-
1
-
-
27644565865
-
Can electronic medical record systems transform health care? Potential health benefits, savings, and costs
-
Hillestad R, Bigelow J, Bower A, Girosi F, Meill R, Scoville R., Taylor R. Can electronic medical record systems transform health care? Potential health benefits, savings, and costs. Health Affairs, 2005;24(5): 1103-1117.
-
(2005)
Health Affairs
, vol.24
, Issue.5
, pp. 1103-1117
-
-
Hillestad, R.1
Bigelow, J.2
Bower, A.3
Girosi, F.4
Meill, R.5
Scoville, R.6
Taylor, R.7
-
4
-
-
85020158130
-
-
Breach Notification Rule. 45 CFR 164.400-414. Washington, D.C.: [updated 2010 cited 2015 Aug 23]
-
U.S. Department of Health and Human Services [homepage on the Internet]. Breach Notification Rule. 45 CFR 164.400-414. Washington, D.C.: [updated 2010; cited 2015 Aug 23]. Available from: http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule.
-
U.S. Department of Health and Human Services [Homepage on the Internet]
-
-
-
5
-
-
84859116351
-
Medical data breaches: Notification delayed is notification denied
-
Kierkegaard P. Medical data breaches: Notification delayed is notification denied. Computer Law and Security Review. 2012; 28(2): 163-183. Available from: doi:10.1016/j.clsr.2012.01.003
-
(2012)
Computer Law and Security Review
, vol.28
, Issue.2
, pp. 163-183
-
-
Kierkegaard, P.1
-
6
-
-
84969426278
-
Cybersquatting gives the Web a bad name
-
Koehler W. Cybersquatting gives the Web a bad name. Searcher. 2008; 16(8): 12.
-
(2008)
Searcher
, vol.16
, Issue.8
, pp. 12
-
-
Koehler, W.1
-
8
-
-
85116185502
-
Responding to organised crime through intervention in recruitment pathways
-
Smith RG. Responding to organised crime through intervention in recruitment pathways. Trends & Issues in Crime & Criminal Justice. 2014; 473: 1-9.
-
(2014)
Trends & Issues in Crime & Criminal Justice
, vol.473
, pp. 1-9
-
-
Smith, R.G.1
-
9
-
-
84863111146
-
A new security model to prevent denial-of-service attacks and violation of availability in wireless networks
-
Malekzadeh M, Ghani AA, Subramaniam S. A new security model to prevent denial-of-service attacks and violation of availability in wireless networks. International Journal of Communication Systems. 2012; 25(7): 903-925. Available from: doi:10.1002/dac.1296.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.7
, pp. 903-925
-
-
Malekzadeh, M.1
Ghani, A.A.2
Subramaniam, S.3
-
10
-
-
84891429299
-
Cyberterrorism: Is the U.S Healthcare System Safe?
-
Harries D, Yellowlees P. Cyberterrorism: Is the U.S. Healthcare System Safe? Telemedicine and E-Health. 2013; 19(1): 61-66. doi:10.1089/tmj.2012.0022.
-
(2013)
Telemedicine and E-Health
, vol.19
, Issue.1
, pp. 61-66
-
-
Harries, D.1
Yellowlees, P.2
-
11
-
-
84897107428
-
Detecting inappropriate access to electronic health records using collaborative filtering
-
Menon A, Jiang X, Kim J, Vaidya J, Ohno-Machado L. Detecting inappropriate access to electronic health records using collaborative filtering. Mach Learn. 2013; 95(1): 87-101. Available from: doi:10.1007/s10994-013-5376-1.
-
(2013)
Mach Learn
, vol.95
, Issue.1
, pp. 87-101
-
-
Menon, A.1
Jiang, X.2
Kim, J.3
Vaidya, J.4
Ohno-Machado, L.5
-
13
-
-
84894100692
-
Concern about security and privacy, and perceived control over collection and use of health information are related to withholding of health information from healthcare providers
-
Agaku IT, Adisa AO, Ayo-Yusuf OA, Connolly GN. Concern about security and privacy, and perceived control over collection and use of health information are related to withholding of health information from healthcare providers. Journal of The American Medical Informatics Association 2014. Journal of the American Medical Informatics Association. 21(2): 374-378. Available from: doi:10.1136/amiajnl-2013-002079.
-
Journal of the American Medical Informatics Association 2014 Journal of the American Medical Informatics Association
, vol.21
, Issue.2
, pp. 374-378
-
-
Agaku, I.T.1
Adisa, A.O.2
Ayo-Yusuf, O.A.3
Connolly, G.N.4
-
14
-
-
84871879163
-
Security practices and regulatory compliance in the healthcare industry
-
Kwon J, & Johnson ME. (2013). Security practices and regulatory compliance in the healthcare industry. Journal of the American Medical Informatics Association. 2013; 20(1): 44-51. Available from: doi:10.1136/amiajnl-2012-000906.
-
(2013)
Journal of the American Medical Informatics Association 2013
, vol.20
, Issue.1
, pp. 44-51
-
-
Kwon, J.1
Johnson, M.E.2
-
15
-
-
57649095360
-
A trusting environment, everyone is responsible for information security
-
Williams PA. In a trusting environment, everyone is responsible for information security. Information Security Technical Report. 2008; 13(4): 207-215. Available from: doi:10.1016/j.istr.2008.10.009.
-
(2008)
Information Security Technical Report
, vol.13
, Issue.4
, pp. 207-215
-
-
Williams, P.A.1
-
16
-
-
84892369906
-
A decision methodology for managing operational efficiency and information disclosure risk in healthcare processes
-
Bai X, Gopal R, Nunez M, Zhdanov D. A decision methodology for managing operational efficiency and information disclosure risk in healthcare processes. Decision Support Systems. 2014; 57: 406-416. Available from: doi:10.1016/j.dss.2012.10.046.
-
(2014)
Decision Support Systems
, vol.57
, pp. 406-416
-
-
Bai, X.1
Gopal, R.2
Nunez, M.3
Zhdanov, D.4
-
17
-
-
77951135204
-
The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online
-
Bansal G, Zahedi F, Gefen D. The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems. 2014; 49: 138-150. Available from: doi:10.1016/j.dss.2010.01.010.
-
(2014)
Decision Support Systems
, vol.49
, pp. 138-150
-
-
Bansal, G.1
Zahedi, F.2
Gefen, D.3
-
18
-
-
84865238396
-
Impact of HIPAA provisions on the stock market value of healthcare institutions, and information security and other information technology firms
-
Khansa L, Cook DF, James T, Bruyaka O. Impact of HIPAA provisions on the stock market value of healthcare institutions, and information security and other information technology firms. Computers & Security. 2012; 31: 750-770. Available from: doi:10.1016/j.cose.2012.06.007.
-
(2012)
Computers & Security
, vol.31
, pp. 750-770
-
-
Khansa, L.1
Cook, D.F.2
James, T.3
Bruyaka, O.4
-
19
-
-
78649636201
-
The economics of cybersecurity: Principles and policy options
-
Moore, T. The economics of cybersecurity: Principles and policy options. International Journal of Critical Infrastructure Protection. 2010; 3: 103-117. Available from: doi:10.1016/j.ijcip.2010.10.002.
-
(2010)
International Journal of Critical Infrastructure Protection
, vol.3
, pp. 103-117
-
-
Moore, T.1
-
20
-
-
77956563657
-
Feature: Healthcare biometrics-defending patients and their data
-
Gold S. Feature: Healthcare biometrics-defending patients and their data. Biometric Technology Today. 2010; (7): 109-11. Available from: doi:10.1016/S0969-4765(10)70145-4.
-
(2010)
Biometric Technology Today
, vol.7
, pp. 109-111
-
-
Gold, S.1
-
22
-
-
84904892576
-
-
[updated 2014, cited 2015 Aug 20] SANS Institute
-
SANS Institute. Health Care Cyberthreat Report 2014:2-41. [updated 2014, cited 2015 Aug 20]. Available from http://pages.norse-corp.com/rs/norse/images/Norse-SANS-Healthcare-Cyberthreat-Report2014.pdf.
-
(2014)
Health Care Cyberthreat Report
, pp. 2-41
-
-
-
24
-
-
84957902709
-
-
[cited 2015 Aug 20] EMC
-
EMC, 2013. Cybercrime and the Healthcare Industry. [cited 2015 Aug 20]. Available from: http://www.emc.com/colla teral/white-papers/h12105-cybercrime-healthcare-industry-rsa-wp.pdf.
-
(2013)
Cybercrime and the Healthcare Industry
-
-
|