Reference Links
HIPAA
1. US Department of Health and Human Services – HIPAA
Enforcement training for State Atty General
http://www.hhshipaasagtraining.com/browse.php
2. HIPAA
Training Resources
https://www.hhs.gov/hipaa/for-professionals/training/index.html
3. HIPAA Audit Checklist part2
4. HIPAA Enforcement
https://hipaahealthlaw.foxrothschild.com/articles/hipaa-enforcement/
5. HIPAA Business Associates
https://hipaahealthlaw.foxrothschild.com/articles/business-associates/
6. Privacy and Security
https://hipaahealthlaw.foxrothschild.com/articles/privacy/
7. Sullivan, Tom. "HHS Makes 'sweeping' Changes to HIPAA."
Healthcare IT News. N.p., 18 Jan. 2013. Web. 31 Jan. 2013.
<http://www.healthcareitnews.com/news/hhs-makes-sweeping-changes-hipaa?single-page=true>.
8. Sullivan, Tom. "Quick Parse: 4 Parts to HIPAA Final Rule
on Privacy and Security | Government Health IT." RSS. N.p., 17 Jan. 2013. Web.
31 Jan. 2013.
<http://www.govhealthit.com/news/quick-parse-4-parts-hipaa-final-rule-privacy-and-security>.
9. Sullivan, Tom. "PhysBizTech." Final HIPAA Rule Puts
Proof Burden on Covered Entities. N.p., 2013. Web. 31 Jan. 2013.
<http://www.physbiztech.com/news/final-hipaa-rule-puts-proof-burden-covered-entities?email=chizhang@spsu.edu>.
10. Sullivan, Tom, and Mary Mosquera. "New HIPAA Rule Seen
as Tougher." Healthcare IT News. N.p., 18 Jan. 2013. Web. 31 Jan. 2013.
<http://www.healthcareitnews.com/news/new-hipaa-rule-seen-tougher?single-page=true>.
ITIL
1. What is IT Strategy?
http://searchcio.techtarget.com/definition/IT-strategy-information-technology-strategy
2. Implementing component reuse strategy inc complex
products environments
3. DOI System Documentation Archive-
http://www.doi.org/publications.html
4. Computer Systems Laboratory Bulletin. Threats to
Computer Systems: An Overview, Retrieved on 23 October, 2012 from,
http://csrc.nist.gov/publications/nistbul/csl94-03.txt
5. Information on Project Risk Management, Retrieved on 23
October, 2012 from,
http://www.netcomuk.co.uk/~rtusler/project/riskprin.html
6. Applegate, L. M., Austin, R. D., McFarlan, F. W., &
Applegate, L. M. (2003). The iPremier Company: Denial of Service Attack. In
Corporate information strategy and management: Text and cases (pp. 491-499).
Boston: McGraw-Hill Irwin.