Julius Ogony, Ali Karisa, Mysha Sissine, Benard Ajwang, Joshua Oiro, Donna Medeiros, Bobby Jefferson
View Full Paper
[1] Geoffrey H. Wold (1997), Disaster RecoveryPlanning Process. Systems Support, Inc. pp. 214-232. [2] Austin, C., Trimm, J., Sobczak, M. (1995)Information Systems and Strategic Management.Health Care Management Review, Vol. 20 No. 3,pp. 26-33. [3] Campbell EM. Sittig DF. Guappone KP. DykstraRH. Ash JS. (2007) Overdependence onTechnology: an unintended adverse consequence ofcomputerized provider order entry. AnnualSymposium Proceedings/AMIA Symposium. [4] Johnson, M.E. and Goetz, E. (2007) EmbeddingInformation Security into the Organization, IEEESecurity and Privacy, vol. 5, no. 3, pp. 16-24. [5] Dynes, S. (2006) Information Security and HealthCare – A Field Study of a Hospital After A WormEventhttp://mba.tuck.dartmouth.edu/digital/Research/ResearchProjects/InfoSecHealthCare.pdfAccessed 17-Jun-2014
Important Links:
Go Back