Privacy Challenges in the Use of eHealth Systems for Public Health Management
暂无分享,去创建一个
[1] Khaled El Emam,et al. Privacy Interests in Prescription Data, Part I: Prescriber Privacy , 2009, IEEE Security & Privacy Magazine.
[2] Dixie B. Baker,et al. Privacy and Security in Public Health: Maintaining the Delicate Balance between Personal Privacy and Population Safety , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[3] Daniel L. Moody,et al. Using on-line medical knowledge to support evidence-based practice: a case study of a successful knowledge management project , 2002 .
[4] Han de Vries,et al. Are electronic health records ready for genomic medicine? , 2009, Genetics in Medicine.
[5] Harry Henderson. Privacy in the Information Age , 1999 .
[6] P. Ray,et al. Privacy Management in Consumer e-Health , 2007, 2007 9th International Conference on e-Health Networking, Application and Services.
[7] Pradeep Kumar Ray,et al. The Need for Technical Solutions for Maintaining the Privacy of EHR , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.
[8] Jeongeun Kim. The Development and Implementation of Patient Safety Information Systems (PSIS) , 2011 .
[9] Milan Petkovic,et al. Security, Privacy and Trust in Modern Data Management (Data-Centric Systems and Applications) , 2007 .
[10] Louis Phee,et al. Master-Slave Robotic System for Therapeutic Gastrointestinal Endoscopic Procedures , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.
[11] N. Wickramasinghe. Encyclopedia of Healthcare Information Systems , 2008 .
[12] Nuno Laranjeiro,et al. Benchmarking the Robustness of Web Services , 2007 .
[13] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[14] Gurpreet Dhillon,et al. Internet Privacy: Interpreting Key Issues , 2001, Inf. Resour. Manag. J..
[15] N. Bean,et al. Data management issues for emerging diseases and new tools for managing surveillance and laboratory data. , 1995, Emerging infectious diseases.
[16] Charles K. Ayo,et al. On Sharp Boundary Problem in Rule Based Expert Systems in the Medical Domain , 2010, Int. J. Heal. Inf. Syst. Informatics.
[17] Thomas Neubauer,et al. Applying a Threshold Scheme to the Pseudonymization of Health Data , 2007 .
[18] James H. Moor,et al. Towards a theory of privacy in the information age , 1997, CSOC.
[19] Herman T. Tavani,et al. PHILOSOPHICAL THEORIES OF PRIVACY: IMPLICATIONS FOR AN ADEQUATE ONLINE PRIVACY POLICY , 2007 .
[20] James G. Anderson,et al. Social, ethical and legal barriers to E-health , 2007, Int. J. Medical Informatics.
[21] S. Sastry,et al. Security and Privacy Issues with Health Care Information Technology , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.
[22] Shinji Mase,et al. The guideline of the personal health data structure to secure safety healthcare: The balance between use and protection to satisfy the patients' needs , 2007, Int. J. Medical Informatics.
[23] Chien-Ding Lee,et al. A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations , 2008, IEEE Transactions on Information Technology in Biomedicine.
[24] H. Jeff Smith,et al. Values, personal information privacy, and regulatory approaches , 1995, CACM.
[25] Maria Moloney,et al. Online Privacy: Measuring Individuals' Concerns , 2008, EC-Web.
[26] Bradley Malin,et al. A computational model to protect patient data from location-based re-identification , 2007, Artif. Intell. Medicine.
[27] Mark S. Ackerman,et al. Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.
[28] Joseph Tan. Advancing Technologies and Intelligence in Healthcare and Clinical Environments: Breakthroughs , 2012 .
[29] A. Dwivedi. Handbook of Research on Information Technology Management and Clinical Data Administration in Healthcare , 2009 .