{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T15:54:51Z","timestamp":1771602891860,"version":"3.50.1"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,2,12]],"date-time":"2016-02-12T00:00:00Z","timestamp":1455235200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1007\/s10916-016-0465-x","type":"journal-article","created":{"date-parts":[[2016,2,12]],"date-time":"2016-02-12T11:48:12Z","timestamp":1455277692000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Toward Proper Authentication Methods in Electronic Medical Record Access Compliant to HIPAA and C.I.A. Triangle"],"prefix":"10.1007","volume":"40","author":[{"given":"Stephen J.","family":"Tipton","sequence":"first","affiliation":[]},{"given":"Sara","family":"Forkey","sequence":"additional","affiliation":[]},{"given":"Young B.","family":"Choi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,12]]},"reference":[{"key":"465_CR1","unstructured":"BIO-key Healthcare Security. (2015). Biometric authentication for healthcare. Retrieved from http:\/\/www.bio-key.com\/industries\/overview-3\/healthcare ."},{"issue":"3","key":"465_CR2","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/s10916-006-7405-0","volume":"30","author":"YB Choi","year":"2006","unstructured":"Choi, Y. B., Capitan, K. E., Krause, J. S., and Streeper, M. M., Challenges associated with privacy in health care industry: Implementation of HIPAA Security Rules. J. Med. Syst. (JMS) 30(3):57\u201364, 2006.","journal-title":"J. Med. Syst. (JMS)"},{"key":"465_CR3","unstructured":"Confidentiality, Integrity and Availability (CIA). (2008). University of Miami, Miller School of Medicine. Retrieved from http:\/\/it.med.miami.edu\/x904.xml ."},{"key":"465_CR4","unstructured":"Duo Security, Inc. (2015). Duo Authentication for Epic. Protect Access to Healthcare Data with Two-Factor Authentication. Retrieved from https:\/\/www.duosecurity.com\/product\/services\/epic"},{"key":"465_CR5","volume-title":"Law, liability, and ethics for medical office professionals","author":"M Flight","year":"2011","unstructured":"Flight, M., Law, liability, and ethics for medical office professionals, 5th edition. Delmar, Cengage Learning, Clifton Park, NY, 2011.","edition":"5"},{"issue":"3","key":"465_CR6","first-page":"37","volume":"33","author":"D Grantham","year":"2013","unstructured":"Grantham, D., Confidentiality alternatives for exchanging electronic medical records take shape. Behav. Healthc. 33(3):37\u201339, 2013.","journal-title":"Behav. Healthc."},{"key":"465_CR7","unstructured":"Grimes, R. A., All you need to know about the move to SHA-2 encryption. InfoWorld, 2015. Retrieved from http:\/\/www.infoworld.com\/article\/2879073\/security\/all-you-need-to-know-about-the-move-to-sha-2-encryption.html ."},{"key":"465_CR8","unstructured":"HealthIT.gov. (2013). Electronic Health Records Infographic. [Infographic]. e-Health. Retrieved from http:\/\/www.healthit.gov\/patients-families\/electronic-health-records-infographic ."},{"key":"465_CR9","unstructured":"HealthIT.gov. (2013). What You Can Do to Protect Your Health Information. Protecting Your Privacy & Security. Retrieved from http:\/\/www.healthit.gov\/patients-families\/what-you-can-do-protect-your-health-information ."},{"key":"465_CR10","unstructured":"HealthIT.gov. (n.d.). Health IT: How to Keep Your Health Information Private and Secure. Privacy & Security Consumer Fact Sheet. [PDF]. The Office of the National Coordinator for Health Information Technology. Retrieved from http:\/\/www.healthit.gov\/sites\/default\/files\/how_to_keep_your_health_information_private_and_secure.pdf"},{"key":"465_CR11","unstructured":"Health records privacy. Va. Code Ann. \u00a7 32.1-127.1:03."},{"key":"465_CR12","unstructured":"Imprivata. (2014). Authentication Management. Retrieved from http:\/\/www.imprivata.com\/authentication-management"},{"key":"465_CR13","unstructured":"Individual Access to Medical Records: 50 State Comparison. (2012). Health Information & the Law. Robert Wood Johnson Foundation. The George Washington University School of Public Health & Health Services. Retrieved from http:\/\/www.healthinfolaw.org\/comparative-analysis\/individual-access-medical-records-50-state-comparison ."},{"key":"465_CR14","unstructured":"Medical records; ownership; provision of copies. Va. Code Ann. \u00a7 54.1-2403.3."},{"issue":"3","key":"465_CR15","first-page":"35","volume":"13","author":"SS Mir","year":"2011","unstructured":"Mir, S. S., HIPAA Privacy rule: Maintaining the confidentiality of medical records, Part 2. J. Health Care Compliance 13(3):35\u201378, 2011.","journal-title":"J. Health Care Compliance"},{"key":"465_CR16","unstructured":"Navigating Cancer Now Offers Single Sign-on Functionality for its Patient Engagement Portal. (2015). PRNewswire. Retrieved from http:\/\/www.prnewswire.com\/news-releases\/navigating-cancer-now-offers-single-sign-on-functionality-for-its-patient-engagement-portal-300031335.html ."},{"key":"465_CR17","unstructured":"Patel, V., and Siminerio, E., Consumer Access and use of Online Health Records: It Takes Two to Tango. Health IT Buzz, 2014. Retrieved from http:\/\/www.healthit.gov\/buzz-blog\/consumer\/consumer-access-online-health-records\/ ."},{"key":"465_CR18","unstructured":"Riverside Health System. (2015). myHealth eLink. Retrieved from https:\/\/healthelink.riversideonline.com ."},{"key":"465_CR19","doi-asserted-by":"crossref","unstructured":"Ryoo, J., Choi, Y. B., & Oh, T., Security and privacy in mobile telemedicine. In Xiao Y. & Chen H. (Eds.), Mobile Telemedicine: A Computing and Networking Perspective (pp. 175\u2013193). World Scientific Publishing Co., 2008.","DOI":"10.1201\/9781420060478.ch10"},{"key":"465_CR20","unstructured":"Symantec. (2009). Security and Privacy for Healthcare Providers. [PDF]. White Paper: Best Practices Series for Healthcare. Retrieved from http:\/\/eval.symantec.com\/mktginfo\/enterprise\/white_papers\/b-security_and_privacy_for_healthcare_WP_20934020.en-us.pdf ."},{"key":"465_CR21","unstructured":"Tipton, S. J., White II, D. J., Sershon, C., and Choi, Y. B., iOS Security and privacy: Authentication methods, permissions, and potential pitfalls with touch ID. Int. J. Comput. Inf. Technol. 3(3), 2014."},{"key":"465_CR22","unstructured":"What is protected health information (PHI)? (2014). Indiana University Knowledge Base. Retrieved from https:\/\/kb.iu.edu\/d\/ayyz ."},{"key":"465_CR23","volume-title":"Principles of Incident Response & Disaster Recovery","author":"M Whitman","year":"2014","unstructured":"Whitman, M., Mattord, H., and Green, A., Principles of Incident Response & Disaster Recovery. Course Technology, Boston, MA, 2014."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0465-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-016-0465-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0465-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T13:54:58Z","timestamp":1567605298000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-016-0465-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,12]]},"references-count":23,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,4]]}},"alternative-id":["465"],"URL":"https:\/\/doi.org\/10.1007\/s10916-016-0465-x","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,2,12]]},"article-number":"100"}}