Computer-based Patient Record Institute (CPRI). 1995. Guidelines for Information Security Education Programs at Organizations Using Computer-based Patient Record Systems, CPRI Work Group on Confidentiality, Privacy, and Security. CPRI, Schaumburg, Ill., June.

Computer-based Patient Record Institute (CPRI). 1996. Guidelines for Managing Information Security Programs, Work Group on Confidentiality, Privacy, and Security. CPRI, Schaumburg, Ill., January.

Computer-based Patient Record Institute (CPRI). 1996. Sample Confidentiality Statements and Agreements for Organizations Using Computer-based Patient Record Systems, Work Group on Confidentiality, Privacy, and Security. CPRI, Schaumburg, Ill., May.

Computer-based Patient Record Institute (CPRI). 1996. Security Features for Computer-based Patient Record Systems. CPRI, Schaumburg, Ill., September.

Computer Science and Telecommunications Board, National Research Council. 1991. Computers at Risk: Safe Computing in the Information Age. National Academy Press, Washington, D.C.

Computer Science and Telecommunications Board, National Research Council. 1996. Cryptography's Role in Securing the Information Society. National Academy Press, Washington, D.C.

Computer Science and Telecommunications Board, National Research Council. 1996. "Observed Practices for Improving the Security and Confidentiality of Electronic Health Information: Interim Report." National Academy Press, Washington, D.C., September.

Constance, Paul. 1996. "Multi-level Security-Not Now," Government Computer News, July 15, p. 60. Consumer Reports. 1994. "Who's Reading Your Medical Records?," October, pp. 628-632.

Council on Competitiveness. 1996. Highway to Health: Transforming U.S. Health Care in the Information Age. Council on Competitiveness, Washington, D.C., March.

Crispell, Kenneth A., and Carlos F. Gomez. 1988. Hidden Illness in the White House. Duke University Press, Durham, N.C.

Dang, Dennis K., Jeffrey M. Pont, and Mitchell A. Portnoy. 1996. "Episode Treatment Groups: An Illness Classification System and Episode Building System, Part I," Medical Interface, March, pp. 118-122.

Daugman, J.G. 1993. "High Confidence Visual Recognition of Persons by a Test of Statistical Independence," IEEE Transactions on Pattern Analysis and Machine Intelligence 15(11):1148-1161.

Deloitte and Touche LLP. 1996. U.S. Hospitals and the Future of Health Care. Deloitte and Touche, Philadelphia.

Detmer, Don E., and Elaine B. Steen. 1993. "Patient Records in the Information Age," Issues in Science and Technology, Vol. 9, No. 3, pp. 24-27.

Detmer, Don E., and Elaine B. Steen. 1996. "Shoring Up Protection of Personal Health Data," Issues in Science and Technology, Summer, Vol. 12, No. 4, pp. 73-78.

Diffie, Whitfield. 1988. "The First Ten Years of Public-Key Cryptography," Proceedings of the IEEE, Vol. 76, No. 5, May, pp. 560-577.

Dunn, Ashley. 1996. "Tracking Crumbs of Data That Threaten to Define Us," New York Times, Cyber Times, May 12; available on-line at www.nytimes.com.


Edgar, Harold, and David J. Rothman. 1995. "The Institutional Review Board and Beyond: Future Challenges to the Ethics of Human Experimentation," Milbank Quarterly 73:489-506.

Elie, Benoit, and Alice Labreque. 1992. "Minimum Requirements for the Security of Computerized Records of Health and Social Services Network Clients," Commission d'acces a l'information, Province of Quebec, Canada, April.



The National Academies | 500 Fifth St. N.W. | Washington, D.C. 20001
Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement