1. Lee GH, Choi EM. Medical record information management. Hospital strategy management institute compiled. hospital business administration. 2002. Seoul: SinGwang Publishing.
2. Kim HE, Kim JH. A survey on the attitude of social groups toward security, privacy, and confidentiality of health information: an original paper authors and affiliations. J Korean Soc Med Inform. 1999. 5:63–76.
Article
3. Myers J, Frieden TR, Bherwani KM, Henning KJ. Ethics in public health research: privacy and public health at risk: public health confidentiality in the digital age. Am J Public Health. 2008. 98:793–801.
4. Wiant TL. Information security policy's impact on reporting security incidents. Comput Secur. 2005. 24:448–459.
Article
6. Sobel R. The privacy rule that's not. Hastings Cent Rep. 2007. 37:40–50.
7. Kim SY. Legal inquiry on maintenance of secret of medical information: centered in medical information [dissertation]. 1997. Seoul: Yonsei Univ..
8. Kim H. Study on secret protection of medical information: centered in medical information [dissertation]. 1997. Seoul: Hanyang Univ..
9. Jeon CB, Haas AK, Senouci K, Lin CY. Study on rational use of personal information and protection method: centered in theological inquiry and foreign example. NHIC Report 2005-18. 2005. Seoul: National Health Insurance Corporation.
10. Berkowitz L, Brostoff G. Balancing access and security. Behav Healthc. 2007. 27:30–32.
11. Masys DR, Baker DB. Patient-centered access to secure systems online (PCASSO): a secure approach to clinical data access via the world wide web. 1997. In : Proc AMIA Annu Fall Symp; 340–343.
12. Choi EM, Seo SW, Park WS, Lee MJ, Kim YE, Kim ON. An awareness survey on the protection and use of personal health information focused on applicants for copies of the medical record. J Korean Soc Med Inform. 2009. 15:285–292.
Article