메뉴 건너뛰기




Volumn , Issue , 2014, Pages 269-282

Privacy practices in collaborative environments: A study of emergency department staff

Author keywords

Collaboration; Collaborative privacy practices; Computer supported cooperative work; Privacy; Privacy design; Privacy policy

Indexed keywords

COMPUTER SUPPORTED COOPERATIVE WORK; DATA PRIVACY; EMERGENCY ROOMS; INTERACTIVE COMPUTER SYSTEMS;

EID: 84898941140     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2531602.2531643     Document Type: Conference Paper
Times cited : (27)

References (53)
  • 1
    • 1542327773 scopus 로고    scopus 로고
    • Consequences of information technology in health care:The nature of patient care information system-related errors
    • Ash, J.S., Berg, M., and Coiera, E. Some unintended consequences of information technology in health care: The nature of patient care information system-related errors. Journal of the American Medical Informatics Association, 11, 2 (2004), 104-112.
    • (2004) Journal of the American Medical Informatics Association , vol.11 , Issue.2 , pp. 104-112
    • Ash, J.S.1    Berg, M.2    Coiera, S.E.3
  • 2
    • 66449136652 scopus 로고    scopus 로고
    • Adoption of electronic health records in the presence of privacy concerns:The elaboration likelihood model and individual persuasion
    • Angst, C.M. and Agarwal, R. Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion. MIS Quarterly, 33, 2 (2009), 339-370.
    • (2009) MIS Quarterly , vol.33 , Issue.2 , pp. 339-370
    • Angst, C.M.1    Agarwal, R.2
  • 4
    • 81055137246 scopus 로고    scopus 로고
    • Exploring twisted paths:Analyzing authorization processes in organizations
    • Bartsch, S. Exploring twisted paths: Analyzing authorization processes in organizations. In Proc. Network and System Security, (2011), 216-223.
    • (2011) Proc. Network and System Security , pp. 216-223
    • Bartsch, S.1
  • 6
    • 81355150547 scopus 로고    scopus 로고
    • Privacy in the digital age:A review of information privacy research in information systems
    • Belanger, F. and Crossler, R.E. Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35, 4 (2011), 1017-1041.
    • (2011) MIS Quarterly , vol.35 , Issue.4 , pp. 1017-1041
    • Belanger, F.1    Crossler, R.E.2
  • 7
    • 77953970691 scopus 로고    scopus 로고
    • Moving beyond untagging:Photo privacy in a tagged world
    • ACM Press
    • Besmer, A. and Lipford, H.R. Moving beyond untagging: Photo privacy in a tagged world. In Proc. CHI 2010, ACM Press (2010), 1563-1572.
    • (2010) Proc. CHI 2010 , pp. 1563-1572
    • Besmer, A.1    Lipford, H.R.2
  • 11
    • 84874917827 scopus 로고    scopus 로고
    • Privacy management in dynamic groups:Understanding information privacy in medical practices
    • Chen, Y. and Xu, H. Privacy management in dynamic groups: Understanding information privacy in medical practices. In Proc. CSCW 2013, ACM Press (2013), 541-552.
    • (2013) Proc. CSCW 2013, ACM Press , pp. 541-552
    • Chen, Y.1    Xu, H.2
  • 12
    • 33745005507 scopus 로고    scopus 로고
    • Challenges associated with privacy in health care industry:Implementation of hIPAA and the security rules
    • Choi, Y.B., Capitan, K.E., Krause, J.S., and Streeper, M.M. Challenges associated with privacy in health care industry: Implementation of HIPAA and the security rules. Journal of Medical Systems, 30, 1 (2006), 57-64.
    • (2006) Journal of Medical Systems , vol.30 , Issue.1 , pp. 57-64
    • Choi, Y.B.1    Capitan, K.E.2    Krause, J.S.3    Streeper, M.M.4
  • 13
    • 1542267916 scopus 로고    scopus 로고
    • E-Consent:The design and implementation of consumer consent mechanisms in an electronic environment
    • Coiera, E. and Clarke, R. e-Consent: The design and implementation of consumer consent mechanisms in an electronic environment. Journal of the American Medical Informatics Association, 11, 2 (2004), 129-140.
    • (2004) Journal of the American Medical Informatics Association , vol.11 , Issue.2 , pp. 129-140
    • Coiera, E.1    Clarke, R.2
  • 14
    • 72049116025 scopus 로고    scopus 로고
    • How ethics can enhance organizational privacy:Lessons from the choicepoint and tJX data breaches
    • Culnan, M.J. and Williams, C.C. How ethics can enhance organizational privacy: Lessons from the choicepoint and TJX data breaches. MIS Quarterly, 33, 4 (2009), 673-687.
    • (2009) MIS Quarterly , vol.33 , Issue.4 , pp. 673-687
    • Culnan, M.J.1    Williams, C.C.2
  • 15
    • 84871865576 scopus 로고    scopus 로고
    • Explaining accesses to electronic medical records using diagnosis information
    • Fabbri, D. and LeFevre, K. Explaining accesses to electronic medical records using diagnosis information. Journal of the American Medical Informatics Association, 20, 1 (2013), 52-60.
    • (2013) Journal of the American Medical Informatics Association , vol.20 , Issue.1 , pp. 52-60
    • Fabbri, D.1    Lefevre, K.2
  • 16
    • 38849167569 scopus 로고    scopus 로고
    • Tracking the social dimensions of rFID systems in hospitals
    • Fisher, J.A. and Monahan, T. Tracking the social dimensions of RFID systems in hospitals. International Journal of Medical Informatics, 77, 3 (2008), 176-183.
    • (2008) International Journal of Medical Informatics , vol.77 , Issue.3 , pp. 176-183
    • Fisher, J.A.1    Monahan, T.2
  • 17
    • 84872611601 scopus 로고    scopus 로고
    • A review of 25 years of cscw research in healthcare:Contributions, challenges, and future agendas
    • Fitzpatrick, G. and Ellingsen, G. A review of 25 years of CSCW research in healthcare: Contributions, challenges, and future agendas. Journal of CSCW, (2012), 1-57.
    • (2012) Journal of CSCW , pp. 1-57
    • Fitzpatrick, G.1    Ellingsen, G.2
  • 21
    • 77952740616 scopus 로고    scopus 로고
    • Exploring how security features affect the use of electronic health records
    • Hewitt, B. Exploring how security features affect the use of electronic health records. International Journal of Healthcare Technology and Management, 11, 1 (2010), 31-49.
    • (2010) International Journal of Healthcare Technology and Management , vol.11 , Issue.1 , pp. 31-49
    • Hewitt, B.1
  • 22
    • 73749088345 scopus 로고    scopus 로고
    • Privacy as information access and illusory control:The case of the facebook news feed privacy outcry
    • Hoadley, C.M., Xu, H., Lee, J.J., and Rosson, M.B. Privacy as information access and illusory control: The case of the Facebook news feed privacy outcry. Electronic Commerce Research and Applications, 9, 4 (2010), 649-664.
    • (2010) Electronic Commerce Research and Applications , vol.9 , Issue.4 , pp. 649-664
    • Hoadley, C.M.1    Xu, H.2    Lee, J.J.3    Rosson, M.B.4
  • 23
    • 77955333989 scopus 로고    scopus 로고
    • A hybrid public key infrastructure solution (HPKI) for hIPAA privacy/security regulations
    • Hu, J., Chen, H.H., and Hou, T.W. A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations. Computer Standards and Interfaces, 32, 5 (2010), 274-280.
    • (2010) Computer Standards and Interfaces , vol.32 , Issue.5 , pp. 274-280
    • Hu, J.1    Chen, H.H.2    Hou, T.W.3
  • 24
    • 45849139772 scopus 로고    scopus 로고
    • Workarounds to barcode medication administration systems:Their occurrences, causes, and threats to patient safety
    • Koppel, R., Wetterneck, T., Telles, J.L., and Karsh, B.T. Workarounds to barcode medication administration systems: Their occurrences, causes, and threats to patient safety. Journal of the American Medical Informatics Association, 15, 4 (2008), 408-423.
    • (2008) Journal of the American Medical Informatics Association , vol.15 , Issue.4 , pp. 408-423
    • Koppel, R.1    Wetterneck, T.2    Telles, J.L.3    Karsh, B.T.4
  • 25
    • 0036758891 scopus 로고    scopus 로고
    • Raising a red flag on global wWW privacy policies
    • Liu, C. and Arnett, K.P. Raising a red flag on global WWW privacy policies. Journal of Computer Information Systems, 43, 1 (2002), 117-127.
    • (2002) Journal of Computer Information Systems , vol.43 , Issue.1 , pp. 117-127
    • Liu, C.1    Arnett, K.P.2
  • 26
    • 33947628689 scopus 로고    scopus 로고
    • Comprehensive management of the access to the electronic patient record:Towards trans-institutional networks
    • Lovis, C., Spahni, S., Cassoni, N., and Geissbuhler, A. Comprehensive management of the access to the electronic patient record: Towards trans-institutional networks. International Journal of Medical Informatics, 76, 5 (2007), 466-470.
    • (2007) International Journal of Medical Informatics , vol.76 , Issue.5 , pp. 466-470
    • Lovis, C.1    Spahni, S.2    Cassoni, N.3    Geissbuhler, A.4
  • 27
    • 0035798841 scopus 로고    scopus 로고
    • Public standards and patients' control:How to keep electronic medical records accessible but private
    • Mandl, K.D., Szolovits, P., and Kohane, I.S. Public standards and patients' control: How to keep electronic medical records accessible but private. British Medical Journal, 322, 7281 (2001), 283-287.
    • (2001) British Medical Journal , vol.322 , Issue.7281 , pp. 283-287
    • Mandl, K.D.1    Szolovits, P.2    Kohane, I.S.3
  • 28
    • 81355125978 scopus 로고    scopus 로고
    • An investigative study:Health care workers as security threat suppliers
    • Medlin, B.D. and Romaniello, A. An investigative study: Health care workers as security threat suppliers. Journal of Information Privacy and Security, 3, 1 (2007), 30-46.
    • (2007) Journal of Information Privacy and Security , vol.3 , Issue.1 , pp. 30-46
    • Medlin, B.D.1    Romaniello, A.2
  • 31
    • 0038037379 scopus 로고    scopus 로고
    • Unpacking "privacy" for a networked world
    • ACM Press
    • Palen, L. and Dourish, P. Unpacking "privacy" for a networked world. In Proc. CHI 2003, ACM Press (2003), 129-136.
    • (2003) Proc. CHI 2003 , pp. 129-136
    • Palen, L.1    Dourish, P.2
  • 35
    • 79960377992 scopus 로고    scopus 로고
    • The ConStratO model of handover:A tool to support technology design and evaluation
    • Randell, R., Wilson, S., Woodward, P. and Galliers, J.R. The ConStratO model of handover: A tool to support technology design and evaluation. Behaviour &Information Technology, 30, 4 (2011), 489-498.
    • (2011) Behaviour &Information Technology , vol.30 , Issue.4 , pp. 489-498
    • Randell, R.1    Wilson, S.2    Woodward, P.3    Galliers, J.R.4
  • 36
    • 0038675156 scopus 로고    scopus 로고
    • A finger on the pulse:Temporal rhythms and information seeking in medical work
    • ACM Press
    • Reddy, M. and Dourish, P. A finger on the pulse: Temporal rhythms and information seeking in medical work. In Proc. CSCW 2002, ACM Press (2002), 344-353.
    • (2002) Proc. CSCW 2002 , pp. 344-353
    • Reddy, M.1    Dourish, P.2
  • 38
    • 0027805822 scopus 로고
    • Privacy policies and practices:Inside the organizational maze
    • Smith, H.J. Privacy policies and practices: Inside the organizational maze. Communications of the ACM, 36, 12 (1993), 105-122.
    • (1993) Communications of the ACM , vol.36 , Issue.12 , pp. 105-122
    • Smith, H.J.1
  • 39
    • 81355150537 scopus 로고    scopus 로고
    • Information privacy research:An interdisciplinary review
    • Smith, H. J., Dinev, T., and Xu, H. Information privacy research: An interdisciplinary review, MIS Quarterly, 35, 4 (2011), 989-1015.
    • (2011) MIS Quarterly , vol.35 , Issue.4 , pp. 989-1015
    • Smith, H.J.1    Dinev, T.2    Xu, H.3
  • 40
    • 50249151484 scopus 로고    scopus 로고
    • Internet users' information privacy-protective responses:A taxonomy and a nomological model
    • Son, J.Y. and Kim, S.S. Internet users' information privacy-protective responses: A taxonomy and a nomological model. MIS Quarterly, 32, 3 (2008), 503-529.
    • (2008) MIS Quarterly , vol.32 , Issue.3 , pp. 503-529
    • Son, J.Y.1    Kim, S.S.2
  • 41
    • 77953979544 scopus 로고    scopus 로고
    • Friends only:Examining a privacy-enhancing behavior in facebook
    • ACM Press
    • Stutzman, F. and Kramer-Duffield, J. Friends only: Examining a privacy-enhancing behavior in Facebook. In Proc. CHI 2010, ACM Press (2010), 1553-1562.
    • (2010) Proc. CHI 2010 , pp. 1553-1562
    • Stutzman, F.1    Kramer-Duffield, J.2
  • 43
    • 0037412301 scopus 로고    scopus 로고
    • Privacy on the web:An examination of user's concerns, technology, and implications for business organizations and individuals
    • Turner, E.C. and Dasgupta, S. Privacy on the web: An examination of user's concerns, technology, and implications for business organizations and individuals. Information Systems Management, 20, 1 (2003), 8-18.
    • (2003) Information Systems Management , vol.20 , Issue.1 , pp. 8-18
    • Turner, E.C.1    Dasgupta, S.2
  • 44
    • 67649573353 scopus 로고    scopus 로고
    • Breaches Affecting 500 or More Individuals
    • U.S. Department of Health and Human Services. (2013). "Breaches Affecting 500 or More Individuals." Retrieved from: http://www.hhs.gov/ocr/ privacy/hipaa/administrative/breachnotificationrule/breachtool.html.
    • (2013) U.S. Department of Health and Human Services.
  • 45
    • 84899032312 scopus 로고    scopus 로고
    • U.S. Department of Health and Human Services. (2013) Health Information Privacy
    • U.S. Department of Health and Human Services. (2013). "Health Information Privacy." Retrieved from: http://www.hhs.gov/ocr/privacy/.
  • 46
    • 84898933162 scopus 로고    scopus 로고
    • U.S. Department of Health and Human Services. (2013) HITECH Act Enforcement Interim Final Rule
    • U.S. Department of Health and Human Services. (2013). "HITECH Act Enforcement Interim Final Rule." Retrieved from: http://www.hhs.gov/ocr/ privacy/hipaa/administrative/enforcementrule/hitechenforcementifr.html.
  • 47
    • 84898981665 scopus 로고    scopus 로고
    • U.S. Government. (2013) American Recovery and Reinvestment Act of 2009"
    • U.S. Government. (2013). "American Recovery and Reinvestment Act of 2009". Retrieved from: http://www.recovery.gov/About/Pages/The-Act.aspx.
  • 49
    • 34547431185 scopus 로고    scopus 로고
    • Emergency department status boards:User-evolved artefacts for inter-And intra-group coordination
    • Wears, R. L., Perry, S. J., Wilson, S., Galliers, J., and Fone, J. Emergency department status boards: User-evolved artefacts for inter-And intra-group coordination. Cognition, Technology &Work, 9, 3 (2007), 163-170.
    • (2007) Cognition, Technology &Work , vol.9 , Issue.3 , pp. 163-170
    • Wears, R.L.1    Perry, S.J.2    Wilson, S.3    Galliers, J.4    Fone, J.5
  • 50
    • 33645344483 scopus 로고    scopus 로고
    • A review of security of electronic health records
    • Win, K.T. A review of security of electronic health records. Health Information Management, 34, 1 (2005), 13-18.
    • (2005) Health Information Management , vol.34 , Issue.1 , pp. 13-18
    • Win, K.T.1
  • 52
    • 77749333391 scopus 로고    scopus 로고
    • The role of push-pull technology in privacy calculus:The case of location-based services
    • Xu, H., Teo, H.H., Tan, B.C.Y., and Agarwal, R. The role of push-pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26, 3 (2009), 137-176.
    • (2009) Journal of Management Information Systems , vol.26 , Issue.3 , pp. 137-176
    • Xu, H.1    Teo, H.H.2    Tan, B.C.Y.3    Agarwal, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.