-
1
-
-
70449491834
-
-
Accessed: 2016–08-08. (Archived by WebCite® at)
-
Centers for Medicare & Medicaid Services. Electronic Health Records. URL:https://www.cms.gov/Medicare/E-health/EHealthRecords/index.html. Accessed: 2016–08-08. (Archived by WebCite® at http://www.webcitation.org/6jcX532RN).
-
Electronic Health Records.
-
-
-
3
-
-
0344058997
-
-
Health Information Privacy Enforcement Highlights. [Cited, Available from
-
U.S. Department of Health & Human Services. Health Information Privacy Enforcement Highlights. [Cited 2016 May 31]. Available from http://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/data/enforcement-highlights/index.html.
-
(2016)
U.S Department of Health & Human Services
-
-
-
4
-
-
85025481143
-
The New 'E-Clinician' guide to compliance
-
Ives, T.E., The New 'E-Clinician' guide to compliance. Audiol. Today. 26(1):52–53, 2014.
-
(2014)
Audiol. Today
, vol.26
, Issue.1
, pp. 52-53
-
-
Ives, T.E.1
-
5
-
-
33744548652
-
-
Jossey Bass, San Francisco, CA
-
Wager, K.A., Lee, F.W., and Glaser, J.P., Health care information systems: A practical approach for health care management, 3rd edn. Jossey Bass, San Francisco, CA, 2013.
-
(2013)
Health care information systems: A practical approach for health care management
-
-
Wager, K.A.1
Lee, F.W.2
Glaser, J.P.3
-
6
-
-
85003253276
-
What caused the breach? an examination of use of information technology and health data breaches
-
Wikina, S.B., What caused the breach? an examination of use of information technology and health data breaches. Perspect. Health Inf. Mana. 2014:1–16, 2014.
-
(2014)
Perspect. Health Inf. Mana.
, vol.2014
, pp. 1-16
-
-
Wikina, S.B.1
-
7
-
-
84927930970
-
Data breaches of protected health information in the United States
-
COI: 1:CAS:528:DC%2BC2MXnvVWqtLc%3D
-
Liu, V., Musen, M.A., and Chou, T., Data breaches of protected health information in the United States. J. Am. Med. Assoc. 313(14):1471–1473, 2015. doi:10.1001/jama.2015.2252.
-
(2015)
J. Am. Med. Assoc.
, vol.313
, Issue.14
, pp. 1471-1473
-
-
Liu, V.1
Musen, M.A.2
Chou, T.3
-
8
-
-
84938629896
-
Informatics: Ethical use of genomic information and electronic medical records
-
Amer, K. Informatics: Ethical use of genomic information and electronic medical records, J. Am. Nurses Assoc. 20(2), 2015.
-
(2015)
J. Am. Nurses Assoc
, vol.20
, Issue.2
-
-
Amer, K.1
-
9
-
-
84899432888
-
New tools to improve safety of electronic health records
-
PID: 24491471
-
Collier, R., New tools to improve safety of electronic health records. CMAJ. 186(4):251–251, 2014.
-
(2014)
CMAJ
, vol.186
, Issue.4
, pp. 251
-
-
Collier, R.1
-
10
-
-
84901044690
-
US health information breaches up 137%
-
Collier, R., US health information breaches up 137%. CMAJ. 186(6), 2014.
-
(2014)
CMAJ
, vol.186
, Issue.6
-
-
Collier, R.1
-
11
-
-
85025462343
-
Safeguarding patient information in electronic health records
-
Jannetti, M.C., Safeguarding patient information in electronic health records. AORN J. 100(3):C7–C8, 2014.
-
(2014)
AORN J
, vol.100
, Issue.3
, pp. C7-C8
-
-
Jannetti, M.C.1
-
12
-
-
84874611075
-
Electronic health Records in an Occupational Health Setting--Part I. A global overview
-
Hunter, E.S., Electronic health Records in an Occupational Health Setting--Part I. A global overview. Workplace health & safety. 61(2):57–60, 2013.
-
(2013)
Workplace health & safety
, vol.61
, Issue.2
, pp. 57-60
-
-
Hunter, E.S.1
-
13
-
-
85025427707
-
The need for privacy-centric role-based access to electronic health records
-
Pisto, L., The need for privacy-centric role-based access to electronic health records. J. Health Life Sci. Law. 7(1):79–112, 2013.
-
(2013)
J. Health Life Sci. Law
, vol.7
, Issue.1
, pp. 79-112
-
-
Pisto, L.1
-
14
-
-
84884188665
-
The HIPAA conundrum in the era of mobile health and communications
-
COI: 1:CAS:528:DC%2BC3sXhsFyiu7nF, PID: 23978879
-
Wang, C.J., and Huang, D.J., The HIPAA conundrum in the era of mobile health and communications. JAMA. 310(11):1121–1122, 2013.
-
(2013)
JAMA
, vol.310
, Issue.11
, pp. 1121-1122
-
-
Wang, C.J.1
Huang, D.J.2
-
15
-
-
85025446703
-
Storage and security of personal health information
-
Lemke, J., Storage and security of personal health information. OOHNA J. 32(1):25–26, 2013.
-
(2013)
OOHNA J
, vol.32
, Issue.1
, pp. 25-26
-
-
Lemke, J.1
-
16
-
-
84878128635
-
Technology risk assessment in healthcare facilities
-
PID: 23692102
-
Cooper, T., and Fuchs, K., Technology risk assessment in healthcare facilities. Biomed. Instrum. Technol. 47(3):202–207, 2013.
-
(2013)
Biomed. Instrum. Technol.
, vol.47
, Issue.3
, pp. 202-207
-
-
Cooper, T.1
Fuchs, K.2
-
17
-
-
84876403223
-
Electronic health Records in an Occupational Health Setting—Part II. A global overview
-
Bey, J.M., and Magalhaes, J.S., Electronic health Records in an Occupational Health Setting—Part II. A global overview. Perspect. Int. Occup. Health Nursing. 61(3):95–98, 2013.
-
(2013)
Perspect. Int. Occup. Health Nursing
, vol.61
, Issue.3
, pp. 95-98
-
-
Bey, J.M.1
Magalhaes, J.S.2
-
18
-
-
84867867616
-
An efficient and secure dynamic id-based authentication scheme for telecare medical information systems
-
PID: 22673892
-
Chen, H.M., Lo, J.W., and Yeh, C.K., An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3907-3915
-
-
Chen, H.M.1
Lo, J.W.2
Yeh, C.K.3
-
19
-
-
84867860941
-
Secure communication of medical information using mobile agents
-
PID: 22569875
-
Nikooghadam, M., and Zakerolhosseini, A., Secure communication of medical information using mobile agents. J. Med. Syst. 36(6):3839–3850, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3839-3850
-
-
Nikooghadam, M.1
Zakerolhosseini, A.2
-
20
-
-
84867308923
-
Advances and current state of the security and privacy in electronic health records: Survey from a social perspective
-
PID: 21947856
-
Tejero, A., and de la Torre, I., Advances and current state of the security and privacy in electronic health records: Survey from a social perspective. J. Med. Syst. 36(5):3019–3027, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.5
, pp. 3019-3027
-
-
Tejero, A.1
de la Torre, I.2
-
21
-
-
84927930970
-
Data breaches of protected health information in the United States
-
COI: 1:CAS:528:DC%2BC2MXnvVWqtLc%3D, PID: 25871675, 19
-
Liu, V., Musen, M.A., and Chou, T., Data breaches of protected health information in the United States. JAMA. 313(14):1471–1473, 2015 19.
-
(2015)
JAMA
, vol.313
, Issue.14
, pp. 1471-1473
-
-
Liu, V.1
Musen, M.A.2
Chou, T.3
-
22
-
-
84868583646
-
Electronic health records and National Patient-Safety Goals
-
COI: 1:CAS:528:DC%2BC38Xhs1ekt7rN, PID: 23134389
-
Sittig, D., and Singh, H., Electronic health records and National Patient-Safety Goals. N. Engl. J. Med. 367(19):1854–1860, 2012.
-
(2012)
N. Engl. J. Med.
, vol.367
, Issue.19
, pp. 1854-1860
-
-
Sittig, D.1
Singh, H.2
-
23
-
-
84861523456
-
Patient safety through RFID: Vulnerabilities in recently proposed grouping protocols
-
PID: 20703708, 20
-
Wickboldt, A.K., and Piramuthu, S., Patient safety through RFID: Vulnerabilities in recently proposed grouping protocols. J. Med. Syst. 36(2):431–435, 2012 20.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.2
, pp. 431-435
-
-
Wickboldt, A.K.1
Piramuthu, S.2
-
24
-
-
84861311667
-
Safe and secure? Healthcare in the Cyberworld
-
Vockley, M., Safe and secure? Healthcare in the Cyberworld. J Biomed. Instrum. Technol. 46(3):164–173, 2012.
-
(2012)
J Biomed. Instrum. Technol.
, vol.46
, Issue.3
, pp. 164-173
-
-
Vockley, M.1
-
25
-
-
84859838544
-
Electronic health records: Eliciting behavioral health providers’ beliefs
-
PID: 21573771
-
Shank, N., Willborn, E., PytlikZillig, L., and Noel, H., Electronic health records: Eliciting behavioral health providers’ beliefs. Community Ment. Health J. 48(2):249–254, 2012.
-
(2012)
Community Ment. Health J.
, vol.48
, Issue.2
, pp. 249-254
-
-
Shank, N.1
Willborn, E.2
PytlikZillig, L.3
Noel, H.4
-
26
-
-
84867297440
-
RBAC-matrix-based EMR right management system to improve HIPAA compliance
-
PID: 21882003
-
Lee, H.C., and Chang, S.H., RBAC-matrix-based EMR right management system to improve HIPAA compliance. J. Med. Syst. 36(5):2981–2992, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.5
, pp. 2981-2992
-
-
Lee, H.C.1
Chang, S.H.2
-
27
-
-
84867843039
-
Security analysis of standards-driven communication protocols for healthcare scenarios
-
PID: 22447202
-
Masi, M., Pugliese, R., and Tiezzi, F., Security analysis of standards-driven communication protocols for healthcare scenarios. J. Med. Syst. 36(6):3695–3711, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3695-3711
-
-
Masi, M.1
Pugliese, R.2
Tiezzi, F.3
-
28
-
-
84867313640
-
A secure EHR system based on hybrid clouds
-
PID: 22351166
-
Chen, Y.Y., Lu, J.C., and Jan, J.K., A secure EHR system based on hybrid clouds. J. Med. Syst. 36(5):3375–3384, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.5
, pp. 3375-3384
-
-
Chen, Y.Y.1
Lu, J.C.2
Jan, J.K.3
-
29
-
-
83755219482
-
Critical incidents in the marriage of psychology and technology: A discussion of potential ethical issues in practice, education, and policy
-
van Allen, J., and Roberts, M.C., Critical incidents in the marriage of psychology and technology: A discussion of potential ethical issues in practice, education, and policy. Prof. Psychol. Res. Pract. 42(6):433, 2011. doi:10.1037/a0025278.
-
(2011)
Prof. Psychol. Res. Pract
, vol.42
, Issue.6
, pp. 433
-
-
van Allen, J.1
Roberts, M.C.2
-
30
-
-
84874599995
-
-
[Cited 2010 November]. Available from
-
U.S. Department of Health and Human Services. Cybersecurity: 10 best practices for the small healthcare environment. [Cited 2010 November]. Available from: https://www.healthit.gov/sites/default/files/basic-security-for-the-small-healthcare-practice-checklists.pdf.
-
(2010)
Cybersecurity: 10 best practices for the small healthcare environment.
-
-
|