{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:57:12Z","timestamp":1725562632521},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642155147"},{"type":"electronic","value":"9783642155154"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15515-4_10","type":"book-chapter","created":{"date-parts":[[2010,8,3]],"date-time":"2010-08-03T11:50:15Z","timestamp":1280836215000},"page":"90-101","source":"Crossref","is-referenced-by-count":0,"title":["Information Security Sharing of Networked Medical Organizations: Case Study of Remote Diagnostic Imaging"],"prefix":"10.1007","author":[{"given":"Masayo","family":"Fujimoto","sequence":"first","affiliation":[]},{"given":"Koji","family":"Takeda","sequence":"additional","affiliation":[]},{"given":"Tae","family":"Honma","sequence":"additional","affiliation":[]},{"given":"Toshiaki","family":"Kawazoe","sequence":"additional","affiliation":[]},{"given":"Noriko","family":"Aida","sequence":"additional","affiliation":[]},{"given":"Hiroaki","family":"Hagiwara","sequence":"additional","affiliation":[]},{"given":"Hideharu","family":"Sugimoto","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"10_CR1","first-page":"19","volume":"20","author":"Y. Hori","year":"2006","unstructured":"Hori, Y.: How to Build Common Understanding in the Implementation of Information Security Measures. Security Management\u00a020(2), 19\u201327 (2006)","journal-title":"Security Management"},{"key":"10_CR2","unstructured":"Doi, N. (eds.): Information Processing Information-technology Promotion Agency : Information Security instructional book - Guide of Information Security Practice of Organization. Jikkyo Shuppan Co., Ltd. (2008) (*translated by authors from Japanese)"},{"key":"10_CR3","unstructured":"Tanaka, M.: The significance of the Personal Information Protection Law in the Field of Japanese Medical Care. Master\u2019s Thesis of Institute of Information Security, pp.88\u201390\/96\u201398 (2006)"},{"key":"10_CR4","unstructured":"Hiroshima, A.: Comments on the Personal Information Protection for Healthcare Providers. Security Management\u00a019(2) (2006)"},{"key":"10_CR5","unstructured":"Hagihara, H., Fujimoto, M., Takeda, K., Honma, T.: Balancing of Effect and Risk of Medical Cooperation between Institutions using Information and Communication Technology. Japan Society of Security Management, 22nd National Convention Summary, 129\u2013134 (2008)"},{"key":"10_CR6","unstructured":"Ministry of Hearth, Labor and Welfare: Guideline for Safety Management of Medical Information System, 3rd edn., pp. 12\u201314 (2008)"},{"key":"10_CR7","unstructured":"Ministry of Hearth, Labor and Welfare: Guideline for Appropriate Use of Personal Information in Medical and Care Institutions (2006)"},{"key":"10_CR8","unstructured":"City of Yokohama, Code of Personal Information Protection of the City of Yokohama (2008-11-28), \n                    \n                      http:\/\/www.city.yokohama.jp\/me\/shimin\/joho\/kokai\/jorei\/ko1.html"},{"key":"10_CR9","unstructured":"Hagihara, H., Aida, N., Sugimoto, E., Kawazoe, T., Matsuyama, K.: Establishment of Medical Cooperation System using Mutual Browsing Function of PACS. In: The 28th Joint Conference on Medical Informatics, p. 178 (2008)"}],"container-title":["IFIP Advances in Information and Communication Technology","E-Health"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15515-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T13:53:48Z","timestamp":1558360428000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15515-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642155147","9783642155154"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15515-4_10","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2010]]}}}