Information Technology Reference
In-Depth Information
Fagan, P. (1993). Organizational issues in IT
security. Computers & Security , 12 (8), 710-715.
doi:10.1016/0167-4048(93)90033-2
Qu, T. (2001). Database security in assets of com-
panies. T-110.501 Seminar on Network Security.
Retrieved April 11, 2008, from http://www.tml.
tkk.fi/ Studies/T-110.501/ 2001/ papers/ tianmin.
qu.pdf
Firth, D. (1993). Are we securing the right informa-
tion? In Proceedings of 10 th Word Conference on
Computer Security, Audit and Control. London,
UK: Elsevier Science.
Walt, H. F. (2004). The impact of the HIPAA
regulation on Information Technology security in
the healthcare industry (D. P. A. dissertation, Uni-
versity of La Verne, California, USA). Retrieved
July 24, 2006, from Dissertations & Theses: Full
Text database (Publication No. AAT 3159477).
Forcht, K. A. (1994). Computer security manage-
ment . Danvers, MA: Boyd & Fraser.
GPO. (2005). Federal Register, 70 (198),
Friday, October 14, 2005. Retrieved Au-
gust 7, 2008, from http://a257.g.akamaitech.
net/7/257/2422/01jan20051800/ edocket. access.
gpo. gov/ 2005/pdf/05-20517.pdf
Wickramasinghe, N., & Goldberg, S. (2005). A
framework for delivering m-health excellence.
Proceedings of the 18 th Bled E-Conference E-
Integration in Action, Bled, Slovenia . Retrieved
June 18, 2008, from http://www.bledconference.
org/ proceedings. nsf/ Proceedings / 97899 CB125
A9990 8C125 70140 049C1 FD/$ File/22 Wick-
ramasinghe.pdf
Gue, G. A. (n.d.). The HIPAA security rule
(NPRM): Overview . Retrieved June 15, 2006,
from http://www.hipaadvisory.com/regs/securi-
tyoverview.htm
Hartl, L. D., & Jones, W. E. (2002). Essential ge-
netics (3 rd ed.). Sudbury, MA: Jones and Bartlett.
Hoppe, N. (1994). Achieving consistent security
controls throughout a multinational organization.
Computers & Security , 13 (1), 23-29.
Wild, K. R. (2009). The next evolution of the
HIPAA security. Journal of Healthcare Compli-
ance . Retrieved March 18, 2010, from http://
www. sinaikohc. com/ userfiles/ file/ HIPAA%
20Security%20Article%208.pdf
James, H., & Coldwell, R. A. (1993). Corporate
security: An Australian ostrich. Information
Management & Computer Security , 1 (4), 10-12.
doi:10.1108/09685229310045303
ADDITIONAL READING
Armstrong, D., Kline-Rogers, E., Jani, S., Gold-
man, E., Fang, J., & Mukherjee, D. (2005).
Potential impact of the HIPAA privacy rule on
data collection in a registry of patients with
acute coronary syndrome. Archives of Internal
Medicine , 165 (10), 1125-1129. doi:10.1001/
archinte.165.10.1125
Johnson, J. (2002). Top 10 CIO concerns shift
as industry is under fire. Software Magazine ,
22 (2), 38-39.
Jones, L. E. (2001). A case study on how family
physician practices in the Northern Virginia area
are preparing to implement HIPAA's security re-
quirements (PhD dissertation, Capella University,
Minnesota, USA). Retrieved August 3, 2006, from
Dissertations & Theses @ Capella University
database (Publication No. AAT 3004059).
Beaver, K. (2003). HIPAA Security Compliance
from an Auditor's Perspective. EDPACS. The
EDP Audit, Control, and Security Newsletter ,
30 (10), 14-20.
Pfleeger, C. P. (1997). Security in computing (2nd
ed.). New Jersey: Prentice-Hall.
Search WWH ::




Custom Search