct means. 2nd edition URL: http://www.bps.org.uk/ document-download-area/document-download$.cfm?file-uuid= 2EBE71C3-BB34-2107-8DF4-B07EF8B2BF7A&ext=pdf [WebCite Cache ID 5sw7WbHKP]
    • (2009) The Provision of Psychological Services Via the Internet and Other Non-direct Means
  • 4
  • 6
    • 0033314753 scopus 로고    scopus 로고
    • Overview of PKI trust models
    • DOI 10.1109/65.806987
    • Perlman R. An overview of PKI trust models. IEEE Network 1999 Dec; 13(6):38-43. [doi: 10.1109/65.806987] (Pubitemid 30526482)
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 38-43
    • Perlman, R.1
  • 7
    • 3042823607 scopus 로고    scopus 로고
    • Why security testing is hard
    • Aug;, doi: 10.1109/MSECP.2003.1219078
    • Thompson H. Why security testing is hard. IEEE Security & Privacy Magazine 2003 Aug; 1(4):83-86. [doi: 10.1109/MSECP.2003.1219078]
    • (2003) IEEE Security & Privacy Magazine , vol.1 , Issue.4 , pp. 83-86
    • Thompson, H.1
  • 8
    • 78651316056 scopus 로고    scopus 로고
    • Engineering Security Requirements URL:, accessed 2010-09-22 WebCite Cache ID 5sw88lMBv
    • Firesmith DG. The Journal of Object Technology. 2003. Engineering Security Requirements URL: http://www.jot.fm/issues/issue-2003-01/column6/ [accessed 2010-09-22] [WebCite Cache ID 5sw88lMBv]
    • (2003) The Journal of Object Technology
    • Firesmith, D.G.1
  • 9
    • 78651272803 scopus 로고    scopus 로고
    • URL:, accessed 2010-01-12 WebCite Cache ID 5mipYtCKh
    • National Vulnerability Database. URL: http://nvd.nist.gov/[accessed 2010-01-12] [WebCite Cache ID 5mipYtCKh]
  • 12
    • 78651338956 scopus 로고    scopus 로고
    • URL:, accessed 2010-01-12 WebCite Cache ID 5miqTQjEW
    • CVE. 2009. CVE-2009-2412 URL: http://cve.mitre.org/cgi-bin/cvename.cgi? name=CVE-2009-2412 [accessed 2010-01-12] [WebCite Cache ID 5miqTQjEW]
    • (2009) CVE-2009-2412
  • 13
    • 78651271528 scopus 로고    scopus 로고
    • URL:, accessed 2010-01-12 WebCite Cache ID 5miqqtycT
    • CVE. 2008. PHP: Multiple vulnerabilities URL: http://www.gentoo.org/ security/en/glsa/glsa-200811-05.xml [accessed 2010-01-12] [WebCite Cache ID 5miqqtycT]
    • (2008) PHP: Multiple Vulnerabilities
  • 14
    • 78651287709 scopus 로고    scopus 로고
    • GulfTech research and development
    • URL:, accessed 2010-01-12 WebCite Cache ID 5mir9xtjb
    • Bercegay JE. GulfTech Research and Development. 2005. Multiple Invision Power Board Vulnerabilities URL: http://www.gulftech.org/?node= research&article-id=00073-05052005 [accessed 2010-01-12] [WebCite Cache ID 5mir9xtjb]
    • (2005) Multiple Invision Power Board Vulnerabilities
    • Bercegay, J.E.1
  • 15
    • 78651315165 scopus 로고    scopus 로고
    • URL:, accessed 2010-01-12 WebCite Cache ID 5mirTSFZ2
    • SecurityFocus. Invision Power Board Login. PHP SQL Injection Vulnerability. 2005. URL: http://www.securityfocus.com/bid/13529/exploit [accessed 2010-01-12] [WebCite Cache ID 5mirTSFZ2]
    • (2005) Invision Power Board Login. PHP SQL Injection Vulnerability
  • 16
    • 0038304275 scopus 로고    scopus 로고
    • URL:, accessed 2010-01-12 WebCite Cache ID 5miraQ7Qu
    • Anley C. Advanced SQL Injection In SQL Server Applications. 2002. URL: http://www.cgisecurity.com/lib/advanced-sql-injection.pdf [accessed 2010-01-12] [WebCite Cache ID 5miraQ7Qu]
    • (2002) Advanced SQL Injection in SQL Server Applications
    • Anley, C.1
  • 18
    • 78651343960 scopus 로고    scopus 로고
    • URL:, accessed 2010-01-12 WebCite Cache ID 5mit0Km0M
    • OWASP. 2009. Data Validation URL: http://www.owasp.org/index.php/Data- Validation [accessed 2010-01-12] [WebCite Cache ID 5mit0Km0M]
    • (2009) Data Validation
  • 19
    • 78651277292 scopus 로고    scopus 로고
    • URL:, accessed 2010-01-12 WebCite Cache ID 5misp8ym1
    • Rudolph A, Curphey M. Getting It Right: Data Validation. 2007. URL: http://www.softwaremag.com/l.cfm?doc=1006-12/2006 [accessed 2010-01-12] [WebCite Cache ID 5misp8ym1]
    • (2007) Getting It Right: Data Validation
    • Rudolph, A.1    Curphey, M.2
  • 20
    • 70349285742 scopus 로고    scopus 로고
    • URL:, accessed 2010-01-12 WebCite Cache ID 5mit8BePU
    • CERT. 2008. Multiple DNS implementations vulnerable to cache poisoning URL: http://www.kb.cert.org/vuls/id/800113 [accessed 2010-01-12] [WebCite Cache ID 5mit8BePU]
    • (2008) Multiple DNS Implementations Vulnerable to Cache Poisoning
  • 22
    • 4344569744 scopus 로고    scopus 로고
    • Risk analysis in software design
    • doi: 10.1109/MSP.2004.55
    • Verdon D, McGraw G. Risk analysis in software design. IEEE Security and Privacy Magazine 2004;2(4):79-84. [doi: 10.1109/MSP.2004.55]
    • (2004) IEEE Security and Privacy Magazine , vol.2 , Issue.4 , pp. 79-84
    • Verdon, D.1    McGraw, G.2
  • 24
    • 78651297341 scopus 로고    scopus 로고
    • URL:, accessed 2010-01-12 WebCite Cache ID 5mithsiaf
    • CVE. 2006. CVE Documents URL: http://cve.mitre.org/about/documents.html [accessed 2010-01-12] [WebCite Cache ID 5mithsiaf]
    • (2006) CVE Documents
  • 26
    • 43049154856 scopus 로고    scopus 로고
    • Privacy and public health at risk: Public health confidentiality in the digital age
    • DOI 10.2105/AJPH.2006.107706
    • Myers J, Frieden TR, Bherwani KM, Henning KJ. Ethics in public health research: privacy and public health at risk: public health confidentiality in the digital age. Am J Public Health 2008 May; 98(5):793-801 [FREE Full text] [doi: 10.2105/AJPH.2006.107706] (Pubitemid 351671568)
    • (2008) American Journal of Public Health , vol.98 , Issue.5 , pp. 793-801
    • Myers, J.1    Frieden, T.R.2    Bherwani, K.M.3    Henning, K.J.4
  • 27
    • 33745446307 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, US Department of Commerce
    • NIST Special Publication 800-50 URL:, accessed 2010-09-22 WebCite Cache ID 5swBf0IVw
    • Wilson M, Hash J. National Institute of Standards and Technology, US Department of Commerce. 2003. Building An Information Technology Security Awareness and Training Program. NIST Special Publication 800-50 URL: http://csrc. nist.gov/publications/nistpubs/800-50/NIST-SP800-50.pdf [accessed 2010-09-22] [WebCite Cache ID 5swBf0IVw]
    • (2003) Building an Information Technology Security Awareness and Training Program
    • Wilson, M.1    Hash, J.2
  • 29
    • 3042782049 scopus 로고    scopus 로고
    • What is computer security?
    • doi: 10.1109/MSECP.2003.1176998
    • Bishop M. What is computer security? IEEE Security & Privacy Magazine 2003;1(1):67-69. [doi: 10.1109/MSECP.2003.1176998]
    • (2003) IEEE Security & Privacy Magazine , vol.1 , Issue.1 , pp. 67-69
    • Bishop, M.1
  • 30
    • 34250192590 scopus 로고    scopus 로고
    • Design and evaluation in ehealth: Challenges and implications for an interdisciplinary field
    • DOI 10.2196/jmir.9.2.e15
    • Pagliari C. Design and evaluation in eHealth: challenges and implications for an interdisciplinary field. J Med Internet Res 2007;9(2):e15 [FREE Full text] [doi: 10.2196/jmir.9.2.e15] (Pubitemid 47450399)
    • (2007) Journal of Medical Internet Research , vol.9 , Issue.2
    • Pagliari, C.1
  • 31
    • 33646822781 scopus 로고    scopus 로고
    • Systematic review: Impact of health information technology on quality, efficiency, and costs of medical care
    • May 16;, FREE Full text
    • Chaudhry B, Wang J, Wu S, Maglione M, Mojica W, Roth E, et al. Systematic review: impact of health information technology on quality, efficiency, and costs of medical care. Ann Intern Med 2006 May 16; 144(10):742-752 [FREE Full text]
    • (2006) Ann. Intern. Med. , vol.144 , Issue.10 , pp. 742-752
    • Chaudhry, B.1    Wang, J.2    Wu, S.3    Maglione, M.4    Mojica, W.5    Roth, E.6
  • 32
    • 33846379191 scopus 로고    scopus 로고
    • Consumers are ready to accept the transition to online and electronic records if they can be assured of the security measures
    • FREE Full text
    • Chhanabhai P, Holt A. Consumers are ready to accept the transition to online and electronic records if they can be assured of the security measures. MedGenMed 2007;9(1):8 [FREE Full text]
    • (2007) MedGenMed , vol.9 , Issue.1 , pp. 8
    • Chhanabhai, P.1    Holt, A.2
  • 33
    • 61349108696 scopus 로고    scopus 로고
    • Using the Internet to provide cognitive behaviour therapy
    • Mar;, doi: 10.1016/j.brat.2009.01.010
    • Andersson G. Using the Internet to provide cognitive behaviour therapy. Behav Res Ther 2009 Mar; 47(3):175-180. [doi: 10.1016/j.brat.2009.01.010]
    • (2009) Behav. Res. Ther. , vol.47 , Issue.3 , pp. 175-180
    • Andersson, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.