4.1 Article

Challenges of information security incident learning: An industrial case study in a Chinese healthcare organization

Related references

Note: Only part of the references are listed.
Article Information Science & Library Science

A case analysis of information systems and security incident responses

Atif Ahmad et al.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2015)

Article Computer Science, Information Systems

Information security incident management: Current practice as reported in the literature

Inger Anne Tondel et al.

COMPUTERS & SECURITY (2014)

Article Health Care Sciences & Services

Managing information and knowledge within maternity services: Privacy and consent issues

Vikraman Baskaran et al.

INFORMATICS FOR HEALTH & SOCIAL CARE (2013)

Article Computer Science, Information Systems

Using argumentation to evaluate software assurance standards

Patrick J. Graydon et al.

INFORMATION AND SOFTWARE TECHNOLOGY (2013)

Article Computer Science, Information Systems

Incident response teams - Challenges in supporting the organisational security function

Atif Ahmad et al.

COMPUTERS & SECURITY (2012)

Article Computer Science, Software Engineering

Arguing Conformance

Patrick Graydon et al.

IEEE SOFTWARE (2012)

Article Health Care Sciences & Services

Web vulnerability study of online pharmacy sites

Joanne Kuzma

INFORMATICS FOR HEALTH & SOCIAL CARE (2011)

Article Computer Science, Information Systems

Views on health information sharing and privacy from primary care practices using electronic medical records

Gihan Perera et al.

INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS (2011)

Article Computer Science, Information Systems

On incident handling and response: A state-of-the-art approach

Sarandis Mitropoulos et al.

COMPUTERS & SECURITY (2006)

Article Computer Science, Information Systems

Analysis of end user security behaviors

JM Stanton et al.

COMPUTERS & SECURITY (2005)

Article Medicine, General & Internal

Protecting and using patient information: the role of the Caldicott Guardian

A Greenough et al.

CLINICAL MEDICINE (2004)

Article Computer Science, Information Systems

Improving user security behaviour

J Leach

COMPUTERS & SECURITY (2003)