<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
    <front>
        <journal-meta>
            <journal-id journal-id-type="publisher-id">JMIR</journal-id>
            <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
            <journal-title>Journal of Medical Internet Research</journal-title>
            <issn pub-type="epub">1438-8871</issn>
            <publisher>
                <publisher-name>Gunther Eysenbach</publisher-name>
                <publisher-loc>Centre for Global eHealth Innovation, Toronto, Canada</publisher-loc>
            </publisher>
        </journal-meta>
        <article-meta>
            <article-id pub-id-type="publisher-id">v13i1e24</article-id>
            <article-id pub-id-type="pmid">21447469</article-id>
            <article-id pub-id-type="doi">10.2196/jmir.1521</article-id>
            <article-categories>
                <subj-group subj-group-type="article-type">
                    <subject>Viewpoint</subject>
                </subj-group>
            </article-categories>
            <title-group>
                <article-title>Open Source, Open Standards, and Health Care Information Systems</article-title>
            </title-group>
            <contrib-group>
                <contrib contrib-type="editor">
                    <name>
                        <surname>Eysenbach</surname>
                        <given-names>Gunther</given-names>
                    </name>
                </contrib>
            </contrib-group>
            <contrib-group>
                <contrib contrib-type="reviewer">
                    <name>
                        <surname>Valdes</surname>
                        <given-names>Ignacio</given-names>
                    </name>
                </contrib>
                <contrib contrib-type="reviewer">
                    <name>
                        <surname>Ernst</surname>
                        <given-names>Neil</given-names>
                    </name>
                </contrib>
                <contrib contrib-type="reviewer">
                    <name>
                        <surname>Oh</surname>
                        <given-names>Hans</given-names>
                    </name>
                </contrib>
                <contrib contrib-type="reviewer">
                    <name>
                        <surname>Zhang</surname>
                        <given-names>Yuanyi</given-names>
                    </name>
                </contrib>
            </contrib-group>
            <contrib-group>
                <contrib contrib-type="author" id="contrib1" corresp="yes">
                    <name name-style="western">
                        <surname>Reynolds</surname>
                        <given-names>Carl J</given-names>
                    </name>
                    <degrees>BSC(Hons) MB BS</degrees>
                    <xref ref-type="aff" rid="aff1">1</xref>
                    <address>
                        <institution>Centre for Health Informatics and Multiprofessional Education</institution>
                        <institution>UCL Medical School</institution>
                        <addr-line>Holborn Union Building</addr-line>
                        <addr-line>Archway Campus</addr-line>
                        <addr-line>London, N19 5LW</addr-line>
                        <country>United Kingdom</country>
                        <phone>44 07737904807</phone>
                        <fax>44 02072883322</fax>
                        <email>carl.reynolds@nhs.net</email>
                    </address>
                </contrib>
                <contrib contrib-type="author" id="contrib2" equal-contrib="yes">
                    <name name-style="western">
                        <surname>Wyatt</surname>
                        <given-names>Jeremy C</given-names>
                    </name>
                    <degrees>MB BS DM FRCP</degrees>
                    <xref ref-type="aff" rid="aff2">2</xref>
                </contrib>
            </contrib-group>
            <aff id="aff2" rid="aff2">
                <sup>2</sup>
                <institution>Institute for Digital Health care</institution>
                <institution>International Digital Laboratory</institution>
                <institution>Warwick University</institution>
                <addr-line>Coventry</addr-line>
                <country>United Kingdom</country>
            </aff>
            <aff id="aff1" rid="aff1">
                <sup>1</sup>
                <institution>Centre for Health Informatics and Multiprofessional Education</institution>
                <institution>UCL Medical School</institution>
                <addr-line>London</addr-line>
                <country>United Kingdom</country>
            </aff>
            <pub-date pub-type="collection">
                <season>Jan-Mar</season>
                <year>2011</year>
            </pub-date>
            <pub-date pub-type="epub">
                <day>17</day>
                <month>02</month>
                <year>2011</year>
            </pub-date>
            <volume>13</volume>
            <issue>1</issue>
            <elocation-id>e24</elocation-id>
            <!--history from ojs - api-xml-->
            <history>
                <date date-type="received">
                    <day>26</day>
                    <month>02</month>
                    <year>2010</year>
                </date>
                <date date-type="rev-request">
                    <day>27</day>
                    <month>05</month>
                    <year>2010</year>
                </date>
                <date date-type="rev-recd">
                    <day>29</day>
                    <month>11</month>
                    <year>2010</year>
                </date>
                <date date-type="accepted">
                    <day>08</day>
                    <month>12</month>
                    <year>2010</year>
                </date>
            </history>
            <!--(c) the authors - correct author names and publication date here if necessary. Date in form ', dd.mm.yyyy' after jmir.org-->
            <copyright-statement>&#169;Carl J Reynolds, Jeremy C Wyatt. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 17.02.2011. </copyright-statement>
            <copyright-year>2011</copyright-year>
            <license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/2.0/">
                <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on http://www.jmir.org/, as well as this copyright and license information must be included.</p>
            </license>
            <self-uri xlink:href="http://www.jmir.org/2011/1/e24/" xlink:type="simple" />
            <abstract>
                <p>Recognition of the improvements in patient safety, quality of patient care, and efficiency that health care information systems have the potential to bring has led to significant investment. Globally the sale of health care information systems now represents a multibillion dollar industry. As policy makers, health care professionals, and patients, we have a responsibility to maximize the return on this investment. To this end we analyze alternative licensing and software development models, as well as the role of standards. We describe how licensing affects development. We argue for the superiority of open source licensing to promote safer, more effective health care information systems. We claim that open source licensing in health care information systems is essential to rational procurement strategy.</p>
            </abstract>
            <kwd-group>
                <kwd>Health Care Information Systems</kwd>
            </kwd-group>
        </article-meta>
    </front>
    <body>
        <sec sec-type="introduction">
            <title>Introduction</title>
            <p>Doctors, patients, and policy makers are increasingly aware of the significant improvements in patient safety, quality of patient care, and efficiency that health care information systems (HIS) have the potential to bring [<xref ref-type="bibr" rid="ref1">1</xref>-<xref ref-type="bibr" rid="ref3">3</xref>]. This has led to significant investment in HIS. Investment has also been motivated by a desire to capitalize on the global market for HIS, estimated to be worth US $53.8 billion by 2014 [<xref ref-type="bibr" rid="ref4">4</xref>], by developing HIS for export. In the United Kingdom, contracts were negotiated in 2004 for a National Health Service (NHS) National Programme for Information Technology (NPfIT) with a budget of &#163;12.4 billion over 10 years. This makes it an information technology (IT) project unprecedented in terms of cost and scale [<xref ref-type="bibr" rid="ref5">5</xref>]. Furthermore, the current US administration has recently displayed the political will for wider adoption of HIS by committing US $19 billion to develop and encourage the implementation of HIS as part of the American Recovery and Reinvestment Act of 2009 [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref7">7</xref>].</p>
            <p>However, difficulties have been experienced in the United Kingdom delivering the NPfIT on time and within budget [<xref ref-type="bibr" rid="ref8">8</xref>]. Additionally, concern has been expressed that a lack of clinical engagement threatens the success of the project [<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref9">9</xref>-<xref ref-type="bibr" rid="ref12">12</xref>]. While some progress has been made with networks, hardware, and software, many promised benefits such as single-point data entry (&#8220;With IT, information can be captured once and used many times&#8221; &#8211; Downing Street 2002 NHS IT Briefing [<xref ref-type="bibr" rid="ref13">13</xref>]) are still eagerly awaited by practicing UK clinicians [<xref ref-type="bibr" rid="ref14">14</xref>]. In the United States, excepting the Veterans Administration (VA) hospitals&#8217; HIS, uptake of HIS has been poor [<xref ref-type="bibr" rid="ref7">7</xref>]. While it is too early to assess the results of the fiscal stimulus, concern has been expressed that the procurement process, standards, and certification will be biased in favor of software vendors who operate closed development models and sell their software with proprietary licenses. Furthermore, this may be to the detriment of rapid widespread adoption, and meaningful usage, of effective HIS [<xref ref-type="bibr" rid="ref15">15</xref>].</p>
            <p>We believe that open source software (OSS) licensed HIS provide a key opportunity for the promotion of effective systems by enhancing clinical engagement in software development, fostering innovation, improving system usability, and reducing costs, and should therefore be central to a rational HIS procurement strategy.</p>
        </sec>
        <sec>
            <title>Background</title>
            <sec>
                <title>Approaches to Software Development and Licensing: Proprietary Software and Open Source Software</title>
                <p>In terms of software development and licensing, there are broadly two kinds of software: (1) proprietary software, such as Microsoft Internet Explorer Web browser, and (2) OSS, such as Mozilla Firefox Web browser.</p>
                <p>The major difference between the two is the availability of the source code. This is the code computer programmers write, which is turned into the machine code computers execute (<xref ref-type="fig" rid="figure1">Figure 1</xref>).</p>
                <fig id="figure1" position="float">
                    <label>Figure 1</label>
                    <caption>
                        <p>The programmer writes source code, which is converted to the machine code that the computer runs</p>
                    </caption>
                    <!--Original graphic name: http://writer.zoho.com:80/image.do?imgurl=6d37aff7952c652b15981bdb67ae7d24753f78e991a900217e61b98366e8ce2e5593ce37f77dd368e74d24dbd2ceb75f-->
                    <graphic xlink:href="jmir_v13i1e24_fig1.jpg" alt-version="no" mimetype="image" position="float" xlink:type="simple" />
                </fig>
                <p>OSS is software where the end user can access and modify this source code, because of their rights under the licensing arrangement, to make new machine code and redistribute it. With proprietary software the source code is secret and the end user can access and execute only the machine code.</p>
                <p>In fact, the reality of OSS is more complex. We use OSS in this paper to refer to both Free/Libre, as in the sense of the French &#8220;libre&#8221;, software and open source software. This is also sometimes referred to as free and open source software. Whichever term is used, OSS refers to a large number of different software licenses that have certain requirements for source code openness in common [<xref ref-type="bibr" rid="ref16">16</xref>]. The Free Software Foundation and the Open Source Initiative act as arbiters of these licenses.</p>
                <p>Free software and OSS movements disagree on aspects of commercialism and licensing but agree on many fundamental principles such as the availability of the source code and the ability to modify and distribute it freely. Specifically, most free software licenses are less permissive. They forbid both contamination of source code with proprietary code, and later closure of source code previously released under an open license [<xref ref-type="bibr" rid="ref17">17</xref>].</p>
                <p>It is crucially important to realize that the quality of the software and source code is not inherently affected by the nature of the license. The application of a license to a piece of source code does not affect the code per se, but the type of license does affect the development of source code and has long-term implications for the purchaser.</p>
            </sec>
            <sec>
                <title>Open Standards Facilitate Competition Between Open Source Software and Proprietary Software</title>
                <p>Having defined open <italic>source</italic> it is expedient to examine open <italic>standards,</italic> since it is often suggested that they, and not open source, should be required by a purchaser in order to promote competition between proprietary software and OSS.</p>
                <p>Usage of the term <italic>open standard</italic> varies considerably. There is agreement upon what constitutes a standard, but disagreement on what is required for a standard to be considered open.</p>
                <p>Standards may be classified according to their openness. Cerri and Fuggetta [<xref ref-type="bibr" rid="ref18">18</xref>] give a useful system of classification, which we have adopted here. </p>
                <list list-type="order">
                    <list-item>
                        <p>Closed: the standard is owned by a company and is kept secret (eg, the Skype communication protocol).</p>
                    </list-item>
                    <list-item>
                        <p>Disclosed: the standard is owned by a company but is made available to other companies and users (eg, Adobe PDF format).</p>
                    </list-item>
                    <list-item>
                        <p>Concerted: there is a consultation on a new standard, but admission to the consultation process and management of the process is controlled by a company (eg, Sun Microsystems Java programming language).</p>
                    </list-item>
                    <list-item>
                        <p>Open concerted: there is an open participation in the process through which the standard is defined and managed (eg, World Wide Web Consortium [W3C] HTML).</p>
                    </list-item>
                    <list-item>
                        <p>Open de jure: the standards are owned and managed by official international or national standardization bodies (eg, the Digital Imaging and Communications in Medicine [DICOM] standard).</p>
                    </list-item>
                </list>
                <p>An open standard is developed through methods 4 or 5 and must fulfill all of the following requirements [<xref ref-type="bibr" rid="ref18">18</xref>]:</p>
                <list list-type="order">
                    <list-item>
                        <p>The standard specification document must be publicly available, either free of charge or at a nominal fee.</p>
                    </list-item>
                    <list-item>
                        <p>The standard must be owned and managed by an official standardization body or by an open group or consortium. It must not be owned or controlled by a single party, and no single party must have special rights to it.</p>
                    </list-item>
                    <list-item>
                        <p>The standard must be defined and managed according to an open process. Every interested party must be able to join the standardization process, which must be based on an open decision-making procedure (eg, consensus).</p>
                    </list-item>
                    <list-item>
                        <p>The standard must be free to implement for all interested parties, without any royalty fee. Any patented technologies included in the standard must be licensed with royalty-free nondiscriminatory terms.</p>
                    </list-item>
                    <list-item>
                        <p>It must be possible to extend and reuse the standard in other open standards.</p>
                    </list-item>
                </list>
                <p>Evolution of the computer industry has been driven by the emergence of standardized platforms that allow, and even encourage, modular substitution of complementary components such as software and hardware. Briefly, this evolution charts the shifts in business strategies of the Big Four: Apple Computer, IBM, Sun, and Microsoft. With time, vertically integrated proprietary platforms such as early IBM mainframes gave way to horizontally specialized strategies of personal computers and servers. More recently, the emergence of OSS has necessitated further refinement of business strategy. Three of the Big Four have developed hybrid OSS and proprietary platforms and now emphasize selling services and support rather than software alone [<xref ref-type="bibr" rid="ref19">19</xref>].</p>
                <p>Standards matter to businesses, who are keenly interested in establishing dominant standards where possible, ensuring that their products interoperate with the dominant standard where not, and in any case influencing and using standards for their own benefit. This is why compatibility issues are frequently encountered when one tries, for example, to open a Microsoft Word 2007 document on a computer not using a Microsoft operating system, or even a computer not using the same version of Microsoft Word.</p>
                <p>The aim of open standards is to have competing implementations of the same standard, rather than competing platforms, in order to benefit consumers. The rationale is that open standards lower entry barriers and encourage competing implementations of the same standard, which in turn tends to foster innovation and lower costs to the consumer. The consumer is empowered to change products without losing data or facing significant conversion costs, thereby preventing lock-in. Further, together with antitrust laws, open standards help to protect consumers from monopolies [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref19">19</xref>].</p>
            </sec>
            <sec>
                <title>Open Standards Need Open Source Software Implementations</title>
                <p>Proper development and maintenance of an open standard requires a balance between not allowing extension, which may prevent evolution of the standard and stifle innovation, and allowing proprietary extensions, which can lead to the subversion of a standard [<xref ref-type="bibr" rid="ref19">19</xref>].</p>
                <p>An open standard can also be subverted where adoption of proprietary standard is sufficiently widespread for it to become a de facto rival standard. For example, Internet Explorer has introduced an array of proprietary extensions to many of the standards, such as HTML (maintained by the main international standards organization for the World Wide Web, the W3C). Consequently, webpages that make use of these proprietary extensions appear broken even in standards-compliant Web browsers, introducing the need for a &#8220;quirks mode&#8221; in standards-compliant Web browsers to allow rendering of these noncompliant elements.</p>
                <p>A successful open standard achieves and maintains the aim of having competing implementations of the same standard, making the substitution of alternative components possible in reality, not just theory. This essential state of affairs is much more likely where an open source implementation exists, for the following reasons [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref21">21</xref>]: (1) an open source implementation acts as a reference implementation, revealing standard specifications that are unnecessarily hard to implement or contain specification flaws, and (2) OSS tends to enjoy wide diffusion and dissemination, facilitating adoption of the standard.</p>
                <p>Having an open source implementation of a standard therefore means both that the standard is more likely to be of high quality and that the standard is much more likely to become widely adopted. In fact, it has been observed that all successful open standards have OSS implementations [<xref ref-type="bibr" rid="ref20">20</xref>]. Therefore, when creating or choosing a sustainable open standard it is very unwise to create or choose a standard without at least one open source implementation.</p>
            </sec>
            <sec>
                <title>Contemporary Health Care Information Systems Procurement Strategies and Standards</title>
                <p>In the United Kingdom, the government chose to procure HIS centrally and implement them locally via five separate local service providers, who in turn were able to choose and change subcontractors [<xref ref-type="bibr" rid="ref5">5</xref>]. The software being developed for use under NPfIT is proprietary. The government created an output-based specification [<xref ref-type="bibr" rid="ref10">10</xref>], which was then tendered to interested contractors who employ programmers to write software that meet the specifications. Unfortunately, compared with OSS, this development model is often more expensive, less responsive to users, less secure, and more vulnerable to lock-in. In lock-in, a software purchaser loses the ability to switch software products because of the use of proprietary data formats or restrictive licensing conditions [<xref ref-type="bibr" rid="ref22">22</xref>-<xref ref-type="bibr" rid="ref24">24</xref>].</p>
                <p>The United States has already developed an excellent HIS, the VA VistA hospital system, which directly serves or forms a core part of the software serving almost 30 million Americans [<xref ref-type="bibr" rid="ref25">25</xref>]. Unfortunately, outside of the VA network of hospitals, uptake of HIS has been poor [<xref ref-type="bibr" rid="ref7">7</xref>], the use of proprietary software is commonplace, and there has been a paucity of high-quality, affordable, and interoperable HIS [<xref ref-type="bibr" rid="ref26">26</xref>]. Adoption of a VistA-derived OSS HIS platform and reference implementation allows competition to be based on service and support, reducing licensing costs while also providing an inclusive environment where creativity, innovation, and flexibility are not stifled by platform barriers [<xref ref-type="bibr" rid="ref16">16</xref>]. Perhaps unsurprisingly, some observers are already predicting OSS HIS adoption will soon become widespread [<xref ref-type="bibr" rid="ref27">27</xref>].</p>
                <p>There is a power asymmetry between vendors and purchasers of proprietary software comparable to that of vendors and purchasers of used cars, which is a so-called &#8220;lemon market.&#8221; In this comparison there are two main points. First, the typical purchaser of a used car is in a weak position because he or she lacks knowledge about the technical fitness of the product, is blind to everything but price, and has no way of identifying poor-quality used cars, the &#8220;lemons.&#8221; Second, ongoing maintenance costs depend on the car&#8217;s design. If the car is designed in such a way that a specialist garage is required and generic replacement parts are hard to come by, the maintenance costs are high. A shrewd buyer may reduce this asymmetry by taking a warranty or having a mechanic look under the hood and inspect the car before buying. Such a buyer would also prefer more standard designs and generic parts, all else being equal, since these will tend to lower maintenance costs. Incidentally, there is one very important difference between the car market and the HIS market, which we will return to below. Namely, drivers are usually buyers in the car market but end users are not usually buyers in the HIS market.</p>
                <p>In HIS procurement, purchasers are in a stronger position if they inspect, and allow others to inspect, the quality of the code; if they ensure that the programming code will be easily maintainable and that the data are stored in an established open format so that it will be cheap to get the data out and switch software when needed; and, finally, if they acquire the rights to the code, including the right to take it to another programmer or software company. In general, then, purchasers will be in a stronger position when they buy OSS rather than proprietary software.</p>
                <p>There are a plethora of competing standards in HIS. Against this background DICOM stands out as a stunning success, and DICOM conformity is a standard part of just about every radiology product, software, or hardware. However, despite promising developments such as the US Nationwide Health Information Network [<xref ref-type="bibr" rid="ref28">28</xref>], for most standards, open and closed alike, widespread conformity has not yet been achieved and this is to the detriment of interoperability.</p>
            </sec>
            <sec>
                <title>The Pros and Cons of Certification</title>
                <p>Certification of standards in HIS has been mooted as essential to ensure interoperability and because of the safety-critical nature of HIS. The Certification Commission for Health Care Information Technology (CCHIT) is charged with certifying that American electronic health record systems meet standards in order that they qualify for Recovery and Reinvestment Stimulus Bill funds. Concern has been expressed that certification fees and other aspects of the process of certification, such as handling of versioning and a preference for comprehensive rather than modular systems, is a barrier to entry for OSS [<xref ref-type="bibr" rid="ref28">28</xref>]. There has also been some controversy surrounding CCHIT&#8217;s relationship with vendors [<xref ref-type="bibr" rid="ref29">29</xref>].</p>
                <p>Certification of implementations of a standard is a choice. While it provides assurance to purchasers and users that a particular standard is met, the cost of certification must be borne and is often passed on to software developers. Despite being one of the oldest and most successful open standards bodies, the W3C does not have a certification process. In part this is because of the risk of alienating part of the industry or the Web community by adopting what could be seen as a policing or commercial role. It is also because of a concern that true vendor neutrality in certification is unachievable.</p>
                <p>Certification may also restrict physicians in their own personal use of HIS. It has been observed that many physicians already use hand-held HIS and that psychological ownership is important for acceptance. Certification may undermine this [<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref31">31</xref>].</p>
                <p>It would be ironic if a healthy respect for the safety-critical nature of health care and the desire for interoperability leads to the proliferation of insufficiently open standards and to certification processes that close out OSS and stifle the development of effective HIS.</p>
            </sec>
        </sec>
        <sec>
            <title>Prerequisites of an Effective Health Care Information System</title>
            <sec>
                <title>General Prerequisites of Successful Information Systems</title>
                <p>Three major reasons for IT project success across all sectors of the economy have been identified [<xref ref-type="bibr" rid="ref32">32</xref>]: (1) extensive, informed, and continuing user involvement, (2) senior and executive manager support, (3) a clear and accurate requirements modeling strategy. Sadly, however, a common finding in software projects is that &#8220;significant budget and time-line overruns, under-delivery of value, and the outright termination of a project before completion are all forms of failure&#8221; [<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref34">34</xref>].</p>
                <p>Budget overspending and failure to deliver key features have plagued recent HIS projects, and cost remains a major issue for would be HIS purchasers [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref34">34</xref>].</p>
            </sec>
            <sec>
                <title>Prerequisites of an Effective Health Care Information System</title>
                <p>In the first instance, we need a conservative or status quo HIS that mirrors, facilitates, and supports our current best practices. A system that demonstrably helps with the clinical workload in a reliable fashion is likely to have high spontaneous adoption rates. But as we would not wish our current clinical practices to be set in stone, so we should not wish our HIS to be static. Clinical acceptance is important and more likely to occur if significant process change is not required at the outset but instead is introduced after initial acceptance is secured, and in a stepwise fashion [<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref25">25</xref>].</p>
                <p>Returning to the major difference between car and HIS markets mentioned above, one might argue that better cars, from a driver perspective, result from driver choice. The driver is not compelled to buy a particular brand of car, and so car manufacturers have an incentive to make desirable cars &#8211; we leave unanswered what makes a desirable car. In the health care setting, choosing noncoercive implementation of an HIS could be an acid test of whether an HIS is of sufficiently high quality. Furthermore, employees may be permitted, and encouraged, to use rival but compatible HIS components, to promote desirable HIS. The assumption here is that health care professionals desire HIS that is usable, efficient, and helps to improve patient care.</p>
                <p>We also need an affordable HIS software platform to be established to help coordinate and focus efforts on health transformational goals. The iPhone has been cited as a model successful platform [<xref ref-type="bibr" rid="ref35">35</xref>] but a better model might be software, with Firefox or VistA as an example because these are less restrictive and more flexible platforms [<xref ref-type="bibr" rid="ref36">36</xref>]. The implementation of an open source HIS platform will help to define and secure an open standard, as argued above [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref20">20</xref>]. This will make the addition and substitution of components possible, since modularity is an inherent feature of open source development. It will help to create a healthy market [<xref ref-type="bibr" rid="ref35">35</xref>], as well as facilitating systems&#8217; evolution, flexibility, and functional creativity [<xref ref-type="bibr" rid="ref37">37</xref>].</p>
                <p>Physician use of hand-held HIS should be encouraged as a means of making the end user the buyer and/or chooser of the HIS used, since this will tend to improve HIS. Therefore, smooth integration of hand-held HIS with hospital HIS should be a priority. Integration will be facilitated by an OSS HIS platform. Allowing individual physicians the freedom to choose the software that best suits them may help to drive meaningful use and innovative computer-aided practice [<xref ref-type="bibr" rid="ref38">38</xref>].</p>
            </sec>
        </sec>
        <sec>
            <title>Why Open Source Software? Characteristics of Open Source Software and its Advantages</title>
            <sec>
                <title>General Argument</title>
                <p>The major single argument is that OSS empowers purchasers of software by making it easier for a given purchaser to change software products and/or software development teams, thus preventing lock-in and driving down costs [<xref ref-type="bibr" rid="ref28">28</xref>]. However, important differences between the typical open source development model and proprietary development models provide a number of important additional arguments (<xref ref-type="fig" rid="figure2">Figures 2</xref>, <xref ref-type="table" rid="table1">Tables 1</xref>).</p>
                <p>The arguments for OSS may be summarized as follows: (1) stronger position for purchaser, therefore lower costs, (2) software is superior (eg, usability, security, reliability) because of superior development model, quality of code can be checked, users can contribute, and contributors have many motivations (attracting highly motivated people to contribute &#8220;for free&#8221; is possible), and (3) facilitates open standards, encouraging competing implementations, strengthening the purchaser&#8217;s position, and leading to superior software.</p>
                <p>In OSS development, there may or may not be a purchaser. A project may consist entirely of unpaid user-developers and users. If there are purchasers, they may employ core developers or a software company to write and release software to foster the formation of a community of user-developers. Existing specifications are usually adapted to meet user needs. Development benefits hugely from the involvement of the users.</p>
                <p>This contrasts with proprietary development, in which there must be a purchaser. Either the software company creates a user specification for an imagined purchaser and then writes and markets the software to this purchaser, or it is paid to write software that meets a particular purchaser&#8217;s specification. Creating a comprehensive and accurate specification from scratch is costly. Users do not have access to the code so cannot contribute to it, and so any latent development skill possessed by users cannot be tapped. While a product continues to sell, the software company has little incentive to respond to individual user requests.</p>
                <fig id="figure2" position="float">
                    <label>Figure 2</label>
                    <caption>
                        <p>Open source software development process</p>
                    </caption>
                    <!--Original graphic name: http://writer.zoho.com:80/image.do?imgurl=6d37aff7952c652b15981bdb67ae7d24753f78e991a900217e61b98366e8ce2e3522dcefeb84fca35dd9d2eaa83a461b-->
                    <graphic xlink:href="jmir_v13i1e24_fig2.jpg" alt-version="no" mimetype="image" position="float" xlink:type="simple" />
                </fig>
                <fig id="figure3" position="float">
                    <label>Figure 3</label>
                    <caption>
                        <p>Proprietary software development process</p>
                    </caption>
                    <!--Original graphic name: http://writer.zoho.com:80/image.do?imgurl=6d37aff7952c652b15981bdb67ae7d24753f78e991a900217e61b98366e8ce2ebda5b53ca50200db3a109fd76d598fdc-->
                    <graphic xlink:href="jmir_v13i1e24_fig3.jpg" alt-version="no" mimetype="image" position="float" xlink:type="simple" />
                </fig>
                <table-wrap id="table1" position="float">
                    <label>Table 1</label>
                    <caption>
                        <p>Comparison of proprietary and open source software development methods</p>
                    </caption>
                    <table cellpadding="8" cellspacing="0" border="1" rules="groups" frame="hsides" width="1000">
                        <col width="228" />
                        <col width="362" />
                        <col width="409" />
                        <thead>
                            <tr valign="top">
                                <td>Aspect</td>
                                <td>Proprietary software</td>
                                <td>Open source software</td>
                            </tr>
                        </thead>
                        <tbody>
                            <tr valign="top">
                                <td>Software owner</td>
                                <td>Company, shareholders</td>
                                <td>Community, citizens</td>
                            </tr>
                            <tr valign="top">
                                <td>Foundations of product</td>
                                <td>Other products on market with a few distinct changes (analogy: me-too drug)</td>
                                <td>Existing tested code base (analogy: generic drug)</td>
                            </tr>
                            <tr valign="top">
                                <td>Pricing model</td>
                                <td>What the market will bear</td>
                                <td>Cost recovery</td>
                            </tr>
                            <tr valign="top">
                                <td>Development team</td>
                                <td>Professional programmers isolated from user base</td>
                                <td>Mix of professional and amateur programmers, often including users</td>
                            </tr>
                            <tr valign="top">
                                <td>Development team strategy</td>
                                <td>Cut and run, lock in to proprietary code</td>
                                <td>Code reuse, continuing quality improvement</td>
                            </tr>
                            <tr valign="top">
                                <td>Development team dynamics</td>
                                <td>Small, centralized, managed</td>
                                <td>Large, decentralized, meritocratic</td>
                            </tr>
                            <tr valign="top">
                                <td>Developer incentives</td>
                                <td>Salary, internal promotion</td>
                                <td>Community, recognition, contribution to application area &#177; salary &#38; promotion</td>
                            </tr>
                            <tr valign="top">
                                <td>Method to test and assure quality</td>
                                <td>Internal synthetic test cases, team integrity</td>
                                <td>Real cases, user testing, open inspection by community</td>
                            </tr>
                            <tr valign="top">
                                <td>Driver to respond to user needs and requests</td>
                                <td>Market share</td>
                                <td>Community-prioritized need</td>
                            </tr>
                            <tr valign="top">
                                <td>Intellectual input</td>
                                <td>Small team, distorted by team dynamics</td>
                                <td>Wisdom of crowds</td>
                            </tr>
                        </tbody>
                    </table>
                </table-wrap>
                <p>Successful OSS projects tap into the skills of the community that forms around them to suggest new features, report bugs, and modify the source code accordingly. A nascent developer community must have something testable to play with but, once formed, open source communities can put skilled time of much greater orders of magnitude into a problem [<xref ref-type="bibr" rid="ref39">39</xref>]. The central argument to OSS development is that when everyone can inspect the source code, the software gets more scrutiny and more corrective feedback than a single development team can provide, leading to better software [<xref ref-type="bibr" rid="ref40">40</xref>]. Reasons why this is so hinge on the characteristics of OSS and are multifactorial, but include [<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref41">41</xref>] the following:</p>
                <list list-type="bullet">
                    <list-item>
                        <p>Economic: a single proprietary software development team does not usually have the staff comparable to the size of the distributed communities involved in development of large OSS projects. OSS removes the need for duplication of programming effort (although it may occur anyway). Lock-in is prevented, leading to better long-term code security.</p>
                    </list-item>
                    <list-item>
                        <p>Psychological: there is plurality of motivation, as members of an OSS community include individuals who may be more highly motivated [<xref ref-type="bibr" rid="ref24">24</xref>] because they contribute for complex personal, rather than primarily financial, reasons such as peer recognition, as well as corporations motivated by financial gain.</p>
                    </list-item>
                    <list-item>
                        <p>Social: OSS communities tend to be fluid, have a strong meritocratic culture, and foster creativity and innovation. OSS community meritocracies do break down in the usual human ways, but the licenses allow others to carry on through mechanisms such as &#8220;forking&#8221; (where a group of developers splits to form two groups and continue development along separate lines).</p>
                    </list-item>
                    <list-item>
                        <p>Managerial: OSS projects tend to free community members from conventional managerial and bureaucratic constraints, facilitating innovation.</p>
                    </list-item>
                    <list-item>
                        <p>Computer science/design related: Open source products have a high degree of modularity (necessitated by the distributed nature of development) and a high degree of interoperability.</p>
                    </list-item>
                </list>
                <table-wrap id="table2" position="float">
                    <label>Table 2</label>
                    <caption>
                        <p>Implications of the differences in proprietary and open source software development methods</p>
                    </caption>
                    <table cellpadding="8" cellspacing="0" border="1" rules="groups" frame="hsides" width="1000">
                        <col width="300" />
                        <col width="327" />
                        <col width="373" />
                        <thead>
                            <tr valign="top">
                                <td>Aspect</td>
                                <td>Proprietary software</td>
                                <td>Open source software</td>
                            </tr>
                        </thead>
                        <tbody>
                            <tr valign="top">
                                <td>Cost drivers</td>
                                <td>Competitors, value added</td>
                                <td>Development costs</td>
                            </tr>
                            <tr valign="top">
                                <td>Typical upgrade frequency</td>
                                <td>When competing products or serious bugs threaten &#8211; annual</td>
                                <td>When new release tested and robust &#8211; bimonthly</td>
                            </tr>
                            <tr valign="top">
                                <td>Use of proprietary tools, data formats</td>
                                <td>Frequent</td>
                                <td>Discouraged</td>
                            </tr>
                            <tr valign="top">
                                <td>Consequences of developer, company abandoning area</td>
                                <td>Catastrophic (even if source code deposited in escrow)</td>
                                <td>Not applicable</td>
                            </tr>
                            <tr valign="top">
                                <td>Software selling points</td>
                                <td>&#8220;Creeping featurism&#8221;</td>
                                <td>Robust, tested, user-centered software</td>
                            </tr>
                            <tr valign="top">
                                <td>Suitability for safety-critical applications</td>
                                <td>Only if relevant development and testing methods followed</td>
                                <td>Only if relevant user and developer community engaged</td>
                            </tr>
                            <tr valign="top">
                                <td>Risk of monopoly</td>
                                <td>Low to medium</td>
                                <td>Low</td>
                            </tr>
                            <tr valign="top">
                                <td>Ability of purchaser to influence quality, cost, upgrades</td>
                                <td>Low to medium</td>
                                <td>Medium to high</td>
                            </tr>
                            <tr valign="top">
                                <td>Training issues</td>
                                <td>Applications distinctive, specific training usually needed</td>
                                <td>Less training: generic look and feel so applications resemble one another</td>
                            </tr>
                            <tr valign="top">
                                <td>Process for tailoring to local needs</td>
                                <td>Pay remote software developer and wait</td>
                                <td>Ask local member of developer team and wait</td>
                            </tr>
                        </tbody>
                    </table>
                </table-wrap>
            </sec>
        </sec>
        <sec>
            <title>Barriers to the Adoption of Open Source Software</title>
            <sec>
                <title>General Barriers to Adoption of Health Care Information Systems</title>
                <p>The major reported barrier to the adoption of HIS is cost [<xref ref-type="bibr" rid="ref7">7</xref>]. Other barriers include physicians&#8217; resistance to health care software because of the time cost of learning something new, fear of lawsuits, risk of data breaches, fear of automation and deprofessionalization, and poor track record of existing HIS [<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref42">42</xref>].</p>
            </sec>
            <sec>
                <title>Particular Barriers to Adoption of an Open Source Software Health Care Information Systems</title>
                <p>Lack of awareness and understanding of, and familiarity with, OSS is a major barrier to the adoption of OSS HIS [<xref ref-type="bibr" rid="ref28">28</xref>], although this may be changing with the increasing recognition of the success of VistA and the adoption of VistA-derived OSS HIS platforms [<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref36">36</xref>].</p>
                <p>In many countries there is a lack of clear governmental support for OSS HIS, which may be attributable to a lack of awareness of the proven merits of OSS, the significant power wielded by lobby groups representing commercial or proprietary software developers and vendors, or a wish to protect tax revenue and employment generated by existing proprietary HIS markets. A number of myths have also circulated in the past about OSS such as it being more expensive, less secure, or riskier in terms of liability, which are debunked here and elsewhere [<xref ref-type="bibr" rid="ref26">26</xref>].</p>
                <p>It has been claimed that the total cost of ownership is often higher for OSS because of implementation costs. Lack of expertise and business drawbacks, including training investments and finding the right staff or the right business to outsource implementation and support, do have the potential to negatively influence total cost of ownership. However, many businesses in the service sector find that lower licensing costs and escape from vendor lock-in outweigh this [<xref ref-type="bibr" rid="ref43">43</xref>-<xref ref-type="bibr" rid="ref46">46</xref>].</p>
                <p>It has been argued that OSS is inherently less secure than closed proprietary software. Arguments have included the claim that because the code is public in OSS an attacker can more easily find and exploit vulnerabilities. This is the &#8220;security through obscurity&#8221; argument, that systems that hide their inner workings from potential attackers are more secure. Security through obscurity alone completely fails when code is disclosed or otherwise discovered using tools such as debuggers or dissemblers [<xref ref-type="bibr" rid="ref47">47</xref>].</p>
                <p>Worse, it has been suggested that the cloak obscurity provides tends to encourage poor-quality code. Opening the source allows independent assessment of the security of a system, makes bug patching easier and more likely, and forces developers to spend more effort on the quality of their code [<xref ref-type="bibr" rid="ref47">47</xref>].</p>
                <p>The idea that using OSS is inherently riskier because one automatically become liable for any failings of the software is false. Typically a large organization will pay a contractor for an OSS implementation and support package. Many contractors providing OSS implementation and support offer legal indemnity to clients in exactly the same way as proprietary vendors [<xref ref-type="bibr" rid="ref46">46</xref>].</p>
            </sec>
            <sec>
                <title>Particular Reasons to Adopt Open Source Software Health Care Information Systems</title>
                <p>The general arguments for OSS previously summarized are that it (1) puts the purchaser in a stronger position, therefore lowering costs, (2) generates superior software (eg, usability, security, reliability) &#8211; because of the superior development model, quality of code can be checked, users can contribute, and contributors have multiple motivations (attracting highly motivated people to contribute &#8220;for free&#8221; is possible), and (3) facilitates open standards, encouraging competing implementations, strengthening the purchasers position, and leading to superior software.</p>
                <p>These arguments obtain particularly for OSS HIS. In summary this is because (1) large sums of money are spent on HIS, which makes it easier for the purchaser to lever the advantages of OSS HIS, (2) OSS HIS development can benefit hugely from an existing large, talented, and highly motivated user base, and (3) existing proprietary HIS have not delivered as claimed, and an absence of OSS reference implementations has led to an absence of successful open standards, and in turn an absence of competing implementations.</p>
                <p>Health care systems have large, highly trained technical work forces (there were 633,000 employed surgeons and physicians alone in 2006 in the United States [<xref ref-type="bibr" rid="ref48">48</xref>], and there are approximately 1.3 million full-time workers in the UK NHS). Within these workforces are large numbers of individuals who will report software bugs and request new features in an environment where developers are responsive to this [<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref28">28</xref>]. Even though a smaller number of individuals, perhaps one in a thousand, will be motivated and able to fix such bugs and implement new features, this still amounts to a critical mass of several hundred physicians and surgeons. These individuals are immersed in the nuances and intricacies of clinical practice and much better placed than external developers to make software that complements their work [<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref49">49</xref>].</p>
                <p>A team of paid core developers could ensure key features are delivered in a timely fashion, building on existing [<xref ref-type="bibr" rid="ref40">40</xref>] open source medical software projects and preventing duplication of effort. Indeed, Ubuntu Linux, a highly successful open source operating system with over 6 million users, already follows a similar model.</p>
                <p>The long-term security of the code base could be protected with a licensing arrangement that specifies that the code remain open and without restriction, allowing the government to readily employ a different team of programmers or businesses to continue development of the code should the need arise.</p>
                <p>The complex personal motivation and values within OSS communities, such as healthy rivalry and respect for demonstrated excellence, are a useful match with those found in the medical profession and academia. Together with the informatics talent already demonstrated within the medical profession [<xref ref-type="bibr" rid="ref50">50</xref>], health care systems can provide fertile ground for the growth of an OSS community. Such a community will facilitate clinical engagement with software and foster creativity [<xref ref-type="bibr" rid="ref49">49</xref>], innovation, the development of IT skills within a health care system, and an HIS that fits with the needs of clinical users and workflows [<xref ref-type="bibr" rid="ref22">22</xref>].</p>
                <p>A high degree of modularity, together with openness, will help ensure the dependability of the safety and security-critical systems within health systems. Indeed, OSS is already used in a number of safety and security-critical systems, such as German traffic light controllers and American spaceships [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref51">51</xref>-<xref ref-type="bibr" rid="ref53">53</xref>].</p>
                <p>Several mature and function-rich exemplar OSS HIS already exist, including VistA, an electronic health record programmed by Federal (US) employees working for the VA. Development began in the 1970s and in its present form VistA serves approximately 30 million Americans and now is a de facto standard for HIS. VistA has been hailed as &#8220;the aspirin of electronic health records&#8221; [<xref ref-type="bibr" rid="ref26">26</xref>], and its success can be attributed to the decentralized distributed team development model initially used. This model has been seen as a precursor to OSS development. The public domain VistA code base already serves as the basis for a number of both commercial and noncommercial leading OSS HIS, such as WorldVista and ClearHealth [<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref54">54</xref>,<xref ref-type="bibr" rid="ref55">55</xref>].</p>
                <p>Public and professional awareness of OSS successes is limited because differences in the commercial model mean that OSS software is less often marketed to the general public. However, industrial-grade OSS successes include the Apache Web server, which represents 50% of the world&#8217;s Web server market and is supported and distributed by a number of large corporations including IBM and Oracle [<xref ref-type="bibr" rid="ref40">40</xref>]. In fact, without realizing it, millions of people use Linux everyday when they surf the Internet, use Google, or use a host of other systems with embedded Linux, ranging from washing machines to automated teller machines.</p>
                <p>Internationally, governments and businesses are more keenly aware of the benefits of OSS and the threat it poses to the existing US-dominated proprietary software market. The American Center for Strategic and International Studies tracks governmental policies on the use of OSS, and its July 2008 report describes 275 open source policy initiatives to date, 135 of which are within Europe. EU Commission policy recommends that OSS should be promoted among public administrations in terms of efficiency, productivity, and quality of their services and provides funding for the use of OSS in e-government and e-business solutions [<xref ref-type="bibr" rid="ref53">53</xref>].</p>
                <p>In 2004 the UK government announced that it will consider OSS solutions alongside proprietary ones in IT procurement, will only use products with open standards, and will seek to avoid lock-in to proprietary IT products and services [<xref ref-type="bibr" rid="ref56">56</xref>].</p>
                <p>Since 2003 the official US Department of Defense policy is that OSS solutions should be given equal consideration alongside proprietary ones in IT procurement. The US Navy has gone further and in 2007 recognized OSS as key to operational effectiveness [<xref ref-type="bibr" rid="ref57">57</xref>,<xref ref-type="bibr" rid="ref58">58</xref>]. Both organizations value safety, interoperability, and cost effectiveness in their IT systems, as do health care providers.</p>
                <p>The complexity of evaluating HIS and the lack of a good evidence base for the implementation of HIS have been noted. However, it has been recognized that for HIS to produce benefit it is first necessary that applications be available, adopted by institutions, and supported and used by clinicians (<xref ref-type="fig" rid="figure4">Figure 4</xref>) [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref59">59</xref>].</p>
                <fig id="figure4" position="float">
                    <label>Figure 4</label>
                    <caption>
                        <p>An illustration of the steps necessary before an HIS produces benefit [<xref ref-type="bibr" rid="ref21">21</xref>]</p>
                    </caption>
                    <!--Original graphic name: http://writer.zoho.com:80/image.do?imgurl=6d37aff7952c652b15981bdb67ae7d24753f78e991a900217e61b98366e8ce2eff405ccc76874e96056f87fccbb1cd28-->
                    <graphic xlink:href="jmir_v13i1e24_fig4.jpg" alt-version="no" mimetype="image" position="float" xlink:type="simple" />
                </fig>
                <p>Rational HIS must aim to improve the quality of patient care, enhance efficiency, and reduce costs. This model emphasizes the importance of clinical engagement for the successful diffusion of HIS [<xref ref-type="bibr" rid="ref9">9</xref>]. The rapid diffusion of OSS has been noted [<xref ref-type="bibr" rid="ref24">24</xref>]and gives rise to the conclusion that OSS will benefit patients and professionals, and support the planned reforms of the health care system.</p>
                <p>The particular suitability of OSS for HIS has already been mentioned briefly in the <italic>British Medical Journal</italic> [<xref ref-type="bibr" rid="ref50">50</xref>] and, more recently, in an American Medical Informatics Association White Paper [<xref ref-type="bibr" rid="ref25">25</xref>]. OSS continues to gain ground outside the health care setting, and in view of its manifest benefits, efforts to include it within the health care setting, and within HIS procurement strategies, must be renewed in order to maximize return on significant HIS investment.</p>
                <p>In the future those who choose to invest in OSS HIS platforms, encourage individual physicians to use their own interoperable personal HIS, and take care not to create barriers to entry through regulation will be the first to fully realize the benefits of investment in HIS.</p>
            </sec>
        </sec>
    </body>
    <back>
        <fn-group>
            <fn fn-type="conflict">
                <p>Neither of the authors receives any material benefit from software standards organizations or from software development, either commercial or open source.</p>
            </fn>
        </fn-group>
        <glossary>
            <title>Abbreviations</title>
            <def-list>
                <def-item>
                    <term id="abb1">CCHIT</term>
                    <def>
                        <p>Certification Commission for Health Care Information Technology</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb2">DICOM</term>
                    <def>
                        <p>Digital Imaging and Communications in Medicine</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb3">HIS</term>
                    <def>
                        <p>health care information systems</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb4">IT</term>
                    <def>
                        <p>information technology</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb5">NHS</term>
                    <def>
                        <p>National Health Service</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb6">NPfIT</term>
                    <def>
                        <p>National Programme for Information Technology</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb7">OSS</term>
                    <def>
                        <p>open source software</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb8">VA</term>
                    <def>
                        <p>Veterans Administration</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb9">W3C</term>
                    <def>
                        <p>World Wide Web Consortium</p>
                    </def>
                </def-item>
            </def-list>
        </glossary>
        <ref-list>
            <ref id="ref1">
                <label>1</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Hynes</surname>
                            <given-names>DM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Perrin</surname>
                            <given-names>RA</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Rappaport</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Stevens</surname>
                            <given-names>JM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Demakis</surname>
                            <given-names>JG</given-names>
                        </name>
                    </person-group>
                    <article-title>Informatics resources to support health care quality improvement in the veterans health administration</article-title>
                    <source>J Am Med Inform Assoc</source>
                    <year>2004</year>
                    <volume>11</volume>
                    <issue>5</issue>
                    <fpage>344</fpage>
                    <lpage>50</lpage>
                    <pub-id pub-id-type="doi">10.1197/jamia.M1548</pub-id>
                    <pub-id pub-id-type="medline">15187063</pub-id>
                    <pub-id pub-id-type="pii">M1548</pub-id>
                    <pub-id pub-id-type="pmcid">PMC516240</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref2">
                <label>2</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Bates</surname>
                            <given-names>DW</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Gawande</surname>
                            <given-names>AA</given-names>
                        </name>
                    </person-group>
                    <article-title>Improving safety with information technology</article-title>
                    <source>N Engl J Med</source>
                    <year>2003</year>
                    <month>06</month>
                    <day>19</day>
                    <volume>348</volume>
                    <issue>25</issue>
                    <fpage>2526</fpage>
                    <lpage>34</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://dx.doi.org/10.1056/NEJMsa020847" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1056/NEJMsa020847</pub-id>
                    <pub-id pub-id-type="medline">12815139</pub-id>
                    <pub-id pub-id-type="pii">348/25/2526</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref3">
                <label>3</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Goetz</surname>
                            <given-names>T</given-names>
                        </name>
                    </person-group>
                    <source>New York Times</source>
                    <year>2007</year>
                    <month>05</month>
                    <day>30</day>
                    <access-date>2010-12-21</access-date>
                    <comment>Physician, upgrade thyself<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.nytimes.com/2007/05/30/opinion/30goetz.html?_r=1">http://www.nytimes.com/2007/05/30/opinion/30goetz.html?_r=1</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5v9B5z98y</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref4">
                <label>4</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>www.researchandmarkets com</collab>
                    </person-group>
                    <source>Research and Markets</source>
                    <year>2009</year>
                    <access-date>2010-02-25</access-date>
                    <comment>Global Health Care Market<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.researchandmarkets.com/research/f46d4e/global_healthcare_information_technology_2009_2014">http://www.researchandmarkets.com/research/f46d4e/global_healthcare_information_technology_2009_2014</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">1267094598624186</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref5">
                <label>5</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Coiera</surname>
                            <given-names>EW</given-names>
                        </name>
                    </person-group>
                    <article-title>Lessons from the NHS National Programme for IT</article-title>
                    <source>Med J Aust</source>
                    <year>2007</year>
                    <month>01</month>
                    <day>1</day>
                    <volume>186</volume>
                    <issue>1</issue>
                    <fpage>3</fpage>
                    <lpage>4</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.mja.com.au/public/issues/186_01_010107/coi11007_fm.html" />
                    </comment>
                    <pub-id pub-id-type="medline">17229021</pub-id>
                    <pub-id pub-id-type="pii">coi11007_fm</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref6">
                <label>6</label>
                <nlm-citation citation-type="web">
                    <source>American Recovery and Reinvestment Act of 2009, HR 1, 111 Cong, 1st Sess</source>
                    <year>2009</year>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=111_cong_bills&#38;docid=f:h1enr.pdf">http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=111_cong_bills&#38;docid=f:h1enr.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">1267094598624260</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref7">
                <label>7</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Jha</surname>
                            <given-names>AK</given-names>
                        </name>
                        <name name-style="western">
                            <surname>DesRoches</surname>
                            <given-names>CM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Campbell</surname>
                            <given-names>EG</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Donelan</surname>
                            <given-names>K</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Rao</surname>
                            <given-names>SR</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Ferris</surname>
                            <given-names>TG</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Shields</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Rosenbaum</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Blumenthal</surname>
                            <given-names>D</given-names>
                        </name>
                    </person-group>
                    <article-title>Use of electronic health records in U.S. hospitals</article-title>
                    <source>N Engl J Med</source>
                    <year>2009</year>
                    <month>04</month>
                    <day>16</day>
                    <volume>360</volume>
                    <issue>16</issue>
                    <fpage>1628</fpage>
                    <lpage>38</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://dx.doi.org/10.1056/NEJMsa0900592" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1056/NEJMsa0900592</pub-id>
                    <pub-id pub-id-type="medline">19321858</pub-id>
                    <pub-id pub-id-type="pii">NEJMsa0900592</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref8">
                <label>8</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>United Kingdom House of Commons Public Accounts Committee</collab>
                    </person-group>
                    <source>The National Programme for IT in the NHS: Progress Since 2006</source>
                    <year>2009</year>
                    <access-date>2010-02-25</access-date>
                    <publisher-loc>London, UK</publisher-loc>
                    <publisher-name>The Stationery Office Limited</publisher-name>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.publications.parliament.uk/pa/cm200809/cmselect/cmpubacc/153/153.pdf">http://www.publications.parliament.uk/pa/cm200809/cmselect/cmpubacc/153/153.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">1267094598624238</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref9">
                <label>9</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Wyatt</surname>
                            <given-names>JC</given-names>
                        </name>
                    </person-group>
                    <article-title>Hospital information management: the need for clinical leadership</article-title>
                    <source>BMJ</source>
                    <year>1995</year>
                    <month>07</month>
                    <day>15</day>
                    <volume>311</volume>
                    <issue>6998</issue>
                    <fpage>175</fpage>
                    <lpage>8</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://bmj.com/cgi/pmidlookup?view=long&#38;pmid=7613433" />
                    </comment>
                    <pub-id pub-id-type="medline">7613433</pub-id>
                    <pub-id pub-id-type="pmcid">PMC2550227</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref10">
                <label>10</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Chantler</surname>
                            <given-names>C</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Clarke</surname>
                            <given-names>T</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Granger</surname>
                            <given-names>R</given-names>
                        </name>
                    </person-group>
                    <article-title>Information technology in the English National Health Service</article-title>
                    <source>JAMA</source>
                    <year>2006</year>
                    <month>11</month>
                    <day>8</day>
                    <volume>296</volume>
                    <issue>18</issue>
                    <fpage>2255</fpage>
                    <lpage>8</lpage>
                    <pub-id pub-id-type="doi">10.1001/jama.296.18.2255</pub-id>
                    <pub-id pub-id-type="medline">17090773</pub-id>
                    <pub-id pub-id-type="pii">296/18/2255</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref11">
                <label>11</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Keen</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <article-title>The NHS programme for information technology</article-title>
                    <source>BMJ</source>
                    <year>2006</year>
                    <month>07</month>
                    <day>1</day>
                    <volume>333</volume>
                    <issue>7557</issue>
                    <fpage>3</fpage>
                    <lpage>4</lpage>
                    <pub-id pub-id-type="doi">10.1136/bmj.38889.569201.DE</pub-id>
                    <pub-id pub-id-type="medline">16798752</pub-id>
                    <pub-id pub-id-type="pii">bmj.38889.569201.DE</pub-id>
                    <pub-id pub-id-type="pmcid">PMC1488735</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref12">
                <label>12</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Hendy</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Reeves</surname>
                            <given-names>BC</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Fulop</surname>
                            <given-names>N</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hutchings</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Masseria</surname>
                            <given-names>C</given-names>
                        </name>
                    </person-group>
                    <article-title>Challenges to implementing the national programme for information technology (NPfIT): a qualitative study</article-title>
                    <source>BMJ</source>
                    <year>2005</year>
                    <month>08</month>
                    <day>6</day>
                    <volume>331</volume>
                    <issue>7512</issue>
                    <fpage>331</fpage>
                    <lpage>6</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://bmj.com/cgi/pmidlookup?view=long&#38;pmid=16081447" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1136/bmj.331.7512.331</pub-id>
                    <pub-id pub-id-type="medline">16081447</pub-id>
                    <pub-id pub-id-type="pii">331/7512/331</pub-id>
                    <pub-id pub-id-type="pmcid">PMC1183135</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref13">
                <label>13</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Stevens</surname>
                            <given-names>S</given-names>
                        </name>
                    </person-group>
                    <source>Document obtained by UK Computer Weekly using the freedom of information act</source>
                    <access-date>2010-12-22</access-date>
                    <comment>Strategy For Modernising NHS Information Systems; 2002<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://medicdojo.objectis.net/Members/admin/downing%20st%20papers.pdf">http://medicdojo.objectis.net/Members/admin/downing%20st%20papers.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5vAkFbdau</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref14">
                <label>14</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Majeed</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <article-title>Ten ways to improve information technology in the NHS</article-title>
                    <source>BMJ</source>
                    <year>2003</year>
                    <month>01</month>
                    <day>25</day>
                    <volume>326</volume>
                    <issue>7382</issue>
                    <fpage>202</fpage>
                    <lpage>6</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://bmj.com/cgi/pmidlookup?view=long&#38;pmid=12543838" />
                    </comment>
                    <pub-id pub-id-type="medline">12543838</pub-id>
                    <pub-id pub-id-type="pmcid">PMC140278</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref15">
                <label>15</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Trotter</surname>
                            <given-names>F</given-names>
                        </name>
                    </person-group>
                    <source>FredTrotter.com</source>
                    <year>2009</year>
                    <access-date>2010-02-25</access-date>
                    <comment>NCVHS Testimony on Meaningful Use<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.fredtrotter.com/2009/04/28/ncvhs-testimony-on-meaningful-use/">http://www.fredtrotter.com/2009/04/28/ncvhs-testimony-on-meaningful-use/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">1267094598624384</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref16">
                <label>16</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Faus</surname>
                            <given-names>SA</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Sujansky</surname>
                            <given-names>W</given-names>
                        </name>
                    </person-group>
                    <source>California HealthCare Foundation</source>
                    <year>2008</year>
                    <access-date>2010-02-25</access-date>
                    <comment>Open-Source EHR Systems for Ambulatory Care: A Market Assessment<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.chcf.org/topics/view.cfm?itemID=133551">http://www.chcf.org/topics/view.cfm?itemID=133551</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">1267094598624207</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref17">
                <label>17</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Gacek</surname>
                            <given-names>C</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Arief</surname>
                            <given-names>B</given-names>
                        </name>
                    </person-group>
                    <article-title>The many meanings of open source</article-title>
                    <source>IEEE Software</source>
                    <year>2004</year>
                    <volume>21</volume>
                    <issue>1</issue>
                    <fpage>34</fpage>
                    <lpage>40</lpage>
                    <pub-id pub-id-type="doi">10.1109/MS.2004.1259206</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref18">
                <label>18</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Cerri</surname>
                            <given-names>D</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Fuggetta</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <article-title>Open standards, open formats, and open source</article-title>
                    <source>J Systems Softw</source>
                    <year>2007</year>
                    <volume>80</volume>
                    <issue>11</issue>
                    <fpage>1930</fpage>
                    <lpage>1937</lpage>
                </nlm-citation>
            </ref>
            <ref id="ref19">
                <label>19</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>West</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <article-title>How open is open enough? Melding proprietary and open source platform strategies</article-title>
                    <source>Research Policy</source>
                    <year>2003</year>
                    <volume>32</volume>
                    <fpage>1259</fpage>
                    <lpage>1285</lpage>
                    <pub-id pub-id-type="doi">10.1016/S0048-7333(03)00052-0</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref20">
                <label>20</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Wheeler</surname>
                            <given-names>DA</given-names>
                        </name>
                    </person-group>
                    <source>dwheeler.com</source>
                    <year>2006</year>
                    <access-date>2010-02-25</access-date>
                    <comment>Open Standards, Open Source<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.dwheeler.com/essays/open-standards-open-source.html">http://www.dwheeler.com/essays/open-standards-open-source.html</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">1267094598624427</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref21">
                <label>21</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Davidson</surname>
                            <given-names>SM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Heineke</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <article-title>Toward an effective strategy for the diffusion and use of clinical information systems</article-title>
                    <source>J Am Med Inform Assoc</source>
                    <year>2007</year>
                    <volume>14</volume>
                    <issue>3</issue>
                    <fpage>361</fpage>
                    <lpage>7</lpage>
                    <pub-id pub-id-type="doi">10.1197/jamia.M2254</pub-id>
                    <pub-id pub-id-type="medline">17329727</pub-id>
                    <pub-id pub-id-type="pii">M2254</pub-id>
                    <pub-id pub-id-type="pmcid">PMC2244875</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref22">
                <label>22</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Charpentier</surname>
                            <given-names>R</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Cote</surname>
                            <given-names>PA</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Carbone</surname>
                            <given-names>R</given-names>
                        </name>
                    </person-group>
                    <source>Defence Research Establishment, Valcartier, Quebec, Canada</source>
                    <year>2004</year>
                    <access-date>2010-12-21</access-date>
                    <comment>Free and Open Source Software: Overview and Preliminary Guidelines for DRDC<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.fptt-pftt.gc.ca/pdf/FOSS_DRDC_NO_ARCHIVE.pdf">http://www.fptt-pftt.gc.ca/pdf/FOSS_DRDC_NO_ARCHIVE.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5v9BdEc58</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref23">
                <label>23</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Smith</surname>
                            <given-names>C</given-names>
                        </name>
                    </person-group>
                    <source>NHS Information Authority</source>
                    <year>2002</year>
                    <access-date>2010-02-25</access-date>
                    <comment>Open Source Software and the NHS: White Paper<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://kb.cospa-project.org/retrieve/2888/5.pdf">http://kb.cospa-project.org/retrieve/2888/5.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">1267094598624362</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref24">
                <label>24</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Bonaccorsi</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Rossi</surname>
                            <given-names>C</given-names>
                        </name>
                    </person-group>
                    <article-title>Why Open Source software can succeed</article-title>
                    <source>Research Policy</source>
                    <year>2003</year>
                    <volume>32</volume>
                    <fpage>1243</fpage>
                    <lpage>1258</lpage>
                    <pub-id pub-id-type="doi">10.1016/S0048-7333(03)00051-9</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref25">
                <label>25</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Valdes</surname>
                            <given-names>I</given-names>
                        </name>
                    </person-group>
                    <source>American Medical Informatics Association</source>
                    <access-date>2010-12-21</access-date>
                    <comment>Free and Open Source Software in Healthcare 1.0<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://www.amia.org/files/Final-OS-WG%20White%20Paper_11_19_08.pdf">https://www.amia.org/files/Final-OS-WG%20White%20Paper_11_19_08.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5v9BgT5sC</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref26">
                <label>26</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>King</surname>
                            <given-names>M</given-names>
                        </name>
                    </person-group>
                    <source>US House of Representatives</source>
                    <year>2008</year>
                    <month>07</month>
                    <day>24</day>
                    <access-date>2010-12-22</access-date>
                    <comment>Testimony Before the Subcommittee on Health of the House Committee on Ways and Means<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://medicdojo.objectis.net/Members/admin/Hearing%20Archives%20Committee%20on%20Ways%20-%20Means%20%20U_S_%20House%20of%20Representatives.htm">http://medicdojo.objectis.net/Members/admin/Hearing%20Archives%20Committee%20on%20Ways%20-%20Means%20%20U_S_%20House%20of%20Representatives.htm</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5vAlMIkjT</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref27">
                <label>27</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>McEvoy</surname>
                            <given-names>C</given-names>
                        </name>
                    </person-group>
                    <source>Advance For Health Information Professionals</source>
                    <year>2009</year>
                    <access-date>2010-12-21</access-date>
                    <comment>Open Source EHRs Set to Grow: Government Backing Gives Open Source a Boost<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://health-information.advanceweb.com/Article/Open-Source-EHRs-Set-to-Grow.aspx">http://health-information.advanceweb.com/Article/Open-Source-EHRs-Set-to-Grow.aspx</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5v9BmuoVQ</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref28">
                <label>28</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Marcus</surname>
                            <given-names>DD</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Lubrano</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Murray</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <source>The Physicians Foundation</source>
                    <year>2009</year>
                    <access-date>2010-12-21</access-date>
                    <comment>Electronic Medical Record Implementation Guide: The Link to a Better Future. 2nd edition<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://home.smh.com/documents/forPhysiciansDocs/documents/EMR_Implementation_Guide_2nd_Ed.pdf">http://home.smh.com/documents/forPhysiciansDocs/documents/EMR_Implementation_Guide_2nd_Ed.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5v9Bq2Ub2</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref29">
                <label>29</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>O'Harrow Jr</surname>
                            <given-names>R</given-names>
                        </name>
                    </person-group>
                    <source>The Washington Post</source>
                    <year>2009</year>
                    <access-date>2010-02-25</access-date>
                    <comment>The machinery behind health-care reform: how an industry lobby scored a swift, unexpected victory by channeling billions to electronic records<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.washingtonpost.com/wp-dyn/content/article/2009/05/15/AR2009051503667.html?hpid=topnews">http://www.washingtonpost.com/wp-dyn/content/article/2009/05/15/AR2009051503667.html?hpid=topnews</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">1267094598624325</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref30">
                <label>30</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Rothschild</surname>
                            <given-names>JM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Fang</surname>
                            <given-names>E</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Liu</surname>
                            <given-names>V</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Litvak</surname>
                            <given-names>I</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Yoon</surname>
                            <given-names>C</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Bates</surname>
                            <given-names>DW</given-names>
                        </name>
                    </person-group>
                    <article-title>Use and perceived benefits of handheld computer-based clinical references</article-title>
                    <source>J Am Med Inform Assoc</source>
                    <year>2006</year>
                    <volume>13</volume>
                    <issue>6</issue>
                    <fpage>619</fpage>
                    <lpage>26</lpage>
                    <pub-id pub-id-type="doi">10.1197/jamia.M2103</pub-id>
                    <pub-id pub-id-type="medline">16929041</pub-id>
                    <pub-id pub-id-type="pii">M2103</pub-id>
                    <pub-id pub-id-type="pmcid">PMC1656968</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref31">
                <label>31</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Par&#233;</surname>
                            <given-names>G</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Sicotte</surname>
                            <given-names>C</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Jacques</surname>
                            <given-names>H</given-names>
                        </name>
                    </person-group>
                    <article-title>The effects of creating psychological ownership on physicians' acceptance of clinical information systems</article-title>
                    <source>J Am Med Inform Assoc</source>
                    <year>2006</year>
                    <volume>13</volume>
                    <issue>2</issue>
                    <fpage>197</fpage>
                    <lpage>205</lpage>
                    <pub-id pub-id-type="doi">10.1197/jamia.M1930</pub-id>
                    <pub-id pub-id-type="medline">16357351</pub-id>
                    <pub-id pub-id-type="pii">M1930</pub-id>
                    <pub-id pub-id-type="pmcid">PMC1447539</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref32">
                <label>32</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Berntsson-Svensson</surname>
                            <given-names>R</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Aurum</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <article-title>Successful software project and products: an empirical investigation</article-title>
                    <source>Proceedings</source>
                    <year>2006</year>
                    <conf-name>ACM/IEEE International Symposium on Empirical Software Engineering</conf-name>
                    <conf-date>Sept 21-22, 2008</conf-date>
                    <conf-loc>Rio de Janeiro, Brazil</conf-loc>
                </nlm-citation>
            </ref>
            <ref id="ref33">
                <label>33</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Glaser</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <article-title>More on management's role in IT project failures</article-title>
                    <source>Healthc Financ Manage</source>
                    <year>2005</year>
                    <month>01</month>
                    <volume>59</volume>
                    <issue>1</issue>
                    <fpage>82</fpage>
                    <lpage>4</lpage>
                    <pub-id pub-id-type="medline">15689017</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref34">
                <label>34</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Kaplan</surname>
                            <given-names>B</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Harris-Salamone</surname>
                            <given-names>KD</given-names>
                        </name>
                    </person-group>
                    <article-title>Health IT success and failure: recommendations from literature and an AMIA workshop</article-title>
                    <source>J Am Med Inform Assoc</source>
                    <year>2009</year>
                    <volume>16</volume>
                    <issue>3</issue>
                    <fpage>291</fpage>
                    <lpage>9</lpage>
                    <pub-id pub-id-type="doi">10.1197/jamia.M2997</pub-id>
                    <pub-id pub-id-type="medline">19261935</pub-id>
                    <pub-id pub-id-type="pii">M2997</pub-id>
                    <pub-id pub-id-type="pmcid">PMC2732244</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref35">
                <label>35</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Mandl</surname>
                            <given-names>KD</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kohane</surname>
                            <given-names>IS</given-names>
                        </name>
                    </person-group>
                    <article-title>No small change for the health information economy</article-title>
                    <source>N Engl J Med</source>
                    <year>2009</year>
                    <month>03</month>
                    <day>26</day>
                    <volume>360</volume>
                    <issue>13</issue>
                    <fpage>1278</fpage>
                    <lpage>81</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://dx.doi.org/10.1056/NEJMp0900411" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1056/NEJMp0900411</pub-id>
                    <pub-id pub-id-type="medline">19321867</pub-id>
                    <pub-id pub-id-type="pii">360/13/1278</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref36">
                <label>36</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Brewin</surname>
                            <given-names>B</given-names>
                        </name>
                    </person-group>
                    <source>nextgov</source>
                    <year>2009</year>
                    <access-date>2010-02-25</access-date>
                    <comment>VA's Health Record System Cited as Model for a National Network<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.nextgov.com/nextgov/ng_20090327_6548.php">http://www.nextgov.com/nextgov/ng_20090327_6548.php</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">1267094598624215</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref37">
                <label>37</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Glaser</surname>
                            <given-names>JP</given-names>
                        </name>
                    </person-group>
                    <article-title>Seven durable ideas</article-title>
                    <source>J Am Med Inform Assoc</source>
                    <year>2008</year>
                    <volume>15</volume>
                    <issue>3</issue>
                    <fpage>267</fpage>
                    <lpage>71</lpage>
                    <pub-id pub-id-type="doi">10.1197/jamia.M2671</pub-id>
                    <pub-id pub-id-type="medline">18308978</pub-id>
                    <pub-id pub-id-type="pii">M2671</pub-id>
                    <pub-id pub-id-type="pmcid">PMC2409993</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref38">
                <label>38</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Weed</surname>
                            <given-names>LL</given-names>
                        </name>
                    </person-group>
                    <article-title>Clinical judgment revisited</article-title>
                    <source>Methods Inf Med</source>
                    <year>1999</year>
                    <month>12</month>
                    <volume>38</volume>
                    <issue>4-5</issue>
                    <fpage>279</fpage>
                    <lpage>86</lpage>
                    <pub-id pub-id-type="doi">10.1267/METH99040279</pub-id>
                    <pub-id pub-id-type="medline">10805013</pub-id>
                    <pub-id pub-id-type="pii">99040279</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref39">
                <label>39</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Raymond</surname>
                            <given-names>ES</given-names>
                        </name>
                    </person-group>
                    <source>Thyrsus Enterprises</source>
                    <year>2000</year>
                    <access-date>2010-02-25</access-date>
                    <comment>The Cathedral and the Bazaar: Version 3. 0<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.catb.org/~esr/writings/cathedral-bazaar/cathedral-bazaar/">http://www.catb.org/~esr/writings/cathedral-bazaar/cathedral-bazaar/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">1267094598624347</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref40">
                <label>40</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>McDonald</surname>
                            <given-names>CJ</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Schadow</surname>
                            <given-names>G</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Barnes</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Dexter</surname>
                            <given-names>P</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Overhage</surname>
                            <given-names>JM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Mamlin</surname>
                            <given-names>B</given-names>
                        </name>
                        <name name-style="western">
                            <surname>McCoy</surname>
                            <given-names>JM</given-names>
                        </name>
                    </person-group>
                    <article-title>Open Source software in medical informatics--why, how and what</article-title>
                    <source>Int J Med Inform</source>
                    <year>2003</year>
                    <month>03</month>
                    <volume>69</volume>
                    <issue>2-3</issue>
                    <fpage>175</fpage>
                    <lpage>84</lpage>
                    <pub-id pub-id-type="medline">12810121</pub-id>
                    <pub-id pub-id-type="pii">S1386505602001041</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref41">
                <label>41</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>von Krogh</surname>
                            <given-names>G</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Spaeth</surname>
                            <given-names>S</given-names>
                        </name>
                    </person-group>
                    <article-title>The open source software phenomenon: characteristics that promote research</article-title>
                    <source>The Journal of Strategic Information Systems</source>
                    <year>2007</year>
                    <volume>16</volume>
                    <issue>3</issue>
                    <fpage>236</fpage>
                    <lpage>253</lpage>
                    <pub-id pub-id-type="doi">10.1016/j.jsis.2007.06.001</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref42">
                <label>42</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Korin</surname>
                            <given-names>JB</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Quattrone</surname>
                            <given-names>MS</given-names>
                        </name>
                    </person-group>
                    <source>New Jersey Law Journal</source>
                    <year>2007</year>
                    <month>06</month>
                    <day>8</day>
                    <access-date>2010-02-25</access-date>
                    <comment>Litigation in the decade of electronic health records<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://www.ecri.org/Documents/News/NJ_Law_Journal_06082007_Quattrone.pdf">https://www.ecri.org/Documents/News/NJ_Law_Journal_06082007_Quattrone.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">1267094598624275</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref43">
                <label>43</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Morgan</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Finnegan</surname>
                            <given-names>P</given-names>
                        </name>
                    </person-group>
                    <article-title>How perceptions of open source software influence adoption: an exploratory study</article-title>
                    <source>Proceedings</source>
                    <year>2007</year>
                    <conf-name>15th European Conference on Information Systems (ECIS 2007)</conf-name>
                    <conf-date>June 7-9, 2007</conf-date>
                    <conf-loc>St Gallen, Switzerland</conf-loc>
                </nlm-citation>
            </ref>
            <ref id="ref44">
                <label>44</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Fitzgerald</surname>
                            <given-names>B</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kenny</surname>
                            <given-names>T</given-names>
                        </name>
                    </person-group>
                    <article-title>Open source software in the trenches: lessons from a large-scale OSS implementation</article-title>
                    <source>ISIS 2003 Proceedings</source>
                    <year>2003</year>
                    <conf-name>International Conference on Information Systems</conf-name>
                    <conf-date>Dec 14-17, 2003</conf-date>
                    <conf-loc>Seattle, Washington, USA</conf-loc>
                </nlm-citation>
            </ref>
            <ref id="ref45">
                <label>45</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Fitzgerald</surname>
                            <given-names>B</given-names>
                        </name>
                    </person-group>
                    <article-title>The transformation of open source software</article-title>
                    <source>Management Information Systems Quarterly</source>
                    <year>2006</year>
                    <volume>30</volume>
                    <issue>3</issue>
                    <fpage>587</fpage>
                    <lpage>598</lpage>
                </nlm-citation>
            </ref>
            <ref id="ref46">
                <label>46</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Watson</surname>
                            <given-names>RT</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Boudreau</surname>
                            <given-names>MC</given-names>
                        </name>
                        <name name-style="western">
                            <surname>York</surname>
                            <given-names>PT</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Greiner</surname>
                            <given-names>ME</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Wynn</surname>
                            <given-names>D</given-names>
                        </name>
                    </person-group>
                    <article-title>The business of open source</article-title>
                    <source>Communications of the ACM</source>
                    <year>2008</year>
                    <volume>51</volume>
                    <issue>4</issue>
                    <fpage>41</fpage>
                    <lpage>46</lpage>
                </nlm-citation>
            </ref>
            <ref id="ref47">
                <label>47</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Hoepman</surname>
                            <given-names>JH</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Jacobs</surname>
                            <given-names>B</given-names>
                        </name>
                    </person-group>
                    <article-title>Increased security through open source</article-title>
                    <source>Communications of the ACM</source>
                    <year>2007</year>
                    <volume>50</volume>
                    <issue>1</issue>
                    <fpage>79</fpage>
                    <lpage>83</lpage>
                </nlm-citation>
            </ref>
            <ref id="ref48">
                <label>48</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>US Bureau of Labor Statistics</collab>
                    </person-group>
                    <source>American National Employment Matrix</source>
                    <year>2008</year>
                    <access-date>2010-12-22</access-date>
                    <comment>Employment by Industry, Occupation, and Percent Distribution, 2008 and Projected 2018: 29-1060: Physicians and Surgeons<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="ftp://ftp.bls.gov/pub/special.requests/ep/ind-occ.matrix/occ_pdf/OCC_29-1060.pdf">ftp://ftp.bls.gov/pub/special.requests/ep/ind-occ.matrix/occ_pdf/OCC_29-1060.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5vAXwLRSD</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref49">
                <label>49</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Paulson</surname>
                            <given-names>JW</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Succi</surname>
                            <given-names>G</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Eberlein</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <article-title>An Empirical Study of Open-Source and Closed-Source Software Products</article-title>
                    <source>IEEE Transactions on Software Engineering</source>
                    <year>2004</year>
                    <volume>30</volume>
                    <issue>4</issue>
                    <fpage>246</fpage>
                    <lpage>256</lpage>
                    <pub-id pub-id-type="doi">10.1109/TSE.2004.1274044</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref50">
                <label>50</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Carnall</surname>
                            <given-names>D</given-names>
                        </name>
                    </person-group>
                    <article-title>Medical software's free future</article-title>
                    <source>BMJ</source>
                    <year>2000</year>
                    <month>10</month>
                    <day>21</day>
                    <volume>321</volume>
                    <issue>7267</issue>
                    <fpage>976</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://bmj.com/cgi/pmidlookup?view=long&#38;pmid=11039943" />
                    </comment>
                    <pub-id pub-id-type="medline">11039943</pub-id>
                    <pub-id pub-id-type="pmcid">PMC1118811</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref51">
                <label>51</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Lawrie</surname>
                            <given-names>T</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Gacek</surname>
                            <given-names>C</given-names>
                        </name>
                    </person-group>
                    <article-title>Issues of dependability in open source software development</article-title>
                    <source>ACM SIGSOFT Software Engineering Notes</source>
                    <year>2002</year>
                    <volume>27</volume>
                    <issue>3</issue>
                    <fpage>34</fpage>
                    <lpage>37</lpage>
                    <pub-id pub-id-type="doi">10.1145/638574.638584</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref52">
                <label>52</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Norris</surname>
                            <given-names>JS</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kamp</surname>
                            <given-names>PH</given-names>
                        </name>
                    </person-group>
                    <article-title>Mission-Critical Development with Open Source Software: Lessons Learned</article-title>
                    <source>IEEE Software</source>
                    <year>2004</year>
                    <volume>21</volume>
                    <issue>1</issue>
                    <fpage>42</fpage>
                    <lpage>49</lpage>
                    <pub-id pub-id-type="doi">10.1109/MS.2004.1259211</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref53">
                <label>53</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Lewis</surname>
                            <given-names>JA</given-names>
                        </name>
                    </person-group>
                    <source>Center for Strategic and International Studies</source>
                    <year>2008</year>
                    <access-date>2010-12-21</access-date>
                    <comment>Government Open Source Policies<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://csis.org/files/media/csis/pubs/0807218_government_opensource_policies.pdf">http://csis.org/files/media/csis/pubs/0807218_government_opensource_policies.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5v9CCt35Q</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref54">
                <label>54</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Trotter</surname>
                            <given-names>F</given-names>
                        </name>
                    </person-group>
                    <source>FredTrotter.com</source>
                    <year>2007</year>
                    <access-date>2010-02-25</access-date>
                    <comment>Why Is VistA Good? The VistA Open Source Development Model<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.fredtrotter.com/2007/11/10/why-is-vista-good-the-vista-open-source-development-model/">http://www.fredtrotter.com/2007/11/10/why-is-vista-good-the-vista-open-source-development-model/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">1267094598624398</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref55">
                <label>55</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Trotter</surname>
                            <given-names>F</given-names>
                        </name>
                    </person-group>
                    <source>Vistapedia</source>
                    <year>2010</year>
                    <access-date>2010-12-21</access-date>
                    <comment>What is VistA Really<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://vistapedia.net/index.php?title=What_is_VistA_Really">http://vistapedia.net/index.php?title=What_is_VistA_Really</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5v9CEWXaY</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref56">
                <label>56</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>UK Cabinet Office e-Government Unit</collab>
                    </person-group>
                    <source>UK Office of Government Commerce</source>
                    <access-date>2010-12-21</access-date>
                    <comment>Open Source Software Use within UK Government. Version 2<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://interim.cabinetoffice.gov.uk/media/253410/oss_policy_version2.pdf">http://interim.cabinetoffice.gov.uk/media/253410/oss_policy_version2.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5v9CFmB1E</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref57">
                <label>57</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>Chief Information Officer</collab>
                        <collab>Department of the Navy</collab>
                    </person-group>
                    <source>US Department of the Navy</source>
                    <year>2007</year>
                    <access-date>2010-02-25</access-date>
                    <comment>Department of the Navy Open Source Software Guidance<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.doncio.navy.mil/Download.aspx?AttachID=261">http://www.doncio.navy.mil/Download.aspx?AttachID=261</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">1267094598624340</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref58">
                <label>58</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>Chief Information Officer</collab>
                        <collab>Department of Defense</collab>
                    </person-group>
                    <source>US Department of Defense</source>
                    <year>2003</year>
                    <access-date>2010-02-25</access-date>
                    <comment>Open Source Software (OSS) in the Department of Defense (DoD)<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.terrybollinger.com/stenbitmemo/stenbitmemo_pdf.pdf">http://www.terrybollinger.com/stenbitmemo/stenbitmemo_pdf.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">1267094598624333</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref59">
                <label>59</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Wyatt</surname>
                            <given-names>JC</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Wyatt</surname>
                            <given-names>SM</given-names>
                        </name>
                    </person-group>
                    <article-title>When and how to evaluate health information systems?</article-title>
                    <source>Int J Med Inform</source>
                    <year>2003</year>
                    <month>03</month>
                    <volume>69</volume>
                    <issue>2-3</issue>
                    <fpage>251</fpage>
                    <lpage>9</lpage>
                    <pub-id pub-id-type="medline">12810128</pub-id>
                    <pub-id pub-id-type="pii">S1386505602001089</pub-id>
                </nlm-citation>
            </ref>
        </ref-list>
    </back>
</article>
