{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:56:25Z","timestamp":1773154585927,"version":"3.50.1"},"reference-count":9,"publisher":"Association for Computing Machinery (ACM)","issue":"9","license":[{"start":{"date-parts":[[2024,8,26]],"date-time":"2024-08-26T00:00:00Z","timestamp":1724630400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2024,9]]},"abstract":"<jats:title>Dek :<\/jats:title>\n          <jats:p>Multidisciplinary\u00a0experts\u2019\u00a0perspectives\u00a0on\u00a0how\u00a0to\u00a0strengthen\u00a0protection\u00a0of\u00a0patients\u2019\u00a0health information\u00a0in\u00a0telehealth\u00a0designs\u00a0and\u00a0workflows.<\/jats:p>","DOI":"10.1145\/3651223","type":"journal-article","created":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T13:42:02Z","timestamp":1722951722000},"page":"27-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Improving Privacy and Security of Telehealth"],"prefix":"10.1145","volume":"67","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9781-2694","authenticated-orcid":false,"given":"Faiza","family":"Tazi","sequence":"first","affiliation":[{"name":"University of Denver, Denver, Colorado, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3455-2562","authenticated-orcid":false,"given":"Josiah","family":"Dykstra","sequence":"additional","affiliation":[{"name":"Designer Security, Severn, Maryland, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8596-085X","authenticated-orcid":false,"given":"Prashanth","family":"Rajivan","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, Washington, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8938-9793","authenticated-orcid":false,"given":"Kapil","family":"Chalil Madathil","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, South Carolina, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-3328-8518","authenticated-orcid":false,"given":"Jiovanne","family":"Hughart","sequence":"additional","affiliation":[{"name":"American Audiology Associates, Atlanta, Georgia, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9577-9138","authenticated-orcid":false,"given":"James","family":"McElligott","sequence":"additional","affiliation":[{"name":"Medical University of South Carolina, Charleston, South Carolina, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9985-250X","authenticated-orcid":false,"given":"Daniel","family":"Votipka","sequence":"additional","affiliation":[{"name":"Tufts University, Medford, Massachusetts, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1299-7867","authenticated-orcid":false,"given":"Sanchari","family":"Das","sequence":"additional","affiliation":[{"name":"University if Denver, Computer Science, Denver, Colorado, United States"}]}],"member":"320","published-online":{"date-parts":[[2024,8,26]]},"reference":[{"key":"e_1_3_1_2_2","article-title":"Playbook for threat modeling medical devices","volume":"1","author":"Bochniewicz E.","year":"2021","unstructured":"Bochniewicz, E. et al. Playbook for threat modeling medical devices. MITRE and the Medical Device Innovation Consortium (MDIC) 1, (2021); https:\/\/bit.ly\/3zFfhRs.","journal-title":"MITRE and the Medical Device Innovation Consortium (MDIC)"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSEE.2012.193"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/CIC50333.2020.00029"},{"issue":"3","key":"e_1_3_1_5_2","first-page":"1","article-title":"Is the HIPAA security rule enough to protect electronic personal health information (PHI) in the cyber age?","volume":"43","author":"Koch D.D.","year":"2016","unstructured":"Koch, D.D. et al. Is the HIPAA security rule enough to protect electronic personal health information (PHI) in the cyber age?\u00a0J. Health Care Finance 43, 3 (2016), 1\u201332.","journal-title":"J. Health Care Finance"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1093\/intqhc\/mzaa117"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1177\/1357633X20916567"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-10183-0_8"},{"key":"e_1_3_1_9_2","volume-title":"Proceedings of Human Factors and Ergonomics Society HFES 67th Intern. Annual Meeting","author":"Tazi F.","year":"2023","unstructured":"Tazi, F. et al. Privacy, Security, and Usability Tradeoffs of Telehealth from Practitioners\u2019 Perspectives. In Proceedings of Human Factors and Ergonomics Society HFES 67th Intern. Annual Meeting. SAGE Publications, Washington D.C., 2023."},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.2196\/31837"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3651223","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3651223","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:49:53Z","timestamp":1750286993000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3651223"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,26]]},"references-count":9,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["10.1145\/3651223"],"URL":"https:\/\/doi.org\/10.1145\/3651223","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,26]]},"assertion":[{"value":"2023-01-20","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-08-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}