The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.11 - Nov. (2012 vol.45)
pp: 27-33
Inmaculada Carrión Señor , University of Murcia, Spain
José Luis Fernández Alemán , University of Murcia, Spain
Ambrosio Toval , University of Murcia, Spain
ABSTRACT
Personal health records offer a way to manage health data while lessening healthcare costs, improving patient data quality, and fostering healthcare efficiency, but privacy and security issues are particularly important considerations for PHR designers.
INDEX TERMS
Medical information systems, Electronic medical records, Costs, Medical services, Privacy, privacy, medical information systems, electronic health records, computer applications, security
CITATION
Inmaculada Carrión Señor, José Luis Fernández Alemán, Ambrosio Toval, "Personal Health Records: New Means to Safely Handle Health Data?", Computer, vol.45, no. 11, pp. 27-33, Nov. 2012, doi:10.1109/MC.2012.285
REFERENCES
1. D.C. Kaelber et al., “A Research Agenda for Personal Health Records (PHRs),” J. Am. Medical Informatics Assoc., vol. 15, no. 6, 2008, pp. 729-736.
2. G.L. Yau, A.S. Williams, and J.B. Brown, “Family Physicians' Perspectives on Personal Health Records: Qualitative Study,” Canadian Family Physician, May 2011, pp. e178-e184.
3. P.C. Tang et al., “Personal Health Records: Definitions, Benefits, and Strategies for Overcoming Barriers to Adoption,” J. Am. Medical Information Assoc., Mar./Apr. 2006, pp. 121-126.
4. I. Carrión, J.L. Fernández-Alemán, and A. Toval, “Assessing the HIPAA Standard in Practice: PHR Privacy Policies,” Proc. 33rd Ann. Int'l Conf. Engineering in Medicine and Biology Soc. (EMBC 11), IEEE, 2011, pp. 2380-2383.
5. I. Carrión, J.L. Fernández-Alemán, and A. Toval, “Usable Privacy and Security in Personal Health Records,” Proc. Conf. Human-Computer Interaction (Interact 11), LNC S 6949, Springer, 2011, pp. 36-43.
6. I. Carrión et al., “Evaluation and Neuronal Network-Based Classification of the PHRs Privacy Policies,” Proc. Hawaii Int'l Conf. System Sciences (HICSS 12), IEEE, 2012, pp. 2840-2849.
7. L. Sweeney, “k-Anonymity: A Model for Protecting Privacy,” Int'l J. Uncertainty Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, 2002, pp. 557-570.
8. A. Narayanan and V. Shmatikov, “De-Anonymizing Social Networks,” Proc. 30th Symp. Security and Privacy (S&P 09), IEEE, 2009, pp. 173-187.
9. E. Kuada, H. Olesen, and A. Henten, “Public Policy and Regulatory Implications for the Implementation of Opportunistic Cloud Computing Services for Enterprises,” Proc. 9th Int'l Workshop on Security in Information Systems, pp. 3-13; www.iceis.org/Abstracts/2012WOSIS_2012_abstracts.htm .
10. I. Carrión, J.L. Fernández-Alemán, and A. Toval, “Are Personal Health Records Safe? A Review of Free Web-Accessible Personal Health Record Privacy Policies,” J. Medical Internet Research, vol. 14, no. 4, 2012, p. e114.
11. A.A. Boxwala et al., “Using Statistical and Machine Learning to Help Institutions Detect Suspicious Access to Electronic Health Records,” J. Am. Medical Information Assoc., vol. 18, no. 4, 2011, pp. 498-505.
29 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool