These are the sources and citations used to research lit review. This bibliography was generated on Cite This For Me on

  • Journal

    Blanke, S. J. and McGrady, E.

    When it comes to securing patient health information from breaches, your best medicine is a dose of prevention: A cybersecurity risk assessment checklist

    2016 - Journal of Healthcare Risk Management

    In-text: (Blanke and McGrady, 2016)

    Your Bibliography: Blanke, S. and McGrady, E. (2016). When it comes to securing patient health information from breaches, your best medicine is a dose of prevention: A cybersecurity risk assessment checklist. Journal of Healthcare Risk Management, 36(1), pp.14-24.

  • Journal

    Cheng, L., Liu, F. and Yao, D. D.

    Enterprise data breach: causes, challenges, prevention, and future directions

    2017 - Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery

    In-text: (Cheng, Liu and Yao, 2017)

    Your Bibliography: Cheng, L., Liu, F. and Yao, D. (2017). Enterprise data breach: causes, challenges, prevention, and future directions. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 7(5), p.e1211.

  • Website

    HIV-positive status of 14,200 people leaked online

    2019

    In-text: (CNA, 2019)

    Your Bibliography: CNA. (2019). HIV-positive status of 14,200 people leaked online. [online] Available at: https://www.channelnewsasia.com/news/singapore/hiv-positive-records-leaked-online-singapore-mikhy-brochez-11175718 [Accessed 26 Apr. 2019].

  • Website

    The leaking of Singapore’s HIV registry records and the hunt for Mikhy Farrera Brochez: A timeline

    2019

    In-text: (CNA, 2019)

    Your Bibliography: CNA. (2019). The leaking of Singapore’s HIV registry records and the hunt for Mikhy Farrera Brochez: A timeline. [online] Available at: https://www.channelnewsasia.com/news/singapore/mikhy-farrera-brochez-hiv-registry-leak-timeline-ler-teck-siang-11180290 [Accessed 26 Apr. 2019].

  • Journal

    El Emam, K., Jonker, E., Arbuckle, L. and Malin, B.

    Correction: A Systematic Review of Re-Identification Attacks on Health Data

    2015 - PLOS ONE

    In-text: (El Emam et al., 2015)

    Your Bibliography: El Emam, K., Jonker, E., Arbuckle, L. and Malin, B. (2015). Correction: A Systematic Review of Re-Identification Attacks on Health Data. PLOS ONE, 10(4), p.e0126772.

  • Journal

    Elger, B. S., Handtke, V. and Wangmo, T.

    Paternalistic breaches of confidentiality in prison: mental health professionals’ attitudes and justifications

    2015 - Journal of Medical Ethics

    In-text: (Elger, Handtke and Wangmo, 2015)

    Your Bibliography: Elger, B., Handtke, V. and Wangmo, T. (2015). Paternalistic breaches of confidentiality in prison: mental health professionals’ attitudes and justifications. Journal of Medical Ethics, 41(6), pp.496-500.

  • Journal

    Fernández-Alemán, J. L., Señor, I. C., Lozoya, P. Á. O. and Toval, A.

    Security and privacy in electronic health records: A systematic literature review

    2013 - Journal of Biomedical Informatics

    In-text: (Fernández-Alemán et al., 2013)

    Your Bibliography: Fernández-Alemán, J., Señor, I., Lozoya, P. and Toval, A. (2013). Security and privacy in electronic health records: A systematic literature review. Journal of Biomedical Informatics, 46(3), pp.541-562.

  • Journal

    Gkoulalas-Divanis, A., Loukides, G. and Sun, J.

    Publishing data from electronic health records while preserving privacy: A survey of algorithms

    2014 - Journal of Biomedical Informatics

    In-text: (Gkoulalas-Divanis, Loukides and Sun, 2014)

    Your Bibliography: Gkoulalas-Divanis, A., Loukides, G. and Sun, J. (2014). Publishing data from electronic health records while preserving privacy: A survey of algorithms. Journal of Biomedical Informatics, 50, pp.4-19.

  • Journal

    Henriksen-Bulmer, J. and Jeary, S.

    Re-identification attacks—A systematic literature review

    2016 - International Journal of Information Management

    In-text: (Henriksen-Bulmer and Jeary, 2016)

    Your Bibliography: Henriksen-Bulmer, J. and Jeary, S. (2016). Re-identification attacks—A systematic literature review. International Journal of Information Management, 36(6), pp.1184-1192.

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Super fast and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use our extensive Premium features (Plagiarism checks, Word Add On...)
  • ✔ Create and edit multiple bibliographies
Join