메뉴 건너뛰기




Volumn 44, Issue 3, 2015, Pages 23-38

A systematic literature review on security and privacy of electronic health record systems: Technical perspectives

Author keywords

Data security; Electronic health records; Privacy; Review; Standards; Systematic

Indexed keywords

ADULT; ARTICLE; ELECTRONIC HEALTH RECORD; FEMALE; HUMAN; INFORMATION SECURITY; INTERNATIONAL ORGANIZATION FOR STANDARDIZATION; MALE; MEDICAL INFORMATION SYSTEM; PRIVACY; SYSTEMATIC REVIEW; ACCESS TO INFORMATION; COMPUTER SECURITY; CONFIDENTIALITY; META ANALYSIS; PROTOCOL COMPLIANCE; STANDARDS; NORMAL HUMAN; STANDARDIZATION;

EID: 84947710116     PISSN: 18333583     EISSN: 18333575     Source Type: Journal    
DOI: 10.1177/183335831504400304     Document Type: Review
Times cited : (69)

References (79)
  • 1
    • 84875548667 scopus 로고    scopus 로고
    • Secure electronic health record exchange: Achieving the meaningful use objectives
    • Wailea, Hawaii, USA, (accessed 23 August 2013)
    • Acharya, S., Coats, B., Saluja, A. and Fuller, D. (2013). Secure electronic health record exchange: achieving the meaningful use objectives. 46th Hawaii International Conference on System Sciences. Wailea, Hawaii, USA, 2555-2564. Available at: http://www.computer.org/csdl/proceedings/hicss/2013/4892/00/4892c555.pdf (accessed 23 August 2013).
    • (2013) 46Th Hawaii International Conference on System Sciences , pp. 2555-2564
    • Acharya, S.1    Coats, B.2    Saluja, A.3    Fuller, D.4
  • 2
    • 85182126990 scopus 로고    scopus 로고
    • Trusted framework for health information exchange. Frontiers of Information Technology, Islamabad, (accessed 23 August 2013)
    • Afzal, M., Hussain, M., Ahmad, M. and Anwar, Z. (2011). Trusted framework for health information exchange. Frontiers of Information Technology, Islamabad. Available at: http://www.computer.org/csdl/proceedings/fit/2011/4625/00/4625a308.pdf (accessed 23 August 2013).
    • (2011)
    • Afzal, M.1    Hussain, M.2    Ahmad, M.3    Anwar, Z.4
  • 3
    • 84878948803 scopus 로고    scopus 로고
    • A novel system architecture for the national integration of electronic health records: A semi-centralized approach
    • Aljarullah, A. and El-Masri, S. (2012). A novel system architecture for the national integration of electronic health records: a semi-centralized approach. Journal of Medical Systems 37(4): 9953.
    • (2012) Journal of Medical Systems , vol.37 , Issue.4 , pp. 9953
    • Aljarullah, A.1    El-Masri, S.2
  • 4
    • 0033135172 scopus 로고    scopus 로고
    • PCASSO: A design for secure communication of personal health information via the internet
    • Bakers, D.B. and Masys, D.R. (1999). PCASSO: a design for secure communication of personal health information via the internet. International Journal of Medical Informatics 54(2): 97-104.
    • (1999) International Journal of Medical Informatics , vol.54 , Issue.2 , pp. 97-104
    • Bakers, D.B.1    Masys, D.R.2
  • 8
    • 0035004828 scopus 로고    scopus 로고
    • A systematic approach for analysis and design of secure health information systems
    • Blobel, B. and Roger-France, F. (2001). A systematic approach for analysis and design of secure health information systems. International Journal of Medical Informatics 62(1): 51-78.
    • (2001) International Journal of Medical Informatics , vol.62 , Issue.1 , pp. 51-78
    • Blobel, B.1    Roger-France, F.2
  • 9
    • 1842474926 scopus 로고    scopus 로고
    • Authorization and access control for electronic health record systems
    • Blobel, B. (2004). Authorization and access control for electronic health record systems. International Journal of Medical Informatics 73(3):251-257.
    • (2004) International Journal of Medical Informatics , vol.73 , Issue.3 , pp. 251-257
    • Blobel, B.1
  • 10
    • 33846828667 scopus 로고    scopus 로고
    • A model driven approach for the German health telematics architectural framework and security infrastructure
    • Blobel, B. and Pharow, P. (2007). A model driven approach for the German health telematics architectural framework and security infrastructure. International Journal of Medical Informatics 76(2-3): 169-175.
    • (2007) International Journal of Medical Informatics , vol.7 , Issue.2-3 , pp. 169-175
    • Blobel, B.1    Pharow, P.2
  • 12
    • 84868628586 scopus 로고    scopus 로고
    • Standards for health information technology to ensure adolescent privacy
    • Blythe, M.J. et al. (2012). Standards for health information technology to ensure adolescent privacy. Pediatrics 130(5): 987-990.
    • (2012) Pediatrics , vol.130 , Issue.5 , pp. 987-990
    • Blythe, M.J.1
  • 16
    • 84867313640 scopus 로고    scopus 로고
    • A secure EHR system based on hybrid clouds
    • Chen, Y.Y., Lu, J.C. and Jan, J.K. (2012). A secure EHR system based on hybrid clouds. Journal of Medical Systems 36(5): 3375-3384.
    • (2012) Journal of Medical Systems , vol.36 , Issue.5 , pp. 3375-3384
    • Chen, Y.Y.1    Lu, J.C.2    Jan, J.K.3
  • 18
    • 84875014632 scopus 로고    scopus 로고
    • Segmenting data privacy. Cross-industry initiative aims to piece out privacy within the health record
    • Coleman, J. (2013). Segmenting data privacy. Cross-industry initiative aims to piece out privacy within the health record. Journal of AHIMA/ American Health Information Management Association 84(2): 34-38.
    • (2013) Journal of AHIMA/ American Health Information Management Association , vol.84 , Issue.2 , pp. 34-38
    • Coleman, J.1
  • 19
    • 85182111782 scopus 로고    scopus 로고
    • CORE, (accessed 8 December 2013)
    • CORE (2012). The CORE Conference Ranking Exercise. Available at: www.core.edu.au/coreportal (accessed 8 December 2013).
    • (2012) The CORE Conference Ranking Exercise
  • 20
    • 85182124564 scopus 로고    scopus 로고
    • CWTS Journal Indicators, SNIP indicator, (accessed 8 December 2013)
    • CWTS Journal Indicators (2012). SNIP indicator. Available at: http://www.journalindicators.com (accessed 8 December 2013).
    • (2012)
  • 22
    • 84893573899 scopus 로고    scopus 로고
    • A systematic review on aspects in software architecture design
    • Valparaiso, (accessed 20 March 2013)
    • De Oliveira, K.S. and Soares, M.S. (2012). A systematic review on aspects in software architecture design. International Conference of the Chilean Computer Science Society, 21-28, Valparaiso. Available: http://www.computer.org/csdl/proceedings/sccc/2012/2938/00/2937a021.pdf (accessed 20 March 2013).
    • (2012) International Conference of the Chilean Computer Science Society , pp. 21-28
    • De Oliveira, K.S.1    Soares, M.S.2
  • 23
    • 84892489103 scopus 로고    scopus 로고
    • The relationship between requirements engineering and virtual reality systems: A systematic literature review
    • Cuiaba, (accessed 20 March 2013)
    • Dos Santos, A.C.C, Delamaro, M.E. and Nunes, F.L.S. (2013). The relationship between requirements engineering and virtual reality systems: A systematic literature review. XV Symposium on Virtual and Augmented Reality: 53-62. Cuiaba. Available at: http://dl.acm.org/citation.cfm?id=2511560 (accessed 20 March 2013).
    • (2013) XV Symposium on Virtual and Augmented Reality , pp. 53-62
    • Dos Santos, A.1    Delamaro, M.E.2    Nunes, F.3
  • 26
    • 84877683559 scopus 로고    scopus 로고
    • User-centric private matching for eHealth networks - a social perspective
    • Anaheim, California, (accessed 23 August 2013)
    • Guo L, Liu X, Fang Y and Li X. (2012).User-centric private matching for eHealth networks - a social perspective. Globecom 2012 IEEE - Communication and Information System Security Symposium, Anaheim, California. Available at: IEEE Xplore,http://www.ieee.org (accessed 23 August 2013).
    • (2012) Globecom 2012 IEEE - Communication and Information System Security Symposium
    • Guo, L.1    Liu, X.2    Fang, Y.3    Li, X.4
  • 27
    • 70049099036 scopus 로고    scopus 로고
    • Chapter 8: Assessing risk of bias in included studies
    • Version 5.1.0 [updated March 2011]. J. Higgins & S. Green (Eds)
    • Higgins, J., Altman, D.G. and Sterne, J.A.C. (Eds) (2011). Chapter 8: Assessing risk of bias in included studies. In: Cochrane Handbook for Systematic Reviews of Interventions Version 5.1.0 [updated March 2011]. J. Higgins S. Green (Eds). Available at: http://www.cochrane-handbook.org (accessed 13 April 2015).
    • (2011) Cochrane Handbook for Systematic Reviews of Interventions
    • Higgins, J.1    Altman, D.G.2    Sterne, J.3
  • 28
    • 84975290306 scopus 로고    scopus 로고
    • Health Level Seven International (HL7), (accessed 5 January 2014)
    • Health Level Seven International (HL7) (2013). Introduction to HL7standards. Available at: http://www.hl7.org/implement/standards/ (accessed 5 January 2014).
    • (2013) Introduction to Hl7standards
  • 31
    • 84867301818 scopus 로고    scopus 로고
    • A privacy-strengthened scheme for e-healthcare monitoring systems
    • Huang, C., Lee, H. and Lee, D.H. (2012). A privacy-strengthened scheme for e-healthcare monitoring systems. Journal of Medical Systems 36(5): 2959-2971.
    • (2012) Journal of Medical Systems , vol.36 , Issue.5 , pp. 2959-2971
    • Huang, C.1    Lee, H.2    Lee, D.H.3
  • 32
    • 85136567564 scopus 로고    scopus 로고
    • A hierarchical framework for secure and scalable EHR sharing and access control in multi-cloud
    • Pittsburgh, Pennsylvania, USA
    • Huang, J., Sharaf, M. and Huang, C.T. (2013). A hierarchical framework for secure and scalable EHR sharing and access control in multi-cloud. 41st International Conference on Parallel Processing Workshops, Pittsburgh, Pennsylvania, USA. Available at: IEEE Xplore,http://www.ieee.org (accessed 23 August 2013).
    • (2013) 41St International Conference on Parallel Processing Workshops
    • Huang, J.1    Sharaf, M.2    Huang, C.T.3
  • 33
    • 84874611075 scopus 로고    scopus 로고
    • Electronic health records in an occupational health setting - Part I. A global overview
    • Hunter, E.S. (2013). Electronic health records in an occupational health setting - Part I. A global overview. Workplace Health and Safety 61(2): 57-60.
    • (2013) Workplace Health and Safety , vol.61 , Issue.2 , pp. 57-60
    • Hunter, E.S.1
  • 34
    • 85182140255 scopus 로고    scopus 로고
    • ISO, ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security controls, (accessed 2 December 2013)
    • ISO (2013). ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security controls. Available at: http://www.iso.org/iso/home.html (accessed 2 December 2013)
    • (2013)
  • 35
    • 85182119620 scopus 로고    scopus 로고
    • ISO, ISO/IEC 29100 Information technology — Security techniques — Privacy framework, (accessed 2 December 2013)
    • ISO (2011). ISO/IEC 29100 Information technology — Security techniques — Privacy framework, Available at: http://www.iso.org/iso/home.html (accessed 2 December 2013).
    • (2011)
  • 36
    • 85182121558 scopus 로고    scopus 로고
    • ISO, ISO 27799 Information security management in health using ISO/IEC 27002, (accessed 15 March 2013)
    • ISO (2008). ISO 27799 Information security management in health using ISO/IEC 27002, Available at: http://www. iso.org/iso/home.html (accessed 15 March 2013).
    • (2008)
  • 38
    • 84879287509 scopus 로고    scopus 로고
    • Security in healthcare informatics: Design and implementation of a robust authentication and a hybrid access control mechanism
    • Istanbul, Turkey
    • Khan, M.F.F. and Sakamura, K. (2012). Security in healthcare informatics: design and implementation of a robust authentication and a hybrid access control mechanism. The 5th International Conference on Communications, Computers and Applications (MIC-CCA2012), Istanbul, Turkey. Available at: IEEE Xplore,http://www.ieee.org (accessed 23 August 2013).
    • (2012) The 5Th International Conference on Communications, Computers and Applications (MIC-CCA2012)
    • Khan, M.F.F.1    Sakamura, K.2
  • 39
    • 85182110543 scopus 로고    scopus 로고
    • Undertaking systematic reviews of research on effectiveness: CRD’s guidance for carrying out or commissioning reviews No. 4 (2nd ed.). NHS Centre for Reviews and Dissemination
    • Khan, K. S., Ter Riet, G., Glanville, J., Sowden, A. J. and Kleijnen, J. (2001). Undertaking systematic reviews of research on effectiveness: CRD’s guidance for carrying out or commissioning reviews No. 4 (2nd ed.). NHS Centre for Reviews and Dissemination.
    • (2001)
    • Khan, K.S.1    Ter Riet, G.2    Glanville, J.3    Sowden, A.J.4    Kleijnen, J.5
  • 41
    • 27644567603 scopus 로고    scopus 로고
    • Technical Report TR/SE-0401. Keele, UK, Keele University NICTA Technical Report 0400011T.1
    • Kitchenham, B.A. (2004). Procedures for performing systematic reviews. Technical Report TR/SE-0401. Keele, UK, Keele University NICTA Technical Report 0400011T.1.
    • (2004) Procedures for Performing Systematic Reviews
    • Kitchenham, B.A.1
  • 42
    • 84885174213 scopus 로고    scopus 로고
    • A systematic review of systematic review process research in software engineering
    • Kitchenham, B.A. and Brereton, P. (2013). A systematic review of systematic review process research in software engineering. Information and Software Technology 55(12): 2049-2075.
    • (2013) Information and Software Technology , vol.55 , Issue.12 , pp. 2049-2075
    • Kitchenham, B.A.1    Brereton, P.2
  • 43
    • 69149107727 scopus 로고    scopus 로고
    • The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate health care interventions: Explanation and elaboration
    • Liberati, A., Altman, D. G., Tetzlaff, J., Mulrow, C., Gøtzsche, P. C., Ioannidis, J. P., et al. (2009). The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate health care interventions: explanation and elaboration. Annals of Internal Medicine 151(4): W-65-W-94.
    • (2009) Annals of Internal Medicine , vol.151 , Issue.4 , pp. 65-94
    • Liberati, A.1    Altman, D.G.2    Tetzlaff, J.3    Mulrow, C.4    Gøtzsche, P.C.5    Ioannidis, J.P.6
  • 44
    • 84864062006 scopus 로고    scopus 로고
    • The enhancement of security in healthcare information systems
    • Liu, C.H., Chung, Y.F., Chen, T.S. and Wang, S.D. (2012). The enhancement of security in healthcare information systems. Journal of Medical Systems 36(3): 1673-1688.
    • (2012) Journal of Medical Systems , vol.36 , Issue.3 , pp. 1673-1688
    • Liu, C.H.1    Chung, Y.F.2    Chen, T.S.3    Wang, S.D.4
  • 45
    • 80053224147 scopus 로고    scopus 로고
    • Design and development of an international clinical data exchange system: The international layer function of the Dolphin Project
    • Li, J. S., Zhou, T. S., Chu, J., Araki, K. and Yoshihara, H. (2011). Design and development of an international clinical data exchange system: the international layer function of the Dolphin Project. Journal of the American Medical Informatics Association 18(5): 683-689.
    • (2011) Journal of the American Medical Informatics Association , vol.18 , Issue.5 , pp. 683-689
    • Li, J.S.1    Zhou, T.S.2    Chu, J.3    Araki, K.4    Yoshihara, H.5
  • 46
    • 84872200080 scopus 로고    scopus 로고
    • Simple group password-based authenticated key agreements for the integrated EPR information system
    • Lee, T.F., Chang, I.-P. and Wang, C.C. (2013). Simple group password-based authenticated key agreements for the integrated EPR information system. Journal of Medical Systems 37(2).
    • (2013) Journal of Medical Systems , vol.37 , Issue.2
    • Lee, T.F.1    Chang, I.-P.2    Wang, C.C.3
  • 47
    • 84870885441 scopus 로고    scopus 로고
    • Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
    • (accessed 23 August 2013)
    • Li, M., Yu, S., Zheng, Y., Ren, K. and Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel and Distributed Systems 24(1): 131-143. Available at: IEEE Xplore,http://www.ieee.org (accessed 23 August 2013).
    • (2013) IEEE Transactions on Parallel and Distributed Systems , vol.24 , Issue.1 , pp. 131-143
    • Li, M.1    Yu, S.2    Zheng, Y.3    Ren, K.4    Lou, W.5
  • 49
    • 84875634268 scopus 로고    scopus 로고
    • A semantic framework to protect the privacy of electronic health records with non-numerical attributes
    • Martínez, S., Sánchez, D. and Valls, A. (2013). A semantic framework to protect the privacy of electronic health records with non-numerical attributes. Journal of Biomedical Informatics 46(2): 294-303.
    • (2013) Journal of Biomedical Informatics , vol.46 , Issue.2 , pp. 294-303
    • Martínez, S.1    Sánchez, D.2    Valls, A.3
  • 51
    • 68049122102 scopus 로고    scopus 로고
    • The PRISMA Group. Preferred Reporting Items for Systematic Reviews and Meta-Analyses: The PRISMA Statement
    • Moher D., Liberati A., Tetzlaff J. and Altman D.G. (2009). The PRISMA Group. Preferred Reporting Items for Systematic Reviews and Meta-Analyses: The PRISMA Statement. PLoS Med 6(6): e1000097. doi:10.1371/journal.pmed1000097.
    • (2009) Plos Med , vol.6 , Issue.6 , pp. 1000097
    • Moher, D.1    Liberati, A.2    Tetzlaff, J.3    Altman, D.G.4
  • 52
    • 80053512136 scopus 로고    scopus 로고
    • Privacy, confidentiality, HIPAA, and HITECH: Implications for the health care practitioner
    • Murray, T.L., Calhoun, M. and Philipsen, N.C. (2011). Privacy, confidentiality, HIPAA, and HITECH: Implications for the health care practitioner. Journal for Nurse Practitioners 7(9): 747-752.
    • (2011) Journal for Nurse Practitioners , vol.7 , Issue.9 , pp. 747-752
    • Murray, T.L.1    Calhoun, M.2    Philipsen, N.C.3
  • 55
    • 83055191218 scopus 로고    scopus 로고
    • De-identifying an EHR database-anonymity, correctness and readability of the medical record
    • Pantazos, K., Lauesen, S. and Lippert, S. (2011). De-identifying an EHR database-anonymity, correctness and readability of the medical record. Studies in health technology and informatics 169: 862-6.
    • (2011) Studies in Health Technology and Informatics , vol.169 , pp. 862-866
    • Pantazos, K.1    Lauesen, S.2    Lippert, S.3
  • 59
    • 84947715899 scopus 로고    scopus 로고
    • Informed use of patients’ records on trusted health care services
    • Victoria, British Columbia, Canada
    • Sahama T. and Miller, E. (2011). Informed use of patients’ records on trusted health care services. International Perspectives in Health Informatics, Victoria, British Columbia, Canada.
    • (2011) International Perspectives in Health Informatics
    • Sahama, T.1    Miller, E.2
  • 62
    • 85182124122 scopus 로고    scopus 로고
    • SCImago, SJR — SCImago Journal & Country Rank, (accessed 8 December2013)
    • SCImago (2012). SJR — SCImago Journal Country Rank. Available at: http://www.scimagojr.com (accessed 8 December2013).
    • (2012)
  • 63
    • 84880953053 scopus 로고    scopus 로고
    • Dynamic federation in identity management for securing and sharing personal health records in a patient centric model in cloud
    • Singh, R., Gupta, V. and Mohan, K. (2013). Dynamic federation in identity management for securing and sharing personal health records in a patient centric model in cloud. International Journal of Engineering and Technology 5(3): 2201-2209.
    • (2013) International Journal of Engineering and Technology , vol.5 , Issue.3 , pp. 2201-2209
    • Singh, R.1    Gupta, V.2    Mohan, K.3
  • 64
    • 85182117768 scopus 로고    scopus 로고
    • Standards Australia, Health Level 7 (HL7), (accessed 2 January 2014)
    • Standards Australia (2013). Health Level 7 (HL7) Available at: http://www.ehealth.standards.org.au/StandardsOrganisations/HealthLevel7.aspx (accessed 2 January 2014).
    • (2013)
  • 65
    • 84922289019 scopus 로고    scopus 로고
    • Using EHRs to design drug repositioning trials: A devolved approach to data protection. International Review of Law
    • July
    • Stauch, M., Forgó, N. and Krügel, T. (2013). Using EHRs to design drug repositioning trials: A devolved approach to data protection. International Review of Law, Computers and Technology, 01 July 2013.
    • (2013) Computers and Technology , pp. 01
    • Stauch, M.1    Forgó, N.2    Krügel, T.3
  • 66
    • 84864091173 scopus 로고    scopus 로고
    • Health records and the cloud computing paradigm from a privacy perspective
    • Stingl, C. and Slamanig, D. (2011). Health records and the cloud computing paradigm from a privacy perspective. Journal of Healthcare Engineering 2(4): 487-508.
    • (2011) Journal of Healthcare Engineering , vol.2 , Issue.4 , pp. 487-508
    • Stingl, C.1    Slamanig, D.2
  • 67
    • 80051864290 scopus 로고    scopus 로고
    • HCPP: Cryptography based secure EHR system for patient privacy and emergency healthcare
    • Minneapolis, MN, (accessed 23 August 2013)
    • Sun, J., Zhu, X., Zhang, C. and Fang, Y. (2011). HCPP: Cryptography based secure EHR system for patient privacy and emergency healthcare. 31st International Conference on Distributed Computing Systems, Minneapolis, MN. Available at: IEEE Xplore,http://www.ieee.org (accessed 23 August 2013).
    • (2011) 31St International Conference on Distributed Computing Systems
    • Sun, J.1    Zhu, X.2    Zhang, C.3    Fang, Y.4
  • 69
  • 73
    • 84861523456 scopus 로고    scopus 로고
    • Patient safety through RFID: Vulnerabilities in recently proposed grouping protocols
    • Wickboldt, A.K. and Piramuthu, S. (2012). Patient safety through RFID: Vulnerabilities in recently proposed grouping protocols. Journal of Medical Systems 36(2): 431-435.
    • (2012) Journal of Medical Systems , vol.36 , Issue.2 , pp. 431-435
    • Wickboldt, A.K.1    Piramuthu, S.2
  • 74
    • 34249855960 scopus 로고    scopus 로고
    • Consent mechanisms for electronic health record systems: A simple yet unresolved issue
    • Win K.T. and Fulcher J. (2007), Consent mechanisms for electronic health record systems: a simple yet unresolved issue. Journal of Medical Systems 31(2): 91-96.
    • (2007) Journal of Medical Systems , vol.31 , Issue.2 , pp. 91-96
    • Win, K.T.1    Fulcher, J.2
  • 75
    • 33645344483 scopus 로고    scopus 로고
    • A review of security of electronic health record systems
    • Win K.T. (2005). A review of security of electronic health record systems. Health Information Management Journal 34(1): 13-18.
    • (2005) Health Information Management Journal , vol.34 , Issue.1 , pp. 13-18
    • Win, K.T.1
  • 78
    • 77957968012 scopus 로고    scopus 로고
    • Security models and requirements for healthcare application clouds
    • Miami, Florida, (accessed 23 August 2013)
    • Zhang R. and Liu, L. (2010). Security models and requirements for healthcare application clouds. IEEE 3rd International Conference on Cloud Computing, Miami, Florida. Available at: IEEE Xplore,http://www.ieee.org (accessed 23 August 2013).
    • (2010) IEEE 3Rd International Conference on Cloud Computing
    • Zhang, R.1    Liu, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.