Reference Links

HIPAA

1. US Department of Health and Human Services – HIPAA Enforcement training for State Atty General

http://www.hhshipaasagtraining.com/browse.php

2.  HIPAA Training Resources

https://www.hhs.gov/hipaa/for-professionals/training/index.html

3. HIPAA Audit Checklist part2

https://hipaahealthlaw.foxrothschild.com/2016/04/articles/business-associates/a-checklist-to-get-ready-for-the-hipaa-audits-part-2/

4. HIPAA Enforcement

https://hipaahealthlaw.foxrothschild.com/articles/hipaa-enforcement/

5. HIPAA Business Associates

https://hipaahealthlaw.foxrothschild.com/articles/business-associates/

6. Privacy and Security

https://hipaahealthlaw.foxrothschild.com/articles/privacy/

7. Sullivan, Tom. "HHS Makes 'sweeping' Changes to HIPAA." Healthcare IT News. N.p., 18 Jan. 2013. Web. 31 Jan. 2013. <http://www.healthcareitnews.com/news/hhs-makes-sweeping-changes-hipaa?single-page=true>.

8. Sullivan, Tom. "Quick Parse: 4 Parts to HIPAA Final Rule on Privacy and Security | Government Health IT." RSS. N.p., 17 Jan. 2013. Web. 31 Jan. 2013. <http://www.govhealthit.com/news/quick-parse-4-parts-hipaa-final-rule-privacy-and-security>.

9. Sullivan, Tom. "PhysBizTech." Final HIPAA Rule Puts Proof Burden on Covered Entities. N.p., 2013. Web. 31 Jan. 2013. <http://www.physbiztech.com/news/final-hipaa-rule-puts-proof-burden-covered-entities?email=chizhang@spsu.edu>.

10. Sullivan, Tom, and Mary Mosquera. "New HIPAA Rule Seen as Tougher." Healthcare IT News. N.p., 18 Jan. 2013. Web. 31 Jan. 2013. <http://www.healthcareitnews.com/news/new-hipaa-rule-seen-tougher?single-page=true>.

 

 

ITIL

1. What is IT Strategy?

http://searchcio.techtarget.com/definition/IT-strategy-information-technology-strategy

2. Implementing component reuse strategy inc complex products environments

http://cacm.acm.org/magazines/2007/12/5512-implementing-component-reuse-strategy-in-complex-products-environments/abstract

3. DOI System Documentation Archive-

http://www.doi.org/publications.html

4. Computer Systems Laboratory Bulletin. Threats to Computer Systems: An Overview, Retrieved on 23 October, 2012 from, http://csrc.nist.gov/publications/nistbul/csl94-03.txt

5. Information on Project Risk Management, Retrieved on 23 October, 2012 from, http://www.netcomuk.co.uk/~rtusler/project/riskprin.html

6. Applegate, L. M., Austin, R. D., McFarlan, F. W., & Applegate, L. M. (2003). The iPremier Company: Denial of Service Attack. In Corporate information strategy and management: Text and cases (pp. 491-499). Boston: McGraw-Hill Irwin.

Homepage