메뉴 건너뛰기




Volumn 57, Issue 1, 2014, Pages 406-416

A decision methodology for managing operational efficiency and information disclosure risk in healthcare processes

Author keywords

Control; Healthcare processes; Information disclosure; Optimization; Risk; Workflow efficiency

Indexed keywords

DECISION MAKING METHODOLOGY; DECISION SUPPORT MODELS; HEALTHCARE ORGANIZATIONS; HEALTHCARE PROCESS; INFORMATION DISCLOSURE; INFORMATION SECURITY REQUIREMENTS; OPERATIONAL EFFICIENCIES; THROUGHPUT OPTIMIZATION;

EID: 84892369906     PISSN: 01679236     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.dss.2012.10.046     Document Type: Article
Times cited : (21)

References (55)
  • 2
    • 0036644509 scopus 로고    scopus 로고
    • Computer monitoring: Benefits and pitfalls facing management
    • DOI 10.1016/S0378-7206(01)00121-5, PII S0378720601001215
    • S. Ariss Computer monitoring: benefits and pitfalls facing management Information Management 39 7 2002 553 558 (Pubitemid 34704309)
    • (2002) Information and Management , vol.39 , Issue.7 , pp. 553-558
    • Ariss, S.S.1
  • 4
    • 84867511196 scopus 로고    scopus 로고
    • On the prevention of fraud and privacy exposure in process information flow
    • X. Bai, R. Gopal, M. Nunez, and D. Zhdanov On the prevention of fraud and privacy exposure in process information flow INFORMS Journal on Computing 24 3 2012 416 432
    • (2012) INFORMS Journal on Computing , vol.24 , Issue.3 , pp. 416-432
    • Bai, X.1    Gopal, R.2    Nunez, M.3    Zhdanov, D.4
  • 7
    • 0037213472 scopus 로고    scopus 로고
    • Knowledge management-enabled health care management systems: Capabilities, infrastructure, and decision-support
    • DOI 10.1016/S0957-4174(02)00083-0, PII S0957417402000830
    • R. Bose Knowledge management-enabled health care management systems: capabilities, infrastructure, and decision-support Expert Systems with Applications 24 1 2003 59 71 (Pubitemid 35452265)
    • (2003) Expert Systems with Applications , vol.24 , Issue.1 , pp. 59-71
    • Bose, R.1
  • 8
    • 79952784402 scopus 로고    scopus 로고
    • Health information technology: Integration of clinical workflow into meaningful use of electronic health records
    • F.M. Bowens, P.A. Frye, and W.A. Jones Health information technology: integration of clinical workflow into meaningful use of electronic health records Perspectives in Health Information Management 1-18 Fall 2010
    • (2010) Perspectives in Health Information Management , Issue.118
    • Bowens, F.M.1    Frye, P.A.2    Jones, W.A.3
  • 10
    • 0028515494 scopus 로고
    • Policy resolution in workflow management systems
    • C.J. Bussler Policy resolution in workflow management systems Digital Technical Journal 6 4 September 1994 26 49
    • (1994) Digital Technical Journal , vol.6 , Issue.4 , pp. 26-49
    • Bussler, C.J.1
  • 12
    • 79151485910 scopus 로고    scopus 로고
    • A new role mining framework to elicit business roles and to mitigate enterprise risk
    • A. Colantonio, R.D. Pietro, A. Ocello, and N.V. Verde A new role mining framework to elicit business roles and to mitigate enterprise risk Decision Support Systems 50 4 2011 715 731
    • (2011) Decision Support Systems , vol.50 , Issue.4 , pp. 715-731
    • Colantonio, A.1    Pietro, R.D.2    Ocello, A.3    Verde, N.V.4
  • 14
    • 0037768626 scopus 로고    scopus 로고
    • Privacy enhancing techniques: The key to secure communication and management of clinical and genomic data
    • G.J. de Moor, B. Claerhout, and F. de Meyer Privacy enhancing technologies: the key to secure communication and management of clinical and genomic data Methods of Information in Medicine 42 2003 148 153 (Pubitemid 36637322)
    • (2003) Methods of Information in Medicine , vol.42 , Issue.2 , pp. 148-153
    • De Moor, G.J.E.1    Claerhout, B.2    De Meyer, F.3
  • 18
    • 0000432739 scopus 로고    scopus 로고
    • Disclosure limitation using perturbation and related methods for categorical data (with discussion)
    • S.E. Fienberg, U.E. Makov, and R.J. Steele Disclosure limitation using perturbation and related methods for categorical data (with discussion) Journal of Official Statistics 14 1998 485 512
    • (1998) Journal of Official Statistics , vol.14 , pp. 485-512
    • Fienberg, S.E.1    Makov, U.E.2    Steele, R.J.3
  • 21
    • 0036602405 scopus 로고    scopus 로고
    • Privacy protection of binary confidential data against deterministic, stochastic, and insider threat
    • R. Garfinkel, R.D. Gopal, and P.B. Goes Privacy protection of binary confidential data against deterministic, stochastic, and insider threat Management Science 48 2002 749 764 (Pubitemid 34799259)
    • (2002) Management Science , vol.48 , Issue.6 , pp. 749-764
    • Garfinkel, R.1    Gopal, R.2    Goes, P.3
  • 22
    • 50049104179 scopus 로고    scopus 로고
    • Role engineering: From design to evolution of security schemes
    • G. Goncalves, and A. Poniszewska-Maranda Role engineering: from design to evolution of security schemes Journal of Systems and Software 81 8 August 2008 1306 1326
    • (2008) Journal of Systems and Software , vol.81 , Issue.8 , pp. 1306-1326
    • Goncalves, G.1    Poniszewska-Maranda, A.2
  • 23
    • 0031373349 scopus 로고    scopus 로고
    • A baseline security policy for distributed healthcare information systems
    • PII S0167404897000096
    • D. Gritzalis A baseline security policy for distributed healthcare information systems Computers & Security 16 8 1997 709 719 (Pubitemid 127437031)
    • (1997) Computers and Security , vol.16 , Issue.8 , pp. 709-719
    • Gritzalis, D.1
  • 28
    • 34547798962 scopus 로고    scopus 로고
    • Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection
    • DOI 10.1016/j.dss.2006.04.004, PII S0167923606000625
    • J.V. Hansen, P.B. Lowry, R.D. Meservy, and D.M. McDonald Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection Decision Support Systems 43 4 2007 1362 1374 (Pubitemid 47225189)
    • (2007) Decision Support Systems , vol.43 , Issue.4 , pp. 1362-1374
    • Hansen, J.V.1    Lowry, P.B.2    Meservy, R.D.3    McDonald, D.M.4
  • 30
    • 84892366062 scopus 로고    scopus 로고
    • Standards for privacy of individually identifiable health information. 45 C.F.R. Parts 160 and 164
    • HIPAA Standards for privacy of individually identifiable health information. 45 C.F.R. Parts 160 and 164 Health Insurance Portability and Accountability Act (HIPAA) 2002
    • (2002) Health Insurance Portability and Accountability Act (HIPAA)
  • 36
    • 0034780099 scopus 로고    scopus 로고
    • Evaluating informatics applications - Clinical decision support systems literature review
    • DOI 10.1016/S1386-5056(01)00183-6, PII S1386505601001836
    • B. Kaplan Evaluating informatics applications - clinical decision support systems literature review International Journal of Medical Informatics 64 1 2001 15 37 (Pubitemid 32982864)
    • (2001) International Journal of Medical Informatics , vol.64 , Issue.1 , pp. 15-37
    • Kaplan, B.1
  • 37
    • 18844423005 scopus 로고    scopus 로고
    • A review and a framework of handheld computer adoption in healthcare
    • DOI 10.1016/j.ijmedinf.2005.03.001, PII S1386505605000201
    • Y. Lu, Y. Xiao, A. Sears, and J. Jacko A review and a framework of handheld computer adoption in healthcare International Journal of Medical Informatics 74 5 2005 409 422 (Pubitemid 40694204)
    • (2005) International Journal of Medical Informatics , vol.74 , Issue.5 , pp. 409-422
    • Lu, Y.-C.1    Xiao, Y.2    Sears, A.3    Jacko, J.A.4
  • 38
    • 34547686114 scopus 로고    scopus 로고
    • Partitioning knowledge bases between advanced notification and clinical decision support systems
    • DOI 10.1016/j.dss.2006.02.006, PII S0167923606000285
    • Y.A. Lussier, R. Williams, J. Li, S. Jalan, T. Borlawsky, E. Stern, and I. Kohli Partitioning knowledge bases between advanced notification and clinical decision support systems Decision Support Systems 43 4 2007 1274 1286 (Pubitemid 47223462)
    • (2007) Decision Support Systems , vol.43 , Issue.4 , pp. 1274-1286
    • Lussier, Y.A.1    Williams, R.2    Li, J.3    Jalan, S.4    Borlawsky, T.5    Stern, E.6    Kohli, I.7
  • 40
    • 38549090694 scopus 로고    scopus 로고
    • Stochastic protection of confidential information in databases: A hybrid of data perturbation and query restriction
    • DOI 10.1287/opre.1070.0407
    • M. Nunez, R. Garfinkel, and R.D. Gopal Stochastic protection of confidential information in statistical databases: a hybrid of query restriction and data perturbation Operations Research 55 2007 890 908 (Pubitemid 351159536)
    • (2007) Operations Research , vol.55 , Issue.5 , pp. 890-908
    • Nunez, M.A.1    Garfinkel, R.S.2    Gopal, R.D.3
  • 44
    • 0035230313 scopus 로고    scopus 로고
    • Electronic medical records: The FPM vendor survey
    • S. Rehm, and S. Kraft Electronic medical records: the FPM vendor survey Family Practice Management 8 1 2001 45 54
    • (2001) Family Practice Management , vol.8 , Issue.1 , pp. 45-54
    • Rehm, S.1    Kraft, S.2
  • 47
    • 17844366573 scopus 로고    scopus 로고
    • Analysis of end user security behaviors
    • DOI 10.1016/j.cose.2004.07.001, PII S0167404804001841
    • J. Stanton, K. Stam, P. Mastrangelo, and J. Jolton Analysis of end user security behaviors Computers & Security 2005 124 133 (Pubitemid 40583824)
    • (2005) Computers and Security , vol.24 , Issue.2 , pp. 124-133
    • Stanton, J.M.1    Stam, K.R.2    Mastrangelo, P.3    Jolton, J.4
  • 48
    • 33845574135 scopus 로고    scopus 로고
    • Privacy-aware autonomous agents for pervasive healthcare
    • DOI 0E89157E-07C6-4AC1-8E07-F0F0900190CC
    • M. Tentori, J. Favela, and M.D. Rodriguez Privacy-aware autonomous agents for pervasive healthcare Intelligent Systems, IEEE 21 6 2006 55 62 (Pubitemid 44936722)
    • (2006) IEEE Intelligent Systems , vol.21 , Issue.6 , pp. 55-62
    • Tentori, M.1    Favela, J.2    Rodriguez, M.D.3
  • 49
    • 24344501341 scopus 로고    scopus 로고
    • Access control in collaborative systems
    • DOI 10.1145/1057977.1057979
    • W. Tolone, T. Pai, G.J. Ahn, and S.P. Hong Access control in collaborative systems ACM Computing Surveys 37 1 March 2005 29 41 (Pubitemid 41246321)
    • (2005) ACM Computing Surveys , vol.37 , Issue.1 , pp. 29-41
    • Tolone, W.1    Ahn, G.-J.2    Pai, T.3    Hong, S.-P.4
  • 51
    • 2342475711 scopus 로고    scopus 로고
    • Towards information security behavioural compliance
    • C. Vroom, and R. von Solms Towards information security behavioural compliance Computers & Security 23 3 2004 191 198
    • (2004) Computers & Security , vol.23 , Issue.3 , pp. 191-198
    • Vroom, C.1    Von Solms, R.2
  • 52
    • 0348209180 scopus 로고    scopus 로고
    • W-RBAC - A workflow security model incorporating controlled overriding of constraints
    • DOI 10.1142/S0218843003000814
    • J. Wainer, P. Barthelmess, and A. Kumar W-RBAC - a workflow security model incorporating controlled overriding of constraints International Journal of Cooperative Information Systems 12 4 2003 455 485 (Pubitemid 38000660)
    • (2003) International Journal of Cooperative Information Systems , vol.12 , Issue.4 , pp. 455-485
    • Wainer, J.1    Barthelmess, P.2    Kumar, A.3
  • 53
    • 78049461565 scopus 로고    scopus 로고
    • A cost-based analysis of intrusion detection system configuration under active or passive response
    • W.T. Yue, and M. ÇakanyIldIrIm A cost-based analysis of intrusion detection system configuration under active or passive response Decision Support Systems 50 1 December 2010 21 31
    • (2010) Decision Support Systems , vol.50 , Issue.1 , pp. 21-31
    • Yue, W.T.1    Çakanyildirim, M.2
  • 55
    • 78049452805 scopus 로고    scopus 로고
    • Security and performance in service-oriented applications: Trading off competing objectives
    • H. Zo, D.L. Nazareth, and H.K. Jain Security and performance in service-oriented applications: trading off competing objectives Decision Support Systems 50 1 2010 336 346
    • (2010) Decision Support Systems , vol.50 , Issue.1 , pp. 336-346
    • Zo, H.1    Nazareth, D.L.2    Jain, H.K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.