{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:53:48Z","timestamp":1742943228304,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319164854"},{"type":"electronic","value":"9783319164861"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16486-1_111","type":"book-chapter","created":{"date-parts":[[2015,3,25]],"date-time":"2015-03-25T11:45:52Z","timestamp":1427283952000},"page":"1121-1132","source":"Crossref","is-referenced-by-count":5,"title":["Can Transparency Enhancing Tools Support Patient\u2019s Accessing Electronic Health Records?"],"prefix":"10.1007","author":[{"given":"Ana","family":"Ferreira","sequence":"first","affiliation":[]},{"given":"Gabriele","family":"Lenzini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"111_CR1","unstructured":"E. P. E. Commission, EU Directive 95\/46\/EC - The Data Protection Directive -IP\/12\/46 - 25\/01\/2012 (October 2005 and 2012)"},{"issue":"7281","key":"111_CR2","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1136\/bmj.322.7281.283","volume":"322","author":"K.D. Mandl","year":"2001","unstructured":"Mandl, K.D., Markwell, D., MacDonald, R., Szolovits, P., Kohane, I.S.: Public standards and patients\u2019 control: how to keep electronic medical records accessible but private. BMJ\u00a0322(7281), 283\u2013287 (2001)","journal-title":"BMJ"},{"issue":"3","key":"111_CR3","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/j.ijmedinf.2003.11.008","volume":"73","author":"A. Bakker","year":"2004","unstructured":"Bakker, A.: Access to ehr and access control at a moment in the past: a discussion of the need and an exploration of the consequences. International Journal of Medical Informatics\u00a073(3), 267\u2013270 (2004)","journal-title":"International Journal of Medical Informatics"},{"key":"111_CR4","first-page":"77","volume":"127","author":"A. Ferreira","year":"2007","unstructured":"Ferreira, A., Correia, A., Silva, A., Corte, A., Pinto, A., Saavedra, A., Pereira, A.L., Pereira, A.F., Cruz-Correia, R., Antunes, L.F.: Why facilitate patient access to medical records. Stud Health Technol Inform\u00a0127, 77\u201390 (2007)","journal-title":"Stud Health Technol Inform"},{"key":"111_CR5","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1017\/S1047951110000363","volume":"20","author":"R.P. Burke","year":"2010","unstructured":"Burke, R.P., Rossi, A.F., Wilner, B.R., Hannan, R.L., Zabinsky, J.A., Jerey, J.A.: Transforming patient and family access to medical information: utilisation patterns of a patient-accessible electronic health record. Cardiology in the Young\u00a020, 477\u2013484 (2010)","journal-title":"Cardiology in the Young"},{"issue":"1","key":"111_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1472-6947-12-87","volume":"12","author":"C. Bartlett","year":"2012","unstructured":"Bartlett, C., Simpson, K., Turner, A.N.: Patient access to complex chronic disease records on the internet. BMC Medical Informatics and Decision Making\u00a012(1), 1\u20137 (2012)","journal-title":"BMC Medical Informatics and Decision Making"},{"issue":"9","key":"111_CR7","doi-asserted-by":"publisher","first-page":"2405","DOI":"10.1007\/s00296-012-2408-2","volume":"33","author":"R. Vaart","year":"2013","unstructured":"Vaart, R., Drossaert, H.C., Taal, E., Laar, A.: Giving rheumatology patients online home access to their electronic medical record (emr): advantages, draw- backs and preconditions according to care providers. Rheumatology International\u00a033(9), 2405\u20132410 (2013)","journal-title":"Rheumatology International"},{"issue":"3","key":"111_CR8","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/j.ijmedinf.2013.12.001","volume":"83","author":"K. Pareshi","year":"2014","unstructured":"Pareshi, K., Wood, P., Martin, M.: A pilot study on the views of elderly re- gional australians of personally controlled electronic health records. International Journal of Medical Informatics\u00a083(3), 201\u2013209 (2014)","journal-title":"International Journal of Medical Informatics"},{"key":"111_CR9","doi-asserted-by":"crossref","unstructured":"Janic, M., Wijbenga, J., Veugen, T.: Transparency enhancing tools (tets): An overview. In: 2013 Third Workshop on Socio-Technical Aspects in Security and Trust (STAST), pp. 18\u201325 (June 2013)","DOI":"10.1109\/STAST.2013.11"},{"key":"111_CR10","unstructured":"Harris, S.: Cissp All-In-One Exam Guide. McGraw-Hill Osborne Media, 4 ed. (2007)"},{"key":"111_CR11","unstructured":"van Blarkom, G., Borking, J.J., Olk, J.G.E.: Handbook of Privacy and Privacy-Enhancing Technologies: The Case of Intelligent Software Agents. College Bescherming Persoonsgegevens (2003)"},{"key":"111_CR12","doi-asserted-by":"crossref","unstructured":"Ardagna, C., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Privacy-enhanced location services information. In: de Vimercati, D.C., Gritzalis, Lambrinoudakis (eds.) Digital Privacy: Theory, Technologies and Practices, Acquisti, pp. 307\u2013326. Auerbach Publications (Taylor and Francis Group) (2007)","DOI":"10.1201\/9781420052183.ch15"},{"issue":"3","key":"111_CR13","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1109\/TIFS.2012.2190726","volume":"7","author":"Z. Erkin","year":"2012","unstructured":"Erkin, Z., Veugen, T., Toft, T., Lagendijk, R.: Generating private recommen- dations efficiently using homomorphic encryption and data packing. IEEE Transactions on Information Forensics and Security\u00a07(3), 1053\u20131066 (2012)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"111_CR14","doi-asserted-by":"crossref","unstructured":"Seneviratne, O., Kagal, L.: Enabling privacy through transparency. In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, pp. 121\u2013128 (2014)","DOI":"10.1109\/PST.2014.6890931"},{"issue":"5","key":"111_CR15","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/s10207-007-0028-8","volume":"6","author":"T. Lauer","year":"2007","unstructured":"Lauer, T., Deng, X.: Building online trust through privacy practices. International Journal of Information Security\u00a06(5), 323\u2013331 (2007)","journal-title":"International Journal of Information Security"},{"issue":"9","key":"111_CR16","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/1151030.1151052","volume":"49","author":"S. Sackmann","year":"2006","unstructured":"Sackmann, S., Str\u00fcker, J., Accorsi, R.: Personalization in privacy-aware highly dynamic systems. Commun. ACM\u00a049(9), 32\u201338 (2006)","journal-title":"Commun. ACM"},{"key":"111_CR17","unstructured":"Hansen, M., Fischer-hbner, S., Pettersson, J.S., Bergmann, M.: Transparency tools for user-controlled identity management"},{"key":"111_CR18","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-642-03315-5_5","volume":"298","author":"H. Hedbom","year":"2009","unstructured":"Hedbom, H.: A survey on transparency tools for enhancing privacy. The Future of Identity in the Information Society\u00a0298, 67\u201382 (2009)","journal-title":"The Future of Identity in the Information Society"},{"key":"111_CR19","unstructured":"International, H.: Transparency - the most powerful driver of health care improve- ment? McKinseys Health Systems and Services Practice (2011)"},{"key":"111_CR20","doi-asserted-by":"crossref","unstructured":"Ferreira, A., Lenzini, G., Santos-Pereira, C., Augusto, A.B., Correia, M.E.: Envisioning secure and usable access control for patients. In: IEEE 3rd International Conference on Serious Games and Applications for Health (2014)","DOI":"10.1109\/SeGAH.2014.7067093"},{"key":"111_CR21","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-642-30436-1_6","volume-title":"Information Security and Privacy Research","author":"A.B. Augusto","year":"2012","unstructured":"Augusto, A.B., Correia, M.E.: OFELIA \u2013 A secure mobile attribute aggregation infrastructure for user-centric identity management. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IFIP AICT, vol.\u00a0376, pp. 61\u201374. Springer, Heidelberg (2012)"},{"key":"111_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/978-3-642-32395-9_5","volume-title":"Information Technology in Bio- and Medical Informatics","author":"C. Santos-Pereira","year":"2012","unstructured":"Santos-Pereira, C., Augusto, A.B., Correia, M.E., Ferreira, A., Cruz-Correia, R.: A Mobile Based Authorization Mechanism for Patient Managed Role Based Access Control. In: B\u00f6hm, C., Khuri, S., Lhotsk\u00e1, L., Renda, M.E. (eds.) ITBAM 2012. LNCS, vol.\u00a07451, pp. 54\u201368. Springer, Heidelberg (2012)"},{"key":"111_CR23","doi-asserted-by":"crossref","unstructured":"Peeters, R., Pulls, T., Wouters, K.: Enhancing transparency with distributed privacy-preserving logging. In: Reimer, H., Pohlmann, N., Schneider, W. (eds.) ISSE 2013 Securing Electronic Business Processes, pp. 61\u201371. Springer Fachmedien Wiesbaden (2013)","DOI":"10.1007\/978-3-658-03371-2_6"},{"key":"111_CR24","unstructured":"ISO\/TS, ISO\/TS 13606-4 - Health informatics - electronic health record communication - Part 4: Security (2009)"},{"key":"111_CR25","unstructured":"H. S. T. Committee, HL7 Role-Based Access Control (RBAC): Healthcare Permission Catalog, HL7 Security Technical Committee Std. (2010)"},{"key":"111_CR26","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/ACSAC.2009.12","volume-title":"Proceedings of the 2009 Annual Computer Security Applications Conference, ACSAC 2009","author":"A. Ferreira","year":"2009","unstructured":"Ferreira, A., Chadwick, D., Farinha, P., Correia, R., Zao, G., Chilro, R., An- Tunes, L.: How to securely break into rbac: The btg-rbac model. In: Proceedings of the 2009 Annual Computer Security Applications Conference, ACSAC 2009, pp. 23\u201331. IEEE Computer Society, Washington, DC (2009)"},{"key":"111_CR27","unstructured":"C. of Europe, Recommendation No. R (97) 5 of the Committee of Ministers to Member States on the Protection of Medical Data (1997)"},{"key":"111_CR28","unstructured":"McDonald, A.M., Cranor, L.F.: cost of reading privacy policies. Journal of Law and Policy for the Information Society (2009)"},{"issue":"2","key":"111_CR29","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1287\/isre.1090.0260","volume":"22","author":"J.Y. Tsai","year":"2011","unstructured":"Tsai, J.Y., Egelman, S., Cranor, L., Acquisti, A.: The effect of online privacy information on purchasing behavior: An experimental study. Info. Sys. Research\u00a022(2), 254\u2013268 (2011)","journal-title":"Info. Sys. Research"},{"issue":"1","key":"111_CR30","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s10676-010-9253-3","volume":"13","author":"W. Pieters","year":"2011","unstructured":"Pieters, W.: Explanation and trust: what to tell the user in security and ai? Ethics and Information Technology\u00a013(1), 53\u201364 (2011)","journal-title":"Ethics and Information Technology"}],"container-title":["Advances in Intelligent Systems and Computing","New Contributions in Information Systems and Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16486-1_111","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T13:30:06Z","timestamp":1676640606000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-16486-1_111"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319164854","9783319164861"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16486-1_111","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}