共 19 条
[1]
Volonino L., Robinson S.R., Principles and Practice of Information Security: Protecting Computers from Hackers and Lawyers, (2004)
[2]
Schneider J., Mercuri R.T., The HIPAA-potamus in health care data security, Commun ACM, 47, 7, (2004)
[3]
Federal Register: Rules and Regulations, 65, 160, (2000)
[4]
HIPAA Security White Papers, (2004)
[5]
Security and Privacy Workgroup Introduction, (2004)
[6]
Kaufman J.H., Edlund S., Ford D.A., The Social Contract Core, (2002)
[7]
Hagland M., Customized automation: OB/GNY practices are finding EMR systems designed specifically for them, Healthcare Informatics Online, (2004)
[8]
Hooda J.S., Dogdu E., Sunderraman R.J., Health level-7 compliant clinical patient records system, Commun ACM, 47, 7, (2004)
[9]
Goldberg I.V., Electronic medical records and patient privacy, Health Care Manager, 18, (2000)
[10]
Eddy A.C., Annals of Health Law, pp. 1-72, (2000)