1. Akowuah, F., Yuan, X., Xu, J., & Wang, H. (2012). An overview of laws and standards for health information security and privacy. In Proceedings of the Security & Management International Conference (pp. 403-408). Las Vegas: CSREA Press.
2. Boehmer, W. (2009). Cost-benefit trade-off analysis of an ISMS based on ISO 27001. In Proceedings of the International Conference on Availability, Reliability and Security (ARES '09) (pp. 392- 399). Fukuoka: CPS.
3. Fraser, R. (2006, June 6). Canada health infoway. Retrieved September 16, 2012, from http://sl.infoway-inforoute.ca/downloads/Ross_Fraser_-_ISO_27799.pdf
4. Freedman, L. F. (2009, February). The Health Information Technology for Economic and Clinical Health Act (HITECH Act): Implications for the adoption of health information technology, HIPAA, and privacy and security issues. Retrieved March 3, 2012, from http://www.nixonpeabody.com/publications_detail3.asp?ID=2621
5. Heminger, A. R., & Chessman, J. (2009). A study of U.S. battlefield medical treatment/evacuation. Compliance with HIPAA requirements. In Proceedings of the 42nd Hawaii International Conference on System Sciences.