Sciweavers

651 search results - page 55 / 131
» Security of Electronic Money
Sort
View
HICSS
2011
IEEE
335views Biometrics» more  HICSS 2011»
13 years 20 days ago
Cyberinfrastructure for Secondary Use of EHR Data: SSA's Use of the Nationwide Health Information Network
This study examined the use of the Nationwide Health Information Network as a cyberinfrastructure for secure and interoperable transport of existing clinical data from electronic ...
Sue S. Feldman, Thomas A. Horan
IHI
2012
353views Healthcare» more  IHI 2012»
12 years 4 months ago
Enhancing accountability of electronic health record usage via patient-centric monitoring
Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow patients to better manage their health information and share it to enhance the quality and effi...
Daisuke Mashima, Mustaque Ahamad
HICSS
2011
IEEE
203views Biometrics» more  HICSS 2011»
13 years 20 days ago
Will HITECH Heal Patient Data Hemorrhages?
Hemorrhages of confidential patient health data create privacy and security concerns. While the US HIPAA legislation on privacy and security went into effect over five years ago, ...
M. Eric Johnson, Nicholas D. Willey
FC
2007
Springer
136views Cryptology» more  FC 2007»
14 years 3 months ago
Usability Analysis of Secure Pairing Methods
Setting up security associations between end-user devices is a challenging task when it needs to be done by ordinary users. The increasing popularity of powerful personal electroni...
Ersin Uzun, Kristiina Karvonen, N. Asokan
SDMW
2007
Springer
14 years 3 months ago
Requirements of Secure Storage Systems for Healthcare Records
Recent compliance regulations are intended to foster and restore human trust in digital information records and, more broadly, in our businesses, hospitals, and educational enterpr...
Ragib Hasan, Marianne Winslett, Radu Sion