메뉴 건너뛰기




Volumn 13, Issue 1, 2011, Pages

How strong are passwords used to protect personal health information in clinical trials?

Author keywords

Passwords; Privacy; Security

Indexed keywords

ARTICLE; CLINICAL TRIAL (TOPIC); COMPUTER SECURITY; CONSUMER HEALTH INFORMATION; E-MAIL; HUMAN; INFORMATION RETRIEVAL; METHODOLOGY; PRIVACY;

EID: 79953076040     PISSN: None     EISSN: 14388871     Source Type: Journal    
DOI: 10.2196/jmir.1335     Document Type: Article
Times cited : (22)

References (62)
  • 1
    • 62449259659 scopus 로고    scopus 로고
    • The use of electronic data capture tools in clinical trials: Web-survey of 259 Canadian trials
    • [FREE Full text] [ doi: 10.2196/jmir.1120] [Medline: 19275984]
    • El Emam K, Jonker E, Sampson M, Krleza-Jerić K, Neisa A. The use of electronic data capture tools in clinical trials: Web-survey of 259 Canadian trials. J Med Internet Res 2009;11(1):e8 [FREE Full text] [doi: 10.2196/jmir.1120] [Medline: 19275984]
    • (2009) J Med Internet Res , vol.11 , Issue.1
    • El Emam, K.1    Jonker, E.2    Sampson, M.3    Krleza-Jerić, K.4    Neisa, A.5
  • 3
    • 62449127938 scopus 로고    scopus 로고
    • Healthcare Information and Management Systems Society Foundation, Chicago IL: HIMSS Foundation
    • Healthcare Information and Management Systems Society Foundation. Healthcare CIO Results. Chicago, IL: HIMSS Foundation; 2004.
    • (2004) Healthcare CIO Results
  • 4
    • 2442486401 scopus 로고    scopus 로고
    • Current state of information technology use in a US primary care practice-based research network
    • Andrews JE, Pearce KA, Sydney C, Ireson C, Love M. Current state of information technology use in a US primary care practice-based research network. Inform Prim Care 2004; 12(1):11-18. [Medline: 15140348] (Pubitemid 38647404)
    • (2004) Informatics in Primary Care , vol.12 , Issue.1 , pp. 11-18
    • Andrew, J.E.1    Pearce, K.A.2    Sydney, C.3    Ireson, C.4    Love, M.5
  • 8
    • 69549117388 scopus 로고    scopus 로고
    • Evaluating the risk of re-identification of patients from hospital prescription records
    • [FREE Full text] [WebCite Cache]
    • El Emam K, Dankar FK, Vaillancourt R, Roffey T, Lysyk M. Evaluating the risk of re-identification of patients from hospital prescription records. Can J Hosp Pharm 2009;62(4):307-319 [FREE Full text] [WebCite Cache]
    • (2009) Can J Hosp Pharm , vol.62 , Issue.4 , pp. 307-319
    • El Emam, K.1    Dankar, F.K.2    Vaillancourt, R.3    Roffey, T.4    Lysyk, M.5
  • 9
    • 65249152887 scopus 로고    scopus 로고
    • Privacy interests in prescription records, part 2: Patient privacy
    • doi: 10.1109/MSP.2009.47
    • El Emam K, Kosseim P. Privacy interests in prescription records, part 2: patient privacy. IEEE Security & Privacy Magazine 2009;7(2):75-78. [doi: 10.1109/MSP.2009.47]
    • (2009) IEEE Security & Privacy Magazine , vol.7 , Issue.2 , pp. 75-78
    • El Emam, K.1    Kosseim, P.2
  • 10
    • 33846936304 scopus 로고    scopus 로고
    • Evaluating common de-identification heuristics for personal health information
    • DOI 10.2196/jmir.8.4.e28
    • El Emam K, Jabbouri S, Sams S, Drouet Y, Power M. Evaluating common de-identification heuristics for personal health information. J Med Internet Res 2006; 8(4):e28 [FREE Full text] [doi: 10.2196/jmir.8.4.e28] [Medline: 17213047] (Pubitemid 47450199)
    • (2006) Journal of Medical Internet Research , vol.8 , Issue.4
    • El Emam, K.1    Jabbouri, S.2    Sams, S.3    Drouet, Y.4    Power, M.5
  • 12
    • 41649087324 scopus 로고    scopus 로고
    • The effect of privacy legislation on observational research
    • DOI 10.1503/cmaj.061353
    • Gershon AS, Tu JV. The effect of privacy legislation on observational research. CMAJ 2008 Mar 25; 178(7):871-873. [doi: 10.1503/cmaj.061353] [Medline: 18362384] (Pubitemid 351482295)
    • (2008) Canadian Medical Association Journal , vol.178 , Issue.7 , pp. 871-873
    • Gershon, A.S.1    Tu, J.V.2
  • 13
    • 80052453643 scopus 로고    scopus 로고
    • Office of the Privacy Commissioner of Ontario, [accessed 2007-04-20] [WebCite Cache ID 5OFOzaj1O]
    • Cavoukian A. Office of the Privacy Commissioner of Ontario. 2007. Order HO-004 URL: http://www.ipc.on.ca/images/Findings/up-3ho-004.pdf [accessed 2007-04-20] [WebCite Cache ID 5OFOzaj1O]
    • (2007) Order HO-004
    • Cavoukian, A.1
  • 16
    • 84888863423 scopus 로고    scopus 로고
    • Ad-hoc guesting: When exceptions are the rule
    • Apr 14, San Francisco, CA, [WebCite Cache]
    • Dalal B, Nelson L, Smetters D, Good N, Elliot A. Ad-hoc guesting: when exceptions are the rule. 2008 Presented at: Usability, Psychology, and Security 2008; Apr 14, 2008; San Francisco, CA URL: http://www.usenix.org/events/upsec08/ tech/full-papers/dalal/dalal-html/dalal.html [WebCite Cache]
    • (2008) Usability, Psychology, and Security 2008
    • Dalal, B.1    Nelson, L.2    Smetters, D.3    Good, N.4    Elliot, A.5
  • 17
    • 33745858717 scopus 로고    scopus 로고
    • Share and share alike: Exploring the user interface affordances of file sharing
    • CHI 2006: Conference on Human Factors in Computing Systems, Conference Proceedings SIGCHI
    • Voida S, Edwards WK, Newman MW, Grinter RE, Ducheneaut N. Share and share alike: exploring the user interface affordances of file sharing. In: Proceedings of ACM CHI 2006 Conference on Human Factors in Computing Systems. New York, NY: ACM Press; 2006:221-230. (Pubitemid 44032105)
    • (2006) Conference on Human Factors in Computing Systems - Proceedings , vol.1 , pp. 221-230
    • Voida, S.1    Edwards, W.K.2    Newman, M.W.3    Grinter, R.E.4    Ducheneaut, N.5
  • 19
    • 79953074755 scopus 로고    scopus 로고
    • Osterman Research. Proofpoint, [accessed 2010-12-13] [WebCite Cache ID 5ux9tNwBx]
    • Osterman Research. Proofpoint. 2010. Outbound Email and Data Loss Prevention in Today's Enterprise URL: http://www.proofpoint.com/downloads/ Proofpoint-Outbound-Email-and-Data-Loss-Prevention-2010.pdf [accessed 2010-12-13] [WebCite Cache ID 5ux9tNwBx]
    • (2010) Outbound Email and Data Loss Prevention in Today's Enterprise
  • 22
    • 79953081194 scopus 로고    scopus 로고
    • Applied clinical trials online
    • [WebCite Cache ID 5tBqd7lO7]
    • Applied Clinical Trials Online. 2009. Document Management Inefficiencies Cost Sites Time and Money Says Intralinks' Survey URL: http:// appliedclinicaltrialsonline.findpharma.com/appliedclinicaltrials/News/ Document-Management-Inefficiencies-Cost-Sites-Time/ArticleStandard/Article/ detail/601186?contextCategoryId=44911&ref=25 [WebCite Cache ID 5tBqd7lO7]
    • (2009) Document Management Inefficiencies Cost Sites Time and Money Says Intralinks' Survey
  • 23
    • 79953071021 scopus 로고    scopus 로고
    • SANS Institute InfoSec Reading Room, [accessed 2010-12-13] [WebCite Cache ID 5uxAd8Ign]
    • Schmidt DA. SANS Institute InfoSec Reading Room. 2003. E-mail Communication With Patients in the Wake of the HIPAA Final Security Rule URL: http://www.sans.org/reading-room/whitepapers/legal/e-mail-communication- patients-wake-hipaa-final-security-rule-1057 [accessed 2010-12-13] [WebCite Cache ID 5uxAd8Ign]
    • (2003) E-mail Communication With Patients in the Wake of the HIPAA Final Security Rule
    • Schmidt, D.A.1
  • 24
    • 78650274256 scopus 로고    scopus 로고
    • HIMSS Foundation. Healthcare Information and Management Systems Society, [accessed 2010-12-13] [WebCite Cache ID 5uxApn1kW]
    • HIMSS Foundation. Healthcare Information and Management Systems Society. 2009. 2009 HIMSS Security Survey URL: http://www.himss.org/content/files/ HIMSS2009SecuritySurveyReport.pdf [accessed 2010-12-13] [WebCite Cache ID 5uxApn1kW]
    • (2009) 2009 HIMSS Security Survey
  • 26
    • 79953114481 scopus 로고    scopus 로고
    • Wall street journal
    • [accessed 2010-10-03] [WebCite Cache ID 5tCoEs06a]
    • Worthen B. Wall Street Journal. 2008. New data privacy laws set for firms URL: http://online.wsj.com/article/SB122411532152538495.html [accessed 2010-10-03] [WebCite Cache ID 5tCoEs06a]
    • (2008) New Data Privacy Laws Set for Firms
    • Worthen, B.1
  • 27
    • 79953090898 scopus 로고    scopus 로고
    • Redbridge Primary care Trust (NHS), [accessed 2010-12-13] [WebCite Cache ID 5uxBTsEuk]
    • Cottis P. Redbridge Primary care Trust (NHS). 2008. Transferring Personal Information Policy and Procedures URL: http://www.redbridge.nhs.uk/files/ documents/1030-transferring%20personal%20information%20policy%20080215.pdf [accessed 2010-12-13] [WebCite Cache ID 5uxBTsEuk]
    • (2008) Transferring Personal Information Policy and Procedures
    • Cottis, P.1
  • 28
    • 79953110795 scopus 로고    scopus 로고
    • Research Computing. Partners Healthcare, [accessed 2010-10-03] [WebCite Cache ID 5tCnUoOn3]
    • Research Computing. Partners Healthcare. 2010. Email Encryption URL: http://rc.partners.org/emailencryption/ [accessed 2010-10-03] [WebCite Cache ID 5tCnUoOn3]
    • (2010) Email Encryption
  • 29
    • 84856092527 scopus 로고    scopus 로고
    • University of Edinburgh Community Health Sciences, [accessed 2010-12-22] [WebCite Cache ID 5vAdm66WW]
    • Chalmers L. University of Edinburgh, Community Health Sciences. 2007. Guidance to Research and the Data Protection Act URL: http://www.chs.med.ed.ac. uk/cphs/researchTraining/DPResearch.pdf [accessed 2010-12-22] [WebCite Cache ID 5vAdm66WW]
    • (2007) Guidance to Research and the Data Protection Act
    • Chalmers, L.1
  • 30
    • 0004066218 scopus 로고    scopus 로고
    • US Department of Health and Human Services, Food and Drug Administration, Office of the Commissioner. FDA, [accessed 2009-01-11] [WebCite Cache ID 5dkOZy0uG]
    • US Department of Health and Human Services, Food and Drug Administration, Office of the Commissioner. FDA. 2007. Guidance for Industry: Computerized Systems Used in Clinical Investigations URL: http://www.fda.gov/Cder/Guidance/ 7359fnl.pdf [accessed 2009-01-11] [WebCite Cache ID 5dkOZy0uG]
    • (2007) Guidance for Industry: Computerized Systems Used in Clinical Investigations
  • 31
    • 79953071950 scopus 로고    scopus 로고
    • Good Automated Manufacturing Practice Forum. The Good Automated Manufacturing Practice (GAMP) Guide for Validation of Automated Systems in Pharmaceutical Manufacture. Tampa, FL: International Society for Pharmaceutical Engineering; 2002
    • Good Automated Manufacturing Practice Forum. The Good Automated Manufacturing Practice (GAMP) Guide for Validation of Automated Systems in Pharmaceutical Manufacture. Tampa, FL: International Society for Pharmaceutical Engineering; 2002.
  • 32
    • 0037579452 scopus 로고    scopus 로고
    • US Department of Health and Human Services, Food and Drug Administration, Center for Drug Evaluation and Research, Center for Biologic Evaluation and Research, Center for Devices and Radiological Health, Center for Food Safety and Applied Nutrition, Center for Veterinary Medicine, Office of Regulatory Affairs. FDA, [accessed 2009-01-11] [WebCite Cache ID 5dkOj5uYQ]
    • US Department of Health and Human Services, Food and Drug Administration, Center for Drug Evaluation and Research, Center for Biologic Evaluation and Research, Center for Devices and Radiological Health, Center for Food Safety and Applied Nutrition, Center for Veterinary Medicine, Office of Regulatory Affairs. FDA. 2003. Guidance for Industry: Part 11, Electronic Records; Electronic Signatures - Scope and Application URL: http://www.fda.gov/cder/ guidance/5667fnl.pdf [accessed 2009-01-11] [WebCite Cache ID 5dkOj5uYQ]
    • (2003) Guidance for Industry: Part 11, Electronic Records; Electronic Signatures - Scope and Application
  • 33
    • 0001273922 scopus 로고    scopus 로고
    • 21 CFR Part 11: Electronic records; Electronic signatures; Final rule
    • US Department of Health and Human Services, Food and Drug Administration, [FREE Full text] [WebCite Cache]
    • US Department of Health and Human Services, Food and Drug Administration. 21 CFR Part 11: electronic records; electronic signatures; final rule. Federal Register 1997; 62(54):13430-13466 [FREE Full text] [WebCite Cache]
    • (1997) Federal Register , vol.62 , Issue.54 , pp. 13430-13466
  • 34
    • 0004066218 scopus 로고    scopus 로고
    • US Department of Health and Human Services, Food and Drug Administration, Center for Biologic Evaluation and Research, Center for Drug Evaluation and Research, Center for Devices and Radiological Health, Center for Food Safety and Applied Nutrition, Center for Veterinary Medicine, Office of Regulatory Affairs. FDA, [accessed 2011-01-14] [WebCite Cache ID 5vjx3KTzB]
    • US Department of Health and Human Services, Food and Drug Administration, Center for Biologic Evaluation and Research, Center for Drug Evaluation and Research, Center for Devices and Radiological Health, Center for Food Safety and Applied Nutrition, Center for Veterinary Medicine, Office of Regulatory Affairs. FDA. 1999. Guidance For Industry: Computerized Systems Used in Clinical Trials URL: http://www.fda.gov/ora/compliance-ref/bimo/ffinalcct.pdf [accessed 2011-01-14] [WebCite Cache ID 5vjx3KTzB]
    • (1999) Guidance For Industry: Computerized Systems Used in Clinical Trials
  • 35
    • 79953088130 scopus 로고    scopus 로고
    • International Pharmaceutical Privacy Consortium. IPPC, [accessed 2010-12-23] [WebCite Cache ID 5vCIzGZd7]
    • International Pharmaceutical Privacy Consortium. IPPC. 2006. Transmission Security Practices of Pharma Sponsors of Clinical Research URL: http://www.pharmaprivacy.org/download/Clinical-Research-Transmission-Security. pdf [accessed 2010-12-23] [WebCite Cache ID 5vCIzGZd7]
    • (2006) Transmission Security Practices of Pharma Sponsors of Clinical Research
  • 36
    • 79953096035 scopus 로고    scopus 로고
    • US Department of Health and Human Services, Food and Drug Administration. FDA, [accessed 2010-10-01] [WebCite Cache ID 5t9ze5Jnr]
    • US Department of Health and Human Services, Food and Drug Administration. FDA. 2010. FDA to Conduct Inspections Focusing on 21 CFR 11 (Part 11) Requirements Relating to Human Drugs URL: http://www.fda.gov/AboutFDA/ CentersOffices/CDER/ucm204012.htm [accessed 2010-10-01] [WebCite Cache ID 5t9ze5Jnr]
    • (2010) FDA to Conduct Inspections Focusing on 21 CFR 11 (Part 11) Requirements Relating to Human Drugs
  • 37
    • 0037374498 scopus 로고    scopus 로고
    • The price of innovation: New estimates of drug development costs
    • DOI 10.1016/S0167-6296(02)00126-1
    • DiMasi JA, Hansen RW, Grabowski HG. The price of innovation: new estimates of drug development costs. J Health Econ 2003 Mar;22(2):151-185. [doi: 10.1016/S0167-6296(02)00126-1] [Medline: 12606142] (Pubitemid 36279392)
    • (2003) Journal of Health Economics , vol.22 , Issue.2 , pp. 151-185
    • DiMasi, J.A.1    Hansen, R.W.2    Grabowski, H.G.3
  • 40
    • 85001728633 scopus 로고    scopus 로고
    • Password security: An empirical investigation into e-commerce passwords and their crack times
    • doi: 10.1080/10658980601051318
    • Cazier JA, Medlin BD. Password security: an empirical investigation into e-commerce passwords and their crack times. Information Security Journal 2006;15(6):45-55. [doi: 10.1080/10658980601051318]
    • (2006) Information Security Journal , vol.15 , Issue.6 , pp. 45-55
    • Cazier, J.A.1    Medlin, B.D.2
  • 41
    • 79953092324 scopus 로고    scopus 로고
    • Microsoft, [accessed 2010-12-17] [WebCite Cache ID 5v3FVk3pw]
    • Microsoft. 2003. Microsoft Office 2003 Editions Security Whitepaper URL: http://office.microsoft.com/download/afile.aspx?AssetID=AM102424861033 [accessed 2010-12-17] [WebCite Cache ID 5v3FVk3pw]
    • (2003) Microsoft Office 2003 Editions Security Whitepaper
  • 43
    • 38349024932 scopus 로고    scopus 로고
    • International Association for Cryptologic Research, [accessed 2011-01-14] [WebCite Cache ID 5vjxZJxof]
    • Wu H. International Association for Cryptologic Research. 2005. The Misuse of RC4 in Microsoft Word and Excel URL: http://eprint.iacr.org/2005/007. pdf [accessed 2011-01-14] [WebCite Cache ID 5vjxZJxof]
    • (2005) The Misuse of RC4 in Microsoft Word and Excel
    • Wu, H.1
  • 44
    • 78649494320 scopus 로고    scopus 로고
    • How secure is your information system? An investigation into actual healthcare worker password practices
    • Medline: 18066366
    • Cazier JA, Medlin BD. How secure is your information system? An investigation into actual healthcare worker password practices. Perspect Health Inf Manag 2006;3:8. [Medline: 18066366]
    • (2006) Perspect Health Inf Manag , vol.3 , pp. 8
    • Cazier, J.A.1    Medlin, B.D.2
  • 45
    • 79953114176 scopus 로고    scopus 로고
    • CBCnews.ca, Aug 04, [WebCite Cache ID 5rkr1UjXO]
    • CBCnews.ca. 2010 Aug 04. Hundreds of Ont. Patient Health Files Stolen URL: http://www.cbc.ca/canada/toronto/story/2010/08/04/usb-medical-files- stolen684.html?ref=rss&loomia-si=t0:a16:g2:r5:c0.0440057:b36264812 [WebCite Cache ID 5rkr1UjXO]
    • (2010) Hundreds of Ont. Patient Health Files Stolen
  • 46
    • 79953114177 scopus 로고    scopus 로고
    • Microsoft Corporation. Microsoft, [accessed 2010-09-29] [WebCite Cache ID 5t76jss0L]
    • Microsoft Corporation. Microsoft. 2010. Password Policy URL: http://office.microsoft.com/en-ca/excel-help/password-policy-HA010355926.aspx [accessed 2010-09-29] [WebCite Cache ID 5t76jss0L]
    • (2010) Password Policy
  • 47
    • 48749111433 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, [accessed 2010-12-16] [WebCite Cache ID 5v1jynapa]
    • Bisker S, Tracy M, Jansen W. National Institute of Standards and Technology. 2002. Guidelines on Electronic Mail Security URL: http://www.21cfrpart11.com/files/library/security/guidelines-on-email-sec.pdf [accessed 2010-12-16] [WebCite Cache ID 5v1jynapa]
    • (2002) Guidelines on Electronic Mail Security
    • Bisker, S.1    Tracy, M.2    Jansen, W.3
  • 49
    • 81155140118 scopus 로고    scopus 로고
    • Why Johnny still can't encrypt: Evaluating the usability of email encryption software
    • CyLab Usable Privacy and Security Laboratory, Carnegie Mellon University, Jul 12-14, Pittsburgh, PA, [WebCite Cache]
    • Sheng S, Broderick L, Koranda CA, Hyland JJ. Why Johnny still can't encrypt: evaluating the usability of email encryption software. In: CyLab Usable Privacy and Security Laboratory, Carnegie Mellon University. 2006 Presented at: Symposium On Usable Privacy and Security; Jul 12-14, 2006; Pittsburgh, PA URL: http://cups.cs.cmu.edu/soups/2006/posters/sheng-poster-abstract.pdf [WebCite Cache]
    • (2006) Symposium On Usable Privacy and Security
    • Sheng, S.1    Broderick, L.2    Koranda, C.A.3    Hyland, J.J.4
  • 50
    • 33646703264 scopus 로고    scopus 로고
    • Johnny 2: A user test of key continuity management with S/MIME and Outlook Express
    • CyLab Usable Privacy and Security Laboratory, Carnegie Mellon University; Jul 6-8, Pittsburgh, PA, [WebCite Cache]
    • Garfinkel SL, Miller RC. Johnny 2: a user test of key continuity management with S/MIME and Outlook Express. In: CyLab Usable Privacy and Security Laboratory, Carnegie Mellon University. 2005 Presented at: Symposium On Usable Privacy and Security; Jul 6-8, 2005; Pittsburgh, PA URL: http://cups.cs.cmu.edu/soups/2005/2005proceedings/p13-garfinkel.pdf [WebCite Cache]
    • (2005) Symposium On Usable Privacy and Security
    • Garfinkel, S.L.1    Miller, R.C.2
  • 51
    • 79953120569 scopus 로고    scopus 로고
    • [accessed 2011-01-14] [WebCite Cache ID 5vjxoiPus]
    • Firstbrook P, Ouellet E. Gartner. 2010. Magic Quadrant for Secure E-mail Gateways URL: http://synctech.com.vn/Casestudy/ Gartner%20Magic%20Quadrant%20for%20Secure%20Email%20Gateways-2010.pdf [accessed 2011-01-14] [WebCite Cache ID 5vjxoiPus]
    • (2010) Magic Quadrant for Secure E-mail Gateways
    • Firstbrook, P.1    Gartner, O.E.2
  • 52
    • 79953095418 scopus 로고    scopus 로고
    • WinZip Computing. WinZip.com, [accessed 2010-09-28] [WebCite Cache ID 5t5VpbDwr]
    • WinZip Computing. WinZip.com. How Do You Encrypt Files in a Zip File with WinZip? 2010 URL: http://kb.winzip.com/kb/entry/78/ [accessed 2010-09-28] [WebCite Cache ID 5t5VpbDwr]
    • (2010) How Do You Encrypt Files in a Zip File with WinZip?
  • 53
    • 79953115711 scopus 로고    scopus 로고
    • WinZip Computing. WinZip.com, [accessed 2010-09-28] [WebCite Cache ID 5t5VlTV7O]
    • WinZip Computing. WinZip.com. 2010. Password Policy For Encryption URL: http://kb.winzip.com/kb/entry/260/ [accessed 2010-09-28] [WebCite Cache ID 5t5VlTV7O]
    • (2010) Password Policy For Encryption
  • 55
    • 79953091519 scopus 로고    scopus 로고
    • Axantum Software. Axantum.com, [accessed 2011-01-14] [WebCite Cache ID 5vjxrk6Cb]
    • Axantum Software. Axantum.com. 2011. AxCrypt Software Download URL: http://www.axantum.com/AxCrypt/Downloads. html [accessed 2011-01-14] [WebCite Cache ID 5vjxrk6Cb]
    • (2011) AxCrypt Software Download
  • 56
    • 79953073179 scopus 로고
    • Federal Information Processing Standards. National Institute of Standards and Technology, Information Technology Laboratory, [accessed 2011-01-14] [WebCite Cache ID 5vjxt0qFA]
    • Federal Information Processing Standards. National Institute of Standards and Technology, Information Technology Laboratory. 1985. Standard for Password Usage URL: http://www.itl.nist.gov/fipspubs/fip112.htm [accessed 2011-01-14] [WebCite Cache ID 5vjxt0qFA]
    • (1985) Standard for Password Usage
  • 57
    • 79953085833 scopus 로고    scopus 로고
    • HITRUST Alliance. HITRUSTAlliance.net, [accessed 2011-01-14] [WebCite Cache ID 5vjxtZiZ8]
    • HITRUST Alliance. HITRUSTAlliance.net. 2010. Common Security Framework URL: http://www.hitrustalliance.net/commonsecurityframework/ [accessed 2011-01-14] [WebCite Cache ID 5vjxtZiZ8]
    • (2010) Common Security Framework
  • 58
    • 0034845194 scopus 로고    scopus 로고
    • Electronic record challenges for clinical systems
    • Olson L. Electronic record challenges for clinical systems. Drug Inf J 2001;35:721-730. (Pubitemid 32825939)
    • (2001) Drug Information Journal , vol.35 , Issue.3 , pp. 721-730
    • Olson, L.1
  • 60
    • 77957931499 scopus 로고    scopus 로고
    • Encryption safe harbours and data breach notification laws
    • doi: 10.1016/j.clsr.2010.07.002
    • Burdon M, Reid J, Low R. Encryption safe harbours and data breach notification laws. Computer Law & Security Review 2010;26(5):520-534. [doi: 10.1016/j.clsr.2010.07.002]
    • (2010) Computer Law & Security Review , vol.26 , Issue.5 , pp. 520-534
    • Burdon, M.1    Reid, J.2    Low, R.3
  • 61
    • 77955708039 scopus 로고    scopus 로고
    • Analyzing the TJ Maxx data security fiasco: Lessons for auditors
    • [FREE Full text] [WebCite Cache]
    • Berg GG, Freeman MS, Schneider KN. Analyzing the TJ Maxx data security fiasco: lessons for auditors. CPA Journal 2008;78(8):34-37 [FREE Full text] [WebCite Cache]
    • (2008) CPA Journal , vol.78 , Issue.8 , pp. 34-37
    • Berg, G.G.1    Freeman, M.S.2    Schneider, K.N.3
  • 62
    • 70450256774 scopus 로고    scopus 로고
    • Breaking the code: How credit card data went out wireless door
    • May 04
    • Pereira J. Breaking the code: how credit card data went out wireless door. Wall Street Journal 2007 May 04.
    • (2007) Wall Street Journal
    • Pereira, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.