Published on in Vol 13, No 1 (2011): Jan-Mar

How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?

How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?

How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?

Journals

  1. Cipresso P, Gaggioli A, Serino S, Cipresso S, Riva G. How to Create Memorizable and Strong Passwords. Journal of Medical Internet Research 2012;14(1):e10 View
  2. Pedroli E, La Paglia F, Cipresso P, La Cascia C, Riva G, La Barbera D. A Computational Approach for the Assessment of Executive Functions in Patients with Obsessive–Compulsive Disorder. Journal of Clinical Medicine 2019;8(11):1975 View
  3. Brumen B, Heričko M, Sevčnikar A, Završnik J, Hölbl M. Outsourcing Medical Data Analyses: Can Technology Overcome Legal, Privacy, and Confidentiality Issues?. Journal of Medical Internet Research 2013;15(12):e283 View
  4. Beran T, Stanton L, Hetherington R, Mishna F, Shariff S. Development of the Bullying and Health Experiences Scale. Interactive Journal of Medical Research 2012;1(2):e13 View
  5. Brumen B, Heričko M, Rozman I, Hölbl M. Security Analysis and Improvements to the PsychoPass Method. Journal of Medical Internet Research 2013;15(8):e161 View
  6. Pietro C, Silvia S, Giuseppe R. The Pursuit of Happiness Measurement: A Psychometric Model Based on Psychophysiological Correlates. The Scientific World Journal 2014;2014:1 View
  7. Cipresso P, Paglia F, Cascia C, Riva G, Albani G, La Barbera D. Break in volition: a virtual reality study in patients with obsessive-compulsive disorder. Experimental Brain Research 2013;229(3):443 View
  8. Cipresso P, Mauri M, Semonella M, Tuena C, Balgera A, Villamira M, Riva G. Looking at One's Self Through Facebook Increases Mental Stress: A Computational Psychometric Analysis by Using Eye-Tracking and Psychophysiology. Cyberpsychology, Behavior, and Social Networking 2019;22(5):307 View
  9. Alanazi H, Zaidan A, Zaidan B, Kiah M, Al-Bakri S. Meeting the Security Requirements of Electronic Medical Records in the ERA of High-Speed Computing. Journal of Medical Systems 2015;39(1) View
  10. Gal T, Tucker T, Gangopadhyay A, Chen Z. A data recipient centered de-identification method to retain statistical attributes. Journal of Biomedical Informatics 2014;50:32 View
  11. Cipresso P, Serino S, Gaggioli A, Albani G, Mauro A, Riva G. Psychometric modeling of the pervasive use of Facebook through psychophysiological measures: Stress or optimal experience?. Computers in Human Behavior 2015;49:576 View
  12. Cipresso P, Albani G, Serino S, Pedroli E, Pallavicini F, Mauro A, Riva G. Virtual multiple errands test (VMET): a virtual reality-based tool to detect early executive functions deficit in Parkinson’s disease. Frontiers in Behavioral Neuroscience 2014;8 View
  13. Zaidan B, Zaidan A, Mat Kiah M. Impact of Data Privacy and Confidentiality on Developing Telemedicine Applications: A Review Participates Opinion and Expert Concerns. International Journal of Pharmacology 2011;7(3):382 View
  14. Cucoranu I, Parwani A, West A, Romero-Lauro G, Nauman K, Carter A, Balis U, Tuthill M, Pantanowitz L. Privacy and security of patient data in the pathology laboratory. Journal of Pathology Informatics 2013;4(1):4 View
  15. Zhang Q, Xu X, Zhang Y, Lu W, Li Y. CompressKey—Near Lossless Layout Compression and Encryption Using Convolutional Auto-Encoder Model and Expansion-Reduction Pattern Techniques. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2023;42(4):1030 View
  16. Raj A, Chauhan M, Chhoker V, Rani M, Singh B, D’Souza R, Bodwal J. Brute forcing on secured shell servers emphasising the role of cyber forensics – a quali-quantitative study. Medico-Legal Journal 2024;92(3):152 View
  17. Nguyen X, Petscavage-Thomas J, Straus C, Ikuta I. Cybersecurity in radiology: Cautionary Tales, Proactive Prevention, and What to do When You Get Hacked. Current Problems in Diagnostic Radiology 2024 View

Books/Policy Documents

  1. Park S, Moon J. Improving Health Management through Clinical Decision Support Systems. View
  2. Moodley E, Huo G, Hsieh M, Cai S, Yan W. Managing Trust in Cyberspace. View
  3. Park S, Moon J. Healthcare Ethics and Training. View
  4. Agbelusi O, Aladesote I, Matthew O. Advances in Information Systems, Artificial Intelligence and Knowledge Management. View