Securing Health Information
暂无分享,去创建一个
[1] Klara Nahrstedt,et al. Security Concerns in Android mHealth Apps , 2014, AMIA.
[2] Anita L. Tucker. Work Design Drivers of Organizational Learning about Operational Failures: A Laboratory Experiment on Medication Administration , 2012 .
[3] Kelce S. Wilson. Conflicts Among the Pillars of Information Assurance , 2013, IT Professional.
[4] Marcel Worring,et al. NIST Special Publication , 2005 .
[5] Ali Sunyaev,et al. Availability and quality of mobile health app privacy policies , 2015, J. Am. Medical Informatics Assoc..
[6] R. Paul,et al. Healthcare information systems: a patient-user perspective , 2012 .
[7] Merrill Warkentin,et al. Beyond Deterrence: An Expanded View of Employee Computer Abuse , 2013, MIS Q..
[8] Julia Adler-Milstein,et al. More than half of US hospitals have at least a basic EHR, but stage 2 criteria remain challenging for most. , 2014, Health affairs.
[9] William J. Buchanan,et al. Monitoring information security risks within health care , 2013, Comput. Secur..
[10] Denise L Anthony,et al. Meaningful use of electronic health record systems and process quality of care: evidence from a panel data analysis of U.S. acute-care hospitals. , 2013, Health services research.
[11] K. Scarfone,et al. Guidelines for Managing the Security of Mobile Devices in the Enterprise , 2013 .