{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:18:20Z","timestamp":1742919500900,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642117442"},{"type":"electronic","value":"9783642117459"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11745-9_9","type":"book-chapter","created":{"date-parts":[[2010,2,16]],"date-time":"2010-02-16T02:54:28Z","timestamp":1266288868000},"page":"51-61","source":"Crossref","is-referenced-by-count":1,"title":["Enabling Technology to Advance Health-Protecting Individual Rights-Are We Walking the Talk?"],"prefix":"10.1007","author":[{"given":"Crystal","family":"Sharp","sequence":"first","affiliation":[]},{"given":"Femida","family":"Gwadry-Sridhar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"publisher","first-page":"21","DOI":"10.18848\/1832-3669\/CGP\/v05i02\/55979","volume":"5","author":"R. Mann","year":"2009","unstructured":"Mann, R., Gwadry-Sridhar, F., Bowman, S., Soer, J.: How to Develop a Common Platform to Enable Interdisciplinary Research. International Journal of Technology, Knowledge and Society\u00a05, 21\u201338 (2009)","journal-title":"International Journal of Technology, Knowledge and Society"},{"key":"9_CR2","doi-asserted-by":"publisher","first-page":"1653","DOI":"10.1056\/NEJMp0801736","volume":"358","author":"R. Steinbrook","year":"2008","unstructured":"Steinbrook, R.: Personally Controlled Online Health Data \u2013 The Next Big Thing in Medical Care? N. Engl. J. Med.\u00a0358, 1653\u20131656 (2008)","journal-title":"N. Engl. J. Med."},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"1628","DOI":"10.1056\/NEJMsa0900592","volume":"360","author":"A.K. Jha","year":"2009","unstructured":"Jha, A.K., DesRoches, C.M., Campbell, E.G., Donelan, K., Rao, S.R., Ferris, T.G., Shields, A., Rosenbaum, S., Blumenthal, D.: Use of electronic health records in U.S. hospitals. N. Engl. J. Med.\u00a0360, 1628\u20131638 (2009)","journal-title":"N. Engl. J. Med."},{"key":"9_CR4","unstructured":"Economist, Medine goes digital: A special report on healthcare and technology. Economist, 1\u201316 (2009)"},{"key":"9_CR5","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1377\/hlthaff.28.2.416","volume":"28","author":"D. McGraw","year":"2009","unstructured":"McGraw, D., Dempsey, J.X., Harris, L., Goldman, J.: Privacy As An Enabler, Not An Impediment: Building Trust Into Health Information Exchange. Health Aff.\u00a028, 416\u2013427 (2009)","journal-title":"Health Aff."},{"key":"9_CR6","first-page":"2","volume":"22","author":"R.D. Lang","year":"2008","unstructured":"Lang, R.D.: Blurring the lines: who owns the medical data home? J. Healthc. Inf. Manag.\u00a022, 2\u20134 (2008)","journal-title":"J. Healthc. Inf. Manag."},{"key":"9_CR7","doi-asserted-by":"publisher","first-page":"3","DOI":"10.2196\/jmir.7.1.e3","volume":"7","author":"T.D. Gunter","year":"2005","unstructured":"Gunter, T.D., Terry, N.P.: The emergence of national electronic health record architectures in the United States and Australia: models, costs, and questions. J. Med. Internet. Res.\u00a07, e3 (2005)","journal-title":"J. Med. Internet. Res."},{"key":"9_CR8","unstructured":"Sharp, C.: Conference Report: ICT 2008 - I\u2019s to the Future: Invention, Innovation, Impact. Online 33[March\/April 2], pp. 22\u201325. Information Today, Inc. (2009)"},{"key":"9_CR9","doi-asserted-by":"publisher","first-page":"1282","DOI":"10.1001\/jama.2009.389","volume":"301","author":"M.A. Hall","year":"2009","unstructured":"Hall, M.A., Schulman, K.A.: Ownership of Medical Information. JAMA\u00a0301, 1282\u20131284 (2009)","journal-title":"JAMA"},{"key":"9_CR10","first-page":"275","volume":"137","author":"F. Falcao-Reis","year":"2008","unstructured":"Falcao-Reis, F., Costa-Pereira, A., Correia, M.E.: Access and privacy rights using web security standards to increase patient empowerment. Stud. Health Technol. Inform.\u00a0137, 275\u2013285 (2008)","journal-title":"Stud. Health Technol. Inform."},{"key":"9_CR11","unstructured":"Rosenbaum, S., Painter, M.: Assessing Legal Implications of Using Health Data to Improve Health Care Quality and Eliminate Health Care Disparities. The Robert Wood Johnson Foundation (2005)"},{"key":"9_CR12","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1016\/S1086-5802(16)30441-7","volume":"39","author":"B.M. Bluml","year":"1999","unstructured":"Bluml, B.M., Crooks, G.M.: Designing solutions for securing patient privacy\u2013meeting the demands of health care in the 21st century. J. Am. Pharm. Assoc. (Wash.)\u00a039, 402\u2013407 (1999)","journal-title":"J. Am. Pharm. Assoc. (Wash.)"},{"key":"9_CR13","unstructured":"Conn, J.: Data encryption just one option under security law. Modern Healthcare (2009)"},{"key":"9_CR14","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1111\/j.1467-842X.2002.tb00682.x","volume":"26","author":"C. Kelman","year":"2002","unstructured":"Kelman, C., Bass, A., Holman, C.: Research use of linked health data - a best practice protocol. Australian and New Zealand Journal of Public Health\u00a026, 251\u2013255 (2002)","journal-title":"Australian and New Zealand Journal of Public Health"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"El Emam, K., Kosseim, P.: Privacy Interests in Prescription Data, Part 2. IEEE Security & Privacy, 75\u201378 (2009)","DOI":"10.1109\/MSP.2009.47"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Kosseim, P., El Emam, K.: Privacy Interests in Prescription Data, Part 1. IEEE Security & Privacy\u00a072 (2009)","DOI":"10.1109\/MSP.2009.14"},{"key":"9_CR17","first-page":"30","volume":"6","author":"W.W. Lowrance","year":"2003","unstructured":"Lowrance, W.W.: Learning from experience: privacy and the secondary use of data in health research. J. Biolaw. Bus.\u00a06, 30\u201360 (2003)","journal-title":"J. Biolaw. Bus."},{"key":"9_CR18","unstructured":"Nixon, P., Wagealla, W., English, C., Terzis, S.: Security, privacy and trust issues in smart environments, Glasgow, Scotland, The Global and Pervasive Computing Group, Department of Computer and Information Sciences, University of Stathclyde (2009); 5-18-0090"},{"key":"9_CR19","unstructured":"Committee on Health Research and the Privacy of Health Information. Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research: Report Brief, Washington DC, Institute of Medicine (2009)"},{"key":"9_CR20","unstructured":"Lysyk, M., El Emam, K., Lucock, C., Power, M., Willison, D.: Privacy Guidelines Workshop Report, Ottawa, Canada (2006) 7-6-0090"},{"key":"9_CR21","volume-title":"Electronic Health Information: A boon and a curse!","author":"C. Sharp","year":"2001","unstructured":"Sharp, C.: Electronic Health Information: A boon and a curse! The Free Pint, Newsletter (2001); 7-6-0090"},{"key":"9_CR22","doi-asserted-by":"publisher","first-page":"1786","DOI":"10.1136\/bmj.a1786","volume":"337","author":"T. Greenhalgh","year":"2008","unstructured":"Greenhalgh, T., Stramer, K., Bratan, T., Byrne, E., Mohammad, Y., Russell, J.: Introduction of shared electronic records: multi-site case study using diffusion of innovation theory. BMJ\u00a0337, a1786 (2008)","journal-title":"BMJ"},{"key":"9_CR23","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1503\/cmaj.1021826","volume":"170","author":"D.E. Zoutman","year":"2004","unstructured":"Zoutman, D.E., Ford, B.D., Bassili, A.R.: The confidentiality of patient and physician information in pharmacy prescription records. CMAJ\u00a0170, 815\u2013816 (2004)","journal-title":"CMAJ"},{"key":"9_CR24","unstructured":"Economist. Medicine\u2019s new central bankers. Economist (December 8, 2005)"},{"key":"9_CR25","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1186\/1745-6215-7-15","volume":"7","author":"A. Vickers","year":"2006","unstructured":"Vickers, A.: Whose data set is it anyway? Sharing raw data from randomized trials. Trials\u00a07, 15 (2006)","journal-title":"Trials"},{"key":"9_CR26","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1186\/1745-6215-10-17","volume":"10","author":"I. Hrynaszkiewicz","year":"2009","unstructured":"Hrynaszkiewicz, I., Altman, D.G.: Towards agreement on best practice for publishing raw clinical trial data. Trials\u00a010, 17 (2009)","journal-title":"Trials"},{"key":"9_CR27","unstructured":"Schaffer, A.: Your Medical Data Online: Google and Microsoft are offering rival programs that let people manage their own health information. Technology Review (July\/August 2008)"},{"key":"9_CR28","unstructured":"Singer, E.: Personal Medical Monitoring: Keeping tabs on your vitals with Microsoft HealthVault. Technology Review (April 24, 2009)"},{"key":"9_CR29","unstructured":"Harris, L.: Google Health Heads to the Hospital: A new partnership at a Boston hospital could forecast future success. Technology Review (May 28, 2008)"},{"key":"9_CR30","doi-asserted-by":"publisher","first-page":"14","DOI":"10.2196\/jmir.1187","volume":"11","author":"E.R. Weitzman","year":"2009","unstructured":"Weitzman, E.R., Kaci, L., Mandl, K.D.: Acceptability of a personally controlled health record in a community-based setting: implications for policy and design. J. Med. Internet. Res.\u00a011, e14 (2009)","journal-title":"J. Med. Internet. Res."},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Groves, T.: Managing UK research data for future use. BMJ\u00a0338 (2009)","DOI":"10.1136\/bmj.b1252"},{"key":"9_CR32","unstructured":"Halamka, J.: Blog Entry: A Privacy Framework for Personal Health Records, December 17. Blog (2008)"},{"key":"9_CR33","first-page":"8","volume":"9","author":"P. Chhanabhai","year":"2007","unstructured":"Chhanabhai, P., Holt, A.: Consumers are ready to accept the transition to online and electronic records if they can be assured of the security measures. Med. Gen. Med.\u00a09, 8 (2007)","journal-title":"Med. Gen. Med."},{"key":"9_CR34","unstructured":"Robinson, N., Graux, H., Botterman, M., Valeri, L.: Review of the European Data Protection Directive. TR7 10-ICO, Cambridge, UK, Rand Europe (2009)"},{"key":"9_CR35","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/j.clsr.2007.03.014","volume":"23","author":"D. Halliday","year":"2007","unstructured":"Halliday, D., Dizon, M., Kemmitt, H.: Baker & McKenzie\u2019s regular article tracking developments in EU law relating to IP, IT and telecommunications. Computer Law and Security Report\u00a023, 227\u2013232 (2007)","journal-title":"Computer Law and Security Report"},{"key":"#cr-split#-9_CR36.1","unstructured":"Connecting For Health. Common Framework for Networked Personal Health Information. Connecting for Health Website (2009);"},{"key":"#cr-split#-9_CR36.2","unstructured":"The Markle Foundation, 7-6-0090"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Electronic Healthcare"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11745-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,12]],"date-time":"2019-03-12T07:10:43Z","timestamp":1552374643000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11745-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642117442","9783642117459"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11745-9_9","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2010]]}}}