What electronic health records don’t know just yet. A privacy analysis for patient communities and health records interaction
暂无分享,去创建一个
Wouter Joosen | Riccardo Scandariato | Jos Dumortier | Kim Wuyts | Griet Verhenneman | W. Joosen | J. Dumortier | R. Scandariato | Kim Wuyts | G. Verhenneman
[1] Benjamin Hasić,et al. Electronic Health Book—a unique Czech solution for eHealth , 2011 .
[2] Changjie Wang,et al. An interoperable security framework for connected healthcare , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).
[3] K. Emam. Methods for the de-identification of electronic health records for genomic research , 2011, Genome Medicine.
[4] Wouter Joosen,et al. Integrating Patient Consent in e-Health Access Control , 2011, Int. J. Secur. Softw. Eng..
[5] Colin P. McCarthy. Paging Dr. Google: Personal Health Records and Patient Privacy , 2010 .
[6] Silvina Santana,et al. Online Communication Between Doctors and Patients in Europe: Status and Perspectives , 2010, Journal of medical Internet research.
[7] L. Engelen,et al. Definition of Health 2.0 and Medicine 2.0: A Systematic Review , 2010, Journal of medical Internet research.
[8] Vitaly Shmatikov,et al. Myths and fallacies of "Personally Identifiable Information" , 2010, Commun. ACM.
[9] James B. Williams,et al. Social networking applications in health care: threats to the privacy and security of health information , 2010, SEHC '10.
[10] Kristen LeFevre,et al. Privacy wizards for social networking sites , 2010, WWW '10.
[11] Helmut Krcmar,et al. Evaluation Framework for Personal Health Records: Microsoft HealthVault Vs. Google Health , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[12] M. Nyssen,et al. Generating and Transmitting Ambulatory Electronic Medical Prescriptions , 2010 .
[13] Behram F. T. Mistree,et al. Gaydar: Facebook Friendships Expose Sexual Orientation , 2009, First Monday.
[14] H. Graux,et al. Privacywetgeving in de praktijk , 2009 .
[15] Griet Verhenneman,et al. Privacy and Digital Homecare , 2009 .
[16] G. Eysenbach. Medicine 2.0: Social Networking, Collaboration, Participation, Apomediation, and Openness , 2008, Journal of medical Internet research.
[17] Peter Szolovits,et al. Automated de-identification of free-text medical records , 2008, BMC Medical Informatics Decis. Mak..
[18] Nhin December Forum. The Nationwide Privacy and Security Framework for Electronic Exchange of Individually Identifiable Health Information , 2008 .
[19] Sanjeev Gupta,et al. Patient 2.0 Empowerment , 2008, SWWS.
[20] Tim O'Reilly,et al. What is Web 2.0: Design Patterns and Business Models for the Next Generation of Software , 2007 .
[21] P. Jenkins,et al. No more ‘personal notes’? Data protection policy and practice in Higher Education counselling services in the UK , 2007 .
[22] Dallemand Jean-Francois,et al. Status Report 2006 , 2007 .
[23] Rebecca Wong,et al. Data Protection online: Alternative approaches to Sensitive Data , 2006 .
[24] Hugo Liu,et al. Unraveling the Taste Fabric of Social Networks , 2006, Int. J. Semantic Web Inf. Syst..
[25] N. Terry,et al. The Emergence of National Electronic Health Record Architectures in the United States and Australia: Models, Costs, and Questions , 2005, Journal of medical Internet research.
[26] Bruce Christianson,et al. Federated identity-management protocols. Commentary. Authors' reply , 2005 .
[27] James A. Landay,et al. Personal privacy through understanding and action: five pitfalls for designers , 2004, Personal and Ubiquitous Computing.
[28] Rebecca Herold,et al. The practical guide to HIPAA privacy and security compliance , 2003 .
[29] Birgit Pfitzmann,et al. Federated Identity-Management Protocols , 2003, Security Protocols Workshop.
[30] L. Bygrave. Data Protection Law, Approaching Its Rationale, Logic and Limits , 2002 .
[31] Jan Marco Leimeister,et al. Mobile Communication and Computing in Healthcare - Designing and Implementing Mobile Virtual Communities for Cancer Patients , 2002 .
[32] A. Policy. Review of the 2002 Department of Health and Human Service Notice of Proposed Rule Making for The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy Regulations , 2002 .
[33] Elizabeth D. Mynatt,et al. Privacy Mirrors: Understanding and Shaping Socio-technical Ubiquitous Computing Systems , 2002 .
[34] D. M. Douglas. William and Mary Law Review , 1995 .
[35] A. C. Evans. European data protection law , 1981 .
[36] Herbert Davies,et al. Definition of Health , 1946 .