{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:41:25Z","timestamp":1726036885805},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030235215"},{"type":"electronic","value":"9783030235222"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-23522-2_28","type":"book-chapter","created":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T19:03:41Z","timestamp":1562699021000},"page":"219-224","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Framework for Enhancing Health Information Data Security: Application of the Consolidated Framework for Implementation Research to Breach Analysis"],"prefix":"10.1007","author":[{"given":"Niya","family":"Werts","sequence":"first","affiliation":[]},{"given":"Subrata","family":"Acharya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,6]]},"reference":[{"issue":"14","key":"28_CR1","doi-asserted-by":"publisher","first-page":"1471","DOI":"10.1001\/jama.2015.2252","volume":"313","author":"V Liu","year":"2015","unstructured":"Liu, V., Musen, M.A., Chou, T.: Data breaches of protected health information in the United States. JAMA 313(14), 1471\u20131473 (2015)","journal-title":"JAMA"},{"key":"28_CR2","unstructured":"Wikina, S. B.: What caused the breach? An examination of use of information technology and health data breaches. Perspect. Health Inform. Manag. 11(Fall) (2014)"},{"issue":"2","key":"28_CR3","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1136\/amiajnl-2013-002079","volume":"21","author":"IT Agaku","year":"2013","unstructured":"Agaku, I.T., Adisa, A.O., Ayo-Yusuf, O.A., Connolly, G.N.: Concern about security and privacy, and perceived control over collection and use of health information are related to withholding of health information from healthcare providers. J. Am. Med. Inform. Assoc. 21(2), 374\u2013378 (2013)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"28_CR4","unstructured":"Consolidated framework for implementation research guide. \n                    http:\/\/www.cfir.org\n                    \n                  . Accessed 3 Mar 2019"},{"issue":"1","key":"28_CR5","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1186\/1748-5908-4-50","volume":"4","author":"LJ Damschroder","year":"2009","unstructured":"Damschroder, L.J., Aron, D.C., Keith, R.E., Kirsh, S.R., Alexander, J.A., Lowery, J.C.: Fostering implementation of health services research findings into practice: a consolidated framework for advancing implementation science. Implement. Sci. 4(1), 50 (2009)","journal-title":"Implement. Sci."},{"issue":"Winter","key":"28_CR6","first-page":"1g","volume":"16","author":"S Acharya","year":"2019","unstructured":"Acharya, S., Werts, N.: Toward the design of an engagement tool for effective electronic health record adoption. Perspect. Health Inform. Manag. 16(Winter), 1g (2019)","journal-title":"Perspect. Health Inform. Manag."},{"key":"28_CR7","unstructured":"HITECH Enforcement Act. \n                    https:\/\/www.hhs.gov\/hipaa\/for-professionals\/special-topics\/hitech-act-enforcement-interim-final-rule\/index.html\n                    \n                  . Accessed 3 Mar 2019"},{"key":"28_CR8","unstructured":"HITRUST CSF. \n                    https:\/\/hitrustalliance.net\/hitrust-csf\/\n                    \n                  . Accessed 3 Mar 2019"},{"key":"28_CR9","unstructured":"NIST. \n                    https:\/\/csrc.nist.gov\/projects\/risk-management\/risk-management-framework-(RMF)Overview\n                    \n                  . Accessed 3 Mar 2019"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Nieles, M., Dempsey, K., Pillitteri, V.: An Introduction to Information Security (No. NIST Special Publication (SP) 800-12 Rev. 1 (Draft), National Institute of Standards and Technology (2017)","DOI":"10.6028\/NIST.SP.800-12r1"}],"container-title":["Communications in Computer and Information Science","HCI International 2019 - Posters"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-23522-2_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T19:43:05Z","timestamp":1562701385000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-23522-2_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030235215","9783030235222"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-23522-2_28","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"6 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando, FL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2019.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}