Security Dilemma: Healthcare Clinicians at Work
暂无分享,去创建一个
[1] David W. Bates,et al. Position Paper: Factors and Forces Affecting EHR System Adoption: Report of a 2004 ACMI Discussion , 2004, J. Am. Medical Informatics Assoc..
[2] John McGready,et al. Health information, the HIPAA privacy rule, and health care: what do physicians think? , 2005, Health affairs.
[3] Bettina Berendt,et al. E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.
[4] Louise Yngström,et al. A Holistic Approach to IT Security , 1995 .
[5] K. K. Kim,et al. An examination of factors for the strategic use of information systems in the healthcare industry , 1990 .
[6] M. Patton,et al. Qualitative evaluation and research methods , 1992 .
[7] Colin Potts,et al. Design of Everyday Things , 1988 .
[8] Audun Jøsang,et al. Trust Requirements in Identity Management , 2005, ACSW.
[9] Marc Berg,et al. Implementing information systems in health care organizations: myths and challenges , 2001, Int. J. Medical Informatics.