{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:12:53Z","timestamp":1762506773080},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,3,19]],"date-time":"2016-03-19T00:00:00Z","timestamp":1458345600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"COMET K1, FFG","award":["843274"],"award-info":[{"award-number":["843274"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Brain Inf."],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s40708-016-0046-2","type":"journal-article","created":{"date-parts":[[2016,3,19]],"date-time":"2016-03-19T11:11:23Z","timestamp":1458385883000},"page":"269-279","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["A tamper-proof audit and control system for the doctor in the loop"],"prefix":"10.1007","volume":"3","author":[{"given":"Peter","family":"Kieseberg","sequence":"first","affiliation":[]},{"given":"Bernd","family":"Malle","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Fr\u00fchwirt","sequence":"additional","affiliation":[]},{"given":"Edgar","family":"Weippl","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Holzinger","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,19]]},"reference":[{"key":"46_CR1","doi-asserted-by":"crossref","unstructured":"Kieseberg P, Schantl J, Fr\u00fchwirt P, Weippl E, Holzinger A (2015) Witnesses for the doctor in the loop. In: Brain informatics and health. Springer, New York, pp 369\u2013378","DOI":"10.1007\/978-3-319-23344-4_36"},{"key":"46_CR2","doi-asserted-by":"crossref","unstructured":"Kieseberg P, Weippl ER, Holzinger Andreas (2016) Trust for the doctor in the loop\u2019. ERCIM News 1","DOI":"10.1007\/978-3-319-23344-4_36"},{"issue":"4","key":"46_CR3","first-page":"2231","volume":"2","author":"H Bhavsar","year":"2012","unstructured":"Bhavsar H, Ganatra A (2012) A comparative study of training algorithms for supervised machine learning. Int J Soft Comput Eng (IJSCE) 2(4):2231\u20132307","journal-title":"Int J Soft Comput Eng (IJSCE)"},{"key":"46_CR4","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.ijmedinf.2015.10.005","volume":"86","author":"AM Walker","year":"2016","unstructured":"Walker AM, Zhou X, Ananthakrishnan AN, Weiss LS, Shen R, Sobel RE, Bate A, Reynolds RF (2016) Computer-assisted expert case definition in electronic health records. Int J Med Inf 86:62\u201370","journal-title":"Int J Med Inf"},{"issue":"8","key":"46_CR5","first-page":"43","volume":"17","author":"J Soni","year":"2011","unstructured":"Soni J, Ansari U, Sharma D, Soni S (2011) Predictive data mining for medical diagnosis: an overview of heart disease prediction. Int J Comput Appl 17(8):43\u201348","journal-title":"Int J Comput Appl"},{"issue":"5","key":"46_CR6","doi-asserted-by":"crossref","first-page":"933","DOI":"10.1016\/j.media.2012.02.005","volume":"16","author":"S Wang","year":"2012","unstructured":"Wang S, Summers RM (2012) Machine learning and radiology. Med Image Anal 16(5):933\u2013951","journal-title":"Med Image Anal"},{"issue":"6","key":"46_CR7","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1038\/nrg3208","volume":"13","author":"PB Jensen","year":"2012","unstructured":"Jensen PB, Jensen LJ, Brunak S (2012) Mining electronic health records: towards better research applications and clinical care. Nat Rev Genet 13(6):395\u2013405","journal-title":"Nat Rev Genet"},{"issue":"3","key":"46_CR8","first-page":"363","volume":"85","author":"WT Kerr","year":"2012","unstructured":"Kerr WT, Lau EP, Owens GE, Trefler A (2012) The future of medical diagnostics: large digitized databases. Yale J Biol Med 85(3):363","journal-title":"Yale J Biol Med"},{"key":"46_CR9","doi-asserted-by":"crossref","first-page":"S82","DOI":"10.1097\/MLR.0b013e3182585355","volume":"50","author":"CA Kushida","year":"2012","unstructured":"Kushida CA, Nichols DA, Jadrnicek R, Miller R, Walsh JK, Griffin K (2012) Strategies for de-identification and anonymization of electronic health record data for use in multicenter research studies. Med Care 50:S82\u2013S101","journal-title":"Med Care"},{"key":"46_CR10","doi-asserted-by":"crossref","unstructured":"Wallace BC, Small K, Brodley CE, Lau J, Trikalinos TA (2012) Deploying an interactive machine learning system in an evidence-based practice center: abstrackr. In: Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium, pp 819\u2013824","DOI":"10.1145\/2110363.2110464"},{"issue":"3","key":"46_CR11","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/MSECP.2003.1203228","volume":"1","author":"SW Smith","year":"2003","unstructured":"Smith SW (2003) Humans in the loop: human-computer interaction and se1curity. Secur Priv IEEE 1(3):75\u201379","journal-title":"Secur Priv IEEE"},{"key":"46_CR12","unstructured":"Lupiana D (2008) Development of a framework to leverage knowledge management systems to improve security awareness"},{"key":"46_CR13","unstructured":"Clark S, Goodspeed T, Metzger P, Wasserman Z, Xu K, Blaze M (2011) Why (special agent) johnny (still) can\u2019t encrypt: a security analysis of the apco project 25 two-way radio system. In: USENIX security symposium, Citeseer"},{"key":"46_CR14","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1007\/978-3-662-43968-5_17","volume-title":"Interactive knowledge discovery and data mining in biomedical informatics","author":"P Kieseberg","year":"2014","unstructured":"Kieseberg P, Hobel H, Schrittwieser S, Weippl E, Holzinger A (2014) Protecting asnonymity in data-driven biomedical science. In: Holzinger A, Jurisica I (eds) Interactive knowledge discovery and data mining in biomedical informatics. Springer, Berlin, pp 301\u2013316"},{"key":"46_CR15","unstructured":"Randeree E (2005) Secure health knowledge: balancing security, privacy and access. In: AMCIS 2005 Proceedings, p 326"},{"key":"46_CR16","unstructured":"Warkentin M, Johnston A, Adams A (2006) User interaction with healthcare information systems: Do healthcare professionals want to comply with hipaa? In: AMCIS 2006 Proceedings, p 326"},{"issue":"1","key":"46_CR17","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/JPROC.2011.2165270","volume":"100","author":"I Lee","year":"2012","unstructured":"Lee I, Sokolsky O, Chen S, Hatcliff J, Jee E, Kim B, King A, Mullen-Fortino M, Park S, Roederer A et al (2012) Challenges and research directions in medical cyber-physical systems. Proc IEEE 100(1):75\u201390","journal-title":"Proc IEEE"},{"issue":"4","key":"46_CR18","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1016\/j.diin.2014.09.003","volume":"11","author":"P Fr\u00fchwirt","year":"2014","unstructured":"Fr\u00fchwirt P, Kieseberg P, Krombholz K, Weippl E (2014) Towards a forensic-aware database solution: using a secured database replication protocol and transaction management for digital investigations. Digit Investig 11(4):336\u2013348","journal-title":"Digit Investig"},{"key":"46_CR19","doi-asserted-by":"crossref","unstructured":"Hobel H, Schrittwieser S, Kieseberg P, Weippl E (2013) Anonymity and pseudonymity in data-driven science","DOI":"10.4018\/978-1-4666-5202-6.ch013"},{"key":"46_CR20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cose.2015.05.002","volume":"53","author":"J Heurix","year":"2015","unstructured":"Heurix J, Zimmermann P, Neubauer T, Fenz S (2015) A taxonomy for privacy enhancing technologies. Comput Secur 53:1\u201317","journal-title":"Comput Secur"},{"key":"46_CR21","doi-asserted-by":"crossref","unstructured":"Fruehwirt P, Kieseberg P, Schrittwieser S, Huber M, Weippl ER (2012) Innodb database forensics: reconstructing data manipulation queries from redo logs. In: The fifth international workshop on digital forensics (WSDF)","DOI":"10.1109\/ARES.2012.50"}],"container-title":["Brain Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40708-016-0046-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s40708-016-0046-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40708-016-0046-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40708-016-0046-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,15]],"date-time":"2022-06-15T17:59:49Z","timestamp":1655315989000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s40708-016-0046-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,19]]},"references-count":21,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["46"],"URL":"https:\/\/doi.org\/10.1007\/s40708-016-0046-2","relation":{},"ISSN":["2198-4018","2198-4026"],"issn-type":[{"value":"2198-4018","type":"print"},{"value":"2198-4026","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,19]]}}}