A Review of Security of Electronic Health Records
- 1 March 2005
- journal article
- review article
- Published by SAGE Publications in Health Information Management Journal
- Vol. 34 (1) , 13-18
- https://doi.org/10.1177/183335830503400105
Abstract
The objective of this study is to answer the research question, ‘Are current information security technologies adequate for electronic health records (EHRs)?’ In order to achieve this, the following matters have been addressed in this article: (i) What is information security in the context of EHRs? (ii) Why is information security important for EHRs? and (iii) What are the current technologies for information security available to EHRs? It is concluded that current EHR security technologies are inadequate and urgently require improvement. Further study regarding information security of EHRs is indicated.Keywords
This publication has 19 references indexed in Scilit:
- Registry Research and Medical PrivacyNew England Journal of Medicine, 2004
- A security architecture for interconnecting health information systemsInternational Journal of Medical Informatics, 2004
- e-Consent: The Design and Implementation of Consumer Consent Mechanisms in an Electronic EnvironmentJournal of the American Medical Informatics Association, 2003
- Disambiguation Data: Extracting Information from Anonymized SourcesJournal of the American Medical Informatics Association, 2002
- Anonymous statistical methods versus cryptographic methods in epidemiologyInternational Journal of Medical Informatics, 2000
- Recent advances: Consumer health informaticsBMJ, 2000
- Child AdvocatesPediatrics, 1999
- Privacy Protection of Health Information: Patient Rights and Pediatrician ResponsibilitiesPublished by American Academy of Pediatrics (AAP) ,1999
- Privacy, information technology, and health careCommunications of the ACM, 1997
- Privacy, Confidentiality, and Electronic Medical RecordsJournal of the American Medical Informatics Association, 1996