1. Ackerman M. S. and Mainwaring S. D. 2005. Privacy issues and human-computer interaction. In Security and Usability: Designing Secure Systems that People Can Use L. F. Cranor and S. Garfinkel Eds. O'Reilly Media 381--400. http://oreilly.com/catalog/9780596008277/. Ackerman M. S. and Mainwaring S. D. 2005. Privacy issues and human-computer interaction. In Security and Usability: Designing Secure Systems that People Can Use L. F. Cranor and S. Garfinkel Eds. O'Reilly Media 381--400. http://oreilly.com/catalog/9780596008277/.
2. ACLU 2009 American Civil Liberties Union. The American Recovery and Reinvestment Act of 2009: Health information technology privacy summary. http://www.aclu.org/images/asset_upload_file625_38771.pdf. (last accessed 3/09). ACLU 2009 American Civil Liberties Union. The American Recovery and Reinvestment Act of 2009: Health information technology privacy summary. http://www.aclu.org/images/asset_upload_file625_38771.pdf. (last accessed 3/09).
3. Al Ameen M. Liu J. and Kwak K. 2010. Security and privacy issues in wireless sensor networks for healthcare applications. J. Medical Syst. 1--9. DOI 10.1007/s10916-010-9449-4. 10.1007/s10916-010-9449-4 Al Ameen M. Liu J. and Kwak K. 2010. Security and privacy issues in wireless sensor networks for healthcare applications. J. Medical Syst. 1--9. DOI 10.1007/s10916-010-9449-4. 10.1007/s10916-010-9449-4
4. AllOne Health. 2009. PHR access on mobile phone. http://www.allonemobile.com. (last accessed 3/09) AllOne Health. 2009. PHR access on mobile phone. http://www.allonemobile.com. (last accessed 3/09)