The Role of Privacy Protection in Healthcare Information Systems Adoption
暂无分享,去创建一个
[1] Chien-Ding Lee,et al. A Novel Key Management Solution for Reinforcing Compliance With HIPAA Privacy/Security Regulations , 2011, IEEE Transactions on Information Technology in Biomedicine.
[2] Long Nguyen,et al. ISO/IEC 9798−6. Information technology – Security techniques – Entity authentication – Part 6: Mechanisms using manual data transfer , 2010 .
[3] Vijayalakshmi Atluri,et al. Role-based Access Control , 1992 .
[4] Akira Saito,et al. 拡張墨塗り署名を用いたコンテンツ編集事前制御システム;拡張墨塗り署名を用いたコンテンツ編集事前制御システム;A Pre-Control System to Edit Contents with an Extended Sanitizable Signature , 2013 .
[5] Lei-da Chen,et al. Mobile Payment Adoption in the US: A Cross-industry, Crossplatform Solution , 2005 .
[6] J. Nunnally. Psychometric Theory (2nd ed), New York: McGraw-Hill. , 1978 .
[7] Kyung Sup Kwak,et al. Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.
[8] Arun Vishwanath,et al. The impact of electronic medical record systems on outpatient workflows: A longitudinal evaluation of its workflow effects , 2010, Int. J. Medical Informatics.
[9] Klaus Wehrle,et al. Sensor network security for pervasive e-health , 2011, Secur. Commun. Networks.
[10] José Luis Fernández Alemán,et al. Personal Health Records: New Means to Safely Handle Health Data? , 2012, Computer.
[11] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[12] Carl A. Gunter,et al. Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems , 2011, IEEE Security & Privacy.
[13] Sokratis K. Katsikas. Health care management and information systems security: awareness, training or education? , 2000, Int. J. Medical Informatics.
[14] Dong Hoon Lee,et al. A Privacy-Strengthened Scheme for E-Healthcare Monitoring System , 2012, Journal of Medical Systems.
[15] Kaija Saranto,et al. Definition, structure, content, use and impacts of electronic health records: A review of the research literature , 2008, Int. J. Medical Informatics.
[16] Gail-Joon Ahn,et al. Patient-centric authorization framework for electronic healthcare services , 2011, Comput. Secur..
[17] C. Whan Park,et al. Students and Housewives: Differences in Susceptibility to Reference Group Influence , 1977 .
[18] Jung-Chi Pai,et al. The acceptance and use of customer relationship management (CRM) systems: An empirical study of distribution service industry in Taiwan , 2011, Expert Syst. Appl..
[19] Ahmad-Reza Sadeghi,et al. Securing the Access to Electronic Health Records on Mobile Phones , 2011, BIOSTEC.
[20] Minho Shin. Secure Remote Health Monitoring with Unreliable Mobile Devices , 2012, Journal of biomedicine & biotechnology.
[21] Pil Joong Lee,et al. Sanitizable Signatures Reconsidered , 2011, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[22] Peter A. Todd,et al. Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..
[23] Kamran Sartipi,et al. Behavior-based access control for distributed healthcare systems , 2013 .
[24] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[25] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[26] Donghee Don Shin. Understanding purchasing behaviors in a virtual economy: Consumer behavior involving virtual currency in Web 2.0 communities , 2008 .
[27] Yang Ming,et al. Identity-Based Sanitizable Signature Scheme in the Standard Model , 2010, ICICA.
[28] Vallabh Sambamurthy,et al. Sources of Influence on Beliefs about Information Technolgoy Use: An Empirical Study of Knowledge Workers , 2003, MIS Q..
[29] Tao Zhou,et al. Integrating TTF and UTAUT to explain mobile banking user adoption , 2010, Comput. Hum. Behav..
[30] J. Jeffrey Carr,et al. Patient-controlled sharing of medical imaging data across unaffiliated healthcare organizations , 2013, J. Am. Medical Informatics Assoc..
[31] Laura M. Roa,et al. Privilege Management Infrastructure for Virtual Organizations in Healthcare Grids , 2009, IEEE Transactions on Information Technology in Biomedicine.
[32] Suzanne Austin Boren,et al. The role of electronic medical record in care delivery in developing countries , 2008, Int. J. Inf. Manag..
[33] Dong-Hee Shin,et al. Towards an understanding of the consumer acceptance of mobile wallet , 2009, Comput. Hum. Behav..
[34] Isaac S. Kohane,et al. Strategies for maintaining patient privacy in i2b2 , 2011, J. Am. Medical Informatics Assoc..
[35] David Ting. Securing access to healthcare , 2011 .
[36] Thomas A. Horan,et al. Personal health records , 2011, Health Informatics J..
[37] Stefanos Gritzalis,et al. Secure Electronic Healthcare Records Management in Wireless Environments , 2011, J. Inf. Technol. Res..
[38] Detmar W. Straub,et al. Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs , 1999, MIS Q..
[39] Farid Touati,et al. U-Healthcare System: State-of-the-Art Review and Challenges , 2013, Journal of Medical Systems.
[40] Hua Wang,et al. Purpose Based Access Control for Privacy Protection in E-Healthcare Services , 2012, J. Softw..
[41] Lara Khansa,et al. Impact of HIPAA provisions on the stock market value of healthcare institutions, and information security and other information technology firms , 2012, Comput. Secur..
[42] Han-Yu Lin,et al. On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems , 2013, Journal of Medical Systems.
[43] Jihun Cha,et al. Security Requirements for the Medical Information Used by U- Healthcare Medical Equipment , 2013 .
[44] Jochen Wirtz,et al. Consumer online privacy concerns and responses: a power–responsibility equilibrium perspective , 2007 .
[45] Robyn Tamblyn,et al. Review Paper: The Impact of Electronic Health Records on Time Efficiency of Physicians and Nurses: A Systematic Review , 2005, J. Am. Medical Informatics Assoc..
[46] Yang Ming,et al. Provably Security Identity-based Sanitizable Signature Scheme Without Random Oracles , 2011, J. Softw..
[47] Anol Bhattacherjee,et al. Explaining information technology usage: A test of competing models☆ , 2008 .
[48] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[49] Bernd W. Wirtz,et al. Understanding consumer acceptance of mobile payment services: An empirical analysis , 2010, Electron. Commer. Res. Appl..
[50] Rema Padman,et al. Impact of health disclosure laws on health information exchanges. , 2011, AMIA ... Annual Symposium proceedings. AMIA Symposium.
[51] North Dakota,et al. Adoption of Electronic Health Records in , 2013 .
[52] S. R. Vinotha,et al. Privacy and security solutions for interoperable health information exchange , 2013, Int. J. Medical Eng. Informatics.
[53] Noboru Sonehara,et al. Aspects of privacy for electronic health records , 2011, Int. J. Medical Informatics.