Summary: Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or data structures, especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or so-called computer hackers aiming to compromise stored data.
Publications291 found, 100 shown here
- Cloud computing: a new business paradigm for biomedical information sharingArnon Rosenthal
The MITRE Corporation, Bedford, MA, USA
J Biomed Inform 43:342-53. 2010..We often find a rough parity (in principle), but one needs to examine individual acquisitions--is a loosely managed lab moving to a well managed cloud, or a tightly managed hospital data center moving to a poorly safeguarded cloud?..
- Privacy and security for electronic health recordsVirginia A Sharpe
Veterans Health Administrations, National Center for Ethics, USA
Hastings Cent Rep 35:49. 2005
- Bridging the electronic divide: patient and provider perspectives on e-mail communication in primary careCheryl A Moyer
Consortium for Health Outcomes, Innovation, and Cost Effectiveness Studies, University of Michigan School of Medicine, Ann Arbor 48109 0409, USA
Am J Manag Care 8:427-33. 2002..To determine e-mail utilization patterns and attitudes toward e-mail use among primary care physicians and their ambulatory outpatient clinic patients...
- Pseudonyms for cancer registriesK Pommerening
Institut für Medizinische Statistik und Dokumentation, Johannes Gutenberg Universitat, Mainz, Germany
Methods Inf Med 35:112-21. 1996..The methods described are not restricted to cancer registration and may serve as a model for comparable applications in medical informatics...
- Security issues in healthcare applications using wireless medical sensor networks: a surveyPardeep Kumar
Department of Ubiquitous IT, Graduate School of Design and IT, Dongseo University, San 69 1, Jurye 2 Dong, Sasang gu, Busan 617 716, Korea
Sensors (Basel) 12:55-91. 2012..Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs...
- Initial experience with patient-clinician secure messaging at a VA medical centerJohn M Byrne
VA Loma Linda Healthcare System, 11201 Benton Street 14A, Loma Linda, CA, 92357, USA
J Am Med Inform Assoc 16:267-70. 2009..The authors learned that to promote clinician adoption they must demonstrate workload benefits from secure messaging and more fully analyze the clinical computing workload that clinicians experience...
- Secure Dynamic access control scheme of PHR in cloud computingTzer Shyong Chen
Department of Information Management, Tunghai University, Taichung, Taiwan
J Med Syst 36:4005-20. 2012....
- Building public trust in uses of Health Insurance Portability and Accountability Act de-identified dataDeven McGraw
Center for Democracy and Technology, 1634 I Street, NW suite 1100, Washington, DC 20006
J Am Med Inform Assoc 20:29-34. 2013....
- How strong are passwords used to protect personal health information in clinical trials?Khaled El Emam
Children s Hospital of Eastern Ontario Research Institute, Ottawa, ON, Canada
J Med Internet Res 13:e18. 2011..Findings and statements about how securely personal health information is managed in clinical research are mixed...
- A proposed architecture and method of operation for improving the protection of privacy and confidentiality in disease registersTim Churches
Centre for Epidemiology and Research, New South Wales Department of Health, Locked Mail Bag 961, North Sydney NSW 2059, Australia
BMC Med Res Methodol 3:1. 2003..However, growing concern over the privacy and confidentiality aspects of disease registers may hinder their future operation. Technical solutions to these legitimate concerns are needed...
- A systematic review of re-identification attacks on health dataKhaled El Emam
Electronic Health Information Laboratory, CHEO Research Institute, Ottawa, Canada
PLoS ONE 6:e28071. 2011....
- Evaluating re-identification risks with respect to the HIPAA privacy ruleKathleen Benitez
Department of Biomedical Informatics, School of Medicine, Vanderbilt University, Nashville, Tennessee 37203, USA
J Am Med Inform Assoc 17:169-77. 2010....
- Development and evaluation of an open source software tool for deidentification of pathology reportsBruce A Beckwith
Department of Pathology, Beth Israel Deaconess Medical Center, 330 Brookline Ave, Boston, MA, USA
BMC Med Inform Decis Mak 6:12. 2006..1800 new pathology reports were then processed. Each report was reviewed manually before and after deidentification to catalog all identifiers and note those that were not removed...
- Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'Muhammad Khurram Khan
Center of Excellence in Information Assurance CoEIA, King Saud University, Saudi Arabia
Sensors (Basel) 10:2450-9. 2010..The proposed security improvements can be incorporated in the M.L. Das-scheme for achieving a more secure and robust two-factor user authentication in WSNs...
- Encryption characteristics of two USB-based personal health record devicesAdam Wright
Department of Medical Informatics and Clinical Epidemiology, Oregon Health and Science University, 3181 Sam Jackson Park Rd, Portland, OR 97239, USA
J Am Med Inform Assoc 14:397-9. 2007..This article describes the weaknesses we discovered, outlines three critical flaws with the security model used by the devices, and recommends four guidelines for improving the security of similar devices...
- Privacy enhancing techniques - the key to secure communication and management of clinical and genomic dataG J E De Moor
Department of Medical Informatics and Statistics, University Hospital Gent, Belgium
Methods Inf Med 42:148-53. 2003....
- A secure EHR system based on hybrid cloudsYu Yi Chen
Department of Management Information System, National Chung Hsing University, Taiwan, Republic of China
J Med Syst 36:3375-84. 2012..In this paper, we propose an EHR sharing and integration system in healthcare clouds and analyze the arising security and privacy issues in access and management of EHRs...
- Expansion embedding techniques for reversible watermarkingDiljith M Thodi
Department of Electrical and Computer Engineering, University of Arizona, Tucson, AZ 85721 0104, USA
IEEE Trans Image Process 16:721-30. 2007..There is also a significant improvement in the quality of the watermarked image, especially at moderate embedding capacities...
- Privacy-preserving backpropagation neural network learningTingting Chen
Computer Science and Engineering Department, The State University of New York at Buffalo, Buffalo, NY 14260, USA
IEEE Trans Neural Netw 20:1554-64. 2009..We provide complete correctness and security analysis of our algorithms. The effectiveness of our algorithms is verified by experiments on various real world data sets...
- An easy to use and affordable home-based personal eHealth system for chronic disease management based on free open source softwareTatjana M Burkow
Norwegian Centre for Telemedicine, UNN, Tromsø, Norway
Stud Health Technol Inform 136:83-8. 2008..We also briefly describe field trials of the system for patients with COPD and diabetes, and their experience with the technology...
- Driving toward guiding principles: a goal for privacy, confidentiality, and security of health informationS A Buckovich
Mitretek Systems, Health Information Technology Institute, McLean, VA 22102, USA
J Am Med Inform Assoc 6:122-33. 1999..It is imperative that all participants in our health care system work actively toward a viable resolution of this information privacy debate...
- Genomics and privacy: implications of the new reality of closed data for the fieldDov Greenbaum
Program in Computational Biology and Bioinformatics, Yale University, New Haven, Connecticut, USA
PLoS Comput Biol 7:e1002278. 2011..However, teaching personal genomics with identifiable subjects in the university setting will, in turn, create additional privacy issues and social conundrums...
- Effects of personal identifier resynthesis on clinical text de-identificationReyyan Yeniterzi
Faculty of Engineering and Natural Sciences, Sabanci University, Istanbul, Turkey
J Am Med Inform Assoc 17:159-68. 2010..The goal of this research is to evaluate the effectiveness and examine possible bias introduced by resynthesis on de-identification software...
- Protecting privacy using k-anonymityKhaled El Emam
Children s Hospital of Eastern Ontario Research Institute, Ottawa, Ontario K1J 8L1, Canada
J Am Med Inform Assoc 15:627-37. 2008..To alleviate such concerns, it is possible to anonymize the data before disclosure. One popular anonymization approach is k-anonymity. There have been no evaluations of the actual re-identification probability of k-anonymized data sets...
- Patients' attitudes toward electronic health information exchange: qualitative studySteven R Simon
Department of Population Medicine, Harvard Medical School and Harvard Pilgrim Health Care, Boston, MA 02215, USA
J Med Internet Res 11:e30. 2009..In many countries, there has been substantial progress in establishing the electronic transmission of patients' health information between health care providers, but little is known about how best to engage patients in the process...
- Social but safe? Quality and safety of diabetes-related online social networksElissa R Weitzman
Children s Hospital Informatics Program at the Harvard MIT Division of Health Sciences and Technology, Children s Hospital Boston, Boston, Massachusetts, USA
J Am Med Inform Assoc 18:292-7. 2011..To foster informed decision-making about health social networking (SN) by patients and clinicians, the authors evaluated the quality/safety of SN sites' policies and practices...
- Patient-physician web messaging. The impact on message volume and satisfactionEric M Liederman
Division of Clinical Information Systems and Department of Internal Medicine, University of California Davis Health System, Sacramento, CA 95817, USA
J Gen Intern Med 20:52-7. 2005..Patients want electronic access to providers. Providers fear being overwhelmed by unreimbursed messages...
- Determinants of success of inpatient clinical information systems: a literature reviewM J van der Meijden
Department of Medical Informatics, Maastricht University, The Netherlands
J Am Med Inform Assoc 10:235-43. 2003..Our review points out the need for more thorough evaluations of patient care information systems that look at a wide range of factors that can affect the relative success or failure of these systems...
- USB-based Personal Health Records: an analysis of features and functionalityFrancine L Maloney
Partners HealthCare, Clinical Informatics Research and Development, Wellesley, MA 02481, USA
Int J Med Inform 79:97-111. 2010..To determine the features of commercially available USB-based Personal Health Records (PHR) devices, and compare the commercial state of the art to recommendations made by certification committees...
- Advances and current state of the security and privacy in electronic health records: survey from a social perspectiveAntonio Tejero
Department of Signal Theory and Communications, University of Valladolid, Valladolid, Spain
J Med Syst 36:3019-27. 2012..Many EHR platforms are being developed, but most of them present weaknesses when they are opened to the public. These architectures gain significance when they cover all the requisites related to security and privacy...
- Pseudonymization of radiology data for research purposesRita Noumeir
Ecole de technologie superieure, 1100 Notre Dame West, Montreal, QC, Canada H3C 1K3
J Digit Imaging 20:284-95. 2007..Our work can be used to enable electronic health record (EHR) secondary usage such as public surveillance and research, while maintaining patient confidentiality...
- Giving patients access to their medical records via the internet: the PCASSO experienceDaniel Masys
Biomedical Informatics, School of Medicine, University of California, San Diego, La Jolla, California 92093 0602, USA
J Am Med Inform Assoc 9:181-91. 2002..The Patient-Centered Access to Secure Systems Online (PCASSO) project is designed to apply state-of-the-art-security to the communication of clinical information over the Internet...
- Patient-provider secure messaging in VA: variations in adoption and association with urgent care utilizationStephanie L Shimada
Center for Health Quality, Outcomes, and Economic Research, Edith Nourse Rogers Memorial Veterans Hospital, Bedford, MA 01730, USA
Med Care 51:S21-8. 2013..This disruptive technology has the potential to support continuous, coordinated quality care, but limited evidence supports this connection...
- Secure communication and management of clinical and genomic data: the use of pseudonymisation as privacy enhancing techniqueBrecht Claerhout
Department of Medical Informatics and Statistics, University Hospital Gent, Belgium
Stud Health Technol Inform 95:170-5. 2003..g. research. Practical approaches based on two pseudonymisation models, for both batch and interactive data collection and exchange, are presented...
- A methodology for the pseudonymization of medical dataThomas Neubauer
Institute of Software Technology and Interactive Systems, Vienna University of Technology, Favoritenstrasse 9 11, 1040 Vienna, Austria
Int J Med Inform 80:190-204. 2011..e., who the patient discloses her health information to. Therefore, the methodology prevents data disclosure that negatively influences the patient's life (e.g., by being denied health insurance or employment)...
- Enabling secure, distributed collaborations for adrenal tumor researchAnthony Stell
National e Science Centre, University of Glasgow, UK
Stud Health Technol Inform 159:259-63. 2010..We describe the architecture, implementation and use to date of this facility to support the ENSAT adrenal cancer research network...
- Securing electronic health records without impeding the flow of informationRakesh Agrawal
Microsoft Search Labs, 1065 La Avenida, Mountain View, CA 94043, United States
Int J Med Inform 76:471-9. 2007....
- Will electronic personal health records benefit providers and patients in rural America?John S Hargreaves
Memorial Medical Center, Johnstown, Pennsylvania 15905, USA
Telemed J E Health 16:167-76. 2010..The objective of this study was to educate stakeholders (e.g., providers, patients, insurers, government) in the healthcare industry about electronic personal health records (PHRs) and their potential application in rural America...
- Multi-centric universal pseudonymisation for secondary use of the EHRLuigi Lo Iacono
C and C Research Laboratories, NEC Europe Ltd, Germany
Stud Health Technol Inform 126:239-47. 2007....
- Privacy Protection through pseudonymisation in eHealthF De Meyer
Dept of Medical Informatics and Statistics, University Hospital Ghent, Belgium
Stud Health Technol Inform 141:111-8. 2008..The technical specification starts out with a conceptual model and evolves from a theoretical model to a real life model by adding assumptions on the observability of personal data...
- Emergency healthcare process automation using mobile computing and cloud servicesM Poulymenopoulou
Department of Digital Systems, University of Piraeus, Piraeus, Greece
J Med Syst 36:3233-41. 2012....
- A novel, privacy-preserving cryptographic approach for sharing sequencing dataChristopher A Cassa
Division of Genetics, Brigham and Women s Hospital, Boston, MA 02215, USA
J Am Med Inform Assoc 20:69-76. 2013..We present a cryptographic scheme to securely transmit externally generated sequence data which does not require any patient identifiers, public key infrastructure, or the transmission of passwords...
- Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM imagesOsamah M Al-Qershi
School of Electrical and Electronic Engineering, Engineering Campus, Universiti Sains Malaysia, 14300 Nibong Tebal, Seberang Perai Selatan, Pulau Pinang, Malaysia
J Digit Imaging 24:114-25. 2011..The scheme also shows some robustness against certain levels of salt and pepper and cropping noise...
- Implementing electronic medical record systems in developing countriesHamish S F Fraser
Division of Social Medicine and Healthcare Inequalities, Brigham and Women s Hospital and Harvard Medical School, Boston, MA, USA
Inform Prim Care 13:83-95. 2005..Finally, we discuss the importance of collaboration between projects in the development of electronic medical record systems rather than reinventing systems in isolation, and the use of open standards and open source software...
- Some methods for blindfolded record linkageTim Churches
Centre for Epidemiology and Research, Population Health Division, New South Wales Department of Health, Locked Mail Bag 961, North Sydney NSW 2059, Australia
BMC Med Inform Decis Mak 4:9. 2004..A limitation of their method is that only exact comparisons of values are possible, although phonetic encoding of names and other strings can be used to allow for some types of typographical variation and data errors...
- Medical record: systematic centralization versus secure on demand aggregationCatherine Quantin
INSERM, U866, Dijon, F 21000, Univ de Bourgogne, Dijon, F 21000, France
BMC Med Inform Decis Mak 11:18. 2011....
- Lessons from the central Hampshire electronic health record pilot project: evaluation of the electronic health record for supporting patient care and secondary analysisHugh Sanderson
Winchester and Eastleigh Healthcare Trust, Winchester, Southampton SO22 5DG
BMJ 328:875-8. 2004
- Improving patients privacy with PseudonymizationThomas Neubauer
Secure Business Austria, Vienna, Austria
Stud Health Technol Inform 136:691-6. 2008..This paper presents the new system PIPE (Pseudonymization of Information for Privacy in e-Health), that differs from existing approaches in its ability to securely integrate primary and secondary usage of health data...
- Aspects of privacy for electronic health recordsSebastian Haas
University of Freiburg, Freiburg, Germany
Int J Med Inform 80:e26-31. 2011..Secondly, an organization providing EHRs should neither be able to gain access to these health data nor establish a profile about patients...
- A secure authentication scheme for telecare medicine information systemsZhen Yu Wu
Department of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan
J Med Syst 36:1529-35. 2012..Finally, it is shown to be more secure and practical for telecare medicine environments...
- A more secure authentication scheme for telecare medicine information systemsHe Debiao
School of Mathematics and Statistics, Wuhan University, Wuhan, Hubei, China
J Med Syst 36:1989-95. 2012..Our scheme is not only more secure than Wu et al.'s scheme, but also has better performance. Then our scheme is more efficient and appropriate to collocating with low power mobile devices for the telecare medicine information system...
- Inter-organizational future proof EHR systems. A review of the security and privacy related issuesHelma van der Linden
School for Public Health and Primary Care CAPHRI, University Maastricht, Maastricht, The Netherlands
Int J Med Inform 78:141-60. 2009..Identification and analysis of privacy and security related issues that occur when health information is exchanged between health care organizations...
- Are personal health records safe? A review of free web-accessible personal health record privacy policiesInmaculada Carrión Señor
Department of Informatics and Systems, Faculty of Computer Science, University of Murcia, Murcia, Spain
J Med Internet Res 14:e114. 2012..Several obstacles prevent the adoption and use of personal health record (PHR) systems, including users' concerns regarding the privacy and security of their personal health information...
- Field test of classical symmetric encryption with continuous variables quantum key distributionPaul Jouguet
SeQureNet, 23 Avenue d Italie, 75013 Paris, France
Opt Express 20:14030-41. 2012..This strengthens the potential of CVQKD for information technology security infrastructure deployments...
- Strong authentication scheme for telecare medicine information systemsQiong Pu
CIMS Research Center, Tongji University, Shanghai, China
J Med Syst 36:2609-19. 2012..And yet, our scheme is still reasonably efficient and can yield such a concrete scheme that is even more efficient than previous schemes. Therefore the end result is more practical for the telecare medicine system...
- Keeping online personal records private: security and privacy considerations for Web-based PHR systemsAnil Srinivasan
HDC 4Point Dynamics, Omaha, NE, USA
J AHIMA 77:62-3, 68. 2006
- Biodefence and the production of knowledge: rethinking the problemAllen Buchanan
Duke University, Durham, NC, USA
J Med Ethics 39:195-204. 2013....
- An efficient authentication scheme for telecare medicine information systemsZhian Zhu
China Ship Development and Design Center, Wuhan, China
J Med Syst 36:3833-8. 2012..To improve the security, we propose a new authentication scheme for TMIS. The analysis shows our scheme could overcome the weaknesses in Wei et al.'s scheme and has better performance than their scheme...
- An improved authentication scheme for telecare medicine information systemsJianghong Wei
Zheng zhou Information Science and Technology Institute, Henan 450002, China
J Med Syst 36:3597-604. 2012..We also propose an improved authentication scheme for the telecare medicine information system, and demonstrate that the improved one satisfies the security requirements of two-factor authentication and is also efficient...
- Personal computer security: part 1. Firewalls, antivirus software, and Internet security suitesRonald D Caruso
Neuroradiology Section, Department of Radiology, University of Louisville School of Medicine, CCB C07, 530 S Jackson St, Louisville, KY 40202, USA
Radiographics 23:1329-37. 2003..Regular updating of the security features of installed programs is important. Obtaining a moderate degree of PC safety and security is somewhat inconvenient but is necessary and well worth the effort...
- Compact storage of medical images with patient informationR Acharya
Electrical and Computer Engineering Department, Ngee Ann Polytechnic, Singapore 599489
IEEE Trans Inf Technol Biomed 5:320-3. 2001..Differential pulse-code-modulation and adaptive-delta-modulation techniques are employed for data compression, and encryption and results are tabulated for a specific example...
- The inadvertent disclosure of personal health information through peer-to-peer file sharing programsKhaled El Emam
Department of Pediatrics, Faculty of Medicine, University of Ottawa, Ottawa, Ontario, Canada
J Am Med Inform Assoc 17:148-58. 2010..We wanted to estimate the extent to which personal health information (PHI) is being disclosed in this way, and compare that to the extent of disclosure of personal financial information (PFI)...
- A study of IEEE 802.15.4 security framework for wireless body area networksShahnaz Saleem
Graduate School of Information and Communication Engineering, Inha University, 253 Yonghyun Dong, Nam Gu, Incheon 402 751, Korea
Sensors (Basel) 11:1383-95. 2011..This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN...
- HIPAA compliant auditing system for medical imagesZheng Zhou
Image Processing and Informatics IPI Laboratory, Radiology Department, University of Southern California, Marina del Rey, CA 90292, USA
Comput Med Imaging Graph 29:235-41. 2005....
- Distributed data processing for public health surveillanceRoss Lazarus
Channing Laboratory, Department of Medicine, Brigham and Women s Hospital and Harvard Medical School, Boston, MA, USA
BMC Public Health 6:235. 2006....
- Privacy fear factor arises. The public sees benefits to be had from healthcare IT but concerns about misuse of data emerge in surveyAndis Robeznieks
Mod Healthc 35:6-7, 16, 1. 2005..Specific concerns include computer breaches and employers having access to the records...
- Patient opinion--EHR assessment from the users perspectiveLaura Zurita
Department of Development and Planning, Virtual Centre of Health Informatics, Aalborg University, Denmark
Stud Health Technol Inform 107:1333-6. 2004..These results underline the general societal tendencies of citizen accepting the use of new technology, but being very keen to protect their privacy...
- An evaluation of the current state of genomic data privacy protection technology and a roadmap for the futureBradley A Malin
Carnegie Mellon University, School of Computer Science, Institute for Software Research International, Wean Hall Room 1320 B, Pittsburgh, PA 15213 3890, USA
J Am Med Inform Assoc 12:28-34. 2005..The analyses and discussion within provide guideposts for the development of next-generation protection methods amenable to formal proofs...
- Modelling privilege management and access controlBernd Blobel
Fraunhofer Institute for Integrated Circuits IIS, Health Telematics Project Group, Am Wolfsmantel 33, D 91058 Erlangen, Germany
Int J Med Inform 75:597-623. 2006..Such architecture has to meet the paradigms of distribution, component orientation, formal modelling, separation of logical and technological aspects, etc...
- Indivo: a personally controlled health record for health information exchange and communicationKenneth D Mandl
Children s Hospital Informatics Program at the Harvard MIT Division of Health Sciences and Technology, Boston, MA, USA
BMC Med Inform Decis Mak 7:25. 2007..Indivo (formerly PING) is an open source, open standards PCHR with an open application programming interface (API)...
- Confidentiality preserving audits of electronic medical record accessBradley Malin
Department of Biomedical Informatics, School of Medicine, Vanderbilt University, Nashville, TN 37232, United States
Stud Health Technol Inform 129:320-4. 2007..We motivate the protocol in a real world medical center and then generalize the protocol for implementation in existing healthcare environments...
- Whose personal control? Creating private, personally controlled health records for pediatric and adolescent patientsFabienne C Bourgeois
Division of General Pediatrics, Children s Hospital Boston, Boston, MA 02115, USA
J Am Med Inform Assoc 15:737-43. 2008..Informed by our own operational involvement in the implementation of the Indivo PCHR, we provide a framework for understanding and addressing the challenges posed by child, adolescent, and family access to PCHRs...
- The next step in health data exchanges: trust and privacy in exchange networksSteve D Gravely
Troutman Sanders LLP, Richmond, VA, USA
J Healthc Inf Manag 23:33-7. 2009..The evolving model for data exchange agreements is a multi-party trust agreement. This article will examine the crucial components of a multi-party trust agreement...
- Data security and protection in cross-institutional electronic patient recordsM van der Haak
Department of Medical Informatics, Institute for Medical Biometry and Informatics, University of Heidelberg, Im Neuenheimer Feld 400, D 69120 Heidelberg, Germany
Int J Med Inform 70:117-30. 2003..However, its introduction is thought to be valuable, since a cross-institutional EPR will improve communication within shared care processes, and thus improve the quality of patient care...
- A contextual role-based access control authorization model for electronic patient recordGustavo H M B Motta
Department of Informatics, Federal University of Paraiba, João Pessoa PB 58059 900, Brazil
IEEE Trans Inf Technol Biomed 7:202-7. 2003..This enables the specification of a more flexible and precise authorization policy, where permission is granted or denied according to the right and the need of the user to carry out a particular job function...
- Security in health-care information systems--current trendsE Smith
Rand Afrikaans University, Department of Computer Science, Auckland Park, South Africa
Int J Med Inform 54:39-54. 1999..The final section of the paper will be devoted to a number of proposals for further research possibilities in the domain of health-care information systems security...
- Access control: how can it improve patients' healthcare?Ana Ferreira
Computer Laboratory, University of Kent
Stud Health Technol Inform 127:65-76. 2007..Then EMR could be more successfully integrated into the healthcare practice and provide for better patient treatment...
- Multiple image watermarking applied to health information managementAggeliki Giakoumaki
Biomedical Engineering Laboratory, School of Electrical and Computer Engineering, National Technical University of Athens, Athens, Greece
IEEE Trans Inf Technol Biomed 10:722-32. 2006..Experimental results indicate the efficiency and transparency of the scheme, which conforms to the strict requirements that apply to regions of diagnostic significance...
- Multidimensional analysis: a management tool for monitoring HIPAA compliance and departmental performanceRobert M Coleman
Maine Medical Center, Portland, ME 04102, USA
J Digit Imaging 17:196-204. 2004....
- Prospective study of clinician-entered research data in the Emergency Department using an Internet-based system after the HIPAA Privacy RuleJeffrey A Kline
Department of Emergency Medicine, Carolinas Medical Center, Charlotte, NC, USA
BMC Med Inform Decis Mak 4:17. 2004..Design and test the reliability of a web-based system for multicenter, real-time collection of data in the emergency department (ED), under waiver of authorization, in compliance with HIPAA...
- The PING personally controlled electronic medical record system: technical architectureWilliam W Simons
Children s Hospital Informatics Program, Enders 1, 300 Longwood Avenue, Boston, MA 02115, USA
J Am Med Inform Assoc 12:47-54. 2005....
- Patient participation in EHR benefitsThomas M Jones
Oracle Corp, Redwood Shores, Calif, USA
Health Manag Technol 24:64, 63. 2003....
- caGrid 1.0: an enterprise Grid infrastructure for biomedical researchScott Oster
Biomedical Informatics Department, Ohio State University, Columbus, OH 43210, USA
J Am Med Inform Assoc 15:138-49. 2008....
- Wireless technology infrastructures for authentication of patients: PKI that ringsUlrich Sax
Children s Hospital Informatics Program, 1 Autumn Street AU543, Boston, MA 02115, USA
J Am Med Inform Assoc 12:263-8. 2005..The authors propose harnessing this technology for the strong authentication of individuals by creating a registration authority and an authentication service, and examine the problems and promise of such a system...
- The Swedish National Pharmacy RegisterBengt Astrand
Apoteket AB and School of Pure and Applied Natural Sciences, University of Kalmar, Kalmar, Sweden
Stud Health Technol Inform 129:345-9. 2007..To clinically evaluate individual medication history, the relatively high prevalence of dispensed drugs in the population, seems to justify the National Pharmacy Register...
- Square pegs in round holes: information systems, hospitals and the significance of contextual awarenessAksel Hagen Tjora
Department of Sociology and Political Science, Norwegian University of Science and Technology, 7491 Trondheim, Norway
Soc Sci Med 68:519-25. 2009....
- Using software agents to preserve individual health data confidentiality in micro-scale geographical analysesMaged N Kamel Boulos
School for Health, University of Bath, Claverton Down, Bath BA2 7AY, UK
J Biomed Inform 39:160-70. 2006....
- Fast parallel molecular algorithms for DNA-based computation: factoring integersWeng Long Chang
Department of Information Management, Southern Taiwan University of Technology, Tainan, Taiwan
IEEE Trans Nanobioscience 4:149-63. 2005..Furthermore, this work indicates that the cryptosystems using public-key are perhaps insecure and also presents clear evidence of the ability of molecular computing to perform complicated mathematical operations...
- Consumers are ready to accept the transition to online and electronic records if they can be assured of the security measuresPrajesh Chhanabhai
Department of Information Science, University of Otago, Dunedin, New Zealand
MedGenMed 9:8. 2007..With the international push toward electronic health records (EHRs), this article presents the importance of secure EHR systems from the public's perspective...
- Enhancing clinical trials on the internet: lessons from INVESTR Marks
Department of Statistics, College of Medicine, University of Florida, Gainesville 32610, USA
Clin Cardiol 24:V17-23. 2001..This paper summarizes the advantages achieved for INVEST investigators, sponsor representatives, monitors, and subjects resulting from the centralization and coordination of multiple tasks through Web-based technology...
- Confidentiality of personal health information used for researchDipak Kalra
Centre for Health Informatics and Multi professional Education, University College London, London N19 5LW
BMJ 333:196-8. 2006
- The personal internetworked notary and guardianA Riva
Children's Hospital Informatics Program, Division of Endocrinology, Children's Hospital, 300 Longwood Avenue, Boston, MA 02115, USA
Int J Med Inform 62:27-40. 2001..In addition to the basic architecture, we describe tools to populate the patient's record with data from hospital databases and the first testbed applications we are deploying...
- Ethical issues in public health informatics: implications for system design when sharing geographic informationChristina Olvingson
Department of Computer and Information Science, Linkoping University, SE 581 83, Linkoping, Sweden
J Biomed Inform 35:178-85. 2002..Finally, a theoretical model of design issues based on the case study results is presented...
- Getting results for hematology patients through access to the electronic health recordDavid Wiljer
Knowledge Management and Innovation, Princess Margaret Hospital, University Health Network, Department of Radiation Oncology, University of Toronto
Can Oncol Nurs J 16:154-64. 2006..To conduct a needs assessment to identify patient and provider perceptions about providing patients with access to their electronic health record in order to develop an online system that is appropriate for all stakeholders...
- Patient privacy and confidentialityJim Chalmers
BMJ 326:725-6. 2003
- A context-sensitive approach to anonymizing spatial surveillance data: impact on outbreak detectionChristopher A Cassa
Children s Hospital Boston, Informatics Program Mandl Group, 1 Autumn Street, 721, Boston, MA 02215 5362 USA
J Am Med Inform Assoc 13:160-5. 2006..Further, we measure the impact of the skew on detection of spatial clustering as measured by a spatial scanning statistic...
- Lessons from the central Hampshire electronic health record pilot project: issues of data protection and consentTrina Adams
Hampshire and Isle of Wight Strategic Health Authority, Southampton SO16 4GX
BMJ 328:871-4. 2004
- Guidelines for computer security in general practicePeter Schattner
Department of General Practice, School of Primary Health Care, Monash University, Victoria, Australia
Inform Prim Care 15:73-82. 2007..As general practice becomes increasingly computerised, data security becomes increasingly important for both patient health and the efficient operation of the practice...
- Legal issues concerning electronic health information: privacy, quality, and liabilityJ G Hodge
Georgetown University Law Center, Washington, DC 20013 6305, USA
JAMA 282:1466-71. 1999....
- e-Consent: The design and implementation of consumer consent mechanisms in an electronic environmentEnrico Coiera
The Centre for Health Informatics, The University of New South Wales, NSW, 2055, Australia
J Am Med Inform Assoc 11:129-40. 2004....
- Ethics in public health research: privacy and public health at risk: public health confidentiality in the digital ageJulie Myers
New York City Department of Health and Mental Hygiene, 125 Worth St, Rm 331, New York, NY 10013, USA
Am J Public Health 98:793-801. 2008..Tightened physical and electronic controls can prevent misuse of data, minimize the risk of security breaches, and help maintain the reputation and integrity of public health agencies...
- Genome Integrative Pathway Modeling of Diabetic AtherosclerosisJae K Lee; Fiscal Year: 2010..Our GIPaM technology will also greatly enhance pathway discovery/modeling capability in other fields of the biomedical science. ..
- The ODIE Toolkit - Software for Information Extraction and Biomedical Ontology DeRebecca S Crowley; Fiscal Year: 2010..Additionally, the project would contribute to the software for developing other applications by helping researchers build more comprehensive ontologies. The results of this work may benefit both medical research and patient care. ..
- Disease Surveillance in Real Time: Geotemporal MethodsKenneth Mandl; Fiscal Year: 2009..Once these methods are established, they can be applied to any other meaningful set of syndromes. ..
- Technological Home Care: Improving CaregivingCarol Smith; Fiscal Year: 2009..The potential significance and the long term goals are to strengthen home caregiving skills, improve health status, quality of life and self-management of chronic illness symptoms and invasive home care treatment. ..
- A NETWORK OF RESEARCH UNITS TO STUDY CLINICAL WOUND CAREJames Quinn; Fiscal Year: 2004..In this study amoxicillin/clavulanic acid will be compared to placebo. The primary outcome of the study will be infection. Other outcomes studied will be wound-healing patient satisfaction and cost. ..
- Quantitative Methods for Genome-wide Analysis of Macrophage Activation by ESCsJianqing Fan; Fiscal Year: 2013..These topics have also importantimplications on compress sensing and computer security. In addition, several robust and effective methodsare proposed for ultrahigh-dimensional sparse regression, ..
- Automated Detection of Anomalous Accesses to Electronic Health RecordsBradley A Malin; Fiscal Year: 2012..have focused on the external threat, which has led to the development of sophisticated information and computer security mechanisms...
- Secure Web-Based Flow Cytometry in Clinical Use and Translational ResearchNikesh Kotecha; Fiscal Year: 2012..This will enable important new tools developed in the research laboratory to be translated into clinical settings and enhance patient treatment with cutting edge flow cytometry assays. ..
- Surveillance and health promotion informatics at workKenneth Mandl; Fiscal Year: 2006..The formative evaluation will occur in two test beds, a major US corporation and a Canadian Province. [unreadable] [unreadable]..
- Surveillance and health promotion informatics at workKenneth Mandl; Fiscal Year: 2005..Secondary outcomes will be impact on rates of self-reported illness, and on knowledge, attitudes and beliefs about influenza. The formative evaluation will occur in two test beds, a major US corporation and a Canadian Province. ..
- Internet-based Fidelity Enhancement of MTFCEdward Feil; Fiscal Year: 2005....
- Predicting Wound Healing Complications in the Emergency DepartmentJames Quinn; Fiscal Year: 2008..Knowing which patients are at risk for complications will help guide treatment and management decisions. [unreadable] [unreadable] [unreadable]..
- BIOINFORMATICS CENTER FOR INNATE IMMUNITY PGARoss Lazarus; Fiscal Year: 2004..abstract_text> ..
- Nitric Oxide Synthase Polymorphisms and Risk for Skin CancerAbrar Qureshi; Fiscal Year: 2008..unreadable] [unreadable] [unreadable]..
- Cancer CareLink for Patient Self ReportsCharles Safran; Fiscal Year: 2004..We anticipate that Cancer CareLink will serve as a model for enhancing care processes and patient outcomes. ..
- Ethics and Practice in Stored Tissue Genetic ResearchLeslie Wolf; Fiscal Year: 2006..abstract_text> ..
- A Genetic Association Research Statistical FrameworkRoss Lazarus; Fiscal Year: 2008..Developed in the context of airways disease, the software will be immediately and directly applicable to genetic research in other common, complex disorders. ..
- Cancer Pain Management-Decision Support Computer ProgramEun Ok Im; Fiscal Year: 2007..abstract_text> ..
- Improving control with Activity and NutritionAnne Wolf; Fiscal Year: 2007..Results will be immediately applicable to a majority of health plans and practices in the U.S. ..
- Change Detection in Serial MRIs of Patients with Brain GliomasBradley Erickson; Fiscal Year: 2008..It is our hope that in the future, a measurement method superior to or as an adjunct to human observation will become available, though this study will not attempt to go that far. [unreadable] [unreadable] [unreadable]..
- A System to Share and Explore Human Brain Mapping DataKen Smith; Fiscal Year: 2005....
- Improving Depression Treatment Adherence & OutcomesHeather Flynn; Fiscal Year: 2005..This research has potential to meaningfully improve medication adherence, enhance outcomes and quality of life, and minimize the terrible morbidity burden experienced among women with depression. ..
- MOLECULAR MECHANISMS OF CHEMOTHERAPY-INDUCED HAIR LOSSVladimir Botchkarev; Fiscal Year: 2005..Patients with many forms of p53-negative cancers treated by chemotherapy may ultimately benefit from this study. ..
- Kidney Transplant CareLinkCharles Safran; Fiscal Year: 2002..Kidney Transplant CareLink addresses a significant unmet need in the marketplace. ..
- Computer-Assisted Observation of Parents and ChildrenEdward Feil; Fiscal Year: 2002....
- Response Selection as a Function of AgeRobert Proctor; Fiscal Year: 2002..These guidelines will lead to development of products and environments that allow elderly adults to remain more independent and to engage safely in more activities in their daily lives. ..
- Supporting School Readiness in Social & literacy DomainsEdward Feil; Fiscal Year: 2002..abstract_text> ..
- CREATING GUIDELINES THAT ADAPT TO LOCAL CONTEXTSAziz Boxwala; Fiscal Year: 2003..We will compare the acceptance of recommendations contained in guidelines that have been adapted to acceptance of recommendations contained in guidelines that have not been adapted. ..
- A ROLE FOR NOGGIN AND BMP2/4 IN HAIR GROWTH CONTROLVladimir Botchkarev; Fiscal Year: 2003..abstract_text> ..
- Genome-wide association study of MI in CaucasiansJeffrey R Gulcher; Fiscal Year: 2010....
- Validation of Web-based Multimedia Dietary Assessment ToolsLenore Arab; Fiscal Year: 2010..Theepidemiology. The study will als contribute to our confidence in these dietary and activity assessment instruments in multiracial populations. ..
- VOCABULARY MANAGEMENT FOR CLINICAL RESEARCH DATABASESCynthia Brandt; Fiscal Year: 2005....
- Outbreak detection: Combinatorial tests for small samplesNINA FEFFERMAN; Fiscal Year: 2008..The results will lead to guidance regarding which methods are best for detecting particular types of outbreaks. [unreadable] [unreadable] [unreadable]..
- First-Time Parent Interactive Parenting InterventionEdward Feil; Fiscal Year: 2007....
- The ethics of consent for the public release of potentially identifiable DNA dataAmy McGuire; Fiscal Year: 2009..Moreover, it will increase our understanding of participants'judgments and attitudes toward data sharing, which will improve the overall conduct of biomedical research, build public trust, and foster research participation. ..
- ISEE 19th Annual ConferenceDaniel Wartenberg; Fiscal Year: 2007..ISEE provides a variety of forums for discussion, critical reviews, collaborations and education issues for environmental exposures and their human health effects. [unreadable] [unreadable] [unreadable] [unreadable]..
- Multi-Method Proactive Risk AssessmentWilson Pace; Fiscal Year: 2007..unreadable] [unreadable] [unreadable]..
- RURAL DWELLING OLDER ADULTS: CPAP ADHERENCE SUPPORTCarol Smith; Fiscal Year: 2004..abstract_text> ..
- Internet CareLink for Pediatric Home ChemotherapyCharles Safran; Fiscal Year: 2004..PediatricCancer CareLink will serve as a model for enhancing care processes and outcomes for patients and families dealing with other forms of cancer and with other treatment regimens. ..
- FUNCTION OF NOGGIN IN HAIR FOLLICLE GROWTH AND DISEASEVladimir Botchkarev; Fiscal Year: 2006....
- A New Measure of Nursing Home Care QualityMarilyn Rantz; Fiscal Year: 2003..abstract_text> ..
- ISEE 18th Annual Meeting in Conjunction with ISEADaniel Wartenberg; Fiscal Year: 2006..ISEE provides a variety of forums for discussion, critical reviews, collaborations and education issues for environmental exposures and their human health effects. [unreadable] [unreadable] [unreadable] [unreadable]..
- A Multiethnic Internet Study on Menopausal SymptomsEun Ok Im; Fiscal Year: 2008....
- Multilevel Intervention to Improve Nursing Home OutcomesMarilyn Rantz; Fiscal Year: 2009..Similarly, we will observe processes of care delivery before, during and after the multilevel intervention to describe the adoption of the care delivery strategies recommended in the intervention. ..
- Dynamic Measures of Neurochemistry in Mood DisordersRonald Salomon; Fiscal Year: 2006..abstract_text> ..
- Patient-Guided Tools to Promote Colon Cancer ScreeningWilson Pace; Fiscal Year: 2005..Furthermore, this method of education and tracking is not specific to CRC and could provide opportunities for increasing screening rates for other types of cancer. ..
- Geographic Tools for Surveillance and Study of DiseaseDaniel Wartenberg; Fiscal Year: 2003..We will explore methods for imputing values and adjusting for edge effects using methods including Markov Chain Monte Carlo simulations. ..
- Computational Methods for Personalized and Adaptive Cognitive TrainingRebecca S Crowley; Fiscal Year: 2010..Work in these areas has the potential to deeply impact the fields of patient safety, medical simulation and competency- based assessment, in addition to guiding the development of future medical training systems. ..
- Technology to Automatically Detect Early Signs of Illness in Senior HousingMarilyn J Rantz; Fiscal Year: 2010..Subjects will not use any expensive telehealth equipment or wear any devices. We propose to use this information to detect changes in health status which could indicate an impending acute illness or exacerbation of chronic illness. ..
- Shared Medical Records and Chronic Illness CareJames D Ralston; Fiscal Year: 2010..Results of this study will help inform the development, evaluation and dissemination of patient Web portals designed to support the care of patients with diabetes and multiple co-morbidities. ..
- Creating Digital Partnerships for HealthAlwyn Cohall; Fiscal Year: 2008..Additionally, Digital Partners will assist the HHPC and its community advisory board in developing, implementing, evaluating and disseminating research findings. ..
- BIOBEHAVIORAL ETIOLOGY OF CHRONIC TEMPOROMANDIBULARJames Fricton; Fiscal Year: 2001..Questionnaires will include RDC/TMD axis I and II, coping strategies questionnaire, a self report fibromyalgia screening form, and IMPATH. ..
- Conference--ISEE 16th Annual MeetingDaniel Wartenberg; Fiscal Year: 2004..ISEE provides a variety of forums for discussion, critical reviews, collaborations and education issues for environmental exposures and their human health effects. ..