1. Annas GJ. Invasion of privacy in the hospital. Nurs Law Ethics. 1981. 2(2):3.
Article
2. Arciero L, Denti M, Franchi S, Gallani D, Ghezzi L, Mottola E, et al. The hospitalized terminal cancer patient and privacy: Patient needs and the perception on the part of the professional nurse. Riv Inferm. 1993. 12:8–15.
3. Bauer IL. Patients' privacy: An exploratory study of patients' perception of their privacy in a German acute care hospital. 1994. Aldershot, England: Avebury.
5. Cohen J. Statistical power analysis for the behavioral sciences. 1988. 2nd ed. Hillsdale, NJ: Lawrence Earlbaum Associates.
6. Doyal L. Human need and the right of patients to privacy. J Contemp Health Law Policy. 1997. 14:1–21.
8. Han WJ. The confidentiality of patient information in health services organizations in the united states. J Korean Soc Qual Assur Health Care. 2009. 15:25–30.
9. Ferraiolo DF, Kuhn DR. Role-Based Access Control. 1992. In : Proceedings of 15th National Computer Security Conference; 554–563.
10. Fowler MDM. Guide to the Code of Ethics for Nurses: Interpretation and Application. 2010. Silver Spring, MD: American Nurses Association.
11. Jeong BK. Issues on the patient's information protection. Korean J Med Law. 2008. 9:339–382.
12. Jeong SJ, Kim M, Lee CK, Lee CH, Son BC, Kim DH, et al. Cognition and practice on medical information protection of industrial health care manager of small and medium sized enterprises. Korean J Occup Environ Med. 2011. 23:53–63.
13. Johnson F. Response to territorial intrusion by nursing home residents. ANS Adv Nurs Sci. 1979. 1(4):21–34.
14. Jung SY, Ju HO. Perception and performance of emergency-room nurse's protection behavior for the consumer health information. J Korean Acad Nurs Adm. 2009. 15:403–414.
16. Kim SG. A study on medical information and individual information protection in germany. Zeitschrift der Koreanisch-Deutschen Gesellschaft Fur Sozialwissenschaften. 2005. 15(2):1–16.
17. Korean Language Education Council. Writing and life. 1992. Seoul: Yonsei University Press.
18. Kurtz G. EMR confidentiality and information security. J Healthc Inf Manag. 2003. 17(3):41–48.
19. Lee HJ. Study for user management method on protection patient medical information in EMR system. 2006. Seoul: Seoul National University;Unpublished master's thesis.
20. Lee IY. A study on the protection regulation of patients privacy in the revision of medical law. J Hallym Law Forum. 2002. 11:135–158.
21. Lee MY, Park YM. A study on the nurse's perception and performance of protecting patient privacy. Clin Nurs Res. 2005. 11:7–20.
22. Leestma R. Implementing technological safeguards to ensure patient privacy. Caring. 2003. 22(2):16–18.
23. Leino-Kilpi H, Välimäkia M, Dassenb T, Gasullc M, Lemonidoud C, Scotte A, et al. Privacy: a review of the literature. Int J Nurs Stud. 2001. 38:663–671. doi:
10.1016/S0020-7489(00)00111-5.
Article
24. Nam HS. Internet and Law II. 2005. Gyeonggido, Paju: Bobmunsa.
25. O'Connor AC, Loomis RJ. 2010 Economic Analysis of Role-Based Access Control. Final Report for National Institute of Standards and Technology. 2010. 77–91.
26. Park IK. A study on the protection law for individual medical information. 2007. Seoul: Yonsei University;Unpublished master's thesis.
27. Park WB, Lim JW, Moon JH. A study on the improvement of patients' privacy in general hospital- The case of the seoul asan hospital renovation project. Korea Ins Healthc Archit J. 2003. 9(1):17–23.
28. Son YS. Medical record and privacy of patients. Korean J Obstet Gynecol. 2008. 51:129–136.
29. Yoo JW. Comparison between medical personnel and patients on the awareness of the protection of personal information in medical information. 2006. Seoul: Korea university;Unpublished master's thesis.