-
1
-
-
84880754498
-
-
Dec. 30
-
McKelvey, V. "Spending more on in-home care." Dec. 30, 2011; http://www.aarp.org/relationships/caregiving/info-01-2010/spendingmore-on-in- home-care.html.
-
(2011)
Spending More on In-Home Care
-
-
McKelvey, V.1
-
2
-
-
41149088350
-
Definition, structure, content, use and impacts of electronic health records: A review of the research literature
-
Häyrinen, K., Saranto, K., and Nykänen, P., Definition, structure, content, use and impacts of electronic health records: A review of the research literature. Int. J. Med. Inform. 77(5):291-304, 2008.
-
(2008)
Int. J. Med. Inform.
, vol.77
, Issue.5
, pp. 291-304
-
-
Häyrinen, K.1
Saranto, K.2
Nykänen, P.3
-
3
-
-
24044539547
-
The impact of electronic health records on time efficiency of physicians and nurses: A systematic review
-
Poissant, L., Pereira, J., Tamblyn, R., Kawasumi, Y., The impact of electronic health records on time efficiency of physicians and nurses: A systematic review. J. Am. Med. Assoc. 12(5):505-516, 2005.
-
(2005)
J. Am. Med. Assoc
, vol.12
, Issue.5
, pp. 505-516
-
-
Poissant, L.1
Pereira, J.2
Tamblyn, R.3
Kawasumi, Y.4
-
4
-
-
54949088198
-
The role of electronic medical record in care delivery in developing countries
-
Williams, F., and Boren, S. A., The role of electronic medical record in care delivery in developing countries. Int. J. Inf. Manag. 28(6):503-507, 2008.
-
(2008)
Int. J. Inf. Manag.
, vol.28
, Issue.6
, pp. 503-507
-
-
Williams, F.1
Boren, S.A.2
-
5
-
-
78049311663
-
The impact of electronic medical record systems on outpatient workflows: A longitudinal evaluation of its workflow effects
-
Vishwanath, A., Singh, S. R., and Winkelstein, P., The impact of electronic medical record systems on outpatient workflows: A longitudinal evaluation of its workflow effects. Int. J. Med. Inform. 79(11):778-791, 2010.
-
(2010)
Int. J. Med. Inform.
, vol.79
, Issue.11
, pp. 778-791
-
-
Vishwanath, A.1
Singh, S.R.2
Winkelstein, P.3
-
6
-
-
0034316957
-
Health care management and information systems security: Awareness, training or education?
-
Sokratis, K., Health care management and information systems security: Awareness, training or education? Int. J. Med. Inform. 60(2):129-135, 2000.
-
(2000)
Int. J. Med. Inform.
, vol.60
, Issue.2
, pp. 129-135
-
-
Sokratis, K.1
-
7
-
-
84856584399
-
Impact of health disclosure laws on health information exchanges
-
Adjerid, I., and Padman, R., Impact of health disclosure laws on health information exchanges. AMIA Annu. Symp. Proc. 2011:48-56, 2011.
-
(2011)
AMIA Annu. Symp. Proc.
, vol.2011
, pp. 48-56
-
-
Adjerid, I.1
Padman, R.2
-
8
-
-
84860253312
-
Security and privacy issues in wireless sensor networks for healthcare applications
-
Al Ameen, M., Liu, J., and Kwak, K., Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 36(1):93-101, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.1
, pp. 93-101
-
-
Al Ameen, M.1
Liu, J.2
Kwak, K.3
-
9
-
-
78751705912
-
Aspects of privacy for electronic health records
-
Haas, S., Wohlgemuth, S., Echizen, I., et al., Aspects of privacy for electronic health records. Int. J. Med. Inform. 80(2):e26-e31, 2011.
-
(2011)
Int. J. Med. Inform.
, vol.80
, Issue.2
-
-
Haas, S.1
Wohlgemuth, S.2
Echizen, I.3
-
10
-
-
84865238396
-
Impact of hipaa provisions on the stock market value of healthcare institutions, and information security and other information technology firms
-
Khansa, L., Cook, D. F., James, T., et al., Impact of HIPAA provisions on the stock market value of healthcare institutions, and information security and other information technology firms. Comput. Secur. 31(6):750-770, 2012.
-
(2012)
Comput. Secur.
, vol.31
, Issue.6
, pp. 750-770
-
-
Khansa, L.1
Cook, D.F.2
James, T.3
-
11
-
-
79960507876
-
A novel key management solution for reinforcing compliance with hipaa privacy/security regulations
-
Lee, C. D., Ho, K. I. J., and Lee, W. B., A novel key management solution for reinforcing compliance with HIPAA privacy/security regulations. IEEE Trans. Inf. Technol. Biomed. 15(4):550-556, 2011.
-
(2011)
IEEE Trans. Inf. Technol. Biomed.
, vol.15
, Issue.4
, pp. 550-556
-
-
Lee, C.D.1
Ho, K.I.J.2
Lee, W.B.3
-
12
-
-
84863552500
-
Strategies formaintaining patient privacy in i2b2
-
Murphy, S.N., Gainer, V., Mendis,M., et al., Strategies formaintaining patient privacy in i2b2. J. Am. Med. Assoc. 18(SUPPL. 1):103-108, 2011.
-
(2011)
J. Am. Med. Assoc.
, vol.18
, Issue.SUPPL. 1
, pp. 103-108
-
-
Murphy, S.N.1
Gainer, V.2
Mendis, M.3
-
13
-
-
84877107710
-
Security requirements for themedical information used by u-healthcare medical equipment
-
Son, J.,Kim, S., Park, G., et al., Security requirements for themedical information used by U-Healthcare medical equipment. Int. J. Secur. Appl. 7(1):169-180, 2013.
-
(2013)
Int. J. Secur. Appl.
, vol.7
, Issue.1
, pp. 169-180
-
-
Son, J.1
Kim, S.2
Park, G.3
-
14
-
-
84876521582
-
Privacy and security solutions for interoperable health information exchange
-
Sunil Kumar, C., Samy Durai, A., and Vinotha, S. R., Privacy and security solutions for interoperable health information exchange. Int. J. Med. Eng. Inform. 5(2):137-144, 2013.
-
(2013)
Int. J. Med. Eng. Inform.
, vol.5
, Issue.2
, pp. 137-144
-
-
Sunil Kumar, C.1
Samy Durai, A.2
Vinotha, S.R.3
-
15
-
-
84879476590
-
-
Dmitrienko, A., Hadzic, Z., Löhr, H. et al., "Securing the access to electronic health records on mobile phones," 2011, pp. 365-379.
-
(2011)
Securing the Access to Electronic Health Records on Mobile Phones,"
, pp. 365-379
-
-
Dmitrienko, A.1
Hadzic, Z.2
Löhr, H.3
-
16
-
-
80055093994
-
Sensor network security for pervasive e-health
-
Garcia-Morchon, O., Falck, T., and Wehrle, K., Sensor network security for pervasive e-health. Sec Commun. Networks 4(11):1257-1273, 2011.
-
(2011)
Sec Commun. Networks
, vol.4
, Issue.11
, pp. 1257-1273
-
-
Garcia-Morchon, O.1
Falck, T.2
Wehrle, K.3
-
17
-
-
84867301818
-
A privacy-strengthened scheme for e-healthcare monitoring system
-
Huang, C., Lee, H., and Lee, D. H., A privacy-strengthened scheme for E-healthcare monitoring system. J. Med. Syst. 36(5):2959-2971, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.5
, pp. 2959-2971
-
-
Huang, C.1
Lee, H.2
Lee, D.H.3
-
18
-
-
84872483621
-
On the security of a dynamic id-based authentication scheme for telecare medical information systems
-
Lin, H. Y., "On the security of a dynamic ID-based authentication scheme for telecare medical information systems," J. Med. Syst., vol. 37, no. 2, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, pp. 2
-
-
Lin, H.Y.1
-
19
-
-
84864952425
-
Secure remote health monitoring with unreliable mobile devices
-
Shin, M., "Secure remote health monitoring with unreliable mobile devices," Journal of Biomedicine and Biotechnology, vol. 2012, 2012.
-
(2012)
Journal of Biomedicine and Biotechnology
, vol.2012
-
-
Shin, M.1
-
20
-
-
79952064844
-
Securing access to healthcare
-
Ting, D., Securing access to healthcare. Biom. Technol. Today 2011(2):10-11, 2011.
-
(2011)
Biom. Technol. Today
, vol.2011
, Issue.2
, pp. 10-11
-
-
Ting, D.1
-
21
-
-
84868158297
-
Secure electronic healthcare records management in wireless environments
-
Belsis, P., Skourlas, C., and Gritzalis, S., Secure electronic healthcare records management in wireless environments. J. Inform. Technol. Res. 4(4):1-17, 2011.
-
(2011)
J. Inform. Technol. Res.
, vol.4
, Issue.4
, pp. 1-17
-
-
Belsis, P.1
Skourlas, C.2
Gritzalis, S.3
-
22
-
-
79952466879
-
Privilege management infrastructure for virtual organizations in healthcare grids
-
Calvillo, J., Román, I., Rivas, S., et al., Privilege management infrastructure for virtual organizations in healthcare grids. IEEE Trans. Inf. Technol. Biomed. 15(2):316-323, 2011.
-
(2011)
IEEE Trans. Inf. Technol. Biomed.
, vol.15
, Issue.2
, pp. 316-323
-
-
Calvillo, J.1
Román, I.2
Rivas, S.3
-
23
-
-
80053461711
-
Experience-based access management: A life-cycle framework for identity and access management systems
-
Gunter, C., Liebovitz, D., and Malin, B., Experience-based access management: A life-cycle framework for identity and access management systems. IEEE Secur. Priv. 9(5):48-55, 2011.
-
(2011)
IEEE Secur. Priv.
, vol.9
, Issue.5
, pp. 48-55
-
-
Gunter, C.1
Liebovitz, D.2
Malin, B.3
-
24
-
-
79951680016
-
Patient-centric authorization framework for electronic healthcare services
-
Jin, J., Ahn, G. J., Hu, H., et al., Patient-centric authorization framework for electronic healthcare services. Comput. Secur. 30(2-3):116-127, 2011.
-
(2011)
Comput. Secur.
, vol.30
, Issue.2-3
, pp. 116-127
-
-
Jin, J.1
Ahn, G.J.2
Hu, H.3
-
25
-
-
84870552425
-
Purpose based access control for privacy protection in e-healthcare services
-
Sun, L., Wang, H., Soar, J., et al., Purpose based access control for privacy protection in E-Healthcare services. J. Softw. 7(11):2443-2449, 2012.
-
(2012)
J. Softw.
, vol.7
, Issue.11
, pp. 2443-2449
-
-
Sun, L.1
Wang, H.2
Soar, J.3
-
26
-
-
84876796310
-
U-healthcare system: State-of-The-Art review and challenges,"
-
Touati, F., and Tabish, R., "U-healthcare system: State-of-The-Art review and challenges," J. Med. Syst., vol. 37, no. 3, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, pp. 3
-
-
Touati, F.1
Tabish, R.2
-
27
-
-
84871908002
-
Patient-controlled sharing of medical imaging data across unaffiliated healthcare organizations
-
Ge, Y., Ahn, D. K., Unde, B., et al., Patient-controlled sharing of medical imaging data across unaffiliated healthcare organizations. J. Am. Med. Assoc. 20(1):157-163, 2013.
-
(2013)
J. Am. Med. Assoc.
, vol.20
, Issue.1
, pp. 157-163
-
-
Ge, Y.1
Ahn, D.K.2
Unde, B.3
-
28
-
-
84869457294
-
Personal health records: New means to safely handle health data?
-
Semor, I. C., Alemán, J. L. F., and Toval, A., Personal health records: New means to safely handle health data? Computer 45(11):27-33, 2012.
-
(2012)
Computer
, vol.45
, Issue.11
, pp. 27-33
-
-
Semor, I.C.1
Alemán, J.L.F.2
Toval, A.3
-
29
-
-
84874392848
-
Behavior-based access control for distributed healthcare systems
-
Yarmand, M. H., Sartipi, K., and Down, D. G., Behavior-based access control for distributed healthcare systems. J. Comput. Secur. 21(1):1-39, 2013.
-
(2013)
J. Comput. Secur
, vol.21
, Issue.1
, pp. 1-39
-
-
Yarmand, M.H.1
Sartipi, K.2
Down, D.G.3
-
30
-
-
79954599450
-
Personal health records: Consumer attitudes toward privacy and security of their personal health information
-
Beranek Lafky, D., and Horan, T. A., Personal health records: Consumer attitudes toward privacy and security of their personal health information. Health Inform. J. 17(1):63-71, 2011.
-
(2011)
Health Inform. J.
, vol.17
, Issue.1
, pp. 63-71
-
-
Beranek Lafky, D.1
Horan, T.A.2
-
31
-
-
53149096568
-
Understanding purchasing behaviors in virtual economy: Consumer behavior of virtual currency in web2.0 communities
-
Shin, D., Understanding purchasing behaviors in virtual economy: Consumer behavior of virtual currency in Web2.0 communities. Interact. Comput. 20(4):433-446, 2008.
-
(2008)
Interact. Comput.
, vol.20
, Issue.4
, pp. 433-446
-
-
Shin, D.1
-
32
-
-
84877778249
-
A pre-control systemto edit contents with an extended sanitizable signature
-
Inamura,M., Saito, A., and Iwamura, K., A pre-control systemto edit contents with an extended sanitizable signature. IEEJ Trans. Electron. Inf. Syst. 133(4):802-815, 2013.
-
(2013)
IEEJ Trans. Electron. Inf. Syst
, vol.133
, Issue.4
, pp. 802-815
-
-
Inamura, M.1
Saito, A.2
Iwamura, K.3
-
33
-
-
80053495106
-
Provably security identity-based sanitizable signature scheme without random oracles
-
Ming, Y., Shen, X., and Peng, Y., Provably security identity-based sanitizable signature scheme without random oracles. J. Softw. 6(10):1890-1897, 2011.
-
(2011)
J. Softw.
, vol.6
, Issue.10
, pp. 1890-1897
-
-
Ming, Y.1
Shen, X.2
Peng, Y.3
-
34
-
-
79951487264
-
Sanitizable signatures reconsidered
-
Yum,D. H., and Lee, P. J., Sanitizable signatures reconsidered. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E94-A(2):717-724, 2011.
-
(2011)
IEICE Trans. Fundam. Electron. Commun. Comput. Sci
, vol.E94-A
, Issue.2
, pp. 717-724
-
-
Yum, D.H.1
Lee, P.J.2
-
35
-
-
84890069861
-
Information technology-security techniques-entity authentication mechanisms; part 3; entity authentication using a public key algorithm
-
ISO/IEC-9798-3
-
ISO/IEC-9798-3, "Information technology-Security techniques-Entity authentication mechanisms; Part 3; Entity authentication using a public key algorithm " International Organization for Standardization, 1-9, 1993.
-
(1993)
International Organization for Standardization
, pp. 1-9
-
-
-
36
-
-
78649395496
-
Identity-based sanitizable signature scheme in the standard model
-
Ming, Y., Shen, X., and Peng, Y., Identity-based sanitizable signature scheme in the standard model. Commun. Comput. Inf. Science 105 (Part 1):9-16, 2010.
-
(2010)
Commun. Comput. Inf. Science
, vol.105
, Issue.PART 1
, pp. 9-16
-
-
Ming, Y.1
Shen, X.2
Peng, Y.3
-
37
-
-
0002357382
-
Role based access control
-
Oct. 13-16
-
Ferraiolo, D. F., and Kuhn, D. R., "Role based access control," 15th National Computer Security Conference, pp. 554-563, Oct 13-16, 1992, 1992.
-
(1992)
15th National Computer Security Conference
, vol.1992
, pp. 554-563
-
-
Ferraiolo, D.F.1
Kuhn, D.R.2
-
38
-
-
1542382496
-
User acceptance of information technology: Toward a unified view
-
Venkatesh, V.,Morris,M. G., Davis, G. B., et al., User acceptance of information technology: Toward a unified view. MIS Q. 27(3):425-478, 2003.
-
(2003)
MIS Q.
, vol.27
, Issue.3
, pp. 425-478
-
-
Venkatesh, V.1
Morris, M.G.2
Davis, G.B.3
-
39
-
-
77955228405
-
Integrating ttf and utaut to explain mobile banking user adoption
-
Zhou, T., Lu, Y., and Wang, B., Integrating TTF and UTAUT to explain mobile banking user adoption. Comput. Hum. Behav. 26(4):760-767, 2010.
-
(2010)
Comput. Hum. Behav
, vol.26
, Issue.4
, pp. 760-767
-
-
Zhou, T.1
Lu, Y.2
Wang, B.3
-
40
-
-
55249087535
-
Perceived usefulness, perceived ease of use, and user acceptance of information technology
-
Davis, F. D., Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13(3):319-339, 1989.
-
(1989)
MIS Q.
, vol.13
, Issue.3
, pp. 319-339
-
-
Davis, F.D.1
-
41
-
-
77956617049
-
The acceptance and use of customer relationship management (crm) systems: An empirical study of distribution service industry in taiwan
-
Pai, J.-C., and Tu, F.-M., The acceptance and use of customer relationship management (CRM) systems: An empirical study of distribution service industry in Taiwan. Expert Syst. Appl. 38(1):579-584, 2011.
-
(2011)
Expert Syst. Appl
, vol.38
, Issue.1
, pp. 579-584
-
-
Pai, J.-C.1
Tu, F.-M.2
-
42
-
-
34247352463
-
Explaining information technology usage: A test of competing models
-
Premkumar, G., and Bhattacherjee, A., Explaining information technology usage: A test of competing models. OMEGA Int. J. Manag. Sci. 36:64-75, 2008.
-
(2008)
OMEGA Int. J. Manag. Sci.
, vol.36
, pp. 64-75
-
-
Premkumar, G.1
Bhattacherjee, A.2
-
43
-
-
84907076915
-
Students and housewives:differences in susceptibility to reference group influence
-
Park, C.W., and Lessing, V. P., Students and housewives:Differences in susceptibility to reference group influence. J. Consum. Res. 4(2):102-110, 1977.
-
(1977)
J. Consum. Res
, vol.4
, Issue.2
, pp. 102-110
-
-
Park, C.W.1
Lessing, V.P.2
-
44
-
-
0001094004
-
Information technology adoption across time: Across-sectional comparison of pre-Adoption and post-Adoption beliefs
-
Karahanna, E., Straub, D. W., and Chervany, N. L., Information technology adoption across time: Across-sectional comparison of pre-Adoption and post-Adoption beliefs. MIS Q. 23(2):183-213, 1999.
-
(1999)
MIS Q.
, vol.23
, Issue.2
, pp. 183-213
-
-
Karahanna, E.1
Straub, D.W.2
Chervany, N.L.3
-
45
-
-
9744226442
-
Sources of influence on beliefs about information technology use: An empirical study of knowledge workers
-
Lewis, W., Agarwal, R., and Sambamurthy, V., Sources of influence on beliefs about information technology use: An empirical study of knowledge workers. MIS Q. 27(4):657-678, 2003.
-
(2003)
MIS Q.
, vol.27
, Issue.4
, pp. 657-678
-
-
Lewis, W.1
Agarwal, R.2
Sambamurthy, V.3
-
46
-
-
73549120882
-
Understanding information technology usage: A test of competing models
-
Taylor, S., and Todd, P. A., Understanding information technology usage: A test of competing models. Inf. Syst. Res. 6(2):144-176, 1995.
-
(1995)
Inf. Syst. Res.
, vol.6
, Issue.2
, pp. 144-176
-
-
Taylor, S.1
Todd, P.A.2
-
47
-
-
66449136652
-
Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuation
-
Corey,M. A., and Agarwal, R., Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuation. MIS Q. 33(2):339-370, 2009.
-
(2009)
MIS Q.
, vol.33
, Issue.2
, pp. 339-370
-
-
Corey, M.A.1
Agarwal, R.2
-
48
-
-
36049013776
-
Mobile payment adoption in the us: Acrossindustry cross-platform solution
-
Dewan, S., and Chen, L.,Mobile payment adoption in the US: Acrossindustry cross-platform solution. J. Inf. Priv. Secur. 1(2):4-28, 2005.
-
(2005)
J. Inf. Priv. Secur.
, vol.1
, Issue.2
, pp. 4-28
-
-
Dewan, S.1
Chen, L.2
-
49
-
-
84991310025
-
Consumer online privacy concerns and responses: A power-responsibility equilibrium perspective
-
Lwin, M., Wirtz, J., and Williams, J. D., Consumer online privacy concerns and responses: A power-responsibility equilibrium perspective. J. Acad. Mark. Sci. 35(4):572-585, 2007.
-
(2007)
J. Acad. Mark. Sci.
, vol.35
, Issue.4
, pp. 572-585
-
-
Lwin, M.1
Wirtz, J.2
Williams, J.D.3
-
50
-
-
69549091696
-
Towards an understanding of the consumer acceptance of mobile wallet
-
Shin, D., Towards an understanding of the consumer acceptance of mobile wallet. Comput. Hum. Behav. 25(6):1343-1354, 2009.
-
(2009)
Comput. Hum. Behav.
, vol.25
, Issue.6
, pp. 1343-1354
-
-
Shin, D.1
-
51
-
-
84892567876
-
-
Nov. 22
-
Wilson, M., Stine, K., and Bowen, P., "National Institute of Standards and Technology (NIST) Special Publication 800-16: Information technology security training requirements: A role-And performance-based model (Draft)", Nov. 22, 2011; http://csrc.nist.gov/publications/drafts/800-16- rev1/Draft-SP800-16-Rev1.pdf.
-
(2011)
National Institute of Standards and Technology (NIST) Special Publication 800-16: Information Technology Security Training Requirements: A Role-And Performance-Based Model (Draft
-
-
Wilson, M.1
Stine, K.2
Bowen, P.3
-
52
-
-
84892591605
-
An investigation of high school teachers' cyber security literacy in taiwan
-
Taipei, Taiwan
-
Lin, I. L., and Liu,M. D., "An investigation of high school teachers' cyber security literacy in Taiwan," in Taiwan Academic Network Conference (TANET 2007), Taipei, Taiwan, 2007.
-
(2007)
Taiwan Academic Network Conference (TANET 2007
-
-
Lin, I.L.1
Liu, M.D.2
-
53
-
-
84859888115
-
Understanding consumer 2acceptance of mobile payment services: An empirical analysis
-
Schierz, P. G., Schilke, O., andWirtz, B.W., Understanding consumer 2acceptance of mobile payment services: An empirical analysis. Electron. Commer. Res. Appl. 9(3):209-216, 2010.
-
(2010)
Electron. Commer. Res. Appl.
, vol.9
, Issue.3
, pp. 209-216
-
-
Schierz, P.G.1
Schilke, O.2
Wirtz, B.W.3
-
55
-
-
0000009769
-
Evaluating structural equation models with unobservable variables and measurement error
-
Fornell, C., and Larcker, D. F., Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res. 18(1):39-50, 1981.
-
(1981)
J. Mark. Res.
, vol.18
, Issue.1
, pp. 39-50
-
-
Fornell, C.1
Larcker, D.F.2
|