RefCheck Maintenance Notice

On Monday, December 3, 2018, from 16:00-18:00 EST, RefCheck will be undergoing maintenance. RefCheck is the process where, during copyediting, all references are extracted from the manuscript file, parsed, matched against various databases (eg, PubMed and CrossRef), and automatically corrected. For more information on RefCheck, please visit our Knowledge Base.

Who will be affected?

Citing this Article

Right click to copy or hit: ctrl+c (cmd+c on mac)

Published on 11.02.11 in Vol 13, No 1 (2011): Jan-Mar

This paper is in the following e-collection/theme issue:

Works citing "How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?"

According to Crossref, the following articles are citing this article (DOI 10.2196/jmir.1335):

(note that this is only a small subset of citations)

  1. Cipresso P, Serino S, Gaggioli A, Albani G, Mauro A, Riva G. Psychometric modeling of the pervasive use of Facebook through psychophysiological measures: Stress or optimal experience?. Computers in Human Behavior 2015;49:576
    CrossRef
  2. Alanazi HO, Zaidan AA, Zaidan BB, Kiah MLM, Al-Bakri SH. Meeting the Security Requirements of Electronic Medical Records in the ERA of High-Speed Computing. Journal of Medical Systems 2015;39(1)
    CrossRef
  3. Pietro C, Silvia S, Giuseppe R. The Pursuit of Happiness Measurement: A Psychometric Model Based on Psychophysiological Correlates. The Scientific World Journal 2014;2014:1
    CrossRef
  4. Gal TS, Tucker TC, Gangopadhyay A, Chen Z. A data recipient centered de-identification method to retain statistical attributes. Journal of Biomedical Informatics 2014;50:32
    CrossRef
  5. Cipresso P, Albani G, Serino S, Pedroli E, Pallavicini F, Mauro A, Riva G. Virtual multiple errands test (VMET): a virtual reality-based tool to detect early executive functions deficit in Parkinson’s disease. Frontiers in Behavioral Neuroscience 2014;8
    CrossRef
  6. Brumen B, Heričko M, Sevčnikar A, Završnik J, Hölbl M. Outsourcing Medical Data Analyses: Can Technology Overcome Legal, Privacy, and Confidentiality Issues?. Journal of Medical Internet Research 2013;15(12):e283
    CrossRef
  7. Brumen B, Heričko M, Rozman I, Hölbl M. Security Analysis and Improvements to the PsychoPass Method. Journal of Medical Internet Research 2013;15(8):e161
    CrossRef
  8. Cipresso P, Paglia FL, Cascia CL, Riva G, Albani G, La Barbera D. Break in volition: a virtual reality study in patients with obsessive-compulsive disorder. Experimental Brain Research 2013;229(3):443
    CrossRef
  9. Cipresso P, Gaggioli A, Serino S, Cipresso S, Riva G. How to Create Memorizable and Strong Passwords. Journal of Medical Internet Research 2012;14(1):e10
    CrossRef
  10. Beran T, Stanton L, Hetherington R, Mishna F, Shariff S. Development of the Bullying and Health Experiences Scale. Interactive Journal of Medical Research 2012;1(2):e13
    CrossRef
  11. Zaidan B, Zaidan A, Mat Kiah M. Impact of Data Privacy and Confidentiality on Developing Telemedicine Applications: A Review Participates Opinion and Expert Concerns. International Journal of Pharmacology 2011;7(3):382
    CrossRef

According to Crossref, the following books are citing this article (DOI 10.2196/jmir.1335)

:
  1. Park S, Moon J. Healthcare Ethics and Training. 2017. chapter 54:1141
    CrossRef
  2. Park S, Moon J. Improving Health Management through Clinical Decision Support Systems. 2016. chapter 15:329
    CrossRef
  3. Moodley E, Huo G, Hsieh M, Cai S, Yan W. Managing Trust in Cyberspace. 2013. :449
    CrossRef