Papers

With Tag: Protected Health Information

Can't find what you are looking for? Add a listing here
Sort By
(0)

Protection of health information in data mining

International Journal of Healthcare Technology and Management | 2004

none

(0)

CRFs based de-identification of medical records

Bin He, Keting Cen, Jianyi Cheng, Yi Guan, Wenlan Hua
Journal of Biomedical Informatics | 2015 | 10.1016/j.jbi.2015.08.012

none

(0)

Encrypting your patients’ health information

Jeffrey Bendix, Ma
2013

none

(0)

Do characteristics of HIPAA consent forms affect the response rate?

Floyd J Fowler, Brian Clarridge, D Bolcicjankovic, Joel S Weissman
Medical Care | 2007 | 10.1097/01.mlr.0000241062.79855.35

none

(0)

HCPP: Cryptography Based Secure EHR System for Patient Privacy and Emergency Healthcare

Chi Zhang, Xiaoyan Zhu, Yuguang Fang, Jinyuan Sun
2011 | 10.1109/ICDCS.2011.83

none

(0)

Developing an interdisciplinary health informatics security and privacy program (abstract only)

Hong Wang, Xiaohong Yuan, Jinsheng Xu, Kossi D Edoh
2012 | 10.1145/2157136.2157373

none

(0)

Web-based Multi-center Data Management System for Clinical Neuroscience Research

Isak Prohovnik, Hedok Lee, A Pozamantir, Joab Chapman
Journal of Medical Systems | 2008 | 10.1007/s10916-008-9212-2

none

(0)

A Digital Rights Management Model for Healthcare

2009 | 10.1109/POLICY.2009.8

none

(0)

Privacy, Confidentiality, HIPAA, and HITECH: Implications for the Health Care Practitioner

Nayna Philipsen, Mona Calhoun, Tracey L Murray
The Journal for Nurse Practitioners | 2011 | 10.1016/j.nurpra.2011.07.005

none

(0)

Computer-assisted de-identification of free text in the MIMIC II database

G B Moody, Margaret M Douglass, A H Reisner, Gari D Clifford, Roger G Mark
2004 | 10.1109/CIC.2004.1442942

none

(0)

Koenig and Schultz's Disaster Medicine: Comprehensive Principles and Practices: Legislative Authorities and Regulatory Issues

Ernest Abbott, Douglas P Brosnan
2009 | 10.1017/CBO9780511902482.012

none

(0)

Email system architecture for HITECH compliance

Arshad Ali Shahid, Syeda Uzma Gardazi
2010

none

(0)

Automatic de-identification of electronic medical records using token-level and character-level conditional random fields

Haodi Li, Buzhou Tang, Xiaolong Wang, Qingcai Chen, Zengjian Liu, Suisong Zhu, Yangxin Chen, Qiwen Deng, Jingfeng Wang
Journal of Biomedical Informatics | 2015 | 10.1016/j.jbi.2015.06.009

none

(0)

Modular design, application architecture, and usage of a self-service model for enterprise data delivery: the Duke Enterprise Data Unified Content Explorer (DEDUCE).

Steve Evans, Howard C Shang, Shelley A Rusincovitch, Jeffrey M Ferranti, Stephanie Brinson, Monica M Horvath
Journal of Biomedical Informatics | 2014 | 10.1016/j.jbi.2014.07.006

none

Can't find what you are looking for? Add a paper here