메뉴 건너뛰기




Volumn , Issue , 2008, Pages 155-162

Trust me. I am a doctor. Your records are safe...

Author keywords

Capability maturity model; Medical information security; Primary care; SQL

Indexed keywords

AUSTRALIA; CAPABILITY MATURITY MODELS; INFORMATION SECURITY PRACTICE; MEDICAL PRACTICE; PRIMARY CARE; SQL; WILLIAMS;

EID: 84864572697     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (3)

References (12)
  • 1
    • 84864556229 scopus 로고    scopus 로고
    • Australian Health Information Council. (2004). About AHIC. Retrieved 13 August, 2005 from http://www.ahic.org.au/about/index.html#terms
    • (2004) About AHIC. Retrieved 13 August, 2005
  • 4
    • 84864564444 scopus 로고    scopus 로고
    • General Practice Computing Group. South Melbourne, Victoria, Australia: Royal Australian College of General Practitioners
    • General Practice Computing Group. (2005). Medical practice network security: Firewall tutorial. South Melbourne, Victoria, Australia: Royal Australian College of General Practitioners.
    • (2005) Medical Practice Network Security: Firewall Tutorial
  • 5
    • 27644565865 scopus 로고    scopus 로고
    • Can electronic medical record systems transform health care? Potential health benefits, savings and costs
    • Hillestad, R., Bigelow, J., Bower, A., Girosi, F., & al, e. (2005). Can electronic medical record systems transform health care? Potential health benefits, savings and costs. Health Affairs, 24(5), 1103-1107.
    • (2005) Health Affairs , vol.24 , Issue.5 , pp. 1103-1107
    • Hillestad, R.1    Bigelow, J.2    Bower, A.3    Girosi, F.4
  • 7
    • 84864564449 scopus 로고    scopus 로고
    • Paper presented at the The 2006 World Congress in Computer Science, Computer Engineering, and Applied Computing - SAM'06 - The 2006 International Conference on Security & Management, Monte Carlo Resort, Las Vegas, Nevada, USA (June 26-29, 2006
    • Valli, C. (2006). SQL Injection - Threats to Medical Systems; Issues and Countermeasures. Paper presented at the The 2006 World Congress in Computer Science, Computer Engineering, and Applied Computing - SAM'06 - The 2006 International Conference on Security & Management, Monte Carlo Resort, Las Vegas, Nevada, USA (June 26-29, 2006)
    • (2006) SQL Injection - Threats to Medical Systems; Issues and Countermeasures
    • Valli, C.1
  • 8
    • 84864555737 scopus 로고    scopus 로고
    • IT sharps: Disposing of your IT medical waste
    • H. R. Arabnia & S. Aissi (Eds.). Monte Carlo Resort, Las Vegas, Nevada, USA (June 26-29, 2007) USA: CSREA Press
    • Valli, C. (2007). IT Sharps: Disposing of your IT medical waste. In H. R. Arabnia & S. Aissi (Eds.), Proceedings of the 2007 International Conference on Security & Management. Monte Carlo Resort, Las Vegas, Nevada, USA (June 26-29, 2007) USA: CSREA Press.
    • (2007) Proceedings of the 2007 International Conference on Security & Management
    • Valli, C.1
  • 9
    • 33745877619 scopus 로고    scopus 로고
    • Patients should have to opt out of national electronic care records
    • Watson, N. (2006). Patients should have to opt out of national electronic care records. British Medical Journal, 333(7557), 39-43.
    • (2006) British Medical Journal , vol.333 , Issue.7557 , pp. 39-43
    • Watson, N.1
  • 10
    • 40949157392 scopus 로고    scopus 로고
    • Information governance: A model for security in medical practice
    • Williams, P. A. H. (2007). Information governance: A model for security in medical practice. Journals of Digital Forensics, Security and Law, 2(1), 57-72.
    • (2007) Journals of Digital Forensics, Security and Law , vol.2 , Issue.1 , pp. 57-72
    • Williams, P.A.H.1
  • 11
    • 40949149568 scopus 로고    scopus 로고
    • A practical application of CMM to medical security capability
    • Williams, P. A. H. (2008a). A practical application of CMM to medical security capability. Information Management & Computer Security, 16(1), 58-73.
    • (2008) Information Management & Computer Security , vol.16 , Issue.1 , pp. 58-73
    • Williams, P.A.H.1
  • 12
    • 49849085272 scopus 로고    scopus 로고
    • When trust defies common security sense
    • Williams, P. A. H. (2008b). When trust defies common security sense. Health Informatics Journal, 14(3), 211-221.
    • (2008) Health Informatics Journal , vol.14 , Issue.3 , pp. 211-221
    • Williams, P.A.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.