{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T15:13:50Z","timestamp":1777043630048,"version":"3.51.4"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2017,7,21]],"date-time":"2017-07-21T00:00:00Z","timestamp":1500595200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1007\/s10916-017-0778-4","type":"journal-article","created":{"date-parts":[[2017,7,21]],"date-time":"2017-07-21T05:37:07Z","timestamp":1500615427000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":200,"title":["Security Techniques for the Electronic Health Records"],"prefix":"10.1007","volume":"41","author":[{"given":"Clemens Scott","family":"Kruse","sequence":"first","affiliation":[]},{"given":"Brenna","family":"Smith","sequence":"additional","affiliation":[]},{"given":"Hannah","family":"Vanderlinden","sequence":"additional","affiliation":[]},{"given":"Alexandra","family":"Nealand","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,21]]},"reference":[{"key":"778_CR1","unstructured":"Centers for Medicare & Medicaid Services. Electronic Health Records. URL: https:\/\/www.cms.gov\/Medicare\/E-health\/EHealthRecords\/index.html . Accessed: 2016\u201308-08. (Archived by WebCite\u00ae at http:\/\/www.webcitation.org\/6jcX532RN )."},{"key":"778_CR2","unstructured":"Healthcare Information Technology. Electronic Health & Medical Records: The Future of Health Care and Electronic Records. [Cited 2010 July 13]. Available from: https:\/\/www.healthit.gov\/buzz-blog\/electronic-health-and-medical-records\/the-future-of-health-care-and-electronic-records\/ ."},{"key":"778_CR3","unstructured":"U.S. Department of Health & Human Services. Health Information Privacy Enforcement Highlights. [Cited 2016 May 31]. Available from http:\/\/www.hhs.gov\/hipaa\/for-professionals\/compliance-enforcement\/data\/enforcement-highlights\/index.html ."},{"issue":"1","key":"778_CR4","first-page":"52","volume":"26","author":"TE Ives","year":"2014","unstructured":"Ives, T.E., The New 'E-Clinician' guide to compliance. Audiol. Today. 26(1):52\u201353, 2014.","journal-title":"Audiol. Today"},{"key":"778_CR5","volume-title":"Health care information systems: A practical approach for health care management","author":"KA Wager","year":"2013","unstructured":"Wager, K.A., Lee, F.W., and Glaser, J.P., Health care information systems: A practical approach for health care management, 3rd edn. Jossey Bass, San Francisco, CA, 2013.","edition":"3"},{"key":"778_CR6","first-page":"1","volume":"2014","author":"SB Wikina","year":"2014","unstructured":"Wikina, S.B., What caused the breach? an examination of use of information technology and health data breaches. Perspect. Health Inf. Mana. 2014:1\u201316, 2014.","journal-title":"Perspect. Health Inf. Mana."},{"issue":"14","key":"778_CR7","doi-asserted-by":"publisher","first-page":"1471","DOI":"10.1001\/jama.2015.2252","volume":"313","author":"V Liu","year":"2015","unstructured":"Liu, V., Musen, M.A., and Chou, T., Data breaches of protected health information in the United States. J. Am. Med. Assoc. 313(14):1471\u20131473, 2015. doi: 10.1001\/jama.2015.2252 .","journal-title":"J. Am. Med. Assoc."},{"key":"778_CR8","doi-asserted-by":"crossref","unstructured":"Amer, K. Informatics: Ethical use of genomic information and electronic medical records, J. Am. Nurses Assoc. 20(2), 2015.","DOI":"10.3912\/OJIN.Vol20No02InfoCol01"},{"issue":"4","key":"778_CR9","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1503\/cmaj.109-4715","volume":"186","author":"R Collier","year":"2014","unstructured":"Collier, R., New tools to improve safety of electronic health records. CMAJ. 186(4):251\u2013251, 2014.","journal-title":"CMAJ"},{"key":"778_CR10","doi-asserted-by":"crossref","unstructured":"Collier, R., US health information breaches up 137%. CMAJ. 186(6), 2014.","DOI":"10.1503\/cmaj.109-4731"},{"issue":"3","key":"778_CR11","doi-asserted-by":"crossref","first-page":"C7","DOI":"10.1016\/S0001-2092(14)00873-4","volume":"100","author":"MC Jannetti","year":"2014","unstructured":"Jannetti, M.C., Safeguarding patient information in electronic health records. AORN J. 100(3):C7\u2013C8, 2014.","journal-title":"AORN J"},{"key":"778_CR12","doi-asserted-by":"crossref","unstructured":"Hunter, E.S., Electronic health Records in an Occupational Health Setting--Part I. A global overview. Workplace health & safety. 61(2):57\u201360, 2013.","DOI":"10.1177\/216507991306100202"},{"issue":"1","key":"778_CR13","first-page":"79","volume":"7","author":"L Pisto","year":"2013","unstructured":"Pisto, L., The need for privacy-centric role-based access to electronic health records. J. Health Life Sci. Law. 7(1):79\u2013112, 2013.","journal-title":"J. Health Life Sci. Law"},{"issue":"11","key":"778_CR14","doi-asserted-by":"crossref","first-page":"1121","DOI":"10.1001\/jama.2013.219869","volume":"310","author":"CJ Wang","year":"2013","unstructured":"Wang, C.J., and Huang, D.J., The HIPAA conundrum in the era of mobile health and communications. JAMA. 310(11):1121\u20131122, 2013.","journal-title":"JAMA"},{"issue":"1","key":"778_CR15","first-page":"25","volume":"32","author":"J Lemke","year":"2013","unstructured":"Lemke, J., Storage and security of personal health information. OOHNA J. 32(1):25\u201326, 2013.","journal-title":"OOHNA J"},{"issue":"3","key":"778_CR16","doi-asserted-by":"crossref","first-page":"202","DOI":"10.2345\/0899-8205-47.3.202","volume":"47","author":"T Cooper","year":"2013","unstructured":"Cooper, T., and Fuchs, K., Technology risk assessment in healthcare facilities. Biomed. Instrum. Technol. 47(3):202\u2013207, 2013.","journal-title":"Biomed. Instrum. Technol."},{"issue":"3","key":"778_CR17","first-page":"95","volume":"61","author":"JM Bey","year":"2013","unstructured":"Bey, J.M., and Magalhaes, J.S., Electronic health Records in an Occupational Health Setting\u2014Part II. A global overview. Perspect. Int. Occup. Health Nursing. 61(3):95\u201398, 2013.","journal-title":"Perspect. Int. Occup. Health Nursing"},{"issue":"6","key":"778_CR18","doi-asserted-by":"crossref","first-page":"3907","DOI":"10.1007\/s10916-012-9862-y","volume":"36","author":"HM Chen","year":"2012","unstructured":"Chen, H.M., Lo, J.W., and Yeh, C.K., An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907\u20133915, 2012.","journal-title":"J. Med. Syst."},{"issue":"6","key":"778_CR19","doi-asserted-by":"crossref","first-page":"3839","DOI":"10.1007\/s10916-012-9857-8","volume":"36","author":"M Nikooghadam","year":"2012","unstructured":"Nikooghadam, M., and Zakerolhosseini, A., Secure communication of medical information using mobile agents. J. Med. Syst. 36(6):3839\u20133850, 2012.","journal-title":"J. Med. Syst."},{"issue":"5","key":"778_CR20","doi-asserted-by":"crossref","first-page":"3019","DOI":"10.1007\/s10916-011-9779-x","volume":"36","author":"A Tejero","year":"2012","unstructured":"Tejero, A., and de la Torre, I., Advances and current state of the security and privacy in electronic health records: Survey from a social perspective. J. Med. Syst. 36(5):3019\u20133027, 2012.","journal-title":"J. Med. Syst."},{"issue":"14","key":"778_CR21","doi-asserted-by":"crossref","first-page":"1471","DOI":"10.1001\/jama.2015.2252","volume":"313","author":"V Liu","year":"2015","unstructured":"Liu, V., Musen, M.A., and Chou, T., Data breaches of protected health information in the United States. JAMA. 313(14):1471\u20131473, 2015 19.","journal-title":"JAMA"},{"issue":"19","key":"778_CR22","doi-asserted-by":"crossref","first-page":"1854","DOI":"10.1056\/NEJMsb1205420","volume":"367","author":"D Sittig","year":"2012","unstructured":"Sittig, D., and Singh, H., Electronic health records and National Patient-Safety Goals. N. Engl. J. Med. 367(19):1854\u20131860, 2012.","journal-title":"N. Engl. J. Med."},{"issue":"2","key":"778_CR23","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1007\/s10916-010-9487-y","volume":"36","author":"AK Wickboldt","year":"2012","unstructured":"Wickboldt, A.K., and Piramuthu, S., Patient safety through RFID: Vulnerabilities in recently proposed grouping protocols. J. Med. Syst. 36(2):431\u2013435, 2012 20.","journal-title":"J. Med. Syst."},{"issue":"3","key":"778_CR24","doi-asserted-by":"crossref","first-page":"164","DOI":"10.2345\/0899-8205-46.3.164","volume":"46","author":"M Vockley","year":"2012","unstructured":"Vockley, M., Safe and secure? Healthcare in the Cyberworld. J Biomed. Instrum. Technol. 46(3):164\u2013173, 2012.","journal-title":"J Biomed. Instrum. Technol."},{"issue":"2","key":"778_CR25","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/s10597-011-9409-6","volume":"48","author":"N Shank","year":"2012","unstructured":"Shank, N., Willborn, E., PytlikZillig, L., and Noel, H., Electronic health records: Eliciting behavioral health providers\u2019 beliefs. Community Ment. Health J. 48(2):249\u2013254, 2012.","journal-title":"Community Ment. Health J."},{"issue":"5","key":"778_CR26","doi-asserted-by":"crossref","first-page":"2981","DOI":"10.1007\/s10916-011-9776-0","volume":"36","author":"HC Lee","year":"2012","unstructured":"Lee, H.C., and Chang, S.H., RBAC-matrix-based EMR right management system to improve HIPAA compliance. J. Med. Syst. 36(5):2981\u20132992, 2012.","journal-title":"J. Med. Syst."},{"issue":"6","key":"778_CR27","doi-asserted-by":"crossref","first-page":"3695","DOI":"10.1007\/s10916-012-9843-1","volume":"36","author":"M Masi","year":"2012","unstructured":"Masi, M., Pugliese, R., and Tiezzi, F., Security analysis of standards-driven communication protocols for healthcare scenarios. J. Med. Syst. 36(6):3695\u20133711, 2012.","journal-title":"J. Med. Syst."},{"issue":"5","key":"778_CR28","doi-asserted-by":"crossref","first-page":"3375","DOI":"10.1007\/s10916-012-9830-6","volume":"36","author":"YY Chen","year":"2012","unstructured":"Chen, Y.Y., Lu, J.C., and Jan, J.K., A secure EHR system based on hybrid clouds. J. Med. Syst. 36(5):3375\u20133384, 2012.","journal-title":"J. Med. Syst."},{"key":"778_CR29","doi-asserted-by":"publisher","unstructured":"van Allen, J., and Roberts, M.C., Critical incidents in the marriage of psychology and technology: A discussion of potential ethical issues in practice, education, and policy. Prof. Psychol. Res. Pract. 42(6):433, 2011. doi: 10.1037\/a0025278 .","DOI":"10.1037\/a0025278"},{"key":"778_CR30","unstructured":"U.S. Department of Health and Human Services. Cybersecurity: 10 best practices for the small healthcare environment. [Cited 2010 November]. Available from: https:\/\/www.healthit.gov\/sites\/default\/files\/basic-security-for-the-small-healthcare-practice-checklists.pdf ."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-017-0778-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-017-0778-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-017-0778-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,31]],"date-time":"2022-07-31T07:50:36Z","timestamp":1659253836000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-017-0778-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,21]]},"references-count":30,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["778"],"URL":"https:\/\/doi.org\/10.1007\/s10916-017-0778-4","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7,21]]},"article-number":"127"}}