next up previous
Next: About this document ... Up: Information technology in medical Previous: What is to be

Bibliography

1
Report of the inquiry into the London Ambulance Service. London: South West Thames Regional Health Authority, 1993. ftp://cs.ucl.ac.uk/acwf/info/lascase0.9.pdf

2
Shapiro DZ, Hughes JA, Randall D, Harper R. Visual re-representation of database information: the flight data strip in air traffic control. In: Aspects of visual languages and visual interfaces. London: Elsevier, 1994: 249-376.

3
Vowler J. Patient care at risk from millenium bug. Computer Weekly 8 May 1997: 3.

4
Medical Devices Agency. Medical devices and the year 2000. In: Year 2000 and healthcare computing. Health Informatics J 1997 3(3/4): 173-175.

5
Collins T. NHS millenium fix goes on critical list. Computer Weekly 18 Dec 1997: 1.

6
Anderson RJ. Security in clinical information systems. London: BMA, 1996. http://www.cl.cam.ac.uk/users/rja14/policy11/policy11.html

7
Anderson RJ. Safety and Privacy in Clinical Information Systems. In: Lenaghan J, editor. Rethinking IT and Health. London: IPPR, 1998: 140-160.

8
Denley I, Weston-Smith S. Implementing access controls to protect the confidentiality of patient information in clinical information systems in the acute hospital. Health Informatics J 1998 4 (3/4) (to appear).

9
Matyas M. Protecting doctors' identity in drug prescription analysis. Health Informatics J 1998 4 (3/4) (to appear).

10
Blobel B. Clinical record systems in oncology. Experiences and developments on cancer registers in Eastern Germany. In: Anderson RJ, editor. Personal medical information - security, engineering and ethics. London: Springer-Verlag, 1997: 39-56.

11
Neame R. Managing health data privacy and security. In: Anderson RJ, editor. Personal medical information - security, engineering and ethics. London: Springer-Verlag, 1997: 225-232.

12
Schnyder M. Datenflüsse im Gesundheitswesen. In: 3. Symposium fuer Datenschutz und Informationssicherheit, ETH Zuerich, 29/10/98.



Ross Anderson
1998-11-13