2. Liu, L.S., Shih, P. C., Hayes, G. R.: Barriers to the adoption and use of personal health record
systems. In: Proceedings of the 2011 iConference. iConference ’11, New York, NY, USA,
ACM (2011) 363–370
3. Kaelber, D. C., Jha, A. K., Johnston, D., Middleton, B., Bates, D. W.: A research agenda for
personal health records (phrs). J Am Med Inform Assoc 15 (2008) 729–736
4. Mellado, D., Fern´andez-Medina, E., Piattini, M.: Security requirements engineering frame-
work for software product lines. Information & Software Technology 52 (2010) 1094–1117
5. Liberati, A., Altman, D. G., Tetzlaff, J., Mulrow, C., G¸tzsche, P. C., Ioannidis, J. P., Clarke,
M., Devereaux, P., Kleijnen, J., Moher, D.: The PRISMA statement for reporting systematic
reviews and meta-analyses of studies that evaluate health care interventions: explanation and
elaboration. Journal of Clinical Epidemiology 62 (2009) e1–e34
6. Hulse, N. C., Wood, G. M., Haug, P.J., Williams, M. S.: Deriving consumer-facing disease
concepts for family health histories using multi-source sampling. J Biomed Inform 43 (2010)
716–724
7. Yee, G., Korba, L.: Personal Privacy Policies. Computer and Information Security Hand-
book. (2009)
8. ISO: Norma ISO/CEN 13606. Available from: www.aenor.es (2010)
9. Westin, A.: Privacy and Freedom. Atheneum, Ed. NY (1967)
10. Landis, J. R., Koch, G. G.: The measurement of observer agreement for categorical data.
Biometrics 33 (1977) 159–174
11. Greenhalgh, T., Hinder, S., Stramer, K., Bratan, T., Russell, J.: Adoption, non-adoption, and
abandonment of a personal electronic health record: case study of healthspace. BMJ 341
(2010) c5814
12. UK industria & academia: EnCoRe. Ensuring Consent and Revocation. http://www.encore-
project.info/index.html (2010)
13. Lesemann, D.: Once more unto the breach: An analysis of legal, technological and policy is-
sues involving data breach notification statutes. Akron Intellectual Property Journal 4 (2010)
203
14. Brigade, T.: The new threat: Attackers that target healthcare (and what you
can do about it). Technical report, http://www.infosecwriters.com/text resources/pdf/
New Threat Brigade.pdf (2006)
15. Greenhalgh, T., Stramer, K., Bratan, T., Byrne, E., Russell, J., Hinder, S., Potts, H.: The
devil’s in the detail: Final report of the independent evaluation of the summary care record
and healthspace programmes. Technical report, University College London (2010)
16. Huynh, T., Miller, J.: An empirical investigation into open source web applications’ imple-
mentation vulnerabilities. Empirical Software Engineering 15 (2010) 556–576
17. NIST Vulnerabilities Database: CWE - Common Weakness Enumeration.
http://nvd.nist.gov/cwe.cfm. archived at: http://www.webcitation.org/60iaz4jzw (2011)
18. Park, M. A.: Embedding security into visual programming courses. In: Proceedings of
the 2011 Information Security Curriculum Development Conference. InfoSecCD ’11, New
York, NY, USA, ACM (2011) 84–93
19. Fernandez-Medina, E., Piattini, M.: Designing secure databases. Information & Software
Technology 47 (2005) 463–477
20. Carri´on, I., Fern´andez Alem´an, J. L., Toval, A.: Personal Health Records: New Means to
Safely Handle our Health Data? Computer (2012)
21. Rebollo, O., Mellado, D., Fern´andez-Medina, E.: A Comparative Review of Cloud Security
Proposals. In: WOSIS. (2011) 3–12
68