Journal: I. J. Medical Informatics

Volume 49, Issue 3

255 -- 271Andre W. Kushniruk, Vimla L. Patel, Anthoney A. J. Marley. Small worlds and medical expertise: implications for medical cognition and knowledge engineering
273 -- 295Peter Spyns, Georges De Moor. A Dutch medical language processor: part II: evaluation
297 -- 309Michel Joubert, Sylvain Aymard, Dominique Fieschi, Françoise Volot, Pascal Staccini, Jean-Jacques Robert, Marius Fieschi. ARIANE: integration of information databases within a hospital intranet
311 -- 320Gilles Chatellier, Isabelle Colombet, Patrice Degoulet. An overview of the effect of computer-assisted management of anticoagulant therapy on the quality of anticoagulation
321 -- 328R. H. A. M. Meijers, E. J. A. Coussaert, F. R. L. Cantraine. Integration of a blood pressure controller and an infusion toolbox system using client-server technology

Volume 49, Issue 2

139 -- 155Wolfgang A. Halang, Marek Sniezek, Matjaz Colnaric. Computerised controllers for safety critical medical applications
157 -- 171Gerald Krell, Hamid R. Tizhoosh, Tilo Lilienblum, C. J. Moore, Bernd Michaelis. Enhancement and associative restoration of electronic portal images in radiotherapy
173 -- 193Andy Marsh. The Creation of a global telemedical information society
195 -- 216Armen P. Sarvazyan. Mechanical imaging: : A new technology for medical diagnostics
217 -- 229Vagan Y. Terziyan, Alexey Tsymbal, Seppo Puuronen. The decision support system for telemedicine based on multiple expertise
231 -- 241Bogdan Viher, A. Dobnikar, Damjan Zazula. Cellular automata and follicle recognition problem and possibilities of using cellular automata for image recognition purposes
243 -- 251Blaz Zupan, Dobrivoje S. Stokic, Marko Bohanec, Michael M. Priebe, Arthur M. Sherwood. Relating clinical and neurophysiological assessment of spasticity by machine learning

Volume 49, Issue 1

1 -- 8Shigekoto Kaihara. Realisation of the computerised patient record; relevance and unsolved problems
9 -- 18Shigeo Tsujii. Revolution of civilisation and information security
19 -- 30Barry Barber. Patient data and security: an overview
31 -- 37Albert Bakker. Security in perspective; luxury or must?
39 -- 44Kees Louwerse. The electronic patient record; the management of access - case study: Leiden University Hospital
45 -- 51Hiroshi Takeda, Yasushi Matsumura, Takeo Okada, Shigeki Kuwata, Michitoshi Inoue. A Japanese approach to establish an electronic patient record system in an intelligent hospital
53 -- 58Hiroyuki Yoshihara. Development of the electronic health record in Japan
59 -- 68Sokratis K. Katsikas, Diomidis D. Spinellis, John Iliadis, Bernd Blobel. Using trusted third parties for secure telemedical applications over the WWW: The EUROMED-ETS approach
69 -- 74Masaya Norifusa. Internet security: difficulties and solutions
75 -- 80Yoshiki Ishida, Norihiro Sakamoto. A secure model for communication of health care information by sub-division of information and multiplication of communication paths
81 -- 87Jochen R. Moehr, James G. McDaniel. Adoption of security and confidentiality features in an operational community health information network: the Comox Valley experience - case example
89 -- 96Norihiro Sakamoto. Availability of software services for a hospital information system
97 -- 104Amado L. Espinosa. Availability of health data: requirements and solutions
105 -- 110Eike-Henner W. Kluge. Fostering a security culture: a model code of ethics for health information professionals
111 -- 115Francis H. Roger France. Ethics and biomedical information
117 -- 122Catherine Quantin, Hocine Bouzelat, François-André Allaert, A. M. Benhamiche, J. Faivre, Liliane Dusserre. How to ensure data security of an epidemiological follow-up: quality assessment of an anonymous record linkage procedure
123 -- 124Tetsuro Kiyotani. Security-related policy and law in Japan
125 -- 130Filip De Meyer, Per Arne Lundgren, Georges De Moor, Tom Fiers. Determination of user requirements for the secure communication of electronic medical record information
131 -- 134Nick Gaunt. Installing an appropriate information security policy
135 -- 137Albert Bakker, Barry Barber, Kiyomu Ishikawa, Hiroshi Takeda, Koji Yamamoto. Overall conclusions and recommendations