Keywords: Computer Security, Cybersecurity, Risk Assessment
Proceedings from The 15th Scandinavian Conference on Health Informatics 2017 Kristiansand, Norway, August 29–30, 2017
[1] HSØ RHF. 2017, May 24. Foreløpig redegjørelse iMod V1.pdf. Retrieved June 23, 2017, from https://www.helsesorost.no/Documents/Styret/Styrem%C3%B8ter/2017/20170524/2017-05-24%20HS%C3%98%20RHF%20-%20Forel%C3%B8pig%20redegj%C3%B8relse%20iMod%20V1.pdf
[2] Blumenthal, D., & McGraw, D. 2015. Keeping personal health information safe: the importance of good data hygiene. JAMA, 313(14), 1424. https://doi.org/10.1001/jama.2015.2746
[3] Filkins, B. L., Kim, J. Y., Roberts, B., Armstrong, W., Miller, M. A., Hultner, M. L., … Steinhubl, S. R. 2016. Privacy and security in the era of digital health: what should translational researchers know and do about it? American Journal of Translational Research, 8(3), 1560–1580.
[4] ISO/IEC 27005 risk management standard. (n.d.). Retrieved June 23, 2017, from
http://www.iso27001security.com/html/27005.html
[5] Liu, V., Musen, M. A., & Chou, T. (2015). Data Breaches of Protected Health Information in the United States. JAMA, 313(14), 1471. https://doi.org/10.1001/jama.2015.2252
[6] NOT-OD-15-086: Notice for Use of Cloud Computing Services for Storage and Analysis of Controlled-Access Data Subject to the NIH Genomic Data Sharing (GDS) Policy. (n.d.). Retrieved May 15, 2017, from https://grants.nih.gov/grants/guide/noticefiles/NOT-OD-15-086.html
[7] Privacy | HHS.gov. (n.d.). Retrieved May 15, 2017, from https://www.hhs.gov/hipaa/forprofessionals/privacy/
[8] U.S. Department of Health & Human Services – Office for Civil Rights. (n.d.). Retrieved May 15, 2017, from https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf