1 | -- | 17 | Jeff Barnett. The Impact of Privacy Legislation on Patient Care |
18 | -- | 27 | Samia Boucherkha, Mohamed Benmohamed. Using Statistical Texture Analysis for Medical Image Tamper Proofing |
28 | -- | 44 | Tamas S. Gal, Zhiyuan Chen, Aryya Gangopadhyay. A Privacy Protection Model for Patient Data with Multiple Sensitive Attributes |
45 | -- | 54 | Jingquan Li, Michael J. Shaw. Electronic Medical Records, HIPAA, and Patient Privacy |
55 | -- | 70 | Patricia Y. Logan, Debra Noles. Protecting Patient Information in Outsourced Telehealth Services: Bolting on Security when it cannot be Baked in |
71 | -- | 83 | B. Dawn Medlin, Joseph A. Cazier, Daniel P. Foulk. Analyzing the Vulnerability of U.S. Hospitals to Social Engineering Attacks: How Many of Your Employees Would Share Their Password? |
84 | -- | 97 | E. Vance Wilson, David D. Dobrzykowski, Joseph A. Cazier. The Influence of Media Trust and Internet Trust on Privacy-Risking Uses of E-Health |