What electronic health records don’t know just yet. A privacy analysis for patient communities and health records interaction

[1]  Benjamin Hasić,et al.  Electronic Health Book—a unique Czech solution for eHealth , 2011 .

[2]  Changjie Wang,et al.  An interoperable security framework for connected healthcare , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).

[3]  K. Emam Methods for the de-identification of electronic health records for genomic research , 2011, Genome Medicine.

[4]  Wouter Joosen,et al.  Integrating Patient Consent in e-Health Access Control , 2011, Int. J. Secur. Softw. Eng..

[5]  Colin P. McCarthy Paging Dr. Google: Personal Health Records and Patient Privacy , 2010 .

[6]  Silvina Santana,et al.  Online Communication Between Doctors and Patients in Europe: Status and Perspectives , 2010, Journal of medical Internet research.

[7]  L. Engelen,et al.  Definition of Health 2.0 and Medicine 2.0: A Systematic Review , 2010, Journal of medical Internet research.

[8]  Vitaly Shmatikov,et al.  Myths and fallacies of "Personally Identifiable Information" , 2010, Commun. ACM.

[9]  James B. Williams,et al.  Social networking applications in health care: threats to the privacy and security of health information , 2010, SEHC '10.

[10]  Kristen LeFevre,et al.  Privacy wizards for social networking sites , 2010, WWW '10.

[11]  Helmut Krcmar,et al.  Evaluation Framework for Personal Health Records: Microsoft HealthVault Vs. Google Health , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[12]  M. Nyssen,et al.  Generating and Transmitting Ambulatory Electronic Medical Prescriptions , 2010 .

[13]  Behram F. T. Mistree,et al.  Gaydar: Facebook Friendships Expose Sexual Orientation , 2009, First Monday.

[14]  H. Graux,et al.  Privacywetgeving in de praktijk , 2009 .

[15]  Griet Verhenneman,et al.  Privacy and Digital Homecare , 2009 .

[16]  G. Eysenbach Medicine 2.0: Social Networking, Collaboration, Participation, Apomediation, and Openness , 2008, Journal of medical Internet research.

[17]  Peter Szolovits,et al.  Automated de-identification of free-text medical records , 2008, BMC Medical Informatics Decis. Mak..

[18]  Nhin December Forum The Nationwide Privacy and Security Framework for Electronic Exchange of Individually Identifiable Health Information , 2008 .

[19]  Sanjeev Gupta,et al.  Patient 2.0 Empowerment , 2008, SWWS.

[20]  Tim O'Reilly,et al.  What is Web 2.0: Design Patterns and Business Models for the Next Generation of Software , 2007 .

[21]  P. Jenkins,et al.  No more ‘personal notes’? Data protection policy and practice in Higher Education counselling services in the UK , 2007 .

[22]  Dallemand Jean-Francois,et al.  Status Report 2006 , 2007 .

[23]  Rebecca Wong,et al.  Data Protection online: Alternative approaches to Sensitive Data , 2006 .

[24]  Hugo Liu,et al.  Unraveling the Taste Fabric of Social Networks , 2006, Int. J. Semantic Web Inf. Syst..

[25]  N. Terry,et al.  The Emergence of National Electronic Health Record Architectures in the United States and Australia: Models, Costs, and Questions , 2005, Journal of medical Internet research.

[26]  Bruce Christianson,et al.  Federated identity-management protocols. Commentary. Authors' reply , 2005 .

[27]  James A. Landay,et al.  Personal privacy through understanding and action: five pitfalls for designers , 2004, Personal and Ubiquitous Computing.

[28]  Rebecca Herold,et al.  The practical guide to HIPAA privacy and security compliance , 2003 .

[29]  Birgit Pfitzmann,et al.  Federated Identity-Management Protocols , 2003, Security Protocols Workshop.

[30]  L. Bygrave Data Protection Law, Approaching Its Rationale, Logic and Limits , 2002 .

[31]  Jan Marco Leimeister,et al.  Mobile Communication and Computing in Healthcare - Designing and Implementing Mobile Virtual Communities for Cancer Patients , 2002 .

[32]  A. Policy Review of the 2002 Department of Health and Human Service Notice of Proposed Rule Making for The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy Regulations , 2002 .

[33]  Elizabeth D. Mynatt,et al.  Privacy Mirrors: Understanding and Shaping Socio-technical Ubiquitous Computing Systems , 2002 .

[34]  D. M. Douglas William and Mary Law Review , 1995 .

[35]  A. C. Evans European data protection law , 1981 .

[36]  Herbert Davies,et al.  Definition of Health , 1946 .