This paper is in the following e-collection/theme issue:

Ethics, Privacy, and Legal Issues 

Advertisement: Preregister now for the Medicine 2.0 Congress

Works citing "How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?"

Khaled El Emam, Katherine Moreau, Elizabeth Jonker
J Med Internet Res 2011 (Feb 11); 13(1):e18 

According to Crossref, the following articles are citing this article (DOI 10.2196/jmir.1335):

(note that this is only a small subset of citations)

1. Pietro C, Silvia S, Giuseppe R. The Pursuit of Happiness Measurement: A Psychometric Model Based on Psychophysiological Correlates. The Scientific World Journal 2014;2014:1 [CrossRef]
2. Gal TS, Tucker TC, Gangopadhyay A, Chen Z. A data recipient centered de-identification method to retain statistical attributes. Journal of Biomedical Informatics 2014;50:32 [CrossRef]
3. Brumen B, Heričko M, Sevčnikar A, Završnik J, Hölbl M. Outsourcing Medical Data Analyses: Can Technology Overcome Legal, Privacy, and Confidentiality Issues?. Journal of Medical Internet Research 2013;15(12):e283 [CrossRef]
4. Brumen B, Heričko M, Rozman I, Hölbl M. Security Analysis and Improvements to the PsychoPass Method. Journal of Medical Internet Research 2013;15(8):e161 [CrossRef]
5. Cipresso P, Paglia FL, Cascia CL, Riva G, Albani G, La Barbera D. Break in volition: a virtual reality study in patients with obsessive-compulsive disorder. Experimental Brain Research 2013;229(3):443 [CrossRef]
6. Cipresso P, Gaggioli A, Serino S, Cipresso S, Riva G. How to Create Memorizable and Strong Passwords. Journal of Medical Internet Research 2012;14(1):e10 [CrossRef]
7. Beran T, Stanton L, Hetherington R, Mishna F, Shariff S. Development of the Bullying and Health Experiences Scale. Interactive Journal of Medical Research 2012;1(2):e13 [CrossRef]
8. Zaidan B, Zaidan A, Mat Kiah M. Impact of Data Privacy and Confidentiality on Developing Telemedicine Applications: A Review Participates Opinion and Expert Concerns. International Journal of Pharmacology 2011;7(3):382 [CrossRef]

According to Crossref, the following books are citing this article (DOI 10.2196/jmir.1335):

1. Moodley E, Huo G, Hsieh M, Cai S, Yan W. Managing Trust in Cyberspace. 2013. :449 [CrossRef]