Information Technology Reference
In-Depth Information
Fagan, P. (1993). Organizational issues in IT
security.
Computers & Security
,
12
(8), 710-715.
doi:10.1016/0167-4048(93)90033-2
Qu, T. (2001). Database security in assets of com-
panies. T-110.501 Seminar on Network Security.
Retrieved April 11, 2008, from http://www.tml.
tkk.fi/ Studies/T-110.501/ 2001/ papers/ tianmin.
qu.pdf
Firth, D. (1993). Are we securing the right informa-
tion? In
Proceedings of 10
th
Word
Conference on
Computer Security, Audit and Control. London,
UK: Elsevier Science.
Walt, H. F. (2004).
The impact of the HIPAA
regulation on Information
Technology security in
the healthcare industry (D. P. A. dissertation, Uni-
versity of La Verne, California, USA). Retrieved
July 24, 2006, from Dissertations & Theses: Full
Text database (Publication No. AAT 3159477).
Forcht, K. A. (1994).
Computer security manage-
ment
. Danvers, MA: Boyd & Fraser.
GPO. (2005).
Federal Register, 70
(198),
Friday, October 14, 2005. Retrieved Au-
gust 7, 2008, from http://a257.g.akamaitech.
net/7/257/2422/01jan20051800/ edocket. access.
gpo. gov/ 2005/pdf/05-20517.pdf
Wickramasinghe, N., & Goldberg, S. (2005). A
framework for delivering m-health excellence.
Proceedings of the 18
th
Bled E-Conference E-
Integration in Action, Bled, Slovenia
. Retrieved
June 18, 2008, from http://www.bledconference.
org/ proceedings. nsf/ Proceedings / 97899 CB125
A9990 8C125 70140 049C1 FD/$ File/22 Wick-
ramasinghe.pdf
Gue, G. A. (n.d.).
The HIPAA security rule
(NPRM): Overview
. Retrieved June 15, 2006,
from http://www.hipaadvisory.com/regs/securi-
tyoverview.htm
Hartl, L. D., & Jones, W. E. (2002).
Essential ge-
netics
(3
rd
ed.). Sudbury, MA: Jones and Bartlett.
Hoppe, N. (1994). Achieving consistent security
controls throughout a multinational organization.
Computers & Security
,
13
(1), 23-29.
Wild, K. R. (2009). The next evolution of the
HIPAA security.
Journal of Healthcare Compli-
ance
. Retrieved March 18, 2010, from http://
www. sinaikohc. com/ userfiles/ file/ HIPAA%
20Security%20Article%208.pdf
James, H., & Coldwell, R. A. (1993). Corporate
security: An Australian ostrich.
Information
Management & Computer Security
,
1
(4), 10-12.
doi:10.1108/09685229310045303
ADDITIONAL READING
Armstrong, D., Kline-Rogers, E., Jani, S., Gold-
man, E., Fang, J., & Mukherjee, D. (2005).
Potential impact of the HIPAA privacy rule on
data collection in a registry of patients with
acute coronary syndrome.
Archives of Internal
Medicine
,
165
(10), 1125-1129. doi:10.1001/
archinte.165.10.1125
Johnson, J. (2002). Top 10 CIO concerns shift
as industry is under fire.
Software Magazine
,
22
(2), 38-39.
Jones, L. E. (2001).
A case study on how family
physician practices in the Northern
Virginia area
are preparing to implement HIPAA's security re-
quirements (PhD dissertation, Capella University,
Minnesota, USA). Retrieved August 3, 2006, from
Dissertations & Theses @ Capella University
database (Publication No. AAT 3004059).
Beaver, K. (2003). HIPAA Security Compliance
from an Auditor's Perspective. EDPACS.
The
EDP Audit, Control, and Security Newsletter
,
30
(10), 14-20.
Pfleeger, C. P. (1997).
Security in computing
(2nd
ed.). New Jersey: Prentice-Hall.
Search WWH ::
Custom Search