Academic literature on the topic 'Computer security Medical records Data protection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer security Medical records Data protection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer security Medical records Data protection"
Carrillo, Eduardo, and Maricarmen Sequera. "PERSONAL DATA IN THE SOCIAL SECURITY INSTITUTE." Law, State and Telecommunications Review 12, no. 2 (October 13, 2020): 14–37. http://dx.doi.org/10.26512/lstr.v12i2.34689.
Full textWang, Baocheng, and Zetao Li. "Healthchain: A Privacy Protection System for Medical Data Based on Blockchain." Future Internet 13, no. 10 (September 24, 2021): 247. http://dx.doi.org/10.3390/fi13100247.
Full textMbonihankuye, Scholas, Athanase Nkunzimana, and Ange Ndagijimana. "Healthcare Data Security Technology: HIPAA Compliance." Wireless Communications and Mobile Computing 2019 (October 17, 2019): 1–7. http://dx.doi.org/10.1155/2019/1927495.
Full textZhao, Yongbin, Meng Cui, Lijuan Zheng, Rui Zhang, Lili Meng, Dong Gao, and Yu Zhang. "Research on electronic medical record access control based on blockchain." International Journal of Distributed Sensor Networks 15, no. 11 (November 2019): 155014771988933. http://dx.doi.org/10.1177/1550147719889330.
Full textShi, Mingyue, Rong Jiang, Wei Zhou, Sen Liu, and Savio Sciancalepore. "A Privacy Risk Assessment Model for Medical Big Data Based on Adaptive Neuro-Fuzzy Theory." Security and Communication Networks 2020 (September 29, 2020): 1–18. http://dx.doi.org/10.1155/2020/5610839.
Full textChen, Yingwen, Linghang Meng, Huan Zhou, and Guangtao Xue. "A Blockchain-Based Medical Data Sharing Mechanism with Attribute-Based Access Control and Privacy Protection." Wireless Communications and Mobile Computing 2021 (June 29, 2021): 1–12. http://dx.doi.org/10.1155/2021/6685762.
Full textWu, Jimmy Ming-Tai, Gautam Srivastava, Jerry Chun-Wei Lin, and Qian Teng. "A Multi-Threshold Ant Colony System-based Sanitization Model in Shared Medical Environments." ACM Transactions on Internet Technology 21, no. 2 (June 2021): 1–26. http://dx.doi.org/10.1145/3408296.
Full textQuantin, Catherine, François-André Allaert, Paul Avillach, Maniane Fassa, Benoît Riandey, Gilles Trouessin, and Olivier Cohen. "Building Application-Related Patient Identifiers: What Solution for a European Country?" International Journal of Telemedicine and Applications 2008 (2008): 1–5. http://dx.doi.org/10.1155/2008/678302.
Full textAnciaux, Nicolas, Morgane Berthelot, Laurent Braconnier, Luc Bouganim, Martine De la Blache, Georges Gardarin, Philippe Kesmarszky, et al. "A Tamper-Resistant and Portable Healthcare Folder." International Journal of Telemedicine and Applications 2008 (2008): 1–9. http://dx.doi.org/10.1155/2008/763534.
Full textMartín del Rey, A., J. L. Hernández Pastora, and G. Rodríguez Sánchez. "3D medical data security protection." Expert Systems with Applications 54 (July 2016): 379–86. http://dx.doi.org/10.1016/j.eswa.2016.02.001.
Full textDissertations / Theses on the topic "Computer security Medical records Data protection"
Cheng, Sin Ying. "Health Insurance Portability and Accountability Act (HIPAA)-compliant privacy access control model for Web services /." View abstract or full-text, 2006. http://library.ust.hk/cgi/db/thesis.pl?COMP%202006%20CHENGS.
Full textMxoli, Ncedisa Avuya Mercia. "Guidelines for secure cloud-based personal health records." Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/14134.
Full textMohammed, Yassene. "Data Protection and Data Security Concept for Medical Applications in a Grid Computing Environment." Doctoral thesis, 2008. http://hdl.handle.net/11858/00-1735-0000-0006-B3AE-A.
Full textBooks on the topic "Computer security Medical records Data protection"
Eric, Johnson M., and SpringerLink (Online service), eds. The Economics of Financial and Medical Identity Theft. Boston, MA: Springer US, 2012.
Find full textJ, Schanz Stephen, Wilson Petra, Essential Drugs and Technology Program (Pan American Health Organization), Pan American Sanitary Bureau, and World Health Organization, eds. The regulation of privacy and data protection in the use of electronic health information: An international perspective and reference source on regulatory and legal issues related to person-identifiable health databases. Washington, D.C: Essential Drugs and Technology Program, Division of Health Systems and Services Development, Pan American Health Organization, Pan American Sanitary Bureau, Regional Office of the World Health Organization, 2001.
Find full textUnited States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Oversight of Government Management, the Federal Workforce, and the District of Columbia. State of federal privacy and data security law: Lagging behind the times? : hearing before the Oversight of Government Management, the Federal Workforce, and the District of Columbia Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Twelfth Congress, second session, July 31, 2012. Washington: U.S. Government Printing Office, 2012.
Find full textThe definitive guide to complying with the HIPAA/HITECH privacy and security rules. Boca Raton, FL: CRC Press, 2013.
Find full textPrivacy, confidentiality, and health research. Cambridge: Cambridge University Press, 2012.
Find full textAssociation, Ontario Hospital. Guidelines for managing privacy, data protection and security for Ontario hospitals. Toronto: Ontario Hospital Association, 2003.
Find full textE-health, privacy, and security law. 2nd ed. [Chicago]: American Bar Association Health Law Section, 2011.
Find full textFernald, Frances. HIPAA security compliance guide. Washington, D.C. (1100 17th St., NW, Suite 300, Washington 20036): Atlantic Information Services, 2003.
Find full textE-health, privacy, and security law, second edition: 2012 supplement. [Chicago, IL]: American Bar Association Health Law Section, 2012.
Find full textP, Mortenson Kenneth, ed. Health care privacy and security. [Eagan, MN.]: West Thomson Reuters, 2013.
Find full textBook chapters on the topic "Computer security Medical records Data protection"
Bercic, Boštjan, and Carlisle George. "Compiling Medical Data into National Medical Databases." In Database Technologies, 2085–99. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-058-5.ch125.
Full textBowles, Juliana, Thais Webber, Euan Blackledge, and Andreas Vermeulen. "A Blockchain-Based Healthcare Platform for Secure Personalised Data Sharing." In Studies in Health Technology and Informatics. IOS Press, 2021. http://dx.doi.org/10.3233/shti210150.
Full textMedlin, B. Dawn, and Joseph A. Cazier. "Social Engineering Techniques, Password Selection, and Health Care Legislation." In Handbook of Research on Emerging Developments in Data Privacy, 85–99. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-7381-6.ch005.
Full textS, Chitra Selvi. "A Wearable Patient Healthcare Monitoring System Using IoT and Cloud Computing Based Security." In Intelligent Systems and Computer Technology. IOS Press, 2020. http://dx.doi.org/10.3233/apc200178.
Full textWang, Yingge, Qiang Cheng, and Jie Cheng. "E-Health Security and Privacy." In Information Security and Ethics, 580–88. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch044.
Full textAl-Zubaidie, Mishall, Zhongwei Zhang, and Ji Zhang. "User Authentication Into Electronic Health Record Based on Reliable Lightweight Algorithms." In Handbook of Research on Cyber Crime and Information Privacy, 700–738. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5728-0.ch032.
Full textNaskar, Ruchira, Rajat Subhra Chakraborty, Dev Kumar Das, and Chandan Chakraborty. "Digital Image Watermarking." In Research Developments in Computer Vision and Image Processing, 195–207. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4558-5.ch011.
Full textMarsh, Stephen, Andrew S. Patrick, and Pamela Briggs. "Social Issues of Trust and Digital Government." In Information Security and Ethics, 2905–14. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch193.
Full text