-
1
-
-
84961923825
-
-
[accessed on June 10, 2015]
-
Whole System Demonstrator Programme. Available from: 2015 [accessed on June 10, 2015]. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/215264/dh_131689.pdf.
-
(2015)
-
-
-
2
-
-
0014757443
-
Progress in development of the index of ADL
-
Spring
-
Katz S, Downs TD, Cash HR, Grotz RC. Progress in development of the index of ADL. Gerontologist 1970, 10(1):20-30. Spring.
-
(1970)
Gerontologist
, vol.10
, Issue.1
, pp. 20-30
-
-
Katz, S.1
Downs, T.D.2
Cash, H.R.3
Grotz, R.C.4
-
3
-
-
77449156169
-
Integrated delivery systems: the cure for fragmentation
-
Dec S284-90
-
Enthoven AC. Integrated delivery systems: the cure for fragmentation. Am J Manage Care 2009, 15(10 Suppl.):S284-90. Dec.
-
(2009)
Am J Manage Care
, vol.15
, Issue.10
-
-
Enthoven, A.C.1
-
4
-
-
84961881964
-
-
[accessed on May 15, 2015).
-
Nationwide Health Information Network Exchange. Available from: 2015 [accessed on May 15, 2015). https://www.healthit.gov/sites/default/files/pdf/fact-sheets/nationwide-health-information-network-exchange.pdf.
-
(2015)
-
-
-
5
-
-
84961893292
-
Self care behavior
-
Macmillan Reference, USA, L. Breslo (Ed.)
-
McGowan P Self care behavior. Encyclopedia of public health 2002, Macmillan Reference, USA. L. Breslo (Ed.).
-
(2002)
Encyclopedia of public health
-
-
McGowan, P.1
-
6
-
-
54449095842
-
A research agenda for personal health records (PHRs)
-
Kaelber DC, Jha AK, Johnston D, Middleton B, Bates DW. A research agenda for personal health records (PHRs). J Am Med Inf Assoc 2008, 15(6):729-736.
-
(2008)
J Am Med Inf Assoc
, vol.15
, Issue.6
, pp. 729-736
-
-
Kaelber, D.C.1
Jha, A.K.2
Johnston, D.3
Middleton, B.4
Bates, D.W.5
-
7
-
-
77956069626
-
Online diabetes self-management program: a randomized study
-
Lorig K, Ritter PL, Laurent DD, Plant K, Green M, Jernigan VB, et al. Online diabetes self-management program: a randomized study. Diabetes Care 2010 Jun, 33(6):1275-1281.
-
(2010)
Diabetes Care
, vol.33
, Issue.6
, pp. 1275-1281
-
-
Lorig, K.1
Ritter, P.L.2
Laurent, D.D.3
Plant, K.4
Green, M.5
Jernigan, V.B.6
-
8
-
-
84961947326
-
-
[accessed on May 15, 2015].
-
Medical Library Association. Health Information Literacy. Available from: 2015 [accessed on May 15, 2015]. https://www.mlanet.org/resources/healthlit/index.html.
-
(2015)
Health Information Literacy
-
-
-
9
-
-
84961948965
-
-
[accessed on May 15, 2015].
-
Harvard Health. Available from: 2015 [accessed on May 15, 2015]. http://www.health.harvard.edu.
-
(2015)
-
-
-
10
-
-
84961967066
-
-
[Internet]. Available from: 2015 [accessed on July10, 2015].
-
[Internet]. Available from: 2015 [accessed on July10, 2015]. http://helpguide.org.
-
-
-
-
11
-
-
84961925665
-
-
[accessed on July 10, 2015].
-
Run Keeper. Available from: 2015 [accessed on July 10, 2015]. http://runkeeper.com/running-app.
-
(2015)
-
-
-
12
-
-
84876245209
-
-
[accessed on June 10, 2015].
-
Power D. What is Social Media? Available from: 2015 [accessed on June 10, 2015]. http://dssresources.com/faq/index.php?action=artikel&id=226.
-
(2015)
What is Social Media?
-
-
Power, D.1
-
13
-
-
84961960711
-
-
[accessed on June 10, 2015].
-
BodySpace. 2015 [accessed on June 10, 2015]. http://bodyspace.bodybuilding.com.
-
(2015)
-
-
-
14
-
-
84961960713
-
-
Twitter Inc. http://twitter.com/.
-
-
-
-
15
-
-
77954838422
-
Managing healthcare through social networks
-
Domingo M. Managing healthcare through social networks. IEEE Comput 2010, 43(7):20-25.
-
(2010)
IEEE Comput
, vol.43
, Issue.7
, pp. 20-25
-
-
Domingo, M.1
-
16
-
-
84961967023
-
-
[accessed on June 10, 2015).
-
Fat Secret. Available from: 2015 [accessed on June 10, 2015). http://fatsecret.com/.
-
(2015)
-
-
-
17
-
-
84961961224
-
-
[accessed on May 15, 2015].
-
Scottie-Pilot Healthcare Project. Available from: 2015 [accessed on May 15, 2015]. https://waag.org/en/project/pilot-healthcare-gate.
-
(2015)
-
-
-
18
-
-
84961883372
-
-
Press Release: the white house; December 2000.
-
Office of the press secy. Remarks by the president on medical privacy. Press Release: the white house; December 2000.
-
Remarks by the president on medical privacy
-
-
-
19
-
-
16444368611
-
Privacy in e-commerce: stated preferences vs. actual behavior
-
Berendt B, Gurnther O, Spiekermann S. Privacy in e-commerce: stated preferences vs. actual behavior. Commun ACM 2005, 48(4):101-106.
-
(2005)
Commun ACM
, vol.48
, Issue.4
, pp. 101-106
-
-
Berendt, B.1
Gurnther, O.2
Spiekermann, S.3
-
20
-
-
84961917339
-
-
[accessed on May 15, 2015].
-
Pew Internet and American Life Project. Available from: 2015 [accessed on May 15, 2015]. http://www.pewinternet.org/2011/02/01/health-topics-4/.
-
(2015)
-
-
-
21
-
-
84876628539
-
Hackers assault epilepsy patients via computer
-
Poulsen K. Hackers assault epilepsy patients via computer. WIRED News 2008, http://www.wired.com/politics/security/news/2008/03/epilepsy.
-
(2008)
WIRED News
-
-
Poulsen, K.1
-
22
-
-
80755173803
-
Your apps are watching you
-
Online, December
-
Thrum S, Kane Y. Your apps are watching you. Wall Street J 2010, Online, December.
-
(2010)
Wall Street J
-
-
Thrum, S.1
Kane, Y.2
-
23
-
-
84961948959
-
-
[accessed on June 10, 2015].
-
Google Privacy & Terms. 2015 [accessed on June 10, 2015]. http://www.google.com/policies/privacy/partners/.
-
(2015)
-
-
-
26
-
-
80755127060
-
-
ACM, New York, NY, USA
-
Au K, Zhou Y, Huang Z, Gill P, Lie D. Short paper: a look at smartphone permission models. In: Proceedings of the first ACM workshop on Security and privacy in smartphones and mobile devices, ser. SPSM'11 2011, 63-68. ACM, New York, NY, USA.
-
(2011)
Short paper: a look at smartphone permission models. In: Proceedings of the first ACM workshop on Security and privacy in smartphones and mobile devices, ser. SPSM'11
, pp. 63-68
-
-
Au, K.1
Zhou, Y.2
Huang, Z.3
Gill, P.4
Lie, D.5
-
28
-
-
77955478147
-
Bluetooth low energy: wireless connectivity for medical monitoring
-
Omre AH, Keeping S. Bluetooth low energy: wireless connectivity for medical monitoring. J Diabetes Sci Technol 2010, 4(2):457-463.
-
(2010)
J Diabetes Sci Technol
, vol.4
, Issue.2
, pp. 457-463
-
-
Omre, A.H.1
Keeping, S.2
-
29
-
-
84961961196
-
-
Proceedings of USENIX workshop on health security and privacy (HealthSec); August
-
Mare S, Kotz D. Is Bluetooth the right technology for mhealth? In: Proceedings of USENIX workshop on health security and privacy (HealthSec); August, 2010.
-
(2010)
Is Bluetooth the right technology for mhealth?
-
-
Mare, S.1
Kotz, D.2
-
31
-
-
50249098733
-
-
IEEE symposium on security and privacy. IEEE
-
Halperin D, Heydt-Benjamin TS, Ransford B, Clark SS, Defend B, Morgan W, et al. Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses. In: 2008 IEEE symposium on security and privacy. IEEE; 2008, p. 129-42.
-
(2008)
Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses
, vol.2008
, pp. 129-142
-
-
Halperin, D.1
Heydt-Benjamin, T.S.2
Ransford, B.3
Clark, S.S.4
Defend, B.5
Morgan, W.6
-
32
-
-
36348932828
-
Radiofrequency identification technology in health care: benefits and potential risks
-
Ashar BS, Ferriter A. Radiofrequency identification technology in health care: benefits and potential risks. JAMA 2007, 298(19):2305-2307.
-
(2007)
JAMA
, vol.298
, Issue.19
, pp. 2305-2307
-
-
Ashar, B.S.1
Ferriter, A.2
-
33
-
-
84961917346
-
-
Aug, Available from: 2015 [accessed on June 10, 2015].
-
MANAGED CARE, 2014 Aug, Available from: 2015 [accessed on June 10, 2015]. http://www.managedcaremag.com/archives/2014/8/medical-device-market-hit-133-billion-2016.
-
(2014)
-
-
-
34
-
-
17844366573
-
Analysis of end user security behaviors
-
Stanton J, Stam K, Mastrangelo P, Jolton J. Analysis of end user security behaviors. Comput Secur 2005, 24(2):124-133.
-
(2005)
Comput Secur
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.1
Stam, K.2
Mastrangelo, P.3
Jolton, J.4
-
35
-
-
80053135174
-
They can hear your heartbeats: non-invasive security for implantable medical devices
-
Gollakota S, Hassanieh H, Ransford B, Katabi D, Fu K. They can hear your heartbeats: non-invasive security for implantable medical devices. SIGCOMM Comput Commun Rev 2011, 41(4):2-13.
-
(2011)
SIGCOMM Comput Commun Rev
, vol.41
, Issue.4
, pp. 2-13
-
-
Gollakota, S.1
Hassanieh, H.2
Ransford, B.3
Katabi, D.4
Fu, K.5
-
36
-
-
38149055539
-
-
Proceedings of the second international conference on usability and internationalization, ser. UI-HCII'07. Berlin, Heidelberg: Springer-Verlag
-
Yang Y, Lewis E, Brown L. Cultural and social aspects of security and privacy: the critical elements of trusted online service. In: Proceedings of the second international conference on usability and internationalization, ser. UI-HCII'07. Berlin, Heidelberg: Springer-Verlag; 2007. p. 546-53.
-
Cultural and social aspects of security and privacy: the critical elements of trusted online service
, vol.2007
, pp. 546-553
-
-
Yang, Y.1
Lewis, E.2
Brown, L.3
-
37
-
-
84961961237
-
-
OCED 30 May 2013. 2013 [accessed April 19, 2015].
-
Strengthening Health Information Infrastructure for Health Care Quality Governance: good practices, new opportunities and data privacy protection challenges. OCED 30 May 2013. http://www.oecd.org/els/health-systems/strengthening-health-information-infrastructure.htm 2013 [accessed April 19, 2015].
-
Good practices, new opportunities and data privacy protection challenges
-
-
-
40
-
-
0016555241
-
The protection of information in computer systems
-
Saltzer J, Schroeder M. The protection of information in computer systems. Proc IEEE 1975, 63(9):1278-1308.
-
(1975)
Proc IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
41
-
-
85037073388
-
Privilege escalation attacks on android
-
Springer, Berlin/Heidelberg
-
Davi L, Dmitrienko A, Sadeghi AR, Winandy M. Privilege escalation attacks on android. Proceedings of information security, ser. lecture notes in computer science 2011, 6531:346-360. Springer, Berlin/Heidelberg.
-
(2011)
Proceedings of information security, ser. lecture notes in computer science
, vol.6531
, pp. 346-360
-
-
Davi, L.1
Dmitrienko, A.2
Sadeghi, A.R.3
Winandy, M.4
-
42
-
-
80052803379
-
Do windows users follow the principle of least privilege?: investigating user account control practices
-
ser. SOUPS '10, ACM, New York, NY, USA
-
Motiee S, Hawkey K, Beznosov K. Do windows users follow the principle of least privilege?: investigating user account control practices. Proceedings of the sixth symposium on usable privacy and security 2010, ser. SOUPS '10, ACM, New York, NY, USA, 1:1-1:13.
-
(2010)
Proceedings of the sixth symposium on usable privacy and security
, pp. 1.1-1.13
-
-
Motiee, S.1
Hawkey, K.2
Beznosov, K.3
-
43
-
-
78449288160
-
Access control for smarter healthcare using policy spaces
-
Ardagna CA, di Vimercati SDC, Foresti S, Grandison TW, Jajodia S, Samarati P. Access control for smarter healthcare using policy spaces. Comput Secur 2010, 29(8):848-858.
-
(2010)
Comput Secur
, vol.29
, Issue.8
, pp. 848-858
-
-
Ardagna, C.A.1
di Vimercati, S.D.C.2
Foresti, S.3
Grandison, T.W.4
Jajodia, S.5
Samarati, P.6
-
45
-
-
0035693941
-
On the complexity of optimal micro-aggregation for statistical disclosure control
-
Oganian A, Domingo-Ferrer J. On the complexity of optimal micro-aggregation for statistical disclosure control. Stat J United Nations Econ Comm Eur 2001, 18(4):345-353.
-
(2001)
Stat J United Nations Econ Comm Eur
, vol.18
, Issue.4
, pp. 345-353
-
-
Oganian, A.1
Domingo-Ferrer, J.2
-
48
-
-
78650118369
-
Privacy preserving EHR system using attribute-based infrastructure
-
ser. CCSW '10, ACM, New York, NY, USA
-
Narayan S, Gagne D.M, Safavi-Naini R. Privacy preserving EHR system using attribute-based infrastructure. Proceedings of the 2010 ACM workshop on Cloud computing security workshop 2010, 47-52. ser. CCSW '10, ACM, New York, NY, USA.
-
(2010)
Proceedings of the 2010 ACM workshop on Cloud computing security workshop
, pp. 47-52
-
-
Narayan, S.1
Gagne, M.D.2
Safavi-Naini, R.3
-
49
-
-
80755181009
-
Securing electronic medical records using attribute-based encryption on mobile devices
-
ser. SPSM '11, ACM, New York, NY, USA
-
Akinyele JA, Pagano MW, Green MD, Lehmann CU, Peterson ZN, Rubin AD. Securing electronic medical records using attribute-based encryption on mobile devices. Proceedings of the first ACM workshop on Security and privacy in smartphones and mobile devices 2011, 75-86. ser. SPSM '11, ACM, New York, NY, USA.
-
(2011)
Proceedings of the first ACM workshop on Security and privacy in smartphones and mobile devices
, pp. 75-86
-
-
Akinyele, J.A.1
Pagano, M.W.2
Green, M.D.3
Lehmann, C.U.4
Peterson, Z.N.5
Rubin, A.D.6
-
50
-
-
33745816410
-
Why phishing works
-
ser. CHI '06, ACM, New York, NY, USA
-
Dhamija R, Tygar JD, Hearst M. Why phishing works. Proceedings of the SIGCHI conference on Human Factors in computing systems 2006, 581-590. ser. CHI '06, ACM, New York, NY, USA.
-
(2006)
Proceedings of the SIGCHI conference on Human Factors in computing systems
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
51
-
-
67249151917
-
Lessons from a real world evaluation of anti-phishing training
-
Kumaraguru P, Sheng S, Acquisti A, Cranor LF, Hong J. Lessons from a real world evaluation of anti-phishing training. IEEE eCrime Res Summit 2008, 1-12.
-
(2008)
IEEE eCrime Res Summit
, pp. 1-12
-
-
Kumaraguru, P.1
Sheng, S.2
Acquisti, A.3
Cranor, L.F.4
Hong, J.5
-
52
-
-
84961907447
-
-
Proceedings of the 16th virus bulletin int. conference; 2006.
-
Gorling S. The myth of user education. In: Proceedings of the 16th virus bulletin int. conference; 2006.
-
The myth of user education
-
-
Gorling, S.1
-
53
-
-
77955203537
-
Characterizing the impacts of VPN security models on streaming video
-
ser. CNSR '10, IEEE Computer Society, Washington, DC, USA
-
Park S, Matthews B, D'Amours D, McIver WJ. Characterizing the impacts of VPN security models on streaming video. Proceedings of the 2010 eighth annual communication networks and services research conference 2010, 152-159. ser. CNSR '10, IEEE Computer Society, Washington, DC, USA.
-
(2010)
Proceedings of the 2010 eighth annual communication networks and services research conference
, pp. 152-159
-
-
Park, S.1
Matthews, B.2
D'Amours, D.3
McIver, W.J.4
-
56
-
-
67349199140
-
Message authentication in computationally constrained environments
-
Arazi B. Message authentication in computationally constrained environments. IEEE Trans Mob Comput 2009, 8(7):968-974.
-
(2009)
IEEE Trans Mob Comput
, vol.8
, Issue.7
, pp. 968-974
-
-
Arazi, B.1
-
58
-
-
79960873920
-
IMDGuard: securing implantable medical devices with the external wearable guardian
-
April 2011
-
Xu F, Qin Z, Tan C, Wang B, Li Q. IMDGuard: securing implantable medical devices with the external wearable guardian. In: IEEE proceedings of INFOCOM; April 2011. p. 1862-70.
-
IEEE proceedings of INFOCOM
, pp. 1862-1870
-
-
Xu, F.1
Qin, Z.2
Tan, C.3
Wang, B.4
Li, Q.5
-
61
-
-
77953972283
-
Absence makes the heart grow fonder: new directions for implantable medical device security
-
USENIX Association, Berkeley, CA, USA
-
Denning T, Fu K, Kohno T. Absence makes the heart grow fonder: new directions for implantable medical device security. Proceedings of the third conference on Hot topics in security 2008, 1-7. USENIX Association, Berkeley, CA, USA.
-
(2008)
Proceedings of the third conference on Hot topics in security
, pp. 1-7
-
-
Denning, T.1
Fu, K.2
Kohno, T.3
-
62
-
-
12844250213
-
Information flow analysis for fail-secure devices
-
Rae A, Fidge C. Information flow analysis for fail-secure devices. Comput J 2005, 48(1):17-26.
-
(2005)
Comput J
, vol.48
, Issue.1
, pp. 17-26
-
-
Rae, A.1
Fidge, C.2
-
64
-
-
77953856664
-
Sharing health data for better outcomes on PatientsLikeMe
-
Wicks P, Massagli M, Frost J, Brownstein C, Okun S, Vaughan T, et al. Sharing health data for better outcomes on PatientsLikeMe. J Med Internet Res 2010, 12(2):e19.
-
(2010)
J Med Internet Res
, vol.12
, Issue.2
, pp. e19
-
-
Wicks, P.1
Massagli, M.2
Frost, J.3
Brownstein, C.4
Okun, S.5
Vaughan, T.6
-
65
-
-
84961887287
-
-
[accessed on July 12, 2015].
-
MyOSCAR. Available from: 2015 [accessed on July 12, 2015]. http://myoscar.org.
-
(2015)
-
-
-
66
-
-
84961918161
-
-
[accessed on July 12, 2015].
-
Novant Health MyChart. Available from: 2015 [accessed on July 12, 2015]. https://novantmychart.org/.
-
(2015)
-
-
-
67
-
-
84961942767
-
-
[accessed on July 12, 2015].
-
NextGen Healthcare Patient Portal. Available from: 2015 [accessed on July 12, 2015]. https://www.nextmd.com/.
-
(2015)
-
-
-
68
-
-
84961899979
-
-
[accessed on July 12, 2015].
-
HealthVault. Available from: 2015 [accessed on July 12, 2015]. https://www.healthvault.com/.
-
(2015)
-
-
-
69
-
-
84883892066
-
Privacy in e-commerce: examining user scenarios and privacy preferences
-
EC'99, Denver, CO; Nov. 1999
-
Ackerman MS, Cranor LF, Reagle J. Privacy in e-commerce: examining user scenarios and privacy preferences. In: Proceedings of the ACM conference on electronic commerce EC'99, Denver, CO; Nov. 1999. p. 1-8.
-
Proceedings of the ACM conference on electronic commerce
, pp. 1-8
-
-
Ackerman, M.S.1
Cranor, L.F.2
Reagle, J.3
-
70
-
-
84961899978
-
-
Medical device recall report. Available from: 2015 [accessed on June 10, 2015).
-
U.S. Food and Drug Administration.Medical device recall report. Available from: 2015 [accessed on June 10, 2015). http://www.fda.gov/downloads/AboutFDA/CentersOffices/OfficeofMedicalProductsandTobacco/CDRH/CDRHTransparency/UCM388442.pdf.
-
-
-
|