Bibliographie sur la sécurité de l’information en santé

Aamodt, A.M. (1991), Ethnography and epistemology, Dans Morse (Ed.), Qualitative Nursing Research: a contemporary dialogue, pp 40-53, Newbury Park: Sage, tel que présenté dans (Gallagher, 2005)

Alberts, Christopher J., 1999, Octave Framework version 1.0, technical report, Carnegie Mellon University, 2001, http://www.atis.org/tg2k/t1g2k.html

Anderson JG. Security of the distributed electronic patient record: a case-based approach to identifying policy issues, International Journal of Medical Informatics, 2002, pages 111–118

Assirati, Bob, ITIL Security Management, Central Computer and Telecommunication Agency, Government of the UK, UK, 1999

Association of American Medical Colleges, Information Technology Enabling Clinical Research, Findings and Recommendations from a Conference Sponsored by the Association of American Medical Colleges with Funding from the National Science Foundation, October 30-31, 2002

Alberts, Christopher J., 1999, Octave Framework version 1.0, technical report, Carnegie Mellon University, 2001, http://www.atis.org/tg2k/t1g2k.html

Bakker, Ab, Access to EHR and access control at a moment in the past: a discussion of the need and an exploration of the consequences, International Journal of Medical Informatics, 2004

Barber, B, Patient data and security: an overview, international journal of medical informatics, no 49, 1998, pages 19-30

Barthes, Rolland (1972), Mythologies, Paris, (traduction de l’oeuvre originale de 1957)

Bates, D.W., Pappius, E., Kuperman, G.J., Sittig, D., Burstin, H., Fairchild, D., Brennan, T.A., Teich, J.M., Using information systems to measure and improve quality, International Journal of Medical Informatics, 1999, pages 115–12

Barrows, RC Jr, Clayton, PD, Privacy, confidentiality, and electronic medical records,Journal of the American Medical Informatics Association, 1996, pages 139-148

Baskerville, Richard, Investigating Information Systems with Action Research, Communications of the association for information systems, Volume 2, article 19, Octobre 1999, http://www.cis.gsu.edu/~rbaskerv/CAIS_2_19/CAIS_2_19.html

Beecher, HK. Ethics and clinical research, The New England Journal of Medicine, 1966, 274: 1354–1360.

Behlen, Fred M., Johnson, Stephen B., Multicenter Patient Records Research, Journal of the American Medical Informatics Association, Volume 6, Number 6, Nov / Dec 1999

Bell, D.E., LaPadula, L.J., Secure computer system: Unified exposition and multics interpretation, MITRE report 2997, March 1976

Belmont Report, Ethical , Principles and Guidelines for the Protection of Human Subjects of Research, The National Commission for the Protection of Human Subjects of Biomedical andBehavioral Research, April 18, 1979

Berryman, Paul, Risk Assessment: The Basics, Mémoire présenté comme exigence partielle pour l’obtention de la certification de Global Information Assurance Certification du GIAC, http://www.giac.org/, Février 2002

Berndt, Donald J, Hevner, Alan R, Studnicki, James, The Catch data warehouse: support for community health care decision-making, Decision Support Systems, Vol 35, 2003, pages 367– 384

Blobel, Bernd, Advanced toolkits for EPR security, International journal of medical informatics, no 60, 2000, pages 169-175

Blobel, Bernd, Authorisation and access control for electronic health record systems, International Journal of Medical Informatics, 2004,  pages 251—257

Boudreau, Christian et la CAI, Étude sur l’inforoute de la santé au Québec : Enjeux techniques, éthiques et légaux, document de réflexion, octobre 2001

British Standard BS-7799-2:2002, Information Security Management System – Specification with Guidance for use, September 2002

Buckovich, Suzy A. et als, Driving Toward Guiding Principles: A Goal for Privacy, Confidentiality, and Security of Health Information, Journal of the American Medical Informatics Association Volume 6 Number 2 Mar / Apr 1999, Pages 122-133

Burt, Dr. Brian A., DEFINITIONS OF RISK, Department of Epidemiology, School of Public Health, University of Michigan, 2001

CAIDA, the Cooperative Association for Internet Data Analysis, Caida analisys of Code Red, http://www.caida.org/analysis/security/code-red/, 2002

Canada, 1985, Code criminel du Canada ( L.R. 1985, ch. C-46 ) art 342.1, 342.2, 430.

Cash, J. et al, Corporate information systems management: text and cases, Irwin, Boston,Third edition 1992

CERT, Securing Networks Systematically — the SKiP Method, CERT ® Coordination Center, Carnegie Mellon University, 2002(1

CERT, CERT® Advisory CA-2001-19 « Code Red » Worm Exploiting Buffer Overflow In IIS Indexing Service DLL, Carnegie Mellon University, CERT Coordination Center advisory, http://www.cert.org/advisories/CA-2001-19.html, 2001

CERT, CERT® Advisory CA-2002-22 Multiple Vulnerabilities in Microsoft SQL Server, Carnegie Mellon University, CERT Coordination Center advisory, http://www.cert.org/advisories/CA-2002-22.html, Juillet 2002

CERT, CERT® Advisory CA-2003-04 MS-SQL Server Worm, Carnegie Mellon University, CERT Coordination Center advisory, http://www.cert.org/advisories/CA-2003-04.html, Janvier 2003

CSA (Canadian Standards Association), Model Code for the Protection of Personal Information (Q830-96) , 2003, http://www.csa.ca/standards/privacy/code/Default.asp?language=english

Chateauneuf, A., Wakker, P., An Axiomatization of Cumulative Prospect Theory for Decision Under Risk, Journal of Risk and Uncertainty, 1999, pages 137-145

Cavoukian, A., The Security-Privacy Paradox: Issues, Misconceptions, and Strategies, A Joint Report by the Information and Privacy Commissioner of Ontario and Deloitte & Touche, Information and Privacy Commissioner of Ontario, August 2003, http://www.ipc.on.ca/docs/sec-priv.pdf

Chaudhuri, Surajit. Dayal Umeshwar, An overview of data warehousing and OLAP technology, ACM SIGMOD Record,  Volume 26 Issue 1 March 1997

Chaudhuri, S.; Dayal, U.; Ganti, V. Database technology for decision support systems, IEEE computer, Volume 34, Issue 12, Dec 2001, Pages 48-55

CIHR (Canadian  Institutes of Health Research), Guidelines for Protecting Privacy and Confidentiality in the Design, Conduct and Evaluation of Health Research: BEST PRACTICES, CONSULTATION DRAFT, April 2004

CIHR (Canadian Institutesof Health Research), Secondary use of personal information in health research: Case studies, Canadian Institute of Health Research, November 2002

CLARKE, EDMUND M., WING, JEANNETTE M., Formal Methods: State of the Art and Future Directions, ACM Computing Surveys, Vol. 28, No. 4, December 1996, pages 626-643

Clusif, MÉHARI, Club de la sécurité des informations français, August 2000

Cody, Patrick M, Dynamic Security for Medical Record Sharing, Submitted to the Department of Electrical Engineering and Computer Science in Partial Fulfillment of the Requirements for the Degrees of Bachelor of Science in Computer Science and Engineering and Master of Engineering in Electrical Engineering and Computer Science at the Massachusetts Institute of Technology, August 28, 2003

Collmann, Jeff, Alaoui, Adil, Nguyen, Dan, Lindisch, David, Safe teleradiology: information assurance as a project planning methodology, Elsevier Science International Congress Series 1256, 2003, pages 809– 814

Cognet, M. (2000). Ethnicité et santé, des pistes de recherche, Les cahiers du CÉRIEM, Université de haute Bretagne no 6, décembre, 2, 69-79

Commission d’accès à l’information du Québec, Exigences minimales relatives à la sécurité des dossiers informatisés des usagers du réseau de la santé et des services sociaux, Avril 1992

Commission d’accès à l’information du Québec, Avis concernant le cadre global de gestion sur la sécurité des actifs informationnels du réseau de la santé et des services sociaux, décembre 2001

Commission d’accès à l’information du Québec, Guide en matière de protection des renseignements personnels dans le développement des systèmes d’information à l’intention des ministères et organismes publics, Décembre 2002

Cooper, M.D., Towards a model of safety culture. Safety Science, 2000. 36: p. 111 – 136

COSISS, Politique intérimaire de sécurité visant les actifs informationnels du réseau de la santé et des services sociaux, Québec, 1999

COSO, Enterprise Risk Management Framework, Executive Summary,  Committee of Sponsoring Organizations of the Treadway Commission, 2003

CSI, Computer Security Institute, Cyber crime bleeds U.S. corporations, survey shows; financial losses from attacks climb for third year in a row, Avril 2002

Damodaran, A., The basics of risk, http://pages.stern.nyu.edu/~adamodar/ , 2001

Darlington, A., Grout, S., Whitworth, J., How safe is safe enough? An introduction to risk management, Presented to The Staple Inn Actuarial Society, June 2001

Demers, DL., Fournier, F, Lemire, M, Péladeau, P, Prémont, M-C et Roy, DJ, Le réseautage de l’information de santé : Manuel pour la gestion des questions éthiques et sociales, Montréal, Centre de bioéthique, IRCM, 2004

Denning, Dorothy E., Cyberterrorism, Global Dialogue, Autumn, Aout 2000

Denning, D,.Hacktivism: An Emerging Threat to Diplomacy, Foreign Service Journal, September 2000.

Dollot, Louis (1996), Culture individuelle et Culture de masse, Collection Que sais-je?, Presses universitaires de France, 6ièeme édition

Durkheim, Émile (2002), Les règles de la méthode sociologique, 11ième édition, Presses Universitaires de France, Paris

Edwards, K., Prospect Theory: A Literature Review, International Review of Financial Analysis, Vol. 5, No. 1, 1996, pages 19-38

Einbinder,J.S., Scully, K.W.,Pates, R.D.,Schubart, J.R., Reynolds, R.E., Case Study: A Data Warehouse for an Academic Medical Center, JOURNAL OF HEALTHCARE INFORMATION MANAGEMENT, vol. 15, no. 2, Summer 2001, pages 165-175

Finch, T., May, C., Mair, F., Mort, M., Gask, L., Integrating service development with evaluation in telehealthcare: an ethnographic study, British Medical Journal, Vol 327, No 22, November 2003, www. bmj.com

Freeman, P, Robbins, A. The U.S. health data privacy debate: Will there be comprehension before closure?, International Journal of Technology Assessment in Health Care, 1999, pages 316-331.

Forristal, J, “Vulnerability Assessment Scanners” Janvier 2001,

http://www.networkcomputing.com/1201/1201f1b1.html

Fulford, Heather, Doherty, Neil F., The application of information security policies in large UK-based organizations: an exploratory investigation, Information Management & Computer Security, 2003, pages 106-114

Gendarmerie Royale du Canada, Guide d’évaluation de la menace et des risques pour les technologies de l’information, Novembre 1994

Glaessner, T., Kellermann, T., McNevin, V., Electronic Security: Risk Mitigation In Financial Transactions, Public Policy Issues, The World Bank, June 2002

Godbout, L’Honorable Juge Bernard, j.c.s., jugement de la cause Wellman c. Québec (Ministère de la Sécurité du revenu-secrétariat) Cour Supérieure, Québec, District de Chicoutimi, N°:150-05-000416-950, 19 juillet 2002

Gordon, Laurence A. et Loeb, Martin, The economics of Information security investment, ACM Transactions on information and system security, vol 5, no 4, Novembre 2002, pages 438-457

Guldenmund, F.W., The nature of safety culture: a review of theory and research. Safety Science, 2000. 34: p. 215 – 257

Haimes, Yacov Y., The Role of the Society for Risk Analysis in the Emerging Threats to Critical Infrastructures , Risk Analysis, Blackwell Science, UK, April 1999, Volume 19, Issue 2, pages 153-157

Hammersley, M. and P. Atkinson, Ethnography, principles in practice. 1983, London ; New York: Tavistock. x, 273

Hancock, Bill, COMMON SENSE GUIDE FOR SENIOR MANAGERS, Top Ten Recommended Information Security Practices, 1st Edition, July 2002

Harkness, J., Lederer, S.E., Wikler, D., Laying ethical foundations for clinical research, Bulletin of the World Health Organization, 2001

Hatcher, M., Decision-Making With and Without Information Technology in Acute Care Hospitals: Survey in the United States, Journal of Medical Systems, Vol. 22, No. 6, 1998

Helvey, T., Mack, R., Avula, S., Flook, P., Data security in Life Sciences research, Drug Discovery Today: BIOSILICO, Vol. 2, No. 3, May 2004

Hillson, Dr David, RISK MANAGEMENT FOR THE NEW MILLENNIUM, http://www.risk-doctor.com/ ,1999

Hillson, D., What is risk? Towards a common definition, http://www.risk-doctor.com/pdf-files/def0402.pdf , Inform, Journal of the UK Institute of Risk Management, April, 2002, pages 11-12

HIMMS, The Eleventh Annual HIMSS Leadership Survey, http://www.himss.org/survey/2000/survey2000.html , 2000

HM Treasury (UK), MANAGEMENT OF RISK, A STRATEGIC OVERVIEW, WITH SUPPLEMENTARY GUIDANCE FOR SMALLER BODIES, January 2001

Hult, M., Towards A Definition of Action Research: A Note and Bibliography, Journal of Management Studies, 1980, pages 241-250.

Hughes, C.C. (1992), Ethnography: What’s in a word – Process? Product? Promise?, Qualitative Health Research, 2(4), pp 439-450

Humpreys, BL.,Electronic Health Record Meets Digital Library A New Environment for Achieving an Old Goal, J Am Med Inform Assoc, 2000, Sep; 7(5), pages 444-452

Infoway, Canada Health Infoway. EHRS Blueprint, an interoperable EHR Framework. V1.0, July 2003

International Standards Organisation (ISO), ISO/DTR 20514, Health informatics — Electronic health record — Definition, scope, and context, 2004

International Standards Organisation (ISO), JTC1-SC27, A Comparison of Terminology: ISO Guide 73 (Draft November 2001), PDTR 13335-1 (for terms used in all parts of TR 13335), Draft 17799 (N 3184) and compared to IS 17799:2000, and SC 27 SD 6 (2002-03-31), 2002

International Standards Organisation (ISO), ISO/EIC TR 13335-1, Information technology – Guidelines for the management of IT Security, Part 1: Concepts and models for IT security, 1996

Janczewski, Lech, and Shi, Frank Xinli, Development of Information Security Baselines for Healthcare Information Systems in New Zealand, Computers & Security, Volume 21, Issue 2, 31 March 2002, pages 172-192

Johansson, Jesper M., 2.1 Code Red worm exploits idq.dll buffer overflow, SANS Windows Security Digest, vol. 4 No. 7 – Juillet 2001

Jordan, Tim, A sociology of hackers, the sosiological review, 1998, pages 757-780

Kachur, R. J., The Data Warehouse Management Handbook, Upper Saddle River, N.J., Prentice Hall, 2000

Kahneman, D., Tversky, A., Prospective theory: An analysis of decision under risk, Econometrica, 1979, pages 263–291

Kalla, M. et als, Achieving non-repudiation of web based transactions, The journal of systems and software, 1999

Kane, Beverly Guidelines for the Clinical Use of Electronic Mail with Patients, Journal of the American Medical Informatics Association, Volume 5, Number 1, Jan / Feb 1998, pages 104-111

Keil, Mark, Wallace, Linda, Turk, Dan, Dixon-Randall, Gayle, Nulden, Urban, An investigation of risk perception and risk propensity on the decision to continue a software development project, The Journal of Systems and Software, 2000, pages 145-157

Kerkri, E. M. Quantin, C., Allaert F.A., Cottin, Y., Charve, P.H., Jouanot, F., Yétongnon, K., An Approach for Integrating Heterogeneous Information Sources in a Medical Data Warehouse, Journal of Medical Systems, Vol. 25, No. 3, 2001

Kim 2003…

Kremer, S. et als, An tensive survey of non-repudiation protocols, Computer Communications, no 25,2002, pages 1606-1621

Kroeber,A.L. (1963), An antropologist looks at history, University of California Press, Berkley, USA

Lagadec, Patrick, Risques, Crises et Gouvernance: ruptures d’horizons, ruptures de paradigmes, Réalités Industrielles, Annales des Mines, numéro spécial: “Sciences et génie des activités à risques”, Mai 2003, pages 5-11

Laibson, D., Zeckhauser, R., Amos Tversky and the Ascent of Behavioral Economics, Journal of Risk and Uncertainty, 1998, pages 7–47

Landwehr, Carl E., Formal models for computer security, ACM Computing serveys, vol 13, no 3, Septembre 1981pages.247-278

Ledbetter, Craig S., Morgan, Matthew W., Toward Best Practice: Leveraging the Electronic Patient Record as a Clinical Data Warehouse, JOURNAL OF HEALTHCARE INFORMATION MANAGEMENT, vol. 15, no. 2, summer 2001

Léger, Marc-André, Un processus d’analyse des vulnérabilités technologiques comme mesure de protection contre les cyber-attaques, Rapport d’activité de synthèse, Maîtrise en Informatique de Gestion, UQAM, Juin 2003, 110 pages

Léger, Marc-André, Méthodologie IVRI de gestion du risque en matière de sécurité de l’information, Éditions Fortier Communications, Montréal, Septembre 2003

Leininger, M. (ed) (1985), Qualitative research methods in nursing, 10(1), pp 3-5

Leininger, M. (1991), The theory of culture care and diversity, New York, National Leage for nursing press

Leninger, M. (1995), Transcultural Nursing: Concept, theory, research and practice, McGraww-Hill College series

Lloyd, Andrew J, Threats to the estimation of benefit: are preference elicitation methods accurate?, Health Economics, 2003, pages 393–402

Loper, Dr. D. Kall, Profiling Hackers: Beyond Psychology, Presented at the Annual Meeting of the American Society of Criminology, San Francisco, California, USA, November 15, 2000

Maguire, Stuart (2002), Identifying risks during information system development: managing the process, Journal of Information Management & Computer Security, Volume 10 Number 3, pages 126-p134

Malinowski, B. (1948), The dynamics of culture change : an inquiry into race relations in Africa, New Haven : Yale University Press, USA, (édition de 1961)

Marsh, Andy, The Creation of a global telemedical information society, International Journal of Medical Informatics, 1998, pages 173–193

Massé, R., Culture et santé publique. 1995: Éditions Guérin

Martin, Robert A. , Managing Vulnerabilities in Networked Systems, IEEE computer, p 32-38, Novembre 2001

Mauss, Marcel (2002), Manuel d’ethnographie, Petite bibliothèque Payot, Paris, France, 1ière édition 1967.

Miller, Gerald C., Ph.D., Data warehousing and information management strategies in the clinical immunology laboratory, Clinical and Applied Immunology Reviews, 2002

Misslin, René, The defense system of fear: behavior and neurocircuitry, Neurophysiologie clinique 33, 2003, pages 55–66

MSSS, Ministère de la Santé du Québec, Le réseau RTSS C’est, site internet du MSSS, http://www.msss.gouv.qc.ca/rtss/, 2003

MSSS, Ministère de la Santé du Québec, Le réseau de télécommunication sociosanitaire en bref, document interne du TCR, 2002

Moore, David et als, CAIDA, the Cooperative Association for Internet Data Analysis,The Spread of the Sapphire/Slammer Worm, février 2003, http://www.caida.org/outreach/papers/2003/sapphire/sapphire.html

Moore, David, Code-Red: a case study on the spread and victims of an Internet worm, Presented at the Internet Measurement Workshop (IMW), Cooperative Association for Internet Data Analysis – CAIDA, San Diego Supercomputer Center, University of California, San Diego, 2002

Myerson, Judith, Risk Management, INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 1999, pages 305-308

Neumann, Peter G., Risks to the Public in Computers and Related Systems, ACM SIGSOFT Software Engineering Notes, vol 26 no 1, January 2001, Pages 14-38

NIST, ICAT Metabase, Vulnerability Statistics, http://icat.nist.gov/icat.cfm?function=statistics, avril 2002

Novosyolov, A., Risk Theory: Basic Concepts of Risk Theory, Lecture for math department students, Institute of Computational Modeling, Academgorodok, Krasnoyarsk, Russia, January 2002

Nuremberg code, Directives for Human Experimentation, 1947

Pace, Wilson D, Database Design to Ensure Anonymous Study of Medical Errors: A Report from the ASIPS Collaborative, Journal of the American Medical Informatics Association, Volume 10, Number 6, Nov / Dec 2003, pages 531-540

Parker, Marilyn (2001), Nursing Theories and Nursing Practice, F.A. Davis.

Pidgeon, N., Safety culture: key theoretical issues. Work & Stress, 1998. 12(3): p. 202 – 216

Puhr, Claus, OPIS – A web enabled clinical data warehouse prototype, presentation, University of Vienna, 2003

Pedersen, T.B., Jensen, C.S., Research issues in clinical data warehousing, Proceedings of SSDBM’98, July 1-3 1998 in Capri, Italy

Poulsen, Kevin, Terrorism Talks, Open RSA Conference, http://online.securityfocus.com/news/336 , Février 2002

RAAB, Charles D., The future of privacy protection, Cyber Trust & Crime Prevention Project, 2004

Rector, A.L., Nowlan, W.A. , Kay, S., Foundations for an electronicmedical record, Methods of Information in Medicine, 1991, pages 179–186

Richter, A., Koch, C., Integration, differentiation and ambiguity in safety cultures, Safety Science, vol 42, 2004, pages 703–722

Safran, Charles, Goldberg, Howard, Electronic patient records and the impact of the Internet, International Journal of Medical Informatics, 2000, pages 77–83

SANS Institute, The Twenty Most Critical Internet Security Vulnerabilities, The Experts’ Consensus, May 2002, http://www.sans.org/top20.htm

Senate (Canada), The Standing Senate Committee on Social Affairs, Science and Technology, The Health of Canadians – The Federal Role, Interim Report, Volume Five: Principles and Recommendations for Reform – Part I, Governement of Canada, 2002

Schloeffel, P., Electronic Health Record Definition, Scope and Context: ISO/TC 215 Discussion Paper, October 2002, available at https://committees.standards.com.au/COMMITTEES/IT-014-09-02/N0004/IT-014-09-02-N0004.DOC

Scott-Morton M., The Corporation of the 1990s: Information Technology an Organisational Transformation, Oxford University Press, 1991

Shortreed, J., Hicks, J., Craig, L., Basic Frameworks for Risk Management, Final Report, Prepared for The Ontario Ministry of the Environment, Network for Environmental Risk Assessment and Management, March 28, 2003

Schubart, Jane R., Einbinder, Jonathan S, Evaluation of a data warehouse in an academic health sciences center, International Journal of Medical Informatics, 2000, pages 319–333

Schumacher, H. J., Ghosh, S., A fundamental framework for network security, Journal of Network and Computer Applications, 1997, pages 305–322

Smith, Alan D, Rupp William T (2002), Issues in cybersecurity; understanding the potential risks associated with hackers/crackers, Journal of Information Management & Computer Security, Volume 10 Number 4, Pages 178-183

Smith, E. Eloff, J.H.P., Security in health-care information systems – current trends, International journal of medical informatics, no 54, 1999, pages 33-54

Snee, N.L., The Case for Integrating Public Health Informatics Networks, An Overview of the Elements Required for an Integrated Enterprise Information Infrastructure for Protecting Public Health, IEEE Engineering in Medicine and Biology Magazine, January/February 2004

Stoneburner, Gary, Goguen, Alice, Feringa, Alexis, NIST Special Publication 800-30 Risk Management Guide for Information Technology Systems, Recommendations of the National Institute of Standards and Technology, July 2002

Sujansky, Walter, Heterogeneous Database Integration in Biomedicine, Journal of Biomedical Informatics, 2001, pages 285–298

Summers, K.H., Measuring and Monitoring Outcomes of Disease Management Programs, Clinical Therapeutics, volume 18, NO. 6, 1996

Sweltz ,Ken, Network Vulnerability Assessment Strategy for Small State and Local Government Agencies, SANS Institute, GIAC practical repository, 2003

Takeda, H., Matsumura, Y., Kuwata, S., Nakano, H., Sakamoto, N., Yamamoto, R., Architecture for networked electronic patient record systems, International Journal of Medical Informatics, 2000, pages 161–167

Thompson, Paul B., Privacy, secrecy and security, Ethics and Information Technology, 2001, pages 13–19

Thorne, (1992)

Tong, C.K.S., Implementation of ISO17799 and BS7799 in picture archiving and communication system: local experience in implementation of BS7799 standard, Elsevier Science B.V International Congress Series 1256, 2003,  pages 311–318

Toyoda, Ken, Standardization and security for the EMR, International Journal of Medical Informatics, 1998, pages 57–60

Tregear, Jonathan, Risk Assessment Information Security Technical Report , Volume 6, numéro 3, septembre 2001, pages 19-27

Vissandjée, B. (2001), Les conséquences de la diversité culturelle,  revue Le Réseau, Printemps 2001, Volume 4, Numéro 2

Wagner, I., Ethical issues of healtcare in the information society, Opinion of the European group on ethics in science and new technologies to the european comission, No 13, July 1999

Watkins, Michael D., Bazerman, Max H., Predictable Surprises: The Disasters You Should Have Seen Coming, Harvard Business review Online, 2003

Winter

Wismiewski, M.F., A Clinical Data Warehouse for Infection Control, Journal of the American Medical Informatics Association Volume 10 Number 5 Sep / Oct 2003

WORLD MEDICAL ASSOCIATION, DECLARATION OF HELSINKI, Ethical Principles for Medical Research Involving Human Subjects, Helsinki, Finland, June 1964

Yoshihara, H., Development of the electronic health record in Japan, Int. J. Med. Inf., 1998, pages 53–58

Zhou, Lidong, Haas Zygmunt J., Securing Ad Hoc Networks, IEEE Network, 1999

Zviran, M., Armoni, A., Glezer, C., HIS/BUI: A Conceptual Model for Bottom-Up Integration of Hospital Information Systems, Journal of Medical Systems, Vol. 22, No. 3, 1998, Pages 147-159