최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국IT서비스학회지 = Journal of Information Technology Services, v.21 no.4, 2022년, pp.63 - 74
이경환 (서울과학기술대 IT정책전문대학원) , 장성용 (서울과학기술대 IT정책전문대학원)
Globally researchers at medical institutions are actively sharing COHORT data of patients to develop vaccines and treatments to overcome the COVID-19 crisis. OMOP-CDM, a common data model that efficiently shares medical data research independently operated by individual medical institutions has pati...
김강한, "가명화 개인건강정보 보호 관련 기본권보장에 관한 연구", 세계헌법연구, 제27권, 제2호, 2021, 27-73.
윤현아, "공통 데이터 모델을 이용한 성인 조현병 환자의 항정신병 약물 처방 패턴 분석", 한국보건사회 약료경영학회지, 제9권, 제2호, 2021, 111-120.
DISA, "PostgreSQL 9.X Security Technical Implementation Guide (STIG) Overview Version 2, Release 2", 2022, Available at: https://www.stigviewer.com/stig/postgresql_9.x/.
DoD CIO, "Department of Defense Net-Centric Data Strategy", 2007, Available at: https://dodcio.defense.gov/Portals/0/documents/DoD_NetCentricServicesStrategy.pdf.
Hammond, K. W., Efthimiadis, E. N., and Laundry, R. J., "Efficient De-identification of Electronic Patient Records for User Cognitive Testing", IEEE, 2012, Available at: https://ieeexplore.ieee.org/document/6149163.
ISO, "ISO/IEC 27001:2013 Information technology - Security techniques - Information security management systems - Requirements", 2013, Available at: https://www.iso.org/standard/54534.html.
Kaddoura, S. and Haraty, R. A., "A Parallelized Database Damage Assessment Approach after Cyberattack for Healthcare Systems", 2021, Available at: https://www.researchgate.net/publication/350540292_A_Parallelized_Database_Damage_Assessment_Approach_after_Cyberattack_for_Healthcare_Systems.
Kan, M., "A ransomware attack is spreading worldwide, using alleged NSA exploit: UK's National Health Service was among the organizations hit by the Wanna Decryptor ransomware on Friday", 2017, Available at: https://www.computerworld.com/article/3196378/a-ransomware-attack-is-spreading-worldwide-using-alleged-nsa-exploit.html.
NIST, "Framework for Improving Critical Infrastructure Cybersecurity Version 1.1", 2018, Available at: https://nvlpubs.nist.gov/nistpubs/cswp/nist.cswp.04162018.pdf.
NIST, "SP 800-53r4 Security and Privacy Controls for Federal Information Systems and Organizations", 2014, Available at: https://csrc.nist.gov/publications/detail/sp/800-53/rev-4/archive/2015-01-22.
NIST, "SP 800-60r1 Guide for Mapping Types of Information and Information Systems to Security Categories", 2004, Available at: https://csrc.nist.gov/publications/detail/sp/800-60/vol-1-rev-1/final.
OHDSI, "The Book of OHDSI", 2021, Available at: https://ohdsi.github.io/TheBookOfOhdsi/.
Wilson, R. "Emerging ransomeware threats: An anticipatory ethical anaylsis", 2021, Available at: https://ieeexplore.ieee.org/document/9629211.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.