Alpert, Sheri. 1993. "CFP'93: Medical Records, Privacy, and Health Care Reform," a paper to appear as part of a larger work in progress; downloaded May 15, 1996, from www.cpsr.org.
American Bar Association. 1995. "Digital Signature Tutorial," available on-line at www.state.ut.us/ccjj/digsig/dsut-tut.htm; downloaded February 23, 1996.
American Law Institute. 1976. Restatement (Second) of the Law of Torts, § 652D.
American Medical Association. 1994. "Confidentiality: Computers," Code of Medical Ethics, American Medical Association, Chicago, Ill.
American National Standards Institute (ANSI), Healthcare Informatics Standards Planning Panel. 1992. "Charter Statement," ANSI, September.
Anderson, Ross J. 1996. "An Update on the BMA Security Policy," Notes of the Workshop on Personal Information Security, Engineering and Ethics, University of Cambridge, England, June 21-22.
Anderson, Ross J. 1996. Security in Clinical Information Systems. British Medical Association (as commissioned by the BMA Information Technology Committee), London, England, January.
Andrew, William F., and Richard S. Dick. 1995. "Applied Information Technology: A Clinical Perspective," Computers in Nursing 13(3):118-122.
Argyris, Chris. 1994. "Good Communication That Blocks Learning," Harvard Business Review, July-August, pp. 77-85.
Aries, Phillipe, and Georges Duby (eds.). 1987. A History of Private Life, Vols. 1-5. Belknap Press of Harvard University Press, Cambridge, Mass.
Arnold, Stephen E. 1996. "The Key to Security," Upside, April, pp. 78-88.
Associated Press. 1996. "Confidential AIDS Data Given to Paper," Washington Post, September 20, p. A7.
Auerbach, Stuart. 1997. "Two Blue Cross Plans in Area Agree to Merge," Washington Post, January 15, pp. C10 and C12.
Barrows, Randolph C., Jr., and Paul D. Clayton. 1996. "Privacy, Confidentiality, and Electronic Medical Records," Journal of the American Medical Informatics Association 3(2):139-148.
Bass, Alison. 1995. "Computerized Medical Data Put Privacy on the Line," Boston Globe, February 22, p. Metro/1.
Beth, Thomas. 1995. "Confidential Communication on the Internet," Scientific American, December, pp. 88-91.
Biddle, Brad. 1996. "Digital Signature Legislation: Some Reasons for Concern," available on-line at pwa.acusd.edu/-prc; downloaded February 20, 1996.
Billings, Paul, and Jon Beckwith. 1992. "Genetic Testing in the Workplace: A View from the USA," Trends in Genetics 8(6):198-202.
Billings, Paul R., Mel A. Kohn, Margaret de Cuevas, Jonathan Beckwith, Joseph S. Alper, and Marvin R. Natowicz. 1992. "Discrimination as a Consequence of Genetic Testing," American Journal of Human Genetics 50:476-482.
Biometrics in Human Services User Group Newsletter, Vol. 1, No. 1, July 1996.
Bloom, Charles. 1995. "Information Services: When Management Loses Control," Healthcare Informatics, June, pp. 104-108.
Bobinski, Mary Anne. 1990. "Unhealthy Federalism," U.C. Davis Law Review 24(255).
Bouchier, F., J.S. Ahrens, and G. Wells. 1996. "Laboratory Evaluation of the IriScan Prototype Biometric Identifier," Sandia Report SAND96-1033. Sandia National Laboratories, Albuquerque, N. Mex., April.
Brelis, Matthew. 1995. "Patients' Files Allegedly Used for Obscene Calls," Boston Globe, April 11, pp. 1 and 6.
Bulger, R.J. 1987. "The Search for a New Ideal," pp. 9-21 in In Search of the Modern Hippocrates, R.J. Bulger (ed.). University of Iowa Press, Iowa City, Iowa.
Burgdorf, Jr., Robert L. 1991. "The Americans with Disabilities Act," Harvard C.R.-C.L. Law Review 26(413):434-437.
Caruso, Jeff. 1996. "The Enterprise and the Net," Interactive Age Online, available on-line at techweb.cmp.com/ia/0219issue/0219midman.html; downloaded February 21, 1996.
Cavoukian, Ann. 1996. "Go Beyond Security-Build in Privacy: One Does Not Equal the Other," paper presented at Cardtech/Securtech '96 Conference, Atlanta, Ga., May 14-16.
Center for Democracy and Technology (CDT). 1996. Privacy and Health Information Systems: A Guide to Protecting Patient Confidentiality. CDT, Washington, D.C. Chapman, D. Brent, and Elizabeth D. Zwicky. 1995. Building Internet Firewalls. O'Reilly & Associates, Inc., Sebastopol, Calif.
Chaum, David. 1992. "Achieving Electronic Privacy," Scientific American, August, pp. 96-101.
Cheswick, William R., and Steven M. Bellovin. 1994. Firewalls and Internet Security. Addison-Wesley, Reading, Mass.
Clayton, Ellen Wright, Karen K. Steinberg, Muin J. Khoury, Elizabeth Thomson, Lori Andrews, Mary Jo Ellis Kahn, Loretta M. Kopelman, and Joan O. Weiss. 1995. "Informed Consent for Genetic Research on Stored Tissue Samples," Journal of the American Medical Association 274(22):1786-1792.
CNN Interactive. 1996. "Yeltsin Had Heart Attack During Russian Elections," September 21, 1996, available on-line at www.cnn.com.
Cohen, Susan. 1996. "Tangled Lifeline," Washington Post, August 18, p. W11.
Computer-based Patient Record Institute (CPRI). 1995. Guidelines for Establishing Information Security Policies at Organizations Using Computer-based Patient Record Systems, CPRI Work Group on Confidentiality, Privacy, and Security. CPRI, Schaumburg, Ill., February.
Computer-based Patient Record Institute (CPRI). 1995. Guidelines for Information Security Education Programs at Organizations Using Computer-based Patient Record Systems, CPRI Work Group on Confidentiality, Privacy, and Security. CPRI, Schaumburg, Ill., June.
Computer-based Patient Record Institute (CPRI). 1996. Guidelines for Managing Information Security Programs, Work Group on Confidentiality, Privacy, and Security. CPRI, Schaumburg, Ill., January.
Computer-based Patient Record Institute (CPRI). 1996. Sample Confidentiality Statements and Agreements for Organizations Using Computer-based Patient Record Systems, Work Group on Confidentiality, Privacy, and Security. CPRI, Schaumburg, Ill., May.
Computer-based Patient Record Institute (CPRI). 1996. Security Features for Computer-based Patient Record Systems. CPRI, Schaumburg, Ill., September.
Computer Science and Telecommunications Board, National Research Council. 1991. Computers at Risk: Safe Computing in the Information Age. National Academy Press, Washington, D.C.
Computer Science and Telecommunications Board, National Research Council. 1996. Cryptography's Role in Securing the Information Society. National Academy Press, Washington, D.C.
Computer Science and Telecommunications Board, National Research Council. 1996. "Observed Practices for Improving the Security and Confidentiality of Electronic Health Information: Interim Report." National Academy Press, Washington, D.C., September.
Constance, Paul. 1996. "Multi-level Security-Not Now," Government Computer News, July 15, p. 60. Consumer Reports. 1994. "Who's Reading Your Medical Records?," October, pp. 628-632.
Council on Competitiveness. 1996. Highway to Health: Transforming U.S. Health Care in the Information Age. Council on Competitiveness, Washington, D.C., March.
Crispell, Kenneth A., and Carlos F. Gomez. 1988. Hidden Illness in the White House. Duke University Press, Durham, N.C.
Dang, Dennis K., Jeffrey M. Pont, and Mitchell A. Portnoy. 1996. "Episode Treatment Groups: An Illness Classification System and Episode Building System, Part I," Medical Interface, March, pp. 118-122.
Daugman, J.G. 1993. "High Confidence Visual Recognition of Persons by a Test of Statistical Independence," IEEE Transactions on Pattern Analysis and Machine Intelligence 15(11):1148-1161.
Deloitte and Touche LLP. 1996. U.S. Hospitals and the Future of Health Care. Deloitte and Touche, Philadelphia.
Detmer, Don E., and Elaine B. Steen. 1993. "Patient Records in the Information Age," Issues in Science and Technology, Vol. 9, No. 3, pp. 24-27.
Detmer, Don E., and Elaine B. Steen. 1996. "Shoring Up Protection of Personal Health Data," Issues in Science and Technology, Summer, Vol. 12, No. 4, pp. 73-78.
Diffie, Whitfield. 1988. "The First Ten Years of Public-Key Cryptography," Proceedings of the IEEE, Vol. 76, No. 5, May, pp. 560-577.
Dunn, Ashley. 1996. "Tracking Crumbs of Data That Threaten to Define Us," New York Times, Cyber Times, May 12; available on-line at www.nytimes.com.
Edgar, Harold, and David J. Rothman. 1995. "The Institutional Review Board and Beyond: Future Challenges to the Ethics of Human Experimentation," Milbank Quarterly 73:489-506.
Elie, Benoit, and Alice Labreque. 1992. "Minimum Requirements for the Security of Computerized Records of Health and Social Services Network Clients," Commission d'acces a l'information, Province of Quebec, Canada, April.
Evans, R. Scott, Robert A. Larsen, John P. Burke, Reed M. Gardner, Frederick A. Meier, Jay A. Jacobson, Marilyn T. Conti, Julie T. Jacobson, and Russell K. Hulse. 1986. "Computer Surveillance of Hospital-Acquired Infections and Antibiotic Use," Journal of the American Medical Association 256(8):1007-1011.
Farkas, Charles M., and Suzy Wetlaufer. 1996. "The Ways Chief Executive Officers Lead," Harvard Business Review, May-June, pp. 110-122.
Ferraiolo, David, and Richard Kuhn, "Role-based Access Controls," a summary of ongoing work at the National Institute of Standards and Technology, available on-line at nemo.ncsl.nist.gov / rbac/.
Fisher, Lawrence M. 1996. "Health On-Line: A Participatory Brand of Medicine," New York Times, June 24.
Fisher, Lawrence M. 1996. "Netscape's Founder Begins a New Venture," New York Times, June 18.
Flaherty, David H. 1995. "Privacy and Data Protection in Health and Medical Information," notes for presentation to the 8th World Congress on Medical Informatics, Vancouver, B.C., Canada, July 27, available on-line at latte.cafe.net/gvc/foi/presentations/health.html; downloaded May 15, 1996.
Flynn, Laurie J. 1996. "Company Stops Providing Access to Social Security Numbers," New York Times, June 13; available on-line at www.nytimes.com.
Flynn, Laurie J. 1996. "Group to Monitor Web Sites for Respect of Consumer Privacy," New York Times, July 16; available on-line at www.nytimes.com.
Frawley, Kathleen A. 1994. "Confidentiality in the Computer Age," RN, July, pp. 59-60.
Freudenheim, Milt. 1996. "Blue Cross Groups Seek Profit, and States Ask Share of Riches," New York Times, March 25, p. A1.
Friend, Tim. 1996. "Genetic Findings Used to Deny Jobs, Coverage," USA Today, April 15, pp. A1 and A3.
Friend, Tim. 1996. "Researchers Uncover Genetic Discrimination," USA Today, August 6; available on-line at www.usatoday.com.
Fulginiti, Vincent. 1996. "The Challenge of Primary Care for Academic Health Centers," pp. 247-252 in M. Osterweis et al. (eds.), The U.S. Health Workforce: Power, Politics and Policy. Association of Academic Health Centers, Washington D.C.
Ganesan, Ravi, and Ravi Sandhu. 1994. "Securing Cyberspace," Communications of the ACM , November, pp. 29-40.
Garfinkel, Simson L. 1996. "Cryptography," paper presented at Conference on Technological Assaults on Privacy, Rochester Institute of Technology, Rochester, New York, April 18-19.
Garfinkel, Simson, and Gene Spafford. 1996. Practical UNIX and Internet Security, 2nd edition. O'Reilly and Associates, Inc., Cambridge, Mass.
Geller, Lisa N., Joseph S. Alper, Paul R. Billings, Carol I. Barash, Jonathan Beckwith, and Marvin R. Natowicz. 1996. "Individual, Family, and Societal Dimensions of Genetic Discrimination: A Case Study Analysis," Science and Engineering Ethics 2(1):71-88.
Gellman, Robert. 1984. "Prescribing Privacy: The Uncertain Role of the Physician in the Protection of Patient Privacy," North Carolina Law Review 62(255):274-278.
General Accounting Office. 1996. Information Security: Computer Attacks at Department of Defense Pose Increasing Risks. General Accounting Office, Washington, D.C., May.
General Accounting Office. 1996. U.S. Postal Service: Improved Oversight Needed to Protect Privacy of Address Changes. General Accounting Office, Washington, D.C., August.
Glowniak, Jerry V., and Marilyn K. Bushway. 1994. "Computer Networks as a Medical Resource: Accessing and Using the Internet," Journal of the American Medical Association 271(24):1934-1939.
Gobis, Linda J. 1994. "Computerized Patient Records: Start Preparing Now," Journal of Nursing Administration 24(9):15-16.
Gobis, Linda J. 1995. "Bedside Computers and Confidentiality," American Journal of Nursing, October, pp. 75-76.
Goldman, Janlori. 1995. "Statement Before the Senate Committee on Labor and Human Resources on S.1360, the Medical Records Confidentiality Act of 1995," November 14. [also letter dated April 29, 1996, to Senators Kassebaum and Kennedy and CDT Policy Post, Vols. 2(11) and 2(14).]
Golob, Randy. 1994. "America's Best Networked Healthcare Organizations," Healthcare Informatics, November, pp. 84-88.
Gordon & Glickson. 1995. Overcoming the Legal Challenges in Converting to a Computerized Medical Record. Gordon & Glickson, Chicago, Ill.; available on-line at www.ggtech.com.
Gordon & Glickson. 1995. Second Annual Computer-based Patient Records Survey. Gordon & Glickson, Chicago, Ill.; available on-line at www.ggtech.com.
Gordon & Glickson. 1996. A Model Defining and Exploring Information Transactions Between Public Health and Healthcare Organizations: Legal and Data Security Issues. Gordon & Glickson, Chicago, Ill.; available on-line at www.ggtech.com.
Gorman, Christine. 1996. "Big Brother Wants You Healthy," TIME Magazine, May 6, p. 62.
Gorman, Christine. 1996. "Who's Looking at Your Files?," TIME Magazine, May 6, pp. 60-62.
Gostin, Lawrence O., and Zita Lazzarini. 1995. "Childhood Immunization Registries: A National Review of Public Health Information Systems and the Protection of Privacy," Journal of the American Medical Association 274(22):1793-1799.
Gostin, Lawrence O., Zita Lazzarini, Verla S. Neslund, and Michael T. Osterholm. 1996. "The Public Health Information Infrastructure: A National Review of the Law on Health Information Privacy," Journal of the American Medical Association 275(24):1921-1927.
Graubart, Richard D. 1995. Securing a Healthcare Information System. The MITRE Corporation, Bedford, Mass., June.
Greenberg, Daniel S. 1996. "Nemesis of Privacy," Washington Post, August 1, p. A23.
Grigsby, Jim, Robert E. Schlenker, Margaret M. Kaehny, Elliot J. Sandberg, Phoebe Lindsey Barton, Peter W. Shaughnessy, Andrew M. Kramer, and Susan K. Beale. 1994. "Analysis of Expansion of Access to Care Through Use of Telemedicine," paper downloaded June 19, 1995, from gopher://gopher.hpcc.gov.
Gritzalis, D., I. Kantzavelou, S. Katsikas, and A. Patel. 1995. "A Classification of Health Information System Security Flaws," pp. 453-463 in Proceedings of the 11th International Information Security Conference (IFIP SEC '95), J. Eloff and S.H. von Solms (eds.). Chapman & Hall, South Africa.
Gruley, Bryan, and Thomas M. Burton. 1996. "Drugstores Request Changes in Lilly's Acquisition of PCS," Wall Street Journal, August 1, available on-line at www.wsj.com.
Hafferty, Frederic, and Donald Light. 1995. "Professional Dynamics and the Changing Nature of Medical Work," Journal of Health and Social Behavior, extra issue, pp. 132-153.
Hall, Eric. 1996. "Interactive Network Design Manual: Internet Firewall Essentials," Network Computing, April 22, available on-line at techweb.cmp.com/nc/netdesign/ walll.html.
Hammond, W. Ed. 1992. "Security, Privacy, and Confidentiality: A Perspective," Journal of Health Information Management Research 1(2):1-8.
Hammond, W. Ed. 1997. "The Use of the Social Security Number as the Basis for the National Citizen Identifier," White Papers—the Unpredictable Certainty: Information Infrastructure Through 2000. National Academy Press, Washington, D.C., forthcoming.
Healthcare Information and Management Systems Society (HIMSS). 1995. "Appendix IV: JCAHO Information Management Standards," 1995 HIMSS Proceedings. HIMSS, Chicago, Ill.
Health Data Network News. 1996. "Houston Docs On Call Will Use the Internet to Get Patient Records," June 20, pp. 1 and 8.
Health Data Network News. 1996. "Claims Over the Internet? It's Happening," May 20, p. 1.
Health Data Network News. 1996. "The Pharmacy Fund Looks for Rapid Expansion of Its Rapid RxEmit Program," January 20, p. 5.
Health Insurance Association of America. 1996. Source Book of Health Insurance Data. Health Insurance Association of America, Washington, D.C.
Health Management Technology. 1995. "I/T Sales to Soar Next Five Years," December, p. 10.
Holbrook, P., and J. Reynolds (eds.). 1991. "Site Security Handbook," IETF RFC 1244, July, available on-line at www.ietf.org.
Holmes, J.P., L.J. Wright, and R.L. Maxwell. 1991. "A Performance Evaluation of Biometric Identification Devices," Sandia Report SAND91-0276. Sandia National Laboratories, Albuquerque, N. Mex., June.
Information and Privacy Commissioner (Ontario, Canada) and Registratiekamer (The Netherlands). 1995. Privacy-Enhancing Technologies: The Path to Anonymity. Volume I, [no publisher/location noted], August.
Information Highway Advisory Council. 1996. Building the Information Society: Moving Canada into the 21st Century, Catalog No. C2-302/1996. Minister of Supply and Services Canada, Ottawa, Ontario.
Information Infrastructure Task Force (IITF). 1995. "Privacy and the National Information Infrastructure: Principles for Providing and Using Personal Information," Privacy Working Group, Information Policy Committee, IITF, final version dated June 6; downloaded May 9, 1996, from www.iitf.doc.gov.
Information Week. 1996. Vol. 3 (June), p. 12.
Inside Healthcare Computing. 1996. "How a 13-Year-Old Breached HIS Security, Made Phony AIDS Calls," 6(8), March 4, pp. 1-2.
Institute of Medicine. 1991. The Computer-based Patient Record: An Essential Technology for Health Care, Richard S. Dick and Elaine B. Steen, eds. National Academy Press, Washington, D.C.
Institute of Medicine. 1994. Health Data in the Information Age: Use, Disclosure, and Privacy, Molla S. Donaldson and Kathleen N. Lohr (eds.). National Academy Press, Washington, D.C.
Institute of Medicine. 1994. "Regional Health Databases, Health Services Research, and Confidentiality," a summary paper of a workshop, National Implications of the Development of Regional Health Database Organizations, January 31- February 1, Washington, D.C.
Institute of Medicine. 1995. Real People, Real Problems: An Evaluation of the Long-term Care Ombudsman Programs of the Older Americans Act, National Academy Press, Washington, D.C.
Jeffrey, Nancy Ann. 1996. "Getting Access to Your Medical Records May Be Limited, Costly-or Impossible," Wall Street Journal, July 31, pp. C1 and C21.
Jeffrey, Nancy Ann. 1996. "'Wellness Plans' Try to Target Those Who Aren't So Well," Wall Street Journal, June 20; available on-line at www.wsj.com.
Kaluzny, Arnold D., Howard S. Zuckerman, and Thomas C. Ricketts III (eds.). 1995. Partners for the Dance: Forming Strategic Alliances in Health Care. Health Administration Press, Ann Arbor, Mich.
Kanter, Rosabeth Moss, David V. Summers, and Barry A. Stein. 1986. "The Future of Workplace Alternatives," Management Review 75(7):30-33.
Kanter, Rosabeth Moss. 1994. "Collaborative Advantage: The Art of Alliances," Harvard Business Review, July-August, pp. 96-108
Keeton, W. Page (ed.) 1984. Prosser and Keeton on the Law of Torts. West Publishing Company, St. Paul, Minn.
Kemmerer, Richard A. 1994. "Security, Computer," Encyclopedia of Software Engineering. John Wiley & Sons Inc., New York, pp. 1153-1164.
Khanna, Raman (ed.). 1993. Distributed Computing: Implementation and Management Strategies. Prentice-Hall, Englewood Cliffs, N.J.
Knecht, Bruce. 1996. "Click! Doctor to Post Patient Files on Net," Wall Street Journal, February 20, p. B1.
Kohane, Isaac S., F.J. van Wingerde, James C. Fackler, Christopher Cimino, Peter Kilbridge, Shawn Murphy, Henry Chueh, David Rind, Charles Safran, Octo Barnett, and Peter Szolovits. 1996. "Sharing Electronic Medical Records Across Multiple Heterogeneous and Competing Institutions," available on-line at www.emrs.org/publications/.
Kohl, J., and C. Neuman. 1993. "The Kerberos Network Authentication Service (V5)," RFC 1510, Internet Working Group, available on-line at ds.internic.net/rfc/rfcl510.txt.
Korpman, Ralph A., and Thomas L. Lincoln. 1988. "The Computer-Stored Medical Record," Journal of the American Medical Association 259(23):3454-3456.
Laban, James. 1996. Privacy Issues Surrounding Personal Identification Systems, available online at www.dss.state.ct.us/digital.htm.
Larkin, T.J., and Sandar Larkin. 1996. "Reaching and Changing Frontline Employees," Harvard Business Review, May-June, pp. 95-104.
Lawrence, Larry M. 1994. "Safeguarding the Confidentiality of Automated Medical Information," Journal on Quality Improvement 20(11):639-646.
Lee, Therese. 1996. "Medicine Prof Testifies in DNA Case," Stanford Daily, April 24, pp. 1-2.
Lewin, Tamar. 1996. "Questions of Privacy Roil Arena of Psychotherapy," New York Times, May 22; available on-line at www.nytimes.com.
Lincoln, Thomas L. 1994. "Traveling the New Information Highway," Journal of the American Medical Association 271(24):1955-1956.
Linowes, David F. 1989. Privacy in America: Is Your Private Life in the Public Eye? University of Illinois Press, Urbana, Ill., p. 42.
Linowes, David. 1996. "A Research Survey of Privacy in the Workplace," an unpublished white paper available from the University of Illinois at Urbana-Champaign.
Louis Harris and Associates (in association with Alan Westin). 1993. Health Information Privacy Survey 1993. A survey conducted for EQUIFAX Inc. by Louis Harris and Associates, New York.
Louis Harris and Associates. 1995. Equifax-Harris Mid-Decade Consumer Privacy Survey, Study No. 953012. Louis Harris and Associates, New York.
Marbach, William D. 1983. "Beware: Hackers at Play," Newsweek, September 5, p. 42-46.
Markoff, John. 1996. "Balancing Privacy and Official Eavesdropping," New York Times, July 13; available on-line at www.nytimes.com.
McDonald, Clement J., and William M. Tierney. 1988. "Computer-Stored Medical Records: Their Future Role in Medical Practice," Journal of the American Medical Association 259(23):3433-3440.
McMenamin, Brigid. 1996. "It Can't Happen Here," Forbes, May 20, pp. 252-254.
McMullen, William L. 1994. Overview of a Healthcare Information System Architecture Beyond the Computer-based Patient Record. The MITRE Corporation, McLean, Va.
Medical Information Bureau. 1995. Medical Information Bureau: A Consumer's Guide. Medical Information Bureau, Westwood, Mass., September.
Medical Interface. 1996. "Drug Companies Using More Pharmacoeconomic Data in Marketing," March, pp. 38-39.
Milholland, D. Kathy, and Barbara R. Heller. 1992. "Computer-based Patient Record: From Pipe Dream to Reality," Computers in Nursing 10(5):191-192.
Milholland, D. Kathy. 1994. "Privacy and Confidentiality of Patient Information: Challenges for Nursing," Journal of Nursing Administration 24(2):19-24.
Miller, Benjamin. 1994. "Vital Signs of Identity," IEEE Spectrum, February, pp. 22-30.
Miller, Dale. 1994. "Confidentiality Safeguards for Quality Assurance Systems," Infocare: Special Supplement to Healthcare Informatics, April, pp. 58-62.
Miller, Frances H., and Philip A. Huvos. 1994. "Genetic Blueprints, Employer Cost-Cutting, and the Americans with Disabilities Act," Administrative Law Review 46(369):383.
Miller, Robert H. 1996. "Health System Integration: A Means to an End," Health Affairs 15(2):92-106.
Miller, S., C. Neuman, J. Schiller, and J. Saltzer. 1987. "Section E.2.1: Kerberos Authentication and Authorization System," MIT Project Athena, Cambridge, Mass.
Modern Healthcare. 1996. "Did You Hear the One About ... ?," April 8, p. 52.
Molander, Roger C., Andrew S. Riddile, and Peter A. Wilson. 1996. Strategic Information Warfare: A New Face of War, RAND Report MR-601. RAND Corporation, Santa Monica, Calif.
Morrissey, John. 1996. "A Broader Vision: CIOs Shift Strategy to Look Beyond the Hospital," Modern Healthcare, March 4, pp. 110-113.
Morrissey, John. 1996. "Clinical Systems Add Market Momentum," Modern Healthcare, March 4, pp. 114-120, 132.
Morrissey, John. 1996. "Data Security," Modern Healthcare, September 30, pp. 32-40.
Morrissey, John. 1996. "Full Speed Ahead," Modern Healthcare, March 4, pp. 97-108.
Munro, Neil. 1996. "Infotech Reshapes Health Care Marketplace," Washington Technology, August 8.
Murray, William Hugh. 1996. "Remarks of William Hugh Murray to the Committee on Health Privacy of the NRC," Deloitte & Touche LLP, Wilton, Conn., February 27.
Murrey, Katherine, Lawrence Gottlieb, and Stephen Schoenbaum. 1992. "Implementing Clinical Guidelines: A Quality Mangement Approach to Reminder Systems," Quality Review Bulletin, December, pp. 423-433.
National Institute of Standards and Technology. 1994. Putting the Information Infrastructure to Work: Report of the Information Infrastructure Task Force Committee on Applications and Technology, NIST Special Publication 857. U.S. Government Printing Office, Washington, D.C., May.
National Library of Medicine. 1996. Current Bibliographies in Medicine: Confidentiality of Electronic Health Data, No. 95-10. National Library of Medicine, Rockville, Md.
National Research Council. 1972. Databanks in a Free Society: Computers, Record Keeping, and Privacy. National Academy of Sciences, Washington, D.C.
Navarro, Robert P. 1996. "User Applications of Health Economic Data," Medical Interface, March, pp. 81-82.
Needham, R., and M. Schroeder. 1978. "Using Encryption for Authentication in Large Networks of Computers," Communications of the ACM, Vol. 21, No. 12.
Neumann, Peter. 1995. Computer Related Risks. Addison-Wesley, Reading, Mass.
Nichols, Nancy A. 1994. "Medicine, Management, and Mergers: An Interview with Merck's P. Roy Vagelos," Harvard Business Review, November-December, pp. 105-114.
Nissenbaum, Helen. 1996. ''Violating Privacy in Public: Meeting the Challenges of Information Technology," draft paper presented at Conference on Technological Assaults on Privacy, Rochester Institute of Technology, Rochester, New York, April 18-19.
Office of Technology Assessment. 1993. Protecting Privacy in Computerized Medical Information, OTA-TCT-576. U.S. Government Printing Office, Washington, D.C.
Office of Technology Assessment. 1995. Bringing Health Care Online: The Role of Information Technologies. U.S. Government Printing Office, Washington, D.C.
Ornstein, Steven M., Edward Schaeffer, Ruth G. Jenkins, and Robert L. Edsall. 1996. "A Vendor Survey of Computerized Patient Record Systems," Family Practice Management, February, pp. 35-49.
Panettieri, Joseph C. 1995. "Ernst & Young Security Survey," Information Week; downloaded August 22, 1995, from www.techweb.com.
Patient Confidentiality and Privacy Work Group, Massachusetts Health Data Consortium Inc. 1996. "Confidentiality of Health Data-An Exploration of Principles, Policies, and Practices," draft paper dated March 28, presented at a public meeting in Boston sponsored by Massachusetts Health Data Consortium, Waltham, Mass.
Pharmaceutical Research and Manufacturers Association. 1996. Industry Profile. Pharmaceutical Research and Manufacturers Association, Washington, D.C.
Pollard, Michael R., and Hugh H. Tilson, Jr. 1996. "Implications for Managed Care Organizations of the Merck and Medco Consent," Medical Interface, March, pp. 60-62.
Power, Richard. 1996. "1996 CSI/FBI Computer Crime and Security Survey," Computer Security Issues & Trends, Vol. II, No. 2., Spring, p. 2.
PRNewswire. 1996. "Minnesota Takes the Lead on Agreement to Protect 41 Million Americans," October 25; available on-line at www.epic.org/privacy/medical/merck.txt.
Privacy Protection Study Commission. 1977. Personal Privacy in an Information Society. Privacy Protection Study Commission, Washington, D.C., July, Chapter 7, pp. 277-317.
Public Health Data Policy Coordinating Committee. 1995. Making a Powerful Connection: The Health of the Public and the National Information Infrastructure. U.S. Public Health Service, Washington, D.C.; downloaded from www.nlm.nih.gov on November 14, 1995.
Reich, Paul. 1996. "Today's Drug Utilization Review," Medical Interface, March, p. 12.
Riley, John. 1996. "Know and Tell: Sharing Medical Data Becomes Prescription for Profit," Newsday, April 2, pp. A17, A50-A51.
Riley, John. 1996. "Open Secrets: Changes in Technology, Health Insurance Making Privacy a Thing of the Past," Newsday, March 31, pp. A5, A41-A42.
Riley, John. 1996. "'Virtual Records': Patient Data at Click of Mouse," Newsday, March 31, pp. A5 and A40.
Riley, John. 1996. "When You Can't Keep a Secret: Insurers' Cost-cutters Demand Your Medical Details," Newsday, April 1, pp. A7, A36-A38.
Riley, John. 1996. "Will Bill Cure Ills?: Legislation on Access to Medical Data Sparks Debate," Newsday, April 3, pp. A19 and A53.
Rodriguez, Karen. 1996. "Pushing the Envelope," Communications Week, May 13, p. 37.
Rogers, L., and D. Leppard. 1995. "For Sale: Your Secret Medical Records for £150," London Sunday Times, November 26, pp. 1-2.
Rosnow, Ralph L., Mary Jane Rotheram-Borus, Stephen J. Ceci, Peter D. Blanck, and Gerald P. Koocher. 1993. "The Institutional Review as a Mirror of Scientific and Ethical Standards," American Psychologist 48(7):821-826.
Rotenberg, Marc. 1995. "Principles for Federal Privacy Protection of Medical Records," EPIC Alert, Vol. 2, No. 13, October 13.
Rotenberg, Marc. 1994. "Privacy and Security for Medical Information Systems," an outline of keynote address given at AHIMA conference, Seizing the Opportunity: The Power of Health Information, Las Vegas, Nevada, October.
Rothenberg, Karen. 1995. "Genetic Information and Health Insurance: State Legislative Approaches," Journal of Law, Medicine, and Ethics 23(312):312-319.
Rothfeder, Jeffrey. 1992. Privacy for Sale: How Computerization Has Made Everyone's Life an Open Secret. Simon and Schuster, New York.
Rothstein, Mark A. 1992. "Genetic Discrimination in Employment and the Americans with Disabilities Act," Houston Law Review 29(23):80-81.
Sack, Kevin. 1995. "House Panel to Draft Bill on AIDS Tests of Newborns," New York Times, July 14, p. A15.
San Francisco Chronicle. 1996. "Genetic Testing Raises Questions of Discrimination," April 15.
Schiller, Jeffrey I. 1994. "Secure Distributed Computing," Scientific American 271(5):72-76.
Schoeman, Ferdinand David (ed.). 1984. Philosophical Dimensions of Privacy: An Anthology. Cambridge University Press, Cambridge, England.
Schultz, Ellen E. 1991. "If You Use Firm's Counselors, Remember Your Secrets Could Be Used Against You," Wall Street Journal, May 26, pp. C1 and C6.
Schultz, Ellen E. 1994. "Open Secrets: Medical Data Gathered by Firms Can Prove Less Than Confidential," Wall Street Journal, May 18, p. A1.
Schwartz, John. 1996. "Insurer's Refusal to Disclose Deadly Diagnosis Leads to Legal Battle," Washington Post, August 4, p. A3.
Schwartz, Paul M. 1995. "European Data Protection Law and Restrictions on International Data Flows," Iowa Law Review 80(3):471-496.
Schwartz, Paul M. 1995. "The Protection of Privacy in Health Care Reform," Vanderbilt Law Review 48(2):296-347.
Schwartz, Paul M., and Joel R. Reidenberg. 1996. Data Privacy Law: A Study of United States Data Protection. Michie Law Publishers, Charlottesville, Va.
Scism, Leslie. 1996. "U.S. Healthcare Antitrust Fight: Does Firm Coerce Pharmacies?," Wall Street Journal, May 20; available on-line at www.wsj.com.
Simpsor, Roy L. 1994. "Ensuring Patient Data, Privacy, Confidentiality, and Security," Nursing Management 25(7):18-20.
Smith, H. Jeff. 1993. "Privacy Policies and Practices: Inside the Organizational Maze," Communications of the ACM 36:105-122.
Smith, H. Jeff. 1994. Managing Privacy: Information Technology and Corporate America. University of North Carolina Press, Chapel Hill, N.C.
Smith, H. Jeff, and Ernest A. Kallman. 1992. "Privacy Attitudes and Practices: An Empirical Study of Medical Record Directors' Perceptions," Journal of Health Information Management Research 1(2):9-31.
Soumerai, S., and J. Avorn. 1990. "Principles of Educational Outreach to Improve Clinical Decision Making," Journal of the American Medical Association 262:549-556.
Stix, Gary. 1994. "Dr. Big Brother," Scientific American 270(2):108-109.
Szolovits, Peter, and Isaac Kohane. 1994. "Against Universal Health-care Identifiers," Journal of the American Medical Informatics Association 1:316-319.
Tippit, Sarah. 1996. "A New Danger in the Age of AIDS," Washington Post, October 14, p. A4.
Turkington, Richard C. 1996. "Privacy and Autonomy in Cyberspace," draft discussion document presented at Conference on Technological Assaults on Privacy, Rochester Institute of Technology, Rochester, New York, April 18-19.
U.S. Department of Commerce, National Bureau of Standards. 1977. "Data Encryption Standard," FIPS Publication 46. National Bureau of Standards, Washington, D.C.
U.S. Department of Health, Education, and Welfare. 1973. Records, Computers, and the Rights of Citizens. U.S. Government Printing Office, Washington, D.C.
U.S. Department of Health and Human Services, Agency for Health Care Policy and Research. 1995. Using Clinical Practice Guidelines to Evaluate Quality of Care, Volume 1. U.S. Government Printing Office, Washington, D.C., March.
Vanselow, Neal. 1996. "New Health Workforce Responsibilities and Dilemmas," pages 231-242 in M. Osterweis et al. (eds.), The U.S. Health Workforce: Power, Politics and Policy. Association of Academic Health Centers, Washington D.C.
Venema, Wietse. 1992. "TCP WRAPPER: Network Monitoring, Access Control and Booby Traps," pp. 85-92 in Proceedings of the Third Usenix UNIX Security Symposium, Baltimore, Md., September.
Violino, Bob. 1996. "Internet Security: Your Worst Nightmare," Information Week Online, available on-line at techweb.cmp.com/iw/567/67mtsec.htm.
Violino, Bob. 1996. "The Security Facade: Are Organizations Doing Enough to Protect Themselves? This Year's IW/Ernst & Young Survey Will Shock You," Information Week, October 21.
Walker, John M. 1993. "Employee Retirement Income Security Act of 1974: An Overview of ERISA Pre-Emption," American Journal of Trial Advocacy 17(529), Fall.
Walker, Robert. 1995. "'Smart Cards' to Cut Health Costs," Calgary Herald, June 15; available on-line at www.southam.com/edmontonjournal/archives.
Weiss, Rick. 1996. "Hospital Reviews Criticized: Watchdog Group Says System Is Flawed," Washington Post, July 11, p. A23.
Whittemore, Jr., Ken. 1995. "Electronic Prescription Transmission," National Association of Retail Druggists, April, pp. 18-22.
Wiederhold, Gio, Michel Bilello, Vatsala Sarathy, and Xioa Lei Qian. 1996. "A Security Mediator for Health Care Information," Proceedings of the 1996 AMIA Conference, Washington, D.C., October, pp. 120-124.
Williams, Tennessee. 1947. A Streetcar Named Desire. New Directions, New York.