JMIR Publications

Select Journals for Content Updates

When finished, please click submit.

Citing this Article

Right click to copy or hit: ctrl+c (cmd+c on mac)

Published on 11.02.11 in Vol 13, No 1 (2011): Jan-Mar

This paper is in the following e-collection/theme issue:

Works citing "How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?"

According to Crossref, the following articles are citing this article (DOI 10.2196/jmir.1335):

(note that this is only a small subset of citations)

  1. Pietro C, Silvia S, Giuseppe R. The Pursuit of Happiness Measurement: A Psychometric Model Based on Psychophysiological Correlates. The Scientific World Journal 2014;2014:1
  2. Gal TS, Tucker TC, Gangopadhyay A, Chen Z. A data recipient centered de-identification method to retain statistical attributes. Journal of Biomedical Informatics 2014;50:32
  3. Brumen B, Heričko M, Sevčnikar A, Završnik J, Hölbl M. Outsourcing Medical Data Analyses: Can Technology Overcome Legal, Privacy, and Confidentiality Issues?. Journal of Medical Internet Research 2013;15(12):e283
  4. Brumen B, Heričko M, Rozman I, Hölbl M. Security Analysis and Improvements to the PsychoPass Method. Journal of Medical Internet Research 2013;15(8):e161
  5. Cipresso P, Paglia FL, Cascia CL, Riva G, Albani G, La Barbera D. Break in volition: a virtual reality study in patients with obsessive-compulsive disorder. Experimental Brain Research 2013;229(3):443
  6. Cipresso P, Gaggioli A, Serino S, Cipresso S, Riva G. How to Create Memorizable and Strong Passwords. Journal of Medical Internet Research 2012;14(1):e10
  7. Beran T, Stanton L, Hetherington R, Mishna F, Shariff S. Development of the Bullying and Health Experiences Scale. Interactive Journal of Medical Research 2012;1(2):e13
  8. Zaidan B, Zaidan A, Mat Kiah M. Impact of Data Privacy and Confidentiality on Developing Telemedicine Applications: A Review Participates Opinion and Expert Concerns. International Journal of Pharmacology 2011;7(3):382

According to Crossref, the following books are citing this article (DOI 10.2196/jmir.1335)

  1. Moodley E, Huo G, Hsieh M, Cai S, Yan W. Managing Trust in Cyberspace. 2013. :449