참고문헌
- Barrow, R. C., "Privacy, Confidentiality, and Electronic Medical Record," Journal of the American Medical Informatics Association, Vol. 3, No. 2, pp. 139-148, 1996. https://doi.org/10.1136/jamia.1996.96236282
- Cao, F., Huang, H. K., and Zhou, X. Q., "Medical Image Security in a HIPAA Mandated PACS Environment," Computerized Medical Imaging and Graphics, Vol. 27, No. 2, pp. 185-196, 2003. https://doi.org/10.1016/S0895-6111(02)00073-3
- "Cyber Security Guide for Smart Medical Service," Korea Internet & Security Agency, 2018.
- Glemm, A. L., Scott, R., Robert, M. S., and Nitesh, R. T., "If Electronic Medical Records are so Great, Why aren't Family Physicians Using Them?," Journal of Family Practice, Vol. 51, No. 7, 2002.
- Gollakota, S., Hassanieh, H., Ransford, B., Katabi, D., and Fu, K., "They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices," ACM SIGCOMM Computer Communication Review, Vol. 41, No. 4, pp. 2-13. 2011. https://doi.org/10.1145/2043164.2018438
- Halperin, D., Thomas, S. H., Fu, K., Tadayoshi, K., and Maisel, W. H., "Security and Privacy for Implantable Medical Devices," The Community for Technology Leaders, Vol. l7, No. 1, 2008.
- Jung, Y. S., "Implementation Plan of Integrated Medical Information System for Ubiquitous Healthcare Service," Korea Society of Industrial Information Systems, Vol. 15, No. 2, pp. 115-126, 2010.
- Kim, D. W. and Han, K. H., "Recent Research Trends for Responding to Security Threats in Smart Healthcare Environment," Information & Communications Magazine, Vol. 35, No. 2, pp. 95-99, 2018.
- Kim, Y. H. and Chang, H. B., "The Change of Future Environment and The Task of Healthcare Security," OSIA S&TR Journal, Vol. 31, No. 2, pp. 4-9, 2018.
- Koo, C. C., Shyy, Y. M., iMedica Corp., "Medical Records Data Security System," U.S. Patent 6,874,085, 2005.
- Kumar, P. and Lee, H. J., "Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey," Sensors, Vol. 12, No. 1, pp. 55-91, 2012. https://doi.org/10.1109/JSEN.2011.2119477
- Lee, Y. H. and Jung, C. S., "Design of Privilege Authentication for Secure OS based on PKI," Korea Institute of Information Scientists and Engineers, Vol. 34, No. 1, 2007.
- Oh, K. Y., "The Point of Issue and Blind on a Debate Concerning De-identification of Data," Korean Public Law Association, Vol. 45, No. 2, 2016.
- Park, S. H., Kim, Y. H., Park, G. M., Na, O. C., and Chang, H. B., "Research on Digital Forensic Readiness Design in a Cloud Computing-Based Smart Work Environment," Sustainability, Vol. 10, No. 4, pp. 1-24, 2018. https://doi.org/10.3390/su10020001
- Williams, P., "A Practical Application of CMM to Medical Security Capability," Information Management & Computer Security, Vol. 16, No. 1, pp. 58-73, 2008. https://doi.org/10.1108/09685220810862751
- Yang, C. M., Lin, H. C., Chang, P., and Jian, W. S., "Taiwan's Perspective on Electronic Medical Records' Security and Privacy Protection: Lessons Learned from HIPAA," Computer Methods and Programs in Biomedicine, Vol. 82, No. 3, pp. 277-282, 2006. https://doi.org/10.1016/j.cmpb.2006.04.002
- Lee, K. K., Jung, Y. S., and Han, C. H., "A Study on Consumer's Acceptance of Medical Internet Marketing According to Medical Departments," The Journal of Society for e-Business Studies, Vol. 14, No. 1, pp. 121-142, 2009.
- Kim, J. W. and Chang, H., "A Study on Design Security Management Evaluation Model for Small-Medium size Healthcare Institutions," The Journal of Society for e-Business Studies, Vol. 23, No. 1, pp. 89-102, 2018. https://doi.org/10.7838/jsebs.2018.23.1.089