2016
DOI: 10.1007/978-3-319-41264-1_36
|View full text |Cite
|
Sign up to set email alerts
|

Seampat

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…This IT system is protected by high-security mechanisms [33]. Patient authentication is by the electronic identity (eID) card and its PIN code.…”
Section: System Detailsmentioning
confidence: 99%
See 2 more Smart Citations
“…This IT system is protected by high-security mechanisms [33]. Patient authentication is by the electronic identity (eID) card and its PIN code.…”
Section: System Detailsmentioning
confidence: 99%
“…Both were developed according to recommendations by health IT experts [28][29][30][31][32]. Functional and non-functional 3 requirements for the low-fidelity prototypes were defined on the basis of needs analysis and literature review [19,33]. These then evolved to medium-and high-fidelity prototypes using an iterative user-centered design with three main iterations.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation