메뉴 건너뛰기




Volumn 3, Issue 2, 1996, Pages 139-148

Privacy, Confidentiality, and Electronic Medical Records

Author keywords

[No Author keywords available]

Indexed keywords

COMPARATIVE STUDY; COMPUTER SECURITY; CONFIDENTIALITY; FACTUAL DATABASE; INFORMED CONSENT; LEGAL ASPECT; MEDICAL RECORD; REVIEW; STANDARD;

EID: 57349200762     PISSN: 10806040     EISSN: None     Source Type: Journal    
DOI: 10.1136/jamia.1996.96236282     Document Type: Review
Times cited : (251)

References (42)
  • 1
    • 0014697293 scopus 로고
    • Privacy, confidentiality and other legal considerations in the establishment of a centralized health-data system
    • Curran WJ, Steams B, Kaplan H. Privacy, confidentiality and other legal considerations in the establishment of a centralized health-data system. N Engl J Med. 1968;281:241-8.
    • (1968) N Engl J Med , vol.281 , pp. 241-248
    • Curran, W.J.1    Steams, B.2    Kaplan, H.3
  • 3
    • 1842533169 scopus 로고
    • Standards for privacy in medical information systems: A technico-legel revolution
    • Miller RA, ed. Los Alamitas, CA: IEEE Computer Society Press
    • Brannigan V, Beier B. Standards for privacy in medical information systems: a technico-legel revolution. In: Miller RA, ed. Proceedings of the Fourteenth Annual Symposium for Computer Applications in Medical Care. Los Alamitas, CA: IEEE Computer Society Press, 1990:266-70.
    • (1990) Proceedings of the Fourteenth Annual Symposium for Computer Applications in Medical Care , pp. 266-270
    • Brannigan, V.1    Beier, B.2
  • 5
    • 1842428752 scopus 로고
    • Chicago: AHIMA, March
    • American Health Information Management Association. Position Statement. Chicago: AHIMA, March 1992:1.
    • (1992) Position Statement , pp. 1
  • 6
    • 0026915376 scopus 로고
    • Open architecture and integrated information at Columbia-Presbyterian Medical Center
    • Clayton PD, Sideli RV, Sengupta S. Open architecture and integrated information at Columbia-Presbyterian Medical Center. MD Comput. 1992;9:297-303.
    • (1992) MD Comput , vol.9 , pp. 297-303
    • Clayton, P.D.1    Sideli, R.V.2    Sengupta, S.3
  • 7
    • 84937665422 scopus 로고
    • System and data protection
    • Ball MJ, Collen MF, eds. New York: Springer-Verlag
    • Murphy G. System and data protection. In: Ball MJ, Collen MF, eds. Aspects of the Computer-based Patient Record. New York: Springer-Verlag, 1992:201-13.
    • (1992) Aspects of the Computer-based Patient Record , pp. 201-213
    • Murphy, G.1
  • 8
    • 0027015208 scopus 로고
    • Development of a model of information security requirements for enterprise-wide medical information systems
    • Frisse ME, ed. New York: McGraw-Hill
    • Orr GA, Brantley BA. Development of a model of information security requirements for enterprise-wide medical information systems. In: Frisse ME, ed. Proceedings of the Sixteenth Annual Symposium for Computer Applications in Medical Care. New York: McGraw-Hill, 1992:287-91.
    • (1992) Proceedings of the Sixteenth Annual Symposium for Computer Applications in Medical Care , pp. 287-291
    • Orr, G.A.1    Brantley, B.A.2
  • 10
    • 0004749315 scopus 로고
    • Security in medical information systems
    • van Bemmel JH, McCray AT, eds. New York: Shattauer
    • Bakker AR. Security in medical information systems. In: van Bemmel JH, McCray AT, eds. Yearbook of Medical Informatics. New York: Shattauer, 1993:52-60.
    • (1993) Yearbook of Medical Informatics , pp. 52-60
    • Bakker, A.R.1
  • 13
    • 0027581336 scopus 로고
    • Privacy: A real-world problem with fuzzy boundaries
    • Lincoln TL. Privacy: a real-world problem with fuzzy boundaries. Methods Inf Med. 1993;32:104-7.
    • (1993) Methods Inf Med , vol.32 , pp. 104-107
    • Lincoln, T.L.1
  • 14
    • 0027609384 scopus 로고
    • A survey of intrusion detection techniques
    • Lunt LT. A survey of intrusion detection techniques. Comput Security, 1993;12:405-18.
    • (1993) Comput Security , vol.12 , pp. 405-418
    • Lunt, L.T.1
  • 20
    • 0028371768 scopus 로고
    • Clinical requirements for the security of the electronic patient record
    • Bengtsson S. Clinical requirements for the security of the electronic patient record. Int J Biomed Comput. 1994;35(suppl 1): 29-31.
    • (1994) Int J Biomed Comput , vol.35 , Issue.1 SUPPL. , pp. 29-31
    • Bengtsson, S.1
  • 21
    • 0028372210 scopus 로고
    • Security for decentralized health information systems
    • Bleumer G. Security for decentralized health information systems. Int J Biomed Comput. 1994;35(suppl 1):140-5.
    • (1994) Int J Biomed Comput , vol.35 , Issue.1 SUPPL. , pp. 140-145
    • Bleumer, G.1
  • 22
    • 0028185277 scopus 로고
    • A framework for "need to know" authorizations in medical computer systems: Responding to the constitutional requirements
    • Ozbolt JG, ed. Proceedings of the Eighteenth Annual Symposium on Computer Applications in Medical Care
    • Brannigan VM. A framework for "need to know" authorizations in medical computer systems: responding to the constitutional requirements. In: Ozbolt JG, ed. Proceedings of the Eighteenth Annual Symposium on Computer Applications in Medical Care, JAMIA. 1994 suppl:392-6.
    • (1994) JAMIA , Issue.SUPPL. , pp. 392-396
    • Brannigan, V.M.1
  • 23
    • 0028249080 scopus 로고
    • The development of a data security model for the collaborative social and medical services system
    • Ozbolt JG, ed. Proceedings of the Eighteenth Annual Symposium on Computer Applications in Medical Care
    • Dargahi R, Classen DW, Bobroff RB, et al. The development of a data security model for the collaborative social and medical services system. In: Ozbolt JG, ed. Proceedings of the Eighteenth Annual Symposium on Computer Applications in Medical Care. JAMIA. 1994 suppl:349-53.
    • (1994) JAMIA , Issue.SUPPL. , pp. 349-353
    • Dargahi, R.1    Classen, D.W.2    Bobroff, R.B.3
  • 24
    • 0028371253 scopus 로고
    • The need for security - A clinical view
    • France FH, Gaunt PN. The need for security - a clinical view. Int J Biomed Comput 1994;35(suppl 1):189-94.
    • (1994) Int J Biomed Comput , vol.35 , Issue.1 SUPPL. , pp. 189-194
    • France, F.H.1    Gaunt, P.N.2
  • 26
    • 0028369723 scopus 로고
    • Security audit center - A suggested model for effective audit strategies in health care informatics
    • Hayam A. Security audit center - a suggested model for effective audit strategies in health care informatics. Int J Biomed Comput. 1994;35(suppl 1):116-27.
    • (1994) Int J Biomed Comput , vol.35 , Issue.1 SUPPL. , pp. 116-127
    • Hayam, A.1
  • 27
    • 1842533119 scopus 로고
    • September provided by Dr. Christopher D. Chute, Section of Medical Information Resources, Mayo Clinic/Foundation, Rochester, MN
    • Information Security Subcommittee, Mayo Clinic/Foundation. Data Security Policies and Standards; September 1994 (provided by Dr. Christopher D. Chute, Section of Medical Information Resources, Mayo Clinic/Foundation, Rochester, MN).
    • (1994) Data Security Policies and Standards
  • 28
    • 85163452333 scopus 로고
    • Confidentiality and privacy of personal data
    • Donaldson MS, Lohr KN, eds. Washington, DC: National Academy Press
    • Institute of Medicine. Confidentiality and privacy of personal data. In: Donaldson MS, Lohr KN, eds. Health Data in the Information Age: Use, Disclosure, and Privacy. Washington, DC: National Academy Press, 1994.
    • (1994) Health Data in the Information Age: Use, Disclosure, and Privacy
  • 29
    • 0028371964 scopus 로고
    • An accountability server for health care information systems
    • Kowalski S. An accountability server for health care information systems. Int J Biomed Comput. 1994;35(suppl 1):130-8.
    • (1994) Int J Biomed Comput , vol.35 , Issue.1 SUPPL. , pp. 130-138
    • Kowalski, S.1
  • 30
    • 0003900915 scopus 로고
    • Technical Report CSD-TR-94-013. COAST Project, Dept of Computer Sciences, Purdue University, West Lafayette, IN, June 17
    • Kumar S, Spafford EH. An application of pattern matching in intrusion detection. Technical Report CSD-TR-94-013. COAST Project, Dept of Computer Sciences, Purdue University, West Lafayette, IN, June 17, 1994.
    • (1994) An Application of Pattern Matching in Intrusion Detection
    • Kumar, S.1    Spafford, E.H.2
  • 31
    • 0028538980 scopus 로고
    • Safeguarding the confidentiality of automated medical information
    • Lawrence LM. Safeguarding the confidentiality of automated medical information. Jt Comm J Qual Improv. 1994;20:639-46.
    • (1994) Jt Comm J Qual Improv , vol.20 , pp. 639-646
    • Lawrence, L.M.1
  • 33
    • 0028370053 scopus 로고
    • Health information policy: Without confidentiality
    • Robinson DM. Health information policy: without confidentiality. Int J Biomed Comput 1994;35(suppl 1):97-104.
    • (1994) Int J Biomed Comput , vol.35 , Issue.1 SUPPL. , pp. 97-104
    • Robinson, D.M.1
  • 34
    • 0028476743 scopus 로고
    • Security versus access: Trade-offs are only part of the story
    • Shea S. Security versus access: trade-offs are only part of the story. JAMIA. 1994;1:314-5.
    • (1994) JAMIA , vol.1 , pp. 314-315
    • Shea, S.1
  • 36
    • 0028477729 scopus 로고
    • Against simple universal health-care identifiers
    • Szolovits P, Kohane I. Against simple universal health-care identifiers. JAMIA. 1994;1:316-9.
    • (1994) JAMIA , vol.1 , pp. 316-319
    • Szolovits, P.1    Kohane, I.2
  • 38
    • 0007323883 scopus 로고
    • Online medical records raise privacy fears
    • March 22
    • Davis R. Online medical records raise privacy fears. USA Today. March 22, 1995:A:1.4.
    • (1995) USA Today , vol.A , pp. 14
    • Davis, R.1
  • 41
    • 1842481196 scopus 로고    scopus 로고
    • Senate Bill 1360: The Medical Records Confidentiality Act of 1995. 104th Congress, 1st Session
    • Senate Bill 1360: The Medical Records Confidentiality Act of 1995. 104th Congress, 1st Session.
  • 42
    • 1842585737 scopus 로고
    • Briefings on the JCAHO. Information management (IM)
    • Marblehead, MA: Opus Communications, ISBN 1-885829-14-0
    • Paskavitz MR, ed. Briefings on the JCAHO. Information management (IM). Special Report Review and Analysis: 1996 JCAHO Standards. Marblehead, MA: Opus Communications, 1995; 16-18 (ISBN 1-885829-14-0).
    • (1995) Special Report Review and Analysis: 1996 JCAHO Standards , pp. 16-18
    • Paskavitz, M.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.