
 
Traceability of patient records usage: barriers and 
opportunities for improving user interface design and 
data management. Studies in Health Technologies and 
Informatics, vol. 169, pp. 275-279. 
Cruz-Correia, R., Vieira-Marques, P., Costa, P., Ferreira, 
A., Oliveira-Palhares, E., Araújo, F., Costa-Pereira, 
A., 2005. Integration of Hospital data using Agent 
Technologies – a case study. AICommunications 
special issue of ECAI, 18(3):191-200. 
Cruz-Correia, R., Vieira-Marques, P., Ferreira, A., 
Almeida, F., Wyatt, J., Costa-Pereira, A., 2007. 
Reviewing the integration of patient data: how systems 
are evolving in practice to meet patient needs. BMC 
Medical Informatics and Decision Making, 7(14). 
Farinha, P., Cruz-Correia, R., Antunes, L., Almeida, F., 
Ferreira, A., 2010. From legislation to practice: a case 
study of break the glass in healthcare. Proceedings of 
the International Conference on Health Informatics, 
114-120. 
Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, R., 
Chandramouli, R., 2001. Proposed NIST Standard for 
Role-based Access Control. ACM Transactions on 
Information and systems security, 4(3): 224-274. 
Ferreira, A., Antunes, L., Chadwick, D., Cruz-Correia, R., 
2010. Grounding Information Security in Healthcare. 
International Journal of Medical Informatics, 79(4): 
268-283. 
Ferreira, A., Correia-Cruz, R., Antunes, L., 2011a. 
Usability of authentication and access control: a case 
study in healthcare. IEEE International Carnahan 
Conference on Security Technology, 1-7. 
Ferreira, A., Cruz-Correia, R., Chadwick, D., Santos, H., 
Gomes, R., Reis, D., Antunes,  L., 2011b. Password 
sharing and how to reduce it. Certification and 
Security in Health-Related Web Applications: 
Concepts and Solutions, 243-263. 
Ferreira, A., Cruz-Correia, R., Antunes, L., Farinha, P., 
Oliveira-Palhares, E., Chadwick, D. W., Costa-Pereira, 
A., 2006. How to break access control in a controlled 
manner? Proceedings of the 19th IEEE Symposium on 
Computer-Based Medical Systems, 847-851. 
Harris, S., 2012. CISSP All-in-one Exam Guide.  McGraw-
Hill Osborne Media. 6
th
 Edition. 
Iglesias, J., Angelov, P., Ledezma, A., Sanchis, A., 2012. 
Creating evolving user behavior profiles 
automatically.  IEEE Trasactions on Knowledge and 
data engineering, 24(5): 854-867. 
Kainda, R., Flechais, I., Roscoe, A.W., 2010. Security and 
usability: analysis and evaluation. International 
conference on Availability, Reliability and Security,  
275 – 282. 
Kuo, C., Romanosky, S., Cranor, L., 2006. Human 
Selection of Mnemonic Phrase-Based Passwords. 
Symposium on usable privacy and security (SOUPS), 
67-78. 
Lehoux, P., Sicotte, C., Denis, J., 1999. Assessment of a 
computerized medical record system: disclosing 
scripts of use. Evaluation and Program Planning, 22( 
4): 439-53. 
NHS care records service, 2012. NHS Connecting for 
Health.  Sealing Overview. Accessed at: 
http://www.connectingforhealth.nhs.uk/elearning/scr/s
cr2008b/modules/scr07_sealing/t1/scr07t1p1.htm.  
Accessed on the 13th December 2012. 
Palanque, P., Barboni, E., Martinie, C., Navare, D., 
Winckler, M., 2011. Proceedings of the 3rd ACM 
SIGCHI symposium on Engineering interactive 
computing systems, 21-30. 
Redish, J., Dumas, J., 1999. A Practical Guide to Usability 
Testing. Intellect Ltd. 
Saltzer, J., Schroeder, M., 1975. The protection of 
Information in Computer Systems. Proceedings of the 
IEEE, 63(9): 1278-1308. 
Santos-Pereira, Cátia., Augusto, Alexandre., Correia, 
Manuel., Ferreira, Ana., Cruz-Correia, Ricardo., 2012. 
A Mobile Based Authorization Mechanism for Patient 
Managed Role Based Access Control. Information 
Technology in Bio and Medical Informatics. Lecture 
Notes in Computer Science, 7451: 54-68. 
Sasse A., 2003. Computer Security: Anatomy of a 
Usability Disaster and a Plan for Recovery. 
Proceedings of CHI2003 Workshop on Human-
Computer Interaction and Security Systems. 
Schneier, B., 2000. Secrets and Lies: digital security in a 
networked world. 1st ed.: John Wiley &Sons 
Shun-Hua, T., Miao, C., Guo-Hai, Y., 2010. User behavior 
mining on large scale web log data. International 
Conference on Apperceiving Computing and 
Intelligence Analysis, 60-63. 
Whitten, A., Tygar, J., 1999. Why Johnny can’t encrypt: a 
usability evaluation of PGP 5.0. Proceedings of 8th 
USENIX Security Symposium, 169-183. 
Xhafa, F., Ruiz, J., Caballe, S., Spaho, E., Barolli, L., 
Miho, R., 2012. Massive Processing of Activity Logs 
of a Virtual Campus. Third International Conference 
on Emerging Intelligent Data and Web Technologies, 
104-110. 
ZIshuang, Ye., Smith, S., 2005. Trusted Paths for 
Browsers.  ACM transactions in information systems 
security, 8(2): 153-186.
 
LogAnalysisofHumanComputerInteractionsRegardingBreakTheGlassAccessestoGeneticReports
53