2006
DOI: 10.1109/iembs.2006.4398689
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy Issues with Health Care Information Technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0
3

Year Published

2008
2008
2021
2021

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 35 publications
(32 citation statements)
references
References 0 publications
0
29
0
3
Order By: Relevance
“…While other researchers focus on specific issues like access control or cryptographic controls [1, 36] a broader view at the ISMS processes is also required.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…While other researchers focus on specific issues like access control or cryptographic controls [1, 36] a broader view at the ISMS processes is also required.…”
Section: Discussionmentioning
confidence: 99%
“…Research on the various security issues regarding information computing in health care environments has been done in the past. While other researchers focus on specific issues like access control or cryptographic controls [ 1 , 36 ] a broader view at the ISMS processes is also required.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Key elements include the ability to track access and modification to records; giving the patient a degree of control over who can access their information, typically with an override policy for urgent situations (Mandl et al, 2001); limiting information access to clinicians with a direct therapeutic relationship (Lovis et al, 2007); and encryption (Meingast et al, 2006). Key elements include the ability to track access and modification to records; giving the patient a degree of control over who can access their information, typically with an override policy for urgent situations (Mandl et al, 2001); limiting information access to clinicians with a direct therapeutic relationship (Lovis et al, 2007); and encryption (Meingast et al, 2006).…”
Section: R M Plovnickmentioning
confidence: 99%
“…Given the time critical nature of health care interventions, Wireless Sensor Networks (WSN) in medical applications must have well-defined reliability and trustworthiness metrics. The issues regarding the laws and policies surrounding privacy of health care information has been discussed in detail in [3]. The main focus of the research presented in this paper is to develop tools to defend the health care system against malicious intrusions, such as the insertion of malicious data, which would result in compromising the integrity of the entire system and the privacy of its users.…”
Section: Introductionmentioning
confidence: 99%