References
[1]. Anderson, J. G. (2007). Social, ethical and legal barriers to e-health. International Journal of Medical Informatics, 76(5), 480-483.
[2]. Brady, J. W. (2011, January). Securing health care: Assessing factors that affect HIPAA security compliance in academic medical centers. In System Sciences (HICSS), 2011 44th Hawaii International Conference on (pp. 1-10). IEEE.
[3]. Dong, N., Jonker, H., & Pang, J. (2011, August). Challenges in eHealth: From Enabling to Enforcing Privacy. In FHIES, (pp. 195-206).
[4]. Fernando, J. I., & Dawson, L. L. (2009). The health information system security threat lifecycle: An informatics theory. International Journal of Medical Informatics, 78(12), 815-826.
[5]. Ferreira, A., Antunes, L., Chadwick, D., & Correia, R. (2010). Grounding information security in healthcare. International Journal of Medical Informatics, 79(4), 268- 283.
[6]. Ghazvini, A., & Shukur, Z. (2013). Security challenges and success factors of electronic healthcare system. Procedia Technology, 11, 212-219.
[7]. Gunter, T. D., & Terry, N. P. (2005). The emergence of national electronic health record architectures in the United States and Australia: Models, costs, and questions. Journal of Medical Internet Research, 7(1), 87-94.
[8]. Hassan, N. H., & Ismail, Z. (2012). A conceptual model for investigating factors influencing information security culture in healthcare environment. Procedia-Social and Behavioral Sciences, 65, 1007-1012.
[9]. Huang, C. D., Behara, R. S., & Goo, J. (2014). Optimal information security investment in a Healthcare Information Exchange: An economic analysis. Decision Support Systems, 61, 1-11.
[10]. Karunakaran, A., Hee-Nam, Y., & Reddy, M. (2012, January). Investigating barriers to electronic medical record use during collaborative information seeking activities. In Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium (pp. 743- 748). ACM.
[11]. Love, V. D. (2011). IT Security Strategy: Is your Health Care Organization doing everything it can to protect Patient Information? Journal of Health Care Compliance, 13(6), 21-64.
[12]. MacKinnon, W., & Wasserman, M. (2009, January). Integrated electronic medical record systems: Critical success factors for implementation. In System Sciences,2009. HICSS'09. 42nd Hawaii International Conference on (pp. 1-10). IEEE.
[13]. Mandl, K. D., Simons, W. W., Crawford, W. C., & Abbett, J. M. (2007). Indivo: A personally controlled health record for health information exchange and communication. BMC Medical Informatics and Decision Making, 7(1), 25.
[14]. Ueckert, F., Goerz, M., Ataian, M., Tessmann, S., & Prokosch, H. U. (2003). Empowerment of patients and communication with health care professionals through an electronic health record. International Journal of Medical Informatics, 70(2), 99-108.
[15]. Wright, A., & Sittig, D. F. (2007). Encryption characteristics of two USB-based personal health record devices. Journal of the American Medical Informatics Association, 14(4), 397-399.
[16]. Zayim, N., Bozkurt, S., & Samur, M. K. (2011, October). Organizational issues in health informatics applications: Findings from a systematic review. In Biomedical Engineering and Informatics (BMEI), 2011 4th International Conference on (Vol. 4, pp. 1985-1988). IEEE.