Privacy in electronic health records: a systematic mapping study

Main Electronic health record (EHR) applications are digital versions of paper-based patient health information. Traditionally, medical records are made on paper. However, nowadays, advances in information and communication technology have made it possible to change medical records from paper to EHR...

Full description

Saved in:
Bibliographic Details
Published inJournal of public health Vol. 32; no. 3; pp. 435 - 454
Main Authors Tertulino, Rodrigo, Antunes, Nuno, Morais, Higor
Format Journal Article
LanguageEnglish
Published Berlin/Heidelberg Springer Berlin Heidelberg 01.03.2024
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN2198-1833
1613-2238
DOI10.1007/s10389-022-01795-z

Cover

Loading…
Abstract Main Electronic health record (EHR) applications are digital versions of paper-based patient health information. Traditionally, medical records are made on paper. However, nowadays, advances in information and communication technology have made it possible to change medical records from paper to EHR. Therefore, preserving user data privacy is extremely important in healthcare environments. The main challenges are providing ways to make EHR systems increasingly capable of ensuring data privacy and at the same time not compromising the performance and interoperability of these systems. Subject and methods This systematic mapping study intends to investigate the current research on security and privacy requirements in EHR systems and identify potential research gaps in the literature. The main challenges are providing ways to make EHR systems increasingly capable of ensuring data privacy, and at the same time, not compromising the performance and interoperability of these systems. Our research was carried out in the Scopus database, the largest database of abstracts and citations in the literature with peer review. Results We have collected 848 articles related to the area. After disambiguation and filtering, we selected 30 articles for analysis. The result of such an analysis provides a comprehensive view of current research. Conclusions We can highlight some relevant research possibilities. First, we noticed a growing interest in privacy in EHR research in the last 6 years. Second, blockchain has been used in many EHR systems as a solution to achieve data privacy. However, it is a challenge to maintain traceability by recording metadata that can be mapped to private data of the users applying a particular mapping function that can be hosted outside the blockchain. Finally, the lack of a systematic approach between EHR solutions and existing laws or policies leads to better strategies for developing a certification process for EHR systems.
AbstractList MainElectronic health record (EHR) applications are digital versions of paper-based patient health information. Traditionally, medical records are made on paper. However, nowadays, advances in information and communication technology have made it possible to change medical records from paper to EHR. Therefore, preserving user data privacy is extremely important in healthcare environments. The main challenges are providing ways to make EHR systems increasingly capable of ensuring data privacy and at the same time not compromising the performance and interoperability of these systems.Subject and methodsThis systematic mapping study intends to investigate the current research on security and privacy requirements in EHR systems and identify potential research gaps in the literature. The main challenges are providing ways to make EHR systems increasingly capable of ensuring data privacy, and at the same time, not compromising the performance and interoperability of these systems. Our research was carried out in the Scopus database, the largest database of abstracts and citations in the literature with peer review.ResultsWe have collected 848 articles related to the area. After disambiguation and filtering, we selected 30 articles for analysis. The result of such an analysis provides a comprehensive view of current research.ConclusionsWe can highlight some relevant research possibilities. First, we noticed a growing interest in privacy in EHR research in the last 6 years. Second, blockchain has been used in many EHR systems as a solution to achieve data privacy. However, it is a challenge to maintain traceability by recording metadata that can be mapped to private data of the users applying a particular mapping function that can be hosted outside the blockchain. Finally, the lack of a systematic approach between EHR solutions and existing laws or policies leads to better strategies for developing a certification process for EHR systems.
Main Electronic health record (EHR) applications are digital versions of paper-based patient health information. Traditionally, medical records are made on paper. However, nowadays, advances in information and communication technology have made it possible to change medical records from paper to EHR. Therefore, preserving user data privacy is extremely important in healthcare environments. The main challenges are providing ways to make EHR systems increasingly capable of ensuring data privacy and at the same time not compromising the performance and interoperability of these systems. Subject and methods This systematic mapping study intends to investigate the current research on security and privacy requirements in EHR systems and identify potential research gaps in the literature. The main challenges are providing ways to make EHR systems increasingly capable of ensuring data privacy, and at the same time, not compromising the performance and interoperability of these systems. Our research was carried out in the Scopus database, the largest database of abstracts and citations in the literature with peer review. Results We have collected 848 articles related to the area. After disambiguation and filtering, we selected 30 articles for analysis. The result of such an analysis provides a comprehensive view of current research. Conclusions We can highlight some relevant research possibilities. First, we noticed a growing interest in privacy in EHR research in the last 6 years. Second, blockchain has been used in many EHR systems as a solution to achieve data privacy. However, it is a challenge to maintain traceability by recording metadata that can be mapped to private data of the users applying a particular mapping function that can be hosted outside the blockchain. Finally, the lack of a systematic approach between EHR solutions and existing laws or policies leads to better strategies for developing a certification process for EHR systems.
Author Antunes, Nuno
Morais, Higor
Tertulino, Rodrigo
Author_xml – sequence: 1
  givenname: Rodrigo
  orcidid: 0000-0002-7594-9312
  surname: Tertulino
  fullname: Tertulino, Rodrigo
  email: rodrigo.tertulino@ifrn.edu.br
  organization: Federal Institute of Education, Science, and Technology of Rio Grande do Norte (IFRN)
– sequence: 2
  givenname: Nuno
  orcidid: 0000-0002-6044-4012
  surname: Antunes
  fullname: Antunes, Nuno
  organization: Department of Informatics and Engineering of the University of Coimbra (UC)
– sequence: 3
  givenname: Higor
  orcidid: 0000-0002-5921-6696
  surname: Morais
  fullname: Morais, Higor
  organization: Federal Institute of Education, Science, and Technology of Rio Grande do Norte (IFRN)
BookMark eNp9kEtLAzEUhYNUsFX_gKsB19E8ppmJK6X4goIudB0ymZt2yjQzJqkw_fVGRxBcdHUX53z3HM4MTVznAKELSq4oIcV1oISXEhPGMKGFnOP9EZpSQTlmjJcTNGVUlpiWnJ-gWQgbQjjnTE7R7atvPrUZssZl0IKJvnONydag27jOPJjO1-Em01kYQoStjknc6r5v3CoLcVcPZ-jY6jbA-e89Re8P92-LJ7x8eXxe3C2xYZJHzETF8tqayuoyt5TVmqV6wsrKgjFCMGEIK6CYQ1IqYY3ICRd1DcLYohLAT9Hl-Lf33ccOQlSbbuddilQpgBCZl5InVzm6jO9C8GCVaWIq3bnoddMqStT3XmrcS6W91M9eap9Q9g_tfbPVfjgM8REKyexW4P9aHaC-ABZIgVg
CitedBy_id crossref_primary_10_4018_IRMJ_349977
crossref_primary_10_59681_2175_4411_v16_iEspecial_2024_1281
crossref_primary_10_1016_j_prime_2025_100961
crossref_primary_10_1016_j_jcjo_2024_06_007
crossref_primary_10_1038_s41598_024_66603_y
crossref_primary_10_2196_54572
crossref_primary_10_3390_app14135785
crossref_primary_10_1007_s10879_024_09653_7
crossref_primary_10_1016_j_jclepro_2024_142802
crossref_primary_10_1021_acsptsci_3c00377
crossref_primary_10_1016_j_health_2024_100381
crossref_primary_10_1177_20552076241288631
crossref_primary_10_1007_s11227_024_06535_6
crossref_primary_10_1038_s41598_025_91287_3
crossref_primary_10_1109_TCE_2024_3373912
crossref_primary_10_1109_ACCESS_2024_3441751
crossref_primary_10_3390_app14177765
crossref_primary_10_7717_peerj_cs_2517
crossref_primary_10_3390_healthcare12131363
crossref_primary_10_1007_s12599_024_00869_4
crossref_primary_10_37394_23207_2024_21_127
crossref_primary_10_56294_mw2024498
Cites_doi 10.14569/IJACSA.2020.0110286
10.1109/ICBDA.2019.8713188
10.4018/978-1-5225-7071-4.ch004
10.1109/ICITISEE.2017.8285487
10.1145/3408066.3408106
10.1007/s10742-020-00238-0
10.1109/CSCI46756.2018.00143
10.1007/s10916-019-1250-4
10.1016/j.jisa.2020.102528
10.1109/TrustCom/BigDataSE.2019.00085
10.6028/NIST.SP.800-66r1
10.5220/0006608103120321
10.13140/RG.2.1.1508.4405
10.1136/qshc.2010.042085
10.1109/ICCSII.2016.7462427
10.1016/j.knosys.2015.02.004
10.1016/j.jbi.2012.12.003
10.1109/TDSC.2019.2946073
10.1155/2019/7516035
10.1016/j.ijinfomgt.2016.07.006
10.1016/j.ijmedinf.2015.02.002
10.1109/ACCESS.2019.2925390
10.6028/NIST.SP.800-162
10.1197/jamia.M1664
10.4274/balkanmedj.2017.0966
10.1109/ICESC51422.2021.9532644
10.1109/IWCMC48107.2020.9148357
10.2196/10725
10.1109/BIBM.2015.7359879
10.14236/ewic/EASE2008.8
10.1016/j.jbi.2014.06.002
10.1109/TrustCom.2016.0105
10.1002/sec.1556
10.14569/IJACSA.2016.070464
10.1166/asl.2018.11139
10.1038/s41431-019-0340-6
10.1016/j.infsof.2008.01.006
10.1007/s11277-020-07474-0
10.1109/JBHI.2017.2721545
10.1016/j.ijmedinf.2007.09.001
10.1016/j.infsof.2015.03.007
10.1016/j.ijmedinf.2016.02.002
10.1109/ACCESS.2018.2801266
10.1016/j.jbi.2016.11.001
10.3122/jabfm.2015.S1.150133
10.1007/s10916-016-0621-3
10.1109/ACCESS.2019.2946373
10.4018/978-1-59904-690-7
10.1109/ACCESS.2019.2917555
10.1016/j.comnet.2021.108500
10.1109/ICHI.2015.92
10.1109/ICCCN.2018.8487349
10.1016/j.protcy.2013.12.183
10.1016/j.future.2016.08.011
10.1109/CHASE.2016.24
10.1016/j.eij.2020.07.003
10.1109/ACCESS.2020.3011099
10.1007/978-3-319-05693-7_13
10.1093/jamia/ocv038
10.1016/j.procs.2020.06.021
10.1109/CompComm.2017.8322697
10.1109/ICDIPC.2016.7470795
10.1109/GLOCOMW.2018.8644088
10.1109/ICIMTech.2018.8528190
10.1109/CCWC54503.2022.9720863
10.1109/COMPSAC.2019.00106
10.1007/s10916-014-0165-3
10.1007/s10916-019-1445-8
10.1007/s10586-020-03106-1
10.1109/IEMCON.2017.8117210
ContentType Journal Article
Copyright The Author(s) 2023
The Author(s) 2023. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: The Author(s) 2023
– notice: The Author(s) 2023. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID C6C
AAYXX
CITATION
3V.
7T2
7X7
7XB
88E
8C1
8FE
8FG
8FI
8FJ
8FK
ABJCF
ABUWG
AEUYN
AFKRA
ATCPS
AZQEC
BENPR
BGLVJ
BHPHI
C1K
CCPQU
DWQXO
FYUFA
GHDGH
GNUQQ
HCIFZ
K9.
L6V
M0S
M1P
M7S
PATMY
PHGZM
PHGZT
PJZUB
PKEHL
PPXIY
PQEST
PQGLB
PQQKQ
PQUKI
PTHSS
PYCSY
DOI 10.1007/s10389-022-01795-z
DatabaseName Springer Nature OA Free Journals
CrossRef
ProQuest Central (Corporate)
Health and Safety Science Abstracts (Full archive)
ProQuest Health & Medical Collection
ProQuest Central (purchase pre-March 2016)
Medical Database (Alumni Edition)
ProQuest Public Health Database
ProQuest SciTech Collection
ProQuest Technology Collection
Hospital Premium Collection
Hospital Premium Collection (Alumni Edition)
ProQuest Central (Alumni) (purchase pre-March 2016)
Materials Science & Engineering Collection
ProQuest Central (Alumni)
ProQuest One Sustainability (subscription)
ProQuest Central UK/Ireland
ProQuest Agricultural & Environmental Science & Pollution Managment
ProQuest Central Essentials
ProQuest Central
Technology Collection
Natural Science Collection
Environmental Sciences and Pollution Management
ProQuest One Community College
ProQuest Central Korea
Health Research Premium Collection
Health Research Premium Collection (Alumni)
ProQuest Central Student
SciTech Premium Collection
ProQuest Health & Medical Complete (Alumni)
ProQuest Engineering Collection
ProQuest Health & Medical Collection
Medical Database
Engineering Database
Environmental Science Database
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest Health & Medical Research Collection
ProQuest One Academic Middle East (New)
ProQuest One Health & Nursing
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
Engineering collection
Environmental Science Collection
DatabaseTitle CrossRef
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest Health & Medical Complete (Alumni)
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest One Health & Nursing
Environmental Sciences and Pollution Management
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest One Sustainability
ProQuest Health & Medical Research Collection
ProQuest Engineering Collection
Health Research Premium Collection
Health and Medicine Complete (Alumni Edition)
Natural Science Collection
ProQuest Central Korea
Health & Medical Research Collection
Agricultural & Environmental Science Collection
Health & Safety Science Abstracts
ProQuest Central (New)
ProQuest Medical Library (Alumni)
Engineering Collection
Engineering Database
ProQuest Public Health
ProQuest One Academic Eastern Edition
ProQuest Hospital Collection
ProQuest Technology Collection
Health Research Premium Collection (Alumni)
ProQuest SciTech Collection
ProQuest Hospital Collection (Alumni)
Environmental Science Collection
ProQuest Health & Medical Complete
ProQuest Medical Library
ProQuest One Academic UKI Edition
Materials Science & Engineering Collection
Environmental Science Database
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
DatabaseTitleList ProQuest Central Student

Database_xml – sequence: 1
  dbid: C6C
  name: Springer Nature OA Free Journals
  url: http://www.springeropen.com/
  sourceTypes: Publisher
– sequence: 2
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Medicine
Public Health
EISSN 1613-2238
EndPage 454
ExternalDocumentID 10_1007_s10389_022_01795_z
GrantInformation_xml – fundername: Universidade de Coimbra
GroupedDBID ---
-53
-5E
-5G
-BR
-EM
-Y2
-~C
.86
.VR
04C
06C
06D
0R~
0VY
1N0
1SB
2.D
203
28-
29L
29~
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2Z-
2~H
30V
3V.
4.4
406
408
409
40D
40E
44B
53G
5GY
5QI
5VS
67Z
6NX
7X7
7XC
88E
8C1
8FE
8FG
8FH
8FI
8FJ
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJJC
AAJKR
AANXM
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTV
ABHLI
ABHQN
ABIVO
ABJCF
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABPLI
ABQBU
ABQSL
ABSXP
ABTEG
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACIWK
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACPRK
ACSNA
ACUDM
ACYUM
ACZOJ
ADBBV
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AEOHA
AEPYU
AESKC
AETLH
AEUYN
AEVLU
AEXYK
AFEXP
AFKRA
AFLOW
AFQWF
AFRAH
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHMBA
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
AKMHD
ALIPV
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARMRJ
ASPBG
ATCPS
AVWKF
AXYYD
AZFZN
B-.
BA0
BBWZM
BDATZ
BENPR
BGLVJ
BGNMA
BHPHI
BMSDO
BPHCQ
BSONS
BVXVI
C6C
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
EBLON
EBS
EIHBH
EIOEI
EJD
EN4
ESBYG
F5P
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
FYUFA
G-Y
G-Z
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GRRUI
GXS
H13
HCIFZ
HF~
HG5
HG6
HMCUK
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I09
IHE
IJ-
IKXTQ
IWAJR
IXC
IXD
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KDC
KOV
KOW
KPH
L6V
LAS
LLZTM
M1P
M4Y
M7S
MA-
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O-J
O9-
O93
O9G
O9I
O9J
OAM
P19
P9S
PATMY
PF0
PQQKQ
PROAC
PSQYO
PT4
PT5
PTHSS
PYCSY
Q2X
QF4
QN7
QO5
QOK
QOR
QOS
R-Y
R4E
R89
R9I
RHV
RNI
ROL
RPX
RSV
RZK
S16
S1Z
S26
S27
S28
S37
S3B
SAP
SCLPG
SDE
SDH
SDM
SHX
SISQX
SJYHP
SMD
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
SSXJD
STPWE
SZ9
SZN
T13
T16
TSG
TSK
TSV
TT1
TUC
U2A
U9L
UG4
UKHRP
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WJK
WK6
WK8
YLTOR
Z45
Z7W
ZMTXR
ZMU
ZOVNA
AAPKM
AAYXX
ABBRH
ABDBE
ADHKG
AFDZB
AFOHR
AGQPQ
AHPBZ
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
7T2
7XB
8FK
ABRTQ
AZQEC
C1K
DWQXO
GNUQQ
K9.
PJZUB
PKEHL
PPXIY
PQEST
PQGLB
PQUKI
ID FETCH-LOGICAL-c293t-26b24dfcbfa84f12da21616f9bfecc6626c027e75eda2b6fc64036dde6cf7b6e3
IEDL.DBID AGYKE
ISSN 2198-1833
IngestDate Wed Aug 13 03:58:00 EDT 2025
Tue Jul 01 04:18:49 EDT 2025
Thu Apr 24 22:55:32 EDT 2025
Fri Feb 21 02:40:36 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 3
Keywords Privacy
Security
Health
Electronic health record (EHR)
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c293t-26b24dfcbfa84f12da21616f9bfecc6626c027e75eda2b6fc64036dde6cf7b6e3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-6044-4012
0000-0002-7594-9312
0000-0002-5921-6696
OpenAccessLink https://proxy.k.utb.cz/login?url=https://link.springer.com/10.1007/s10389-022-01795-z
PQID 2930094893
PQPubID 326243
PageCount 20
ParticipantIDs proquest_journals_2930094893
crossref_citationtrail_10_1007_s10389_022_01795_z
crossref_primary_10_1007_s10389_022_01795_z
springer_journals_10_1007_s10389_022_01795_z
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20240300
2024-03-00
20240301
PublicationDateYYYYMMDD 2024-03-01
PublicationDate_xml – month: 3
  year: 2024
  text: 20240300
PublicationDecade 2020
PublicationPlace Berlin/Heidelberg
PublicationPlace_xml – name: Berlin/Heidelberg
– name: Heidelberg
PublicationSubtitle From Theory to Practice
PublicationTitle Journal of public health
PublicationTitleAbbrev J Public Health (Berl.)
PublicationYear 2024
Publisher Springer Berlin Heidelberg
Springer Nature B.V
Publisher_xml – name: Springer Berlin Heidelberg
– name: Springer Nature B.V
References Dybå TDingsøyr TEmpirical studies of agile software development: A systematic reviewInf. Softw. Technol.20085083385910.1016/j.infsof.2008.01.006https://doi.org/10.1016/j.infsof.2008.01.006
Gardiyawasam PussewalageHSOleshchukVAPrivacy preserving mechanisms for enforcing security and privacy requirements in e-health solutionsInt. J. Inf. Manag.2016366, Part B1161117310.1016/j.ijinfomgt.2016.07.006
YükselBKüpçüAÖznur Ö.Research issues for privacy and security of electronic health servicesFutur. Gener. Comput. Syst.20176811310.1016/j.future.2016.08.011https://doi.org/10.1016/j.future.2016.08.011
HäyrinenKSarantoKNykänenPDefinition, structure, content, use and impacts of electronic health records: a review of the research literatureInt. J. Med. Informatics200877529130410.1016/j.ijmedinf.2007.09.001
Jagtap S. T., Thakar C. M., El imrani O, Phasinam K., Garg S., Ventayen R. J. M. (2021) A framework for secure healthcare system using blockchain and smart contracts. In: 2021 Second International Conference on Electronics and Sustainable Communication Systems (ICESC), pp. 922–926 https://doi.org/10.1109/ICESC51422.2021.9532644
PoulisGLoukidesGSkiadopoulosSGkoulalas-DivanisAAnonymizing datasets with demographics and diagnosis codes in the presence of utility constraintsJ. Biomed. Inform.201765769610.1016/j.jbi.2016.11.00127832965
AlanaziHOZaidanAAZaidanBBKiahMLAl-BakriSHMeeting the security requirements of electronic medical records in the era of high-speed computingJ Med Syst20153911651:STN:280:DC%2BC2Mzmt1Kksg%3D%3D10.1007/s10916-014-0165-325481568
Ibrahim A., Singhal M. (2016b) A simultaneous key generation technique for health information exchange (hie) based on existing patients’ credentials
Smaradottir B. F. (2018) Security management in electronic health records: Attitudes and experiences among health care professionals. In: 2018 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 715–719 https://doi.org/10.1109/CSCI46756.2018.00143
GDPR (2016) Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/ EC (General Data Protection Regulation). http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG&toc=OJ:L:2016:119:TOC
JayabalanMRanaMEAnonymizing healthcare records: A study of privacy preserving data publishing techniquesAdv. Sci. Lett.2018241694169710.1166/asl.2018.11139https://doi.org/10.1166/asl.2018.11139
Rana M. E., Jayabalan M. (2016) Privacy preserving anonymization techniques for patient data: An overview. In: Conference: 3rd International Conference on Knowledge, Information and Software Engineering (ICKIS2016)
KayaalpMPatient privacy in the era of big dataBalkan Med. J.201835181710.4274/balkanmedj.2017.0966289038865820452
NwekeLYengPWolthusenSYangBUnderstanding attribute-based access control for modelling and analysing healthcare professionals’ security practicesInt. J. Adv. Comput. Sci. Appl.202011683690https://doi.org/10.14569/IJACSA.2020.0110286
Al Baqari M., Barka E. (2020) Biometric-based blockchain EHR system (BBEHR). In: 2020 International Wireless Communications and Mobile Computing (IWCMC), pp. 2228–2234, https://doi.org/10.1109/IWCMC48107.2020.9148357
Odeh A., Keshta I., Aboshgifa A., Abdelfattah E. (2022) Privacy and security in mobile health technologies: Challenges and concerns. In: 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0065–0071 https://doi.org/10.1109/CCWC54503.2022.9720863
EdemacuKParkHKJangBKimJWPrivacy provision in collaborative eHealth with attribute-based encryption: survey, challenges and future directionsIEEE Access20197896148963610.1109/ACCESS.2019.2925390
Ahmadian L., Salehi Nejad S., Khajouei R. (2015) Evaluation methods used on health information systems (hiss) in Iran and the effects of hiss on Iranian healthcare: A systematic review. International Journal of Medical Informatics, 84. https://doi.org/10.1016/j.ijmedinf.2015.02.002
Verdonck M., Poels G. (2020) Architecture and value analysis of a blockchain-based electronic health record permission management system (short paper). In: VMBO
Abomhara M., Køien G. M., Oleshchuk V. A., Hamid M. (2018) Towards risk-aware access control framework for healthcare information sharing. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy - 1, ICISSP, INSTICC, SciTePress, pp. 312–321. https://doi.org/10.5220/0006608103120321
Ismail L., Materwala H. (2020) BlockHR: A blockchain-based framework for health records management. In: Proceedings of the 12th International Conference on Computer Modeling and Simulation, Association for Computing Machinery, New York, NY, USA, ICCMS ’20, p 164–168 https://doi.org/10.1145/3408066.3408106
Hu V., Ferraiolo D., Kuhn D., Schnitzer A., Sandlin K., Miller R., Scarfone K. (2014) Guide to attribute based access control (ABAC) definition and considerations. National Institute of Standards and Technology Special Publication, 162–800
Farhadi M., Haddad H., Shahriar H. (2019) Compliance checking of open source EHR applications for HIPAA and ONC security and privacy requirements. In: 2019 IEEE 43rd annual computer software and applications conference (COMPSAC) vol. 1, pp. 704–713. https://doi.org/10.1109/COMPSAC.2019.00106
Fernández-AlemánJLSeñorICÁngel Oliver LozoyaPTovalASecurity and privacy in electronic health records: a systematic literature reviewJ. Biomed. Inform.201346354156210.1016/j.jbi.2012.12.00323305810
WazidMDasAKKumarNContiMVasilakosAVWazidMDasAKKumarNContiMVasilakosAVA Novel Authentication and Key Agreement Scheme for Implantable Medical Devices DeploymentIEEE J Biomed Health Inform20182241299130910.1109/JBHI.2017.272154528682267
ShahnazAQamarUKhalidAUsing blockchain for electronic health recordsIEEE Access2019714778214779510.1109/ACCESS.2019.2946373https://doi.org/10.1109/ACCESS.2019.2946373
Medicine J. H. (2018) Preparing for the EU GDPR In research settings guidance. https://www.jhsph.edu/offices-and-services/institutional-review-board
BernerESDetmerDESimborgDWill the wave finally break? A brief view of the adoption of electronic medical records in the United StatesJ. Am. Med. Inform. Assoc.20051213710.1197/jamia.M166415492029543824
GuoRShiHZhaoQZhengDSecure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systemsIEEE Access20186116761168610.1109/ACCESS.2018.2801266
Shrestha N. M., Alsadoon A., Prasad P. W. C., Hourany L., Elchouemi A. (2016) Enhanced e-health framework for security and privacy in healthcare system. In: 2016 Sixth International Conference on Digital Information Processing and Communications (ICDIPC), pp. 75–79 https://doi.org/10.1109/ICDIPC.2016.7470795
EomJLeeKPatient-controlled attribute-based encryption for secure electronic health records systemJ. Med. Syst.20164025310.1007/s10916-016-0621-327714562
Nguyen D. C., Pathirana P. N., Ding M., Seneviratne A. (2019) Blockchain for secure EHRs sharing of mobile cloud based e-health systems, vol 7
RezaeibaghaFMuYDistributed clinical data sharing via dynamic access-control policy transformationInt. J. Med. Informatics201689253110.1016/j.ijmedinf.2016.02.002https://doi.org/10.1016/j.ijmedinf.2016.02.002
Mehndiratta P., Sachdeva S., Kulshrestha S. (2014) A model of privacy and security for electronic health records. In: Madaan A., Kikuchi S., Bhalla S. (eds) Databases in Networked Information Systems, Springer International Publishing, Cham, pp. 202?213
Aldossary S., Allen W. (2016) Data security, privacy, availability and integrity in cloud computing: Issues and current solutions. Int. J. Adv. Comput. Sci. Appl. 7, https://doi.org/10.14569/IJACSA.2016.070464
HIPAA (2013a) HIPAA survival guide HITECH act summary - HIPAA Privacy Rule 164.506. http://www.hipaasurvivalguide.com/hipaa-regulations/164-506_BAK_01202013.php
Xu R., Joshi J., Krishnamurthy P. (2019) An integrated privacy preserving attribute based access control framework supporting secure deduplication. IEEE Transactions on Dependable and Secure Computing, 1–1. https://doi.org/10.1109/TDSC.2019.2946073
Vora J., Nayyar A., Tanwar S., Tyagi S., Kumar N., Obaidat M. S., Rodrigues J. J. P. C. (2018) Bheem: A blockchain-based framework for securing electronic health records. In: 2018 IEEE Globecom Workshops (GC Wkshps), pp. 1–6 https://doi.org/10.1109/GLOCOMW.2018.8644088
Aslam U., Sohail A., Aziz H. I. T., Vistro M. (2019) The importance of preserving the anonymity in healthcare data: a survey. International Journal Of Scientific & Technology Research 8(11), NOVEMBER 2019
Gkoulalas-DivanisALoukidesGSunJPublishing data from electronic health records while preserving privacy: A survey of algorithmsJ. Biomed. Inform.20145041910.1016/j.jbi.2014.06.00224936746https://doi.org/10.1016/j.jbi.2014.06.002, special Issue on Informatics Methods in Medical Privacy
Tasatanattakool P., Chian T. (2017) User authentication algorithm with role-based access control for electronic health systems to prevent abuse of patient privacy. In: 2017 3rd IEEE International Conference on Computer and Communications (ICCC), pp. 1019–1024 https://doi.org/10.1109/CompComm.2017.8322697
Kanwal T., Anjum A., Khan A. (2020) Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities. Cluster Computing https://doi.org/10.1007/s10586-020-03106-1
BalsariSFortenkoABlayaJAGropperAJayaramMMatthanRSahasranamRShankarMSarbadhikariSNBiererBEMandlKDMehendaleSKhannaTReimagining health data exchange: an application programming interface–enabled roadmap for IndiaJ Med Internet Res2018207e1072510.2196/10725300063256064038
Grana M., Jackwoski K. (2015) Electronic health record: a review. In: 2015 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), IEEE Computer Society, Los Alamitos, CA, USA, pp. 1375–1382. htt
1795_CR42
YM Essa (1795_CR16) 2019; 43
1795_CR44
R Guo (1795_CR24) 2018; 6
1795_CR46
SM Shah (1795_CR65) 2020; 8
HM Hussien (1795_CR33) 2019; 43
AN Kho (1795_CR45) 2015; 22
JJ Hathaliya (1795_CR26) 2020; 102528
1795_CR48
1795_CR49
A Zhang (1795_CR81) 2016; 9
Dybå T (1795_CR13) 2008; 50
F Rezaeibagha (1795_CR62) 2016; 89
B Zaabar (1795_CR80) 2021; 200
1795_CR51
1795_CR52
1795_CR53
1795_CR55
1795_CR57
D Sittig (1795_CR69) 2010; 3
1795_CR50
JL Fernández-Alemán (1795_CR18) 2013; 46
L Nweke (1795_CR54) 2020; 11
M Kayaalp (1795_CR43) 2018; 35
K Petersen (1795_CR58) 2015; 64
1795_CR17
J Eom (1795_CR15) 2016; 40
A Ghazvini (1795_CR21) 2013; 11
1795_CR7
1795_CR5
1795_CR20
1795_CR64
1795_CR4
G Richter (1795_CR63) 2019; 27
1795_CR23
1795_CR9
1795_CR68
1795_CR25
HO Alanazi (1795_CR6) 2015; 39
1795_CR3
1795_CR2
1795_CR1
1795_CR60
F Amato (1795_CR8) 2015; 79
1795_CR61
K Häyrinen (1795_CR34) 2008; 77
G Poulis (1795_CR59) 2017; 65
1795_CR27
1795_CR28
1795_CR29
M Jayabalan (1795_CR40) 2018; 24
MMM Pai (1795_CR56) 2021; 21
1795_CR73
1795_CR30
A Shahnaz (1795_CR66) 2019; 7
1795_CR74
1795_CR31
1795_CR75
A Gkoulalas-Divanis (1795_CR22) 2014; 50
1795_CR32
1795_CR77
KT Kadhim (1795_CR41) 2020; 114
1795_CR78
1795_CR35
ES Berner (1795_CR11) 2005; 12
1795_CR36
S Balsari (1795_CR10) 2018; 20
K Edemacu (1795_CR14) 2019; 7
Y Sharma (1795_CR67) 2020; 173
1795_CR70
B Yüksel (1795_CR79) 2017; 68
1795_CR71
M Cifuentes (1795_CR12) 2015; 28
1795_CR72
LL Kloss (1795_CR47) 2018; 060
HS Gardiyawasam Pussewalage (1795_CR19) 2016; 36
M Wazid (1795_CR76) 2018; 22
1795_CR37
1795_CR38
1795_CR39
References_xml – reference: YükselBKüpçüAÖznur Ö.Research issues for privacy and security of electronic health servicesFutur. Gener. Comput. Syst.20176811310.1016/j.future.2016.08.011https://doi.org/10.1016/j.future.2016.08.011
– reference: WazidMDasAKKumarNContiMVasilakosAVWazidMDasAKKumarNContiMVasilakosAVA Novel Authentication and Key Agreement Scheme for Implantable Medical Devices DeploymentIEEE J Biomed Health Inform20182241299130910.1109/JBHI.2017.272154528682267
– reference: Fernández-AlemánJLSeñorICÁngel Oliver LozoyaPTovalASecurity and privacy in electronic health records: a systematic literature reviewJ. Biomed. Inform.201346354156210.1016/j.jbi.2012.12.00323305810
– reference: Nguyen D. C., Pathirana P. N., Ding M., Seneviratne A. (2019) Blockchain for secure EHRs sharing of mobile cloud based e-health systems, vol 7
– reference: Lu Y., Sinnott R. O. (2016) Semantic-based privacy protection of electronic health records for collaborative research. In: 2016 IEEE Trustcom/BigDataSE/ISPA, pp. 519–526, https://doi.org/10.1109/TrustCom.2016.0105
– reference: Huang J., Qi Y. W., Asghar M. R., Meads A., Tu Y. (2019) MedBloc: A blockchain-based secure EHR system for sharing and accessing medical data. In: 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), pp. 594–601, https://doi.org/10.1109/TrustCom/BigDataSE.2019.00085
– reference: AmatoFDe PietroGEspositoMMazzoccaNAn integrated framework for securing semi-structured health recordsKnowl.-Based Syst.2015799911710.1016/j.knosys.2015.02.004https://doi.org/10.1016/j.knosys.2015.02.004
– reference: PetersenKVakkalankaSKuzniarzLGuidelines for conducting systematic mapping studies in software engineering: An updateInf. Softw. Technol.20156411810.1016/j.infsof.2015.03.007https://doi.org/10.1016/j.infsof.2015.03.007
– reference: Aldossary S., Allen W. (2016) Data security, privacy, availability and integrity in cloud computing: Issues and current solutions. Int. J. Adv. Comput. Sci. Appl. 7, https://doi.org/10.14569/IJACSA.2016.070464
– reference: KhoANCashyJPJacksonKLPahARGoelSBoehnkeJHumphriesJEKominersSDHotaBNSimsSAMalinBAFrenchDDWalunasTLMeltzerDOKalebaEOJonesRCGalanterWLDesign and implementation of a privacy preserving electronic health record linkage tool in ChicagoJ. Am. Med. Inform. Assoc.20152251072108010.1093/jamia/ocv038261047415009931https://doi.org/10.1093/jamia/ocv038
– reference: PoulisGLoukidesGSkiadopoulosSGkoulalas-DivanisAAnonymizing datasets with demographics and diagnosis codes in the presence of utility constraintsJ. Biomed. Inform.201765769610.1016/j.jbi.2016.11.00127832965
– reference: Rana M. E., Jayabalan M. (2016) Privacy preserving anonymization techniques for patient data: An overview. In: Conference: 3rd International Conference on Knowledge, Information and Software Engineering (ICKIS2016)
– reference: KadhimKTAlsahlanyAMWadiSMKadhumHTAn overview of patient’s health status monitoring system based on Internet of Things (IoT)Wireless Pers. Commun.202011432235226210.1007/s11277-020-07474-0
– reference: Jagtap S. T., Thakar C. M., El imrani O, Phasinam K., Garg S., Ventayen R. J. M. (2021) A framework for secure healthcare system using blockchain and smart contracts. In: 2021 Second International Conference on Electronics and Sustainable Communication Systems (ICESC), pp. 922–926 https://doi.org/10.1109/ICESC51422.2021.9532644
– reference: KlossLLBrodnikMSRinehart-ThompsonLAAccess And disclosure of personal health information: A challenging privacy landscape in 2016-2018Yearb Med Inform201806001060066
– reference: Ibrahim A., Singhal M. (2016b) A simultaneous key generation technique for health information exchange (hie) based on existing patients’ credentials
– reference: Petersen K., Feldt R., Mujtaba S., Mattsson M. (2008) Systematic mapping studies in software engineering. In: EASE
– reference: JayabalanMRanaMEAnonymizing healthcare records: A study of privacy preserving data publishing techniquesAdv. Sci. Lett.2018241694169710.1166/asl.2018.11139https://doi.org/10.1166/asl.2018.11139
– reference: CifuentesMDavisMFernaldDGunnRDickinsonPCohenDJElectronic health record challenges, workarounds, and solutions observed in practices integrating behavioral health and primary careThe Journal of the American Board of Family Medicine201528Supplement 1S63S7210.3122/jabfm.2015.S1.15013326359473
– reference: Ahmadian L., Khajouei R. (2012) Impact of computerized order sets on practitioner performance. Quality of Life through Quality of Information, 1129–1131
– reference: AlanaziHOZaidanAAZaidanBBKiahMLAl-BakriSHMeeting the security requirements of electronic medical records in the era of high-speed computingJ Med Syst20153911651:STN:280:DC%2BC2Mzmt1Kksg%3D%3D10.1007/s10916-014-0165-325481568
– reference: Shrestha N. M., Alsadoon A., Prasad P. W. C., Hourany L., Elchouemi A. (2016) Enhanced e-health framework for security and privacy in healthcare system. In: 2016 Sixth International Conference on Digital Information Processing and Communications (ICDIPC), pp. 75–79 https://doi.org/10.1109/ICDIPC.2016.7470795
– reference: BalsariSFortenkoABlayaJAGropperAJayaramMMatthanRSahasranamRShankarMSarbadhikariSNBiererBEMandlKDMehendaleSKhannaTReimagining health data exchange: an application programming interface–enabled roadmap for IndiaJ Med Internet Res2018207e1072510.2196/10725300063256064038
– reference: HIPAA (2013a) HIPAA survival guide HITECH act summary - HIPAA Privacy Rule 164.506. http://www.hipaasurvivalguide.com/hipaa-regulations/164-506_BAK_01202013.php
– reference: RichterGBorzikowskyCLiebWSchreiberSKrawczakMBuyxAPatient views on research use of clinical data without consent: legal, but also acceptable?European Journal of Human Genetics : EJHG201927684184710.1038/s41431-019-0340-6306839276777530
– reference: Vora J., Nayyar A., Tanwar S., Tyagi S., Kumar N., Obaidat M. S., Rodrigues J. J. P. C. (2018) Bheem: A blockchain-based framework for securing electronic health records. In: 2018 IEEE Globecom Workshops (GC Wkshps), pp. 1–6 https://doi.org/10.1109/GLOCOMW.2018.8644088
– reference: Gardiyawasam PussewalageHSOleshchukVAPrivacy preserving mechanisms for enforcing security and privacy requirements in e-health solutionsInt. J. Inf. Manag.2016366, Part B1161117310.1016/j.ijinfomgt.2016.07.006
– reference: Keshta I., Odeh A. (2020) Security and privacy of electronic health records. Concerns and challenges. Egyptian Informatics Journal. https://doi.org/10.1016/j.eij.2020.07.003
– reference: ShahnazAQamarUKhalidAUsing blockchain for electronic health recordsIEEE Access2019714778214779510.1109/ACCESS.2019.2946373https://doi.org/10.1109/ACCESS.2019.2946373
– reference: Al-Issa Y., Ottom M. A., Tamrawi A. (2019) eHealth cloud security challenges: A survey. Journal of Healthcare Engineering 2019:7516035 https://doi.org/10.1155/2019/7516035
– reference: Yang C., Liu C., Tseng T. (2015) Design and implementation of a privacy aware framework for sharing electronic health records. In: 2015 International Conference on Healthcare Informatics, pp. 504–508 https://doi.org/10.1109/ICHI.2015.92
– reference: BernerESDetmerDESimborgDWill the wave finally break? A brief view of the adoption of electronic medical records in the United StatesJ. Am. Med. Inform. Assoc.20051213710.1197/jamia.M166415492029543824
– reference: Verdonck M., Poels G. (2020) Architecture and value analysis of a blockchain-based electronic health record permission management system (short paper). In: VMBO
– reference: Horodyski D. (2015) 2013 OECD Guidelines on the protection of privacy and transborder flows of personal data as an example of recent trends in personal data protection, ResearchGate, pp. 255–266, https://doi.org/10.13140/RG.2.1.1508.4405
– reference: HussienHMYasinSMUdzirSNIZaidanAAZaidanBBA systematic review for enabling of develop a blockchain technology in healthcare application: taxonomy, substantially analysis, motivations, challenges, recommendations and future directionJ. Med. Syst.201943103201:STN:280:DC%2BB3MrovV2nuw%3D%3D10.1007/s10916-019-1445-831522262
– reference: Pramanik P. K. D., Pal S., Mukhopadhyay M. (2019) Healthcare Big Data: A Comprehensive Overview, IGI Global, Hershey, PA, USA, pp. 72–100. Intelligent Systems for Healthcare Management and Delivery https://doi.org/10.4018/978-1-5225-7071-4.ch004
– reference: KayaalpMPatient privacy in the era of big dataBalkan Med. J.201835181710.4274/balkanmedj.2017.0966289038865820452
– reference: Farhadi M., Haddad H., Shahriar H. (2019) Compliance checking of open source EHR applications for HIPAA and ONC security and privacy requirements. In: 2019 IEEE 43rd annual computer software and applications conference (COMPSAC) vol. 1, pp. 704–713. https://doi.org/10.1109/COMPSAC.2019.00106
– reference: Gkoulalas-DivanisALoukidesGSunJPublishing data from electronic health records while preserving privacy: A survey of algorithmsJ. Biomed. Inform.20145041910.1016/j.jbi.2014.06.00224936746https://doi.org/10.1016/j.jbi.2014.06.002, special Issue on Informatics Methods in Medical Privacy
– reference: Tan J. (2008) Healthcare information systems and informatics: Research and Practices: Research and Practices. IGI Global
– reference: SittigDSinghHA new sociotechnical model for studying health information technology in complex adaptive healthcare systemsQuality & Safety in Health Care 19 Suppl20103i687410.1136/qshc.2010.042085
– reference: EssaYMHemdanEEDEl-MahalawyAAttiyaGEl-SayedAIFHDS: Intelligent framework for securing healthcare bigdataJ. Med. Syst.201943512410.1007/s10916-019-1250-430919123https://doi.org/10.1007/s10916-019-1250-4
– reference: Smaradottir B. F. (2018) Security management in electronic health records: Attitudes and experiences among health care professionals. In: 2018 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 715–719 https://doi.org/10.1109/CSCI46756.2018.00143
– reference: HathaliyaJJTanwarSEvansRSecuring electronic healthcare records: a mobile-based biometric authentication approachJournal of Information Security and Applications20201025285310.1016/j.jisa.2020.102528
– reference: ZaabarBCheikhrouhouOJamilFAmmiMAbidMHealthblock: A secure blockchain-based healthcare data management systemComput. Netw.202120010850010.1016/j.comnet.2021.108500https://doi.org/10.1016/j.comnet.2021.108500
– reference: Hu V., Ferraiolo D., Kuhn D., Schnitzer A., Sandlin K., Miller R., Scarfone K. (2014) Guide to attribute based access control (ABAC) definition and considerations. National Institute of Standards and Technology Special Publication, 162–800
– reference: Xu R., Joshi J., Krishnamurthy P. (2019) An integrated privacy preserving attribute based access control framework supporting secure deduplication. IEEE Transactions on Dependable and Secure Computing, 1–1. https://doi.org/10.1109/TDSC.2019.2946073
– reference: Medicine J. H. (2018) Preparing for the EU GDPR In research settings guidance. https://www.jhsph.edu/offices-and-services/institutional-review-board/
– reference: ZhangABacchusALinXConsent-based access control for secure and privacy-preserving health information exchangeSecurity and Communication Networks20169163496350810.1002/sec.1556
– reference: ShahSMKhanRASecondary use of electronic health record: Opportunities and challengesIEEE Access2020813694713696510.1109/ACCESS.2020.3011099https://doi.org/10.1109/ACCESS.2020.3011099
– reference: Abomhara M., Køien G. M., Oleshchuk V. A., Hamid M. (2018) Towards risk-aware access control framework for healthcare information sharing. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy - 1, ICISSP, INSTICC, SciTePress, pp. 312–321. https://doi.org/10.5220/0006608103120321
– reference: Tasatanattakool P., Chian T. (2017) User authentication algorithm with role-based access control for electronic health systems to prevent abuse of patient privacy. In: 2017 3rd IEEE International Conference on Computer and Communications (ICCC), pp. 1019–1024 https://doi.org/10.1109/CompComm.2017.8322697
– reference: Dybå TDingsøyr TEmpirical studies of agile software development: A systematic reviewInf. Softw. Technol.20085083385910.1016/j.infsof.2008.01.006https://doi.org/10.1016/j.infsof.2008.01.006
– reference: PaiMMMGanigaRPaiRMSinhaRKStandard electronic health record (EHR) framework for Indian healthcare systemHealth Serv. Outcomes Res. Method.202121333936210.1007/s10742-020-00238-0
– reference: SharmaYBalamuruganBPreserving the privacy of electronic health records using blockchainProcedia Computer Science202017317118010.1016/j.procs.2020.06.021https://doi.org/10.1016/j.procs.2020.06.021, international Conference on Smart Sustainable Intelligent Computing and Applications under ICITETM2020
– reference: HäyrinenKSarantoKNykänenPDefinition, structure, content, use and impacts of electronic health records: a review of the research literatureInt. J. Med. Informatics200877529130410.1016/j.ijmedinf.2007.09.001
– reference: Kanwal T., Anjum A., Khan A. (2020) Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities. Cluster Computing https://doi.org/10.1007/s10586-020-03106-1
– reference: Kitchenham B. (2004) Procedures for performing systematic reviews. Keele, UK, Keele Univ, 33
– reference: NwekeLYengPWolthusenSYangBUnderstanding attribute-based access control for modelling and analysing healthcare professionals’ security practicesInt. J. Adv. Comput. Sci. Appl.202011683690https://doi.org/10.14569/IJACSA.2020.0110286
– reference: Scholl M. A., Stine K. M., Hash J., Bowen P., Johnson L. A., Smith C. D., Steinberg D. I. (2008) SP 800-66 Rev. 1. an introductory resource guide for implementing the health insurance portability and accountability act (HIPAA) security rule, national institute of standards & technology, Gaithersburg, MD, USA, chap, 1
– reference: GDPR (2016) Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/ EC (General Data Protection Regulation). http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG&toc=OJ:L:2016:119:TOC
– reference: Mehndiratta P., Sachdeva S., Kulshrestha S. (2014) A model of privacy and security for electronic health records. In: Madaan A., Kikuchi S., Bhalla S. (eds) Databases in Networked Information Systems, Springer International Publishing, Cham, pp. 202?213
– reference: Mamun Q., Rana M. (2017) A robust authentication model using multi-channel communication for eHealth systems to enhance privacy and security. In: 2017 8th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pp. 255–260 https://doi.org/10.1109/IEMCON.2017.8117210
– reference: RezaeibaghaFMuYDistributed clinical data sharing via dynamic access-control policy transformationInt. J. Med. Informatics201689253110.1016/j.ijmedinf.2016.02.002https://doi.org/10.1016/j.ijmedinf.2016.02.002
– reference: Al Baqari M., Barka E. (2020) Biometric-based blockchain EHR system (BBEHR). In: 2020 International Wireless Communications and Mobile Computing (IWCMC), pp. 2228–2234, https://doi.org/10.1109/IWCMC48107.2020.9148357
– reference: HIPAA (2013b) Summary of the HIPAA Privacy Rule. https://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/understanding/summary/privacysummary.pdf
– reference: Odeh A., Keshta I., Aboshgifa A., Abdelfattah E. (2022) Privacy and security in mobile health technologies: Challenges and concerns. In: 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0065–0071 https://doi.org/10.1109/CCWC54503.2022.9720863
– reference: Ahmadian L., Salehi Nejad S., Khajouei R. (2015) Evaluation methods used on health information systems (hiss) in Iran and the effects of hiss on Iranian healthcare: A systematic review. International Journal of Medical Informatics, 84. https://doi.org/10.1016/j.ijmedinf.2015.02.002
– reference: EdemacuKParkHKJangBKimJWPrivacy provision in collaborative eHealth with attribute-based encryption: survey, challenges and future directionsIEEE Access20197896148963610.1109/ACCESS.2019.2925390
– reference: EomJLeeKPatient-controlled attribute-based encryption for secure electronic health records systemJ. Med. Syst.20164025310.1007/s10916-016-0621-327714562
– reference: Jayabalan M., O’Daniel T. (2017) Continuous and transparent access control framework for electronic health records: A preliminary study. In: 2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE), pp. 165–170 https://doi.org/10.1109/ICITISEE.2017.8285487
– reference: Nortey R. N., Yue L., Agdedanu PR, Adjeisah M (2019) Privacy module for distributed electronic health records (EHRs) using the blockchain. In: 2019 IEEE 4th International Conference on Big Data Analytics (ICBDA), pp. 369–374 https://doi.org/10.1109/ICBDA.2019.8713188
– reference: HITECH (2009) Health information technology for economic and clinical health (HITECH) act. http://www.hhs.gov/hipaa/for-professionals/specialtopics/HITECH-act-enforcement-interim-final-rule/, last Accessed 16 September 2020
– reference: Ibrahim A., Singhal M. (2016a) An abstract architecture design for medical information exchange. In: 2016 International Conference on Industrial Informatics and Computer Systems (CIICS), pp. 1–6 https://doi.org/10.1109/ICCSII.2016.7462427
– reference: Sun Y., Zhang R., Wang X., Gao K., Liu L. (2018) A decentralizing attribute-based signature for healthcare blockchain. In: 2018 27th International Conference on Computer Communication and Networks (ICCCN), pp. 1–9 https://doi.org/10.1109/ICCCN.2018.8487349
– reference: Ismail L., Materwala H. (2020) BlockHR: A blockchain-based framework for health records management. In: Proceedings of the 12th International Conference on Computer Modeling and Simulation, Association for Computing Machinery, New York, NY, USA, ICCMS ’20, p 164–168 https://doi.org/10.1145/3408066.3408106
– reference: GhazviniAShukurZSecurity challenges and success factors of electronic healthcare systemProcedia Technol.20131121221910.1016/j.protcy.2013.12.1834th International Conference on Electrical Engineering and Informatics, ICEEI 2013. https://doi.org/10.1016/j.protcy.2013.12.183
– reference: Hakim S. A., Sensuse D. I. (2018) Knowledge mapping system implementation in knowledge management: A systematic literature review. In: 2018 International Conference on Information Management and Technology (ICIMTech), pp. 131–136 https://doi.org/10.1109/ICIMTech.2018.8528190
– reference: Aslam U., Sohail A., Aziz H. I. T., Vistro M. (2019) The importance of preserving the anonymity in healthcare data: a survey. International Journal Of Scientific & Technology Research 8(11), NOVEMBER 2019
– reference: GuoRShiHZhaoQZhengDSecure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systemsIEEE Access20186116761168610.1109/ACCESS.2018.2801266
– reference: Grana M., Jackwoski K. (2015) Electronic health record: a review. In: 2015 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), IEEE Computer Society, Los Alamitos, CA, USA, pp. 1375–1382. https://doi.org/10.1109/BIBM.2015.7359879
– volume: 11
  start-page: 683
  year: 2020
  ident: 1795_CR54
  publication-title: Int. J. Adv. Comput. Sci. Appl.
  doi: 10.14569/IJACSA.2020.0110286
– ident: 1795_CR50
– ident: 1795_CR29
– ident: 1795_CR53
  doi: 10.1109/ICBDA.2019.8713188
– ident: 1795_CR60
  doi: 10.4018/978-1-5225-7071-4.ch004
– ident: 1795_CR39
  doi: 10.1109/ICITISEE.2017.8285487
– ident: 1795_CR37
  doi: 10.1145/3408066.3408106
– volume: 21
  start-page: 339
  issue: 3
  year: 2021
  ident: 1795_CR56
  publication-title: Health Serv. Outcomes Res. Method.
  doi: 10.1007/s10742-020-00238-0
– ident: 1795_CR70
  doi: 10.1109/CSCI46756.2018.00143
– volume: 43
  start-page: 124
  issue: 5
  year: 2019
  ident: 1795_CR16
  publication-title: J. Med. Syst.
  doi: 10.1007/s10916-019-1250-4
– volume: 102528
  start-page: 53
  year: 2020
  ident: 1795_CR26
  publication-title: Journal of Information Security and Applications
  doi: 10.1016/j.jisa.2020.102528
– ident: 1795_CR32
  doi: 10.1109/TrustCom/BigDataSE.2019.00085
– ident: 1795_CR64
  doi: 10.6028/NIST.SP.800-66r1
– ident: 1795_CR1
  doi: 10.5220/0006608103120321
– ident: 1795_CR30
  doi: 10.13140/RG.2.1.1508.4405
– volume: 3
  start-page: i68
  year: 2010
  ident: 1795_CR69
  publication-title: Quality & Safety in Health Care 19 Suppl
  doi: 10.1136/qshc.2010.042085
– ident: 1795_CR35
  doi: 10.1109/ICCSII.2016.7462427
– volume: 79
  start-page: 99
  year: 2015
  ident: 1795_CR8
  publication-title: Knowl.-Based Syst.
  doi: 10.1016/j.knosys.2015.02.004
– volume: 46
  start-page: 541
  issue: 3
  year: 2013
  ident: 1795_CR18
  publication-title: J. Biomed. Inform.
  doi: 10.1016/j.jbi.2012.12.003
– ident: 1795_CR28
– ident: 1795_CR77
  doi: 10.1109/TDSC.2019.2946073
– ident: 1795_CR20
– ident: 1795_CR5
  doi: 10.1155/2019/7516035
– volume: 36
  start-page: 1161
  issue: 6, Part B
  year: 2016
  ident: 1795_CR19
  publication-title: Int. J. Inf. Manag.
  doi: 10.1016/j.ijinfomgt.2016.07.006
– ident: 1795_CR3
  doi: 10.1016/j.ijmedinf.2015.02.002
– volume: 7
  start-page: 89614
  year: 2019
  ident: 1795_CR14
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2925390
– ident: 1795_CR31
  doi: 10.6028/NIST.SP.800-162
– volume: 12
  start-page: 3
  issue: 1
  year: 2005
  ident: 1795_CR11
  publication-title: J. Am. Med. Inform. Assoc.
  doi: 10.1197/jamia.M1664
– volume: 35
  start-page: 8
  issue: 1
  year: 2018
  ident: 1795_CR43
  publication-title: Balkan Med. J.
  doi: 10.4274/balkanmedj.2017.0966
– ident: 1795_CR38
  doi: 10.1109/ICESC51422.2021.9532644
– ident: 1795_CR4
  doi: 10.1109/IWCMC48107.2020.9148357
– ident: 1795_CR61
– volume: 20
  start-page: e10725
  issue: 7
  year: 2018
  ident: 1795_CR10
  publication-title: J Med Internet Res
  doi: 10.2196/10725
– ident: 1795_CR23
  doi: 10.1109/BIBM.2015.7359879
– ident: 1795_CR57
  doi: 10.14236/ewic/EASE2008.8
– volume: 50
  start-page: 4
  year: 2014
  ident: 1795_CR22
  publication-title: J. Biomed. Inform.
  doi: 10.1016/j.jbi.2014.06.002
– ident: 1795_CR48
  doi: 10.1109/TrustCom.2016.0105
– volume: 9
  start-page: 3496
  issue: 16
  year: 2016
  ident: 1795_CR81
  publication-title: Security and Communication Networks
  doi: 10.1002/sec.1556
– ident: 1795_CR27
– ident: 1795_CR46
– ident: 1795_CR7
  doi: 10.14569/IJACSA.2016.070464
– volume: 24
  start-page: 1694
  year: 2018
  ident: 1795_CR40
  publication-title: Adv. Sci. Lett.
  doi: 10.1166/asl.2018.11139
– volume: 27
  start-page: 841
  issue: 6
  year: 2019
  ident: 1795_CR63
  publication-title: European Journal of Human Genetics : EJHG
  doi: 10.1038/s41431-019-0340-6
– volume: 50
  start-page: 833
  year: 2008
  ident: 1795_CR13
  publication-title: Inf. Softw. Technol.
  doi: 10.1016/j.infsof.2008.01.006
– volume: 114
  start-page: 2235
  issue: 3
  year: 2020
  ident: 1795_CR41
  publication-title: Wireless Pers. Commun.
  doi: 10.1007/s11277-020-07474-0
– volume: 22
  start-page: 1299
  issue: 4
  year: 2018
  ident: 1795_CR76
  publication-title: IEEE J Biomed Health Inform
  doi: 10.1109/JBHI.2017.2721545
– volume: 77
  start-page: 291
  issue: 5
  year: 2008
  ident: 1795_CR34
  publication-title: Int. J. Med. Informatics
  doi: 10.1016/j.ijmedinf.2007.09.001
– volume: 64
  start-page: 1
  year: 2015
  ident: 1795_CR58
  publication-title: Inf. Softw. Technol.
  doi: 10.1016/j.infsof.2015.03.007
– volume: 89
  start-page: 25
  year: 2016
  ident: 1795_CR62
  publication-title: Int. J. Med. Informatics
  doi: 10.1016/j.ijmedinf.2016.02.002
– volume: 6
  start-page: 11676
  year: 2018
  ident: 1795_CR24
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2801266
– volume: 060
  start-page: 060
  issue: 01
  year: 2018
  ident: 1795_CR47
  publication-title: Yearb Med Inform
– volume: 65
  start-page: 76
  year: 2017
  ident: 1795_CR59
  publication-title: J. Biomed. Inform.
  doi: 10.1016/j.jbi.2016.11.001
– volume: 28
  start-page: S63
  issue: Supplement 1
  year: 2015
  ident: 1795_CR12
  publication-title: The Journal of the American Board of Family Medicine
  doi: 10.3122/jabfm.2015.S1.150133
– volume: 40
  start-page: 253
  year: 2016
  ident: 1795_CR15
  publication-title: J. Med. Syst.
  doi: 10.1007/s10916-016-0621-3
– volume: 7
  start-page: 147782
  year: 2019
  ident: 1795_CR66
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2946373
– ident: 1795_CR2
– ident: 1795_CR72
  doi: 10.4018/978-1-59904-690-7
– ident: 1795_CR52
  doi: 10.1109/ACCESS.2019.2917555
– volume: 200
  start-page: 108500
  year: 2021
  ident: 1795_CR80
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2021.108500
– ident: 1795_CR78
  doi: 10.1109/ICHI.2015.92
– ident: 1795_CR71
  doi: 10.1109/ICCCN.2018.8487349
– volume: 11
  start-page: 212
  year: 2013
  ident: 1795_CR21
  publication-title: Procedia Technol.
  doi: 10.1016/j.protcy.2013.12.183
– volume: 68
  start-page: 1
  year: 2017
  ident: 1795_CR79
  publication-title: Futur. Gener. Comput. Syst.
  doi: 10.1016/j.future.2016.08.011
– ident: 1795_CR36
  doi: 10.1109/CHASE.2016.24
– ident: 1795_CR44
  doi: 10.1016/j.eij.2020.07.003
– volume: 8
  start-page: 136947
  year: 2020
  ident: 1795_CR65
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3011099
– ident: 1795_CR51
  doi: 10.1007/978-3-319-05693-7_13
– volume: 22
  start-page: 1072
  issue: 5
  year: 2015
  ident: 1795_CR45
  publication-title: J. Am. Med. Inform. Assoc.
  doi: 10.1093/jamia/ocv038
– ident: 1795_CR74
– volume: 173
  start-page: 171
  year: 2020
  ident: 1795_CR67
  publication-title: Procedia Computer Science
  doi: 10.1016/j.procs.2020.06.021
– ident: 1795_CR73
  doi: 10.1109/CompComm.2017.8322697
– ident: 1795_CR9
– ident: 1795_CR68
  doi: 10.1109/ICDIPC.2016.7470795
– ident: 1795_CR75
  doi: 10.1109/GLOCOMW.2018.8644088
– ident: 1795_CR25
  doi: 10.1109/ICIMTech.2018.8528190
– ident: 1795_CR55
  doi: 10.1109/CCWC54503.2022.9720863
– ident: 1795_CR17
  doi: 10.1109/COMPSAC.2019.00106
– volume: 39
  start-page: 165
  issue: 1
  year: 2015
  ident: 1795_CR6
  publication-title: J Med Syst
  doi: 10.1007/s10916-014-0165-3
– volume: 43
  start-page: 320
  issue: 10
  year: 2019
  ident: 1795_CR33
  publication-title: J. Med. Syst.
  doi: 10.1007/s10916-019-1445-8
– ident: 1795_CR42
  doi: 10.1007/s10586-020-03106-1
– ident: 1795_CR49
  doi: 10.1109/IEMCON.2017.8117210
SSID ssj0033329
ssib060165803
Score 2.466409
SecondaryResourceType review_article
Snippet Main Electronic health record (EHR) applications are digital versions of paper-based patient health information. Traditionally, medical records are made on...
MainElectronic health record (EHR) applications are digital versions of paper-based patient health information. Traditionally, medical records are made on...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 435
SubjectTerms Blockchain
Cryptography
Electronic health records
Electronic medical records
Epidemiology
Health Promotion and Disease Prevention
Interoperability
Literature reviews
Mapping
Medical records
Medicine
Medicine & Public Health
Privacy
Public Health
Review Article
SummonAdditionalLinks – databaseName: ProQuest Technology Collection
  dbid: 8FG
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LSwMxEA5aL4KIT6xWycGbBrd57MOLiliLB_Fgobdlk02koNvaVsH-eiePdVGw5-zmMJnMNzOZ-Qah00ImXZlGnCiqFeGAOCQVwpCSGhOlnItMO7bPx7g_4A9DMQwJt1koq6xtojPU5VjZHPkFwJKtggN4vZq8Ezs1yr6uhhEaq2itC0hj9Tzt3df6ZJlGhBu-5C0zY8xNLYNLCpFTylhoogmtdMwWD1FbqJBkgix-A1Xjff55MHU41NtCm8GBxDf-xLfRiq520IbPvmHfVLSLrp-mo89CfeFRhZtBN9g3PWKfmJld4gI3RM74rbBUDS_YEc7uoUHv7vm2T8KsBBByxuaExpLy0ihpipSbLi0LCr5cbDJp4JBiCFsUBKA6ERpWbINPzAG7wLbFyiQy1mwftapxpQ8Q1iVPhYo0hI6SCyUyYxPHRiVRUsKWtI26tWByFYjE7TyL17yhQLbCzEGYuRNmvmijs59_Jp5GY-nXnVreebhSs7xRgDY6r8-gWf5_t8Plux2hdQqOiq8r66DWfPqhj8HRmMsTp03flFvMeg
  priority: 102
  providerName: ProQuest
Title Privacy in electronic health records: a systematic mapping study
URI https://link.springer.com/article/10.1007/s10389-022-01795-z
https://www.proquest.com/docview/2930094893
Volume 32
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dS8MwED90ggjitzg_Rh5808qaJm3qk3PsA0URcTCfSpMmMtQpbgrur_fSD6tDBV9SaNLQ3CW5u-TudwD7sQxcKerMUVQrh6HEcQTnxkmoMXXBGA91ivZ56Xd77KzP-3lQ2Kjwdi-uJNOd-kuwm2fde6h1JQhC7kxmYY67IhQVmGt0bs9bxQ7seV6anQwXI1pIwvPyYJmfe_kukEotc-piNJU37WXoFX-auZncH72O5ZGaTIE4_ncoK7CUK6Ckkc2YVZjRwzWYv8iv2NdgMTvII1l80jqcXL0M3mL1TgZDUubMIVn8JMnOeEbHJCYlJjR5jC3qwx1JsWs3oNdu3TS7Tp52AfkVemOH-pKyxChpYsGMS5OYolrom1Aa5LePFpBCW1YHXGONjRXyGYpB3CZ9ZQLpa28TKsOnod4CohMmuKprtEIl44qHxp5BGxXUgwS7pFVwC9pHKsckt6kxHqISTdmSKkJSRSmpokkVDj6_ec4QOf5svVuwNMpX5yjCYVqPSlTVqnBYcKis_r237f8134EFijpQ5rK2C5Xxy6veQx1mLGswG_QDLEXTtWW7U8snMT5PW5dX1_i26Tex7NHGB-Fq7Os
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LS8NAEB5qPSiI-MRq1T3oSYPtZjcPQVTU0moVDy30FpPNrhS0rW1V2h_lb3Q2mxgU9OZ5kyGZnZ3XznwDsBdGbjXyKswSVAqLocWxPM6VFVOlKh5j3JcJ2uedU2-z6w7vFOAj64XRZZWZTkwUddwXOkd-hGZJV8GheT0dvFh6apS-Xc1GaBixuJGTdwzZRieNS9zffUprV62LupVOFcDP8e2xRZ2IsliJSIUeU1UahxS9Hkf5kcLfcdDBFxiqSZdLXNGtMA5DLY9awBHKjRxpI90ZmGU6M47nx-18mW-NbMKTYU_GEti2nUxJQ6WAkZpn22nTTtq6Z-tiJaoLI1yfW9PvhjH3dn9c0CZ2r7YEi6nDSs6NhC1DQfZWYMFk-4hpYlqFs_th9y0UE9LtkXywDjFNlsQkgkbHJCQ5cDR5DjU0xCNJAG7XoP0vXFyHYq_fkxtAZMw8LioSQ9WIccF9pRPVSrgVN0aStATVjDGBSIHL9fyMpyCHXNbMDJCZQcLMYFqCg693Bga248-nyxm_g_QIj4Jc4EpwmO1Bvvw7tc2_qe3CXL112wyajbubLZin6CSZmrYyFMfDV7mNTs442kkki8DDf4vyJ2nEC8o
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LS8NAEB60gggiPrE-96AnDbb7yEMQFWtprUgPFnqLyWZXClq1rYr-NH-ds9mkQcHePG8yJLOz89qZbwD2otirxn6FO5Iq6XC0OI4vhHYSqnXF51wEKkX7vHEbHX7VFd0p-Mp7YUxZZa4TU0WdPEmTIz9Cs2Sq4NC8HumsLKJdq58-vzhmgpS5ac3HaVgRaamPdwzfhifNGu71PqX1y9uLhpNNGMBPC9jIoW5MeaJlrCOf6ypNIooekKuDWOOvuejsSwzblCcUrpi2GJejxkeN4Ertxa5iSHcaZjyGXhWeJa87NuUG5USkg5-sVWCMpRPTUEFg1OYzljXwZG18zBQuUVMk4QXC-fxpJAvP99dlbWoD64uwkDmv5NxK2xJMqf4yzNvMH7ENTStw1h703iL5QXp9UgzZIbbhktik0PCYRKQAkSaPkYGJuCcp2O0qdP6Fi2tQ6j_11ToQlXBfyIrCsDXmQopAm6S1ll7FS5AkLUM1Z0woMxBzM0vjISzglw0zQ2RmmDIz_CzDwfidZwvhMfHprZzfYXach2EhfGU4zPegWP6b2sZkarswi0IcXjdvWpswR9FfsuVtW1AaDV7VNvo7o3gnFSwCd_8tyd_pSxAJ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Privacy+in+electronic+health+records%3A+a+systematic+mapping+study&rft.jtitle=Journal+of+public+health&rft.au=Tertulino%2C+Rodrigo&rft.au=Antunes%2C+Nuno&rft.au=Morais%2C+Higor&rft.date=2024-03-01&rft.pub=Springer+Berlin+Heidelberg&rft.issn=2198-1833&rft.eissn=1613-2238&rft.volume=32&rft.issue=3&rft.spage=435&rft.epage=454&rft_id=info:doi/10.1007%2Fs10389-022-01795-z&rft.externalDocID=10_1007_s10389_022_01795_z
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2198-1833&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2198-1833&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2198-1833&client=summon