{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:30Z","timestamp":1740099150305,"version":"3.37.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030010775"},{"type":"electronic","value":"9783030010782"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01078-2_14","type":"book-chapter","created":{"date-parts":[[2018,9,21]],"date-time":"2018-09-21T09:20:29Z","timestamp":1537521629000},"page":"156-163","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Analysing the Impact of Electronic Health Records"],"prefix":"10.1007","author":[{"given":"Ziheng","family":"Wang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,9,22]]},"reference":[{"key":"14_CR1","unstructured":"President\u2019s Council of Advisors on Science and Technology (PCAST): Executive Office of the President, Report to the President Realizing the Full Potential of the Health Information Technology to Improve Healthcare for Americans: The Path Forward (2010)"},{"key":"14_CR2","doi-asserted-by":"crossref","first-page":"663","DOI":"10.2991\/ijcis.11.1.51","volume":"11","author":"E Kabir","year":"2018","unstructured":"Kabir, E., et al.: A computer aided analysis scheme for detecting epileptic seizure from EEG data. Int. J. Comput. Intell. Syst. 11, 663\u2013671 (2018)","journal-title":"Int. J. Comput. Intell. Syst."},{"issue":"8","key":"14_CR3","first-page":"e4","volume":"3","author":"P Vimalachandran","year":"2016","unstructured":"Vimalachandran, P., et al.: The Australian PCEHR system: ensuring privacy and security through an improved access control mechanism. EAI Endorsed Trans. Scalable Inf. Syst. 3(8), e4 (2016)","journal-title":"EAI Endorsed Trans. Scalable Inf. Syst."},{"key":"14_CR4","unstructured":"Australian Health Survey: Health service usage and health related actions, 2011\u201312. http:\/\/www.abs.gov.au\/ausstats\/abs@.nsf\/lookup\/E334D0A98272E4DCCA257B39000F2DCF?opendocument . Accessed 5 July 2018"},{"key":"14_CR5","doi-asserted-by":"crossref","first-page":"6554","DOI":"10.1109\/ACCESS.2016.2612242","volume":"4","author":"S Supriya","year":"2016","unstructured":"Supriya, S., et al.: Weighted visibility graph with complex network features in the detection of epilepsy. IEEE Access 4, 6554\u20136566 (2016)","journal-title":"IEEE Access"},{"key":"14_CR6","first-page":"161","volume-title":"Public finance in Canada","author":"H Rosen","year":"2012","unstructured":"Rosen, H., Wen, J., Snoddon, T.: Public finance in Canada, 4th edn, pp. 161\u2013172. McGraw-Hill Ryerson Limited, USA (2012)","edition":"4"},{"key":"14_CR7","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/978-3-642-00416-2_3","volume-title":"Handbook on Business Process Management 1","author":"P Harmon","year":"2010","unstructured":"Harmon, P.: The scope and evolution of business process management. In: vom Brocke, J., Rosemann, M. (eds.) Handbook on Business Process Management 1, pp. 50\u201352. Springer, Berlin (2010). https:\/\/doi.org\/10.1007\/978-3-642-00416-2_3"},{"issue":"2","key":"14_CR8","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1162\/003355398555649","volume":"113","author":"M Cutler","year":"1998","unstructured":"Cutler, M., Sarah, R.: Paying for health insurance: the trade-off between competition and adverse selection. Q. J. Econ. 113(2), 433\u2013466 (1998)","journal-title":"Q. J. Econ."},{"key":"14_CR9","unstructured":"Smith, W.: Why Processes Matter II: Efficiency (2018)"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Siuly, S., et al.: Exploring sampling in the detection of multicategory EEG signals. Comput. Math. Methods Med. 10\u201322 (2015)","DOI":"10.1155\/2015\/576437"},{"issue":"4","key":"14_CR11","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/s11280-011-0114-8","volume":"14","author":"M Li","year":"2011","unstructured":"Li, M., et al.: Privacy-aware access control with trust management in web service. World Wide Web 14(4), 407\u2013430 (2011)","journal-title":"World Wide Web"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Thongkam, J., et al.: AdaBoost algorithm with random forests for predicting breast cancer survivability. In: IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence), pp. 3062\u20133069 (2008)","DOI":"10.1109\/IJCNN.2008.4634231"},{"key":"14_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1007\/978-3-319-68786-5_43","volume-title":"Web Information Systems Engineering \u2013 WISE 2017","author":"P Vimalachandran","year":"2017","unstructured":"Vimalachandran, P., et al.: Cryptographic access control in electronic health record systems: a security implication. In: Bouguettaya, A., et al. (eds.) WISE 2017. LNCS, vol. 10570, pp. 540\u2013549. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-68786-5_43"},{"key":"14_CR14","unstructured":"Nohria, N., Beer, M.: Cracking the Code of Change. Harvard Business Review (2000). https:\/\/hbr.org\/2000\/05\/cracking-the-code-of-change . Accessed 5 July 2018"},{"issue":"3","key":"14_CR15","doi-asserted-by":"crossref","first-page":"461","DOI":"10.2307\/25148692","volume":"29","author":"L LaPointe","year":"2005","unstructured":"LaPointe, L., Rivard, S.: A multilevel model of resistance to information technology implementation. MIS Q. 29(3), 461\u2013491 (2005)","journal-title":"MIS Q."},{"key":"14_CR16","unstructured":"Mendoza, A: Change Management (2018)"},{"key":"14_CR17","unstructured":"Australian Institute of Health and Welfare: Australia\u2019s Health. Australia\u2019s health series no. 15. Cat. no. AUS 199. Australia Government, Canberra, p. 3 (2016)"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Sun, L., et al.: Semantic access control for cloud computing based on e-Healthcare. In: 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD) (2012)","DOI":"10.1109\/CSCWD.2012.6221866"},{"issue":"3","key":"14_CR19","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1109\/TKDE.2005.35","volume":"17","author":"H Wang","year":"2005","unstructured":"Wang, H., et al.: A flexible payment scheme and its role-based access control. IEEE Trans. Knowl. Data Eng. 17(3), 425\u2013436 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"4","key":"14_CR20","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1093\/comjnl\/bxr028","volume":"55","author":"X Sun","year":"2012","unstructured":"Sun, X., et al.: Satisfying privacy requirements before data anonymization. Comput. J. 55(4), 422\u2013437 (2012)","journal-title":"Comput. J."},{"issue":"1","key":"14_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11280-017-0490-9","volume":"21","author":"H Wang","year":"2018","unstructured":"Wang, H., et al.: Special issue on security and privacy of IoT. World Wide Web 21(1), 1\u20136 (2018)","journal-title":"World Wide Web"},{"issue":"3","key":"14_CR22","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1007\/s10618-010-0208-4","volume":"23","author":"X Sun","year":"2011","unstructured":"Sun, X., et al.: Publishing anonymous survey rating data. Data Min. Knowl. Discov. 23(3), 379\u2013406 (2011)","journal-title":"Data Min. Knowl. Discov."},{"issue":"4","key":"14_CR23","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1007\/s11280-013-0218-4","volume":"17","author":"J Zhang","year":"2014","unstructured":"Zhang, J., et al.: Outlier detection from large distributed databases. World Wide Web 17(4), 539\u2013568 (2014)","journal-title":"World Wide Web"},{"issue":"5","key":"14_CR24","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TDSC.2015.2483503","volume":"14","author":"J Zhang","year":"2017","unstructured":"Zhang, J., et al.: On efficient and robust anonymization for privacy protection on massive streaming categorical information. IEEE Trans. Dependable Secure Comput. 14(5), 507\u2013520 (2017)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"14_CR25","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1111\/j.1539-6975.2009.01337.x","volume":"77","author":"A Cohen","year":"2010","unstructured":"Cohen, A., Siegelman, P.: Testing for adverse selection in insurance markets. J. Risk Insur. 77(1), 39\u201384 (2010)","journal-title":"J. Risk Insur."},{"issue":"11","key":"14_CR26","first-page":"2443","volume":"7","author":"L Sun","year":"2012","unstructured":"Sun, L., et al.: Purpose based access control for privacy protection in e-healthcare services. J. Softw. 7(11), 2443\u20132449 (2012)","journal-title":"J. Softw."}],"container-title":["Lecture Notes in Computer Science","Health Information Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01078-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T11:09:33Z","timestamp":1571915373000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01078-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030010775","9783030010782"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01078-2_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"HIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Health Information Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cairns, QLD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"his22018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.his-conferences.org\/2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}