computer security

Summary

Summary: Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or data structures, especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or so-called computer hackers aiming to compromise stored data.

Top Publications

  1. ncbi Cloud computing: a new business paradigm for biomedical information sharing
    Arnon Rosenthal
    The MITRE Corporation, Bedford, MA, USA
    J Biomed Inform 43:342-53. 2010
  2. ncbi Privacy and security for electronic health records
    Virginia A Sharpe
    Veterans Health Administrations, National Center for Ethics, USA
    Hastings Cent Rep 35:49. 2005
  3. ncbi Bridging the electronic divide: patient and provider perspectives on e-mail communication in primary care
    Cheryl A Moyer
    Consortium for Health Outcomes, Innovation, and Cost Effectiveness Studies, University of Michigan School of Medicine, Ann Arbor 48109 0409, USA
    Am J Manag Care 8:427-33. 2002
  4. ncbi Pseudonyms for cancer registries
    K Pommerening
    Institut für Medizinische Statistik und Dokumentation, Johannes Gutenberg Universitat, Mainz, Germany
    Methods Inf Med 35:112-21. 1996
  5. pmc Security issues in healthcare applications using wireless medical sensor networks: a survey
    Pardeep Kumar
    Department of Ubiquitous IT, Graduate School of Design and IT, Dongseo University, San 69 1, Jurye 2 Dong, Sasang gu, Busan 617 716, Korea
    Sensors (Basel) 12:55-91. 2012
  6. pmc Initial experience with patient-clinician secure messaging at a VA medical center
    John M Byrne
    VA Loma Linda Healthcare System, 11201 Benton Street 14A, Loma Linda, CA, 92357, USA
    J Am Med Inform Assoc 16:267-70. 2009
  7. ncbi Secure Dynamic access control scheme of PHR in cloud computing
    Tzer Shyong Chen
    Department of Information Management, Tunghai University, Taichung, Taiwan
    J Med Syst 36:4005-20. 2012
  8. pmc Building public trust in uses of Health Insurance Portability and Accountability Act de-identified data
    Deven McGraw
    Center for Democracy and Technology, 1634 I Street, NW suite 1100, Washington, DC 20006
    J Am Med Inform Assoc 20:29-34. 2013
  9. pmc How strong are passwords used to protect personal health information in clinical trials?
    Khaled El Emam
    Children s Hospital of Eastern Ontario Research Institute, Ottawa, ON, Canada
    J Med Internet Res 13:e18. 2011
  10. pmc A proposed architecture and method of operation for improving the protection of privacy and confidentiality in disease registers
    Tim Churches
    Centre for Epidemiology and Research, New South Wales Department of Health, Locked Mail Bag 961, North Sydney NSW 2059, Australia
    BMC Med Res Methodol 3:1. 2003

Detail Information

Publications291 found, 100 shown here

  1. ncbi Cloud computing: a new business paradigm for biomedical information sharing
    Arnon Rosenthal
    The MITRE Corporation, Bedford, MA, USA
    J Biomed Inform 43:342-53. 2010
    ..We often find a rough parity (in principle), but one needs to examine individual acquisitions--is a loosely managed lab moving to a well managed cloud, or a tightly managed hospital data center moving to a poorly safeguarded cloud?..
  2. ncbi Privacy and security for electronic health records
    Virginia A Sharpe
    Veterans Health Administrations, National Center for Ethics, USA
    Hastings Cent Rep 35:49. 2005
  3. ncbi Bridging the electronic divide: patient and provider perspectives on e-mail communication in primary care
    Cheryl A Moyer
    Consortium for Health Outcomes, Innovation, and Cost Effectiveness Studies, University of Michigan School of Medicine, Ann Arbor 48109 0409, USA
    Am J Manag Care 8:427-33. 2002
    ..To determine e-mail utilization patterns and attitudes toward e-mail use among primary care physicians and their ambulatory outpatient clinic patients...
  4. ncbi Pseudonyms for cancer registries
    K Pommerening
    Institut für Medizinische Statistik und Dokumentation, Johannes Gutenberg Universitat, Mainz, Germany
    Methods Inf Med 35:112-21. 1996
    ..The methods described are not restricted to cancer registration and may serve as a model for comparable applications in medical informatics...
  5. pmc Security issues in healthcare applications using wireless medical sensor networks: a survey
    Pardeep Kumar
    Department of Ubiquitous IT, Graduate School of Design and IT, Dongseo University, San 69 1, Jurye 2 Dong, Sasang gu, Busan 617 716, Korea
    Sensors (Basel) 12:55-91. 2012
    ..Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs...
  6. pmc Initial experience with patient-clinician secure messaging at a VA medical center
    John M Byrne
    VA Loma Linda Healthcare System, 11201 Benton Street 14A, Loma Linda, CA, 92357, USA
    J Am Med Inform Assoc 16:267-70. 2009
    ..The authors learned that to promote clinician adoption they must demonstrate workload benefits from secure messaging and more fully analyze the clinical computing workload that clinicians experience...
  7. ncbi Secure Dynamic access control scheme of PHR in cloud computing
    Tzer Shyong Chen
    Department of Information Management, Tunghai University, Taichung, Taiwan
    J Med Syst 36:4005-20. 2012
    ....
  8. pmc Building public trust in uses of Health Insurance Portability and Accountability Act de-identified data
    Deven McGraw
    Center for Democracy and Technology, 1634 I Street, NW suite 1100, Washington, DC 20006
    J Am Med Inform Assoc 20:29-34. 2013
    ....
  9. pmc How strong are passwords used to protect personal health information in clinical trials?
    Khaled El Emam
    Children s Hospital of Eastern Ontario Research Institute, Ottawa, ON, Canada
    J Med Internet Res 13:e18. 2011
    ..Findings and statements about how securely personal health information is managed in clinical research are mixed...
  10. pmc A proposed architecture and method of operation for improving the protection of privacy and confidentiality in disease registers
    Tim Churches
    Centre for Epidemiology and Research, New South Wales Department of Health, Locked Mail Bag 961, North Sydney NSW 2059, Australia
    BMC Med Res Methodol 3:1. 2003
    ..However, growing concern over the privacy and confidentiality aspects of disease registers may hinder their future operation. Technical solutions to these legitimate concerns are needed...
  11. pmc A systematic review of re-identification attacks on health data
    Khaled El Emam
    Electronic Health Information Laboratory, CHEO Research Institute, Ottawa, Canada
    PLoS ONE 6:e28071. 2011
    ....
  12. pmc Evaluating re-identification risks with respect to the HIPAA privacy rule
    Kathleen Benitez
    Department of Biomedical Informatics, School of Medicine, Vanderbilt University, Nashville, Tennessee 37203, USA
    J Am Med Inform Assoc 17:169-77. 2010
    ....
  13. pmc Development and evaluation of an open source software tool for deidentification of pathology reports
    Bruce A Beckwith
    Department of Pathology, Beth Israel Deaconess Medical Center, 330 Brookline Ave, Boston, MA, USA
    BMC Med Inform Decis Mak 6:12. 2006
    ..1800 new pathology reports were then processed. Each report was reviewed manually before and after deidentification to catalog all identifiers and note those that were not removed...
  14. pmc Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'
    Muhammad Khurram Khan
    Center of Excellence in Information Assurance CoEIA, King Saud University, Saudi Arabia
    Sensors (Basel) 10:2450-9. 2010
    ..The proposed security improvements can be incorporated in the M.L. Das-scheme for achieving a more secure and robust two-factor user authentication in WSNs...
  15. pmc Encryption characteristics of two USB-based personal health record devices
    Adam Wright
    Department of Medical Informatics and Clinical Epidemiology, Oregon Health and Science University, 3181 Sam Jackson Park Rd, Portland, OR 97239, USA
    J Am Med Inform Assoc 14:397-9. 2007
    ..This article describes the weaknesses we discovered, outlines three critical flaws with the security model used by the devices, and recommends four guidelines for improving the security of similar devices...
  16. ncbi Privacy enhancing techniques - the key to secure communication and management of clinical and genomic data
    G J E De Moor
    Department of Medical Informatics and Statistics, University Hospital Gent, Belgium
    Methods Inf Med 42:148-53. 2003
    ....
  17. ncbi A secure EHR system based on hybrid clouds
    Yu Yi Chen
    Department of Management Information System, National Chung Hsing University, Taiwan, Republic of China
    J Med Syst 36:3375-84. 2012
    ..In this paper, we propose an EHR sharing and integration system in healthcare clouds and analyze the arising security and privacy issues in access and management of EHRs...
  18. ncbi Expansion embedding techniques for reversible watermarking
    Diljith M Thodi
    Department of Electrical and Computer Engineering, University of Arizona, Tucson, AZ 85721 0104, USA
    IEEE Trans Image Process 16:721-30. 2007
    ..There is also a significant improvement in the quality of the watermarked image, especially at moderate embedding capacities...
  19. ncbi Privacy-preserving backpropagation neural network learning
    Tingting Chen
    Computer Science and Engineering Department, The State University of New York at Buffalo, Buffalo, NY 14260, USA
    IEEE Trans Neural Netw 20:1554-64. 2009
    ..We provide complete correctness and security analysis of our algorithms. The effectiveness of our algorithms is verified by experiments on various real world data sets...
  20. ncbi An easy to use and affordable home-based personal eHealth system for chronic disease management based on free open source software
    Tatjana M Burkow
    Norwegian Centre for Telemedicine, UNN, Tromsø, Norway
    Stud Health Technol Inform 136:83-8. 2008
    ..We also briefly describe field trials of the system for patients with COPD and diabetes, and their experience with the technology...
  21. pmc Driving toward guiding principles: a goal for privacy, confidentiality, and security of health information
    S A Buckovich
    Mitretek Systems, Health Information Technology Institute, McLean, VA 22102, USA
    J Am Med Inform Assoc 6:122-33. 1999
    ..It is imperative that all participants in our health care system work actively toward a viable resolution of this information privacy debate...
  22. pmc Genomics and privacy: implications of the new reality of closed data for the field
    Dov Greenbaum
    Program in Computational Biology and Bioinformatics, Yale University, New Haven, Connecticut, USA
    PLoS Comput Biol 7:e1002278. 2011
    ..However, teaching personal genomics with identifiable subjects in the university setting will, in turn, create additional privacy issues and social conundrums...
  23. pmc Effects of personal identifier resynthesis on clinical text de-identification
    Reyyan Yeniterzi
    Faculty of Engineering and Natural Sciences, Sabanci University, Istanbul, Turkey
    J Am Med Inform Assoc 17:159-68. 2010
    ..The goal of this research is to evaluate the effectiveness and examine possible bias introduced by resynthesis on de-identification software...
  24. pmc Protecting privacy using k-anonymity
    Khaled El Emam
    Children s Hospital of Eastern Ontario Research Institute, Ottawa, Ontario K1J 8L1, Canada
    J Am Med Inform Assoc 15:627-37. 2008
    ..To alleviate such concerns, it is possible to anonymize the data before disclosure. One popular anonymization approach is k-anonymity. There have been no evaluations of the actual re-identification probability of k-anonymized data sets...
  25. pmc Patients' attitudes toward electronic health information exchange: qualitative study
    Steven R Simon
    Department of Population Medicine, Harvard Medical School and Harvard Pilgrim Health Care, Boston, MA 02215, USA
    J Med Internet Res 11:e30. 2009
    ..In many countries, there has been substantial progress in establishing the electronic transmission of patients' health information between health care providers, but little is known about how best to engage patients in the process...
  26. pmc Social but safe? Quality and safety of diabetes-related online social networks
    Elissa R Weitzman
    Children s Hospital Informatics Program at the Harvard MIT Division of Health Sciences and Technology, Children s Hospital Boston, Boston, Massachusetts, USA
    J Am Med Inform Assoc 18:292-7. 2011
    ..To foster informed decision-making about health social networking (SN) by patients and clinicians, the authors evaluated the quality/safety of SN sites' policies and practices...
  27. pmc Patient-physician web messaging. The impact on message volume and satisfaction
    Eric M Liederman
    Division of Clinical Information Systems and Department of Internal Medicine, University of California Davis Health System, Sacramento, CA 95817, USA
    J Gen Intern Med 20:52-7. 2005
    ..Patients want electronic access to providers. Providers fear being overwhelmed by unreimbursed messages...
  28. pmc Determinants of success of inpatient clinical information systems: a literature review
    M J van der Meijden
    Department of Medical Informatics, Maastricht University, The Netherlands
    J Am Med Inform Assoc 10:235-43. 2003
    ..Our review points out the need for more thorough evaluations of patient care information systems that look at a wide range of factors that can affect the relative success or failure of these systems...
  29. ncbi USB-based Personal Health Records: an analysis of features and functionality
    Francine L Maloney
    Partners HealthCare, Clinical Informatics Research and Development, Wellesley, MA 02481, USA
    Int J Med Inform 79:97-111. 2010
    ..To determine the features of commercially available USB-based Personal Health Records (PHR) devices, and compare the commercial state of the art to recommendations made by certification committees...
  30. ncbi Advances and current state of the security and privacy in electronic health records: survey from a social perspective
    Antonio Tejero
    Department of Signal Theory and Communications, University of Valladolid, Valladolid, Spain
    J Med Syst 36:3019-27. 2012
    ..Many EHR platforms are being developed, but most of them present weaknesses when they are opened to the public. These architectures gain significance when they cover all the requisites related to security and privacy...
  31. pmc Pseudonymization of radiology data for research purposes
    Rita Noumeir
    Ecole de technologie superieure, 1100 Notre Dame West, Montreal, QC, Canada H3C 1K3
    J Digit Imaging 20:284-95. 2007
    ..Our work can be used to enable electronic health record (EHR) secondary usage such as public surveillance and research, while maintaining patient confidentiality...
  32. pmc Giving patients access to their medical records via the internet: the PCASSO experience
    Daniel Masys
    Biomedical Informatics, School of Medicine, University of California, San Diego, La Jolla, California 92093 0602, USA
    J Am Med Inform Assoc 9:181-91. 2002
    ..The Patient-Centered Access to Secure Systems Online (PCASSO) project is designed to apply state-of-the-art-security to the communication of clinical information over the Internet...
  33. ncbi Patient-provider secure messaging in VA: variations in adoption and association with urgent care utilization
    Stephanie L Shimada
    Center for Health Quality, Outcomes, and Economic Research, Edith Nourse Rogers Memorial Veterans Hospital, Bedford, MA 01730, USA
    Med Care 51:S21-8. 2013
    ..This disruptive technology has the potential to support continuous, coordinated quality care, but limited evidence supports this connection...
  34. ncbi Secure communication and management of clinical and genomic data: the use of pseudonymisation as privacy enhancing technique
    Brecht Claerhout
    Department of Medical Informatics and Statistics, University Hospital Gent, Belgium
    Stud Health Technol Inform 95:170-5. 2003
    ..g. research. Practical approaches based on two pseudonymisation models, for both batch and interactive data collection and exchange, are presented...
  35. ncbi A methodology for the pseudonymization of medical data
    Thomas Neubauer
    Institute of Software Technology and Interactive Systems, Vienna University of Technology, Favoritenstrasse 9 11, 1040 Vienna, Austria
    Int J Med Inform 80:190-204. 2011
    ..e., who the patient discloses her health information to. Therefore, the methodology prevents data disclosure that negatively influences the patient's life (e.g., by being denied health insurance or employment)...
  36. ncbi Enabling secure, distributed collaborations for adrenal tumor research
    Anthony Stell
    National e Science Centre, University of Glasgow, UK
    Stud Health Technol Inform 159:259-63. 2010
    ..We describe the architecture, implementation and use to date of this facility to support the ENSAT adrenal cancer research network...
  37. ncbi Securing electronic health records without impeding the flow of information
    Rakesh Agrawal
    Microsoft Search Labs, 1065 La Avenida, Mountain View, CA 94043, United States
    Int J Med Inform 76:471-9. 2007
    ....
  38. ncbi Will electronic personal health records benefit providers and patients in rural America?
    John S Hargreaves
    Memorial Medical Center, Johnstown, Pennsylvania 15905, USA
    Telemed J E Health 16:167-76. 2010
    ..The objective of this study was to educate stakeholders (e.g., providers, patients, insurers, government) in the healthcare industry about electronic personal health records (PHRs) and their potential application in rural America...
  39. ncbi Multi-centric universal pseudonymisation for secondary use of the EHR
    Luigi Lo Iacono
    C and C Research Laboratories, NEC Europe Ltd, Germany
    Stud Health Technol Inform 126:239-47. 2007
    ....
  40. ncbi Privacy Protection through pseudonymisation in eHealth
    F De Meyer
    Dept of Medical Informatics and Statistics, University Hospital Ghent, Belgium
    Stud Health Technol Inform 141:111-8. 2008
    ..The technical specification starts out with a conceptual model and evolves from a theoretical model to a real life model by adding assumptions on the observability of personal data...
  41. ncbi Emergency healthcare process automation using mobile computing and cloud services
    M Poulymenopoulou
    Department of Digital Systems, University of Piraeus, Piraeus, Greece
    J Med Syst 36:3233-41. 2012
    ....
  42. pmc A novel, privacy-preserving cryptographic approach for sharing sequencing data
    Christopher A Cassa
    Division of Genetics, Brigham and Women s Hospital, Boston, MA 02215, USA
    J Am Med Inform Assoc 20:69-76. 2013
    ..We present a cryptographic scheme to securely transmit externally generated sequence data which does not require any patient identifiers, public key infrastructure, or the transmission of passwords...
  43. pmc Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images
    Osamah M Al-Qershi
    School of Electrical and Electronic Engineering, Engineering Campus, Universiti Sains Malaysia, 14300 Nibong Tebal, Seberang Perai Selatan, Pulau Pinang, Malaysia
    J Digit Imaging 24:114-25. 2011
    ..The scheme also shows some robustness against certain levels of salt and pepper and cropping noise...
  44. ncbi Implementing electronic medical record systems in developing countries
    Hamish S F Fraser
    Division of Social Medicine and Healthcare Inequalities, Brigham and Women s Hospital and Harvard Medical School, Boston, MA, USA
    Inform Prim Care 13:83-95. 2005
    ..Finally, we discuss the importance of collaboration between projects in the development of electronic medical record systems rather than reinventing systems in isolation, and the use of open standards and open source software...
  45. pmc Some methods for blindfolded record linkage
    Tim Churches
    Centre for Epidemiology and Research, Population Health Division, New South Wales Department of Health, Locked Mail Bag 961, North Sydney NSW 2059, Australia
    BMC Med Inform Decis Mak 4:9. 2004
    ..A limitation of their method is that only exact comparisons of values are possible, although phonetic encoding of names and other strings can be used to allow for some types of typographical variation and data errors...
  46. pmc Medical record: systematic centralization versus secure on demand aggregation
    Catherine Quantin
    INSERM, U866, Dijon, F 21000, Univ de Bourgogne, Dijon, F 21000, France
    BMC Med Inform Decis Mak 11:18. 2011
    ....
  47. pmc Lessons from the central Hampshire electronic health record pilot project: evaluation of the electronic health record for supporting patient care and secondary analysis
    Hugh Sanderson
    Winchester and Eastleigh Healthcare Trust, Winchester, Southampton SO22 5DG
    BMJ 328:875-8. 2004
  48. ncbi Improving patients privacy with Pseudonymization
    Thomas Neubauer
    Secure Business Austria, Vienna, Austria
    Stud Health Technol Inform 136:691-6. 2008
    ..This paper presents the new system PIPE (Pseudonymization of Information for Privacy in e-Health), that differs from existing approaches in its ability to securely integrate primary and secondary usage of health data...
  49. ncbi Aspects of privacy for electronic health records
    Sebastian Haas
    University of Freiburg, Freiburg, Germany
    Int J Med Inform 80:e26-31. 2011
    ..Secondly, an organization providing EHRs should neither be able to gain access to these health data nor establish a profile about patients...
  50. ncbi A secure authentication scheme for telecare medicine information systems
    Zhen Yu Wu
    Department of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan
    J Med Syst 36:1529-35. 2012
    ..Finally, it is shown to be more secure and practical for telecare medicine environments...
  51. ncbi A more secure authentication scheme for telecare medicine information systems
    He Debiao
    School of Mathematics and Statistics, Wuhan University, Wuhan, Hubei, China
    J Med Syst 36:1989-95. 2012
    ..Our scheme is not only more secure than Wu et al.'s scheme, but also has better performance. Then our scheme is more efficient and appropriate to collocating with low power mobile devices for the telecare medicine information system...
  52. ncbi Inter-organizational future proof EHR systems. A review of the security and privacy related issues
    Helma van der Linden
    School for Public Health and Primary Care CAPHRI, University Maastricht, Maastricht, The Netherlands
    Int J Med Inform 78:141-60. 2009
    ..Identification and analysis of privacy and security related issues that occur when health information is exchanged between health care organizations...
  53. pmc Are personal health records safe? A review of free web-accessible personal health record privacy policies
    Inmaculada Carrión Señor
    Department of Informatics and Systems, Faculty of Computer Science, University of Murcia, Murcia, Spain
    J Med Internet Res 14:e114. 2012
    ..Several obstacles prevent the adoption and use of personal health record (PHR) systems, including users' concerns regarding the privacy and security of their personal health information...
  54. ncbi Field test of classical symmetric encryption with continuous variables quantum key distribution
    Paul Jouguet
    SeQureNet, 23 Avenue d Italie, 75013 Paris, France
    Opt Express 20:14030-41. 2012
    ..This strengthens the potential of CVQKD for information technology security infrastructure deployments...
  55. ncbi Strong authentication scheme for telecare medicine information systems
    Qiong Pu
    CIMS Research Center, Tongji University, Shanghai, China
    J Med Syst 36:2609-19. 2012
    ..And yet, our scheme is still reasonably efficient and can yield such a concrete scheme that is even more efficient than previous schemes. Therefore the end result is more practical for the telecare medicine system...
  56. ncbi Keeping online personal records private: security and privacy considerations for Web-based PHR systems
    Anil Srinivasan
    HDC 4Point Dynamics, Omaha, NE, USA
    J AHIMA 77:62-3, 68. 2006
  57. ncbi Biodefence and the production of knowledge: rethinking the problem
    Allen Buchanan
    Duke University, Durham, NC, USA
    J Med Ethics 39:195-204. 2013
    ....
  58. ncbi An efficient authentication scheme for telecare medicine information systems
    Zhian Zhu
    China Ship Development and Design Center, Wuhan, China
    J Med Syst 36:3833-8. 2012
    ..To improve the security, we propose a new authentication scheme for TMIS. The analysis shows our scheme could overcome the weaknesses in Wei et al.'s scheme and has better performance than their scheme...
  59. ncbi An improved authentication scheme for telecare medicine information systems
    Jianghong Wei
    Zheng zhou Information Science and Technology Institute, Henan 450002, China
    J Med Syst 36:3597-604. 2012
    ..We also propose an improved authentication scheme for the telecare medicine information system, and demonstrate that the improved one satisfies the security requirements of two-factor authentication and is also efficient...
  60. ncbi Personal computer security: part 1. Firewalls, antivirus software, and Internet security suites
    Ronald D Caruso
    Neuroradiology Section, Department of Radiology, University of Louisville School of Medicine, CCB C07, 530 S Jackson St, Louisville, KY 40202, USA
    Radiographics 23:1329-37. 2003
    ..Regular updating of the security features of installed programs is important. Obtaining a moderate degree of PC safety and security is somewhat inconvenient but is necessary and well worth the effort...
  61. ncbi Compact storage of medical images with patient information
    R Acharya
    Electrical and Computer Engineering Department, Ngee Ann Polytechnic, Singapore 599489
    IEEE Trans Inf Technol Biomed 5:320-3. 2001
    ..Differential pulse-code-modulation and adaptive-delta-modulation techniques are employed for data compression, and encryption and results are tabulated for a specific example...
  62. pmc The inadvertent disclosure of personal health information through peer-to-peer file sharing programs
    Khaled El Emam
    Department of Pediatrics, Faculty of Medicine, University of Ottawa, Ottawa, Ontario, Canada
    J Am Med Inform Assoc 17:148-58. 2010
    ..We wanted to estimate the extent to which personal health information (PHI) is being disclosed in this way, and compare that to the extent of disclosure of personal financial information (PFI)...
  63. pmc A study of IEEE 802.15.4 security framework for wireless body area networks
    Shahnaz Saleem
    Graduate School of Information and Communication Engineering, Inha University, 253 Yonghyun Dong, Nam Gu, Incheon 402 751, Korea
    Sensors (Basel) 11:1383-95. 2011
    ..This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN...
  64. ncbi HIPAA compliant auditing system for medical images
    Zheng Zhou
    Image Processing and Informatics IPI Laboratory, Radiology Department, University of Southern California, Marina del Rey, CA 90292, USA
    Comput Med Imaging Graph 29:235-41. 2005
    ....
  65. pmc Distributed data processing for public health surveillance
    Ross Lazarus
    Channing Laboratory, Department of Medicine, Brigham and Women s Hospital and Harvard Medical School, Boston, MA, USA
    BMC Public Health 6:235. 2006
    ....
  66. ncbi Privacy fear factor arises. The public sees benefits to be had from healthcare IT but concerns about misuse of data emerge in survey
    Andis Robeznieks
    Mod Healthc 35:6-7, 16, 1. 2005
    ..Specific concerns include computer breaches and employers having access to the records...
  67. ncbi Patient opinion--EHR assessment from the users perspective
    Laura Zurita
    Department of Development and Planning, Virtual Centre of Health Informatics, Aalborg University, Denmark
    Stud Health Technol Inform 107:1333-6. 2004
    ..These results underline the general societal tendencies of citizen accepting the use of new technology, but being very keen to protect their privacy...
  68. pmc An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future
    Bradley A Malin
    Carnegie Mellon University, School of Computer Science, Institute for Software Research International, Wean Hall Room 1320 B, Pittsburgh, PA 15213 3890, USA
    J Am Med Inform Assoc 12:28-34. 2005
    ..The analyses and discussion within provide guideposts for the development of next-generation protection methods amenable to formal proofs...
  69. ncbi Modelling privilege management and access control
    Bernd Blobel
    Fraunhofer Institute for Integrated Circuits IIS, Health Telematics Project Group, Am Wolfsmantel 33, D 91058 Erlangen, Germany
    Int J Med Inform 75:597-623. 2006
    ..Such architecture has to meet the paradigms of distribution, component orientation, formal modelling, separation of logical and technological aspects, etc...
  70. pmc Indivo: a personally controlled health record for health information exchange and communication
    Kenneth D Mandl
    Children s Hospital Informatics Program at the Harvard MIT Division of Health Sciences and Technology, Boston, MA, USA
    BMC Med Inform Decis Mak 7:25. 2007
    ..Indivo (formerly PING) is an open source, open standards PCHR with an open application programming interface (API)...
  71. ncbi Confidentiality preserving audits of electronic medical record access
    Bradley Malin
    Department of Biomedical Informatics, School of Medicine, Vanderbilt University, Nashville, TN 37232, United States
    Stud Health Technol Inform 129:320-4. 2007
    ..We motivate the protocol in a real world medical center and then generalize the protocol for implementation in existing healthcare environments...
  72. pmc Whose personal control? Creating private, personally controlled health records for pediatric and adolescent patients
    Fabienne C Bourgeois
    Division of General Pediatrics, Children s Hospital Boston, Boston, MA 02115, USA
    J Am Med Inform Assoc 15:737-43. 2008
    ..Informed by our own operational involvement in the implementation of the Indivo PCHR, we provide a framework for understanding and addressing the challenges posed by child, adolescent, and family access to PCHRs...
  73. ncbi The next step in health data exchanges: trust and privacy in exchange networks
    Steve D Gravely
    Troutman Sanders LLP, Richmond, VA, USA
    J Healthc Inf Manag 23:33-7. 2009
    ..The evolving model for data exchange agreements is a multi-party trust agreement. This article will examine the crucial components of a multi-party trust agreement...
  74. ncbi Data security and protection in cross-institutional electronic patient records
    M van der Haak
    Department of Medical Informatics, Institute for Medical Biometry and Informatics, University of Heidelberg, Im Neuenheimer Feld 400, D 69120 Heidelberg, Germany
    Int J Med Inform 70:117-30. 2003
    ..However, its introduction is thought to be valuable, since a cross-institutional EPR will improve communication within shared care processes, and thus improve the quality of patient care...
  75. ncbi A contextual role-based access control authorization model for electronic patient record
    Gustavo H M B Motta
    Department of Informatics, Federal University of Paraiba, João Pessoa PB 58059 900, Brazil
    IEEE Trans Inf Technol Biomed 7:202-7. 2003
    ..This enables the specification of a more flexible and precise authorization policy, where permission is granted or denied according to the right and the need of the user to carry out a particular job function...
  76. ncbi Security in health-care information systems--current trends
    E Smith
    Rand Afrikaans University, Department of Computer Science, Auckland Park, South Africa
    Int J Med Inform 54:39-54. 1999
    ..The final section of the paper will be devoted to a number of proposals for further research possibilities in the domain of health-care information systems security...
  77. ncbi Access control: how can it improve patients' healthcare?
    Ana Ferreira
    Computer Laboratory, University of Kent
    Stud Health Technol Inform 127:65-76. 2007
    ..Then EMR could be more successfully integrated into the healthcare practice and provide for better patient treatment...
  78. ncbi Multiple image watermarking applied to health information management
    Aggeliki Giakoumaki
    Biomedical Engineering Laboratory, School of Electrical and Computer Engineering, National Technical University of Athens, Athens, Greece
    IEEE Trans Inf Technol Biomed 10:722-32. 2006
    ..Experimental results indicate the efficiency and transparency of the scheme, which conforms to the strict requirements that apply to regions of diagnostic significance...
  79. pmc Multidimensional analysis: a management tool for monitoring HIPAA compliance and departmental performance
    Robert M Coleman
    Maine Medical Center, Portland, ME 04102, USA
    J Digit Imaging 17:196-204. 2004
    ....
  80. pmc Prospective study of clinician-entered research data in the Emergency Department using an Internet-based system after the HIPAA Privacy Rule
    Jeffrey A Kline
    Department of Emergency Medicine, Carolinas Medical Center, Charlotte, NC, USA
    BMC Med Inform Decis Mak 4:17. 2004
    ..Design and test the reliability of a web-based system for multicenter, real-time collection of data in the emergency department (ED), under waiver of authorization, in compliance with HIPAA...
  81. pmc The PING personally controlled electronic medical record system: technical architecture
    William W Simons
    Children s Hospital Informatics Program, Enders 1, 300 Longwood Avenue, Boston, MA 02115, USA
    J Am Med Inform Assoc 12:47-54. 2005
    ....
  82. ncbi Patient participation in EHR benefits
    Thomas M Jones
    Oracle Corp, Redwood Shores, Calif, USA
    Health Manag Technol 24:64, 63. 2003
    ....
  83. pmc caGrid 1.0: an enterprise Grid infrastructure for biomedical research
    Scott Oster
    Biomedical Informatics Department, Ohio State University, Columbus, OH 43210, USA
    J Am Med Inform Assoc 15:138-49. 2008
    ....
  84. pmc Wireless technology infrastructures for authentication of patients: PKI that rings
    Ulrich Sax
    Children s Hospital Informatics Program, 1 Autumn Street AU543, Boston, MA 02115, USA
    J Am Med Inform Assoc 12:263-8. 2005
    ..The authors propose harnessing this technology for the strong authentication of individuals by creating a registration authority and an authentication service, and examine the problems and promise of such a system...
  85. ncbi The Swedish National Pharmacy Register
    Bengt Astrand
    Apoteket AB and School of Pure and Applied Natural Sciences, University of Kalmar, Kalmar, Sweden
    Stud Health Technol Inform 129:345-9. 2007
    ..To clinically evaluate individual medication history, the relatively high prevalence of dispensed drugs in the population, seems to justify the National Pharmacy Register...
  86. ncbi Square pegs in round holes: information systems, hospitals and the significance of contextual awareness
    Aksel Hagen Tjora
    Department of Sociology and Political Science, Norwegian University of Science and Technology, 7491 Trondheim, Norway
    Soc Sci Med 68:519-25. 2009
    ....
  87. ncbi Using software agents to preserve individual health data confidentiality in micro-scale geographical analyses
    Maged N Kamel Boulos
    School for Health, University of Bath, Claverton Down, Bath BA2 7AY, UK
    J Biomed Inform 39:160-70. 2006
    ....
  88. ncbi Fast parallel molecular algorithms for DNA-based computation: factoring integers
    Weng Long Chang
    Department of Information Management, Southern Taiwan University of Technology, Tainan, Taiwan
    IEEE Trans Nanobioscience 4:149-63. 2005
    ..Furthermore, this work indicates that the cryptosystems using public-key are perhaps insecure and also presents clear evidence of the ability of molecular computing to perform complicated mathematical operations...
  89. pmc Consumers are ready to accept the transition to online and electronic records if they can be assured of the security measures
    Prajesh Chhanabhai
    Department of Information Science, University of Otago, Dunedin, New Zealand
    MedGenMed 9:8. 2007
    ..With the international push toward electronic health records (EHRs), this article presents the importance of secure EHR systems from the public's perspective...
  90. ncbi Enhancing clinical trials on the internet: lessons from INVEST
    R Marks
    Department of Statistics, College of Medicine, University of Florida, Gainesville 32610, USA
    Clin Cardiol 24:V17-23. 2001
    ..This paper summarizes the advantages achieved for INVEST investigators, sponsor representatives, monitors, and subjects resulting from the centralization and coordination of multiple tasks through Web-based technology...
  91. pmc Confidentiality of personal health information used for research
    Dipak Kalra
    Centre for Health Informatics and Multi professional Education, University College London, London N19 5LW
    BMJ 333:196-8. 2006
  92. ncbi The personal internetworked notary and guardian
    A Riva
    Children's Hospital Informatics Program, Division of Endocrinology, Children's Hospital, 300 Longwood Avenue, Boston, MA 02115, USA
    Int J Med Inform 62:27-40. 2001
    ..In addition to the basic architecture, we describe tools to populate the patient's record with data from hospital databases and the first testbed applications we are deploying...
  93. ncbi Ethical issues in public health informatics: implications for system design when sharing geographic information
    Christina Olvingson
    Department of Computer and Information Science, Linkoping University, SE 581 83, Linkoping, Sweden
    J Biomed Inform 35:178-85. 2002
    ..Finally, a theoretical model of design issues based on the case study results is presented...
  94. ncbi Getting results for hematology patients through access to the electronic health record
    David Wiljer
    Knowledge Management and Innovation, Princess Margaret Hospital, University Health Network, Department of Radiation Oncology, University of Toronto
    Can Oncol Nurs J 16:154-64. 2006
    ..To conduct a needs assessment to identify patient and provider perceptions about providing patients with access to their electronic health record in order to develop an online system that is appropriate for all stakeholders...
  95. pmc Patient privacy and confidentiality
    Jim Chalmers
    BMJ 326:725-6. 2003
  96. pmc A context-sensitive approach to anonymizing spatial surveillance data: impact on outbreak detection
    Christopher A Cassa
    Children s Hospital Boston, Informatics Program Mandl Group, 1 Autumn Street, 721, Boston, MA 02215 5362 USA
    J Am Med Inform Assoc 13:160-5. 2006
    ..Further, we measure the impact of the skew on detection of spatial clustering as measured by a spatial scanning statistic...
  97. pmc Lessons from the central Hampshire electronic health record pilot project: issues of data protection and consent
    Trina Adams
    Hampshire and Isle of Wight Strategic Health Authority, Southampton SO16 4GX
    BMJ 328:871-4. 2004
  98. ncbi Guidelines for computer security in general practice
    Peter Schattner
    Department of General Practice, School of Primary Health Care, Monash University, Victoria, Australia
    Inform Prim Care 15:73-82. 2007
    ..As general practice becomes increasingly computerised, data security becomes increasingly important for both patient health and the efficient operation of the practice...
  99. ncbi Legal issues concerning electronic health information: privacy, quality, and liability
    J G Hodge
    Georgetown University Law Center, Washington, DC 20013 6305, USA
    JAMA 282:1466-71. 1999
    ....
  100. pmc e-Consent: The design and implementation of consumer consent mechanisms in an electronic environment
    Enrico Coiera
    The Centre for Health Informatics, The University of New South Wales, NSW, 2055, Australia
    J Am Med Inform Assoc 11:129-40. 2004
    ....
  101. pmc Ethics in public health research: privacy and public health at risk: public health confidentiality in the digital age
    Julie Myers
    New York City Department of Health and Mental Hygiene, 125 Worth St, Rm 331, New York, NY 10013, USA
    Am J Public Health 98:793-801. 2008
    ..Tightened physical and electronic controls can prevent misuse of data, minimize the risk of security breaches, and help maintain the reputation and integrity of public health agencies...

Research Grants54

  1. Genome Integrative Pathway Modeling of Diabetic Atherosclerosis
    Jae K Lee; Fiscal Year: 2010
    ..Our GIPaM technology will also greatly enhance pathway discovery/modeling capability in other fields of the biomedical science. ..
  2. The ODIE Toolkit - Software for Information Extraction and Biomedical Ontology De
    Rebecca S Crowley; Fiscal Year: 2010
    ..Additionally, the project would contribute to the software for developing other applications by helping researchers build more comprehensive ontologies. The results of this work may benefit both medical research and patient care. ..
  3. Disease Surveillance in Real Time: Geotemporal Methods
    Kenneth Mandl; Fiscal Year: 2009
    ..Once these methods are established, they can be applied to any other meaningful set of syndromes. ..
  4. Technological Home Care: Improving Caregiving
    Carol Smith; Fiscal Year: 2009
    ..The potential significance and the long term goals are to strengthen home caregiving skills, improve health status, quality of life and self-management of chronic illness symptoms and invasive home care treatment. ..
  5. A NETWORK OF RESEARCH UNITS TO STUDY CLINICAL WOUND CARE
    James Quinn; Fiscal Year: 2004
    ..In this study amoxicillin/clavulanic acid will be compared to placebo. The primary outcome of the study will be infection. Other outcomes studied will be wound-healing patient satisfaction and cost. ..
  6. Quantitative Methods for Genome-wide Analysis of Macrophage Activation by ESCs
    Jianqing Fan; Fiscal Year: 2013
    ..These topics have also importantimplications on compress sensing and computer security. In addition, several robust and effective methodsare proposed for ultrahigh-dimensional sparse regression, ..
  7. Automated Detection of Anomalous Accesses to Electronic Health Records
    Bradley A Malin; Fiscal Year: 2012
    ..have focused on the external threat, which has led to the development of sophisticated information and computer security mechanisms...
  8. Secure Web-Based Flow Cytometry in Clinical Use and Translational Research
    Nikesh Kotecha; Fiscal Year: 2012
    ..This will enable important new tools developed in the research laboratory to be translated into clinical settings and enhance patient treatment with cutting edge flow cytometry assays. ..
  9. Surveillance and health promotion informatics at work
    Kenneth Mandl; Fiscal Year: 2006
    ..The formative evaluation will occur in two test beds, a major US corporation and a Canadian Province. [unreadable] [unreadable]..
  10. Surveillance and health promotion informatics at work
    Kenneth Mandl; Fiscal Year: 2005
    ..Secondary outcomes will be impact on rates of self-reported illness, and on knowledge, attitudes and beliefs about influenza. The formative evaluation will occur in two test beds, a major US corporation and a Canadian Province. ..
  11. Internet-based Fidelity Enhancement of MTFC
    Edward Feil; Fiscal Year: 2005
    ....
  12. Predicting Wound Healing Complications in the Emergency Department
    James Quinn; Fiscal Year: 2008
    ..Knowing which patients are at risk for complications will help guide treatment and management decisions. [unreadable] [unreadable] [unreadable]..
  13. BIOINFORMATICS CENTER FOR INNATE IMMUNITY PGA
    Ross Lazarus; Fiscal Year: 2004
    ..abstract_text> ..
  14. Nitric Oxide Synthase Polymorphisms and Risk for Skin Cancer
    Abrar Qureshi; Fiscal Year: 2008
    ..unreadable] [unreadable] [unreadable]..
  15. Cancer CareLink for Patient Self Reports
    Charles Safran; Fiscal Year: 2004
    ..We anticipate that Cancer CareLink will serve as a model for enhancing care processes and patient outcomes. ..
  16. Ethics and Practice in Stored Tissue Genetic Research
    Leslie Wolf; Fiscal Year: 2006
    ..abstract_text> ..
  17. A Genetic Association Research Statistical Framework
    Ross Lazarus; Fiscal Year: 2008
    ..Developed in the context of airways disease, the software will be immediately and directly applicable to genetic research in other common, complex disorders. ..
  18. Cancer Pain Management-Decision Support Computer Program
    Eun Ok Im; Fiscal Year: 2007
    ..abstract_text> ..
  19. Improving control with Activity and Nutrition
    Anne Wolf; Fiscal Year: 2007
    ..Results will be immediately applicable to a majority of health plans and practices in the U.S. ..
  20. Change Detection in Serial MRIs of Patients with Brain Gliomas
    Bradley Erickson; Fiscal Year: 2008
    ..It is our hope that in the future, a measurement method superior to or as an adjunct to human observation will become available, though this study will not attempt to go that far. [unreadable] [unreadable] [unreadable]..
  21. A System to Share and Explore Human Brain Mapping Data
    Ken Smith; Fiscal Year: 2005
    ....
  22. Improving Depression Treatment Adherence & Outcomes
    Heather Flynn; Fiscal Year: 2005
    ..This research has potential to meaningfully improve medication adherence, enhance outcomes and quality of life, and minimize the terrible morbidity burden experienced among women with depression. ..
  23. MOLECULAR MECHANISMS OF CHEMOTHERAPY-INDUCED HAIR LOSS
    Vladimir Botchkarev; Fiscal Year: 2005
    ..Patients with many forms of p53-negative cancers treated by chemotherapy may ultimately benefit from this study. ..
  24. Kidney Transplant CareLink
    Charles Safran; Fiscal Year: 2002
    ..Kidney Transplant CareLink addresses a significant unmet need in the marketplace. ..
  25. Computer-Assisted Observation of Parents and Children
    Edward Feil; Fiscal Year: 2002
    ....
  26. Response Selection as a Function of Age
    Robert Proctor; Fiscal Year: 2002
    ..These guidelines will lead to development of products and environments that allow elderly adults to remain more independent and to engage safely in more activities in their daily lives. ..
  27. Supporting School Readiness in Social & literacy Domains
    Edward Feil; Fiscal Year: 2002
    ..abstract_text> ..
  28. CREATING GUIDELINES THAT ADAPT TO LOCAL CONTEXTS
    Aziz Boxwala; Fiscal Year: 2003
    ..We will compare the acceptance of recommendations contained in guidelines that have been adapted to acceptance of recommendations contained in guidelines that have not been adapted. ..
  29. A ROLE FOR NOGGIN AND BMP2/4 IN HAIR GROWTH CONTROL
    Vladimir Botchkarev; Fiscal Year: 2003
    ..abstract_text> ..
  30. Genome-wide association study of MI in Caucasians
    Jeffrey R Gulcher; Fiscal Year: 2010
    ....
  31. Validation of Web-based Multimedia Dietary Assessment Tools
    Lenore Arab; Fiscal Year: 2010
    ..Theepidemiology. The study will als contribute to our confidence in these dietary and activity assessment instruments in multiracial populations. ..
  32. VOCABULARY MANAGEMENT FOR CLINICAL RESEARCH DATABASES
    Cynthia Brandt; Fiscal Year: 2005
    ....
  33. Outbreak detection: Combinatorial tests for small samples
    NINA FEFFERMAN; Fiscal Year: 2008
    ..The results will lead to guidance regarding which methods are best for detecting particular types of outbreaks. [unreadable] [unreadable] [unreadable]..
  34. First-Time Parent Interactive Parenting Intervention
    Edward Feil; Fiscal Year: 2007
    ....
  35. The ethics of consent for the public release of potentially identifiable DNA data
    Amy McGuire; Fiscal Year: 2009
    ..Moreover, it will increase our understanding of participants'judgments and attitudes toward data sharing, which will improve the overall conduct of biomedical research, build public trust, and foster research participation. ..
  36. ISEE 19th Annual Conference
    Daniel Wartenberg; Fiscal Year: 2007
    ..ISEE provides a variety of forums for discussion, critical reviews, collaborations and education issues for environmental exposures and their human health effects. [unreadable] [unreadable] [unreadable] [unreadable]..
  37. Multi-Method Proactive Risk Assessment
    Wilson Pace; Fiscal Year: 2007
    ..unreadable] [unreadable] [unreadable]..
  38. RURAL DWELLING OLDER ADULTS: CPAP ADHERENCE SUPPORT
    Carol Smith; Fiscal Year: 2004
    ..abstract_text> ..
  39. Internet CareLink for Pediatric Home Chemotherapy
    Charles Safran; Fiscal Year: 2004
    ..PediatricCancer CareLink will serve as a model for enhancing care processes and outcomes for patients and families dealing with other forms of cancer and with other treatment regimens. ..
  40. FUNCTION OF NOGGIN IN HAIR FOLLICLE GROWTH AND DISEASE
    Vladimir Botchkarev; Fiscal Year: 2006
    ....
  41. A New Measure of Nursing Home Care Quality
    Marilyn Rantz; Fiscal Year: 2003
    ..abstract_text> ..
  42. ISEE 18th Annual Meeting in Conjunction with ISEA
    Daniel Wartenberg; Fiscal Year: 2006
    ..ISEE provides a variety of forums for discussion, critical reviews, collaborations and education issues for environmental exposures and their human health effects. [unreadable] [unreadable] [unreadable] [unreadable]..
  43. A Multiethnic Internet Study on Menopausal Symptoms
    Eun Ok Im; Fiscal Year: 2008
    ....
  44. Multilevel Intervention to Improve Nursing Home Outcomes
    Marilyn Rantz; Fiscal Year: 2009
    ..Similarly, we will observe processes of care delivery before, during and after the multilevel intervention to describe the adoption of the care delivery strategies recommended in the intervention. ..
  45. Dynamic Measures of Neurochemistry in Mood Disorders
    Ronald Salomon; Fiscal Year: 2006
    ..abstract_text> ..
  46. Patient-Guided Tools to Promote Colon Cancer Screening
    Wilson Pace; Fiscal Year: 2005
    ..Furthermore, this method of education and tracking is not specific to CRC and could provide opportunities for increasing screening rates for other types of cancer. ..
  47. Geographic Tools for Surveillance and Study of Disease
    Daniel Wartenberg; Fiscal Year: 2003
    ..We will explore methods for imputing values and adjusting for edge effects using methods including Markov Chain Monte Carlo simulations. ..
  48. Computational Methods for Personalized and Adaptive Cognitive Training
    Rebecca S Crowley; Fiscal Year: 2010
    ..Work in these areas has the potential to deeply impact the fields of patient safety, medical simulation and competency- based assessment, in addition to guiding the development of future medical training systems. ..
  49. Technology to Automatically Detect Early Signs of Illness in Senior Housing
    Marilyn J Rantz; Fiscal Year: 2010
    ..Subjects will not use any expensive telehealth equipment or wear any devices. We propose to use this information to detect changes in health status which could indicate an impending acute illness or exacerbation of chronic illness. ..
  50. Shared Medical Records and Chronic Illness Care
    James D Ralston; Fiscal Year: 2010
    ..Results of this study will help inform the development, evaluation and dissemination of patient Web portals designed to support the care of patients with diabetes and multiple co-morbidities. ..
  51. Creating Digital Partnerships for Health
    Alwyn Cohall; Fiscal Year: 2008
    ..Additionally, Digital Partners will assist the HHPC and its community advisory board in developing, implementing, evaluating and disseminating research findings. ..
  52. BIOBEHAVIORAL ETIOLOGY OF CHRONIC TEMPOROMANDIBULAR
    James Fricton; Fiscal Year: 2001
    ..Questionnaires will include RDC/TMD axis I and II, coping strategies questionnaire, a self report fibromyalgia screening form, and IMPATH. ..
  53. Conference--ISEE 16th Annual Meeting
    Daniel Wartenberg; Fiscal Year: 2004
    ..ISEE provides a variety of forums for discussion, critical reviews, collaborations and education issues for environmental exposures and their human health effects. ..