Skip to main content

Security of Healthcare Information Systems

  • Chapter
Consumer Health Informatics

Part of the book series: Health Informatics ((HI))

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bodenheimer T, Grumbach K. Electronic technology: a spark to revitalize primary care? JAMA 2003;9: 259–64.

    Google Scholar 

  2. Austin RD, Darby CA. The myth of secure computing. Harv Bus Rev 2003;81:120–6, 138.

    PubMed  Google Scholar 

  3. Mendelson D. Travels of a medical record and the myth of privacy. J Law Med 2003;11:136–45.

    PubMed  Google Scholar 

  4. Schoenberg R, Safran C. Internet based repository of medical records that retains patient confidentiality. Br Med J 2000;321:1199–203.

    CAS  Google Scholar 

  5. Russell J. Confidentiality of patients’ information must be guaranteed. Br Med J 2003;327: 812.

    Google Scholar 

  6. Gostin LO. National health information privacy: regulations under the Health Insurance Portability and Accountability Act. JAMA 2001;285:3015–21.

    Article  PubMed  CAS  Google Scholar 

  7. Schoenberg R, Nathanson L, Safran C, Sands DZ. Weaving the Web into legacy information systems. Proc AMIA Symp 2000;769–73.

    Google Scholar 

  8. Safran C. Health care in the information society. Int J Med Inform 2002;66:23–4.

    PubMed  Google Scholar 

  9. Rigby M, Roberts R, Williams J, Clark J, Savill A, Lervy B, Mooney G. Integrated record keeping as an essential aspect of a primary care led health service. Br Med J 1998;317:579–82.

    CAS  Google Scholar 

  10. Motta GH, Furuie SS. A contextual role-based access control authorization model for electronic patient record. IEEE Trans Inform Technol Biomed 2003;7:202–7.

    Article  Google Scholar 

  11. Wiederhold G, Bilello M, Sarathy V, Qian X. A security mediator for health care information. Proc AMIA Symp 1996;120–4.

    Google Scholar 

  12. Asaro PV, Herting RL Jr, Roth AC, Barnes MR. Effective audit trails—a taxonomy for determination of information requirements. Proc AMIA Symp 1999;663–5.

    Google Scholar 

  13. Annas GJ. HIPAA regulations—a new era of medical-record privacy? N Engl J Med 2003;348: 1486–90.

    PubMed  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer Science+Business Media, Inc.

About this chapter

Cite this chapter

Schoenberg, R. (2005). Security of Healthcare Information Systems. In: Lewis, D., Eysenbach, G., Kukafka, R., Stavri, P.Z., Jimison, H.B. (eds) Consumer Health Informatics. Health Informatics. Springer, New York, NY. https://doi.org/10.1007/0-387-27652-1_14

Download citation

  • DOI: https://doi.org/10.1007/0-387-27652-1_14

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-0-387-23991-0

  • Online ISBN: 978-0-387-27652-6

  • eBook Packages: MedicineMedicine (R0)

Publish with us

Policies and ethics