메뉴 건너뛰기




Volumn 41, Issue 8, 2017, Pages

Security Techniques for the Electronic Health Records

Author keywords

Cryptography; Electronic health record (EHR); Firewall; Protected health information (PHI); Security safeguards

Indexed keywords

CINAHL; ELECTRONIC HEALTH RECORD; HUMAN; LIBRARY; MEDICAL INFORMATION; MEDLINE; SCIENTIST; TEXAS; COMPUTER SECURITY; CONFIDENTIALITY; ORGANIZATION AND MANAGEMENT; PRIVACY;

EID: 85025471987     PISSN: 01485598     EISSN: 1573689X     Source Type: Journal    
DOI: 10.1007/s10916-017-0778-4     Document Type: Article
Times cited : (152)

References (30)
  • 1
    • 70449491834 scopus 로고    scopus 로고
    • Accessed: 2016–08-08. (Archived by WebCite® at)
    • Centers for Medicare & Medicaid Services. Electronic Health Records. URL:https://www.cms.gov/Medicare/E-health/EHealthRecords/index.html. Accessed: 2016–08-08. (Archived by WebCite® at http://www.webcitation.org/6jcX532RN).
    • Electronic Health Records.
  • 3
    • 0344058997 scopus 로고    scopus 로고
    • Health Information Privacy Enforcement Highlights. [Cited, Available from
    • U.S. Department of Health & Human Services. Health Information Privacy Enforcement Highlights. [Cited 2016 May 31]. Available from http://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/data/enforcement-highlights/index.html.
    • (2016) U.S Department of Health & Human Services
  • 4
    • 85025481143 scopus 로고    scopus 로고
    • The New 'E-Clinician' guide to compliance
    • Ives, T.E., The New 'E-Clinician' guide to compliance. Audiol. Today. 26(1):52–53, 2014.
    • (2014) Audiol. Today , vol.26 , Issue.1 , pp. 52-53
    • Ives, T.E.1
  • 6
    • 85003253276 scopus 로고    scopus 로고
    • What caused the breach? an examination of use of information technology and health data breaches
    • Wikina, S.B., What caused the breach? an examination of use of information technology and health data breaches. Perspect. Health Inf. Mana. 2014:1–16, 2014.
    • (2014) Perspect. Health Inf. Mana. , vol.2014 , pp. 1-16
    • Wikina, S.B.1
  • 7
    • 84927930970 scopus 로고    scopus 로고
    • Data breaches of protected health information in the United States
    • COI: 1:CAS:528:DC%2BC2MXnvVWqtLc%3D
    • Liu, V., Musen, M.A., and Chou, T., Data breaches of protected health information in the United States. J. Am. Med. Assoc. 313(14):1471–1473, 2015. doi:10.1001/jama.2015.2252.
    • (2015) J. Am. Med. Assoc. , vol.313 , Issue.14 , pp. 1471-1473
    • Liu, V.1    Musen, M.A.2    Chou, T.3
  • 8
    • 84938629896 scopus 로고    scopus 로고
    • Informatics: Ethical use of genomic information and electronic medical records
    • Amer, K. Informatics: Ethical use of genomic information and electronic medical records, J. Am. Nurses Assoc. 20(2), 2015.
    • (2015) J. Am. Nurses Assoc , vol.20 , Issue.2
    • Amer, K.1
  • 9
    • 84899432888 scopus 로고    scopus 로고
    • New tools to improve safety of electronic health records
    • PID: 24491471
    • Collier, R., New tools to improve safety of electronic health records. CMAJ. 186(4):251–251, 2014.
    • (2014) CMAJ , vol.186 , Issue.4 , pp. 251
    • Collier, R.1
  • 10
    • 84901044690 scopus 로고    scopus 로고
    • US health information breaches up 137%
    • Collier, R., US health information breaches up 137%. CMAJ. 186(6), 2014.
    • (2014) CMAJ , vol.186 , Issue.6
    • Collier, R.1
  • 11
    • 85025462343 scopus 로고    scopus 로고
    • Safeguarding patient information in electronic health records
    • Jannetti, M.C., Safeguarding patient information in electronic health records. AORN J. 100(3):C7–C8, 2014.
    • (2014) AORN J , vol.100 , Issue.3 , pp. C7-C8
    • Jannetti, M.C.1
  • 12
    • 84874611075 scopus 로고    scopus 로고
    • Electronic health Records in an Occupational Health Setting--Part I. A global overview
    • Hunter, E.S., Electronic health Records in an Occupational Health Setting--Part I. A global overview. Workplace health & safety. 61(2):57–60, 2013.
    • (2013) Workplace health & safety , vol.61 , Issue.2 , pp. 57-60
    • Hunter, E.S.1
  • 13
    • 85025427707 scopus 로고    scopus 로고
    • The need for privacy-centric role-based access to electronic health records
    • Pisto, L., The need for privacy-centric role-based access to electronic health records. J. Health Life Sci. Law. 7(1):79–112, 2013.
    • (2013) J. Health Life Sci. Law , vol.7 , Issue.1 , pp. 79-112
    • Pisto, L.1
  • 14
    • 84884188665 scopus 로고    scopus 로고
    • The HIPAA conundrum in the era of mobile health and communications
    • COI: 1:CAS:528:DC%2BC3sXhsFyiu7nF, PID: 23978879
    • Wang, C.J., and Huang, D.J., The HIPAA conundrum in the era of mobile health and communications. JAMA. 310(11):1121–1122, 2013.
    • (2013) JAMA , vol.310 , Issue.11 , pp. 1121-1122
    • Wang, C.J.1    Huang, D.J.2
  • 15
    • 85025446703 scopus 로고    scopus 로고
    • Storage and security of personal health information
    • Lemke, J., Storage and security of personal health information. OOHNA J. 32(1):25–26, 2013.
    • (2013) OOHNA J , vol.32 , Issue.1 , pp. 25-26
    • Lemke, J.1
  • 16
    • 84878128635 scopus 로고    scopus 로고
    • Technology risk assessment in healthcare facilities
    • PID: 23692102
    • Cooper, T., and Fuchs, K., Technology risk assessment in healthcare facilities. Biomed. Instrum. Technol. 47(3):202–207, 2013.
    • (2013) Biomed. Instrum. Technol. , vol.47 , Issue.3 , pp. 202-207
    • Cooper, T.1    Fuchs, K.2
  • 17
    • 84876403223 scopus 로고    scopus 로고
    • Electronic health Records in an Occupational Health Setting—Part II. A global overview
    • Bey, J.M., and Magalhaes, J.S., Electronic health Records in an Occupational Health Setting—Part II. A global overview. Perspect. Int. Occup. Health Nursing. 61(3):95–98, 2013.
    • (2013) Perspect. Int. Occup. Health Nursing , vol.61 , Issue.3 , pp. 95-98
    • Bey, J.M.1    Magalhaes, J.S.2
  • 18
    • 84867867616 scopus 로고    scopus 로고
    • An efficient and secure dynamic id-based authentication scheme for telecare medical information systems
    • PID: 22673892
    • Chen, H.M., Lo, J.W., and Yeh, C.K., An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.6 , pp. 3907-3915
    • Chen, H.M.1    Lo, J.W.2    Yeh, C.K.3
  • 19
    • 84867860941 scopus 로고    scopus 로고
    • Secure communication of medical information using mobile agents
    • PID: 22569875
    • Nikooghadam, M., and Zakerolhosseini, A., Secure communication of medical information using mobile agents. J. Med. Syst. 36(6):3839–3850, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.6 , pp. 3839-3850
    • Nikooghadam, M.1    Zakerolhosseini, A.2
  • 20
    • 84867308923 scopus 로고    scopus 로고
    • Advances and current state of the security and privacy in electronic health records: Survey from a social perspective
    • PID: 21947856
    • Tejero, A., and de la Torre, I., Advances and current state of the security and privacy in electronic health records: Survey from a social perspective. J. Med. Syst. 36(5):3019–3027, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.5 , pp. 3019-3027
    • Tejero, A.1    de la Torre, I.2
  • 21
    • 84927930970 scopus 로고    scopus 로고
    • Data breaches of protected health information in the United States
    • COI: 1:CAS:528:DC%2BC2MXnvVWqtLc%3D, PID: 25871675, 19
    • Liu, V., Musen, M.A., and Chou, T., Data breaches of protected health information in the United States. JAMA. 313(14):1471–1473, 2015 19.
    • (2015) JAMA , vol.313 , Issue.14 , pp. 1471-1473
    • Liu, V.1    Musen, M.A.2    Chou, T.3
  • 22
    • 84868583646 scopus 로고    scopus 로고
    • Electronic health records and National Patient-Safety Goals
    • COI: 1:CAS:528:DC%2BC38Xhs1ekt7rN, PID: 23134389
    • Sittig, D., and Singh, H., Electronic health records and National Patient-Safety Goals. N. Engl. J. Med. 367(19):1854–1860, 2012.
    • (2012) N. Engl. J. Med. , vol.367 , Issue.19 , pp. 1854-1860
    • Sittig, D.1    Singh, H.2
  • 23
    • 84861523456 scopus 로고    scopus 로고
    • Patient safety through RFID: Vulnerabilities in recently proposed grouping protocols
    • PID: 20703708, 20
    • Wickboldt, A.K., and Piramuthu, S., Patient safety through RFID: Vulnerabilities in recently proposed grouping protocols. J. Med. Syst. 36(2):431–435, 2012 20.
    • (2012) J. Med. Syst. , vol.36 , Issue.2 , pp. 431-435
    • Wickboldt, A.K.1    Piramuthu, S.2
  • 24
    • 84861311667 scopus 로고    scopus 로고
    • Safe and secure? Healthcare in the Cyberworld
    • Vockley, M., Safe and secure? Healthcare in the Cyberworld. J Biomed. Instrum. Technol. 46(3):164–173, 2012.
    • (2012) J Biomed. Instrum. Technol. , vol.46 , Issue.3 , pp. 164-173
    • Vockley, M.1
  • 25
    • 84859838544 scopus 로고    scopus 로고
    • Electronic health records: Eliciting behavioral health providers’ beliefs
    • PID: 21573771
    • Shank, N., Willborn, E., PytlikZillig, L., and Noel, H., Electronic health records: Eliciting behavioral health providers’ beliefs. Community Ment. Health J. 48(2):249–254, 2012.
    • (2012) Community Ment. Health J. , vol.48 , Issue.2 , pp. 249-254
    • Shank, N.1    Willborn, E.2    PytlikZillig, L.3    Noel, H.4
  • 26
    • 84867297440 scopus 로고    scopus 로고
    • RBAC-matrix-based EMR right management system to improve HIPAA compliance
    • PID: 21882003
    • Lee, H.C., and Chang, S.H., RBAC-matrix-based EMR right management system to improve HIPAA compliance. J. Med. Syst. 36(5):2981–2992, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.5 , pp. 2981-2992
    • Lee, H.C.1    Chang, S.H.2
  • 27
    • 84867843039 scopus 로고    scopus 로고
    • Security analysis of standards-driven communication protocols for healthcare scenarios
    • PID: 22447202
    • Masi, M., Pugliese, R., and Tiezzi, F., Security analysis of standards-driven communication protocols for healthcare scenarios. J. Med. Syst. 36(6):3695–3711, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.6 , pp. 3695-3711
    • Masi, M.1    Pugliese, R.2    Tiezzi, F.3
  • 28
    • 84867313640 scopus 로고    scopus 로고
    • A secure EHR system based on hybrid clouds
    • PID: 22351166
    • Chen, Y.Y., Lu, J.C., and Jan, J.K., A secure EHR system based on hybrid clouds. J. Med. Syst. 36(5):3375–3384, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.5 , pp. 3375-3384
    • Chen, Y.Y.1    Lu, J.C.2    Jan, J.K.3
  • 29
    • 83755219482 scopus 로고    scopus 로고
    • Critical incidents in the marriage of psychology and technology: A discussion of potential ethical issues in practice, education, and policy
    • van Allen, J., and Roberts, M.C., Critical incidents in the marriage of psychology and technology: A discussion of potential ethical issues in practice, education, and policy. Prof. Psychol. Res. Pract. 42(6):433, 2011. doi:10.1037/a0025278.
    • (2011) Prof. Psychol. Res. Pract , vol.42 , Issue.6 , pp. 433
    • van Allen, J.1    Roberts, M.C.2
  • 30
    • 84874599995 scopus 로고    scopus 로고
    • [Cited 2010 November]. Available from
    • U.S. Department of Health and Human Services. Cybersecurity: 10 best practices for the small healthcare environment. [Cited 2010 November]. Available from: https://www.healthit.gov/sites/default/files/basic-security-for-the-small-healthcare-practice-checklists.pdf.
    • (2010) Cybersecurity: 10 best practices for the small healthcare environment.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.