{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:24:06Z","timestamp":1759091046584,"version":"3.41.0"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,11,16]],"date-time":"2016-11-16T00:00:00Z","timestamp":1479254400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001866","name":"Fonds National de la Recherche Luxembourg","doi-asserted-by":"publisher","award":["7842804"],"award-info":[{"award-number":["7842804"]}],"id":[{"id":"10.13039\/501100001866","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1007\/s10916-016-0653-8","type":"journal-article","created":{"date-parts":[[2016,11,17]],"date-time":"2016-11-17T05:24:33Z","timestamp":1479360273000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Transparent Medical Data Systems"],"prefix":"10.1007","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6882-6480","authenticated-orcid":false,"given":"Dayana","family":"Spagnuelo","sequence":"first","affiliation":[]},{"given":"Gabriele","family":"Lenzini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,16]]},"reference":[{"key":"653_CR1","doi-asserted-by":"crossref","unstructured":"AL Faresi, A., Wijesekera, D., Moidu, K.: A comprehensive privacy-aware authorization framework founded on HIPAA privacy rules. In: Proceedings of the 1st ACM International Health Informatics Symposium, pp. 637\u2013646. ACM (2010)","DOI":"10.1145\/1882992.1883093"},{"key":"653_CR2","doi-asserted-by":"crossref","unstructured":"Benaloh, J., Chase, M., Horvitz, E., Lauter, K.: Patient controlled encryption: Ensuring privacy of electronic medical records. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW \u201909, pp. 103\u2013114. ACM (2009)","DOI":"10.1145\/1655008.1655024"},{"key":"653_CR3","unstructured":"Berthold, S., Fischer-H\u00fcbner, S., Martucci, L., Pulls, T.: Crime and punishment in the cloud - accountability, transparency, and privacy. In: Pre-Proceedings of International Workshop on Trustworthiness, Accountability and Forensics in the Cloud in conjunction with the 7th IFIP WG 11.11 International Conference on Trust Management (2013)"},{"key":"653_CR4","unstructured":"Cappelli, C.: Uma abordagem para transpar\u00eancia em processos organizacionais utilizando aspectos. Ph.D. thesis, PUC-Rio (2009)"},{"key":"653_CR5","unstructured":"Cruzes, D., and Jaatun, M.: D:b-2.4 requirements report deliverable (2014)"},{"key":"653_CR6","unstructured":"EU: Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation). http:\/\/ec.europa.eu\/justice\/data-protection\/reform\/index_en.htm (2012)"},{"key":"653_CR7","doi-asserted-by":"crossref","unstructured":"Ferreira, A., and Lenzini, G.: Can transparency enhancing tools support patient\u2019s accessing electronic health records?. In: Proceedings of the 3rd World Conference on Information Systems and Technologies (2015)","DOI":"10.1007\/978-3-319-16486-1_111"},{"key":"653_CR8","doi-asserted-by":"crossref","unstructured":"Fischer-H\u00fcbner, S., Angulo, J., Pulls, T.: How can cloud users be supported in deciding on, tracking and controlling how their data are used?. In: Privacy and Identity Management for Emerging Services and Technologies, IFIP Advances in Information and Communication Technology, Vol. 421, pp. 77\u201392. Springer, Berlin Heidelberg (2014)","DOI":"10.1007\/978-3-642-55137-6_6"},{"issue":"4","key":"653_CR9","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/MIC.2011.51","volume":"15","author":"R Gajanayake","year":"2011","unstructured":"Gajanayake, R., Iannella, R., Sahama, T., Sharing with care: an information accountability perspective. Intern. Comput. IEEE 15(4):31\u201338, 2011.","journal-title":"Intern. Comput. IEEE"},{"issue":"1","key":"653_CR10","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1136\/jamia.2010.008946","volume":"18","author":"KW Goodman","year":"2011","unstructured":"Goodman, K. W., Berner, E. S., Dente, M. A., Kaplan, B., Koppel, R., Rucker, D., Sands, D. Z., Winkelstein, P., et al., Challenges in ethics, safety, best practices, and oversight regarding HIT vendors, their customers, and patients: a report of an AMIA special task force. J. Amer. Med. Inf. Assoc. 18(1):77\u201381 , 2011.","journal-title":"J. Amer. Med. Inf. Assoc."},{"issue":"2","key":"653_CR11","doi-asserted-by":"crossref","first-page":"e26","DOI":"10.1016\/j.ijmedinf.2010.10.001","volume":"80","author":"S Haas","year":"2011","unstructured":"Haas, S., Wohlgemuth, S., Echizen, I., Sonehara, N., M\u00fcller, G., Aspects of privacy for electronic health records. Int. J. Med. Inf. 80(2):e26\u2013e31, 2011. Special Issue: Security in Health Information Systems.","journal-title":"Int. J. Med. Inf."},{"key":"653_CR12","doi-asserted-by":"crossref","unstructured":"Hansen, M.: Marrying transparency tools with user-controlled identity management. In: The Future of Identity in the Information Society, Vol. 262, pp. 199\u2013220. Springer, US (2008)","DOI":"10.1007\/978-0-387-79026-8_14"},{"key":"653_CR13","doi-asserted-by":"crossref","unstructured":"Hedbom, H.: A survey on transparency tools for enhancing privacy. In: The Future of Identity in the Information Society, IFIP Advances in Information and Communication Technology, Vol. 298, pp. 67\u201382. Springer, Berlin Heidelberg (2009)","DOI":"10.1007\/978-3-642-03315-5_5"},{"key":"653_CR14","unstructured":"Henke, N., Kelsey, T., Whately, H., Transparency \u2014 the most powerful driver of health care improvement? Health Int.,64\u201373, 2011."},{"key":"653_CR15","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1016\/j.csi.2009.04.005","volume":"32","author":"J Hu","year":"2010","unstructured":"Hu, J., Chen, H., Hou, T., A hybrid public key infrastructure solution (HPKI) for HIPAA privacy\/security regulations. Comput. Standards Interf. 32:274\u2013280, 2010.","journal-title":"Comput. Standards Interf."},{"key":"653_CR16","unstructured":"International Organization for Standardization: ISO 9241-11:1998 Ergonomic requirements for office work with visual display terminals (VDTs) (2000). Part 11: Guidance on usability"},{"key":"653_CR17","doi-asserted-by":"crossref","first-page":"S66","DOI":"10.1097\/MLR.0b013e31829b1d9f","volume":"51","author":"K Kim","year":"2013","unstructured":"Kim, K., McGraw, D., Mamo, L., Ohno-Machado, L., Development of a privacy and security policy framework for a multistate comparative effectiveness research network. Med. Care 51:S66\u2013S72, 2013.","journal-title":"Med. Care"},{"key":"653_CR18","doi-asserted-by":"crossref","unstructured":"Kremer, S., Ryan, M., Smyth, B.: Computer Security \u2013 ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. In: Proceedings, chap. Election Verifiability in Electronic Voting Protocols, pp. 389\u2013404. Berlin Heidelberg , Berlin, Heidelberg (2010)","DOI":"10.1007\/978-3-642-15497-3_24"},{"key":"653_CR19","doi-asserted-by":"crossref","unstructured":"Ku\u0307sters, R., Truderung, T., Vogt, A.: Accountability: definition and relationship to verifiability. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010, pp. 526\u2013535. ACM (2010)","DOI":"10.1145\/1866307.1866366"},{"key":"653_CR20","unstructured":"van Lamsweerde, A., Requirements Engineering: From System Goals to UML Models to Software Specifications: Wiley, 2009."},{"key":"653_CR21","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s12599-010-0102-z","volume":"2","author":"JCSdP Leite","year":"2010","unstructured":"Leite, J. C. S.d.P., and Cappelli, C., Software transparency. Bus. Inf. Syst. Eng. 2:127\u2013139, 2010.","journal-title":"Bus. Inf. Syst. Eng."},{"issue":"1","key":"653_CR22","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1080\/01947648.2013.768145","volume":"34","author":"D Liebovitz","year":"2013","unstructured":"Liebovitz, D., Meaningful EHR attributes for an era of accountability, transparency, shared decision making, and value assessment. J. Legal Med. 34(1):43\u201353, 2013.","journal-title":"J. Legal Med."},{"key":"653_CR23","unstructured":"Moe, N.: D:b-2.1 workshop 1 results (requirements) (2013)"},{"key":"653_CR24","unstructured":"Office for Civil Right of the Department of Health and Human Services, USA: Privacy, Security, and Electronic Health Records (2015)"},{"key":"653_CR25","unstructured":"Online Computer Library Center, Inc.: Dewey decimal classification. https:\/\/www.oclc.org\/dewey\/features\/summaries.en.html . Last accessed in May 2016"},{"key":"653_CR26","unstructured":"Open Source Initiative: The Open Source Definition. https:\/\/opensource.org\/ . Last accessed in May 2016"},{"key":"653_CR27","unstructured":"Peters, M.: The idea of openness: Open education and education for openness. In: Peters, M., Besley, T., Gibbons, A., \u017earni\u0107, B., Ghiraldelli, P. (Eds.) The Encyclopaedia of Educational Philosophy and Theory (2010)"},{"key":"653_CR28","unstructured":"Press, O.U.: Oxford Dictionaries. http:\/\/www.oxforddictionaries.com\/ . Last accessed in May 2016"},{"key":"653_CR29","doi-asserted-by":"crossref","unstructured":"Ray, P., and Wimalasiri, J.: The need for technical solutions for maintaining the privacy of EHR. In: Engineering in Medicine and Biology Society, 2006. EMBS\u201906. 28th Annual International Conference of the IEEE, pp. 4686\u20134689. IEEE (2006)","DOI":"10.1109\/IEMBS.2006.260862"},{"key":"653_CR30","doi-asserted-by":"crossref","unstructured":"Rostad, L.: An initial model and a discussion of access control in patient controlled health records. In: Proceedings of the 3rd International Conference on Availability, Reliability and Security, pp. 935\u2013942 (2008)","DOI":"10.1109\/ARES.2008.185"},{"key":"653_CR31","doi-asserted-by":"crossref","unstructured":"Ruotsalainen, P., Blobel, B., Nyk\u00e4nen, P., Sepp\u00e4l\u00e4, A., Sorvari, H.: Framework model and principles for trusted information sharing in pervasive health (2011)","DOI":"10.3233\/978-1-60750-806-9-497"},{"issue":"3","key":"653_CR32","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1016\/j.jbi.2012.12.003","volume":"46","author":"I Se\u00f1or","year":"2013","unstructured":"Se\u00f1or, I., and Fern\u00e1ndez-Alem\u00e1n, J., Security and privacy in electronic health records: a systematic literature review. J. Biomed. Inf. 46(3):541\u2013562, 2013.","journal-title":"J. Biomed. Inf."},{"key":"653_CR33","doi-asserted-by":"crossref","unstructured":"Seneviratne, O., and Kagal, L.: Enabling privacy through transparency. In: Proceedings of the 12th Annual International Conference on Privacy, Security and Trust, pp. 121\u2013128 (2014)","DOI":"10.1109\/PST.2014.6890931"},{"key":"653_CR34","doi-asserted-by":"crossref","unstructured":"Spagnuelo, D., Bartolini, C., Lenzini, G.: Metrics for Transparency. In: Proceedings of Data Privacy Management and Security Assurance: 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, pp. 3\u201318 (2016)","DOI":"10.1007\/978-3-319-47072-6_1"},{"key":"653_CR35","doi-asserted-by":"crossref","unstructured":"Spagnuelo, D., and Lenzini, G.: Patient-centred transparency requirements for medical data sharing systems. In: New Advances in Information Systems and Technologies, pp. 1073\u20131083. Springer (2016)","DOI":"10.1007\/978-3-319-31232-3_102"},{"issue":"5","key":"653_CR36","doi-asserted-by":"crossref","first-page":"1290","DOI":"10.1377\/hlthaff.24.5.1290","volume":"24","author":"PC Tang","year":"2005","unstructured":"Tang, P. C., and Lansky, D., The missing link: bridging the patient\u2013provider health information gap. Health Affairs 24(5):1290\u20131295, 2005.","journal-title":"Health Affairs"},{"issue":"4","key":"653_CR37","doi-asserted-by":"crossref","first-page":"690","DOI":"10.1111\/jlme.12312","volume":"43","author":"A Thorogood","year":"2015","unstructured":"Thorogood, A., and Zawati, M. H., International guidelines for privacy in genomic biobanking (or the unexpected virtue of pluralism). J. Law Med. Ethics 43(4):690\u2013702, 2015.","journal-title":"J. Law Med. Ethics"},{"issue":"2","key":"653_CR38","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/s10676-009-9187-9","volume":"11","author":"M Turilli","year":"2009","unstructured":"Turilli, M., and Floridi, L., The ethics of information transparency. Ethics Inf. Technol. 11(2):105\u2013112, 2009.","journal-title":"Ethics Inf. Technol."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0653-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-016-0653-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0653-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T17:52:12Z","timestamp":1749750732000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-016-0653-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,16]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,1]]}},"alternative-id":["653"],"URL":"https:\/\/doi.org\/10.1007\/s10916-016-0653-8","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"type":"print","value":"0148-5598"},{"type":"electronic","value":"1573-689X"}],"subject":[],"published":{"date-parts":[[2016,11,16]]},"article-number":"8"}}