References
- Anderson J. Realization of data protection in health information systems. In reference 1977; 13: 7–13
- Westin A. L. Computers, Health Records and Citizen Rights. US National Bureau of Standards. 1976, Monogr. 15
- Griesser G. Scope and purpose. 1977; 1–6, In reference 13
- Witts J. L. People in Confidence, the Expanding Circle. Record Linkage in Medicine, E. D. Acheson. Livingstone, Edinburgh 1968; 333–38
- Steinmüller W. Datenschutz in Risikosystemen. (Data protection in risky systems.). Nachr. Dokum. 1977; 28: 74–83
- Gabrieli E. R. Ethics of Medical Computing. MEDINFO 77, D. B. Shires, H. Wolf. North-Holland, Amsterdam 1977; 729–30
- Vallbona C., Beggs-Baker S. Data Protection in a Community Medicine Environment. 1977; 45–54, In reference 13
- Griesser G. Data protection by organizational means in hospital information systems. 1977; 123–32, In reference 13
- Salter K. Data protection by software techniques with special regard to problems created by multi-user access. 1977; 97–105, In reference 13
- Ueno H. Data protection by software techniques in a hospital computer system. 1977; 107–14, In reference 13
- Anonymous. Data Security-Threats and Deficiencies in Computer Operation—A Repert on a Completed Study. 1975, (IBM Svenska AB Publication [G 320–5647])
- IFIP-Working-Group 4.2. Considerations on the subject ‘data protection’. Progr. Biomed. 1975; 5: 85–86
- Realization of Data Protection in Health Information Systems, G. Griesser. North-Holland, Amsterdam 1977
- Ericsson U., Schneider W., Vogel K. The problem of privacy in a computer-based integrated health care information system. MEDINFO 74, J. Anderson, J. M. Forsythe. North-Holland, Amsterdam 1974; 649–52
- Griesser G. Technical aspects of data protection in health information systems. MEDINFO 77, D. B. Shires, H. Wolf. North-Holland, Amsterdam 1977; 723–28
- Hirel J. C. Realization of data protection by hardware. 1977; 67–70, In reference 13
- Jainz M. Realization of data protection by software techniques in a hospital information system. 1977; 77–81, In reference 13
- Peterson H., Fenna D. Data protection by software techniques with special regard to problems created by multi-user access. 1977; 83–87, In reference 13
- Reichertz P. L. Realization of data protection by software techniques. 1977; 89–95, In reference 13