Medical Data Breaches: What the Reported Data Illustrates, and Implications for Transitioning to Electronic Medical Records
暂无分享,去创建一个
[1] Brian Hayes,et al. What Is Cloud Computing? , 2019, Cloud Technologies.
[2] William Roberds,et al. Data Breaches and Identity Theft , 2008, WEIS.
[3] Patrick Burkart,et al. Trends in Digital Music Archiving , 2008, Inf. Soc..
[4] Peter G. Goldschmidt,et al. HIT and MIS , 2005, Commun. ACM.
[5] Prashant Pandey,et al. Cloud computing , 2010, ICWET.
[6] Roger Dingledine,et al. Financial Cryptography and Data Security: 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers , 2009 .
[7] M. Eric Johnson,et al. Data Hemorrhages in the Health-Care Sector , 2009, Financial Cryptography.
[8] Patricia Williams,et al. Breaches in Medical Information Security: The Problem of Reporting , 2010, Security and Management.
[9] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[10] Patricia A. H. Williams. The underestimation of threats to patient data in clinical practice , 2005, AISM.
[11] Chlotia Posey Garrison,et al. A Longitudinal Analysis of Data Breaches , 2011, Inf. Manag. Comput. Secur..
[12] Helmut Schneider,et al. The domino effect of password reuse , 2004, CACM.
[13] Moshe Zviran,et al. Password Security: An Empirical Study , 1999, J. Manag. Inf. Syst..
[14] R. Steinbrook,et al. For sale: physicians' prescribing data. , 2006, The New England journal of medicine.