{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T08:29:45Z","timestamp":1665736185045},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,4,15]],"date-time":"2015-04-15T00:00:00Z","timestamp":1429056000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Secur Inform"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1186\/s13388-015-0017-9","type":"journal-article","created":{"date-parts":[[2015,4,14]],"date-time":"2015-04-14T08:55:20Z","timestamp":1429001720000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Emerging issues for education in E-discovery for electronic health records"],"prefix":"10.1186","volume":"4","author":[{"given":"Shuai","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Raghav H","family":"Rao","sequence":"additional","affiliation":[]},{"given":"Shambhu","family":"Upadhyaya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,15]]},"reference":[{"key":"17_CR1","unstructured":"Gensinger Jr RA, Introduction to healthcare information enabling technologies. Chicago: Healthcare Information and Management Systems Society (HIMSS); (2010)"},{"key":"17_CR2","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1377\/hlthaff.28.2.323","volume":"28","author":"C Chen","year":"2009","unstructured":"C Chen, T Garrido, D Chock, G Okawa, L Liang, The kaiser Permanente electronic health record: transforming and streamlining modalities of care. Health. Aff. 28, 323\u2013333 (2009)","journal-title":"Health. Aff."},{"key":"17_CR3","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.1111\/j.1553-2712.2004.tb00696.x","volume":"11","author":"JA Handler","year":"2004","unstructured":"JA Handler, CF Feied, K Coonan, J Vozenilek, M Gillam, PR Peacock, R Sinert, MS Smith, Computerized physician order entry and online decision support. Acad. Emerg. Med. 11, 1135\u20131141 (2004)","journal-title":"Acad. Emerg. Med."},{"key":"17_CR4","doi-asserted-by":"publisher","first-page":"1477","DOI":"10.1056\/NEJMp0901592","volume":"360","author":"D Blumenthal","year":"2009","unstructured":"D Blumenthal, Stimulating the adoption of health information technology. N. Engl. J. Med. 360, 1477\u20131479 (2009)","journal-title":"N. Engl. J. Med."},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Strobel CD, American recovery and reinvestment act of 2009 (ARRA09). J Corp Account Finance 20(5):83-85 (2009) (111th US Congress)","DOI":"10.1002\/jcaf.20519"},{"key":"17_CR6","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1197\/jamia.M1984","volume":"13","author":"R Kaushal","year":"2006","unstructured":"R Kaushal, AK Jha, C Franz, J Glaser, KD Shetty, T Jaggi, B Middleton, GJ Kuperman, R Khorasani, M Tanasijevic, Return on investment for a computerized physician order entry system. J. Am. Med. Inform. Assoc. 13, 261\u2013266 (2006)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"17_CR7","unstructured":"G Paul and B Nearon, The Discovery Revolution: e-Discovery Amendments to the Federal Rules of Civil Procedure, American Bar Association, Chicago, Illinois (2006)"},{"key":"17_CR8","unstructured":"Fulton-Cavett AM, Electronic Health Records: Federal E-Discovery Rules and Case Law Are Guides for State Litigation. The Brief, 40 (2011)"},{"key":"17_CR9","first-page":"173","volume":"19","author":"KB-S Reich","year":"2009","unstructured":"KB-S Reich, E-discovery in healthcare: 2010 and beyond. Annals. Health. L. 19, 173 (2009)","journal-title":"Annals. Health. L."},{"key":"17_CR10","first-page":"75","volume":"18","author":"TR McLean","year":"2009","unstructured":"TR McLean, EMR metadata uses and E-discovery. Annals. Health. L. 18, 75 (2009)","journal-title":"Annals. Health. L."},{"key":"17_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1472-6947-3-1","volume":"3","author":"DE Detmer","year":"2003","unstructured":"DE Detmer, Building the national health information infrastructure for personal health, health care services, public health, and research. BMC. Med. Informatics. Decision. Making. 3, 1 (2003)","journal-title":"BMC. Med. Informatics. Decision. Making."},{"key":"17_CR12","first-page":"245","volume":"5","author":"JL Masor","year":"2013","unstructured":"JL Masor, Electronic medical records and E-discovery: with New technology come New challenges. Hastings. Sci. Tech. LJ. 5, 245 (2013)","journal-title":"Hastings. Sci. Tech. LJ."},{"key":"17_CR13","first-page":"1523","volume":"24","author":"S Hoffman","year":"2009","unstructured":"S Hoffman, A Podgurski, E-Health hazards: provider liability and electronic health record systems. Berkeley. Tech. LJ. 24, 1523 (2009)","journal-title":"Berkeley. Tech. LJ."},{"key":"17_CR14","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1111\/j.1748-720X.2011.00572.x","volume":"39","author":"S Hoffman","year":"2011","unstructured":"S Hoffman, A Podgurski, Meaningful use and certification of health information technology: what about safety? J. Law. Med. Ethics. 39, 77\u201380 (2011)","journal-title":"J. Law. Med. Ethics."},{"key":"17_CR15","first-page":"26","volume":"32","author":"R Drummond","year":"2011","unstructured":"R Drummond, EHR certification: getting comfortable with the concept. Health. Manag. Technol. 32, 26 (2011)","journal-title":"Health. Manag. Technol."},{"key":"17_CR16","unstructured":"Certification Process for EHR Technologies. [ http:\/\/www.healthit.gov\/providers-professionals\/certification-process-ehr-technologies ]"},{"key":"17_CR17","unstructured":"Meaningful Use Definition & Objectives. [ http:\/\/www.healthit.gov\/providers-professionals\/meaningful-use-definition-objectives ]"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Van De Belt TH, Engelen LJ, Berben SA, Schoonhoven L: Definition of Health 2.0 and Medicine 2.0: a systematic review. J. Med. Internet. Res.12, 2 (2010)","DOI":"10.2196\/jmir.1350"},{"key":"17_CR19","unstructured":"Patientslikeme [ http:\/\/www.patientslikeme.com\/ ]"},{"key":"17_CR20","unstructured":"Health 2.0 in Wikipedia. [ http:\/\/en.wikipedia.org\/wiki\/Health_2.0 ]"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Hughes B, Joshi I, Wareham J: Health 2.0 and Medicine 2.0: tensions and controversies in the field. J. Med. Internet. Res. 2008, 10, 3 (2008)","DOI":"10.2196\/jmir.1056"},{"key":"17_CR22","first-page":"24","volume":"78","author":"C Dimick","year":"2007","unstructured":"C Dimick, E-discovery: preparing for the coming rise in electronic discovery requests. J. AHIMA. 78, 24 (2007)","journal-title":"J. AHIMA."},{"key":"17_CR23","unstructured":"Lorraine v. Markel American Insurance Company, 241 F.R.D 534 (D.Md. May 4, 2007)"},{"key":"17_CR24","first-page":"797","volume":"42","author":"RC Goss","year":"2006","unstructured":"RC Goss, Hot issues in electronic discovery: information retention programs and preservation. Tort. Trial. Ins. Prac. LJ. 42, 797 (2006)","journal-title":"Tort. Trial. Ins. Prac. LJ."},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Ray P, Wimalasiri J: The need for technical solutions for maintaining the privacy of EHR. In Engineering in Medicine and Biology Society, 2006 EMBS\u201906 28th Annual International Conference of the IEEE; New York City. IEEE. 4686\u20134689 (2006)","DOI":"10.1109\/IEMBS.2006.260862"},{"key":"17_CR26","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1177\/183335830503400105","volume":"34","author":"KT Win","year":"2005","unstructured":"KT Win, A review of security of electronic health records. Health. Information. Manag. 34, 13\u201318 (2005)","journal-title":"Health. Information. Manag."},{"key":"17_CR27","unstructured":"Norman C: Advances and Challenges in Secure EHR Access. CEISARE\u2019s Information Assurance Program 2012, (2012)"},{"key":"17_CR28","doi-asserted-by":"crossref","unstructured":"Yuan E, Tong J: Attributed based access control (ABAC) for web services. In Web Services, 2005 ICWS 2005 Proceedings 2005 IEEE International Conference on IEEE; Los Alamitos. IEEE. (2005)","DOI":"10.1109\/ICWS.2005.25"},{"key":"17_CR29","unstructured":"Ferraiolo D, Cugini J, Kuhn DR: Role-based access control (RBAC): Features and motivations. In Proceedings of 11th annual computer security application conference. IEEE Computer Society Press; Los Alamitos. IEEE. 241-248 (1995)"},{"key":"17_CR30","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1197\/jamia.M1480","volume":"11","author":"E Coiera","year":"2004","unstructured":"E Coiera, R Clarke, e-Consent: The design and implementation of consumer consent mechanisms in an electronic environment. J. Am. Med. Inform. Assoc. 11, 129\u2013140 (2004)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"17_CR31","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1037\/a0016853","volume":"40","author":"MM Richards","year":"2009","unstructured":"MM Richards, Electronic medical records: confidentiality issues in the time of HIPAA. Professional. Psychol. Res. Practice. 40, 550 (2009)","journal-title":"Professional. Psychol. Res. Practice."},{"key":"17_CR32","unstructured":"PLC CGSB, Client Alert: HITECH Act Expands HIPAA Privacy and Security Rules. In Book Client Alert: HITECH Act Expands HIPAA Privacy and Security Rules. Coppersmith Gordon Schermer & Brockelman PLC; Phoenix (2009)"},{"key":"17_CR33","unstructured":"Ashish S. Prasad, Cloud computing and social media: Electronic discovery considerations and best practices. Metropolitan. Corporate. Counsel. 26\u201327 (2012)"},{"key":"17_CR34","unstructured":"Alberto G. Araiza, Electronic Discovery in the Cloud, 10 Duke Law & Technology Review 1\u201319 (2011)"},{"key":"17_CR35","doi-asserted-by":"crossref","unstructured":"Singh S, Singh N: Big Data analytics. In Communication, Information & Computing Technology (ICCICT), 2012 International Conference on; 19\u201320 Oct. 2012. IEEE; Mumbai. IEEE. 1\u20134 (2012)","DOI":"10.1109\/ICCICT.2012.6398180"},{"key":"17_CR36","unstructured":"Ingram B: Controlling E-discovery costs in a big data world. Peer Peer. http:\/\/www.lexisnexis.com\/pdf\/Litigation\/ArticleILTAPeer2Peer-ControllingEDSCCostsinaBigDataWorld-Ingram032013.pdf (2013)"},{"key":"17_CR37","first-page":"465","volume":"14","author":"JG Browning","year":"2010","unstructured":"JG Browning, Digging for the digital dirt: discovery and use of evidence from social media sites. SMU. Sci. Tech. L. Rev. 14, 465 (2010)","journal-title":"SMU. Sci. Tech. L. Rev."},{"key":"17_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/2190-8532-1-8","volume":"1","author":"A Sanfilippo","year":"2012","unstructured":"A Sanfilippo, N Gilbert, M Greaves, Technosocial predictive analytics for security informatics. Security. Informatics. 1, 1\u20133 (2012)","journal-title":"Security. Informatics."},{"key":"17_CR39","first-page":"139","volume":"5","author":"C Pham","year":"2013","unstructured":"C Pham, E-discovery in the cloud Era: what\u2019s a litigant to do. Hastings. Sci. Tech. LJ. 5, 139 (2013)","journal-title":"Hastings. Sci. Tech. LJ."},{"key":"17_CR40","unstructured":"2013 Year-End Electronic Discovery and Information Law Update. [ http:\/\/www.gibsondunn.com\/publications\/pages\/2013-Year-End-Electronic-Discovery-InformationLaw-Update.aspx ]"}],"container-title":["Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-015-0017-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13388-015-0017-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-015-0017-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-015-0017-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,23]],"date-time":"2019-08-23T12:09:16Z","timestamp":1566562156000},"score":1,"resource":{"primary":{"URL":"https:\/\/security-informatics.springeropen.com\/articles\/10.1186\/s13388-015-0017-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,15]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["17"],"URL":"https:\/\/doi.org\/10.1186\/s13388-015-0017-9","relation":{},"ISSN":["2190-8532"],"issn-type":[{"value":"2190-8532","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,15]]},"assertion":[{"value":"10 June 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 March 2015","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 April 2015","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"3"}}