{"title":"Health Informatics Deontology Code","authors":"S. Callens, H. Nys","doi":"10.3233/978-1-60750-875-5-27","DOIUrl":"https://doi.org/10.3233/978-1-60750-875-5-27","url":null,"abstract":"","PeriodicalId":238601,"journal":{"name":"Data Security for Health Care","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130796333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Guidelines on IT Security Risk Analysis For Health Care Management","authors":"J. Davey, S. King","doi":"10.3233/978-1-60750-875-5-43","DOIUrl":"https://doi.org/10.3233/978-1-60750-875-5-43","url":null,"abstract":"","PeriodicalId":238601,"journal":{"name":"Data Security for Health Care","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124860133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmed Patel, I. Kantzavelou, C. Clissman, D. Maroulis
{"title":"Network Security Guidelines for Health Care Management","authors":"Ahmed Patel, I. Kantzavelou, C. Clissman, D. Maroulis","doi":"10.3233/978-1-60750-875-5-135","DOIUrl":"https://doi.org/10.3233/978-1-60750-875-5-135","url":null,"abstract":"","PeriodicalId":238601,"journal":{"name":"Data Security for Health Care","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134368507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Guidelines for Secure System Implementation for Health Care Management","authors":"G. V. Veenen","doi":"10.3233/978-1-60750-875-5-207","DOIUrl":"https://doi.org/10.3233/978-1-60750-875-5-207","url":null,"abstract":"","PeriodicalId":238601,"journal":{"name":"Data Security for Health Care","volume":"18 Suppl E 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125778789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Baseline Security Guidelines for Health Care Management","authors":"P. Sanders, S. Furnell, M. Warren","doi":"10.3233/978-1-60750-875-5-82","DOIUrl":"https://doi.org/10.3233/978-1-60750-875-5-82","url":null,"abstract":"","PeriodicalId":238601,"journal":{"name":"Data Security for Health Care","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127060193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Guidelines for Secure Systems Procurement, Development and Design for Health Care Management","authors":"H. V. Dorp, J. Dubbeldam","doi":"10.3233/978-1-60750-875-5-185","DOIUrl":"https://doi.org/10.3233/978-1-60750-875-5-185","url":null,"abstract":"","PeriodicalId":238601,"journal":{"name":"Data Security for Health Care","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123532186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction to the SEISMED Guidelines","authors":"G. Bleumer","doi":"10.3233/978-1-60750-875-5-1","DOIUrl":"https://doi.org/10.3233/978-1-60750-875-5-1","url":null,"abstract":"","PeriodicalId":238601,"journal":{"name":"Data Security for Health Care","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132024595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Getting started with the SEISMED Guidelines","authors":"E. Flikkenschild","doi":"10.3233/978-1-60750-875-5-11","DOIUrl":"https://doi.org/10.3233/978-1-60750-875-5-11","url":null,"abstract":"","PeriodicalId":238601,"journal":{"name":"Data Security for Health Care","volume":"38 24","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120824693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Annex: Guideline for Cryptographic Mechanisms for Health Care Management","authors":"G. Bleumer","doi":"10.3233/978-1-60750-875-5-227","DOIUrl":"https://doi.org/10.3233/978-1-60750-875-5-227","url":null,"abstract":"","PeriodicalId":238601,"journal":{"name":"Data Security for Health Care","volume":"346 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123415698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security of Medical Database Systems for Health Care Management","authors":"G. Pangalos","doi":"10.3233/978-1-60750-875-5-108","DOIUrl":"https://doi.org/10.3233/978-1-60750-875-5-108","url":null,"abstract":"","PeriodicalId":238601,"journal":{"name":"Data Security for Health Care","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124010496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}