{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T06:20:41Z","timestamp":1776147641378,"version":"3.50.1"},"reference-count":43,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1109\/ictas.2017.7920658","type":"proceedings-article","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T17:04:53Z","timestamp":1494608693000},"page":"1-6","source":"Crossref","is-referenced-by-count":18,"title":["Improving the information security of personal electronic health records to protect a patient's health information"],"prefix":"10.1109","author":[{"given":"Floyd","family":"Els","sequence":"first","affiliation":[]},{"given":"Liezel","family":"Cilliers","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"poarch","year":"0","journal-title":"Mobile Device Security in the Workplace 5 Key Risks and a Surprising Challenge"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/675129"},{"key":"ref33","author":"laursen","year":"0","journal-title":"Leadership Strategies and Initiatives for Combating Medicaid Fraud and Abuse"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2011.5716518"},{"key":"ref31","year":"0","journal-title":"Health Information Privacy"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1097\/MLR.0b013e31829b1d9f"},{"key":"ref37","year":"0","journal-title":"Privacy Management Programme A Best Practise Guide"},{"key":"ref36","author":"thomson","year":"0","journal-title":"Health Care Data Breaches and Information Security Addressing Threats and Risks to Patient Data"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-013-0447-x"},{"key":"ref34","author":"patel","year":"0","journal-title":"Consumer Access and Use of Online Health Records It Takes Two to Tango"},{"key":"ref10","author":"weiss","year":"0","journal-title":"EHR vs EMR"},{"key":"ref40","article-title":"Beyond the HIPAA privacy rule: enhancing privacy, improving health throught research","author":"nass","year":"2009","journal-title":"National Academies Press"},{"key":"ref11","author":"kemp","year":"0","journal-title":"r Kemp Discusses EHR Implementation After 50 Years of Practice"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2379776.2379779"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-015-0159-1"},{"key":"ref14","first-page":"1","article-title":"Privacy in the digital environment","author":"onn","year":"2005","journal-title":"Haifa Center of Law & Technology"},{"key":"ref15","first-page":"152","article-title":"Health Records on the Cloud: A Security Framework","author":"plachkinova","year":"0"},{"key":"ref16","author":"fineberg","year":"0","journal-title":"Privacy and Security Concerns Highlights"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2012.04.007"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.176"},{"key":"ref19","author":"keckley","year":"2010","journal-title":"The mobile personal health record technology-enabled self-care"},{"key":"ref28","year":"0","journal-title":"Common Framework Overview and Principles"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M2025"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1504\/IJIEM.2010.035624"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2013.0585"},{"key":"ref6","author":"mxoli","year":"2014","journal-title":"Personal Health Records Design considerations for the South African context"},{"key":"ref29","year":"0","journal-title":"ONC National Framework"},{"key":"ref5","article-title":"Perceived Value and Barriers to use of Personal Health Records by Patients in South Africa","author":"erasmus","year":"2014","journal-title":"University of Witwatersrand"},{"key":"ref8","year":"0","journal-title":"Privacy and Security for mHealth Projects in South Africa"},{"key":"ref7","article-title":"Cell Phones in Africa: Communication Lifeline","year":"2015","journal-title":"Washington Mobile Tecnology"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2196\/mhealth.3017"},{"key":"ref9","year":"0","journal-title":"Electronic Health Records"},{"key":"ref1","year":"2006","journal-title":"Preventing medication errors"},{"key":"ref20","first-page":"1. 2","article-title":"A systematic review of healthcare applications for smartphones","volume":"12","author":"mosa","year":"2010","journal-title":"BMC Medical Informatics and Decision Making"},{"key":"ref22","author":"budiu","year":"0","journal-title":"Mobile User Experience Limitations and Strengths"},{"key":"ref21","year":"0","journal-title":"Most stolen mobile phones in SA"},{"key":"ref42","author":"edlund","year":"0","journal-title":"Who is Responsible for Your Healthcare Data Security?"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMp1215258"},{"key":"ref41","year":"0","journal-title":"Mobile Device Privacy and Security How Can You Protect and Secure Health Information When Using a Mobile Device?"},{"key":"ref23","article-title":"Medical identity theft: The information crime that can kill you","author":"dixon","year":"2006","journal-title":"The World Privacy Forum"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03549-4_5"},{"key":"ref43","author":"ohlhorst","year":"0","journal-title":"Encryption is front-line defense for data at rest"},{"key":"ref25","author":"lord","year":"0","journal-title":"Data Protection Data In transit vs Data At Rest"}],"event":{"name":"2017 Conference on Information Communication Technology and Society (ICTAS)","location":"Durban, South Africa","start":{"date-parts":[[2017,3,8]]},"end":{"date-parts":[[2017,3,10]]}},"container-title":["2017 Conference on Information Communication Technology and Society (ICTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7916887\/7920514\/07920658.pdf?arnumber=7920658","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,2]],"date-time":"2017-10-02T22:22:40Z","timestamp":1506982960000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7920658\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/ictas.2017.7920658","relation":{},"subject":[],"published":{"date-parts":[[2017,3]]}}}