| 1 | -- | 8 | Shigekoto Kaihara. Realisation of the computerised patient record; relevance and unsolved problems |
| 9 | -- | 18 | Shigeo Tsujii. Revolution of civilisation and information security |
| 19 | -- | 30 | Barry Barber. Patient data and security: an overview |
| 31 | -- | 37 | Albert Bakker. Security in perspective; luxury or must? |
| 39 | -- | 44 | Kees Louwerse. The electronic patient record; the management of access - case study: Leiden University Hospital |
| 45 | -- | 51 | Hiroshi Takeda, Yasushi Matsumura, Takeo Okada, Shigeki Kuwata, Michitoshi Inoue. A Japanese approach to establish an electronic patient record system in an intelligent hospital |
| 53 | -- | 58 | Hiroyuki Yoshihara. Development of the electronic health record in Japan |
| 59 | -- | 68 | Sokratis K. Katsikas, Diomidis D. Spinellis, John Iliadis, Bernd Blobel. Using trusted third parties for secure telemedical applications over the WWW: The EUROMED-ETS approach |
| 69 | -- | 74 | Masaya Norifusa. Internet security: difficulties and solutions |
| 75 | -- | 80 | Yoshiki Ishida, Norihiro Sakamoto. A secure model for communication of health care information by sub-division of information and multiplication of communication paths |
| 81 | -- | 87 | Jochen R. Moehr, James G. McDaniel. Adoption of security and confidentiality features in an operational community health information network: the Comox Valley experience - case example |
| 89 | -- | 96 | Norihiro Sakamoto. Availability of software services for a hospital information system |
| 97 | -- | 104 | Amado L. Espinosa. Availability of health data: requirements and solutions |
| 105 | -- | 110 | Eike-Henner W. Kluge. Fostering a security culture: a model code of ethics for health information professionals |
| 111 | -- | 115 | Francis H. Roger France. Ethics and biomedical information |
| 117 | -- | 122 | Catherine Quantin, Hocine Bouzelat, François-André Allaert, A. M. Benhamiche, J. Faivre, Liliane Dusserre. How to ensure data security of an epidemiological follow-up: quality assessment of an anonymous record linkage procedure |
| 123 | -- | 124 | Tetsuro Kiyotani. Security-related policy and law in Japan |
| 125 | -- | 130 | Filip De Meyer, Per Arne Lundgren, Georges De Moor, Tom Fiers. Determination of user requirements for the secure communication of electronic medical record information |
| 131 | -- | 134 | Nick Gaunt. Installing an appropriate information security policy |
| 135 | -- | 137 | Albert Bakker, Barry Barber, Kiyomu Ishikawa, Hiroshi Takeda, Koji Yamamoto. Overall conclusions and recommendations |