-
1
-
-
1542327773
-
Consequences of information technology in health care:The nature of patient care information system-related errors
-
Ash, J.S., Berg, M., and Coiera, E. Some unintended consequences of information technology in health care: The nature of patient care information system-related errors. Journal of the American Medical Informatics Association, 11, 2 (2004), 104-112.
-
(2004)
Journal of the American Medical Informatics Association
, vol.11
, Issue.2
, pp. 104-112
-
-
Ash, J.S.1
Berg, M.2
Coiera, S.E.3
-
2
-
-
66449136652
-
Adoption of electronic health records in the presence of privacy concerns:The elaboration likelihood model and individual persuasion
-
Angst, C.M. and Agarwal, R. Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion. MIS Quarterly, 33, 2 (2009), 339-370.
-
(2009)
MIS Quarterly
, vol.33
, Issue.2
, pp. 339-370
-
-
Angst, C.M.1
Agarwal, R.2
-
3
-
-
57349200762
-
Privacy.confidentiality, and electronic medical records
-
Barrows, R.C. and Clayton, P.D. Privacy, confidentiality, and electronic medical records. Journal of the American Medical Informatics Association, 3, 2 (1996), 139-148.
-
(1996)
Journal of the American Medical Informatics Association
, vol.3
, Issue.2
, pp. 139-148
-
-
Barrows, R.C.1
Clayton, P.D.2
-
4
-
-
81055137246
-
Exploring twisted paths:Analyzing authorization processes in organizations
-
Bartsch, S. Exploring twisted paths: Analyzing authorization processes in organizations. In Proc. Network and System Security, (2011), 216-223.
-
(2011)
Proc. Network and System Security
, pp. 216-223
-
-
Bartsch, S.1
-
5
-
-
84892465832
-
Real life challenges in access-control management
-
ACM Press
-
Bauer, L., Cranor, L.F., Reeder, R.W., Reiter, M.K., and Vaniea, K. Real life challenges in access-control management. In Proc. CHI 2009, ACM Press (2009), 899-908.
-
(2009)
Proc. CHI 2009
, pp. 899-908
-
-
Bauer, L.1
Cranor, L.F.2
Reeder, R.W.3
Reiter, M.K.4
Vaniea, K.5
-
6
-
-
81355150547
-
Privacy in the digital age:A review of information privacy research in information systems
-
Belanger, F. and Crossler, R.E. Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35, 4 (2011), 1017-1041.
-
(2011)
MIS Quarterly
, vol.35
, Issue.4
, pp. 1017-1041
-
-
Belanger, F.1
Crossler, R.E.2
-
7
-
-
77953970691
-
Moving beyond untagging:Photo privacy in a tagged world
-
ACM Press
-
Besmer, A. and Lipford, H.R. Moving beyond untagging: Photo privacy in a tagged world. In Proc. CHI 2010, ACM Press (2010), 1563-1572.
-
(2010)
Proc. CHI 2010
, pp. 1563-1572
-
-
Besmer, A.1
Lipford, H.R.2
-
8
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
Bethencourt, J., Sahai, A., and Waters, B. Ciphertext-policy attribute-based encryption. In Proc. IEEE Symposium on Security and Privacy, (2007), 321-334.
-
(2007)
Proc. IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
9
-
-
33750505977
-
Using thematic analysis in psychology
-
Braun, V. and Clarke, V. Using thematic analysis in psychology. Qualitative Research in Psychology, 3, 2 (2006), 77-101.
-
(2006)
Qualitative Research in Psychology
, vol.3
, Issue.2
, pp. 77-101
-
-
Braun, V.1
Clarke, V.2
-
10
-
-
84863381941
-
Detecting anomalous insiders in collaborative information systems
-
Chen, Y., Nyemba, S., and Malin, B. Detecting anomalous insiders in collaborative information systems. IEEE Transactions on Dependable and Secure Computing, 9, 3 (2012), 332-344.
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, vol.9
, Issue.3
, pp. 332-344
-
-
Chen, Y.1
Nyemba, S.2
Malin, B.3
-
11
-
-
84874917827
-
Privacy management in dynamic groups:Understanding information privacy in medical practices
-
Chen, Y. and Xu, H. Privacy management in dynamic groups: Understanding information privacy in medical practices. In Proc. CSCW 2013, ACM Press (2013), 541-552.
-
(2013)
Proc. CSCW 2013, ACM Press
, pp. 541-552
-
-
Chen, Y.1
Xu, H.2
-
12
-
-
33745005507
-
Challenges associated with privacy in health care industry:Implementation of hIPAA and the security rules
-
Choi, Y.B., Capitan, K.E., Krause, J.S., and Streeper, M.M. Challenges associated with privacy in health care industry: Implementation of HIPAA and the security rules. Journal of Medical Systems, 30, 1 (2006), 57-64.
-
(2006)
Journal of Medical Systems
, vol.30
, Issue.1
, pp. 57-64
-
-
Choi, Y.B.1
Capitan, K.E.2
Krause, J.S.3
Streeper, M.M.4
-
13
-
-
1542267916
-
E-Consent:The design and implementation of consumer consent mechanisms in an electronic environment
-
Coiera, E. and Clarke, R. e-Consent: The design and implementation of consumer consent mechanisms in an electronic environment. Journal of the American Medical Informatics Association, 11, 2 (2004), 129-140.
-
(2004)
Journal of the American Medical Informatics Association
, vol.11
, Issue.2
, pp. 129-140
-
-
Coiera, E.1
Clarke, R.2
-
14
-
-
72049116025
-
How ethics can enhance organizational privacy:Lessons from the choicepoint and tJX data breaches
-
Culnan, M.J. and Williams, C.C. How ethics can enhance organizational privacy: Lessons from the choicepoint and TJX data breaches. MIS Quarterly, 33, 4 (2009), 673-687.
-
(2009)
MIS Quarterly
, vol.33
, Issue.4
, pp. 673-687
-
-
Culnan, M.J.1
Williams, C.C.2
-
15
-
-
84871865576
-
Explaining accesses to electronic medical records using diagnosis information
-
Fabbri, D. and LeFevre, K. Explaining accesses to electronic medical records using diagnosis information. Journal of the American Medical Informatics Association, 20, 1 (2013), 52-60.
-
(2013)
Journal of the American Medical Informatics Association
, vol.20
, Issue.1
, pp. 52-60
-
-
Fabbri, D.1
Lefevre, K.2
-
16
-
-
38849167569
-
Tracking the social dimensions of rFID systems in hospitals
-
Fisher, J.A. and Monahan, T. Tracking the social dimensions of RFID systems in hospitals. International Journal of Medical Informatics, 77, 3 (2008), 176-183.
-
(2008)
International Journal of Medical Informatics
, vol.77
, Issue.3
, pp. 176-183
-
-
Fisher, J.A.1
Monahan, T.2
-
17
-
-
84872611601
-
A review of 25 years of cscw research in healthcare:Contributions, challenges, and future agendas
-
Fitzpatrick, G. and Ellingsen, G. A review of 25 years of CSCW research in healthcare: Contributions, challenges, and future agendas. Journal of CSCW, (2012), 1-57.
-
(2012)
Journal of CSCW
, pp. 1-57
-
-
Fitzpatrick, G.1
Ellingsen, G.2
-
18
-
-
77957574223
-
Biometrics for electronic health records
-
Flores Zuniga, A.E., Win, K.T., and Susilo, W. Biometrics for electronic health records. Journal of Medical Systems, 34, 5 (2010), 975-983.
-
(2010)
Journal of Medical Systems
, vol.34
, Issue.5
, pp. 975-983
-
-
Flores Zuniga, A.E.1
Win, K.T.2
Susilo, W.3
-
20
-
-
70350697858
-
Network authentication using single sign-on:The challenge of aligning mental models
-
Heckle, R., Lutters, W. G., and Gurzick, D. Network authentication using single sign-on: the challenge of aligning mental models. In Proc. Computer Human Interaction for Management of Information Technology, (2008), 6-15.
-
(2008)
Proc. Computer Human Interaction for Management of Information Technology
, pp. 6-15
-
-
Heckle, R.1
Lutters, W.G.2
Gurzick, D.3
-
21
-
-
77952740616
-
Exploring how security features affect the use of electronic health records
-
Hewitt, B. Exploring how security features affect the use of electronic health records. International Journal of Healthcare Technology and Management, 11, 1 (2010), 31-49.
-
(2010)
International Journal of Healthcare Technology and Management
, vol.11
, Issue.1
, pp. 31-49
-
-
Hewitt, B.1
-
22
-
-
73749088345
-
Privacy as information access and illusory control:The case of the facebook news feed privacy outcry
-
Hoadley, C.M., Xu, H., Lee, J.J., and Rosson, M.B. Privacy as information access and illusory control: The case of the Facebook news feed privacy outcry. Electronic Commerce Research and Applications, 9, 4 (2010), 649-664.
-
(2010)
Electronic Commerce Research and Applications
, vol.9
, Issue.4
, pp. 649-664
-
-
Hoadley, C.M.1
Xu, H.2
Lee, J.J.3
Rosson, M.B.4
-
23
-
-
77955333989
-
A hybrid public key infrastructure solution (HPKI) for hIPAA privacy/security regulations
-
Hu, J., Chen, H.H., and Hou, T.W. A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations. Computer Standards and Interfaces, 32, 5 (2010), 274-280.
-
(2010)
Computer Standards and Interfaces
, vol.32
, Issue.5
, pp. 274-280
-
-
Hu, J.1
Chen, H.H.2
Hou, T.W.3
-
24
-
-
45849139772
-
Workarounds to barcode medication administration systems:Their occurrences, causes, and threats to patient safety
-
Koppel, R., Wetterneck, T., Telles, J.L., and Karsh, B.T. Workarounds to barcode medication administration systems: Their occurrences, causes, and threats to patient safety. Journal of the American Medical Informatics Association, 15, 4 (2008), 408-423.
-
(2008)
Journal of the American Medical Informatics Association
, vol.15
, Issue.4
, pp. 408-423
-
-
Koppel, R.1
Wetterneck, T.2
Telles, J.L.3
Karsh, B.T.4
-
25
-
-
0036758891
-
Raising a red flag on global wWW privacy policies
-
Liu, C. and Arnett, K.P. Raising a red flag on global WWW privacy policies. Journal of Computer Information Systems, 43, 1 (2002), 117-127.
-
(2002)
Journal of Computer Information Systems
, vol.43
, Issue.1
, pp. 117-127
-
-
Liu, C.1
Arnett, K.P.2
-
26
-
-
33947628689
-
Comprehensive management of the access to the electronic patient record:Towards trans-institutional networks
-
Lovis, C., Spahni, S., Cassoni, N., and Geissbuhler, A. Comprehensive management of the access to the electronic patient record: Towards trans-institutional networks. International Journal of Medical Informatics, 76, 5 (2007), 466-470.
-
(2007)
International Journal of Medical Informatics
, vol.76
, Issue.5
, pp. 466-470
-
-
Lovis, C.1
Spahni, S.2
Cassoni, N.3
Geissbuhler, A.4
-
27
-
-
0035798841
-
Public standards and patients' control:How to keep electronic medical records accessible but private
-
Mandl, K.D., Szolovits, P., and Kohane, I.S. Public standards and patients' control: How to keep electronic medical records accessible but private. British Medical Journal, 322, 7281 (2001), 283-287.
-
(2001)
British Medical Journal
, vol.322
, Issue.7281
, pp. 283-287
-
-
Mandl, K.D.1
Szolovits, P.2
Kohane, I.S.3
-
28
-
-
81355125978
-
An investigative study:Health care workers as security threat suppliers
-
Medlin, B.D. and Romaniello, A. An investigative study: Health care workers as security threat suppliers. Journal of Information Privacy and Security, 3, 1 (2007), 30-46.
-
(2007)
Journal of Information Privacy and Security
, vol.3
, Issue.1
, pp. 30-46
-
-
Medlin, B.D.1
Romaniello, A.2
-
29
-
-
84874861434
-
Exploring collaborative privacy practices
-
ACM Press
-
Murphy, A.R., Reddy, M.C., Xu, H., and Ringel, B. Exploring collaborative privacy practices. In Proc. CHI 2011 Workshop "Privacy for a Networked World: Bridging Theory and Design," ACM Press (2011).
-
(2011)
Proc. CHI 2011 Workshop "Privacy for A Networked World: Bridging Theory and Design
-
-
Murphy, A.R.1
Reddy, M.C.2
Xu, H.3
Ringel, B.4
-
30
-
-
78650118369
-
Privacy preserving eHR system using attribute-based infrastructure
-
ACM Press
-
Narayan, S., Gagne, M., and Safavi-Naini, R. Privacy preserving EHR system using attribute-based infrastructure. In Proc. ACM 2010 Workshop "Cloud Computing Security," ACM Press (2010), 47-52.
-
(2010)
Proc. ACM 2010 Workshop "Cloud Computing Security
, pp. 47-52
-
-
Narayan, S.1
Gagne, M.2
Safavi-Naini, R.3
-
31
-
-
0038037379
-
Unpacking "privacy" for a networked world
-
ACM Press
-
Palen, L. and Dourish, P. Unpacking "privacy" for a networked world. In Proc. CHI 2003, ACM Press (2003), 129-136.
-
(2003)
Proc. CHI 2003
, pp. 129-136
-
-
Palen, L.1
Dourish, P.2
-
32
-
-
84870213257
-
Healthcare information privacy research:Issues, gaps and what next?
-
Parks, R., Chu, C. H., and Xu, H. Healthcare information privacy research: Issues, gaps and what next? In Proc. 2011 Americas Conference on Information Systems, (2011).
-
(2011)
Proc 2011 Americas Conference on Information Systems
-
-
Parks, R.1
Chu, C.H.2
Xu, H.3
-
34
-
-
0742302036
-
Biometric recognition:Security and privacy concerns
-
Prabhakar, S., Pankanti, S., and Jain, A.K. Biometric recognition: Security and privacy concerns. IEEE Journal of Security &Privacy, 1, 2 (2003), 33-42.
-
(2003)
IEEE Journal of Security &Privacy
, vol.1
, Issue.2
, pp. 33-42
-
-
Prabhakar, S.1
Pankanti, S.2
Jain, A.K.3
-
35
-
-
79960377992
-
The ConStratO model of handover:A tool to support technology design and evaluation
-
Randell, R., Wilson, S., Woodward, P. and Galliers, J.R. The ConStratO model of handover: A tool to support technology design and evaluation. Behaviour &Information Technology, 30, 4 (2011), 489-498.
-
(2011)
Behaviour &Information Technology
, vol.30
, Issue.4
, pp. 489-498
-
-
Randell, R.1
Wilson, S.2
Woodward, P.3
Galliers, J.R.4
-
36
-
-
0038675156
-
A finger on the pulse:Temporal rhythms and information seeking in medical work
-
ACM Press
-
Reddy, M. and Dourish, P. A finger on the pulse: Temporal rhythms and information seeking in medical work. In Proc. CSCW 2002, ACM Press (2002), 344-353.
-
(2002)
Proc. CSCW 2002
, pp. 344-353
-
-
Reddy, M.1
Dourish, P.2
-
37
-
-
77950512034
-
Openness of patients' reporting with use of electronic records:Psychiatric clinicians' views
-
Salomon, R.M., Blackford, J.U., Rosenbloom, S.T., Seidel, S., Clayton, E.W., Dilts, D.M., and Finder, S.G. Openness of patients' reporting with use of electronic records: Psychiatric clinicians' views. Journal of the American Medical Informatics Association, 17, 1 (2010), 54-60.
-
(2010)
Journal of the American Medical Informatics Association
, vol.17
, Issue.1
, pp. 54-60
-
-
Salomon, R.M.1
Blackford, J.U.2
Rosenbloom, S.T.3
Seidel, S.4
Clayton, E.W.5
Dilts, D.M.6
Finder, S.G.7
-
38
-
-
0027805822
-
Privacy policies and practices:Inside the organizational maze
-
Smith, H.J. Privacy policies and practices: Inside the organizational maze. Communications of the ACM, 36, 12 (1993), 105-122.
-
(1993)
Communications of the ACM
, vol.36
, Issue.12
, pp. 105-122
-
-
Smith, H.J.1
-
39
-
-
81355150537
-
Information privacy research:An interdisciplinary review
-
Smith, H. J., Dinev, T., and Xu, H. Information privacy research: An interdisciplinary review, MIS Quarterly, 35, 4 (2011), 989-1015.
-
(2011)
MIS Quarterly
, vol.35
, Issue.4
, pp. 989-1015
-
-
Smith, H.J.1
Dinev, T.2
Xu, H.3
-
40
-
-
50249151484
-
Internet users' information privacy-protective responses:A taxonomy and a nomological model
-
Son, J.Y. and Kim, S.S. Internet users' information privacy-protective responses: A taxonomy and a nomological model. MIS Quarterly, 32, 3 (2008), 503-529.
-
(2008)
MIS Quarterly
, vol.32
, Issue.3
, pp. 503-529
-
-
Son, J.Y.1
Kim, S.S.2
-
41
-
-
77953979544
-
Friends only:Examining a privacy-enhancing behavior in facebook
-
ACM Press
-
Stutzman, F. and Kramer-Duffield, J. Friends only: Examining a privacy-enhancing behavior in Facebook. In Proc. CHI 2010, ACM Press (2010), 1553-1562.
-
(2010)
Proc. CHI 2010
, pp. 1553-1562
-
-
Stutzman, F.1
Kramer-Duffield, J.2
-
42
-
-
79951681142
-
CoPE:Enabling collaborative privacy management in online social networks
-
Squicciarini, A.C., Xu, H., and Zhang, X. CoPE: Enabling collaborative privacy management in online social networks. Journal of the American Society for Information Science and Technology, 62, 3 (2010), 521-534.
-
(2010)
Journal of the American Society for Information Science and Technology
, vol.62
, Issue.3
, pp. 521-534
-
-
Squicciarini, A.C.1
Xu, H.2
Zhang, X.3
-
43
-
-
0037412301
-
Privacy on the web:An examination of user's concerns, technology, and implications for business organizations and individuals
-
Turner, E.C. and Dasgupta, S. Privacy on the web: An examination of user's concerns, technology, and implications for business organizations and individuals. Information Systems Management, 20, 1 (2003), 8-18.
-
(2003)
Information Systems Management
, vol.20
, Issue.1
, pp. 8-18
-
-
Turner, E.C.1
Dasgupta, S.2
-
44
-
-
67649573353
-
-
Breaches Affecting 500 or More Individuals
-
U.S. Department of Health and Human Services. (2013). "Breaches Affecting 500 or More Individuals." Retrieved from: http://www.hhs.gov/ocr/ privacy/hipaa/administrative/breachnotificationrule/breachtool.html.
-
(2013)
U.S. Department of Health and Human Services.
-
-
-
45
-
-
84899032312
-
-
U.S. Department of Health and Human Services. (2013) Health Information Privacy
-
U.S. Department of Health and Human Services. (2013). "Health Information Privacy." Retrieved from: http://www.hhs.gov/ocr/privacy/.
-
-
-
-
46
-
-
84898933162
-
-
U.S. Department of Health and Human Services. (2013) HITECH Act Enforcement Interim Final Rule
-
U.S. Department of Health and Human Services. (2013). "HITECH Act Enforcement Interim Final Rule." Retrieved from: http://www.hhs.gov/ocr/ privacy/hipaa/administrative/enforcementrule/hitechenforcementifr.html.
-
-
-
-
47
-
-
84898981665
-
-
U.S. Government. (2013) American Recovery and Reinvestment Act of 2009"
-
U.S. Government. (2013). "American Recovery and Reinvestment Act of 2009". Retrieved from: http://www.recovery.gov/About/Pages/The-Act.aspx.
-
-
-
-
48
-
-
36749018468
-
Technology implementation and workarounds in the nursing home
-
Vogelsmeier, A.A., Halbesleben, J.R.B., and Scott-Cawiezell, J.R. Technology implementation and workarounds in the nursing home. Journal of the American Medical Informatics Association, 15, 1 (2008), 114-119.
-
(2008)
Journal of the American Medical Informatics Association
, vol.15
, Issue.1
, pp. 114-119
-
-
Vogelsmeier, A.A.1
Halbesleben, J.R.B.2
Scott-Cawiezell, J.R.3
-
49
-
-
34547431185
-
Emergency department status boards:User-evolved artefacts for inter-And intra-group coordination
-
Wears, R. L., Perry, S. J., Wilson, S., Galliers, J., and Fone, J. Emergency department status boards: User-evolved artefacts for inter-And intra-group coordination. Cognition, Technology &Work, 9, 3 (2007), 163-170.
-
(2007)
Cognition, Technology &Work
, vol.9
, Issue.3
, pp. 163-170
-
-
Wears, R.L.1
Perry, S.J.2
Wilson, S.3
Galliers, J.4
Fone, J.5
-
50
-
-
33645344483
-
A review of security of electronic health records
-
Win, K.T. A review of security of electronic health records. Health Information Management, 34, 1 (2005), 13-18.
-
(2005)
Health Information Management
, vol.34
, Issue.1
, pp. 13-18
-
-
Win, K.T.1
-
51
-
-
84870972411
-
Examining the formation of individual's information privacy concerns:Toward an integrative view
-
Xu, H., Dinev, T., Smith, H.J., and Hart, P. Examining the formation of individual's information privacy concerns: Toward an integrative view. In Proc. International Conference on Information Systems, (2008).
-
(2008)
Proc. International Conference on Information Systems
-
-
Xu, H.1
Dinev, T.2
Smith, H.J.3
Hart, P.4
-
52
-
-
77749333391
-
The role of push-pull technology in privacy calculus:The case of location-based services
-
Xu, H., Teo, H.H., Tan, B.C.Y., and Agarwal, R. The role of push-pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26, 3 (2009), 137-176.
-
(2009)
Journal of Management Information Systems
, vol.26
, Issue.3
, pp. 137-176
-
-
Xu, H.1
Teo, H.H.2
Tan, B.C.Y.3
Agarwal, R.4
-
53
-
-
77956434769
-
The use of rfid in healthcare:Benefits and barriers
-
Yao, W., Chu, C.H., and Li, Z. The use of RFID in healthcare: Benefits and barriers. In Proc. 2010 IEEE International Conference on RFID Technology and Applications, (2010), 128-134.
-
(2010)
Proc. 2010 IEEE International Conference on RFID Technology and Applications
, pp. 128-134
-
-
Yao, W.1
Chu, C.H.2
Li, Z.3
|