Confidentiality, Electronic Health Records, and the Clinician

@article{Graves2013ConfidentialityEH,
  title={Confidentiality, Electronic Health Records, and the Clinician},
  author={S. Graves},
  journal={Perspectives in Biology and Medicine},
  year={2013},
  volume={56},
  pages={105 - 125}
}
  • S. Graves
  • Published 2013
  • Medicine
  • Perspectives in Biology and Medicine
The advent of electronic health records (EHRs) to improve access and enable research in the everyday clinical world has simultaneously made medical information much more vulnerable to illicit, non-beneficent uses. This wealth of identified, aggregated data has and will attract attacks by domestic governments for surveillance and protection, foreign governments for espionage and sabotage, organized crime for illegal profits, and large corporations for “legal” profits. Against these powers with… Expand
6 Citations
Is Patient Confidentiality Compromised With the Electronic Health Record?: A Position Paper
  • 16
  • PDF
Cleaning up the paper trail - our clinical notes in open view.
If you build it, they will come: unintended future uses of organised health data collections
  • 37
Privacy and Confidentiality
Hipaa: A Flawed Piece of Legislation
  • 1
  • PDF

References

SHOWING 1-10 OF 43 REFERENCES
Cryptography and Network Security: Principles and Practice
  • 4,939
  • PDF
Web Security: Secure Socket Layer and Transport Layer Security
  • 1
Tiger Team presents MU Stage 1 privacy and security recommendations
  • 2010
Tiger Team presents MU Stage 1 privacy and security recommendations . HealthcareTechnologyNews, Aug. 19. http://news.avancehealth.com/2010/08/ tiger-team-presents-mu-stage-1-privacy.html
  • Tiger Team presents MU Stage 1 privacy and security recommendations . HealthcareTechnologyNews, Aug. 19. http://news.avancehealth.com/2010/08/ tiger-team-presents-mu-stage-1-privacy.html
  • 2010
2012.The NSA is building the country’s biggest spy center (watch what you
  • 2012
Case study: Computer virus containment at Fletcher Allen Health Care.HIT Community, Jan
  • 2012
New key technology simplifies data encryption in the cloud
  • PC World
  • 2012
...
1
2
3
4
5
...