메뉴 건너뛰기




Volumn 4, Issue 4, 2013, Pages

Mining deviations from patient care pathways via electronic medical record system audits

Author keywords

Anomaly detection; Audit; Data mining; Electronic medical record systems; Graph based analysis; Temporal systems

Indexed keywords

ANOMALY DETECTION; AUDIT; ELECTRONIC MEDICAL RECORD SYSTEM; GRAPH-BASED; TEMPORAL SYSTEMS;

EID: 84891786408     PISSN: 2158656X     EISSN: 21586578     Source Type: Journal    
DOI: 10.1145/2544102     Document Type: Article
Times cited : (27)

References (64)
  • 1
    • 84891790375 scopus 로고    scopus 로고
    • Think a privacy breach couldn't happen at your facility?
    • Amatayakul, M. 2009. Think a privacy breach couldn't happen at your facility? Hospital Financial Manage. 12, 61-65.
    • (2009) Hospital Financial Manage. , vol.12 , pp. 61-65
    • Amatayakul, M.1
  • 2
    • 80455156922 scopus 로고    scopus 로고
    • Information security and privacy in healthcare: Current state of research
    • Appari, A. and Johnson, M. 2011. Information security and privacy in healthcare: Current state of research. Int. J. Internet Enterprise Manage. 6, 279-314.
    • (2011) Int. J. Internet Enterprise Manage. , vol.6 , pp. 279-314
    • Appari, A.1    Johnson, M.2
  • 4
    • 1542327773 scopus 로고    scopus 로고
    • Some unintended consequences of information technology in health care: The nature of patient care information system-related errors
    • DOI 10.1197/jamia.M1471
    • Ash, J. S., Berg, M., and Coiera, E. 2004. Some unintended consequences of information technology in health care: The nature of patient care information system-related errors. J. Amer. Med. Informatics Assoc. 11, 2, 104-112. (Pubitemid 38327498)
    • (2004) Journal of the American Medical Informatics Association , vol.11 , Issue.2 , pp. 104-112
    • Ash, J.S.1    Berg, M.2    Coiera, E.3
  • 5
    • 77951135204 scopus 로고    scopus 로고
    • The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online
    • Bansal, G., Zahedi, F., and Gefen, D. 2010. The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Syst. 49, 138-150.
    • (2010) Decision Support Syst. , vol.49 , pp. 138-150
    • Bansal, G.1    Zahedi, F.2    Gefen, D.3
  • 6
    • 38049042929 scopus 로고    scopus 로고
    • Towards improved privacy policy coverage in healthcare using policy refinement
    • Bhatti, R. and Grandison, T. 2007. Towards improved privacy policy coverage in healthcare using policy refinement. In Proceedings of the Secure Data Management Workshop 4721, 158-173.
    • (2007) Proceedings of the Secure Data Management Workshop , vol.4721 , pp. 158-173
    • Bhatti, R.1    Grandison, T.2
  • 7
    • 1842474926 scopus 로고    scopus 로고
    • Authorisation and access control for electronic health record systems
    • DOI 10.1016/j.ijmedinf.2003.11.018, PII S1386505603001916
    • Blobel, B. 2004. Authorisation and access control for electronic health record systems. Int. J. Med. Informatics 73, 3, 251-257. (Pubitemid 38452939)
    • (2004) International Journal of Medical Informatics , vol.73 , Issue.3 , pp. 251-257
    • Blobel, B.1
  • 8
    • 70449396545 scopus 로고    scopus 로고
    • Review article: Effectiveness of patient care teams and the role of clinical expertise and coordination: A literature review
    • Bosch, M., Faber, M. J., Cruijsberg, J., Voerman, G. E., Leatherman, S., Grol, R. P., Hulscher, M., and Wensing, M. 2009. Review article: Effectiveness of patient care teams and the role of clinical expertise and coordination: A literature review. Med. Care Res. and Rev. 66, 6 Suppl., 5S-35S.
    • (2009) Med. Care Res. and Rev. , vol.66 , Issue.6 SUPPL.
    • Bosch, M.1    Faber, M.J.2    Cruijsberg, J.3    Voerman, G.E.4    Leatherman, S.5    Grol, R.P.6    Hulscher, M.7    Wensing, M.8
  • 9
    • 79959638566 scopus 로고    scopus 로고
    • Using statistical and machine learning to help institutions detect suspicious access to electronic health records
    • Boxwala, A. A., Kim, J., Grillo, J. M., and Ohno-Machado, L. 2011. Using statistical and machine learning to help institutions detect suspicious access to electronic health records. J. Amer. Med. Informatics Assoc. 18, 498-505.
    • (2011) J. Amer. Med. Informatics Assoc. , vol.18 , pp. 498-505
    • Boxwala, A.A.1    Kim, J.2    Grillo, J.M.3    Ohno-Machado, L.4
  • 10
    • 77956911344 scopus 로고    scopus 로고
    • Health information technology: Laying the infrastructure for national health reform
    • Buntin, M. B., Jain, S. H., and Blumenthal, D. 2010. Health information technology: Laying the infrastructure for national health reform. Health Affairs 29, 6, 1214-1219.
    • (2010) Health Affairs , vol.29 , Issue.6 , pp. 1214-1219
    • Buntin, M.B.1    Jain, S.H.2    Blumenthal, D.3
  • 13
    • 18944385964 scopus 로고    scopus 로고
    • The value of intrusion detection systems in information technology security architecture
    • DOI 10.1287/isre.1050.0041
    • Cavusoglu, H., Mishra, B., and Raghunathan, S. 2005. The value of intrusion detection systems in information technology security architecture. Inform. Syst. Res. 16, 1, 28-46. (Pubitemid 40701107)
    • (2005) Information Systems Research , vol.16 , Issue.1 , pp. 28-46
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 14
    • 33646822781 scopus 로고    scopus 로고
    • Systematic review: Impact of health information technology on quality, efficiency, and costs of medical care
    • Chaudhry, B., Wang, J., Wu, S., Maglione, M., Mojica, W., Roth, E., Morton, S. C., and Shekelle, P. G. 2006. Systematic review: Impact of health information technology on quality, efficiency, and costs of medical care. Ann. Intern. Med. 144, 10, 742-752. (Pubitemid 46780634)
    • (2006) Annals of Internal Medicine , vol.144 , Issue.10 , pp. 742-752
    • Chaudhry, B.1    Wang, J.2    Wu, S.3    Maglione, M.4    Mojica, W.5    Roth, E.6    Morton, S.C.7    Shekelle, P.G.8
  • 15
    • 13544269338 scopus 로고    scopus 로고
    • Application of SVM and ANN for intrusion detection
    • DOI 10.1016/j.cor.2004.03.019, PII S0305054804000711, Application of Neural Networks
    • Chen, W.-H., Hsu, S.-H., and Shen, H.-P. 2005. Application of SVM and ANN for intrusion detection. Comput. Op. Res. 32, 2617-2634. (Pubitemid 40219764)
    • (2005) Computers and Operations Research , vol.32 , Issue.10 , pp. 2617-2634
    • Chen, W.-H.1    Hsu, S.-H.2    Shen, H.-P.3
  • 18
    • 84871892207 scopus 로고    scopus 로고
    • Specializing network analysis to detect anomalous insider actions
    • Chen, Y., Nyemba, S., Zhang, W., and Malin, B. 2012b. Specializing network analysis to detect anomalous insider actions. Security Informatics 1, 5, 1-24.
    • (2012) Security Informatics , vol.1 , Issue.5 , pp. 1-24
    • Chen, Y.1    Nyemba, S.2    Zhang, W.3    Malin, B.4
  • 19
    • 33845700071 scopus 로고    scopus 로고
    • Continuous auditing with a multi-agent system
    • DOI 10.1016/j.dss.2006.08.002, PII S0167923606001175, Decision Support Systems in Emerging Economies
    • Chou, C., Du, T., and Lai, V. S. 2007. Continuous auditing with a multi-agent system. Decis. Supp. Syst. 42, 2274-2292. (Pubitemid 44969948)
    • (2007) Decision Support Systems , vol.42 , Issue.4 , pp. 2274-2292
    • Chou, C.L.-y.1    Du, T.2    Lai, V.S.3
  • 20
    • 33744467431 scopus 로고    scopus 로고
    • Compliance with HIPAA security standards in US Hospitals
    • Davis, D. and Having, K. 2006. Compliance with HIPAA security standards in U.S. hospitals. J. Healthcare Inform. Manage. 20, 108-115.
    • (2006) J. Healthcare Inform. Manage , vol.20 , pp. 108-115
    • Davis, D.1    Having, K.2
  • 21
    • 77950962201 scopus 로고    scopus 로고
    • A guide to California's breaches: First year of state reporting requirement reveals common privacy violations
    • Dimick, C. 2010. A guide to California's breaches: First year of state reporting requirement reveals common privacy violations. J. Amer. Health Inform. Manage. Assoc. 81, 34-36.
    • (2010) J. Amer. Health Inform. Manage. Assoc. , vol.81 , pp. 34-36
    • Dimick, C.1
  • 23
    • 84871865576 scopus 로고    scopus 로고
    • Explaining accesses to electronic medical records using diagnosis information
    • Fabbri, D. and LeFevre, K. 2013. Explaining accesses to electronic medical records using diagnosis information. J. Amer. Med. Informatics Assoc. 20, 1, 52-60.
    • (2013) J. Amer. Med. Informatics Assoc. , vol.20 , Issue.1 , pp. 52-60
    • Fabbri, D.1    Lefevre, K.2
  • 27
    • 0034150591 scopus 로고    scopus 로고
    • Electronic medical records and patient privacy
    • Goldberg, I. V. 2000. Electronic medical records and patient privacy. Health Care Manager 18, 3, 63-69.
    • (2000) Health Care Manager , vol.18 , Issue.3 , pp. 63-69
    • Goldberg, I.V.1
  • 28
    • 33745183324 scopus 로고    scopus 로고
    • Hit and mis: Implications of health information technology andmedical information systems
    • Goldschmidt, P. G. 2005. Hit and mis: Implications of health information technology andmedical information systems. Comm. ACM 48, 10, 68-74.
    • (2005) Comm. ACM , vol.48 , Issue.10 , pp. 68-74
    • Goldschmidt, P.G.1
  • 29
    • 80053461711 scopus 로고    scopus 로고
    • Experience-based access management: A life-cycle framework for identity and access management systems
    • Gunter, C. A., Liebovitz, D., and Malin, B. 2011. Experience-based access management: A life-cycle framework for identity and access management systems. IEEE Security Privacy 9, 5, 48-55.
    • (2011) IEEE Security Privacy , vol.9 , Issue.5 , pp. 48-55
    • Gunter, C.A.1    Liebovitz, D.2    Malin, B.3
  • 30
    • 61349124807 scopus 로고    scopus 로고
    • Identifying disgruntled employee systems fraud risk through text mining: A simple solution for a multi-billion dollar problem
    • Holton, C. 2009. Identifying disgruntled employee systems fraud risk through text mining: A simple solution for a multi-billion dollar problem. Decision Supp. Syst. 46, 853-864.
    • (2009) Decision Supp. Syst. , vol.46 , pp. 853-864
    • Holton, C.1
  • 31
    • 38549142402 scopus 로고    scopus 로고
    • Anomaly detection using temporal data mining in a smart home environment
    • DOI 10.3414/ME9103
    • Jakkula, V. R. and Cook, D. J. 2008. Anomaly detection using temporal data mining in a smart home environment. Methods Inform. Medicine 47, 1, 70-75. (Pubitemid 351160348)
    • (2008) Methods of Information in Medicine , vol.47 , Issue.1 , pp. 70-75
    • Jakkula, V.1    Cook, D.J.2
  • 32
    • 84891771211 scopus 로고    scopus 로고
    • Chapter Enhancing anomaly detection using temporal pattern discovery, 175-194, Spriger
    • Jakkula, V. R., Crandall, A. S., and Cook, D. J. 2008. Advanced Intelligent Environments. Chapter Enhancing anomaly detection using temporal pattern discovery, 175-194, Spriger.
    • (2008) Advanced Intelligent Environments
    • Jakkula, V.R.1    Crandall, A.S.2    Cook, D.J.3
  • 36
    • 84871879163 scopus 로고    scopus 로고
    • Security practices and regulatory compliance in the healthcare industry
    • Kwon, J. and Johnson, M. 2013. Security practices and regulatory compliance in the healthcare industry. J. Amer. Med. Informatics Assoc. 20, 1, 44-50.
    • (2013) J. Amer. Med. Informatics Assoc. , vol.20 , Issue.1 , pp. 44-50
    • Kwon, J.1    Johnson, M.2
  • 37
    • 77949731575 scopus 로고    scopus 로고
    • Temporal sequence learning and data reduction for anomaly detection
    • Lane, T. and Brodley, C. E. 1999. Temporal sequence learning and data reduction for anomaly detection. ACM Trans. Inform. Syst. Secur. 2, 3, 295-331.
    • (1999) ACM Trans. Inform. Syst. Secur. , vol.2 , Issue.3 , pp. 295-331
    • Lane, T.1    Brodley, C.E.2
  • 38
    • 84869871203 scopus 로고    scopus 로고
    • An enhancement of the role-based access control model to facilitate information access management in context of team collaboration and workflow
    • Le, X., T. Doll, Barbosu, M., Luque, Z., and Wang, D. 2012. An enhancement of the role-based access control model to facilitate information access management in context of team collaboration and workflow. J. Biomed. Informatics 45, 1084-1107.
    • (2012) J. Biomed. Informatics , vol.45 , pp. 1084-1107
    • Le, X.1    Doll, T.2    Barbosu, M.3    Luque, Z.4    Wang, D.5
  • 39
    • 84867297440 scopus 로고    scopus 로고
    • RBAC-matrix-based EMR rights management system to improve HIPAA compliance
    • Lee, H. and Chang, S. 2012. RBAC-matrix-based EMR rights management system to improve HIPAA compliance. J. Med. Syst 36, 2981-2992.
    • (2012) J. Med. Syst , vol.36 , pp. 2981-2992
    • Lee, H.1    Chang, S.2
  • 41
    • 0036318237 scopus 로고    scopus 로고
    • If electronic medical records are so great, why aren't family physicians using them?
    • Loomis, G. A., Ries, J. S., Saywell, R. M., and Thakker, N. R. 2002. If electronic medical records are so great, why arent family physicians using them? J. Family Practice 51, 7, 636-641. (Pubitemid 34753553)
    • (2002) Journal of Family Practice , vol.51 , Issue.7 , pp. 636-641
    • Loomis, G.A.1    Ries, S.J.2    Saywell Jr., R.M.3    Thakker, N.R.4
  • 42
    • 57549096747 scopus 로고    scopus 로고
    • Adopting electronic medical records in primary care: Lessons learned from health information systems implementation experience in seven countries
    • Ludwick, D. A. and Doucette, J. 2009. Adopting electronic medical records in primary care: lessons learned from health information systems implementation experience in seven countries. Int. J. Med. Informatics 78, 1, 22-31.
    • (2009) Int. J. Med. Informatics , vol.78 , Issue.1 , pp. 22-31
    • Ludwick, D.A.1    Doucette, J.2
  • 43
    • 79952774177 scopus 로고    scopus 로고
    • Learning relational policies from electronic health record access logs
    • Malin, B., Nyemba, S., and Paulett, J. 2011. Learning relational policies from electronic health record access logs. J. Biomed. Informatics 44, 2, 333-342.
    • (2011) J. Biomed. Informatics , vol.44 , Issue.2 , pp. 333-342
    • Malin, B.1    Nyemba, S.2    Paulett, J.3
  • 44
    • 84891780550 scopus 로고    scopus 로고
    • Four reasons for CIOs to celebrate stage 2 meaningful use
    • September 12
    • Manos, D. September 12 2012. Four reasons for CIOs to celebrate stage 2 meaningful use. Gov. Health IT Mag.
    • (2012) Gov. Health IT Mag.
    • Manos, D.1
  • 46
    • 84897111298 scopus 로고    scopus 로고
    • Detecting inappropriate access to electronic health records using collaborative filtering
    • Menon, A., Jiang, X., Kim, J., Vaidya, J., and Ohno-Machado, L. 2013. Detecting inappropriate access to electronic health records using collaborative filtering. Mach. Learn., 1-1.
    • (2013) Mach. Learn. , pp. 1-1
    • Menon, A.1    Jiang, X.2    Kim, J.3    Vaidya, J.4    Ohno-Machado, L.5
  • 47
    • 0142151165 scopus 로고    scopus 로고
    • A contextual role-based access control authorization model for electronic patient records
    • Motta, G. and Furuie, S. 2003. A contextual role-based access control authorization model for electronic patient records. IEEE Trans. Inform. Technol. Biomed. 7, 202-207.
    • (2003) IEEE Trans. Inform. Technol. Biomed. , vol.7 , pp. 202-207
    • Motta, G.1    Furuie, S.2
  • 49
    • 55549122324 scopus 로고    scopus 로고
    • Situation-based access control: Privacy management via modeling of patient data access scenarios
    • Peleg, M., Beimel, D., Dori, D., and Denekamp, Y. 2008. Situation-Based Access Control: Privacy management via modeling of patient data access scenarios. J. Biomed. Informatics 41, 6, 1028-1040.
    • (2008) J. Biomed. Informatics , vol.41 , Issue.6 , pp. 1028-1040
    • Peleg, M.1    Beimel, D.2    Dori, D.3    Denekamp, Y.4
  • 50
    • 18044390760 scopus 로고    scopus 로고
    • Primary care physician time utilization before and after implementation of an electronic health record: A time-motion study
    • DOI 10.1016/j.jbi.2004.11.009, PII S1532046404001613
    • Pizziferri, L., Kittler, A. F., Volk, L. A., Honour, M. M., Gupta, S., Wang, S., Wang, T., Lippincott, M., Li, Q., and Bates, D. W. 2005. Primary care physician time utilization before and after implementation of an electronic health record: A time-motion study. J. Biomed. Informatics 38, 3, 176-188. (Pubitemid 40724468)
    • (2005) Journal of Biomedical Informatics , vol.38 , Issue.3 , pp. 176-188
    • Pizziferri, L.1    Kittler, A.F.2    Volk, L.A.3    Honour, M.M.4    Gupta, S.5    Wang, S.6    Wang, T.7    Lippincott, M.8    Li, Q.9    Bates, D.W.10
  • 52
    • 5344244656 scopus 로고    scopus 로고
    • R Development Core Team, R Foundation for Statistical Computing, Vienna, Austria
    • R Development Core Team. 2008. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria.
    • (2008) R: A Language and Environment for Statistical Computing
  • 54
    • 0028513932 scopus 로고
    • Access control: Principle and practice
    • Sandhu, R. and Samarati, P. 1994. Access control: Principle and practice. IEEE Comm. Mag. 32, 40-48.
    • (1994) IEEE Comm. Mag. , vol.32 , pp. 40-48
    • Sandhu, R.1    Samarati, P.2
  • 56
    • 0034638661 scopus 로고    scopus 로고
    • Internet based repository of medical records that retains patient confidentiality
    • Schoenberg, R. and Safran, C. 2000. Internet based repository of medical records that retains patient confidentiality. British Med. J. 321, 1199-1203.
    • (2000) British Med. J. , vol.321 , pp. 1199-1203
    • Schoenberg, R.1    Safran, C.2
  • 57
    • 0036395373 scopus 로고    scopus 로고
    • A framework for understanding and predicting insider attacks
    • DOI 10.1016/S0167-4048(02)01009-X
    • Schultz, E. 2002. A framework for understanding and predicting insider attacks. Comput. Security 21, 526-531. (Pubitemid 35186246)
    • (2002) Computers and Security , vol.21 , Issue.6 , pp. 526-531
    • Schultz, E.E.1
  • 58
    • 0033120274 scopus 로고    scopus 로고
    • Security in health-care information systems - Current trends
    • DOI 10.1016/S1386-5056(98)00168-3, PII S1386505698001683
    • Smith, E. and Eloff, J. 1999. Security in health-care information systems-Current trends. Int. J. Med. Informatics 54, 39-54. (Pubitemid 29130335)
    • (1999) International Journal of Medical Informatics , vol.54 , Issue.1 , pp. 39-54
    • Smith, E.1    Eloff, J.H.P.2
  • 62
    • 3042684910 scopus 로고    scopus 로고
    • A rule-based framework for role-based delegation and revocation
    • Zhang, L., Ahn, G.-J., and Chu, B.-T. 2003. A rule-based framework for role-based delegation and revocation. ACM Trans. Inform. Syst. Security 6, 3, 404-441.
    • (2003) ACM Trans. Inform. Syst. Security , vol.6 , Issue.3 , pp. 404-441
    • Zhang, L.1    Ahn, G.-J.2    Chu, B.-T.3
  • 64
    • 14844299328 scopus 로고    scopus 로고
    • HIPAA compliant auditing system for medical images
    • DOI 10.1016/j.compmedimag.2004.09.009, PII S0895611104001223, Imaging Informatics
    • Zhou, Z. and Liu, B. J. 2005. HIPAA compliant auditing system for medical images. Comput. Med. Imaging Graphics 29, 2-3, 235-241. (Pubitemid 40341312)
    • (2005) Computerized Medical Imaging and Graphics , vol.29 , Issue.2-3 , pp. 235-241
    • Zhou, Z.1    Liu, B.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.