Handbook of Research on Distributed Medical Informatics and E-Health
暂无分享,去创建一个
[1] M. Akrich. 5. Comment sortir de la dichotomie technique/société , 1994 .
[2] A Winter,et al. Modeling Hospital Information Systems (Part 1): The Revised Three-layer Graph-based Meta Model 3LGM2 , 2003, Methods of Information in Medicine.
[3] B. Emmerich,et al. Data quality in computerized patient records , 1994, International journal of clinical monitoring and computing.
[4] Ana Silva,et al. Why facilitate patient access to medical records. , 2007, Studies in health technology and informatics.
[5] J J Mamlin,et al. Combined time-motion and work sampling study in a general medicine clinic. , 1973, Medical care.
[6] I. Sim,et al. Physicians' use of electronic medical records: barriers and solutions. , 2004, Health affairs.
[7] E. Shortliffe,et al. Medical informatics. An emerging academic discipline and institutional priority. , 1990, JAMA.
[8] Bernd Blobel,et al. Authorisation and access control for electronic health record systems , 2004, Int. J. Medical Informatics.
[9] Gustavo Alonso,et al. Web Services , 2004, Data-Centric Systems and Applications.
[10] L. Aiken,et al. Hospital nurse staffing and patient mortality, nurse burnout, and job dissatisfaction. , 2002, JAMA.
[11] David Chadwick,et al. Access control: how can it improve patients' healthcare? , 2007, Studies in health technology and informatics.
[12] M G Arellano,et al. Issues in identification and linkage of patient records across an integrated delivery system. , 1998, Journal of healthcare information management : JHIM.
[13] E. B. Steen,et al. The Computer-Based Patient Record: An Essential Technology for Health Care , 1992, Annals of Internal Medicine.
[14] Ab R. Bakker,et al. Access to EHR and access control at a moment in the past: a discussion of the need and an exploration of the consequences , 2004, Int. J. Medical Informatics.
[15] Edward H. Shortliffe,et al. Evaluation Methods in Biomedical Informatics , 2000 .
[16] Jonathan Kies,et al. User and task analysis for interface design , 1998 .
[17] Kenric W. Hammond,et al. Are Electronic Medical Records Trustworthy? Observations on Copying, Pasting and Duplication , 2003, AMIA.
[18] Ricardo João Cruz Correia,et al. Integration of hospital data using agent technologies - A case study , 2005, AI Commun..
[19] R H Richart,et al. Evaluation of a medical data system. , 1970, Computers and biomedical research, an international journal.
[20] Ana Ferreira,et al. Monitoring the integration of hospital information systems: How it may ensure and improve the quality of data. , 2006, Studies in health technology and informatics.
[21] Claude Sicotte,et al. Assessment of a computerized medical record system: disclosing scripts of use , 1999 .
[22] Emil Jovanov,et al. Guest Editorial Introduction to the Special Section on M-Health: Beyond Seamless Mobility and Global Wireless Health-Care Connectivity , 2004, IEEE Transactions on Information Technology in Biomedicine.
[23] P. Lehoux. The problem of health technology : policy implications for modern health care systems , 2006 .
[24] O Barnett,et al. Computers in medicine. , 1990, JAMA.
[25] David W. Chadwick,et al. How to Break Access Control in a Controlled Manner , 2006, 19th IEEE Symposium on Computer-Based Medical Systems (CBMS'06).
[26] E. B. Steen,et al. The Computer-Based Patient Record , 1997 .
[27] Eta S. Berner,et al. Viewpoint Paper: Informatics Challenges for the Impending Patient Information Explosion , 2005, J. Am. Medical Informatics Assoc..
[28] Robert Yu,et al. The Challenges for the Adoption of M-Health , 2006, 2006 IEEE International Conference on Service Operations and Logistics, and Informatics.
[29] Catherine Quantin,et al. A peculiar aspect of patients' safety: the discriminating power of identifiers for record linkage. , 2004, Studies in health technology and informatics.
[30] Peter Sewell,et al. Cassandra: flexible trust management, applied to electronic health records , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[31] Lisa Sprague,et al. Electronic health records: How close? How far to go? , 2004, NHPF issue brief.
[32] Bruce Schneier,et al. Secrets and Lies: Digital Security in a Networked World , 2000 .
[33] Uwe Hansmann,et al. Pervasive Computing: The Mobile World , 2003 .
[34] T L Lincoln,et al. The computer-stored medical record. For whom? , 1988, JAMA.
[35] Nuria Oliver,et al. HealthGear: a real-time wearable system for monitoring and analyzing physiological signals , 2006, International Workshop on Wearable and Implantable Body Sensor Networks (BSN'06).
[36] Janice Redish,et al. User and task analysis for interface design , 1998 .
[37] Michael M. Wagner,et al. Review: Accuracy of Data in Computer-based Patient Records , 1997, J. Am. Medical Informatics Assoc..
[38] D. Pinto. Secrets and Lies: Digital Security in a Networked World , 2003 .
[39] Robert H. Miller,et al. Physician use of IT: results from the Deloitte Research Survey. , 2004, Journal of healthcare information management : JHIM.
[40] Shon Harris,et al. CISSP All-in-One Exam Guide , 2001 .
[41] Jeremy C Wyatt,et al. Helping clinicians to find data and avoid delays , 1998, The Lancet.
[42] David W. Chadwick,et al. ‘ R-Whatq ’ Development of a role-based access control policy-writing tool for e-Scientists: Research Articles , 2005 .
[43] Gunther Eysenbach,et al. Consumer health informatics , 2000, BMJ : British Medical Journal.
[44] R. Kling. Computerization and Social Transformations , 1991 .
[45] Amnon Shabo,et al. Model Formulation: HL7 Clinical Document Architecture, Release 2 , 2006, J. Am. Medical Informatics Assoc..
[46] Charles Safran,et al. Collaborative Approaches to e-Health: Valuable for Users and Non-users , 2005, MIE.
[47] Shon Harris. All-in-one CISSP certification exam guide , 2003 .