1 |
Wilson, R. "Emerging ransomeware threats: An anticipatory ethical anaylsis", 2021, Available at: https://ieeexplore.ieee.org/document/9629211.
|
2 |
DISA, "PostgreSQL 9.X Security Technical Implementation Guide (STIG) Overview Version 2, Release 2", 2022, Available at: https://www.stigviewer.com/stig/postgresql_9.x/.
|
3 |
ISO, "ISO/IEC 27001:2013 Information technology - Security techniques - Information security management systems - Requirements", 2013, Available at: https://www.iso.org/standard/54534.html.
|
4 |
Kaddoura, S. and Haraty, R. A., "A Parallelized Database Damage Assessment Approach after Cyberattack for Healthcare Systems", 2021, Available at: https://www.researchgate.net/publication/350540292_A_Parallelized_Database_Damage_Assessment_Approach_after_Cyberattack_for_Healthcare_Systems.
|
5 |
OHDSI, "The Book of OHDSI", 2021, Available at: https://ohdsi.github.io/TheBookOfOhdsi/.
|
6 |
DoD CIO, "Department of Defense Net-Centric Data Strategy", 2007, Available at: https://dodcio.defense.gov/Portals/0/documents/DoD_NetCentricServicesStrategy.pdf.
|
7 |
Hammond, K. W., Efthimiadis, E. N., and Laundry, R. J., "Efficient De-identification of Electronic Patient Records for User Cognitive Testing", IEEE, 2012, Available at: https://ieeexplore.ieee.org/document/6149163.
|
8 |
NIST, "SP 800-60r1 Guide for Mapping Types of Information and Information Systems to Security Categories", 2004, Available at: https://csrc.nist.gov/publications/detail/sp/800-60/vol-1-rev-1/final.
|
9 |
윤현아, "공통 데이터 모델을 이용한 성인 조현병 환자의 항정신병 약물 처방 패턴 분석", 한국보건사회 약료경영학회지, 제9권, 제2호, 2021, 111-120.
|
10 |
Kan, M., "A ransomware attack is spreading worldwide, using alleged NSA exploit: UK's National Health Service was among the organizations hit by the Wanna Decryptor ransomware on Friday", 2017, Available at: https://www.computerworld.com/article/3196378/a-ransomware-attack-is-spreading-worldwide-using-alleged-nsa-exploit.html.
|
11 |
김강한, "가명화 개인건강정보 보호 관련 기본권보장에 관한 연구", 세계헌법연구, 제27권, 제2호, 2021, 27-73.
|
12 |
NIST, "Framework for Improving Critical Infrastructure Cybersecurity Version 1.1", 2018, Available at: https://nvlpubs.nist.gov/nistpubs/cswp/nist.cswp.04162018.pdf.
|
13 |
NIST, "SP 800-53r4 Security and Privacy Controls for Federal Information Systems and Organizations", 2014, Available at: https://csrc.nist.gov/publications/detail/sp/800-53/rev-4/archive/2015-01-22.
|