nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Computer Security Incident: A Case History
|
van der Bijl, Nick |
|
1998 |
4 |
3-4 |
p. 233-234 |
artikel |
2 |
A Preliminary Study of Security in Healthcare Systems on the Information Superhighway: The Malaysian Perspective
|
Abdul-Kareem, Sameem |
|
1998 |
4 |
3-4 |
p. 223-226 |
artikel |
3 |
Confidentiality and Record Summaries
|
Hawking, K. M. |
|
1998 |
4 |
3-4 |
p. 235-235 |
artikel |
4 |
Diabetic registers: a practice survey of patients’ attitudes
|
Wells, M. |
|
1998 |
4 |
3-4 |
p. 216-222 |
artikel |
5 |
Digital patient assistants: privacy vs cost in compulsory health insurance
|
Bleumer, G. |
|
1998 |
4 |
3-4 |
p. 138-156 |
artikel |
6 |
From security to trust
|
Carter, M. |
|
1998 |
4 |
3-4 |
p. 167-173 |
artikel |
7 |
Generic security policies for healthcare information systems
|
Kokolakis, S. |
|
1998 |
4 |
3-4 |
p. 184-195 |
artikel |
8 |
Health information systems, ‘safety’ and organizational learning
|
Beynon-Davies, P. |
|
1998 |
4 |
3-4 |
p. 128-137 |
artikel |
9 |
How the healthcare industry should safeguard data: the view of privacy advocates and industry suggestions for progress
|
Lorton, L. |
|
1998 |
4 |
3-4 |
p. 196-204 |
artikel |
10 |
Implementing access control to protect the confidentiality of patient information in clinical information systems in the acute hospital
|
Denley, I. |
|
1998 |
4 |
3-4 |
p. 174-178 |
artikel |
11 |
Managing security and privacy issues while re-engineering the healthcare enterprise
|
Blyth, A. |
|
1998 |
4 |
3-4 |
p. 157-166 |
artikel |
12 |
Privacy, Confidentiality and Safety of Healthcare Information Systems: Better Information Is Needed
|
Smith, M. F. |
|
1998 |
4 |
3-4 |
p. 124-127 |
artikel |
13 |
Protecting the identity of doctors in drug prescription analysis
|
Matyás°, V. |
|
1998 |
4 |
3-4 |
p. 205-209 |
artikel |
14 |
Safety and Privacy in Clinical Systems: The State of Play
|
Anderson, Ross J. |
|
1998 |
4 |
3-4 |
p. 121-123 |
artikel |
15 |
Security of information in trusts
|
van der Bijl, N. |
|
1998 |
4 |
3-4 |
p. 210-215 |
artikel |
16 |
The ISHTAR guidelines for healthcare security
|
Furnell, S. M. |
|
1998 |
4 |
3-4 |
p. 179-183 |
artikel |
17 |
Unique Patient Identifiers: Why and for What?
|
Neame, Roderick |
|
1998 |
4 |
3-4 |
p. 227-232 |
artikel |