-
1
-
-
62449259659
-
The use of electronic data capture tools in clinical trials: Web-survey of 259 Canadian trials
-
[FREE Full text] [ doi: 10.2196/jmir.1120] [Medline: 19275984]
-
El Emam K, Jonker E, Sampson M, Krleza-Jerić K, Neisa A. The use of electronic data capture tools in clinical trials: Web-survey of 259 Canadian trials. J Med Internet Res 2009;11(1):e8 [FREE Full text] [doi: 10.2196/jmir.1120] [Medline: 19275984]
-
(2009)
J Med Internet Res
, vol.11
, Issue.1
-
-
El Emam, K.1
Jonker, E.2
Sampson, M.3
Krleza-Jerić, K.4
Neisa, A.5
-
3
-
-
62449127938
-
-
Healthcare Information and Management Systems Society Foundation, Chicago IL: HIMSS Foundation
-
Healthcare Information and Management Systems Society Foundation. Healthcare CIO Results. Chicago, IL: HIMSS Foundation; 2004.
-
(2004)
Healthcare CIO Results
-
-
-
4
-
-
2442486401
-
Current state of information technology use in a US primary care practice-based research network
-
Andrews JE, Pearce KA, Sydney C, Ireson C, Love M. Current state of information technology use in a US primary care practice-based research network. Inform Prim Care 2004; 12(1):11-18. [Medline: 15140348] (Pubitemid 38647404)
-
(2004)
Informatics in Primary Care
, vol.12
, Issue.1
, pp. 11-18
-
-
Andrew, J.E.1
Pearce, K.A.2
Sydney, C.3
Ireson, C.4
Love, M.5
-
7
-
-
77951623059
-
-
Ottawa Ontario: Office of the Privacy Commissioner of Canada
-
El Emam K, Jonker E, Sams S, Neri E, Neisa A, Gao T, et al. Pan-Canadian De-Identification Guidelines for Personal Health Information. Ottawa, Ontario: Office of the Privacy Commissioner of Canada; 2007.
-
(2007)
Pan-Canadian De-Identification Guidelines for Personal Health Information
-
-
El Emam, K.1
Jonker, E.2
Sams, S.3
Neri, E.4
Neisa, A.5
Gao, T.6
-
8
-
-
69549117388
-
Evaluating the risk of re-identification of patients from hospital prescription records
-
[FREE Full text] [WebCite Cache]
-
El Emam K, Dankar FK, Vaillancourt R, Roffey T, Lysyk M. Evaluating the risk of re-identification of patients from hospital prescription records. Can J Hosp Pharm 2009;62(4):307-319 [FREE Full text] [WebCite Cache]
-
(2009)
Can J Hosp Pharm
, vol.62
, Issue.4
, pp. 307-319
-
-
El Emam, K.1
Dankar, F.K.2
Vaillancourt, R.3
Roffey, T.4
Lysyk, M.5
-
9
-
-
65249152887
-
Privacy interests in prescription records, part 2: Patient privacy
-
doi: 10.1109/MSP.2009.47
-
El Emam K, Kosseim P. Privacy interests in prescription records, part 2: patient privacy. IEEE Security & Privacy Magazine 2009;7(2):75-78. [doi: 10.1109/MSP.2009.47]
-
(2009)
IEEE Security & Privacy Magazine
, vol.7
, Issue.2
, pp. 75-78
-
-
El Emam, K.1
Kosseim, P.2
-
10
-
-
33846936304
-
Evaluating common de-identification heuristics for personal health information
-
DOI 10.2196/jmir.8.4.e28
-
El Emam K, Jabbouri S, Sams S, Drouet Y, Power M. Evaluating common de-identification heuristics for personal health information. J Med Internet Res 2006; 8(4):e28 [FREE Full text] [doi: 10.2196/jmir.8.4.e28] [Medline: 17213047] (Pubitemid 47450199)
-
(2006)
Journal of Medical Internet Research
, vol.8
, Issue.4
-
-
El Emam, K.1
Jabbouri, S.2
Sams, S.3
Drouet, Y.4
Power, M.5
-
12
-
-
41649087324
-
The effect of privacy legislation on observational research
-
DOI 10.1503/cmaj.061353
-
Gershon AS, Tu JV. The effect of privacy legislation on observational research. CMAJ 2008 Mar 25; 178(7):871-873. [doi: 10.1503/cmaj.061353] [Medline: 18362384] (Pubitemid 351482295)
-
(2008)
Canadian Medical Association Journal
, vol.178
, Issue.7
, pp. 871-873
-
-
Gershon, A.S.1
Tu, J.V.2
-
13
-
-
80052453643
-
-
Office of the Privacy Commissioner of Ontario, [accessed 2007-04-20] [WebCite Cache ID 5OFOzaj1O]
-
Cavoukian A. Office of the Privacy Commissioner of Ontario. 2007. Order HO-004 URL: http://www.ipc.on.ca/images/Findings/up-3ho-004.pdf [accessed 2007-04-20] [WebCite Cache ID 5OFOzaj1O]
-
(2007)
Order HO-004
-
-
Cavoukian, A.1
-
16
-
-
84888863423
-
Ad-hoc guesting: When exceptions are the rule
-
Apr 14, San Francisco, CA, [WebCite Cache]
-
Dalal B, Nelson L, Smetters D, Good N, Elliot A. Ad-hoc guesting: when exceptions are the rule. 2008 Presented at: Usability, Psychology, and Security 2008; Apr 14, 2008; San Francisco, CA URL: http://www.usenix.org/events/upsec08/ tech/full-papers/dalal/dalal-html/dalal.html [WebCite Cache]
-
(2008)
Usability, Psychology, and Security 2008
-
-
Dalal, B.1
Nelson, L.2
Smetters, D.3
Good, N.4
Elliot, A.5
-
17
-
-
33745858717
-
Share and share alike: Exploring the user interface affordances of file sharing
-
CHI 2006: Conference on Human Factors in Computing Systems, Conference Proceedings SIGCHI
-
Voida S, Edwards WK, Newman MW, Grinter RE, Ducheneaut N. Share and share alike: exploring the user interface affordances of file sharing. In: Proceedings of ACM CHI 2006 Conference on Human Factors in Computing Systems. New York, NY: ACM Press; 2006:221-230. (Pubitemid 44032105)
-
(2006)
Conference on Human Factors in Computing Systems - Proceedings
, vol.1
, pp. 221-230
-
-
Voida, S.1
Edwards, W.K.2
Newman, M.W.3
Grinter, R.E.4
Ducheneaut, N.5
-
19
-
-
79953074755
-
-
Osterman Research. Proofpoint, [accessed 2010-12-13] [WebCite Cache ID 5ux9tNwBx]
-
Osterman Research. Proofpoint. 2010. Outbound Email and Data Loss Prevention in Today's Enterprise URL: http://www.proofpoint.com/downloads/ Proofpoint-Outbound-Email-and-Data-Loss-Prevention-2010.pdf [accessed 2010-12-13] [WebCite Cache ID 5ux9tNwBx]
-
(2010)
Outbound Email and Data Loss Prevention in Today's Enterprise
-
-
-
22
-
-
79953081194
-
Applied clinical trials online
-
[WebCite Cache ID 5tBqd7lO7]
-
Applied Clinical Trials Online. 2009. Document Management Inefficiencies Cost Sites Time and Money Says Intralinks' Survey URL: http:// appliedclinicaltrialsonline.findpharma.com/appliedclinicaltrials/News/ Document-Management-Inefficiencies-Cost-Sites-Time/ArticleStandard/Article/ detail/601186?contextCategoryId=44911&ref=25 [WebCite Cache ID 5tBqd7lO7]
-
(2009)
Document Management Inefficiencies Cost Sites Time and Money Says Intralinks' Survey
-
-
-
23
-
-
79953071021
-
-
SANS Institute InfoSec Reading Room, [accessed 2010-12-13] [WebCite Cache ID 5uxAd8Ign]
-
Schmidt DA. SANS Institute InfoSec Reading Room. 2003. E-mail Communication With Patients in the Wake of the HIPAA Final Security Rule URL: http://www.sans.org/reading-room/whitepapers/legal/e-mail-communication- patients-wake-hipaa-final-security-rule-1057 [accessed 2010-12-13] [WebCite Cache ID 5uxAd8Ign]
-
(2003)
E-mail Communication With Patients in the Wake of the HIPAA Final Security Rule
-
-
Schmidt, D.A.1
-
24
-
-
78650274256
-
-
HIMSS Foundation. Healthcare Information and Management Systems Society, [accessed 2010-12-13] [WebCite Cache ID 5uxApn1kW]
-
HIMSS Foundation. Healthcare Information and Management Systems Society. 2009. 2009 HIMSS Security Survey URL: http://www.himss.org/content/files/ HIMSS2009SecuritySurveyReport.pdf [accessed 2010-12-13] [WebCite Cache ID 5uxApn1kW]
-
(2009)
2009 HIMSS Security Survey
-
-
-
26
-
-
79953114481
-
Wall street journal
-
[accessed 2010-10-03] [WebCite Cache ID 5tCoEs06a]
-
Worthen B. Wall Street Journal. 2008. New data privacy laws set for firms URL: http://online.wsj.com/article/SB122411532152538495.html [accessed 2010-10-03] [WebCite Cache ID 5tCoEs06a]
-
(2008)
New Data Privacy Laws Set for Firms
-
-
Worthen, B.1
-
27
-
-
79953090898
-
-
Redbridge Primary care Trust (NHS), [accessed 2010-12-13] [WebCite Cache ID 5uxBTsEuk]
-
Cottis P. Redbridge Primary care Trust (NHS). 2008. Transferring Personal Information Policy and Procedures URL: http://www.redbridge.nhs.uk/files/ documents/1030-transferring%20personal%20information%20policy%20080215.pdf [accessed 2010-12-13] [WebCite Cache ID 5uxBTsEuk]
-
(2008)
Transferring Personal Information Policy and Procedures
-
-
Cottis, P.1
-
28
-
-
79953110795
-
-
Research Computing. Partners Healthcare, [accessed 2010-10-03] [WebCite Cache ID 5tCnUoOn3]
-
Research Computing. Partners Healthcare. 2010. Email Encryption URL: http://rc.partners.org/emailencryption/ [accessed 2010-10-03] [WebCite Cache ID 5tCnUoOn3]
-
(2010)
Email Encryption
-
-
-
29
-
-
84856092527
-
-
University of Edinburgh Community Health Sciences, [accessed 2010-12-22] [WebCite Cache ID 5vAdm66WW]
-
Chalmers L. University of Edinburgh, Community Health Sciences. 2007. Guidance to Research and the Data Protection Act URL: http://www.chs.med.ed.ac. uk/cphs/researchTraining/DPResearch.pdf [accessed 2010-12-22] [WebCite Cache ID 5vAdm66WW]
-
(2007)
Guidance to Research and the Data Protection Act
-
-
Chalmers, L.1
-
30
-
-
0004066218
-
-
US Department of Health and Human Services, Food and Drug Administration, Office of the Commissioner. FDA, [accessed 2009-01-11] [WebCite Cache ID 5dkOZy0uG]
-
US Department of Health and Human Services, Food and Drug Administration, Office of the Commissioner. FDA. 2007. Guidance for Industry: Computerized Systems Used in Clinical Investigations URL: http://www.fda.gov/Cder/Guidance/ 7359fnl.pdf [accessed 2009-01-11] [WebCite Cache ID 5dkOZy0uG]
-
(2007)
Guidance for Industry: Computerized Systems Used in Clinical Investigations
-
-
-
31
-
-
79953071950
-
-
Good Automated Manufacturing Practice Forum. The Good Automated Manufacturing Practice (GAMP) Guide for Validation of Automated Systems in Pharmaceutical Manufacture. Tampa, FL: International Society for Pharmaceutical Engineering; 2002
-
Good Automated Manufacturing Practice Forum. The Good Automated Manufacturing Practice (GAMP) Guide for Validation of Automated Systems in Pharmaceutical Manufacture. Tampa, FL: International Society for Pharmaceutical Engineering; 2002.
-
-
-
-
32
-
-
0037579452
-
-
US Department of Health and Human Services, Food and Drug Administration, Center for Drug Evaluation and Research, Center for Biologic Evaluation and Research, Center for Devices and Radiological Health, Center for Food Safety and Applied Nutrition, Center for Veterinary Medicine, Office of Regulatory Affairs. FDA, [accessed 2009-01-11] [WebCite Cache ID 5dkOj5uYQ]
-
US Department of Health and Human Services, Food and Drug Administration, Center for Drug Evaluation and Research, Center for Biologic Evaluation and Research, Center for Devices and Radiological Health, Center for Food Safety and Applied Nutrition, Center for Veterinary Medicine, Office of Regulatory Affairs. FDA. 2003. Guidance for Industry: Part 11, Electronic Records; Electronic Signatures - Scope and Application URL: http://www.fda.gov/cder/ guidance/5667fnl.pdf [accessed 2009-01-11] [WebCite Cache ID 5dkOj5uYQ]
-
(2003)
Guidance for Industry: Part 11, Electronic Records; Electronic Signatures - Scope and Application
-
-
-
33
-
-
0001273922
-
21 CFR Part 11: Electronic records; Electronic signatures; Final rule
-
US Department of Health and Human Services, Food and Drug Administration, [FREE Full text] [WebCite Cache]
-
US Department of Health and Human Services, Food and Drug Administration. 21 CFR Part 11: electronic records; electronic signatures; final rule. Federal Register 1997; 62(54):13430-13466 [FREE Full text] [WebCite Cache]
-
(1997)
Federal Register
, vol.62
, Issue.54
, pp. 13430-13466
-
-
-
34
-
-
0004066218
-
-
US Department of Health and Human Services, Food and Drug Administration, Center for Biologic Evaluation and Research, Center for Drug Evaluation and Research, Center for Devices and Radiological Health, Center for Food Safety and Applied Nutrition, Center for Veterinary Medicine, Office of Regulatory Affairs. FDA, [accessed 2011-01-14] [WebCite Cache ID 5vjx3KTzB]
-
US Department of Health and Human Services, Food and Drug Administration, Center for Biologic Evaluation and Research, Center for Drug Evaluation and Research, Center for Devices and Radiological Health, Center for Food Safety and Applied Nutrition, Center for Veterinary Medicine, Office of Regulatory Affairs. FDA. 1999. Guidance For Industry: Computerized Systems Used in Clinical Trials URL: http://www.fda.gov/ora/compliance-ref/bimo/ffinalcct.pdf [accessed 2011-01-14] [WebCite Cache ID 5vjx3KTzB]
-
(1999)
Guidance For Industry: Computerized Systems Used in Clinical Trials
-
-
-
35
-
-
79953088130
-
-
International Pharmaceutical Privacy Consortium. IPPC, [accessed 2010-12-23] [WebCite Cache ID 5vCIzGZd7]
-
International Pharmaceutical Privacy Consortium. IPPC. 2006. Transmission Security Practices of Pharma Sponsors of Clinical Research URL: http://www.pharmaprivacy.org/download/Clinical-Research-Transmission-Security. pdf [accessed 2010-12-23] [WebCite Cache ID 5vCIzGZd7]
-
(2006)
Transmission Security Practices of Pharma Sponsors of Clinical Research
-
-
-
36
-
-
79953096035
-
-
US Department of Health and Human Services, Food and Drug Administration. FDA, [accessed 2010-10-01] [WebCite Cache ID 5t9ze5Jnr]
-
US Department of Health and Human Services, Food and Drug Administration. FDA. 2010. FDA to Conduct Inspections Focusing on 21 CFR 11 (Part 11) Requirements Relating to Human Drugs URL: http://www.fda.gov/AboutFDA/ CentersOffices/CDER/ucm204012.htm [accessed 2010-10-01] [WebCite Cache ID 5t9ze5Jnr]
-
(2010)
FDA to Conduct Inspections Focusing on 21 CFR 11 (Part 11) Requirements Relating to Human Drugs
-
-
-
37
-
-
0037374498
-
The price of innovation: New estimates of drug development costs
-
DOI 10.1016/S0167-6296(02)00126-1
-
DiMasi JA, Hansen RW, Grabowski HG. The price of innovation: new estimates of drug development costs. J Health Econ 2003 Mar;22(2):151-185. [doi: 10.1016/S0167-6296(02)00126-1] [Medline: 12606142] (Pubitemid 36279392)
-
(2003)
Journal of Health Economics
, vol.22
, Issue.2
, pp. 151-185
-
-
DiMasi, J.A.1
Hansen, R.W.2
Grabowski, H.G.3
-
40
-
-
85001728633
-
Password security: An empirical investigation into e-commerce passwords and their crack times
-
doi: 10.1080/10658980601051318
-
Cazier JA, Medlin BD. Password security: an empirical investigation into e-commerce passwords and their crack times. Information Security Journal 2006;15(6):45-55. [doi: 10.1080/10658980601051318]
-
(2006)
Information Security Journal
, vol.15
, Issue.6
, pp. 45-55
-
-
Cazier, J.A.1
Medlin, B.D.2
-
41
-
-
79953092324
-
-
Microsoft, [accessed 2010-12-17] [WebCite Cache ID 5v3FVk3pw]
-
Microsoft. 2003. Microsoft Office 2003 Editions Security Whitepaper URL: http://office.microsoft.com/download/afile.aspx?AssetID=AM102424861033 [accessed 2010-12-17] [WebCite Cache ID 5v3FVk3pw]
-
(2003)
Microsoft Office 2003 Editions Security Whitepaper
-
-
-
43
-
-
38349024932
-
-
International Association for Cryptologic Research, [accessed 2011-01-14] [WebCite Cache ID 5vjxZJxof]
-
Wu H. International Association for Cryptologic Research. 2005. The Misuse of RC4 in Microsoft Word and Excel URL: http://eprint.iacr.org/2005/007. pdf [accessed 2011-01-14] [WebCite Cache ID 5vjxZJxof]
-
(2005)
The Misuse of RC4 in Microsoft Word and Excel
-
-
Wu, H.1
-
44
-
-
78649494320
-
How secure is your information system? An investigation into actual healthcare worker password practices
-
Medline: 18066366
-
Cazier JA, Medlin BD. How secure is your information system? An investigation into actual healthcare worker password practices. Perspect Health Inf Manag 2006;3:8. [Medline: 18066366]
-
(2006)
Perspect Health Inf Manag
, vol.3
, pp. 8
-
-
Cazier, J.A.1
Medlin, B.D.2
-
45
-
-
79953114176
-
-
CBCnews.ca, Aug 04, [WebCite Cache ID 5rkr1UjXO]
-
CBCnews.ca. 2010 Aug 04. Hundreds of Ont. Patient Health Files Stolen URL: http://www.cbc.ca/canada/toronto/story/2010/08/04/usb-medical-files- stolen684.html?ref=rss&loomia-si=t0:a16:g2:r5:c0.0440057:b36264812 [WebCite Cache ID 5rkr1UjXO]
-
(2010)
Hundreds of Ont. Patient Health Files Stolen
-
-
-
46
-
-
79953114177
-
-
Microsoft Corporation. Microsoft, [accessed 2010-09-29] [WebCite Cache ID 5t76jss0L]
-
Microsoft Corporation. Microsoft. 2010. Password Policy URL: http://office.microsoft.com/en-ca/excel-help/password-policy-HA010355926.aspx [accessed 2010-09-29] [WebCite Cache ID 5t76jss0L]
-
(2010)
Password Policy
-
-
-
47
-
-
48749111433
-
-
National Institute of Standards and Technology, [accessed 2010-12-16] [WebCite Cache ID 5v1jynapa]
-
Bisker S, Tracy M, Jansen W. National Institute of Standards and Technology. 2002. Guidelines on Electronic Mail Security URL: http://www.21cfrpart11.com/files/library/security/guidelines-on-email-sec.pdf [accessed 2010-12-16] [WebCite Cache ID 5v1jynapa]
-
(2002)
Guidelines on Electronic Mail Security
-
-
Bisker, S.1
Tracy, M.2
Jansen, W.3
-
49
-
-
81155140118
-
Why Johnny still can't encrypt: Evaluating the usability of email encryption software
-
CyLab Usable Privacy and Security Laboratory, Carnegie Mellon University, Jul 12-14, Pittsburgh, PA, [WebCite Cache]
-
Sheng S, Broderick L, Koranda CA, Hyland JJ. Why Johnny still can't encrypt: evaluating the usability of email encryption software. In: CyLab Usable Privacy and Security Laboratory, Carnegie Mellon University. 2006 Presented at: Symposium On Usable Privacy and Security; Jul 12-14, 2006; Pittsburgh, PA URL: http://cups.cs.cmu.edu/soups/2006/posters/sheng-poster-abstract.pdf [WebCite Cache]
-
(2006)
Symposium On Usable Privacy and Security
-
-
Sheng, S.1
Broderick, L.2
Koranda, C.A.3
Hyland, J.J.4
-
50
-
-
33646703264
-
Johnny 2: A user test of key continuity management with S/MIME and Outlook Express
-
CyLab Usable Privacy and Security Laboratory, Carnegie Mellon University; Jul 6-8, Pittsburgh, PA, [WebCite Cache]
-
Garfinkel SL, Miller RC. Johnny 2: a user test of key continuity management with S/MIME and Outlook Express. In: CyLab Usable Privacy and Security Laboratory, Carnegie Mellon University. 2005 Presented at: Symposium On Usable Privacy and Security; Jul 6-8, 2005; Pittsburgh, PA URL: http://cups.cs.cmu.edu/soups/2005/2005proceedings/p13-garfinkel.pdf [WebCite Cache]
-
(2005)
Symposium On Usable Privacy and Security
-
-
Garfinkel, S.L.1
Miller, R.C.2
-
51
-
-
79953120569
-
-
[accessed 2011-01-14] [WebCite Cache ID 5vjxoiPus]
-
Firstbrook P, Ouellet E. Gartner. 2010. Magic Quadrant for Secure E-mail Gateways URL: http://synctech.com.vn/Casestudy/ Gartner%20Magic%20Quadrant%20for%20Secure%20Email%20Gateways-2010.pdf [accessed 2011-01-14] [WebCite Cache ID 5vjxoiPus]
-
(2010)
Magic Quadrant for Secure E-mail Gateways
-
-
Firstbrook, P.1
Gartner, O.E.2
-
52
-
-
79953095418
-
-
WinZip Computing. WinZip.com, [accessed 2010-09-28] [WebCite Cache ID 5t5VpbDwr]
-
WinZip Computing. WinZip.com. How Do You Encrypt Files in a Zip File with WinZip? 2010 URL: http://kb.winzip.com/kb/entry/78/ [accessed 2010-09-28] [WebCite Cache ID 5t5VpbDwr]
-
(2010)
How Do You Encrypt Files in a Zip File with WinZip?
-
-
-
53
-
-
79953115711
-
-
WinZip Computing. WinZip.com, [accessed 2010-09-28] [WebCite Cache ID 5t5VlTV7O]
-
WinZip Computing. WinZip.com. 2010. Password Policy For Encryption URL: http://kb.winzip.com/kb/entry/260/ [accessed 2010-09-28] [WebCite Cache ID 5t5VlTV7O]
-
(2010)
Password Policy For Encryption
-
-
-
55
-
-
79953091519
-
-
Axantum Software. Axantum.com, [accessed 2011-01-14] [WebCite Cache ID 5vjxrk6Cb]
-
Axantum Software. Axantum.com. 2011. AxCrypt Software Download URL: http://www.axantum.com/AxCrypt/Downloads. html [accessed 2011-01-14] [WebCite Cache ID 5vjxrk6Cb]
-
(2011)
AxCrypt Software Download
-
-
-
56
-
-
79953073179
-
-
Federal Information Processing Standards. National Institute of Standards and Technology, Information Technology Laboratory, [accessed 2011-01-14] [WebCite Cache ID 5vjxt0qFA]
-
Federal Information Processing Standards. National Institute of Standards and Technology, Information Technology Laboratory. 1985. Standard for Password Usage URL: http://www.itl.nist.gov/fipspubs/fip112.htm [accessed 2011-01-14] [WebCite Cache ID 5vjxt0qFA]
-
(1985)
Standard for Password Usage
-
-
-
57
-
-
79953085833
-
-
HITRUST Alliance. HITRUSTAlliance.net, [accessed 2011-01-14] [WebCite Cache ID 5vjxtZiZ8]
-
HITRUST Alliance. HITRUSTAlliance.net. 2010. Common Security Framework URL: http://www.hitrustalliance.net/commonsecurityframework/ [accessed 2011-01-14] [WebCite Cache ID 5vjxtZiZ8]
-
(2010)
Common Security Framework
-
-
-
58
-
-
0034845194
-
Electronic record challenges for clinical systems
-
Olson L. Electronic record challenges for clinical systems. Drug Inf J 2001;35:721-730. (Pubitemid 32825939)
-
(2001)
Drug Information Journal
, vol.35
, Issue.3
, pp. 721-730
-
-
Olson, L.1
-
60
-
-
77957931499
-
Encryption safe harbours and data breach notification laws
-
doi: 10.1016/j.clsr.2010.07.002
-
Burdon M, Reid J, Low R. Encryption safe harbours and data breach notification laws. Computer Law & Security Review 2010;26(5):520-534. [doi: 10.1016/j.clsr.2010.07.002]
-
(2010)
Computer Law & Security Review
, vol.26
, Issue.5
, pp. 520-534
-
-
Burdon, M.1
Reid, J.2
Low, R.3
-
61
-
-
77955708039
-
Analyzing the TJ Maxx data security fiasco: Lessons for auditors
-
[FREE Full text] [WebCite Cache]
-
Berg GG, Freeman MS, Schneider KN. Analyzing the TJ Maxx data security fiasco: lessons for auditors. CPA Journal 2008;78(8):34-37 [FREE Full text] [WebCite Cache]
-
(2008)
CPA Journal
, vol.78
, Issue.8
, pp. 34-37
-
-
Berg, G.G.1
Freeman, M.S.2
Schneider, K.N.3
-
62
-
-
70450256774
-
Breaking the code: How credit card data went out wireless door
-
May 04
-
Pereira J. Breaking the code: how credit card data went out wireless door. Wall Street Journal 2007 May 04.
-
(2007)
Wall Street Journal
-
-
Pereira, J.1
|