-
1
-
-
0014697293
-
Privacy, confidentiality and other legal considerations in the establishment of a centralized health-data system
-
Curran WJ, Steams B, Kaplan H. Privacy, confidentiality and other legal considerations in the establishment of a centralized health-data system. N Engl J Med. 1968;281:241-8.
-
(1968)
N Engl J Med
, vol.281
, pp. 241-248
-
-
Curran, W.J.1
Steams, B.2
Kaplan, H.3
-
3
-
-
1842533169
-
Standards for privacy in medical information systems: A technico-legel revolution
-
Miller RA, ed. Los Alamitas, CA: IEEE Computer Society Press
-
Brannigan V, Beier B. Standards for privacy in medical information systems: a technico-legel revolution. In: Miller RA, ed. Proceedings of the Fourteenth Annual Symposium for Computer Applications in Medical Care. Los Alamitas, CA: IEEE Computer Society Press, 1990:266-70.
-
(1990)
Proceedings of the Fourteenth Annual Symposium for Computer Applications in Medical Care
, pp. 266-270
-
-
Brannigan, V.1
Beier, B.2
-
5
-
-
1842428752
-
-
Chicago: AHIMA, March
-
American Health Information Management Association. Position Statement. Chicago: AHIMA, March 1992:1.
-
(1992)
Position Statement
, pp. 1
-
-
-
6
-
-
0026915376
-
Open architecture and integrated information at Columbia-Presbyterian Medical Center
-
Clayton PD, Sideli RV, Sengupta S. Open architecture and integrated information at Columbia-Presbyterian Medical Center. MD Comput. 1992;9:297-303.
-
(1992)
MD Comput
, vol.9
, pp. 297-303
-
-
Clayton, P.D.1
Sideli, R.V.2
Sengupta, S.3
-
7
-
-
84937665422
-
System and data protection
-
Ball MJ, Collen MF, eds. New York: Springer-Verlag
-
Murphy G. System and data protection. In: Ball MJ, Collen MF, eds. Aspects of the Computer-based Patient Record. New York: Springer-Verlag, 1992:201-13.
-
(1992)
Aspects of the Computer-based Patient Record
, pp. 201-213
-
-
Murphy, G.1
-
8
-
-
0027015208
-
Development of a model of information security requirements for enterprise-wide medical information systems
-
Frisse ME, ed. New York: McGraw-Hill
-
Orr GA, Brantley BA. Development of a model of information security requirements for enterprise-wide medical information systems. In: Frisse ME, ed. Proceedings of the Sixteenth Annual Symposium for Computer Applications in Medical Care. New York: McGraw-Hill, 1992:287-91.
-
(1992)
Proceedings of the Sixteenth Annual Symposium for Computer Applications in Medical Care
, pp. 287-291
-
-
Orr, G.A.1
Brantley, B.A.2
-
9
-
-
0027022826
-
Network information security in a Phase III Integrated Academic Information Management System (IAIMS)
-
Frisse ME, ed. New York: McGraw-Hill
-
Shea S, Sengupta S, Crosswell A, Clayton PD. Network information security in a Phase III Integrated Academic Information Management System (IAIMS). In: Frisse ME, ed. Proceedings of the Sixteenth Annual Symposium for Computer Applications in Medical Care. New York: McGraw-Hill, 1992:283-6.
-
(1992)
Proceedings of the Sixteenth Annual Symposium for Computer Applications in Medical Care
, pp. 283-286
-
-
Shea, S.1
Sengupta, S.2
Crosswell, A.3
Clayton, P.D.4
-
10
-
-
0004749315
-
Security in medical information systems
-
van Bemmel JH, McCray AT, eds. New York: Shattauer
-
Bakker AR. Security in medical information systems. In: van Bemmel JH, McCray AT, eds. Yearbook of Medical Informatics. New York: Shattauer, 1993:52-60.
-
(1993)
Yearbook of Medical Informatics
, pp. 52-60
-
-
Bakker, A.R.1
-
11
-
-
0027384143
-
Privacy and security of personal information in a new health care system
-
Gostin LO, Turek-Brezina J, Powers M, Kozloff R, Faden R, Steinauer DD. Privacy and security of personal information in a new health care system. JAMA. 1993;270:2487-93.
-
(1993)
JAMA
, vol.270
, pp. 2487-2493
-
-
Gostin, L.O.1
Turek-Brezina, J.2
Powers, M.3
Kozloff, R.4
Faden, R.5
Steinauer, D.D.6
-
13
-
-
0027581336
-
Privacy: A real-world problem with fuzzy boundaries
-
Lincoln TL. Privacy: a real-world problem with fuzzy boundaries. Methods Inf Med. 1993;32:104-7.
-
(1993)
Methods Inf Med
, vol.32
, pp. 104-107
-
-
Lincoln, T.L.1
-
14
-
-
0027609384
-
A survey of intrusion detection techniques
-
Lunt LT. A survey of intrusion detection techniques. Comput Security, 1993;12:405-18.
-
(1993)
Comput Security
, vol.12
, pp. 405-418
-
-
Lunt, L.T.1
-
20
-
-
0028371768
-
Clinical requirements for the security of the electronic patient record
-
Bengtsson S. Clinical requirements for the security of the electronic patient record. Int J Biomed Comput. 1994;35(suppl 1): 29-31.
-
(1994)
Int J Biomed Comput
, vol.35
, Issue.1 SUPPL.
, pp. 29-31
-
-
Bengtsson, S.1
-
21
-
-
0028372210
-
Security for decentralized health information systems
-
Bleumer G. Security for decentralized health information systems. Int J Biomed Comput. 1994;35(suppl 1):140-5.
-
(1994)
Int J Biomed Comput
, vol.35
, Issue.1 SUPPL.
, pp. 140-145
-
-
Bleumer, G.1
-
22
-
-
0028185277
-
A framework for "need to know" authorizations in medical computer systems: Responding to the constitutional requirements
-
Ozbolt JG, ed. Proceedings of the Eighteenth Annual Symposium on Computer Applications in Medical Care
-
Brannigan VM. A framework for "need to know" authorizations in medical computer systems: responding to the constitutional requirements. In: Ozbolt JG, ed. Proceedings of the Eighteenth Annual Symposium on Computer Applications in Medical Care, JAMIA. 1994 suppl:392-6.
-
(1994)
JAMIA
, Issue.SUPPL.
, pp. 392-396
-
-
Brannigan, V.M.1
-
23
-
-
0028249080
-
The development of a data security model for the collaborative social and medical services system
-
Ozbolt JG, ed. Proceedings of the Eighteenth Annual Symposium on Computer Applications in Medical Care
-
Dargahi R, Classen DW, Bobroff RB, et al. The development of a data security model for the collaborative social and medical services system. In: Ozbolt JG, ed. Proceedings of the Eighteenth Annual Symposium on Computer Applications in Medical Care. JAMIA. 1994 suppl:349-53.
-
(1994)
JAMIA
, Issue.SUPPL.
, pp. 349-353
-
-
Dargahi, R.1
Classen, D.W.2
Bobroff, R.B.3
-
24
-
-
0028371253
-
The need for security - A clinical view
-
France FH, Gaunt PN. The need for security - a clinical view. Int J Biomed Comput 1994;35(suppl 1):189-94.
-
(1994)
Int J Biomed Comput
, vol.35
, Issue.1 SUPPL.
, pp. 189-194
-
-
France, F.H.1
Gaunt, P.N.2
-
26
-
-
0028369723
-
Security audit center - A suggested model for effective audit strategies in health care informatics
-
Hayam A. Security audit center - a suggested model for effective audit strategies in health care informatics. Int J Biomed Comput. 1994;35(suppl 1):116-27.
-
(1994)
Int J Biomed Comput
, vol.35
, Issue.1 SUPPL.
, pp. 116-127
-
-
Hayam, A.1
-
27
-
-
1842533119
-
-
September provided by Dr. Christopher D. Chute, Section of Medical Information Resources, Mayo Clinic/Foundation, Rochester, MN
-
Information Security Subcommittee, Mayo Clinic/Foundation. Data Security Policies and Standards; September 1994 (provided by Dr. Christopher D. Chute, Section of Medical Information Resources, Mayo Clinic/Foundation, Rochester, MN).
-
(1994)
Data Security Policies and Standards
-
-
-
28
-
-
85163452333
-
Confidentiality and privacy of personal data
-
Donaldson MS, Lohr KN, eds. Washington, DC: National Academy Press
-
Institute of Medicine. Confidentiality and privacy of personal data. In: Donaldson MS, Lohr KN, eds. Health Data in the Information Age: Use, Disclosure, and Privacy. Washington, DC: National Academy Press, 1994.
-
(1994)
Health Data in the Information Age: Use, Disclosure, and Privacy
-
-
-
29
-
-
0028371964
-
An accountability server for health care information systems
-
Kowalski S. An accountability server for health care information systems. Int J Biomed Comput. 1994;35(suppl 1):130-8.
-
(1994)
Int J Biomed Comput
, vol.35
, Issue.1 SUPPL.
, pp. 130-138
-
-
Kowalski, S.1
-
30
-
-
0003900915
-
-
Technical Report CSD-TR-94-013. COAST Project, Dept of Computer Sciences, Purdue University, West Lafayette, IN, June 17
-
Kumar S, Spafford EH. An application of pattern matching in intrusion detection. Technical Report CSD-TR-94-013. COAST Project, Dept of Computer Sciences, Purdue University, West Lafayette, IN, June 17, 1994.
-
(1994)
An Application of Pattern Matching in Intrusion Detection
-
-
Kumar, S.1
Spafford, E.H.2
-
31
-
-
0028538980
-
Safeguarding the confidentiality of automated medical information
-
Lawrence LM. Safeguarding the confidentiality of automated medical information. Jt Comm J Qual Improv. 1994;20:639-46.
-
(1994)
Jt Comm J Qual Improv
, vol.20
, pp. 639-646
-
-
Lawrence, L.M.1
-
33
-
-
0028370053
-
Health information policy: Without confidentiality
-
Robinson DM. Health information policy: without confidentiality. Int J Biomed Comput 1994;35(suppl 1):97-104.
-
(1994)
Int J Biomed Comput
, vol.35
, Issue.1 SUPPL.
, pp. 97-104
-
-
Robinson, D.M.1
-
34
-
-
0028476743
-
Security versus access: Trade-offs are only part of the story
-
Shea S. Security versus access: trade-offs are only part of the story. JAMIA. 1994;1:314-5.
-
(1994)
JAMIA
, vol.1
, pp. 314-315
-
-
Shea, S.1
-
36
-
-
0028477729
-
Against simple universal health-care identifiers
-
Szolovits P, Kohane I. Against simple universal health-care identifiers. JAMIA. 1994;1:316-9.
-
(1994)
JAMIA
, vol.1
, pp. 316-319
-
-
Szolovits, P.1
Kohane, I.2
-
38
-
-
0007323883
-
Online medical records raise privacy fears
-
March 22
-
Davis R. Online medical records raise privacy fears. USA Today. March 22, 1995:A:1.4.
-
(1995)
USA Today
, vol.A
, pp. 14
-
-
Davis, R.1
-
40
-
-
0029298494
-
Protection of confidentiality in the computer-based patient record
-
Safran C, Rind D, Citroen M, Bakker AR, Slack WV, Bleich HL. Protection of confidentiality in the computer-based patient record. MD Comput. 1995;12:187-92.
-
(1995)
MD Comput
, vol.12
, pp. 187-192
-
-
Safran, C.1
Rind, D.2
Citroen, M.3
Bakker, A.R.4
Slack, W.V.5
Bleich, H.L.6
-
41
-
-
1842481196
-
-
Senate Bill 1360: The Medical Records Confidentiality Act of 1995. 104th Congress, 1st Session
-
Senate Bill 1360: The Medical Records Confidentiality Act of 1995. 104th Congress, 1st Session.
-
-
-
-
42
-
-
1842585737
-
Briefings on the JCAHO. Information management (IM)
-
Marblehead, MA: Opus Communications, ISBN 1-885829-14-0
-
Paskavitz MR, ed. Briefings on the JCAHO. Information management (IM). Special Report Review and Analysis: 1996 JCAHO Standards. Marblehead, MA: Opus Communications, 1995; 16-18 (ISBN 1-885829-14-0).
-
(1995)
Special Report Review and Analysis: 1996 JCAHO Standards
, pp. 16-18
-
-
Paskavitz, M.R.1
|