-
1
-
-
0003699872
-
-
The National Academies Press
-
Committee on Maintaining Privacy and Security in Health Care Applications of the National Information Infrastructure, Commission on Physical Sciences, Mathematics, and Applications, National Research Council For the Record: Protecting Electronic Health Information 1997, The National Academies Press.
-
(1997)
For the Record: Protecting Electronic Health Information
-
-
-
2
-
-
80455156922
-
Information security and privacy in healthcare: current state of research
-
Appari A., Johnson M.E. Information security and privacy in healthcare: current state of research. Int. J. Internet Enterp. Manag. 2010, 6(4):279-314.
-
(2010)
Int. J. Internet Enterp. Manag.
, vol.6
, Issue.4
, pp. 279-314
-
-
Appari, A.1
Johnson, M.E.2
-
3
-
-
84926959769
-
-
(accessed 04.08.13)
-
European Network and Information Security Agency ENISA Threat Landscape. Responding to the Evolving Threat Environment 2012, Available from http://www.enisa.europa.eu/activities/risk-management/evolving-threat-environment/ENISA_Threat_Landscape/at_download/fullReport (accessed 04.08.13).
-
(2012)
ENISA Threat Landscape. Responding to the Evolving Threat Environment
-
-
-
4
-
-
84859116351
-
Medical data breaches: notification delayed is notification denied
-
Kierkegaard P. Medical data breaches: notification delayed is notification denied. Comput. Law Secur. Rev. 2012, 28(2):163-183.
-
(2012)
Comput. Law Secur. Rev.
, vol.28
, Issue.2
, pp. 163-183
-
-
Kierkegaard, P.1
-
5
-
-
47949102642
-
Using a game to introduce lightweight requirements engineering
-
IEEE Computer Society Press, New Delhi, India
-
Smith R., Gotel O. Using a game to introduce lightweight requirements engineering. 15th IEEE International Requirements Engineering Conference 2007, 379-380. IEEE Computer Society Press, New Delhi, India.
-
(2007)
15th IEEE International Requirements Engineering Conference
, pp. 379-380
-
-
Smith, R.1
Gotel, O.2
-
6
-
-
63049132678
-
How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management
-
Liginlal D., Sim I., Khansa L. How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management. Comput. Secur. 2009, 28(3-4):215-228.
-
(2009)
Comput. Secur.
, vol.28
, Issue.3-4
, pp. 215-228
-
-
Liginlal, D.1
Sim, I.2
Khansa, L.3
-
7
-
-
84927092719
-
-
(accessed 04.10.13).
-
Privacy Rights Clearinghouse, 2013. Available from https://www.privacyrights.org/data-breach (accessed 04.10.13).
-
(2013)
-
-
-
8
-
-
74549207114
-
-
(accessed 04.02.14)
-
U.S.Department of Health & Human Services Health Information Privacy 2014, Available from http://www.hhs.gov/ocr/privacy/ (accessed 04.02.14).
-
(2014)
Health Information Privacy
-
-
-
9
-
-
84927032653
-
-
(accessed 04.02.14)
-
HealthIT Health Information Technology 2013, Available from http://www.healthit.gov/ (accessed 04.02.14).
-
(2013)
Health Information Technology
-
-
-
11
-
-
84878197970
-
Security and privacy in electronic health records: a systematic literature review
-
Fernández-Alemán J.L., Señor I.C., Lozoya P.A.O., Toval A. Security and privacy in electronic health records: a systematic literature review. J. Biomed. Inform. 2013, 46(3):541-562.
-
(2013)
J. Biomed. Inform.
, vol.46
, Issue.3
, pp. 541-562
-
-
Fernández-Alemán, J.L.1
Señor, I.C.2
Lozoya, P.A.O.3
Toval, A.4
-
12
-
-
84865392413
-
[Access control management in electronic health records: a systematic literature review]
-
Carrion Senor I., Fernandez-Aleman J.L., Toval A. [Access control management in electronic health records: a systematic literature review]. Gac. Sanit. 2012, 26(5):463-468.
-
(2012)
Gac. Sanit.
, vol.26
, Issue.5
, pp. 463-468
-
-
Carrion Senor, I.1
Fernandez-Aleman, J.L.2
Toval, A.3
-
13
-
-
57649095360
-
In a 'trusting' environment, everyone is responsible for information security
-
Williams P.A.H. In a 'trusting' environment, everyone is responsible for information security. Inf. Secur. Tech. Rep. 2008, 13(4):207-215.
-
(2008)
Inf. Secur. Tech. Rep.
, vol.13
, Issue.4
, pp. 207-215
-
-
Williams, P.A.H.1
-
14
-
-
77956652072
-
Human factors in information security: the insider threat - who can you trust these days?
-
Colwill C. Human factors in information security: the insider threat - who can you trust these days?. Inf. Secur. Tech. Rep. 2009, 14(4):186-196.
-
(2009)
Inf. Secur. Tech. Rep.
, vol.14
, Issue.4
, pp. 186-196
-
-
Colwill, C.1
-
15
-
-
84859942981
-
Healthcare professionals' organisational barriers to health information technologies-a literature review
-
Lluch M. Healthcare professionals' organisational barriers to health information technologies-a literature review. Int. J. Med. Inform. 2011, 80(12):849-862.
-
(2011)
Int. J. Med. Inform.
, vol.80
, Issue.12
, pp. 849-862
-
-
Lluch, M.1
-
16
-
-
70349448077
-
Human and organizational factors in computer and information security: pathways to vulnerabilities
-
Kraemer S., Carayon P., Clem J. Human and organizational factors in computer and information security: pathways to vulnerabilities. Comput. Secur. 2009, 28(7):509-520.
-
(2009)
Comput. Secur.
, vol.28
, Issue.7
, pp. 509-520
-
-
Kraemer, S.1
Carayon, P.2
Clem, J.3
-
17
-
-
13844266517
-
Internet security and privacy protection for the health care professional
-
Alban R.F., Feldmar D., Gabbay J., Lefor A.T. Internet security and privacy protection for the health care professional. Curr. Surg. 2005, 62(1):106-110.
-
(2005)
Curr. Surg.
, vol.62
, Issue.1
, pp. 106-110
-
-
Alban, R.F.1
Feldmar, D.2
Gabbay, J.3
Lefor, A.T.4
-
18
-
-
84927041395
-
-
Department of Health and Human Services, Available from(accessed 04.02.14)
-
The Office of the National Coordinator for Health Information Technology Guide to Privacy and Security of Health Information 2014, Department of Health and Human Services, Available from http://www.healthit.gov/sites/default/files/pdf/privacy/privacy-and-security-guide.pdf (accessed 04.02.14).
-
(2014)
Guide to Privacy and Security of Health Information
-
-
-
20
-
-
77956057059
-
Security requirements and solutions in electronic health records: lessons learned from a comparative study
-
Farzandipour M., Sadoughi F., Ahmadi M., Karimi I. Security requirements and solutions in electronic health records: lessons learned from a comparative study. J. Med. Syst. 2010, 34(4):629-642.
-
(2010)
J. Med. Syst.
, vol.34
, Issue.4
, pp. 629-642
-
-
Farzandipour, M.1
Sadoughi, F.2
Ahmadi, M.3
Karimi, I.4
-
21
-
-
71549131048
-
Clinician assessments of workplace security training - an informatics perspective
-
Fernando J., Dawson L. Clinician assessments of workplace security training - an informatics perspective. Electron. J. Health Inform. 2008, 3(1):e7.
-
(2008)
Electron. J. Health Inform.
, vol.3
, Issue.1
, pp. e7
-
-
Fernando, J.1
Dawson, L.2
-
22
-
-
79952500732
-
The human element: training, awareness, and human resources implications of health information security policy under the Health Insurance Portability and Accountability Act (HIPAA)
-
ACM
-
Jeremy S.C. The human element: training, awareness, and human resources implications of health information security policy under the Health Insurance Portability and Accountability Act (HIPAA). Information Security Curriculum Development Conference (InfoSecCD'09) 2009, 95-99. ACM.
-
(2009)
Information Security Curriculum Development Conference (InfoSecCD'09)
, pp. 95-99
-
-
Jeremy, S.C.1
-
23
-
-
71549166995
-
The health information system security threat lifecycle: an informatics theory
-
Fernando J.I., Dawson L.L. The health information system security threat lifecycle: an informatics theory. Int. J. Med. Inform. 2009, 78(12):815-826.
-
(2009)
Int. J. Med. Inform.
, vol.78
, Issue.12
, pp. 815-826
-
-
Fernando, J.I.1
Dawson, L.L.2
-
24
-
-
1842582058
-
Health informatics education for clinicians and managers-what's holding up progress?
-
Murphy J., Stramer K., Clamp S., Grubb P., Gosland J., Davis S. Health informatics education for clinicians and managers-what's holding up progress?. Int. J. Med. Inform. 2004, 73(2):205-213.
-
(2004)
Int. J. Med. Inform.
, vol.73
, Issue.2
, pp. 205-213
-
-
Murphy, J.1
Stramer, K.2
Clamp, S.3
Grubb, P.4
Gosland, J.5
Davis, S.6
-
25
-
-
84858154228
-
Perspectives of Australian adults about protecting the privacy of their health information in statistical databases
-
King T., Brankovic L., Gillard P. Perspectives of Australian adults about protecting the privacy of their health information in statistical databases. Int. J. Med. Inform. 2012, 81(4):279-289.
-
(2012)
Int. J. Med. Inform.
, vol.81
, Issue.4
, pp. 279-289
-
-
King, T.1
Brankovic, L.2
Gillard, P.3
-
26
-
-
84891826514
-
The natural hospital environment: a socio-technical-material perspective
-
Fernando J., Dawson L. The natural hospital environment: a socio-technical-material perspective. Int. J. Med. Inform. 2014, 83(2):140-158.
-
(2014)
Int. J. Med. Inform.
, vol.83
, Issue.2
, pp. 140-158
-
-
Fernando, J.1
Dawson, L.2
-
27
-
-
84875376549
-
Organizational framework for health information technology
-
Rippen H.E., Pan E.C., Russell C., Byrne C.M., Swift E.K. Organizational framework for health information technology. Int. J. Med. Inform. 2013, 82(4):e1-e13.
-
(2013)
Int. J. Med. Inform.
, vol.82
, Issue.4
, pp. e1-e13
-
-
Rippen, H.E.1
Pan, E.C.2
Russell, C.3
Byrne, C.M.4
Swift, E.K.5
-
28
-
-
35348898546
-
The story behind the story: physician skepticism about relying on clinical information technologies to reduce medical errors
-
McAlearney A.S., Chisolm D.J., Schweikhart S., Medow M.A., Kelleher K. The story behind the story: physician skepticism about relying on clinical information technologies to reduce medical errors. Int. J. Med. Inform. 2007, 76(11-12):836-842.
-
(2007)
Int. J. Med. Inform.
, vol.76
, Issue.11-12
, pp. 836-842
-
-
McAlearney, A.S.1
Chisolm, D.J.2
Schweikhart, S.3
Medow, M.A.4
Kelleher, K.5
-
29
-
-
18544374846
-
Evaluation of the human impact of password authentication practices on information security
-
Carstens D., McCauley-Bell P., Malone L., DeMara R. Evaluation of the human impact of password authentication practices on information security. Inf. Sci. 2004, 7:67-85.
-
(2004)
Inf. Sci.
, vol.7
, pp. 67-85
-
-
Carstens, D.1
McCauley-Bell, P.2
Malone, L.3
DeMara, R.4
-
30
-
-
84877963990
-
Monitoring information security risks within health care
-
van Deursen N., Buchanan W.J., Duff A. Monitoring information security risks within health care. Comput. Secur. 2013, 37:31-45.
-
(2013)
Comput. Secur.
, vol.37
, pp. 31-45
-
-
van Deursen, N.1
Buchanan, W.J.2
Duff, A.3
-
31
-
-
84973703306
-
The health belief model and preventive health behavior
-
Rosenstock I.M. The health belief model and preventive health behavior. Health Educ. Monogr. 1974, 2:420-432.
-
(1974)
Health Educ. Monogr.
, vol.2
, pp. 420-432
-
-
Rosenstock, I.M.1
-
32
-
-
61349159889
-
Perceptions of information security in the workplace: linking information security climate to compliant behavior
-
Chan M., Woon I., Kankanhalli A. Perceptions of information security in the workplace: linking information security climate to compliant behavior. J. Inf. Priv. Secur. 2005, 1(3):18.
-
(2005)
J. Inf. Priv. Secur.
, vol.1
, Issue.3
, pp. 18
-
-
Chan, M.1
Woon, I.2
Kankanhalli, A.3
-
33
-
-
61349092288
-
Studying users' computer security behavior: a health belief perspective
-
Ng B.-Y., Kankanhalli A., Xu Y. Studying users' computer security behavior: a health belief perspective. Decis. Support Syst. 2009, 46(4):815-825.
-
(2009)
Decis. Support Syst.
, vol.46
, Issue.4
, pp. 815-825
-
-
Ng, B.-Y.1
Kankanhalli, A.2
Xu, Y.3
-
34
-
-
17844366573
-
Analysis of end user security behaviors
-
Stanton J.M., Stam K.R., Mastrangelo P., Jolton J. Analysis of end user security behaviors. Comput. Secur. 2005, 24(2):124-133.
-
(2005)
Comput. Secur.
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
35
-
-
24644439555
-
Information security policy's impact on reporting security incidents
-
Wiant T.L. Information security policy's impact on reporting security incidents. Comput. Secur. 2005, 24(6):448-459.
-
(2005)
Comput. Secur.
, vol.24
, Issue.6
, pp. 448-459
-
-
Wiant, T.L.1
-
36
-
-
79953706576
-
Challenges surrounding provider/client electronic-mail communication
-
Facchiano L., Snyder C.H. Challenges surrounding provider/client electronic-mail communication. J. Nurse Pract. 2011, 7(4):309-315.
-
(2011)
J. Nurse Pract.
, vol.7
, Issue.4
, pp. 309-315
-
-
Facchiano, L.1
Snyder, C.H.2
-
37
-
-
0037391053
-
Opportunities to enhance patient and physician e-mail contact
-
Hobbs J., Wald J., Jagannath Y.S., Kittler A., Pizziferri L., Volk L.A., Middleton B., Bates D.W. Opportunities to enhance patient and physician e-mail contact. Int. J. Med. Inform. 2003, 70(1):1-9.
-
(2003)
Int. J. Med. Inform.
, vol.70
, Issue.1
, pp. 1-9
-
-
Hobbs, J.1
Wald, J.2
Jagannath, Y.S.3
Kittler, A.4
Pizziferri, L.5
Volk, L.A.6
Middleton, B.7
Bates, D.W.8
-
38
-
-
77954313605
-
E-mail in patient-provider communication: a systematic review
-
Ye J., Rust G., Fry-Johnson Y., Strothers H. E-mail in patient-provider communication: a systematic review. Patient Educ. Couns. 2010, 80(2):266-273.
-
(2010)
Patient Educ. Couns.
, vol.80
, Issue.2
, pp. 266-273
-
-
Ye, J.1
Rust, G.2
Fry-Johnson, Y.3
Strothers, H.4
-
39
-
-
34247339315
-
Categorizing the unintended sociotechnical consequences of computerized provider order entry
-
Ash J.S., Sittig D.F., Dykstra R.H., Guappone K., Carpenter J.D., Seshadri V. Categorizing the unintended sociotechnical consequences of computerized provider order entry. Int. J. Med. Inform. 2007, 76(Suppl. 1):S21-S27.
-
(2007)
Int. J. Med. Inform.
, vol.76
, pp. S21-S27
-
-
Ash, J.S.1
Sittig, D.F.2
Dykstra, R.H.3
Guappone, K.4
Carpenter, J.D.5
Seshadri, V.6
-
41
-
-
84892495781
-
New attacks and security model of the secure flash disk
-
Wang A., Li Z., Yang X., Yu Y. New attacks and security model of the secure flash disk. Math. Comput. Model. 2013, 57(11-12):2605-2612.
-
(2013)
Math. Comput. Model.
, vol.57
, Issue.11-12
, pp. 2605-2612
-
-
Wang, A.1
Li, Z.2
Yang, X.3
Yu, Y.4
-
42
-
-
84927092718
-
-
(accessed 25.04.14)
-
HealthcareInfoSecurity Healthcare Information Security Today 2013, Available from http://docs.ismgcorp.com/files/handbooks/HIS-Survey-2012/HIS_Survey_Report_2012.pdf (accessed 25.04.14).
-
(2013)
Healthcare Information Security Today
-
-
-
43
-
-
24144454227
-
USB & other portable storage device usage: be aware of the risks to your corporate data in order to take pre-emptive and/or corrective action
-
Gorge M. USB & other portable storage device usage: be aware of the risks to your corporate data in order to take pre-emptive and/or corrective action. Comput. Fraud Secur. 2005, 2005(8):15-17.
-
(2005)
Comput. Fraud Secur.
, vol.2005
, Issue.8
, pp. 15-17
-
-
Gorge, M.1
-
45
-
-
0033277446
-
Password security: an empirical study
-
Zviran M., Haga W.J. Password security: an empirical study. J. Manag. Inf. Syst. 1999, 15(4):161-185.
-
(1999)
J. Manag. Inf. Syst.
, vol.15
, Issue.4
, pp. 161-185
-
-
Zviran, M.1
Haga, W.J.2
-
46
-
-
34249733184
-
Improving password security and memorability to protect personal and organizational information
-
Vu K.-P.L., Proctor R.W., Bhargav-Spantzel A., Tai B.-L., Cook J., Eugene Schultz E. Improving password security and memorability to protect personal and organizational information. Int. J. Hum.-Comput. Stud. 2007, 65(8):744-757.
-
(2007)
Int. J. Hum.-Comput. Stud.
, vol.65
, Issue.8
, pp. 744-757
-
-
Vu, K.-P.L.1
Proctor, R.W.2
Bhargav-Spantzel, A.3
Tai, B.-L.4
Cook, J.5
Eugene Schultz, E.6
-
47
-
-
70149084205
-
ISO/IEC 27002:2005 - Information technology - Security techniques - Code of practice for information security management
-
ISO/IEC 27002:2005 - Information technology - Security techniques - Code of practice for information security management.
-
-
-
-
48
-
-
56649106031
-
-
NIST, Available from(accessed 04.02.14)
-
Scholl M.A., Stine K.M., Hash J., Bowen P., Johnson L.A., Smith C.D., Steinberg D. An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule 2009, NIST, Available from http://csrc.nist.gov/publications/nistpubs/800-66-Rev1/SP-800-66-Revision1.pdf (accessed 04.02.14).
-
(2009)
An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
-
-
Scholl, M.A.1
Stine, K.M.2
Hash, J.3
Bowen, P.4
Johnson, L.A.5
Smith, C.D.6
Steinberg, D.7
-
52
-
-
84899075758
-
Guía de buenas prácticas de seguridad informática en el tratamiento de datos de salud para el personal sanitario en atención primaria
-
Sánchez-Henarejos A., Fernández-Alemán J.L., Toval A., Hernández-Hernández I., Sánchez-García A.B., Carrillo de Gea J.M. Guía de buenas prácticas de seguridad informática en el tratamiento de datos de salud para el personal sanitario en atención primaria. Aten. Prim. 2014, 46(4):214-222.
-
(2014)
Aten. Prim.
, vol.46
, Issue.4
, pp. 214-222
-
-
Sánchez-Henarejos, A.1
Fernández-Alemán, J.L.2
Toval, A.3
Hernández-Hernández, I.4
Sánchez-García, A.B.5
Carrillo de Gea, J.M.6
-
53
-
-
84864135178
-
Internationalization requirements for e-learning audit purposes
-
Cos J.A., Toval R., Toval A., Fernández-Alemán J.L., Carrillo-de-Gea J.M., Nicolás J. Internationalization requirements for e-learning audit purposes. Global Engineering Education Conference (EDUCON) 2012, 1-6.
-
(2012)
Global Engineering Education Conference (EDUCON)
, pp. 1-6
-
-
Cos, J.A.1
Toval, R.2
Toval, A.3
Fernández-Alemán, J.L.4
Carrillo-de-Gea, J.M.5
Nicolás, J.6
-
54
-
-
62749139692
-
Design, application and testing of the Work Observation Method by Activity Timing (WOMBAT) to measure clinicians' patterns of work and communication
-
Westbrook J.I., Ampt A. Design, application and testing of the Work Observation Method by Activity Timing (WOMBAT) to measure clinicians' patterns of work and communication. Int. J. Med. Inform. 2009, 78(Suppl. 1):S25-S33.
-
(2009)
Int. J. Med. Inform.
, vol.78
, pp. S25-S33
-
-
Westbrook, J.I.1
Ampt, A.2
-
56
-
-
0036559882
-
Improving computer security for authentication of users: influence of proactive password restrictions
-
Proctor R.W., Lien M.C., Vu K.P., Schultz E.E., Salvendy G. Improving computer security for authentication of users: influence of proactive password restrictions. Behav. Res. Methods Instrum. Comput. 2002, 34(2):163-169.
-
(2002)
Behav. Res. Methods Instrum. Comput.
, vol.34
, Issue.2
, pp. 163-169
-
-
Proctor, R.W.1
Lien, M.C.2
Vu, K.P.3
Schultz, E.E.4
Salvendy, G.5
-
57
-
-
84870830753
-
Passwords usage and human memory limitations: a survey across age and educational background
-
Pilar D.R., Jaeger A., Gomes C.F., Stein L.M. Passwords usage and human memory limitations: a survey across age and educational background. PLoS ONE 2012, 7(12):e51067.
-
(2012)
PLoS ONE
, vol.7
, Issue.12
, pp. e51067
-
-
Pilar, D.R.1
Jaeger, A.2
Gomes, C.F.3
Stein, L.M.4
-
58
-
-
77955231421
-
Effectiveness of image-based mnemonic techniques for enhancing the memorability and security of user-generated passwords
-
Nelson D., Vu K.-P.L. Effectiveness of image-based mnemonic techniques for enhancing the memorability and security of user-generated passwords. CHB 2010, 26(4):705-715.
-
(2010)
CHB
, vol.26
, Issue.4
, pp. 705-715
-
-
Nelson, D.1
Vu, K.-P.L.2
-
59
-
-
4243096135
-
The domino effect of password reuse
-
Ives B., Walsh K.R., Schneider H. The domino effect of password reuse. Commun. ACM 2004, 47(4):75-78.
-
(2004)
Commun. ACM
, vol.47
, Issue.4
, pp. 75-78
-
-
Ives, B.1
Walsh, K.R.2
Schneider, H.3
-
60
-
-
84926955578
-
-
College Bescherming Persoonsgegevens, Inspectie voor de Gezondheidszorg, Den Haag, Available from(accessed 04.02.14)
-
Beuving J. IGZ/CBP. Informatiebeveiliging in ziekenhuizen voldoet niet aan de norm 2008, College Bescherming Persoonsgegevens, Inspectie voor de Gezondheidszorg, Den Haag, Available from http://www.cbpweb.nl/downloads_rapporten/rap_2008_informatiebeveiliging_ziekenhuizen.pdf (accessed 04.02.14).
-
(2008)
IGZ/CBP. Informatiebeveiliging in ziekenhuizen voldoet niet aan de norm
-
-
Beuving, J.1
-
62
-
-
84927073844
-
Virus and spam protection
-
Digital Press, Burlington, (Chapter 9)
-
Haletky E. Virus and spam protection. Deploying LINUX on the Desktop 2005, 141-150. Digital Press, Burlington, (Chapter 9).
-
(2005)
Deploying LINUX on the Desktop
, pp. 141-150
-
-
Haletky, E.1
-
63
-
-
29344440765
-
Email security best practice
-
Sunner M. Email security best practice. Netw. Secur. 2005, 2005(12):4-7.
-
(2005)
Netw. Secur.
, vol.2005
, Issue.12
, pp. 4-7
-
-
Sunner, M.1
-
64
-
-
79953711706
-
Symbiotic filtering for spam email detection
-
Lopes C., Cortez P., Sousa P., Rocha M., Rio M. Symbiotic filtering for spam email detection. Expert Syst. Appl. 2011, 38(8):9365-9372.
-
(2011)
Expert Syst. Appl.
, vol.38
, Issue.8
, pp. 9365-9372
-
-
Lopes, C.1
Cortez, P.2
Sousa, P.3
Rocha, M.4
Rio, M.5
-
65
-
-
84927001663
-
The Radicati Group I. Email Statistics Report, 2013-2017
-
(accessed 04.02.14).
-
The Radicati Group I. Email Statistics Report, 2013-2017, Available from (accessed 04.02.14). http://www.radicati.com/.
-
-
-
-
66
-
-
69549088272
-
The use of wireless e-mail to improve healthcare team communication
-
O'Connor C., Friedrich J.O., Scales D.C., Adhikari N.K.J. The use of wireless e-mail to improve healthcare team communication. J. Am. Med. Inform. Assoc. 2009, 16(5):705-713.
-
(2009)
J. Am. Med. Inform. Assoc.
, vol.16
, Issue.5
, pp. 705-713
-
-
O'Connor, C.1
Friedrich, J.O.2
Scales, D.C.3
Adhikari, N.K.J.4
-
67
-
-
33751182886
-
"You've got mail!": the role of e-mail in clinical breast surgical practice
-
Guth A.A., Diflo T. "You've got mail!": the role of e-mail in clinical breast surgical practice. Breast 2006, 15(6):713-717.
-
(2006)
Breast
, vol.15
, Issue.6
, pp. 713-717
-
-
Guth, A.A.1
Diflo, T.2
-
68
-
-
84865760248
-
P2P as a CDN: a new service model for file sharing
-
Mondal A., Trestian I., Qin Z., Kuzmanovic A. P2P as a CDN: a new service model for file sharing. Comput. Netw. 2012, 56(14):3233-3246.
-
(2012)
Comput. Netw.
, vol.56
, Issue.14
, pp. 3233-3246
-
-
Mondal, A.1
Trestian, I.2
Qin, Z.3
Kuzmanovic, A.4
-
69
-
-
84879905183
-
An approach for constructing private storage services as a unified fault-tolerant system
-
Gonzalez J.L., Perez J.C., Sosa-Sosa V., Rodriguez Cardoso J.F., Marcelin-Jimenez R. An approach for constructing private storage services as a unified fault-tolerant system. J. Syst. Softw. 2013, 86(7):1907-1922.
-
(2013)
J. Syst. Softw.
, vol.86
, Issue.7
, pp. 1907-1922
-
-
Gonzalez, J.L.1
Perez, J.C.2
Sosa-Sosa, V.3
Rodriguez Cardoso, J.F.4
Marcelin-Jimenez, R.5
-
71
-
-
79961238796
-
Countering targeted file attacks using locationguard
-
USENIX Association, Baltimore, MD
-
Srivatsa M., Liu L. Countering targeted file attacks using locationguard. 14th Conference on USENIX Security Symposium, vol. 14 2005, 6. USENIX Association, Baltimore, MD.
-
(2005)
14th Conference on USENIX Security Symposium, vol. 14
, pp. 6
-
-
Srivatsa, M.1
Liu, L.2
-
72
-
-
70349459633
-
Defending passive worms in unstructured P2P networks based on healthy file dissemination
-
Wang F., Zhang Y., Ma J. Defending passive worms in unstructured P2P networks based on healthy file dissemination. Comput. Secur. 2009, 28(7):628-636.
-
(2009)
Comput. Secur.
, vol.28
, Issue.7
, pp. 628-636
-
-
Wang, F.1
Zhang, Y.2
Ma, J.3
-
73
-
-
84861096936
-
Malware characteristics and threats on the internet ecosystem
-
Chen Z., Roussopoulos M., Liang Z., Zhang Y., Chen Z., Delis A. Malware characteristics and threats on the internet ecosystem. J. Syst. Softw. 2012, 85(7):1650-1672.
-
(2012)
J. Syst. Softw.
, vol.85
, Issue.7
, pp. 1650-1672
-
-
Chen, Z.1
Roussopoulos, M.2
Liang, Z.3
Zhang, Y.4
Chen, Z.5
Delis, A.6
-
74
-
-
84865613927
-
A survey on security issues of reputation management systems for peer-to-peer networks
-
Selvaraj C., Anand S. A survey on security issues of reputation management systems for peer-to-peer networks. Comput. Sci. Rev. 2012, 6(4):145-160.
-
(2012)
Comput. Sci. Rev.
, vol.6
, Issue.4
, pp. 145-160
-
-
Selvaraj, C.1
Anand, S.2
-
75
-
-
84980566608
-
News: advertising malware scammers get smarter
-
News: advertising malware scammers get smarter. Netw. Secur. 2009, 2009(10):19-20.
-
(2009)
Netw. Secur.
, vol.2009
, Issue.10
, pp. 19-20
-
-
-
76
-
-
84864413758
-
Modeling and analysis of the spread of computer virus
-
Zhu Q., Yang X., Ren J. Modeling and analysis of the spread of computer virus. Commun. Nonlinear Sci. Numer. Simul. 2012, 17(12):5117-5124.
-
(2012)
Commun. Nonlinear Sci. Numer. Simul.
, vol.17
, Issue.12
, pp. 5117-5124
-
-
Zhu, Q.1
Yang, X.2
Ren, J.3
-
77
-
-
84927118157
-
USB-based virus/malicious code launch
-
Syngress, Boston, (Chapter 3)
-
Anderson B., Anderson B. USB-based virus/malicious code launch. Seven Deadliest USB Attacks 2010, 65-96. Syngress, Boston, (Chapter 3).
-
(2010)
Seven Deadliest USB Attacks
, pp. 65-96
-
-
Anderson, B.1
Anderson, B.2
-
78
-
-
84886466692
-
-
Kroll Fraud Solutions, Available from(accessed 04.02.14)
-
HIMSS Analytics Report: Security of Patient Data 2012, Kroll Fraud Solutions, Available from http://www.krollcybersecurity.com/media/Kroll-HIMSS_2012_-_Security_of_Patient_Data_040912.pdf (accessed 04.02.14).
-
(2012)
HIMSS Analytics Report: Security of Patient Data
-
-
-
81
-
-
84864572697
-
Trust me. I am a Doctor. Your records are safe?
-
SECAU - Security Research Centre, Edith Cowan University, Mount Lawley, Western Australia
-
Williams P., Valli C. Trust me. I am a Doctor. Your records are safe?. Sixth Australian Information Security Management Conference 2008, 155-162. SECAU - Security Research Centre, Edith Cowan University, Mount Lawley, Western Australia.
-
(2008)
Sixth Australian Information Security Management Conference
, pp. 155-162
-
-
Williams, P.1
Valli, C.2
-
82
-
-
60649102513
-
A qualitative analysis of an electronic health record (EHR) implementation in an academic ambulatory setting
-
Yoon-Flannery K., Zandieh S.O., Kuperman G.J., Langsam D.J., Hyman D., Kaushal R. A qualitative analysis of an electronic health record (EHR) implementation in an academic ambulatory setting. Inform. Prim. Care 2008, 16(4):277-284.
-
(2008)
Inform. Prim. Care
, vol.16
, Issue.4
, pp. 277-284
-
-
Yoon-Flannery, K.1
Zandieh, S.O.2
Kuperman, G.J.3
Langsam, D.J.4
Hyman, D.5
Kaushal, R.6
-
83
-
-
58149252163
-
Patient accessible electronic health records: exploring recommendations for successful implementation strategies
-
Wiljer D., Urowitz S., Apatu E., DeLenardo C., Eysenbach G., Harth T., Pai H., Leonard K.J. Patient accessible electronic health records: exploring recommendations for successful implementation strategies. J. Med. Internet Res. 2008, 10(4):e34.
-
(2008)
J. Med. Internet Res.
, vol.10
, Issue.4
, pp. e34
-
-
Wiljer, D.1
Urowitz, S.2
Apatu, E.3
DeLenardo, C.4
Eysenbach, G.5
Harth, T.6
Pai, H.7
Leonard, K.J.8
-
84
-
-
84926994514
-
-
U.S. Department of Health & Human Services, Available from(accessed 04.02.14)
-
The Office of the National Coordinator for Health Information Technology's Office of the Chief Privacy Officer Cybersecure: Your Medical Practice 2012, U.S. Department of Health & Human Services, Available from http://www.healthit.gov/sites/default/files/cybersecure/cybersecure.html (accessed 04.02.14).
-
(2012)
Cybersecure: Your Medical Practice
-
-
-
85
-
-
0348111346
-
Nurses resisting information technology
-
Timmons S. Nurses resisting information technology. Nurs. Inq. 2003, 10(4):257-269.
-
(2003)
Nurs. Inq.
, vol.10
, Issue.4
, pp. 257-269
-
-
Timmons, S.1
-
86
-
-
42949116497
-
Learning from error: identifying contributory causes of medication errors in an Australian hospital
-
Nichols P., Copeland T.S., Craib I.A., Hopkins P., Bruce D.G. Learning from error: identifying contributory causes of medication errors in an Australian hospital. Med. J. Aust. 2008, 188(5):276-279.
-
(2008)
Med. J. Aust.
, vol.188
, Issue.5
, pp. 276-279
-
-
Nichols, P.1
Copeland, T.S.2
Craib, I.A.3
Hopkins, P.4
Bruce, D.G.5
-
87
-
-
53049103408
-
Information security requirements - interpreting the legal aspects
-
Gerber M., von Solms R. Information security requirements - interpreting the legal aspects. Comput. Secur. 2008, 27(5-6):124-135.
-
(2008)
Comput. Secur.
, vol.27
, Issue.5-6
, pp. 124-135
-
-
Gerber, M.1
von Solms, R.2
-
88
-
-
77957881878
-
Collaborative risk method for information security management practices: a case context within Turkey
-
Ozkan S., Karabacak B. Collaborative risk method for information security management practices: a case context within Turkey. Int. J. Inf. Manag. 2010, 30(6):567-572.
-
(2010)
Int. J. Inf. Manag.
, vol.30
, Issue.6
, pp. 567-572
-
-
Ozkan, S.1
Karabacak, B.2
-
89
-
-
84875468070
-
A VIKOR technique based on DEMATEL and ANP for information security risk control assessment
-
Ou Yang Y.-P., Shieh H.-M., Tzeng G.-H. A VIKOR technique based on DEMATEL and ANP for information security risk control assessment. Inf. Sci. 2013, 232:482-500.
-
(2013)
Inf. Sci.
, vol.232
, pp. 482-500
-
-
Ou Yang, Y.-P.1
Shieh, H.-M.2
Tzeng, G.-H.3
-
90
-
-
77950516190
-
A personal data audit method through requirements engineering
-
Martínez M.A., Lasheras J., Fernández-Medina E., Toval A., Piattini M. A personal data audit method through requirements engineering. Comput. Stand. Interfaces 2010, 32(4):166-178.
-
(2010)
Comput. Stand. Interfaces
, vol.32
, Issue.4
, pp. 166-178
-
-
Martínez, M.A.1
Lasheras, J.2
Fernández-Medina, E.3
Toval, A.4
Piattini, M.5
-
91
-
-
84869493217
-
Impact of standards adoption on healthcare transaction performance: the case of HIPAA
-
Iossifova A.R., Meyer-Goldstein S. Impact of standards adoption on healthcare transaction performance: the case of HIPAA. Int. J. Prod. Econ. 2013, 141(1):277-285.
-
(2013)
Int. J. Prod. Econ.
, vol.141
, Issue.1
, pp. 277-285
-
-
Iossifova, A.R.1
Meyer-Goldstein, S.2
-
92
-
-
4444292882
-
Impact of HIPAA on the integrity of healthcare information
-
Fedorowicz J., Ray A.W. Impact of HIPAA on the integrity of healthcare information. Int. J. Healthc. Technol. Manag. 2004, 6(2):142-157.
-
(2004)
Int. J. Healthc. Technol. Manag.
, vol.6
, Issue.2
, pp. 142-157
-
-
Fedorowicz, J.1
Ray, A.W.2
-
93
-
-
84865238396
-
Impact of HIPAA provisions on the stock market value of healthcare institutions, and information security and other information technology firms
-
Khansa L., Cook D.F., James T., Bruyaka O. Impact of HIPAA provisions on the stock market value of healthcare institutions, and information security and other information technology firms. Comput. Secur. 2012, 31(6):750-770.
-
(2012)
Comput. Secur.
, vol.31
, Issue.6
, pp. 750-770
-
-
Khansa, L.1
Cook, D.F.2
James, T.3
Bruyaka, O.4
-
94
-
-
84902243096
-
Improving compliance with password guidelines: how user perceptions of passwords and security threats affect compliance with guidelines
-
IEEE Computer Society
-
Mwagwabi F., McGill T., Dixon M. Improving compliance with password guidelines: how user perceptions of passwords and security threats affect compliance with guidelines. 47th Hawaii International Conference on System Sciences (HICSS'14) 2014, 3188-3197. IEEE Computer Society.
-
(2014)
47th Hawaii International Conference on System Sciences (HICSS'14)
, pp. 3188-3197
-
-
Mwagwabi, F.1
McGill, T.2
Dixon, M.3
-
96
-
-
84894261595
-
Securing business processes using security risk-oriented patterns
-
Ahmed N., Matulevičius R. Securing business processes using security risk-oriented patterns. Comput. Stand. Interfaces 2014, 36(4):723-733.
-
(2014)
Comput. Stand. Interfaces
, vol.36
, Issue.4
, pp. 723-733
-
-
Ahmed, N.1
Matulevičius, R.2
-
97
-
-
84949178783
-
-
Springer, London
-
Wohlin C., Runeson P., Höst M., Ohlsson M.C., Regnell B., Wesslén A. Experimentation in Software Engineering 2012, Springer, London.
-
(2012)
Experimentation in Software Engineering
-
-
Wohlin, C.1
Runeson, P.2
Höst, M.3
Ohlsson, M.C.4
Regnell, B.5
Wesslén, A.6
-
98
-
-
0002042413
-
The 9 to 5 underground: are you policing computer crimes?
-
Hoffer J.A., Straub D.W. The 9 to 5 underground: are you policing computer crimes?. Sloan Manag. Rev. Summer 1989, 30(4):35.
-
(1989)
Sloan Manag. Rev. Summer
, vol.30
, Issue.4
, pp. 35
-
-
Hoffer, J.A.1
Straub, D.W.2
-
99
-
-
85025316026
-
-
Computer Weekly, Available from(accessed 04.02.14)
-
Kavanagh J. Security Special Report: The Internal Threat 2006, Computer Weekly, Available from http://www.computerweekly.com/feature/Security-special-report-The-internal-threat (accessed 04.02.14).
-
(2006)
Security Special Report: The Internal Threat
-
-
Kavanagh, J.1
-
100
-
-
84930450739
-
A descriptive study of Microsoft's threat modeling technique
-
Scandariato R., Wuyts K., Joosen W. A descriptive study of Microsoft's threat modeling technique. Requir. Eng. 2013, 1-18.
-
(2013)
Requir. Eng.
, pp. 1-18
-
-
Scandariato, R.1
Wuyts, K.2
Joosen, W.3
-
101
-
-
84876988881
-
Scaling of an information system in a public healthcare market-infrastructuring from the vendor's perspective
-
Johannessen L.K., Obstfelder A., Lotherington A.T. Scaling of an information system in a public healthcare market-infrastructuring from the vendor's perspective. Int. J. Med. Inform. 2013, 82(5):e180-e188.
-
(2013)
Int. J. Med. Inform.
, vol.82
, Issue.5
, pp. e180-e188
-
-
Johannessen, L.K.1
Obstfelder, A.2
Lotherington, A.T.3
-
102
-
-
84881374070
-
Instant messaging at the hospital: supporting articulation work?
-
Iversen T.B., Melby L., Toussaint P. Instant messaging at the hospital: supporting articulation work?. Int. J. Med. Inform. 2013, 82(9):753-761.
-
(2013)
Int. J. Med. Inform.
, vol.82
, Issue.9
, pp. 753-761
-
-
Iversen, T.B.1
Melby, L.2
Toussaint, P.3
-
103
-
-
84886596553
-
Requirements engineering for security, privacy and services in cloud environments
-
Gritzalis S., Liu L. Requirements engineering for security, privacy and services in cloud environments. Requir. Eng. 2013, 18(4):297-298.
-
(2013)
Requir. Eng.
, vol.18
, Issue.4
, pp. 297-298
-
-
Gritzalis, S.1
Liu, L.2
-
104
-
-
84886639116
-
Evaluating cloud deployment scenarios based on security and privacy requirements
-
Kalloniatis C., Mouratidis H., Islam S. Evaluating cloud deployment scenarios based on security and privacy requirements. Requir. Eng. 2013, 18(4):299-319.
-
(2013)
Requir. Eng.
, vol.18
, Issue.4
, pp. 299-319
-
-
Kalloniatis, C.1
Mouratidis, H.2
Islam, S.3
-
105
-
-
84886594364
-
A pattern-based method for establishing a cloud-specific information security management system
-
Beckers K., CÔté I., Faßbender S., Heisel M., Hofbauer S. A pattern-based method for establishing a cloud-specific information security management system. Requir. Eng. 2013, 18(4):343-395.
-
(2013)
Requir. Eng.
, vol.18
, Issue.4
, pp. 343-395
-
-
Beckers, K.1
Côté, I.2
Faßbender, S.3
Heisel, M.4
Hofbauer, S.5
-
106
-
-
84857362250
-
Analysis of recommended cloud security controls to validate OpenPMF "policy as a service"
-
Lang U., Schreiner R. Analysis of recommended cloud security controls to validate OpenPMF "policy as a service". Inf. Secur. Tech. Rep. 2011, 16(3-4):131-141.
-
(2011)
Inf. Secur. Tech. Rep.
, vol.16
, Issue.3-4
, pp. 131-141
-
-
Lang, U.1
Schreiner, R.2
|