-
1
-
-
77649185795
-
Paperless healthcare: Progress and challenges of an IT-enabled healthcare system
-
J. Adler-Milstein, and Bates Paperless healthcare: progress and challenges of an IT-enabled healthcare system Business Horizon 53 2010 119 130
-
(2010)
Business Horizon
, vol.53
, pp. 119-130
-
-
Adler-Milstein, J.1
-
2
-
-
65949102152
-
U.S. Regional health information organizations: Progress and challenges
-
J. Adler-Milstein, D.W. Bates, and A.K. Jha U.S. regional health information organizations: progress and challenges Health Affairs 28 2 2009 483 492
-
(2009)
Health Affairs
, vol.28
, Issue.2
, pp. 483-492
-
-
Adler-Milstein, J.1
Bates, D.W.2
Jha, A.K.3
-
5
-
-
0033539175
-
Diameter of the world-wide web
-
DOI 10.1038/43601
-
R. Albert, H. Jeong, and A.-L. Barabási Diameter of the world-wide web Nature 401 1999 130 131 (Pubitemid 29436307)
-
(1999)
Nature
, vol.401
, Issue.6749
, pp. 130-131
-
-
Albert, R.1
Jeong, H.2
Barabasi, A.-L.3
-
6
-
-
29844458140
-
Understanding internet topology: Principles, models, and validation
-
DOI 10.1109/TNET.2005.861250
-
D. Alderson, L. Li, W. Wallinger, and J.C. Doyle Understanding internet topology: principles, models, and validation IEEE/ACM Transactions on Networking 13 6 2005 1205 1218 (Pubitemid 43034130)
-
(2005)
IEEE/ACM Transactions on Networking
, vol.13
, Issue.6
, pp. 1205-1218
-
-
Alderson, D.1
Li, L.2
Willinger, W.3
Doyle, J.C.4
-
7
-
-
33748597348
-
A general, but readily adaptable model of information system risk
-
S. Alter, and S. Sherer A general, but readily adaptable model of information system risk Communications of the AIS 14 1 2004 1 28
-
(2004)
Communications of the AIS
, vol.14
, Issue.1
, pp. 1-28
-
-
Alter, S.1
Sherer, S.2
-
8
-
-
33750440197
-
The economics of information security
-
DOI 10.1126/science.1130992
-
R. Anderson, and T. Moore The economics of information security Science 314 2006 610 613 (Pubitemid 44646376)
-
(2006)
Science
, vol.314
, Issue.5799
, pp. 610-613
-
-
Anderson, R.1
Moore, T.2
-
10
-
-
12844261665
-
Measuring the risk-based value of IT security solutions
-
DOI 10.1109/MITP.2004.89
-
A. Arora, D. Hall, C.A. Pinto, D. Ramsey, and R. Telang Measuring the risk-based value of IT security solutions IT Professional 6 6 2004 35 42 (Pubitemid 40168789)
-
(2004)
IT Professional
, vol.6
, Issue.6
, pp. 35-42
-
-
Arora, A.1
Hall, D.2
Pinto, C.A.3
Ramsey, D.4
Telang, R.5
-
11
-
-
0038483826
-
Emergence of scaling in random networks
-
A.-L. Barabási, and R. Albert Emergence of scaling in random networks Science 286 1999 509 512
-
(1999)
Science
, vol.286
, pp. 509-512
-
-
Barabási, A.-L.1
Albert, R.2
-
12
-
-
84869494686
-
Process-centric risk management framework for information security
-
H. Chen, T.S. Raghu, R. Ramesh, A. Vinze, D. Zeng, Elsevier The Netherlands
-
R.S. Behara, and S. Bhattacharya Process-centric risk management framework for information security H. Chen, T.S. Raghu, R. Ramesh, A. Vinze, D. Zeng, National Security 2007 Elsevier The Netherlands 349 366
-
(2007)
National Security
, pp. 349-366
-
-
Behara, R.S.1
Bhattacharya, S.2
-
13
-
-
13444274614
-
Evaluating information security investments using the analytic hierarchy process
-
L.D. Bodin, L.A. Gordon, and M.P. Loeb Evaluating information security investments using the analytic hierarchy process Communications of the ACM 48 2 2005 79 83
-
(2005)
Communications of the ACM
, vol.48
, Issue.2
, pp. 79-83
-
-
Bodin, L.D.1
Gordon, L.A.2
Loeb, M.P.3
-
14
-
-
39749181513
-
Towards a standard approach for quantifying an ICT security investment
-
DOI 10.1016/j.csi.2007.10.013, PII S0920548907000876
-
R. Bojanc, and B.J. Blazic Towards a standard approach for quantifying an ICT security investment Computer Standards & Interface 30 2008 216 222 (Pubitemid 351308028)
-
(2008)
Computer Standards and Interfaces
, vol.30
, Issue.4
, pp. 216-222
-
-
Bojanc, R.1
Jerman-Blazic, B.2
-
15
-
-
33751016375
-
Privacy and security in health information exchange
-
P. Carter, C. Lemery, D. Mikels, R. Bowen, and B. Hjort Privacy and security in health information exchange Journal of AHIMA 77 10 2006 64A-C (Pubitemid 44747723)
-
(2006)
Journal of the American Health Information Management Association
, vol.77
, Issue.10
-
-
Carter, P.1
Lemery, C.2
Mikels, D.3
Bowen, R.4
Hjort, B.5
-
16
-
-
18944385964
-
The value of intrusion detection systems in information technology security architecture
-
DOI 10.1287/isre.1050.0041
-
H. Cavusoglu, B. Mishra, and S. Raghunathan The value of intrusion detection systems in information technology security architecture Information Systems Research 16 1 2005 28 46 (Pubitemid 40701107)
-
(2005)
Information Systems Research
, vol.16
, Issue.1
, pp. 28-46
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
17
-
-
84897494360
-
-
Center For Medicare And Medicaid Services (cms) available at
-
Center for Medicare and Medicaid Services (CMS) Stage 1 vs. stage 2 comparison table for eligible hospitals and CAHs available at http://www.cms.gov/Regulations-and-Guidance/Legislation/EHRIncentivePrograms/ Downloads/Stage1vsStage2CompTablesforHospitals.pdf 2012
-
(2012)
Stage 1 Vs. Stage 2 Comparison Table for Eligible Hospitals and CAHs
-
-
-
18
-
-
79151484723
-
Form's information security investment decisions: Stock market evidence of investors' behavior
-
S. Chai, M. Kim, and H.R. Rao Form's information security investment decisions: stock market evidence of investors' behavior Decision Support Systems 50 2011 651 661
-
(2011)
Decision Support Systems
, vol.50
, pp. 651-661
-
-
Chai, S.1
Kim, M.2
Rao, H.R.3
-
20
-
-
19944417270
-
Infection dynamics on the Internet
-
DOI 10.1016/j.cose.2005.03.004, PII S0167404805000453
-
D.B. Chang, and C.S. Young Infection dynamics on the internet Computers & Security 24 2005 280 286 (Pubitemid 40752311)
-
(2005)
Computers and Security
, vol.24
, Issue.4
, pp. 280-286
-
-
Chang, D.B.1
Young, C.S.2
-
22
-
-
47849124657
-
Applying real options thinking to information security in networked organizations
-
Centre for Telematics and Information Technology, University of Twente The Netherlands
-
M. Daneva Applying real options thinking to information security in networked organizations CTIT Technical Report TR-CTIT-06-11 2006 Centre for Telematics and Information Technology, University of Twente The Netherlands
-
(2006)
CTIT Technical Report TR-CTIT-06-11
-
-
Daneva, M.1
-
25
-
-
0033204106
-
On power-law relationships of the Internet topology
-
DOI 10.1145/316194.316229
-
M. Faloutsos, P. Faloutsos, and C. Faloutsos On power-law relationships of the internet topology ACM SIGCOMM Computer Communication Review 29 4 1999 251 262 (Pubitemid 32081870)
-
(1999)
Computer Communication Review
, vol.29
, Issue.4
, pp. 251-262
-
-
Faloutsos, M.1
Faloutsos, P.2
Faloutsos, C.3
-
26
-
-
77956916172
-
Systematic review of health information exchange in primary care practices
-
P. Fntaine, S.E. Ross, T. Zink, and L.M. Schilling Systematic review of health information exchange in primary care practices Journal of the American Board of Family Medicine 23 5 2010 655 670
-
(2010)
Journal of the American Board of Family Medicine
, vol.23
, Issue.5
, pp. 655-670
-
-
Fntaine, P.1
Ross, S.E.2
Zink, T.3
Schilling, L.M.4
-
27
-
-
30344462995
-
The economic incentives for sharing security information
-
DOI 10.1287/isre.1050.0053
-
E. Gal-Or, and A. Ghose The economic incentives for sharing security information Information Systems Research 16 2 2005 186 208 (Pubitemid 43057222)
-
(2005)
Information Systems Research
, vol.16
, Issue.2
, pp. 186-208
-
-
Gal-Or, E.1
Chose, A.2
-
29
-
-
4944234006
-
Return on information security investments: Myths vs. Realities
-
L.A. Gordon, and M.P. Loeb Return on information security investments: myths vs. realities Strategic Finance 84 5 2002 26 31
-
(2002)
Strategic Finance
, vol.84
, Issue.5
, pp. 26-31
-
-
Gordon, L.A.1
Loeb, M.P.2
-
31
-
-
0344899914
-
Sharing information on computer systems security: An economic analysis
-
DOI 10.1016/j.jaccpubpol.2003.09.001, PII S0278425403000632
-
L.A. Gordon, M.P. Loeb, and W. Lucyshyn Sharing information on computer systems security: an economic analysis Journal of Accounting and Public Policy 22 2003 461 485 (Pubitemid 37491796)
-
(2003)
Journal of Accounting and Public Policy
, vol.22
, Issue.6
, pp. 461-485
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
-
34
-
-
0000505726
-
On a portion of the well-known collaboration graph
-
W. Grossman, and P.D.F. Ion On a portion of the well-known collaboration graph Congressus Numerantium 108 1995 129 131
-
(1995)
Congressus Numerantium
, vol.108
, pp. 129-131
-
-
Grossman, W.1
Ion, P.D.F.2
-
35
-
-
53949123562
-
A framework for security analysis of internet technology components enabling globally distributed workplaces
-
M. Gupta, S. Banerjee, M. Agrawal, and H.R. Rao A framework for security analysis of internet technology components enabling globally distributed workplaces ACM Transactions on Internet Technology 8 4 2008 17:2 17:38
-
(2008)
ACM Transactions on Internet Technology
, vol.8
, Issue.4
, pp. 172-1738
-
-
Gupta, M.1
Banerjee, S.2
Agrawal, M.3
Rao, H.R.4
-
36
-
-
84897491554
-
-
Hhs (department Of Health And Human Services) accessed at
-
HHS (Department of Health and Human Services) HIPPA Security Series, 1. Security 101 for Covered Entities accessed at http://www.hhs.gov/ocr/privacy/ hipaa/administrative/securityrule/security101.pdf 2007
-
(2007)
HIPPA Security Series, 1. Security 101 for Covered Entities
-
-
-
37
-
-
84869508852
-
Economics of information security investment in the case of simultaneous attacks
-
C.D. Huang, and R.S. Behara Economics of information security investment in the case of simultaneous attacks International Journal of Production Economics 141 1 2013 255 268
-
(2013)
International Journal of Production Economics
, vol.141
, Issue.1
, pp. 255-268
-
-
Huang, C.D.1
Behara, R.S.2
-
38
-
-
46849085979
-
Economics of information security investment in the case of simultaneous attacks
-
C.D. Huang, Q. Hu, and R.S. Behara Economics of information security investment in the case of simultaneous attacks International Journal of Production Economics 114 2 2008 793 804
-
(2008)
International Journal of Production Economics
, vol.114
, Issue.2
, pp. 793-804
-
-
Huang, C.D.1
Hu, Q.2
Behara, R.S.3
-
39
-
-
84897535601
-
-
It Pcg (it Policy Compliance Group) accessed at
-
IT PCG (IT Policy Compliance Group) The financial benefits of spend on security accessed at http://www.itpolicycompliance.com/wp-content/uploads/2013/ 02/The-Financial-Benefits-of-Spend-on-Security-Overview.pdf 2012
-
(2012)
The Financial Benefits of Spend on Security
-
-
-
40
-
-
35548990551
-
Security as a contributor to knowledge management success
-
DOI 10.1007/s10796-007-9053-4
-
M.E. Jennex, and S. Zyngier Security as a contributor to knowledge management success Information Systems Frontier 9 2007 493 504 (Pubitemid 350007344)
-
(2007)
Information Systems Frontiers
, vol.9
, Issue.5
, pp. 493-504
-
-
Jennex, M.E.1
Zyngier, S.2
-
41
-
-
0035799707
-
Lethality and centrality in protein networks
-
DOI 10.1038/35075138
-
H. Jeong, S. Mason, A.-L. Barabasi, and Z.N. Oltival Lethality and centrality in protein networks Nature 411 2001 41 42 (Pubitemid 32428180)
-
(2001)
Nature
, vol.411
, Issue.6833
, pp. 41-42
-
-
Jeong, H.1
Mason, S.P.2
Barabasi, A.-L.3
Oltvai, Z.N.4
-
42
-
-
84897524113
-
Health-care industry: Heal thyself
-
M.E. Johnson Health-care industry: heal thyself Wall Street Journal September 26 2011 http://online.wsj.com/news/articles/ SB10001424053111904716604576542380296355702.
-
(2011)
Wall Street Journal
-
-
Johnson, M.E.1
-
46
-
-
66549103101
-
Understanding the value of countermeasure portfolios in information security
-
R.L. Kumar, S. Park, and C. Subramniam Understanding the value of countermeasure portfolios in information security Journal of Management Information Systems 25 20 2008 241 279
-
(2008)
Journal of Management Information Systems
, vol.25
, Issue.20
, pp. 241-279
-
-
Kumar, R.L.1
Park, S.2
Subramniam, C.3
-
49
-
-
0344876064
-
Infection dynamics on growing networks
-
23
-
Y.C. Lai, Z. Liu, and N. Ye Infection dynamics on growing networks International Journal of Modern Physics B 17 22,23,24 2003 4045 4061
-
(2003)
International Journal of Modern Physics B
, vol.17
, Issue.22-24
, pp. 4045-4061
-
-
Lai, Y.C.1
Liu, Z.2
Ye, N.3
-
51
-
-
84878838952
-
Contracting Information Security in the Presence of Double Moral Hazard
-
C.H. Lee, X. Geng, and S. Raghunathan Contracting Information Security in the Presence of Double Moral Hazard Information Systems Research 24 2 June 2013 295 311
-
(2013)
Information Systems Research
, vol.24
, Issue.2
, pp. 295-311
-
-
Lee, C.H.1
Geng, X.2
Raghunathan, S.3
-
52
-
-
0035927795
-
The web of human sexual contact
-
F. Liljeros, C.R. Edling, L.A.N. Amaral, H.E. Stanley, and Y. Aberg The web of human sexual contact Nature 411 2001 907 908
-
(2001)
Nature
, vol.411
, pp. 907-908
-
-
Liljeros, F.1
Edling, C.R.2
Amaral, L.A.N.3
Stanley, H.E.4
Aberg, Y.5
-
55
-
-
84873139978
-
Managing security risk: Organization, mission, and information system view
-
National Institute Of Standards And Technology U.S. Department of Commerce
-
National Institute of Standards and Technology Managing security risk: organization, mission, and information system view NIST Special Publication 800-39 2011 U.S. Department of Commerce
-
(2011)
NIST Special Publication 800-39
-
-
-
56
-
-
0038718854
-
The structure and function of complex networks
-
M.E.J. Newman The structure and function of complex networks SIAM Review 45 2 2003 167 256
-
(2003)
SIAM Review
, vol.45
, Issue.2
, pp. 167-256
-
-
Newman, M.E.J.1
-
58
-
-
0035794256
-
Epidemic spreading in scale-free networks
-
DOI 10.1103/PhysRevLett.86.3200
-
R. Pastor-Satorras, and A. Vespignani Epidemic spreading in scale-free networks Physical Review Letters 86 14 2001 3200 3203 (Pubitemid 32317894)
-
(2001)
Physical Review Letters
, vol.86
, Issue.14
, pp. 3200-3203
-
-
Pastor-Satorras, R.1
Vespignani, A.2
-
59
-
-
84894276356
-
-
(accessed 4 April 2011)
-
Ponemon Institute Benchmark study on patient privacy and data security http://www2.idexpertscorp.com/resources/healthcare/healthcare-articles- whitepapers/ponemon-benchmark-study-on-patient-data-security-practices/? utm-source=Ponemon%2BRedirect&utm-medium=Online&utm-campaign= Ponemon%2BRedirect/ November 2010 (accessed 4 April 2011)
-
(2010)
Benchmark Study on Patient Privacy and Data Security
-
-
Institute, P.1
-
61
-
-
77949314934
-
How popular is your paper? An empirical study of the citation distribution
-
S. Redner How popular is your paper? An empirical study of the citation distribution European Physics Journal B 23 1998 267 271
-
(1998)
European Physics Journal B
, vol.23
, pp. 267-271
-
-
Redner, S.1
-
62
-
-
84877741992
-
Selection of optimal countermeasure portfolio in IT security planning
-
10.1016/j.dss.2013.01.001
-
T. Sawik Selection of optimal countermeasure portfolio in IT security planning Decision Support Systems 2013 10.1016/j.dss.2013.01.001
-
(2013)
Decision Support Systems
-
-
Sawik, T.1
-
63
-
-
14744281156
-
Toward econometric models of the security risk from remote attacks
-
DOI 10.1109/MSP.2005.30
-
S.E. Schechter Toward econometric models of the security risk from remote attacks IEEE Security & Privacy 3 1 2005 40 44 (Pubitemid 40325581)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.1
, pp. 40-44
-
-
Schechter, S.E.1
-
64
-
-
33846810148
-
Trust in health infomediaries
-
DOI 10.1016/j.dss.2006.11.011, PII S0167923606001606
-
J. Song, and F.M. Zahedi Trust in health infomediaries Decision Support Systems 43 2007 390 407 (Pubitemid 46216543)
-
(2007)
Decision Support Systems
, vol.43
, Issue.2
, pp. 390-407
-
-
Song, J.1
Zahedi, F..2
-
65
-
-
35549003593
-
An interorganizational knowledge-sharing security model with breach propagation detection
-
DOI 10.1007/s10796-007-9055-2
-
D.S. Soper, H. Demirkan, and M. Goul An interorganizational knowledge sharing security model with breach propagation detection Information Systems Frontier 9 2007 469 479 (Pubitemid 350007343)
-
(2007)
Information Systems Frontiers
, vol.9
, Issue.5
, pp. 469-479
-
-
Soper, D.S.1
Demirkan, H.2
Goul, M.3
-
67
-
-
17844396492
-
The economic approach of information security
-
DOI 10.1016/j.cose.2005.02.001, PII S0167404805000209
-
T. Tsiakis, and G. Stephanides The economic approach of information security Computer & Security 24 2005 105 108 (Pubitemid 40583822)
-
(2005)
Computers and Security
, vol.24
, Issue.2
, pp. 105-108
-
-
Tsiakis, T.1
Stephanides, G.2
-
68
-
-
0038542266
-
Topology and correlations in structured scale-free networks
-
A. Vazquz, M. Boguna, Y. Moreno, R. Pastor-Satorras, and A. Vespignani Topology and correlations in structured scale-free networks Physical Review E 67 2003 046111
-
(2003)
Physical Review e
, vol.67
, pp. 046111
-
-
Vazquz, A.1
Boguna, M.2
Moreno, Y.3
Pastor-Satorras, R.4
Vespignani, A.5
-
70
-
-
33644862103
-
The value of health care information exchange and interoperability
-
(W5-10-W5-18)
-
J. Walker, E. Pan, D. Johnston, J. Adler-Milstein, D.W. Bates, and B. Middleton The value of health care information exchange and interoperability Health Affairs, Supplemental Web Exclusive 2005 (W5-10-W5-18)
-
(2005)
Health Affairs, Supplemental Web Exclusive
-
-
Walker, J.1
Pan, E.2
Johnston, D.3
Adler-Milstein, J.4
Bates, D.W.5
Middleton, B.6
-
71
-
-
0037133194
-
Scaling phenomena in the internet: Critically examining criticality
-
DOI 10.1073/pnas.012583099
-
W. Wallinger, R. Govindan, S. Jamin, V. Paxson, and S. Shenker Scaling phenomena in the internet: critically examining criticality Proceedings of National Academy of Science 99 1 2000 2573 2580 (Pubitemid 34165068)
-
(2002)
Proceedings of the National Academy of Sciences of the United States of America
, vol.99
, Issue.SUPPL. 1
, pp. 2573-2580
-
-
Willinger, W.1
Govindan, R.2
Jamin, S.3
Paxson, V.4
Shenker, S.5
-
73
-
-
61349180141
-
A value-at-risk approach to information security investment
-
J. Wang, A. Chaudhury, and H.R. Rao A value-at-risk approach to information security investment Information Systems Research 19 1 2008 106 120
-
(2008)
Information Systems Research
, vol.19
, Issue.1
, pp. 106-120
-
-
Wang, J.1
Chaudhury, A.2
Rao, H.R.3
-
74
-
-
0032482432
-
Collective dynamics of "small-world" networks
-
D.J. Watts, and S.H. Strogatz Collective dynamics of "small- world" networks Nature 393 1998 440 442
-
(1998)
Nature
, vol.393
, pp. 440-442
-
-
Watts, D.J.1
Strogatz, S.H.2
-
75
-
-
77949570640
-
A knowledgeable security model for distributed health information systems
-
L. Xiao, B. Hu, M. Croitoru, P. Lewis, and S. Dasmahapatra A knowledgeable security model for distributed health information systems Computer & Security 29 2010 331 349
-
(2010)
Computer & Security
, vol.29
, pp. 331-349
-
-
Xiao, L.1
Hu, B.2
Croitoru, M.3
Lewis, P.4
Dasmahapatra, S.5
-
76
-
-
34548477450
-
Network externalities, layered protection and IT security risk management
-
DOI 10.1016/j.dss.2006.08.009, PII S0167923606001217
-
W.T. Yue, M. Cakanyildirim, Y.U. Ryu, and D. Liu Network externalities, layered protection and IT security risk management Decision Support Systems 44 2007 1 16 (Pubitemid 47374296)
-
(2007)
Decision Support Systems
, vol.44
, Issue.1
, pp. 1-16
-
-
Yue, W.T.1
Cakanyildirim, M.2
Ryu, Y.U.3
Liu, D.4
-
78
-
-
33751017682
-
Behaviors of susceptible-infected epidemics on scale-free networks with identical infectivity
-
T. Zhou, J.G. Liu, W.J. Bai, G.C. Chen, and B. Wang Behaviors of susceptible-infected epidemics on scale-free networks with identical infectivity Physical Review E 74 2006 056109
-
(2006)
Physical Review e
, vol.74
, pp. 056109
-
-
Zhou, T.1
Liu, J.G.2
Bai, W.J.3
Chen, G.C.4
Wang, B.5
-
79
-
-
0034721164
-
Error and attack tolerance of complex networks
-
DOI 10.1038/35019019
-
R. Albert, H. Jeong, and A.L. Barabási Error and Attack Tolerance of Complex Networks Nature 406 2000 378 382 (Pubitemid 30625551)
-
(2000)
Nature
, vol.406
, Issue.6794
, pp. 378-382
-
-
Albert, R.1
Jeong, H.2
Barabasi, A.-L.3
-
80
-
-
84897518611
-
Hitech Act Three Years Later: Are Health Records Safe?
-
(Kaufman Russin & Co., 2012)
-
Kaufman Rossin & Co Hitech Act Three Years Later: Are Health Records Safe? White paper Series 2012 (Kaufman Russin & Co., 2012)
-
(2012)
White Paper Series
-
-
Rossin, K.1
-
81
-
-
84897489734
-
-
Mass United States
-
S. Dynes, H. Brechbühl, and M.E. Johnson Information Security in the Extended Enterprise: Some Initial Results from a Field Study of an Industrial Firm, Fourth Workshop on Economics of Information Security, June 2-3, 2005, Cambridge 2005 Mass United States
-
(2005)
Information Security in the Extended Enterprise: Some Initial Results from A Field Study of An Industrial Firm, Fourth Workshop on Economics of Information Security, June 2-3, 2005, Cambridge
-
-
Dynes, S.1
Brechbühl, H.2
Johnson, M.E.3
|