-
1
-
-
78449293106
-
Adoption, non-adoption, and abandonment of a personal electronic health record: case study of HealthSpace
-
Greenhalgh T., Hinder S., Stramer K., Bratan T., Russell J. Adoption, non-adoption, and abandonment of a personal electronic health record: case study of HealthSpace. BMJ 2010, 341:c5814.
-
(2010)
BMJ
, vol.341
-
-
Greenhalgh, T.1
Hinder, S.2
Stramer, K.3
Bratan, T.4
Russell, J.5
-
2
-
-
80053477353
-
Secure personal data servers: a vision paper
-
Allard T., Anciaux N., Bouganim L., Guo Y., Folgoc L.L., Nguyen B., et al. Secure personal data servers: a vision paper. PVLDB 2010, 3(1-2):25-35.
-
(2010)
PVLDB
, vol.3
, Issue.1-2
, pp. 25-35
-
-
Allard, T.1
Anciaux, N.2
Bouganim, L.3
Guo, Y.4
Folgoc, L.L.5
Nguyen, B.6
-
3
-
-
84891557246
-
Evolución, beneficios y obstáculos en la implantación del Historial Clínico Electrónico en el sistema sanitario
-
Sainz-Abajo B., La-Torre-Díez I., Bermejo-González P., García-Salcines E., Díaz-Pernas J., Díez-Higuera J.F., et al. Evolución, beneficios y obstáculos en la implantación del Historial Clínico Electrónico en el sistema sanitario. RevistaeSalud.com 2010, 6(22):1-14.
-
(2010)
RevistaeSalud.com
, vol.6
, Issue.22
, pp. 1-14
-
-
Sainz-Abajo, B.1
La-Torre-Díez, I.2
Bermejo-González, P.3
García-Salcines, E.4
Díaz-Pernas, J.5
Díez-Higuera, J.F.6
-
4
-
-
78649236479
-
Social participation in health 2.0
-
Hesse B.W., Hansen D., Finholt T., Munson S., Kellogg W., Thomas J.C. Social participation in health 2.0. Computer 2010, 43(11):45-52.
-
(2010)
Computer
, vol.43
, Issue.11
, pp. 45-52
-
-
Hesse, B.W.1
Hansen, D.2
Finholt, T.3
Munson, S.4
Kellogg, W.5
Thomas, J.C.6
-
7
-
-
36849006090
-
Health privacy in the electronic age
-
Rothstein M.A. Health privacy in the electronic age. J Leg Med 2007, 28(4):487-501.
-
(2007)
J Leg Med
, vol.28
, Issue.4
, pp. 487-501
-
-
Rothstein, M.A.1
-
8
-
-
77956057059
-
Security requirements and solutions in electronic health records: lessons learned from a comparative study
-
Farzandipour M., Sadoughi F., Ahmadi M., Karimi I. Security requirements and solutions in electronic health records: lessons learned from a comparative study. J Med Syst 2010, 34(4):629-642.
-
(2010)
J Med Syst
, vol.34
, Issue.4
, pp. 629-642
-
-
Farzandipour, M.1
Sadoughi, F.2
Ahmadi, M.3
Karimi, I.4
-
9
-
-
78751705912
-
Aspects of privacy for electronic health records
-
Haas S., Wohlgemuth S., Echizen I., Sonehara N., Müller N. Aspects of privacy for electronic health records. Int J Med Inform 2011, 80(2):e26-e31.
-
(2011)
Int J Med Inform
, vol.80
, Issue.2
-
-
Haas, S.1
Wohlgemuth, S.2
Echizen, I.3
Sonehara, N.4
Müller, N.5
-
10
-
-
84878199692
-
-
ISO/EN 13606. <> [accessed 07.12.12].
-
ISO/EN 13606. <> [accessed 07.12.12]. http://www.iso.org/iso/home.htm.
-
-
-
-
12
-
-
84878200966
-
-
NHS Lothian Communications Office. NHS Lothian staff member loses patient data. <> [accessed 07.12.12].
-
NHS Lothian Communications Office. NHS Lothian staff member loses patient data. <> [accessed 07.12.12]. http://www.nhslothian.scot.nhs.uk/MediaCentre/PressReleases/2008/Pages/0307PatientData.aspx.
-
-
-
-
13
-
-
84891559845
-
-
Review of issues related to the loss of VA information involving the identity of millions of veterans > [accessed 07.12.12].
-
Department of Veterans Affairs Office of Inspector General. Review of issues related to the loss of VA information involving the identity of millions of veterans; 2006. > [accessed 07.12.12]. http://www.va.gov/oig/apps/info/OversightReports.aspx?igRT=ai/&igPG=4.
-
(2006)
Department of Veterans Affairs Office of Inspector General
-
-
-
14
-
-
33947269844
-
Compelled authorizations for disclosure of health records: magnitude and implications
-
Rothstein M.A., Talbott M.K. Compelled authorizations for disclosure of health records: magnitude and implications. Am J Bioeth 2007, 7(3):38-45.
-
(2007)
Am J Bioeth
, vol.7
, Issue.3
, pp. 38-45
-
-
Rothstein, M.A.1
Talbott, M.K.2
-
15
-
-
58149256387
-
Patient opinion-EHR assessment from the users perspective
-
Zurita L., Nøhr C. Patient opinion-EHR assessment from the users perspective. Stud Health Technol Inform 2004, 107(2):1333-1336.
-
(2004)
Stud Health Technol Inform
, vol.107
, Issue.2
, pp. 1333-1336
-
-
Zurita, L.1
Nøhr, C.2
-
16
-
-
74449086435
-
Querschnittsbefragung von 8.000 BARMER-VersichertenzuErwartungen und EinsatzeinerelektronischenGesundheitsakte
-
[Survey on expectations and implementation of an electronic health record, in German]
-
Kirchner H, Prokosch H, Dudeck J, Jöckel KH, Lehmacher W, Gesenhues S. Querschnittsbefragung von 8.000 BARMER-VersichertenzuErwartungen und EinsatzeinerelektronischenGesundheitsakte [Survey on expectations and implementation of an electronic health record, in German]. In: Proc of the annual meeting of the GMDS; 2009.
-
(2009)
Proc of the annual meeting of the GMDS
-
-
Kirchner, H.1
Prokosch, H.2
Dudeck, J.3
Jöckel, K.H.4
Lehmacher, W.5
Gesenhues, S.6
-
17
-
-
33846379191
-
Consumers are ready to accept the transition to online and electronic records if they can be assured of the security measures
-
Chhanabhai P., Holt A. Consumers are ready to accept the transition to online and electronic records if they can be assured of the security measures. Med Gen Med 2007, 9(1):8.
-
(2007)
Med Gen Med
, vol.9
, Issue.1
, pp. 8
-
-
Chhanabhai, P.1
Holt, A.2
-
18
-
-
74449083991
-
Attitudes and behaviors related to the introduction of electronic health records among Austrian and German citizens
-
Hoerbst A., Kohl C.D., Knaup P., Ammenwerth E. Attitudes and behaviors related to the introduction of electronic health records among Austrian and German citizens. Int J Med Inform 2010, 79(2):81-89.
-
(2010)
Int J Med Inform
, vol.79
, Issue.2
, pp. 81-89
-
-
Hoerbst, A.1
Kohl, C.D.2
Knaup, P.3
Ammenwerth, E.4
-
20
-
-
58149252163
-
Patient accessible electronic health records: exploring recommendations for successful implementation strategies
-
Wiljer D., Urowitz S., Apatu E., DeLenardo C., Eysenbach G., Harth T., et al. Patient accessible electronic health records: exploring recommendations for successful implementation strategies. J Med Internet Res 2008, 10(4):e34.
-
(2008)
J Med Internet Res
, vol.10
, Issue.4
-
-
Wiljer, D.1
Urowitz, S.2
Apatu, E.3
DeLenardo, C.4
Eysenbach, G.5
Harth, T.6
-
21
-
-
84891557959
-
The new threat: attackers that target healthcare
-
(and what you can do about it). > [accessed 07.12.12].
-
Brigade T. The new threat: attackers that target healthcare (and what you can do about it). > [accessed 07.12.12]. http://www.infosecwriters.com/text_resources/pdf/New_Threat_Brigade.pdf.
-
-
-
Brigade, T.1
-
22
-
-
77955431422
-
Security requirements engineering framework for software product lines
-
Mellado D., Fernández-Medina E., Piattini M. Security requirements engineering framework for software product lines. Inform Softw Technol 2010, 52(10):1094-1117.
-
(2010)
Inform Softw Technol
, vol.52
, Issue.10
, pp. 1094-1117
-
-
Mellado, D.1
Fernández-Medina, E.2
Piattini, M.3
-
23
-
-
79952606419
-
Barriers to the adoption and use of personal health record systems
-
Liu LS, Shih PC, Hayes GR. Barriers to the adoption and use of personal health record systems. In: Proc of iConference; 2011. p. 363-70.
-
(2011)
Proc of iConference
, pp. 363-370
-
-
Liu, L.S.1
Shih, P.C.2
Hayes, G.R.3
-
24
-
-
84891561647
-
-
Database state. Joseph Rowntree Reform Trust; 2009. > [accessed 07.12.12].
-
Anderson R, Brown I, Dowty T, Inglesant P, Heath W, Sasse A. Database state. Joseph Rowntree Reform Trust; 2009. > [accessed 07.12.12]. http://www.cl.cam.ac.uk/~rja14/Papers/database-state.pdf.
-
-
-
Anderson, R.1
Brown, I.2
Dowty, T.3
Inglesant, P.4
Heath, W.5
Sasse, A.6
-
25
-
-
84891561232
-
-
ISO 27799:2008. Health informatics - information security management in health using ISO/IEC 27002. > [accessed 07.12.12].
-
ISO 27799:2008. Health informatics - information security management in health using ISO/IEC 27002. > [accessed 07.12.12]. http://www.iso.org/iso/home.htm.
-
-
-
-
26
-
-
84872011968
-
The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate health care interventions: explanation and elaboration
-
Liberati A., Altman D.G., Tetzlaff J., Mulrow C., Gøtzsche P.C., Ioannidis J.P.A., et al. The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate health care interventions: explanation and elaboration. J Clin Epidemiol 2009, 62(10):e1-34.
-
(2009)
J Clin Epidemiol
, vol.62
, Issue.10
-
-
Liberati, A.1
Altman, D.G.2
Tetzlaff, J.3
Mulrow, C.4
Gøtzsche, P.C.5
Ioannidis, J.P.A.6
-
27
-
-
79851514417
-
A methodology for the pseudonymization of medical data
-
Neubauer T., Heurix J. A methodology for the pseudonymization of medical data. Int J Med Inform 2011, 80(3):190-204.
-
(2011)
Int J Med Inform
, vol.80
, Issue.3
, pp. 190-204
-
-
Neubauer, T.1
Heurix, J.2
-
28
-
-
75949087265
-
Critical areas of national electronic health record programs-is our focus correct?
-
Deutsch E., Duftschmid G., Dorda W. Critical areas of national electronic health record programs-is our focus correct?. Int J Med Inform 2010, 79(3):211-222.
-
(2010)
Int J Med Inform
, vol.79
, Issue.3
, pp. 211-222
-
-
Deutsch, E.1
Duftschmid, G.2
Dorda, W.3
-
29
-
-
77956652072
-
Human factors in information security: the insider threat - who can you trust these days?
-
Colwill C. Human factors in information security: the insider threat - who can you trust these days?. Information Security Technical Report 2009, 14(4):186-196.
-
(2009)
Information Security Technical Report
, vol.14
, Issue.4
, pp. 186-196
-
-
Colwill, C.1
-
30
-
-
41549130915
-
Medical record privacy and security in a digital environment
-
Kahn S., Sheshadri V. Medical record privacy and security in a digital environment. IT Professional 2008, 10(2):46-52.
-
(2008)
IT Professional
, vol.10
, Issue.2
, pp. 46-52
-
-
Kahn, S.1
Sheshadri, V.2
-
31
-
-
77955333989
-
A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations
-
Hu J., Chen H.H., Hou T.W. A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations. Computer Standards & Interfaces 2010, 32(5-6):274-280.
-
(2010)
Computer Standards & Interfaces
, vol.32
, Issue.5-6
, pp. 274-280
-
-
Hu, J.1
Chen, H.H.2
Hou, T.W.3
-
32
-
-
33747622542
-
Personal health record systems and their security protection
-
Win K.T., Susilo W., Mu Y. Personal health record systems and their security protection. J Med Syst 2006, 30(4):309-315.
-
(2006)
J Med Syst
, vol.30
, Issue.4
, pp. 309-315
-
-
Win, K.T.1
Susilo, W.2
Mu, Y.3
-
33
-
-
33947621113
-
Securing electronic health records without impeding the flow of information
-
Agrawal R., Johnson C. Securing electronic health records without impeding the flow of information. Int J Med Inform 2007, 76(5-6):471-479.
-
(2007)
Int J Med Inform
, vol.76
, Issue.5-6
, pp. 471-479
-
-
Agrawal, R.1
Johnson, C.2
-
34
-
-
77955514675
-
Strategies for health data exchange for secondary, cross-institutional clinical research
-
Elger B.S., Iavindrasana J., Lo Iacono L., Müller H., Roduit N., Summers P., et al. Strategies for health data exchange for secondary, cross-institutional clinical research. Comput Methods Programs Biomed 2010, 99(3):230-251.
-
(2010)
Comput Methods Programs Biomed
, vol.99
, Issue.3
, pp. 230-251
-
-
Elger, B.S.1
Iavindrasana, J.2
Lo Iacono, L.3
Müller, H.4
Roduit, N.5
Summers, P.6
-
38
-
-
77956230334
-
Cross-domain data sharing in distributed electronic health record systems
-
Sun J., Fang Y. Cross-domain data sharing in distributed electronic health record systems. IEEE Trans Parallel Distrib Syst 2010, 21(6):754-764.
-
(2010)
IEEE Trans Parallel Distrib Syst
, vol.21
, Issue.6
, pp. 754-764
-
-
Sun, J.1
Fang, Y.2
-
40
-
-
78449288160
-
Access control for smarter healthcare using policy spaces
-
Ardagna C.A., di Vimercati S.D.C., Foresti S., Grandison T., Jajodia S., Samarati P. Access control for smarter healthcare using policy spaces. Comput Secur 2010, 29(8):848-858.
-
(2010)
Comput Secur
, vol.29
, Issue.8
, pp. 848-858
-
-
Ardagna, C.A.1
di Vimercati, S.D.C.2
Foresti, S.3
Grandison, T.4
Jajodia, S.5
Samarati, P.6
-
41
-
-
79952761041
-
The DEDUCE guided query tool: providing simplified access to clinical data for research and quality improvement
-
Horvath M.M., Winfield S., Evans S., Slopek S., Shang H., Ferranti J. The DEDUCE guided query tool: providing simplified access to clinical data for research and quality improvement. J Biomed Inform 2011, 44(2):266-276.
-
(2011)
J Biomed Inform
, vol.44
, Issue.2
, pp. 266-276
-
-
Horvath, M.M.1
Winfield, S.2
Evans, S.3
Slopek, S.4
Shang, H.5
Ferranti, J.6
-
42
-
-
33846576210
-
Audit-based access control for electronic health records
-
Dekker M., Etalle S. Audit-based access control for electronic health records. Electron Notes Theoret Comput Sci 2007, 168:221-236.
-
(2007)
Electron Notes Theoret Comput Sci
, vol.168
, pp. 221-236
-
-
Dekker, M.1
Etalle, S.2
-
43
-
-
55549122324
-
Situation-based access control: privacy management via modeling of patient data access scenarios
-
Peleg M., Beimel D., Dori D., Denekamp Y. Situation-based access control: privacy management via modeling of patient data access scenarios. J Biomed Inform 2008, 41(6):1028-1040.
-
(2008)
J Biomed Inform
, vol.41
, Issue.6
, pp. 1028-1040
-
-
Peleg, M.1
Beimel, D.2
Dori, D.3
Denekamp, Y.4
-
44
-
-
52649105433
-
Access and privacy rights using web security standards to increase patient empowerment
-
Falcão-Reis F., Costa-Pereira A., Correia M.E. Access and privacy rights using web security standards to increase patient empowerment. Stud Health Technol Inform 2008, 137:275-285.
-
(2008)
Stud Health Technol Inform
, vol.137
, pp. 275-285
-
-
Falcão-Reis, F.1
Costa-Pereira, A.2
Correia, M.E.3
-
45
-
-
49049099663
-
An initial model and a discussion of access control in patient controlled health records
-
Rostad L. An initial model and a discussion of access control in patient controlled health records. In: Proc conf availability, reliability and security ARES; 2008. p. 935-42.
-
(2008)
Proc conf availability, reliability and security ARES
, pp. 935-942
-
-
Rostad, L.1
-
46
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
Ferraiolo D.F., Sandhu R., Gavrila S., Kuhn D.R., Chandramouli R. Proposed NIST standard for role-based access control. ACM Trans Inf Syst Secur 2001, 4(3):224-274.
-
(2001)
ACM Trans Inf Syst Secur
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
47
-
-
59349103556
-
Inter-organizational future proof EHR systems. A review of the security and privacy related issues
-
van der Linden H., Kalra D., Hasman A., Talmon J. Inter-organizational future proof EHR systems. A review of the security and privacy related issues. Int J Med Inform 2009, 78(3):141-160.
-
(2009)
Int J Med Inform
, vol.78
, Issue.3
, pp. 141-160
-
-
van der Linden, H.1
Kalra, D.2
Hasman, A.3
Talmon, J.4
-
48
-
-
84891557105
-
-
ENV 13729:2000. Health informatics. Secure user identification. Strong authentication microprocessor cards. > [accessed 07.12.12].
-
ENV 13729:2000. Health informatics. Secure user identification. Strong authentication microprocessor cards. > [accessed 07.12.12]. http://www.freestd.us/soft/144932.htm.
-
-
-
-
49
-
-
78751704723
-
Medical record search engines, using pseudonymised patient identity: an alternative to centralised medical records
-
Quantin C., Jaquet-Chiffelle D.O., Coatrieux G., Benzenine E., Allaert F.A. Medical record search engines, using pseudonymised patient identity: an alternative to centralised medical records. Int J Med Inform 2011, 80(2):e6-11.
-
(2011)
Int J Med Inform
, vol.80
, Issue.2
-
-
Quantin, C.1
Jaquet-Chiffelle, D.O.2
Coatrieux, G.3
Benzenine, E.4
Allaert, F.A.5
-
50
-
-
20344376441
-
Security and confidentiality approach for the clinical e-science framework (CLEF)
-
Kalra D., Singleton P., Milan J., Mackay J., Detmer D., Rector A., et al. Security and confidentiality approach for the clinical e-science framework (CLEF). Methods Inf Med 2005, 44(2):193-197.
-
(2005)
Methods Inf Med
, vol.44
, Issue.2
, pp. 193-197
-
-
Kalra, D.1
Singleton, P.2
Milan, J.3
Mackay, J.4
Detmer, D.5
Rector, A.6
-
51
-
-
0036357623
-
Implementing security and access control mechanisms for an electronic healthcare record
-
Ueckert F, Prokosch HU. Implementing security and access control mechanisms for an electronic healthcare record. In: Proc AMIA symp; 2002. p. 825-9.
-
(2002)
Proc AMIA symp
, pp. 825-829
-
-
Ueckert, F.1
Prokosch, H.U.2
-
52
-
-
78650814446
-
An electronic health record to support patients and institutions of the health care system
-
Ueckert F., Müller M.L., Bürkle T., Prokosch H.U. An electronic health record to support patients and institutions of the health care system. Ger Med Sci 2004, 2.
-
(2004)
Ger Med Sci
, vol.2
-
-
Ueckert, F.1
Müller, M.L.2
Bürkle, T.3
Prokosch, H.U.4
-
53
-
-
0041565074
-
Empowerment of patients and communication with health care professionals through an electronic health record
-
Ueckert F., Goerz M., Ataian M., Tessmann S., Prokosch H.U. Empowerment of patients and communication with health care professionals through an electronic health record. Int J Med Inform 2003, 70(2-3):99-108.
-
(2003)
Int J Med Inform
, vol.70
, Issue.2-3
, pp. 99-108
-
-
Ueckert, F.1
Goerz, M.2
Ataian, M.3
Tessmann, S.4
Prokosch, H.U.5
-
56
-
-
34548159019
-
A secure architecture for the pseudonymization of medical data
-
Riedl B, Neubauer T, Goluch G, Boehm O, Reinauer G, Krumboeck A. A secure architecture for the pseudonymization of medical data. In: Proc int conf availability, reliability and security ARES; 2007. p. 397-400.
-
(2007)
Proc int conf availability, reliability and security ARES
, pp. 397-400
-
-
Riedl, B.1
Neubauer, T.2
Goluch, G.3
Boehm, O.4
Reinauer, G.5
Krumboeck, A.6
-
57
-
-
67849099103
-
Privacy preservation and information security protection for patients' portable electronic health records
-
Huang L.C., Chu H.C., Lien C.Y., Hsiao C.H., Kao T. Privacy preservation and information security protection for patients' portable electronic health records. Comput Biol Med 2009, 39(9):743-750.
-
(2009)
Comput Biol Med
, vol.39
, Issue.9
, pp. 743-750
-
-
Huang, L.C.1
Chu, H.C.2
Lien, C.Y.3
Hsiao, C.H.4
Kao, T.5
-
59
-
-
0018545449
-
How to share a secret
-
Shamir A. How to share a secret. Commun ACM 1979, 22(11):612-613.
-
(1979)
Commun ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
60
-
-
39749152423
-
Web-based secure access from multiple patient repositories
-
Choe J., Yoo S.K. Web-based secure access from multiple patient repositories. Int J Med Inform 2008, 77(4):242-248.
-
(2008)
Int J Med Inform
, vol.77
, Issue.4
, pp. 242-248
-
-
Choe, J.1
Yoo, S.K.2
-
61
-
-
74549190480
-
Electronic personal health record systems: a brief review of privacy, security, and architectural issues
-
Daglish D, Archer N. Electronic personal health record systems: a brief review of privacy, security, and architectural issues. In: Proc world congress privacy, security, trust and the management of e-business congress; 2009. p. 110-20.
-
(2009)
Proc world congress privacy, security, trust and the management of e-business congress
, pp. 110-120
-
-
Daglish, D.1
Archer, N.2
-
62
-
-
79952752662
-
The Taiwanese method for providing patients data from multiple hospital EHR systems
-
Jian W.S., Wen H.C., Scholl J., Shabbir S.A., Lee P., Hsu C.Y., et al. The Taiwanese method for providing patients data from multiple hospital EHR systems. J Biomed Inform 2011, 44(2):326-332.
-
(2011)
J Biomed Inform
, vol.44
, Issue.2
, pp. 326-332
-
-
Jian, W.S.1
Wen, H.C.2
Scholl, J.3
Shabbir, S.A.4
Lee, P.5
Hsu, C.Y.6
-
63
-
-
33646041671
-
A secure web-based approach for accessing transitional health information for people with traumatic brain injury
-
Lemaire E.D., Deforge D., Marshall S., Curran D. A secure web-based approach for accessing transitional health information for people with traumatic brain injury. Comput Methods Programs Biomed 2006, 81(3):213-219.
-
(2006)
Comput Methods Programs Biomed
, vol.81
, Issue.3
, pp. 213-219
-
-
Lemaire, E.D.1
Deforge, D.2
Marshall, S.3
Curran, D.4
-
64
-
-
0030198936
-
Digital signatures and the electronic health records: providing legal and security guarantees
-
Bos J.J. Digital signatures and the electronic health records: providing legal and security guarantees. Int J Biomed Comput 1996, 42(1-2):157-163.
-
(1996)
Int J Biomed Comput
, vol.42
, Issue.1-2
, pp. 157-163
-
-
Bos, J.J.1
-
65
-
-
77956062731
-
An approach to access control in electronic health record
-
Sucurovic S. An approach to access control in electronic health record. J Med Syst 2010, 34(4):659-666.
-
(2010)
J Med Syst
, vol.34
, Issue.4
, pp. 659-666
-
-
Sucurovic, S.1
-
66
-
-
33947676926
-
Implementing security in a distributed web-based EHCR
-
Sucurovic S. Implementing security in a distributed web-based EHCR. Int J Med Inform 2007, 76(5-6):491-496.
-
(2007)
Int J Med Inform
, vol.76
, Issue.5-6
, pp. 491-496
-
-
Sucurovic, S.1
-
67
-
-
33846828664
-
Purposes of health identification cards and role of a secure access platform (be-health) in Belgium
-
France F.H.R., Bangels M., De-Clercq E. Purposes of health identification cards and role of a secure access platform (be-health) in Belgium. Int J Med Inform 2007, 76(2-3):84-88.
-
(2007)
Int J Med Inform
, vol.76
, Issue.2-3
, pp. 84-88
-
-
France, F.H.R.1
Bangels, M.2
De-Clercq, E.3
-
73
-
-
1842527000
-
A cross-platform model for secure electronic health record communication
-
Ruotsalainen P. A cross-platform model for secure electronic health record communication. Int J Med Inform 2004, 73(3):291-295.
-
(2004)
Int J Med Inform
, vol.73
, Issue.3
, pp. 291-295
-
-
Ruotsalainen, P.1
-
74
-
-
1842422494
-
Chief medical officer actions on information security in an Italian rehabilitation centre
-
Reni G., Molteni M., Arlotti S., Pinciroli F. Chief medical officer actions on information security in an Italian rehabilitation centre. Int J Med Inform 2004, 73(3):271-279.
-
(2004)
Int J Med Inform
, vol.73
, Issue.3
, pp. 271-279
-
-
Reni, G.1
Molteni, M.2
Arlotti, S.3
Pinciroli, F.4
-
75
-
-
33947628689
-
Comprehensive management of the access to the electronic patient record: towards trans-institutional networks
-
Lovis C., Spahni S., Cassoni N., Geissbuhler A. Comprehensive management of the access to the electronic patient record: towards trans-institutional networks. Int J Med Inform 2007, 76(5-6):466-470.
-
(2007)
Int J Med Inform
, vol.76
, Issue.5-6
, pp. 466-470
-
-
Lovis, C.1
Spahni, S.2
Cassoni, N.3
Geissbuhler, A.4
-
77
-
-
39049126192
-
A study of access control requirements for healthcare systems based on audit trails from access logs
-
Rostad L, Edsberg O. A study of access control requirements for healthcare systems based on audit trails from access logs. In: Proc annual computer security applications conf; 2006. p. 175-86.
-
(2006)
Proc annual computer security applications conf
, pp. 175-186
-
-
Rostad, L.1
Edsberg, O.2
-
78
-
-
85006532875
-
A health information infrastructure enabling secure access to the life-long multimedia electronic health record
-
Tsiknakis M, Katehakis D, Orphanoudakis S. A health information infrastructure enabling secure access to the life-long multimedia electronic health record. In: Proc computer assisted radiology and surgery; 2004. p. 289-94.
-
(2004)
Proc computer assisted radiology and surgery
, pp. 289-294
-
-
Tsiknakis, M.1
Katehakis, D.2
Orphanoudakis, S.3
-
79
-
-
79951680016
-
Patient-centric authorization framework for electronic healthcare services
-
Jin J., Ahn G.J., Hu H., Covington M.J., Zhang X. Patient-centric authorization framework for electronic healthcare services. Comput Secur 2011, 30(2-3):116-127.
-
(2011)
Comput Secur
, vol.30
, Issue.2-3
, pp. 116-127
-
-
Jin, J.1
Ahn, G.J.2
Hu, H.3
Covington, M.J.4
Zhang, X.5
-
80
-
-
1842422467
-
Access to EHR and access control at a moment in the past: a discussion of the need and an exploration of the consequences
-
Bakker A. Access to EHR and access control at a moment in the past: a discussion of the need and an exploration of the consequences. Int J Med Inform 2004, 73(3):267-270.
-
(2004)
Int J Med Inform
, vol.73
, Issue.3
, pp. 267-270
-
-
Bakker, A.1
-
81
-
-
84891557119
-
-
ISI Journal Citation Reports (JCR); > [accessed 07.12.12].
-
ISI Journal Citation Reports (JCR); 2011. > [accessed 07.12.12]. http://www.accesowok.fecyt.es/jcr.
-
(2011)
-
-
-
82
-
-
84891557627
-
-
SCImago Journal Rank (SJR); > [accessed 07.12.12].
-
SCImago Journal Rank (SJR); 2010. > [accessed 07.12.12]. http://www.scimagojr.com/journalrank.php.
-
(2010)
-
-
-
83
-
-
84891559915
-
-
CORE. COmputing Research and Education; > [accessed 07.12.12].
-
CORE. COmputing Research and Education; 2010. > [accessed 07.12.12]. http://www.core.edu.au/index.php/categories/conference/%20rankings/1.
-
(2010)
-
-
-
84
-
-
84865103661
-
Translating standards into practice. Experience and lessons learned at the Department of Veterans Affairs
-
Bouhaddou O., Cromwell T., Davis M., Maulden S., Hsing N., Carlson D., et al. Translating standards into practice. Experience and lessons learned at the Department of Veterans Affairs. J Biomed Inform 2012, 45(4):813-823.
-
(2012)
J Biomed Inform
, vol.45
, Issue.4
, pp. 813-823
-
-
Bouhaddou, O.1
Cromwell, T.2
Davis, M.3
Maulden, S.4
Hsing, N.5
Carlson, D.6
-
85
-
-
45949087681
-
Advancing personalized health care through health information technology: an update from the American Health Information Community's Personalized Health Care Workgroup
-
Glaser J., Henley D.E., Downing G., Brinner K.M. Advancing personalized health care through health information technology: an update from the American Health Information Community's Personalized Health Care Workgroup. J Am Med Inform Assoc 2008, 15(4):391-396.
-
(2008)
J Am Med Inform Assoc
, vol.15
, Issue.4
, pp. 391-396
-
-
Glaser, J.1
Henley, D.E.2
Downing, G.3
Brinner, K.M.4
-
86
-
-
52049118113
-
Confidentiality, privacy, and security of genetic and genomic test information in electronic health records: points to consider
-
McGuire A.L., Fisher R., Cusenza P., Hudson K., Rothstein M.A., McGraw D., et al. Confidentiality, privacy, and security of genetic and genomic test information in electronic health records: points to consider. Genet Med 2008, 10(7):495-499.
-
(2008)
Genet Med
, vol.10
, Issue.7
, pp. 495-499
-
-
McGuire, A.L.1
Fisher, R.2
Cusenza, P.3
Hudson, K.4
Rothstein, M.A.5
McGraw, D.6
-
87
-
-
33645344483
-
A review of security of electronic health records
-
Win K.T. A review of security of electronic health records. HIM J 2005, 34(1):13-18.
-
(2005)
HIM J
, vol.34
, Issue.1
, pp. 13-18
-
-
Win, K.T.1
-
88
-
-
33748088569
-
Disambiguation data: extracting information from anonymized sources
-
Dreiseitl S., Vinterbo S., Ohno-Machado L. Disambiguation data: extracting information from anonymized sources. J Am Med Inform Assoc 2002, 9(6 Suppl. 1):s110-s114.
-
(2002)
J Am Med Inform Assoc
, vol.9
, Issue.6 SUPPL. 1
-
-
Dreiseitl, S.1
Vinterbo, S.2
Ohno-Machado, L.3
-
89
-
-
34548557737
-
Multi-centric universal pseudonymisation for secondary use of the EHR
-
Lo-Iacono L. Multi-centric universal pseudonymisation for secondary use of the EHR. Stud Health Technol Inform 2007, 126:239-247.
-
(2007)
Stud Health Technol Inform
, vol.126
, pp. 239-247
-
-
Lo-Iacono, L.1
-
90
-
-
0033772930
-
Protection of privacy by third-party encryption in genetic research in Iceland
-
Gulcher J.R., Kristjánsson K., Gudbjartsson H., Stefánsson K. Protection of privacy by third-party encryption in genetic research in Iceland. Eur J Hum Genet 2000, 8(10):739-742.
-
(2000)
Eur J Hum Genet
, vol.8
, Issue.10
, pp. 739-742
-
-
Gulcher, J.R.1
Kristjánsson, K.2
Gudbjartsson, H.3
Stefánsson, K.4
-
91
-
-
15544389962
-
Secondary use of the electronic health record via pseudonymisation
-
IOS Press, Amsterdam, L. Bos, S. Laxminarayan, A. Marsh (Eds.)
-
Pommerening K., Reng M. Secondary use of the electronic health record via pseudonymisation. Medical care compunetics 1 2004, 441-446. IOS Press, Amsterdam. L. Bos, S. Laxminarayan, A. Marsh (Eds.).
-
(2004)
Medical care compunetics 1
, pp. 441-446
-
-
Pommerening, K.1
Reng, M.2
-
92
-
-
84878189909
-
-
European Agency for the Evaluation of Medical Products (EMEA) Committee for Proprietary Medicinal Products. Position paper on terminology in pharmacogenomics. Report No. EMEA/CPMP/3070/01, London;.
-
European Agency for the Evaluation of Medical Products (EMEA) Committee for Proprietary Medicinal Products. Position paper on terminology in pharmacogenomics. Report No. EMEA/CPMP/3070/01, London; 2002.
-
(2002)
-
-
-
93
-
-
0036811662
-
K-anonymity: a model for protecting privacy
-
Sweeney L. K-anonymity: a model for protecting privacy. Int J Uncertain Fuzzy Knowl-Based Syst 2002, 10(5):557-570.
-
(2002)
Int J Uncertain Fuzzy Knowl-Based Syst
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
94
-
-
0036356364
-
A proposed key escrow system for secure patient information disclosure in biomedical research databases
-
Ferris TA, Garrison GM, Lowe HJ. A proposed key escrow system for secure patient information disclosure in biomedical research databases. In: Proc AMIA symp; 2002. p. 245-9.
-
(2002)
Proc AMIA symp
, pp. 245-249
-
-
Ferris, T.A.1
Garrison, G.M.2
Lowe, H.J.3
-
95
-
-
0037768626
-
Privacy enhancing techniques - the key to secure communication and management of clinical and genomic data
-
De-Moor G.J.E., Claerhout B., De-Meyer F. Privacy enhancing techniques - the key to secure communication and management of clinical and genomic data. Methods Inf Med 2003, 42(2):148-153.
-
(2003)
Methods Inf Med
, vol.42
, Issue.2
, pp. 148-153
-
-
De-Moor, G.J.E.1
Claerhout, B.2
De-Meyer, F.3
-
97
-
-
77954061524
-
Embedding a hiding function in a portable electronic health record for privacy preservation
-
Huang L.C., Chu H.C., Lien C.Y., Hsiao C.H., Kao T. Embedding a hiding function in a portable electronic health record for privacy preservation. J Med Syst 2010, 34(3):313-320.
-
(2010)
J Med Syst
, vol.34
, Issue.3
, pp. 313-320
-
-
Huang, L.C.1
Chu, H.C.2
Lien, C.Y.3
Hsiao, C.H.4
Kao, T.5
-
98
-
-
84862293738
-
Strategies for de-identification and anonymization of electronic health record data for use in multicenter research studies
-
Kushida C.A., Nichols D.A., Jadrnicek R., Miller R., Walsh J.K., Griffin K. Strategies for de-identification and anonymization of electronic health record data for use in multicenter research studies. Med Care 2012, 50:S82-S101.
-
(2012)
Med Care
, vol.50
-
-
Kushida, C.A.1
Nichols, D.A.2
Jadrnicek, R.3
Miller, R.4
Walsh, J.K.5
Griffin, K.6
-
99
-
-
67349221790
-
A pixel-based scrambling scheme for digital medical images protection
-
Hu J., Han F. A pixel-based scrambling scheme for digital medical images protection. J Netw Comput Appl 2009, 32(4):788-794.
-
(2009)
J Netw Comput Appl
, vol.32
, Issue.4
, pp. 788-794
-
-
Hu, J.1
Han, F.2
-
100
-
-
0036452648
-
Networking in shared care-first steps towards a shared electronic patient record for cancer patients
-
van-der-Haak M., Mludek V., Wolff A.C., Bülzebruck H., Oetzel D., Zierhut D., et al. Networking in shared care-first steps towards a shared electronic patient record for cancer patients. Methods Inf Med 2002, 41(5):419-425.
-
(2002)
Methods Inf Med
, vol.41
, Issue.5
, pp. 419-425
-
-
van-der-Haak, M.1
Mludek, V.2
Wolff, A.C.3
Bülzebruck, H.4
Oetzel, D.5
Zierhut, D.6
-
101
-
-
0347415586
-
Patient privacy in electronic prescription transfer
-
Ball E., Chadwick D.W., Mundy D. Patient privacy in electronic prescription transfer. IEEE Secur Privacy 2003, 1(2):77-80.
-
(2003)
IEEE Secur Privacy
, vol.1
, Issue.2
, pp. 77-80
-
-
Ball, E.1
Chadwick, D.W.2
Mundy, D.3
-
102
-
-
84891560430
-
-
How to tamper with electronic health records. > [accessed 07.12.12].
-
Horst H. How to tamper with electronic health records. > [accessed 07.12.12]. http://www.gnumed.net/gnotary/tampering.html.
-
-
-
Horst, H.1
-
103
-
-
1842527023
-
The legal knowledge of the electronic signature: a key for a secure direct access of patients to their computerised medical record
-
Allaert F., Le-Teuff G., Quantin C., Barber B. The legal knowledge of the electronic signature: a key for a secure direct access of patients to their computerised medical record. Int J Med Inform 2004, 73:239-242.
-
(2004)
Int J Med Inform
, vol.73
, pp. 239-242
-
-
Allaert, F.1
Le-Teuff, G.2
Quantin, C.3
Barber, B.4
-
104
-
-
13844266517
-
Internet security and privacy protection for the health care professional
-
Alban R.F., Feldmar D., Gabbay J., Lefor A.T. Internet security and privacy protection for the health care professional. Current Surgery 2005, 62:106-110.
-
(2005)
Current Surgery
, vol.62
, pp. 106-110
-
-
Alban, R.F.1
Feldmar, D.2
Gabbay, J.3
Lefor, A.T.4
-
105
-
-
18044367110
-
Wireless technology infrastructures for authentication of patients: PKI that rings
-
Sax U., Kohane I., Mandl K.D. Wireless technology infrastructures for authentication of patients: PKI that rings. J Am Med Inform Assoc 2005, 12(3):263-268.
-
(2005)
J Am Med Inform Assoc
, vol.12
, Issue.3
, pp. 263-268
-
-
Sax, U.1
Kohane, I.2
Mandl, K.D.3
-
107
-
-
33947528272
-
A fingerprint orientation model based on 2D Fourier expansion (FOMFE) and its application to singular-point detection and fingerprint indexing
-
Wang Y., Hu J., Phillips D. A fingerprint orientation model based on 2D Fourier expansion (FOMFE) and its application to singular-point detection and fingerprint indexing. IEEE Trans Pattern Anal Mach Intel 2007, 29:573-585.
-
(2007)
IEEE Trans Pattern Anal Mach Intel
, vol.29
, pp. 573-585
-
-
Wang, Y.1
Hu, J.2
Phillips, D.3
-
108
-
-
33947492044
-
From template to image: reconstructing fingerprints from minutiae points
-
Ross A., Shah J., Jain A.K. From template to image: reconstructing fingerprints from minutiae points. IEEE Trans Pattern Anal Mach Intel 2007, 29:544-560.
-
(2007)
IEEE Trans Pattern Anal Mach Intel
, vol.29
, pp. 544-560
-
-
Ross, A.1
Shah, J.2
Jain, A.K.3
-
109
-
-
84891557426
-
-
Liberty Alliance Project, > [accessed 07.12.12].
-
Liberty Alliance Project 2009. > [accessed 07.12.12]. http://www.projectliberty.org.
-
(2009)
-
-
-
110
-
-
43049170120
-
The challenge of federated identity management
-
Smith D. The challenge of federated identity management. Network Security 2008, 2008(4):7-9.
-
(2008)
Network Security
, vol.2008
, Issue.4
, pp. 7-9
-
-
Smith, D.1
-
111
-
-
57349200762
-
Privacy, confidentiality and electronic medical records
-
Barrows R.J., Clayton P. Privacy, confidentiality and electronic medical records. J Am Med Inform Assoc 1996, 3:139-148.
-
(1996)
J Am Med Inform Assoc
, vol.3
, pp. 139-148
-
-
Barrows, R.J.1
Clayton, P.2
-
112
-
-
79959638566
-
Using statistical and machine learning to help institutions detect suspicious access to electronic health records
-
Boxwala A.A., Kim J., Grillo J.M., Ohno-Machado L. Using statistical and machine learning to help institutions detect suspicious access to electronic health records. J Am Med Inform Assoc 2011, 18(4):498-505.
-
(2011)
J Am Med Inform Assoc
, vol.18
, Issue.4
, pp. 498-505
-
-
Boxwala, A.A.1
Kim, J.2
Grillo, J.M.3
Ohno-Machado, L.4
-
113
-
-
35548994889
-
Access control: how can it improve patients' healthcare?
-
Ferreira A., Cruz-Correia R., Antunes L., Chadwick D. Access control: how can it improve patients' healthcare?. Stud Health Technol Inform 2007, 127:65-76.
-
(2007)
Stud Health Technol Inform
, vol.127
, pp. 65-76
-
-
Ferreira, A.1
Cruz-Correia, R.2
Antunes, L.3
Chadwick, D.4
-
114
-
-
1842474926
-
Authorisation and access control for electronic health record systems
-
Blobel B. Authorisation and access control for electronic health record systems. Int J Med Inform 2004, 73(3):251-257.
-
(2004)
Int J Med Inform
, vol.73
, Issue.3
, pp. 251-257
-
-
Blobel, B.1
-
117
-
-
84891558309
-
-
Standard Guide for Information Access Privileges to Health Information, ASTM E1986-98; > [accessed 07.12.12].
-
Standard Guide for Information Access Privileges to Health Information, ASTM E1986-98; 2005. > [accessed 07.12.12]. http://www.astm.org/DATABASE.CART/HISTORICAL/E1986-98R05.htm.
-
(2005)
-
-
-
118
-
-
84891559679
-
-
ISO DTS 21298 Functional and structural roles. > [accessed 07.12.12].
-
ISO DTS 21298 Functional and structural roles. > [accessed 07.12.12]. http://www.iso.org/iso/home.htm.
-
-
-
-
119
-
-
84891559111
-
-
American National Standard Institute (ANSI). American National Standard for information technology: role based access control. Technical Report ANSI INCITS 359-2004; > [accessed 07.12.12].
-
American National Standard Institute (ANSI). American National Standard for information technology: role based access control. Technical Report ANSI INCITS 359-2004; 2004. > [accessed 07.12.12]. http://www.csrc.nist.gov/rbac/EDACcompliance.pdf.
-
(2004)
-
-
-
120
-
-
37249020924
-
A critique of the ANSI Standard on role-based access control
-
Li N., Byun J.W., Bertino E. A critique of the ANSI Standard on role-based access control. IEEE Security Privacy 2007, 5(6):41-49.
-
(2007)
IEEE Security Privacy
, vol.5
, Issue.6
, pp. 41-49
-
-
Li, N.1
Byun, J.W.2
Bertino, E.3
-
122
-
-
0142151165
-
A contextual role-based access control authorization model for electronic patient record
-
Motta G.H., Furuie S.S. A contextual role-based access control authorization model for electronic patient record. IEEE Trans Inf Technol Biomed 2003, 7(3):202-207.
-
(2003)
IEEE Trans Inf Technol Biomed
, vol.7
, Issue.3
, pp. 202-207
-
-
Motta, G.H.1
Furuie, S.S.2
-
123
-
-
77957235707
-
Special requirements of electronic medical record systems in obstetrics and gynecology
-
Bates G.W. Special requirements of electronic medical record systems in obstetrics and gynecology. Obstet Gynecol 2010, 116(4):994.
-
(2010)
Obstet Gynecol
, vol.116
, Issue.4
, pp. 994
-
-
Bates, G.W.1
-
125
-
-
84891558231
-
-
ISO/TS 22600-1 Health informatics-Privilege management and access control-Part 1: Overview and policy management. ISO 2006. > [accessed 07.12.12].
-
ISO/TS 22600-1 Health informatics-Privilege management and access control-Part 1: Overview and policy management. ISO 2006. > [accessed 07.12.12]. http://www.iso.org/iso/home.htm.
-
-
-
-
126
-
-
84891559171
-
-
ISO/TS 22600-2 Health informatics-Privilege management and access control-Part 2: Formal models;. > [accessed 07.12.12].
-
ISO/TS 22600-2 Health informatics-Privilege management and access control-Part 2: Formal models; 2006. > [accessed 07.12.12]. http://www.iso.org/iso/home.htm.
-
(2006)
-
-
-
127
-
-
33645105594
-
Can GRID services provide answers to the challenges of national health information sharing?
-
Bilykh I, Bychkov Y, Dahlem D, Jahnke JH, McCallum G, Obry C, et al. Can GRID services provide answers to the challenges of national health information sharing? In: Proc conference of the centre for advanced studies on collaborative research; 2003. p. 39-53.
-
(2003)
Proc conference of the centre for advanced studies on collaborative research
, pp. 39-53
-
-
Bilykh, I.1
Bychkov, Y.2
Dahlem, D.3
Jahnke, J.H.4
McCallum, G.5
Obry, C.6
-
128
-
-
84878173179
-
-
US Department of Health and Human Services, Office for Civil Rights. Standards for protection of electronic health information; final rule. Federal Register 45 cfr: pt. 164;.
-
US Department of Health and Human Services, Office for Civil Rights. Standards for protection of electronic health information; final rule. Federal Register 45 cfr: pt. 164; 2003.
-
(2003)
-
-
-
129
-
-
32044472250
-
Web-based personal health record systems evaluation
-
Win K.T. Web-based personal health record systems evaluation. Int J Healthcare Technol Manage 2006, 7(3-4):208-217.
-
(2006)
Int J Healthcare Technol Manage
, vol.7
, Issue.3-4
, pp. 208-217
-
-
Win, K.T.1
-
130
-
-
60649102513
-
A qualitative analysis of an electronic health record (EHR) implementation in an academic ambulatory setting
-
Yoon-Flannery K., Zandieh S.O., Kuperman G.J., Langsam D.J., Hyman D., Kaushal R. A qualitative analysis of an electronic health record (EHR) implementation in an academic ambulatory setting. Inform Prim Care 2008, 16(4):277-284.
-
(2008)
Inform Prim Care
, vol.16
, Issue.4
, pp. 277-284
-
-
Yoon-Flannery, K.1
Zandieh, S.O.2
Kuperman, G.J.3
Langsam, D.J.4
Hyman, D.5
Kaushal, R.6
-
131
-
-
35348898546
-
The story behind the story: physician skepticism about relying on clinical information technologies to reduce medical errors
-
McAlearney A.S., Chisolm D.J., Schweikhart S., Medow M.A., Kelleher K. The story behind the story: physician skepticism about relying on clinical information technologies to reduce medical errors. Int J Med Inform 2007, 76(11-12):836-842.
-
(2007)
Int J Med Inform
, vol.76
, Issue.11-12
, pp. 836-842
-
-
McAlearney, A.S.1
Chisolm, D.J.2
Schweikhart, S.3
Medow, M.A.4
Kelleher, K.5
-
132
-
-
14544304095
-
Role of computerized physician order entry systems in facilitating medication errors
-
Koppel R., Metlay J.P., Cohen A., Abaluck B., Localio A.R., Kimmel S.E., et al. Role of computerized physician order entry systems in facilitating medication errors. JAMA 2005, 293(10):1197-1203.
-
(2005)
JAMA
, vol.293
, Issue.10
, pp. 1197-1203
-
-
Koppel, R.1
Metlay, J.P.2
Cohen, A.3
Abaluck, B.4
Localio, A.R.5
Kimmel, S.E.6
-
133
-
-
71549166995
-
The health information system security threat lifecycle: an informatics theory
-
Fernando J., Dawson L. The health information system security threat lifecycle: an informatics theory. Int J Med Inform 2009, 78(12):815-826.
-
(2009)
Int J Med Inform
, vol.78
, Issue.12
, pp. 815-826
-
-
Fernando, J.1
Dawson, L.2
-
134
-
-
71549131048
-
Clinician assessments of workplace security training-an informatics perspective
-
Fernando J., Dawson L. Clinician assessments of workplace security training-an informatics perspective. eJHI 2008, 3(1):e7.
-
(2008)
eJHI
, vol.3
, Issue.1
-
-
Fernando, J.1
Dawson, L.2
-
135
-
-
84891555432
-
-
AHIMA. The state of HIPAA privacy and security compliance, April. > [accessed 07.12.12].
-
AHIMA. The state of HIPAA privacy and security compliance, April 2006. > [accessed 07.12.12]. http://www.library.ahima.org/xpedio/groups/public/documents/ahima/bok1_022739.pdf.
-
(2006)
-
-
-
136
-
-
0036490572
-
Giving patients access to their medical records via the internet: the PCASSO experience
-
Masys D., Baker D., Butros A., Cowles K.E. Giving patients access to their medical records via the internet: the PCASSO experience. J Am Med Inform Assoc 2002, 9(2):181-191.
-
(2002)
J Am Med Inform Assoc
, vol.9
, Issue.2
, pp. 181-191
-
-
Masys, D.1
Baker, D.2
Butros, A.3
Cowles, K.E.4
-
137
-
-
0034316956
-
Cognitive models in training health professionals to protect patients' confidential information
-
Patel V.L., Arocha J.F., Shortliffe E.H. Cognitive models in training health professionals to protect patients' confidential information. Int J Med Inform 2000, 60(2):143-150.
-
(2000)
Int J Med Inform
, vol.60
, Issue.2
, pp. 143-150
-
-
Patel, V.L.1
Arocha, J.F.2
Shortliffe, E.H.3
-
138
-
-
80053014514
-
Electronic health record: wiring Europe's healthcare
-
Kierkegaard P. Electronic health record: wiring Europe's healthcare. Comput Law Security Rev 2011, 27(5):503-515.
-
(2011)
Comput Law Security Rev
, vol.27
, Issue.5
, pp. 503-515
-
-
Kierkegaard, P.1
|