Traceability of patient records usage: barriers and
opportunities for improving user interface design and
data management. Studies in Health Technologies and
Informatics, vol. 169, pp. 275-279.
Cruz-Correia, R., Vieira-Marques, P., Costa, P., Ferreira,
A., Oliveira-Palhares, E., Araújo, F., Costa-Pereira,
A., 2005. Integration of Hospital data using Agent
Technologies – a case study. AICommunications
special issue of ECAI, 18(3):191-200.
Cruz-Correia, R., Vieira-Marques, P., Ferreira, A.,
Almeida, F., Wyatt, J., Costa-Pereira, A., 2007.
Reviewing the integration of patient data: how systems
are evolving in practice to meet patient needs. BMC
Medical Informatics and Decision Making, 7(14).
Farinha, P., Cruz-Correia, R., Antunes, L., Almeida, F.,
Ferreira, A., 2010. From legislation to practice: a case
study of break the glass in healthcare. Proceedings of
the International Conference on Health Informatics,
114-120.
Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, R.,
Chandramouli, R., 2001. Proposed NIST Standard for
Role-based Access Control. ACM Transactions on
Information and systems security, 4(3): 224-274.
Ferreira, A., Antunes, L., Chadwick, D., Cruz-Correia, R.,
2010. Grounding Information Security in Healthcare.
International Journal of Medical Informatics, 79(4):
268-283.
Ferreira, A., Correia-Cruz, R., Antunes, L., 2011a.
Usability of authentication and access control: a case
study in healthcare. IEEE International Carnahan
Conference on Security Technology, 1-7.
Ferreira, A., Cruz-Correia, R., Chadwick, D., Santos, H.,
Gomes, R., Reis, D., Antunes, L., 2011b. Password
sharing and how to reduce it. Certification and
Security in Health-Related Web Applications:
Concepts and Solutions, 243-263.
Ferreira, A., Cruz-Correia, R., Antunes, L., Farinha, P.,
Oliveira-Palhares, E., Chadwick, D. W., Costa-Pereira,
A., 2006. How to break access control in a controlled
manner? Proceedings of the 19th IEEE Symposium on
Computer-Based Medical Systems, 847-851.
Harris, S., 2012. CISSP All-in-one Exam Guide. McGraw-
Hill Osborne Media. 6
th
Edition.
Iglesias, J., Angelov, P., Ledezma, A., Sanchis, A., 2012.
Creating evolving user behavior profiles
automatically. IEEE Trasactions on Knowledge and
data engineering, 24(5): 854-867.
Kainda, R., Flechais, I., Roscoe, A.W., 2010. Security and
usability: analysis and evaluation. International
conference on Availability, Reliability and Security,
275 – 282.
Kuo, C., Romanosky, S., Cranor, L., 2006. Human
Selection of Mnemonic Phrase-Based Passwords.
Symposium on usable privacy and security (SOUPS),
67-78.
Lehoux, P., Sicotte, C., Denis, J., 1999. Assessment of a
computerized medical record system: disclosing
scripts of use. Evaluation and Program Planning, 22(
4): 439-53.
NHS care records service, 2012. NHS Connecting for
Health. Sealing Overview. Accessed at:
http://www.connectingforhealth.nhs.uk/elearning/scr/s
cr2008b/modules/scr07_sealing/t1/scr07t1p1.htm.
Accessed on the 13th December 2012.
Palanque, P., Barboni, E., Martinie, C., Navare, D.,
Winckler, M., 2011. Proceedings of the 3rd ACM
SIGCHI symposium on Engineering interactive
computing systems, 21-30.
Redish, J., Dumas, J., 1999. A Practical Guide to Usability
Testing. Intellect Ltd.
Saltzer, J., Schroeder, M., 1975. The protection of
Information in Computer Systems. Proceedings of the
IEEE, 63(9): 1278-1308.
Santos-Pereira, Cátia., Augusto, Alexandre., Correia,
Manuel., Ferreira, Ana., Cruz-Correia, Ricardo., 2012.
A Mobile Based Authorization Mechanism for Patient
Managed Role Based Access Control. Information
Technology in Bio and Medical Informatics. Lecture
Notes in Computer Science, 7451: 54-68.
Sasse A., 2003. Computer Security: Anatomy of a
Usability Disaster and a Plan for Recovery.
Proceedings of CHI2003 Workshop on Human-
Computer Interaction and Security Systems.
Schneier, B., 2000. Secrets and Lies: digital security in a
networked world. 1st ed.: John Wiley &Sons
Shun-Hua, T., Miao, C., Guo-Hai, Y., 2010. User behavior
mining on large scale web log data. International
Conference on Apperceiving Computing and
Intelligence Analysis, 60-63.
Whitten, A., Tygar, J., 1999. Why Johnny can’t encrypt: a
usability evaluation of PGP 5.0. Proceedings of 8th
USENIX Security Symposium, 169-183.
Xhafa, F., Ruiz, J., Caballe, S., Spaho, E., Barolli, L.,
Miho, R., 2012. Massive Processing of Activity Logs
of a Virtual Campus. Third International Conference
on Emerging Intelligent Data and Web Technologies,
104-110.
ZIshuang, Ye., Smith, S., 2005. Trusted Paths for
Browsers. ACM transactions in information systems
security, 8(2): 153-186.
LogAnalysisofHumanComputerInteractionsRegardingBreakTheGlassAccessestoGeneticReports
53