{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T10:43:04Z","timestamp":1761561784960},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,8,6]],"date-time":"2013-08-06T00:00:00Z","timestamp":1375747200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["BMC Med Inform Decis Mak"],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1186\/1472-6947-13-84","type":"journal-article","created":{"date-parts":[[2013,8,6]],"date-time":"2013-08-06T16:36:58Z","timestamp":1375807018000},"source":"Crossref","is-referenced-by-count":18,"title":["Analysis of the quality of hospital information systems audit trails"],"prefix":"10.1186","volume":"13","author":[{"given":"Ricardo","family":"Cruz-Correia","sequence":"first","affiliation":[]},{"given":"Isabel","family":"Boldt","sequence":"additional","affiliation":[]},{"given":"Lu\u00eds","family":"Lap\u00e3o","sequence":"additional","affiliation":[]},{"given":"C\u00e1tia","family":"Santos-Pereira","sequence":"additional","affiliation":[]},{"given":"Pedro Pereira","family":"Rodrigues","sequence":"additional","affiliation":[]},{"given":"Ana Margarida","family":"Ferreira","sequence":"additional","affiliation":[]},{"given":"Alberto","family":"Freitas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,8,6]]},"reference":[{"key":"710_CR1","doi-asserted-by":"publisher","first-page":"2631","DOI":"10.1001\/jama.1990.03440190087045","volume":"263","author":"O Barnett","year":"1990","unstructured":"Barnett O: Computers in medicine. JAMA. 1990, 263: 2631-2633. 10.1001\/jama.1990.03440190087045.","journal-title":"JAMA"},{"issue":"4","key":"710_CR2","doi-asserted-by":"crossref","first-page":"500","DOI":"10.1160\/ME9058","volume":"46","author":"K Kuhn","year":"2007","unstructured":"Kuhn K, Giuse D, Lapao L, Wurst S: Expanding the scope of health information systems-from hospitals to regional networks, to national infrastructures, and beyond. Methods Inf Med. 2007, 46 (4): 500-502.","journal-title":"Methods Inf Med"},{"issue":"11","key":"710_CR3","doi-asserted-by":"publisher","first-page":"1162","DOI":"10.1111\/j.1553-2712.2004.tb00700.x","volume":"11","author":"CF Feied","year":"2004","unstructured":"Feied CF, Handler JA, Smith MS, Gillam M, Kanhouwa M, Rothenhaus T, Conover K, Shannon T: Clinical Information Systems: Instant Ubiquitous Clinical Data for Error Reduction and Improved Clinical Outcomes. Acad Emerg Med. 2004, 11 (11): 1162-10.1111\/j.1553-2712.2004.tb00700.x.","journal-title":"Acad Emerg Med"},{"issue":"4","key":"710_CR4","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1016\/j.annemergmed.2006.03.032","volume":"48","author":"J Shapiro","year":"2006","unstructured":"Shapiro J, Kannry J, Lipton M, Goldberg E, Conocenti P, Stuard S, Wyatt B, Kuperman G: Approaches to patient health information exchange and their impact on emergency medicine. Ann Emerg Med. 2006, 48 (4): 426-432. 10.1016\/j.annemergmed.2006.03.032.","journal-title":"Ann Emerg Med"},{"issue":"2","key":"710_CR5","first-page":"235","volume":"14","author":"G Hripcsak","year":"2007","unstructured":"Hripcsak G, Sengupta S, Wilcox A, Green RA: Emergency Department Access to a Longitudinal Medical Record. JAMIA. 2007, 14 (2): 235-238.","journal-title":"JAMIA"},{"key":"710_CR6","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1186\/1472-6947-10-15","volume":"10","author":"RJ Cruz-Correia","year":"2010","unstructured":"Cruz-Correia RJ, Wyatt J, Dinis-Ribeiro M, Altamiro C-P: Determinants of frequency and longevity of hospital encounters\u2019 data. BMC Med Inform Decis Mak. 2010, 10: 15-10.1186\/1472-6947-10-15.","journal-title":"BMC Med Inform Decis Mak"},{"key":"710_CR7","volume-title":"Fundamentals of Law for Health Informatics and Information Management","author":"MS Brodnik","year":"2009","unstructured":"Brodnik MS, McCain MC, Rinehart-Thompson LA, Reynolds R: Fundamentals of Law for Health Informatics and Information Management. 2009, Chicago, USA: AHIMA"},{"issue":"9","key":"710_CR8","first-page":"44","volume":"80","author":"S Nunn","year":"2009","unstructured":"Nunn S: Managing audit trails. J AHIMA. 2009, 80 (9): 44-45.","journal-title":"J AHIMA"},{"issue":"5\u20136","key":"710_CR9","first-page":"438","volume":"76","author":"AR Bakker","year":"2007","unstructured":"Bakker AR: The need to Know the history of the use of digital patient data, in particular the EHR. IJMI. 2007, 76 (5\u20136): 438-441.","journal-title":"IJMI"},{"key":"710_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1097\/PCC.0b013e3181936b23","volume":"10","author":"EH Mack","year":"2009","unstructured":"Mack EH, Wheeler DS, Embi PJ: Clinical decision support systems in the pediatric intensive care unit. Pediatr Crit Care Med. 2009, 10: 1-10.1097\/PCC.0b013e318193724d.","journal-title":"Pediatr Crit Care Med"},{"key":"710_CR11","first-page":"4378","volume":"6","author":"D Chen","year":"2009","unstructured":"Chen D, Chen WB, Soong M, Soong SJ, Orthner HF: Turning Access into a web-enabled secure information system for clinical trials. Clin Trials. 2009, 6: 4378-4385.","journal-title":"Clin Trials"},{"key":"710_CR12","first-page":"562","volume":"1","author":"X Chen","year":"2005","unstructured":"Chen X, Zhang J, Wu D, Han R: HIPPA\u2019s compliant Auditing System for Medical Imaging System. Conference Proceedings of the IEEE Engineering in Medicine and Biology Society. 2005, 1: 562-563.","journal-title":"Conference Proceedings of the IEEE Engineering in Medicine and Biology Society"},{"key":"710_CR13","volume-title":"EuroRec","author":"European Institute for Health Records","year":"2013","unstructured":"European Institute for Health Records: EuroRec. 2013, Available from: \n                    http:\/\/www.eurorec.org"},{"key":"710_CR14","volume-title":"Health informatics -- HL7 version 3 -- Reference information model -- Release 1","author":"ISO","year":"2006","unstructured":"ISO: Health informatics -- HL7 version 3 -- Reference information model -- Release 1. 2006, Switzerland: International Organization for Standardization"},{"key":"710_CR15","volume-title":"IT Technical Framework Profiles","author":"IHE - Integrating the Healthcare Enterprise","year":"2005","unstructured":"IHE - Integrating the Healthcare Enterprise: IT Technical Framework Profiles. 2005, USA: IT Technical Framework Profiles"},{"issue":"1","key":"710_CR16","first-page":"37","volume":"14","author":"L Lap\u00e3o","year":"2011","unstructured":"Lap\u00e3o L: Organizational Challenges and Barriers to Implementing \u201cIT Governance\u201d in a Hospital. Eur J Inf Syst. 2011, 14 (1): 37-45.","journal-title":"Eur J Inf Syst"},{"key":"710_CR17","unstructured":"Lei do Acesso aos Documentos da Administra\u00e7\u00e3o e Reutiliza\u00e7\u00e3o - LADA. 46\/2007. Edited by: Assembleia da Republica Portuguesa. 2007, Portugal"},{"key":"710_CR18","volume-title":"Machine learning","author":"T Mitchell","year":"1997","unstructured":"Mitchell T, Burr Ridge I: Machine learning. 1997, McGraw Hill: IL"},{"key":"710_CR19","first-page":"229","volume-title":"MIE Studies in Health Technology and Informatics 2008","author":"M Lang","year":"2008","unstructured":"Lang M, Burkle T, Laumann S, Prokosch H: Process Mining for Clinical Workflows: Challenges and Current Limitations. MIE Studies in Health Technology and Informatics 2008. 2008, Gotenburg, Sweden: IOS Press, 229-234. 136"},{"issue":"6","key":"710_CR20","doi-asserted-by":"publisher","first-page":"1185","DOI":"10.1016\/j.jbi.2012.08.003","volume":"45","author":"L Bouarfa","year":"2012","unstructured":"Bouarfa L, Dankelman J: Workflow mining and outlier detection from clinical activity logs. J Biomed Inform. 2012, 45 (6): 1185-1190. 10.1016\/j.jbi.2012.08.003. USA","journal-title":"J Biomed Inform"},{"issue":"9","key":"710_CR21","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1109\/TKDE.2004.47","volume":"16","author":"W Van der Aalst","year":"2004","unstructured":"Van der Aalst W, Weijters T, Maruster L: Workflow mining: Discovering process models from event logs. IEEE Trans Knowl Data Eng. 2004, 16 (9): 1128-1142. 10.1109\/TKDE.2004.47.","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"710_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19345-3","volume-title":"Process mining: Discovery, conformance and enhancement of business processes","author":"W Aalst","year":"2011","unstructured":"Aalst W: Process mining: Discovery, conformance and enhancement of business processes. 2011, Berlin: Springer"},{"issue":"7","key":"710_CR23","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1016\/j.is.2012.02.004","volume":"37","author":"J De Weerdt","year":"2012","unstructured":"De Weerdt J, De Backer M, Vanthienen J, Baesens B: A multi-dimensional quality assessment of state-of-the-art process discovery algorithms using real-life event logs. Inf Syst. 2012, 37 (7): 654-676. 10.1016\/j.is.2012.02.004.","journal-title":"Inf Syst"},{"key":"710_CR24","volume-title":"National Institute of Standards and Technology, Special Publication 800-12","author":"B Guttman","year":"1995","unstructured":"Guttman B, Robach E: An Introduction to Computer Security: The NIST Handbook. National Institute of Standards and Technology, Special Publication 800-12. 1995, Gaithersburg, MD, United States:"},{"key":"710_CR25","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1136\/jamia.1997.0040458","volume":"4","author":"JD Halamka","year":"1997","unstructured":"Halamka JD, Szolovits P, Rind D, Safran C: A WWW Implementation of National Recommendations for Protecting Electronic Health Information. J Am Med Inform Assoc. 1997, 4: 458-464. 10.1136\/jamia.1997.0040458.","journal-title":"J Am Med Inform Assoc"},{"key":"710_CR26","volume-title":"22nd Annual Computer Security Applications Conference (ACSAC\u201906)","author":"L R\u00f8stad","year":"2006","unstructured":"R\u00f8stad L, Edsberg O: A study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access logs. 22nd Annual Computer Security Applications Conference (ACSAC\u201906). 2006, Washington, DC, USA: IEEE Computer Society"},{"key":"710_CR27","volume-title":"AMIA Annual Symposium Proceedings, American Medical Informatics Association, 2011, Washington, DC","author":"W Zhang","year":"2011","unstructured":"Zhang W, Gunter CA, Liebovitz D, Tian J, Malin B: Role Prediction using Electronic Medical Record System Audits. AMIA Annual Symposium Proceedings, American Medical Informatics Association, 2011, Washington, DC. 2011"},{"key":"710_CR28","volume-title":"E2147 - 01 Standard Specification for Audit and Disclosure Logs for Use in Health Information Systems. American Society for Testing and Materials-ASTM International","author":"ASTM","year":"2009","unstructured":"ASTM: E2147 - 01 Standard Specification for Audit and Disclosure Logs for Use in Health Information Systems. American Society for Testing and Materials-ASTM International. 2009, United States"},{"key":"710_CR29","doi-asserted-by":"publisher","DOI":"10.1109\/CBMS.2013.6627874","volume-title":"A Process Mining Analysis on a Virtual Electronic Patient Record System","author":"A Rebuge","year":"2013","unstructured":"Rebuge A, Lap\u00e3o L, Freitas A, Cruz-Correia R: A Process Mining Analysis on a Virtual Electronic Patient Record System. 2013, Porto: CBMS"},{"key":"710_CR30","volume-title":"ISO\/IEC 25012:2008 - Software engineering - Software product Quality Requirements and Evaluation (SQuaRE) - Data quality model, International Organization for Standardization, Switzerland","author":"ISO","year":"2008","unstructured":"ISO: ISO\/IEC 25012:2008 - Software engineering - Software product Quality Requirements and Evaluation (SQuaRE) - Data quality model, International Organization for Standardization, Switzerland. 2008"},{"key":"710_CR31","volume-title":"An\u00e1lise da utiliza\u00e7\u00e3o de EHRs usando teoria de grafos em ficheiros de log","author":"LMM Sousa","year":"2011","unstructured":"Sousa LMM: Master Thesis. An\u00e1lise da utiliza\u00e7\u00e3o de EHRs usando teoria de grafos em ficheiros de log. 2011, Faculdade de Medicina da Universidade do Porto Faculdade de Ci\u00eancias da Universidade do Porto"},{"key":"710_CR32","first-page":"337","volume-title":"Third International Conference on Health Informatics - HealthInf 2010","author":"L Ribeiro","year":"2010","unstructured":"Ribeiro L, Cunha JP, Cruz-Correia RJ: Information systems heterogeneity and interoperability inside hospitals - A Survey. Third International Conference on Health Informatics - HealthInf 2010. 2010, Valencia, Spain, 337-343."},{"issue":"4","key":"710_CR33","first-page":"3","volume":"23","author":"E Rahm","year":"2000","unstructured":"Rahm E, Do HH: Data cleaning: Problems and current approaches. IEEE Data Engin Bull. 2000, 23 (4): 3-13.","journal-title":"IEEE Data Engin Bull"},{"issue":"1","key":"710_CR34","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1023\/A:1021564703268","volume":"7","author":"W Kim","year":"2003","unstructured":"Kim W, Choi B-J, Hong E-K, Kim S-K, Lee D: A taxonomy of dirty data. Data min knowl disc. 2003, 7 (1): 81-99. 10.1023\/A:1021564703268.","journal-title":"Data min knowl disc"},{"key":"710_CR35","volume-title":"Problems, methods, and challenges in comprehensive data cleansing","author":"H M\u00fcller","year":"2003","unstructured":"M\u00fcller H, Freytag J-C: Humboldt-Universitat zu Berlin, No. HUB-IB-164. Problems, methods, and challenges in comprehensive data cleansing. 2003, Berlin"},{"key":"710_CR36","volume-title":"International Conference on Information Quality: 2005 (ICIQ-05)","author":"P Oliveira","year":"2005","unstructured":"Oliveira P, Rodrigues F, Henriques P: A formal definition of data quality problems. International Conference on Information Quality: 2005 (ICIQ-05). 2005, Cambridge, Massachusetts: MIT"},{"key":"710_CR37","first-page":"58","volume-title":"A taxonomy of dirty time-oriented data","author":"T Gschwandtner","year":"2012","unstructured":"Gschwandtner T, G\u00e4rtner J, Aigner W, Miksch S: A taxonomy of dirty time-oriented data. 2012, In: Multidisciplinary Research and Practice for Information Systems. Springer, 58-72."},{"issue":"1","key":"710_CR38","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1136\/amiajnl-2011-000681","volume":"20","author":"NG Weiskopf","year":"2013","unstructured":"Weiskopf NG, Weng C: Methods and dimensions of electronic health record data quality assessment: enabling reuse for clinical research. J Am Med Inform Assoc. 2013, 20 (1): 144-151. 10.1136\/amiajnl-2011-000681.","journal-title":"J Am Med Inform Assoc"},{"key":"710_CR39","first-page":"127","volume-title":"Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining (CIDM)","author":"RJC Bose","year":"2013","unstructured":"Bose RJC, Mans RS, VdA Wil MP: Wanna Improve Process Mining Results? : It's High Time We Consider Data Quality Issues Seriously. Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining (CIDM). 2013, Singapore, 127-134."},{"key":"710_CR40","first-page":"140","volume":"LNAI 7738","author":"R Mans","year":"2013","unstructured":"Mans R, Aalst W, Vanwersch R, Moleman A: Process Mining in Healthcare: Data Challenges when Answering Frequently Posed Questions. Lect notes comput sc - Proceedings of the Workshops of BPM 2012. 2013, LNAI 7738: 140-153.","journal-title":"Lect notes comput sc - Proceedings of the Workshops of BPM 2012"},{"key":"710_CR41","first-page":"1","volume-title":"RFC 3881 - Security Audit and Access Accountability Message XML Data Definitions for Healthcare Applications. In., vol. RFC 3881","author":"G Marshall","year":"2004","unstructured":"Marshall G: RFC 3881 - Security Audit and Access Accountability Message XML Data Definitions for Healthcare Applications. In., vol. RFC 3881. 2004, Geneva, Switzerland: The Internet Society, 1-48."},{"key":"710_CR42","volume-title":"Data Elements and Interchange Formats - Information Exchange Representation of Dates and Times In., vol. ISO 8601: 2004","author":"ISO","year":"2004","unstructured":"ISO: Data Elements and Interchange Formats - Information Exchange Representation of Dates and Times In., vol. ISO 8601: 2004. 2004"},{"issue":"10","key":"710_CR43","doi-asserted-by":"publisher","first-page":"1482","DOI":"10.1109\/26.103043","volume":"39","author":"D Mills","year":"2002","unstructured":"Mills D: Internet time synchronization: The network time protocol. Communications, IEEE Transactions on. 2002, 39 (10): 1482-1493.","journal-title":"Communications, IEEE Transactions on"},{"key":"710_CR44","first-page":"433","volume-title":"BPM Workshops - Part 1","author":"J Becker","year":"2011","unstructured":"Becker J, Matzner M, Muller O, Walter M: A Review of Events Formats as Enablers of Event-Driven BPM. BPM Workshops - Part 1. 2011, France: Clermont-Ferrand, 433-445."}],"container-title":["BMC Medical Informatics and Decision Making"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1472-6947-13-84\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1472-6947-13-84.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1472-6947-13-84","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1472-6947-13-84.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,22]],"date-time":"2019-01-22T16:00:42Z","timestamp":1548172842000},"score":1,"resource":{"primary":{"URL":"https:\/\/bmcmedinformdecismak.biomedcentral.com\/articles\/10.1186\/1472-6947-13-84"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,6]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["710"],"URL":"https:\/\/doi.org\/10.1186\/1472-6947-13-84","relation":{},"ISSN":["1472-6947"],"issn-type":[{"value":"1472-6947","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,8,6]]},"article-number":"84"}}