Exploring information assurance to support electronic health record systems
暂无分享,去创建一个
[1] David Kotz,et al. Privacy in mobile technology for personal healthcare , 2012, CSUR.
[2] Thomas A. Babbitt. Information assurance in Resource Constraint Networks , 2016 .
[3] Masao Mukaidono,et al. Smart Grid Information Security (IS) Functional Requirement , 2011, ArXiv.
[4] D. Mcintyre,et al. Paying for and receiving benefits from health services in South Africa: is the health system equitable? , 2012, Health policy and planning.
[5] Vijay Varadharajan,et al. A Note on Trust-Enhanced Security , 2009, IEEE Security & Privacy.
[6] G. Wright,et al. Knowledge and attitudes of nurses in community health centres about electronic medical records. , 2014, Curationis.
[7] Liezel Cilliers,et al. Improving the information security of personal electronic health records to protect a patient's health information , 2017, 2017 Conference on Information Communication Technology and Society (ICTAS).
[8] Sarah Harvey,et al. Defending Against Cyber Espionage: The US Office of Personnel Management Hack as a Case Study in Information Assurance , 2016 .
[9] Leandros A. Maglaras,et al. Human behaviour as an aspect of cybersecurity assurance , 2016, Secur. Commun. Networks.
[10] Corey D. Schou,et al. A Model for Information Assurance : An Integrated Approach , 2001 .
[11] Liezel Cilliers,et al. The extent to which the POPI act makes provision for patient privacy in mobile personal health record systems , 2016, 2016 IST-Africa Week Conference.