Information Technology Reference
In-Depth Information
e-health system in a greater extent. Similarly the
EU Countries are having the opportunity to adopt
a better regulation in term of jurisdiction of the
courts in deciding online disputes and enforcing
the judgement. It is needless to say that such
cooperation among various nations is necessary
to build the confidence and the trust of e-health
system users to maximise the benefit to everyone.
Das, R. (2000). Biotechnology and product
liability-should the oversight of biotechnology be
influenced through the common law mechanism of
tort and insurance or via legislative instruments.
Malayan Law Journal , 1 , cxxi-cxxx.
Davis, C. (2003). Privacy, data and due diligence:
The European experience. International Confer-
ence on Privacy, Data Protection and Corporate
Governance in the Internet Eeconomy (pp. 1-5).
Kuala Lumpur, Malaysia: Cyber Security Ma-
laysia.
REFERENCES
Anderson, J. G. (2007). Social, ethical and legal
barriers to e-health. International Journal of
Medical Informatics , 76 , 480-483. doi:10.1016/j.
ijmedinf.2006.09.016
Donaldson, E. (2001, January). Financial law
panel: E-commerce- Review of legal implications
jurisdiction. Retrieved on October 12, 2010, from
http://www.flpanel.demon.co.uk.
Anderson, J. G., & Balas, E. A. (2006). Comput-
erisation of primary cares in the US. International
Journal of Health Information Systems , 1 (3), 1-23.
doi:10.4018/jhisi.2006070101
FTC. (1998). FTC, fighting consumer fraud: New
tools of the trade . Washington, DC: FTC.
Gavision, R. (1980). Privacy and the limits of law.
The Yale Law Journal , 89 , 428.
Australian Commotion & Consumer Commis-
sion. (1997). The global enforcement challenge:
Enforcement of consumer protection laws in a
global market place . Australia: Australian Com-
motion & Consumer Commission.
GIP. (1999, September). Jurisdiction in cyber-
space. Retrieved on October 12, 2010, from http://
www.gip.org/publicaions/papers/gipjuris.asp
Hajar, A. B. (2002). Privacy and data protection:
A comparative analysis with special reference to
Malaysian proposed law . Kuala Lumpur, Malay-
sia: Sweet & Maxwell Asia.
Bainbridge, D. (2004). Introduction to computer
law (5th ed.). London, UK: Pearson Education.
Bitlaw.com. (n.d.). ISP liability. Retrieved on
October 12, 2010, from http://www.bitlaw.com/
internet/isp.html
Howells, G. (1999). Comparative product liability.
Dartmouth, RI: Aldershot.
Jan, J., Fang, Y., & Zue, X. (Feb, 2010). Privacy
and emergency response in e-healthcare leverag-
ing wireless body sensor networks. IEEE Wireless
Communications , 66-73.
Bonavia, M. I., & Morton, L. W. (1998). Personal
information privacy issues relating to consump-
tion in the US market place. Consumer Interest
Annual , 44 , 25-29.
Keenan, D. (2000). Smith & Keenan advanced
business law . London, UK: Longman Higher
Education.
Burgunder, B. (Ed.). (2001). Legal aspects of
managing technology . Ohio, USA: Thomson
Learning.
Kidd, D. J. (2000). Adapting contract law to ac-
commodate electronic contracts: Overview and
suggestions. Rutgers Computer & Technology
Law Journal , 12 (26), 215-276.
Cavanillas, S. (2001). Research paper on contract
law. Retrieved on October 12, 2010, from http://
www.eclip.org/documents/deliverable_2_1_7_
contract_law_pdf.
Search WWH ::




Custom Search