Literature DB >> 18239224

A review of security of electronic health records.

Khin Than Win1.   

Abstract

The objective of this study is to answer the research question, "Are current information security technologies adequate for electronic health records (EHRs)?" In order to achieve this, the following matters have been addressed in this article: (i) What is information security in the context of EHRs? (ii) Why is information security important for EHRs? and (iii) What are the current technologies for information security available to EHRs? It is concluded that current EHR security technologies are inadequate and urgently require improvement. Further study regarding information security of EHRs is indicated.

Mesh:

Year:  2005        PMID: 18239224     DOI: 10.1177/183335830503400105

Source DB:  PubMed          Journal:  Health Inf Manag        ISSN: 1833-3583            Impact factor:   3.185


  10 in total

1.  Application of portable CDA for secure clinical-document exchange.

Authors:  Kuo-Hsuan Huang; Sung-Huai Hsieh; Yuan-Jen Chang; Feipei Lai; Sheau-Ling Hsieh; Hsiu-Hui Lee
Journal:  J Med Syst       Date:  2009-02-25       Impact factor: 4.460

2.  Personal health record systems and their security protection.

Authors:  Khin Than Win; Willy Susilo; Yi Mu
Journal:  J Med Syst       Date:  2006-08       Impact factor: 4.460

3.  Consent mechanisms for electronic health record systems: a simple yet unresolved issue.

Authors:  Khin T Win; John A Fulcher
Journal:  J Med Syst       Date:  2007-04       Impact factor: 4.460

4.  Security and access of health research data.

Authors:  Willy Susilo; Khin Than Win
Journal:  J Med Syst       Date:  2007-04       Impact factor: 4.460

5.  Patient Expectations: Searching Websites on How to Apply to Access Medical Records.

Authors:  Kay Nicol; Kim Lehman; Joan Carlini; Kathleen Tori; Kerryn Butler-Henderson
Journal:  Int J Environ Res Public Health       Date:  2022-05-26       Impact factor: 4.614

6.  Patient Data Sharing and Confidentiality Practices of Researchers in Jordan.

Authors:  Reema A Karasneh; Sayer I Al-Azzam; Karem H Alzoubi; Sahar S Hawamdeh; Suhaib M Muflih
Journal:  Risk Manag Healthc Policy       Date:  2019-11-29

7.  Health information security: a case study of three selected medical centers in iran.

Authors:  Nafiseh Hajrahimi; Sayed Mehdi Hejazi Dehaghani; Abbas Sheikhtaheri
Journal:  Acta Inform Med       Date:  2013-03

8.  Image De-Identification Methods for Clinical Research in the XDS Environment.

Authors:  K Y E Aryanto; G van Kernebeek; B Berendsen; M Oudkerk; P M A van Ooijen
Journal:  J Med Syst       Date:  2016-01-26       Impact factor: 4.460

9.  Health Information Security in Hospitals: the Application of Security Safeguards.

Authors:  Esmaeil Mehraeen; Haleh Ayatollahi; Maryam Ahmadi
Journal:  Acta Inform Med       Date:  2016-02-02

10.  Assessing staff awareness and effectiveness of educational training on IT security and privacy in a large healthcare organization.

Authors:  Mubashir Aslam Arain; Rima Tarraf; Armghan Ahmad
Journal:  J Multidiscip Healthc       Date:  2019-01-09
  10 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.