582
Views
1
CrossRef citations to date
0
Altmetric
Editorial Article

Data security—a challenge to medical informatics

Pages 71-75 | Published online: 12 Jul 2009

References

  • Anderson J. Realization of data protection in health information systems. In reference 1977; 13: 7–13
  • Westin A. L. Computers, Health Records and Citizen Rights. US National Bureau of Standards. 1976, Monogr. 15
  • Griesser G. Scope and purpose. 1977; 1–6, In reference 13
  • Witts J. L. People in Confidence, the Expanding Circle. Record Linkage in Medicine, E. D. Acheson. Livingstone, Edinburgh 1968; 333–38
  • Steinmüller W. Datenschutz in Risikosystemen. (Data protection in risky systems.). Nachr. Dokum. 1977; 28: 74–83
  • Gabrieli E. R. Ethics of Medical Computing. MEDINFO 77, D. B. Shires, H. Wolf. North-Holland, Amsterdam 1977; 729–30
  • Vallbona C., Beggs-Baker S. Data Protection in a Community Medicine Environment. 1977; 45–54, In reference 13
  • Griesser G. Data protection by organizational means in hospital information systems. 1977; 123–32, In reference 13
  • Salter K. Data protection by software techniques with special regard to problems created by multi-user access. 1977; 97–105, In reference 13
  • Ueno H. Data protection by software techniques in a hospital computer system. 1977; 107–14, In reference 13
  • Anonymous. Data Security-Threats and Deficiencies in Computer Operation—A Repert on a Completed Study. 1975, (IBM Svenska AB Publication [G 320–5647])
  • IFIP-Working-Group 4.2. Considerations on the subject ‘data protection’. Progr. Biomed. 1975; 5: 85–86
  • Realization of Data Protection in Health Information Systems, G. Griesser. North-Holland, Amsterdam 1977
  • Ericsson U., Schneider W., Vogel K. The problem of privacy in a computer-based integrated health care information system. MEDINFO 74, J. Anderson, J. M. Forsythe. North-Holland, Amsterdam 1974; 649–52
  • Griesser G. Technical aspects of data protection in health information systems. MEDINFO 77, D. B. Shires, H. Wolf. North-Holland, Amsterdam 1977; 723–28
  • Hirel J. C. Realization of data protection by hardware. 1977; 67–70, In reference 13
  • Jainz M. Realization of data protection by software techniques in a hospital information system. 1977; 77–81, In reference 13
  • Peterson H., Fenna D. Data protection by software techniques with special regard to problems created by multi-user access. 1977; 83–87, In reference 13
  • Reichertz P. L. Realization of data protection by software techniques. 1977; 89–95, In reference 13

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.