Privacy in electronic health records: a systematic mapping study
Main Electronic health record (EHR) applications are digital versions of paper-based patient health information. Traditionally, medical records are made on paper. However, nowadays, advances in information and communication technology have made it possible to change medical records from paper to EHR...
Saved in:
Published in | Journal of public health Vol. 32; no. 3; pp. 435 - 454 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Berlin/Heidelberg
Springer Berlin Heidelberg
01.03.2024
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
ISSN | 2198-1833 1613-2238 |
DOI | 10.1007/s10389-022-01795-z |
Cover
Loading…
Abstract | Main
Electronic health record (EHR) applications are digital versions of paper-based patient health information. Traditionally, medical records are made on paper. However, nowadays, advances in information and communication technology have made it possible to change medical records from paper to EHR. Therefore, preserving user data privacy is extremely important in healthcare environments. The main challenges are providing ways to make EHR systems increasingly capable of ensuring data privacy and at the same time not compromising the performance and interoperability of these systems.
Subject and methods
This systematic mapping study intends to investigate the current research on security and privacy requirements in EHR systems and identify potential research gaps in the literature. The main challenges are providing ways to make EHR systems increasingly capable of ensuring data privacy, and at the same time, not compromising the performance and interoperability of these systems. Our research was carried out in the Scopus database, the largest database of abstracts and citations in the literature with peer review.
Results
We have collected 848 articles related to the area. After disambiguation and filtering, we selected 30 articles for analysis. The result of such an analysis provides a comprehensive view of current research.
Conclusions
We can highlight some relevant research possibilities. First, we noticed a growing interest in privacy in EHR research in the last 6 years. Second, blockchain has been used in many EHR systems as a solution to achieve data privacy. However, it is a challenge to maintain traceability by recording metadata that can be mapped to private data of the users applying a particular mapping function that can be hosted outside the blockchain. Finally, the lack of a systematic approach between EHR solutions and existing laws or policies leads to better strategies for developing a certification process for EHR systems. |
---|---|
AbstractList | MainElectronic health record (EHR) applications are digital versions of paper-based patient health information. Traditionally, medical records are made on paper. However, nowadays, advances in information and communication technology have made it possible to change medical records from paper to EHR. Therefore, preserving user data privacy is extremely important in healthcare environments. The main challenges are providing ways to make EHR systems increasingly capable of ensuring data privacy and at the same time not compromising the performance and interoperability of these systems.Subject and methodsThis systematic mapping study intends to investigate the current research on security and privacy requirements in EHR systems and identify potential research gaps in the literature. The main challenges are providing ways to make EHR systems increasingly capable of ensuring data privacy, and at the same time, not compromising the performance and interoperability of these systems. Our research was carried out in the Scopus database, the largest database of abstracts and citations in the literature with peer review.ResultsWe have collected 848 articles related to the area. After disambiguation and filtering, we selected 30 articles for analysis. The result of such an analysis provides a comprehensive view of current research.ConclusionsWe can highlight some relevant research possibilities. First, we noticed a growing interest in privacy in EHR research in the last 6 years. Second, blockchain has been used in many EHR systems as a solution to achieve data privacy. However, it is a challenge to maintain traceability by recording metadata that can be mapped to private data of the users applying a particular mapping function that can be hosted outside the blockchain. Finally, the lack of a systematic approach between EHR solutions and existing laws or policies leads to better strategies for developing a certification process for EHR systems. Main Electronic health record (EHR) applications are digital versions of paper-based patient health information. Traditionally, medical records are made on paper. However, nowadays, advances in information and communication technology have made it possible to change medical records from paper to EHR. Therefore, preserving user data privacy is extremely important in healthcare environments. The main challenges are providing ways to make EHR systems increasingly capable of ensuring data privacy and at the same time not compromising the performance and interoperability of these systems. Subject and methods This systematic mapping study intends to investigate the current research on security and privacy requirements in EHR systems and identify potential research gaps in the literature. The main challenges are providing ways to make EHR systems increasingly capable of ensuring data privacy, and at the same time, not compromising the performance and interoperability of these systems. Our research was carried out in the Scopus database, the largest database of abstracts and citations in the literature with peer review. Results We have collected 848 articles related to the area. After disambiguation and filtering, we selected 30 articles for analysis. The result of such an analysis provides a comprehensive view of current research. Conclusions We can highlight some relevant research possibilities. First, we noticed a growing interest in privacy in EHR research in the last 6 years. Second, blockchain has been used in many EHR systems as a solution to achieve data privacy. However, it is a challenge to maintain traceability by recording metadata that can be mapped to private data of the users applying a particular mapping function that can be hosted outside the blockchain. Finally, the lack of a systematic approach between EHR solutions and existing laws or policies leads to better strategies for developing a certification process for EHR systems. |
Author | Antunes, Nuno Morais, Higor Tertulino, Rodrigo |
Author_xml | – sequence: 1 givenname: Rodrigo orcidid: 0000-0002-7594-9312 surname: Tertulino fullname: Tertulino, Rodrigo email: rodrigo.tertulino@ifrn.edu.br organization: Federal Institute of Education, Science, and Technology of Rio Grande do Norte (IFRN) – sequence: 2 givenname: Nuno orcidid: 0000-0002-6044-4012 surname: Antunes fullname: Antunes, Nuno organization: Department of Informatics and Engineering of the University of Coimbra (UC) – sequence: 3 givenname: Higor orcidid: 0000-0002-5921-6696 surname: Morais fullname: Morais, Higor organization: Federal Institute of Education, Science, and Technology of Rio Grande do Norte (IFRN) |
BookMark | eNp9kEtLAzEUhYNUsFX_gKsB19E8ppmJK6X4goIudB0ymZt2yjQzJqkw_fVGRxBcdHUX53z3HM4MTVznAKELSq4oIcV1oISXEhPGMKGFnOP9EZpSQTlmjJcTNGVUlpiWnJ-gWQgbQjjnTE7R7atvPrUZssZl0IKJvnONydag27jOPJjO1-Em01kYQoStjknc6r5v3CoLcVcPZ-jY6jbA-e89Re8P92-LJ7x8eXxe3C2xYZJHzETF8tqayuoyt5TVmqV6wsrKgjFCMGEIK6CYQ1IqYY3ICRd1DcLYohLAT9Hl-Lf33ccOQlSbbuddilQpgBCZl5InVzm6jO9C8GCVaWIq3bnoddMqStT3XmrcS6W91M9eap9Q9g_tfbPVfjgM8REKyexW4P9aHaC-ABZIgVg |
CitedBy_id | crossref_primary_10_4018_IRMJ_349977 crossref_primary_10_59681_2175_4411_v16_iEspecial_2024_1281 crossref_primary_10_1016_j_prime_2025_100961 crossref_primary_10_1016_j_jcjo_2024_06_007 crossref_primary_10_1038_s41598_024_66603_y crossref_primary_10_2196_54572 crossref_primary_10_3390_app14135785 crossref_primary_10_1007_s10879_024_09653_7 crossref_primary_10_1016_j_jclepro_2024_142802 crossref_primary_10_1021_acsptsci_3c00377 crossref_primary_10_1016_j_health_2024_100381 crossref_primary_10_1177_20552076241288631 crossref_primary_10_1007_s11227_024_06535_6 crossref_primary_10_1038_s41598_025_91287_3 crossref_primary_10_1109_TCE_2024_3373912 crossref_primary_10_1109_ACCESS_2024_3441751 crossref_primary_10_3390_app14177765 crossref_primary_10_7717_peerj_cs_2517 crossref_primary_10_3390_healthcare12131363 crossref_primary_10_1007_s12599_024_00869_4 crossref_primary_10_37394_23207_2024_21_127 crossref_primary_10_56294_mw2024498 |
Cites_doi | 10.14569/IJACSA.2020.0110286 10.1109/ICBDA.2019.8713188 10.4018/978-1-5225-7071-4.ch004 10.1109/ICITISEE.2017.8285487 10.1145/3408066.3408106 10.1007/s10742-020-00238-0 10.1109/CSCI46756.2018.00143 10.1007/s10916-019-1250-4 10.1016/j.jisa.2020.102528 10.1109/TrustCom/BigDataSE.2019.00085 10.6028/NIST.SP.800-66r1 10.5220/0006608103120321 10.13140/RG.2.1.1508.4405 10.1136/qshc.2010.042085 10.1109/ICCSII.2016.7462427 10.1016/j.knosys.2015.02.004 10.1016/j.jbi.2012.12.003 10.1109/TDSC.2019.2946073 10.1155/2019/7516035 10.1016/j.ijinfomgt.2016.07.006 10.1016/j.ijmedinf.2015.02.002 10.1109/ACCESS.2019.2925390 10.6028/NIST.SP.800-162 10.1197/jamia.M1664 10.4274/balkanmedj.2017.0966 10.1109/ICESC51422.2021.9532644 10.1109/IWCMC48107.2020.9148357 10.2196/10725 10.1109/BIBM.2015.7359879 10.14236/ewic/EASE2008.8 10.1016/j.jbi.2014.06.002 10.1109/TrustCom.2016.0105 10.1002/sec.1556 10.14569/IJACSA.2016.070464 10.1166/asl.2018.11139 10.1038/s41431-019-0340-6 10.1016/j.infsof.2008.01.006 10.1007/s11277-020-07474-0 10.1109/JBHI.2017.2721545 10.1016/j.ijmedinf.2007.09.001 10.1016/j.infsof.2015.03.007 10.1016/j.ijmedinf.2016.02.002 10.1109/ACCESS.2018.2801266 10.1016/j.jbi.2016.11.001 10.3122/jabfm.2015.S1.150133 10.1007/s10916-016-0621-3 10.1109/ACCESS.2019.2946373 10.4018/978-1-59904-690-7 10.1109/ACCESS.2019.2917555 10.1016/j.comnet.2021.108500 10.1109/ICHI.2015.92 10.1109/ICCCN.2018.8487349 10.1016/j.protcy.2013.12.183 10.1016/j.future.2016.08.011 10.1109/CHASE.2016.24 10.1016/j.eij.2020.07.003 10.1109/ACCESS.2020.3011099 10.1007/978-3-319-05693-7_13 10.1093/jamia/ocv038 10.1016/j.procs.2020.06.021 10.1109/CompComm.2017.8322697 10.1109/ICDIPC.2016.7470795 10.1109/GLOCOMW.2018.8644088 10.1109/ICIMTech.2018.8528190 10.1109/CCWC54503.2022.9720863 10.1109/COMPSAC.2019.00106 10.1007/s10916-014-0165-3 10.1007/s10916-019-1445-8 10.1007/s10586-020-03106-1 10.1109/IEMCON.2017.8117210 |
ContentType | Journal Article |
Copyright | The Author(s) 2023 The Author(s) 2023. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: The Author(s) 2023 – notice: The Author(s) 2023. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | C6C AAYXX CITATION 3V. 7T2 7X7 7XB 88E 8C1 8FE 8FG 8FI 8FJ 8FK ABJCF ABUWG AEUYN AFKRA ATCPS AZQEC BENPR BGLVJ BHPHI C1K CCPQU DWQXO FYUFA GHDGH GNUQQ HCIFZ K9. L6V M0S M1P M7S PATMY PHGZM PHGZT PJZUB PKEHL PPXIY PQEST PQGLB PQQKQ PQUKI PTHSS PYCSY |
DOI | 10.1007/s10389-022-01795-z |
DatabaseName | Springer Nature OA Free Journals CrossRef ProQuest Central (Corporate) Health and Safety Science Abstracts (Full archive) ProQuest Health & Medical Collection ProQuest Central (purchase pre-March 2016) Medical Database (Alumni Edition) ProQuest Public Health Database ProQuest SciTech Collection ProQuest Technology Collection Hospital Premium Collection Hospital Premium Collection (Alumni Edition) ProQuest Central (Alumni) (purchase pre-March 2016) Materials Science & Engineering Collection ProQuest Central (Alumni) ProQuest One Sustainability (subscription) ProQuest Central UK/Ireland ProQuest Agricultural & Environmental Science & Pollution Managment ProQuest Central Essentials ProQuest Central Technology Collection Natural Science Collection Environmental Sciences and Pollution Management ProQuest One Community College ProQuest Central Korea Health Research Premium Collection Health Research Premium Collection (Alumni) ProQuest Central Student SciTech Premium Collection ProQuest Health & Medical Complete (Alumni) ProQuest Engineering Collection ProQuest Health & Medical Collection Medical Database Engineering Database Environmental Science Database ProQuest Central Premium ProQuest One Academic (New) ProQuest Health & Medical Research Collection ProQuest One Academic Middle East (New) ProQuest One Health & Nursing ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition Engineering collection Environmental Science Collection |
DatabaseTitle | CrossRef ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest Health & Medical Complete (Alumni) ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest One Health & Nursing Environmental Sciences and Pollution Management ProQuest Central ProQuest One Applied & Life Sciences ProQuest One Sustainability ProQuest Health & Medical Research Collection ProQuest Engineering Collection Health Research Premium Collection Health and Medicine Complete (Alumni Edition) Natural Science Collection ProQuest Central Korea Health & Medical Research Collection Agricultural & Environmental Science Collection Health & Safety Science Abstracts ProQuest Central (New) ProQuest Medical Library (Alumni) Engineering Collection Engineering Database ProQuest Public Health ProQuest One Academic Eastern Edition ProQuest Hospital Collection ProQuest Technology Collection Health Research Premium Collection (Alumni) ProQuest SciTech Collection ProQuest Hospital Collection (Alumni) Environmental Science Collection ProQuest Health & Medical Complete ProQuest Medical Library ProQuest One Academic UKI Edition Materials Science & Engineering Collection Environmental Science Database ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) |
DatabaseTitleList | ProQuest Central Student |
Database_xml | – sequence: 1 dbid: C6C name: Springer Nature OA Free Journals url: http://www.springeropen.com/ sourceTypes: Publisher – sequence: 2 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Medicine Public Health |
EISSN | 1613-2238 |
EndPage | 454 |
ExternalDocumentID | 10_1007_s10389_022_01795_z |
GrantInformation_xml | – fundername: Universidade de Coimbra |
GroupedDBID | --- -53 -5E -5G -BR -EM -Y2 -~C .86 .VR 04C 06C 06D 0R~ 0VY 1N0 1SB 2.D 203 28- 29L 29~ 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2Z- 2~H 30V 3V. 4.4 406 408 409 40D 40E 44B 53G 5GY 5QI 5VS 67Z 6NX 7X7 7XC 88E 8C1 8FE 8FG 8FH 8FI 8FJ 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJJC AAJKR AANXM AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTV ABHLI ABHQN ABIVO ABJCF ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABPLI ABQBU ABQSL ABSXP ABTEG ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACIWK ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACPRK ACSNA ACUDM ACYUM ACZOJ ADBBV ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AEOHA AEPYU AESKC AETLH AEUYN AEVLU AEXYK AFEXP AFKRA AFLOW AFQWF AFRAH AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWZB AGYKE AHAVH AHBYD AHKAY AHMBA AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ AKMHD ALIPV ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARMRJ ASPBG ATCPS AVWKF AXYYD AZFZN B-. BA0 BBWZM BDATZ BENPR BGLVJ BGNMA BHPHI BMSDO BPHCQ BSONS BVXVI C6C CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP EBLON EBS EIHBH EIOEI EJD EN4 ESBYG F5P FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC FYUFA G-Y G-Z GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GRRUI GXS H13 HCIFZ HF~ HG5 HG6 HMCUK HMJXF HQYDN HRMNR HVGLF HZ~ I09 IHE IJ- IKXTQ IWAJR IXC IXD IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ KDC KOV KOW KPH L6V LAS LLZTM M1P M4Y M7S MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O-J O9- O93 O9G O9I O9J OAM P19 P9S PATMY PF0 PQQKQ PROAC PSQYO PT4 PT5 PTHSS PYCSY Q2X QF4 QN7 QO5 QOK QOR QOS R-Y R4E R89 R9I RHV RNI ROL RPX RSV RZK S16 S1Z S26 S27 S28 S37 S3B SAP SCLPG SDE SDH SDM SHX SISQX SJYHP SMD SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW SSXJD STPWE SZ9 SZN T13 T16 TSG TSK TSV TT1 TUC U2A U9L UG4 UKHRP UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WJK WK6 WK8 YLTOR Z45 Z7W ZMTXR ZMU ZOVNA AAPKM AAYXX ABBRH ABDBE ADHKG AFDZB AFOHR AGQPQ AHPBZ ATHPR AYFIA CITATION PHGZM PHGZT 7T2 7XB 8FK ABRTQ AZQEC C1K DWQXO GNUQQ K9. PJZUB PKEHL PPXIY PQEST PQGLB PQUKI |
ID | FETCH-LOGICAL-c293t-26b24dfcbfa84f12da21616f9bfecc6626c027e75eda2b6fc64036dde6cf7b6e3 |
IEDL.DBID | AGYKE |
ISSN | 2198-1833 |
IngestDate | Wed Aug 13 03:58:00 EDT 2025 Tue Jul 01 04:18:49 EDT 2025 Thu Apr 24 22:55:32 EDT 2025 Fri Feb 21 02:40:36 EST 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Keywords | Privacy Security Health Electronic health record (EHR) |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c293t-26b24dfcbfa84f12da21616f9bfecc6626c027e75eda2b6fc64036dde6cf7b6e3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-6044-4012 0000-0002-7594-9312 0000-0002-5921-6696 |
OpenAccessLink | https://proxy.k.utb.cz/login?url=https://link.springer.com/10.1007/s10389-022-01795-z |
PQID | 2930094893 |
PQPubID | 326243 |
PageCount | 20 |
ParticipantIDs | proquest_journals_2930094893 crossref_citationtrail_10_1007_s10389_022_01795_z crossref_primary_10_1007_s10389_022_01795_z springer_journals_10_1007_s10389_022_01795_z |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20240300 2024-03-00 20240301 |
PublicationDateYYYYMMDD | 2024-03-01 |
PublicationDate_xml | – month: 3 year: 2024 text: 20240300 |
PublicationDecade | 2020 |
PublicationPlace | Berlin/Heidelberg |
PublicationPlace_xml | – name: Berlin/Heidelberg – name: Heidelberg |
PublicationSubtitle | From Theory to Practice |
PublicationTitle | Journal of public health |
PublicationTitleAbbrev | J Public Health (Berl.) |
PublicationYear | 2024 |
Publisher | Springer Berlin Heidelberg Springer Nature B.V |
Publisher_xml | – name: Springer Berlin Heidelberg – name: Springer Nature B.V |
References | Dybå TDingsøyr TEmpirical studies of agile software development: A systematic reviewInf. Softw. Technol.20085083385910.1016/j.infsof.2008.01.006https://doi.org/10.1016/j.infsof.2008.01.006 Gardiyawasam PussewalageHSOleshchukVAPrivacy preserving mechanisms for enforcing security and privacy requirements in e-health solutionsInt. J. Inf. Manag.2016366, Part B1161117310.1016/j.ijinfomgt.2016.07.006 YükselBKüpçüAÖznur Ö.Research issues for privacy and security of electronic health servicesFutur. Gener. Comput. Syst.20176811310.1016/j.future.2016.08.011https://doi.org/10.1016/j.future.2016.08.011 HäyrinenKSarantoKNykänenPDefinition, structure, content, use and impacts of electronic health records: a review of the research literatureInt. J. Med. Informatics200877529130410.1016/j.ijmedinf.2007.09.001 Jagtap S. T., Thakar C. M., El imrani O, Phasinam K., Garg S., Ventayen R. J. M. (2021) A framework for secure healthcare system using blockchain and smart contracts. In: 2021 Second International Conference on Electronics and Sustainable Communication Systems (ICESC), pp. 922–926 https://doi.org/10.1109/ICESC51422.2021.9532644 PoulisGLoukidesGSkiadopoulosSGkoulalas-DivanisAAnonymizing datasets with demographics and diagnosis codes in the presence of utility constraintsJ. Biomed. Inform.201765769610.1016/j.jbi.2016.11.00127832965 AlanaziHOZaidanAAZaidanBBKiahMLAl-BakriSHMeeting the security requirements of electronic medical records in the era of high-speed computingJ Med Syst20153911651:STN:280:DC%2BC2Mzmt1Kksg%3D%3D10.1007/s10916-014-0165-325481568 Ibrahim A., Singhal M. (2016b) A simultaneous key generation technique for health information exchange (hie) based on existing patients’ credentials Smaradottir B. F. (2018) Security management in electronic health records: Attitudes and experiences among health care professionals. In: 2018 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 715–719 https://doi.org/10.1109/CSCI46756.2018.00143 GDPR (2016) Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/ EC (General Data Protection Regulation). http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG&toc=OJ:L:2016:119:TOC JayabalanMRanaMEAnonymizing healthcare records: A study of privacy preserving data publishing techniquesAdv. Sci. Lett.2018241694169710.1166/asl.2018.11139https://doi.org/10.1166/asl.2018.11139 Rana M. E., Jayabalan M. (2016) Privacy preserving anonymization techniques for patient data: An overview. In: Conference: 3rd International Conference on Knowledge, Information and Software Engineering (ICKIS2016) KayaalpMPatient privacy in the era of big dataBalkan Med. J.201835181710.4274/balkanmedj.2017.0966289038865820452 NwekeLYengPWolthusenSYangBUnderstanding attribute-based access control for modelling and analysing healthcare professionals’ security practicesInt. J. Adv. Comput. Sci. Appl.202011683690https://doi.org/10.14569/IJACSA.2020.0110286 Al Baqari M., Barka E. (2020) Biometric-based blockchain EHR system (BBEHR). In: 2020 International Wireless Communications and Mobile Computing (IWCMC), pp. 2228–2234, https://doi.org/10.1109/IWCMC48107.2020.9148357 Odeh A., Keshta I., Aboshgifa A., Abdelfattah E. (2022) Privacy and security in mobile health technologies: Challenges and concerns. In: 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0065–0071 https://doi.org/10.1109/CCWC54503.2022.9720863 EdemacuKParkHKJangBKimJWPrivacy provision in collaborative eHealth with attribute-based encryption: survey, challenges and future directionsIEEE Access20197896148963610.1109/ACCESS.2019.2925390 Ahmadian L., Salehi Nejad S., Khajouei R. (2015) Evaluation methods used on health information systems (hiss) in Iran and the effects of hiss on Iranian healthcare: A systematic review. International Journal of Medical Informatics, 84. https://doi.org/10.1016/j.ijmedinf.2015.02.002 Verdonck M., Poels G. (2020) Architecture and value analysis of a blockchain-based electronic health record permission management system (short paper). In: VMBO Abomhara M., Køien G. M., Oleshchuk V. A., Hamid M. (2018) Towards risk-aware access control framework for healthcare information sharing. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy - 1, ICISSP, INSTICC, SciTePress, pp. 312–321. https://doi.org/10.5220/0006608103120321 Ismail L., Materwala H. (2020) BlockHR: A blockchain-based framework for health records management. In: Proceedings of the 12th International Conference on Computer Modeling and Simulation, Association for Computing Machinery, New York, NY, USA, ICCMS ’20, p 164–168 https://doi.org/10.1145/3408066.3408106 Hu V., Ferraiolo D., Kuhn D., Schnitzer A., Sandlin K., Miller R., Scarfone K. (2014) Guide to attribute based access control (ABAC) definition and considerations. National Institute of Standards and Technology Special Publication, 162–800 Farhadi M., Haddad H., Shahriar H. (2019) Compliance checking of open source EHR applications for HIPAA and ONC security and privacy requirements. In: 2019 IEEE 43rd annual computer software and applications conference (COMPSAC) vol. 1, pp. 704–713. https://doi.org/10.1109/COMPSAC.2019.00106 Fernández-AlemánJLSeñorICÁngel Oliver LozoyaPTovalASecurity and privacy in electronic health records: a systematic literature reviewJ. Biomed. Inform.201346354156210.1016/j.jbi.2012.12.00323305810 WazidMDasAKKumarNContiMVasilakosAVWazidMDasAKKumarNContiMVasilakosAVA Novel Authentication and Key Agreement Scheme for Implantable Medical Devices DeploymentIEEE J Biomed Health Inform20182241299130910.1109/JBHI.2017.272154528682267 ShahnazAQamarUKhalidAUsing blockchain for electronic health recordsIEEE Access2019714778214779510.1109/ACCESS.2019.2946373https://doi.org/10.1109/ACCESS.2019.2946373 Medicine J. H. (2018) Preparing for the EU GDPR In research settings guidance. https://www.jhsph.edu/offices-and-services/institutional-review-board BernerESDetmerDESimborgDWill the wave finally break? A brief view of the adoption of electronic medical records in the United StatesJ. Am. Med. Inform. Assoc.20051213710.1197/jamia.M166415492029543824 GuoRShiHZhaoQZhengDSecure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systemsIEEE Access20186116761168610.1109/ACCESS.2018.2801266 Shrestha N. M., Alsadoon A., Prasad P. W. C., Hourany L., Elchouemi A. (2016) Enhanced e-health framework for security and privacy in healthcare system. In: 2016 Sixth International Conference on Digital Information Processing and Communications (ICDIPC), pp. 75–79 https://doi.org/10.1109/ICDIPC.2016.7470795 EomJLeeKPatient-controlled attribute-based encryption for secure electronic health records systemJ. Med. Syst.20164025310.1007/s10916-016-0621-327714562 Nguyen D. C., Pathirana P. N., Ding M., Seneviratne A. (2019) Blockchain for secure EHRs sharing of mobile cloud based e-health systems, vol 7 RezaeibaghaFMuYDistributed clinical data sharing via dynamic access-control policy transformationInt. J. Med. Informatics201689253110.1016/j.ijmedinf.2016.02.002https://doi.org/10.1016/j.ijmedinf.2016.02.002 Mehndiratta P., Sachdeva S., Kulshrestha S. (2014) A model of privacy and security for electronic health records. In: Madaan A., Kikuchi S., Bhalla S. (eds) Databases in Networked Information Systems, Springer International Publishing, Cham, pp. 202?213 Aldossary S., Allen W. (2016) Data security, privacy, availability and integrity in cloud computing: Issues and current solutions. Int. J. Adv. Comput. Sci. Appl. 7, https://doi.org/10.14569/IJACSA.2016.070464 HIPAA (2013a) HIPAA survival guide HITECH act summary - HIPAA Privacy Rule 164.506. http://www.hipaasurvivalguide.com/hipaa-regulations/164-506_BAK_01202013.php Xu R., Joshi J., Krishnamurthy P. (2019) An integrated privacy preserving attribute based access control framework supporting secure deduplication. IEEE Transactions on Dependable and Secure Computing, 1–1. https://doi.org/10.1109/TDSC.2019.2946073 Vora J., Nayyar A., Tanwar S., Tyagi S., Kumar N., Obaidat M. S., Rodrigues J. J. P. C. (2018) Bheem: A blockchain-based framework for securing electronic health records. In: 2018 IEEE Globecom Workshops (GC Wkshps), pp. 1–6 https://doi.org/10.1109/GLOCOMW.2018.8644088 Aslam U., Sohail A., Aziz H. I. T., Vistro M. (2019) The importance of preserving the anonymity in healthcare data: a survey. International Journal Of Scientific & Technology Research 8(11), NOVEMBER 2019 Gkoulalas-DivanisALoukidesGSunJPublishing data from electronic health records while preserving privacy: A survey of algorithmsJ. Biomed. Inform.20145041910.1016/j.jbi.2014.06.00224936746https://doi.org/10.1016/j.jbi.2014.06.002, special Issue on Informatics Methods in Medical Privacy Tasatanattakool P., Chian T. (2017) User authentication algorithm with role-based access control for electronic health systems to prevent abuse of patient privacy. In: 2017 3rd IEEE International Conference on Computer and Communications (ICCC), pp. 1019–1024 https://doi.org/10.1109/CompComm.2017.8322697 Kanwal T., Anjum A., Khan A. (2020) Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities. Cluster Computing https://doi.org/10.1007/s10586-020-03106-1 BalsariSFortenkoABlayaJAGropperAJayaramMMatthanRSahasranamRShankarMSarbadhikariSNBiererBEMandlKDMehendaleSKhannaTReimagining health data exchange: an application programming interface–enabled roadmap for IndiaJ Med Internet Res2018207e1072510.2196/10725300063256064038 Grana M., Jackwoski K. (2015) Electronic health record: a review. In: 2015 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), IEEE Computer Society, Los Alamitos, CA, USA, pp. 1375–1382. htt 1795_CR42 YM Essa (1795_CR16) 2019; 43 1795_CR44 R Guo (1795_CR24) 2018; 6 1795_CR46 SM Shah (1795_CR65) 2020; 8 HM Hussien (1795_CR33) 2019; 43 AN Kho (1795_CR45) 2015; 22 JJ Hathaliya (1795_CR26) 2020; 102528 1795_CR48 1795_CR49 A Zhang (1795_CR81) 2016; 9 Dybå T (1795_CR13) 2008; 50 F Rezaeibagha (1795_CR62) 2016; 89 B Zaabar (1795_CR80) 2021; 200 1795_CR51 1795_CR52 1795_CR53 1795_CR55 1795_CR57 D Sittig (1795_CR69) 2010; 3 1795_CR50 JL Fernández-Alemán (1795_CR18) 2013; 46 L Nweke (1795_CR54) 2020; 11 M Kayaalp (1795_CR43) 2018; 35 K Petersen (1795_CR58) 2015; 64 1795_CR17 J Eom (1795_CR15) 2016; 40 A Ghazvini (1795_CR21) 2013; 11 1795_CR7 1795_CR5 1795_CR20 1795_CR64 1795_CR4 G Richter (1795_CR63) 2019; 27 1795_CR23 1795_CR9 1795_CR68 1795_CR25 HO Alanazi (1795_CR6) 2015; 39 1795_CR3 1795_CR2 1795_CR1 1795_CR60 F Amato (1795_CR8) 2015; 79 1795_CR61 K Häyrinen (1795_CR34) 2008; 77 G Poulis (1795_CR59) 2017; 65 1795_CR27 1795_CR28 1795_CR29 M Jayabalan (1795_CR40) 2018; 24 MMM Pai (1795_CR56) 2021; 21 1795_CR73 1795_CR30 A Shahnaz (1795_CR66) 2019; 7 1795_CR74 1795_CR31 1795_CR75 A Gkoulalas-Divanis (1795_CR22) 2014; 50 1795_CR32 1795_CR77 KT Kadhim (1795_CR41) 2020; 114 1795_CR78 1795_CR35 ES Berner (1795_CR11) 2005; 12 1795_CR36 S Balsari (1795_CR10) 2018; 20 K Edemacu (1795_CR14) 2019; 7 Y Sharma (1795_CR67) 2020; 173 1795_CR70 B Yüksel (1795_CR79) 2017; 68 1795_CR71 M Cifuentes (1795_CR12) 2015; 28 1795_CR72 LL Kloss (1795_CR47) 2018; 060 HS Gardiyawasam Pussewalage (1795_CR19) 2016; 36 M Wazid (1795_CR76) 2018; 22 1795_CR37 1795_CR38 1795_CR39 |
References_xml | – reference: YükselBKüpçüAÖznur Ö.Research issues for privacy and security of electronic health servicesFutur. Gener. Comput. Syst.20176811310.1016/j.future.2016.08.011https://doi.org/10.1016/j.future.2016.08.011 – reference: WazidMDasAKKumarNContiMVasilakosAVWazidMDasAKKumarNContiMVasilakosAVA Novel Authentication and Key Agreement Scheme for Implantable Medical Devices DeploymentIEEE J Biomed Health Inform20182241299130910.1109/JBHI.2017.272154528682267 – reference: Fernández-AlemánJLSeñorICÁngel Oliver LozoyaPTovalASecurity and privacy in electronic health records: a systematic literature reviewJ. Biomed. Inform.201346354156210.1016/j.jbi.2012.12.00323305810 – reference: Nguyen D. C., Pathirana P. N., Ding M., Seneviratne A. (2019) Blockchain for secure EHRs sharing of mobile cloud based e-health systems, vol 7 – reference: Lu Y., Sinnott R. O. (2016) Semantic-based privacy protection of electronic health records for collaborative research. In: 2016 IEEE Trustcom/BigDataSE/ISPA, pp. 519–526, https://doi.org/10.1109/TrustCom.2016.0105 – reference: Huang J., Qi Y. W., Asghar M. R., Meads A., Tu Y. (2019) MedBloc: A blockchain-based secure EHR system for sharing and accessing medical data. In: 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), pp. 594–601, https://doi.org/10.1109/TrustCom/BigDataSE.2019.00085 – reference: AmatoFDe PietroGEspositoMMazzoccaNAn integrated framework for securing semi-structured health recordsKnowl.-Based Syst.2015799911710.1016/j.knosys.2015.02.004https://doi.org/10.1016/j.knosys.2015.02.004 – reference: PetersenKVakkalankaSKuzniarzLGuidelines for conducting systematic mapping studies in software engineering: An updateInf. Softw. Technol.20156411810.1016/j.infsof.2015.03.007https://doi.org/10.1016/j.infsof.2015.03.007 – reference: Aldossary S., Allen W. (2016) Data security, privacy, availability and integrity in cloud computing: Issues and current solutions. Int. J. Adv. Comput. Sci. Appl. 7, https://doi.org/10.14569/IJACSA.2016.070464 – reference: KhoANCashyJPJacksonKLPahARGoelSBoehnkeJHumphriesJEKominersSDHotaBNSimsSAMalinBAFrenchDDWalunasTLMeltzerDOKalebaEOJonesRCGalanterWLDesign and implementation of a privacy preserving electronic health record linkage tool in ChicagoJ. Am. Med. Inform. Assoc.20152251072108010.1093/jamia/ocv038261047415009931https://doi.org/10.1093/jamia/ocv038 – reference: PoulisGLoukidesGSkiadopoulosSGkoulalas-DivanisAAnonymizing datasets with demographics and diagnosis codes in the presence of utility constraintsJ. Biomed. Inform.201765769610.1016/j.jbi.2016.11.00127832965 – reference: Rana M. E., Jayabalan M. (2016) Privacy preserving anonymization techniques for patient data: An overview. In: Conference: 3rd International Conference on Knowledge, Information and Software Engineering (ICKIS2016) – reference: KadhimKTAlsahlanyAMWadiSMKadhumHTAn overview of patient’s health status monitoring system based on Internet of Things (IoT)Wireless Pers. Commun.202011432235226210.1007/s11277-020-07474-0 – reference: Jagtap S. T., Thakar C. M., El imrani O, Phasinam K., Garg S., Ventayen R. J. M. (2021) A framework for secure healthcare system using blockchain and smart contracts. In: 2021 Second International Conference on Electronics and Sustainable Communication Systems (ICESC), pp. 922–926 https://doi.org/10.1109/ICESC51422.2021.9532644 – reference: KlossLLBrodnikMSRinehart-ThompsonLAAccess And disclosure of personal health information: A challenging privacy landscape in 2016-2018Yearb Med Inform201806001060066 – reference: Ibrahim A., Singhal M. (2016b) A simultaneous key generation technique for health information exchange (hie) based on existing patients’ credentials – reference: Petersen K., Feldt R., Mujtaba S., Mattsson M. (2008) Systematic mapping studies in software engineering. In: EASE – reference: JayabalanMRanaMEAnonymizing healthcare records: A study of privacy preserving data publishing techniquesAdv. Sci. Lett.2018241694169710.1166/asl.2018.11139https://doi.org/10.1166/asl.2018.11139 – reference: CifuentesMDavisMFernaldDGunnRDickinsonPCohenDJElectronic health record challenges, workarounds, and solutions observed in practices integrating behavioral health and primary careThe Journal of the American Board of Family Medicine201528Supplement 1S63S7210.3122/jabfm.2015.S1.15013326359473 – reference: Ahmadian L., Khajouei R. (2012) Impact of computerized order sets on practitioner performance. Quality of Life through Quality of Information, 1129–1131 – reference: AlanaziHOZaidanAAZaidanBBKiahMLAl-BakriSHMeeting the security requirements of electronic medical records in the era of high-speed computingJ Med Syst20153911651:STN:280:DC%2BC2Mzmt1Kksg%3D%3D10.1007/s10916-014-0165-325481568 – reference: Shrestha N. M., Alsadoon A., Prasad P. W. C., Hourany L., Elchouemi A. (2016) Enhanced e-health framework for security and privacy in healthcare system. In: 2016 Sixth International Conference on Digital Information Processing and Communications (ICDIPC), pp. 75–79 https://doi.org/10.1109/ICDIPC.2016.7470795 – reference: BalsariSFortenkoABlayaJAGropperAJayaramMMatthanRSahasranamRShankarMSarbadhikariSNBiererBEMandlKDMehendaleSKhannaTReimagining health data exchange: an application programming interface–enabled roadmap for IndiaJ Med Internet Res2018207e1072510.2196/10725300063256064038 – reference: HIPAA (2013a) HIPAA survival guide HITECH act summary - HIPAA Privacy Rule 164.506. http://www.hipaasurvivalguide.com/hipaa-regulations/164-506_BAK_01202013.php – reference: RichterGBorzikowskyCLiebWSchreiberSKrawczakMBuyxAPatient views on research use of clinical data without consent: legal, but also acceptable?European Journal of Human Genetics : EJHG201927684184710.1038/s41431-019-0340-6306839276777530 – reference: Vora J., Nayyar A., Tanwar S., Tyagi S., Kumar N., Obaidat M. S., Rodrigues J. J. P. C. (2018) Bheem: A blockchain-based framework for securing electronic health records. In: 2018 IEEE Globecom Workshops (GC Wkshps), pp. 1–6 https://doi.org/10.1109/GLOCOMW.2018.8644088 – reference: Gardiyawasam PussewalageHSOleshchukVAPrivacy preserving mechanisms for enforcing security and privacy requirements in e-health solutionsInt. J. Inf. Manag.2016366, Part B1161117310.1016/j.ijinfomgt.2016.07.006 – reference: Keshta I., Odeh A. (2020) Security and privacy of electronic health records. Concerns and challenges. Egyptian Informatics Journal. https://doi.org/10.1016/j.eij.2020.07.003 – reference: ShahnazAQamarUKhalidAUsing blockchain for electronic health recordsIEEE Access2019714778214779510.1109/ACCESS.2019.2946373https://doi.org/10.1109/ACCESS.2019.2946373 – reference: Al-Issa Y., Ottom M. A., Tamrawi A. (2019) eHealth cloud security challenges: A survey. Journal of Healthcare Engineering 2019:7516035 https://doi.org/10.1155/2019/7516035 – reference: Yang C., Liu C., Tseng T. (2015) Design and implementation of a privacy aware framework for sharing electronic health records. In: 2015 International Conference on Healthcare Informatics, pp. 504–508 https://doi.org/10.1109/ICHI.2015.92 – reference: BernerESDetmerDESimborgDWill the wave finally break? A brief view of the adoption of electronic medical records in the United StatesJ. Am. Med. Inform. Assoc.20051213710.1197/jamia.M166415492029543824 – reference: Verdonck M., Poels G. (2020) Architecture and value analysis of a blockchain-based electronic health record permission management system (short paper). In: VMBO – reference: Horodyski D. (2015) 2013 OECD Guidelines on the protection of privacy and transborder flows of personal data as an example of recent trends in personal data protection, ResearchGate, pp. 255–266, https://doi.org/10.13140/RG.2.1.1508.4405 – reference: HussienHMYasinSMUdzirSNIZaidanAAZaidanBBA systematic review for enabling of develop a blockchain technology in healthcare application: taxonomy, substantially analysis, motivations, challenges, recommendations and future directionJ. Med. Syst.201943103201:STN:280:DC%2BB3MrovV2nuw%3D%3D10.1007/s10916-019-1445-831522262 – reference: Pramanik P. K. D., Pal S., Mukhopadhyay M. (2019) Healthcare Big Data: A Comprehensive Overview, IGI Global, Hershey, PA, USA, pp. 72–100. Intelligent Systems for Healthcare Management and Delivery https://doi.org/10.4018/978-1-5225-7071-4.ch004 – reference: KayaalpMPatient privacy in the era of big dataBalkan Med. J.201835181710.4274/balkanmedj.2017.0966289038865820452 – reference: Farhadi M., Haddad H., Shahriar H. (2019) Compliance checking of open source EHR applications for HIPAA and ONC security and privacy requirements. In: 2019 IEEE 43rd annual computer software and applications conference (COMPSAC) vol. 1, pp. 704–713. https://doi.org/10.1109/COMPSAC.2019.00106 – reference: Gkoulalas-DivanisALoukidesGSunJPublishing data from electronic health records while preserving privacy: A survey of algorithmsJ. Biomed. Inform.20145041910.1016/j.jbi.2014.06.00224936746https://doi.org/10.1016/j.jbi.2014.06.002, special Issue on Informatics Methods in Medical Privacy – reference: Tan J. (2008) Healthcare information systems and informatics: Research and Practices: Research and Practices. IGI Global – reference: SittigDSinghHA new sociotechnical model for studying health information technology in complex adaptive healthcare systemsQuality & Safety in Health Care 19 Suppl20103i687410.1136/qshc.2010.042085 – reference: EssaYMHemdanEEDEl-MahalawyAAttiyaGEl-SayedAIFHDS: Intelligent framework for securing healthcare bigdataJ. Med. Syst.201943512410.1007/s10916-019-1250-430919123https://doi.org/10.1007/s10916-019-1250-4 – reference: Smaradottir B. F. (2018) Security management in electronic health records: Attitudes and experiences among health care professionals. In: 2018 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 715–719 https://doi.org/10.1109/CSCI46756.2018.00143 – reference: HathaliyaJJTanwarSEvansRSecuring electronic healthcare records: a mobile-based biometric authentication approachJournal of Information Security and Applications20201025285310.1016/j.jisa.2020.102528 – reference: ZaabarBCheikhrouhouOJamilFAmmiMAbidMHealthblock: A secure blockchain-based healthcare data management systemComput. Netw.202120010850010.1016/j.comnet.2021.108500https://doi.org/10.1016/j.comnet.2021.108500 – reference: Hu V., Ferraiolo D., Kuhn D., Schnitzer A., Sandlin K., Miller R., Scarfone K. (2014) Guide to attribute based access control (ABAC) definition and considerations. National Institute of Standards and Technology Special Publication, 162–800 – reference: Xu R., Joshi J., Krishnamurthy P. (2019) An integrated privacy preserving attribute based access control framework supporting secure deduplication. IEEE Transactions on Dependable and Secure Computing, 1–1. https://doi.org/10.1109/TDSC.2019.2946073 – reference: Medicine J. H. (2018) Preparing for the EU GDPR In research settings guidance. https://www.jhsph.edu/offices-and-services/institutional-review-board/ – reference: ZhangABacchusALinXConsent-based access control for secure and privacy-preserving health information exchangeSecurity and Communication Networks20169163496350810.1002/sec.1556 – reference: ShahSMKhanRASecondary use of electronic health record: Opportunities and challengesIEEE Access2020813694713696510.1109/ACCESS.2020.3011099https://doi.org/10.1109/ACCESS.2020.3011099 – reference: Abomhara M., Køien G. M., Oleshchuk V. A., Hamid M. (2018) Towards risk-aware access control framework for healthcare information sharing. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy - 1, ICISSP, INSTICC, SciTePress, pp. 312–321. https://doi.org/10.5220/0006608103120321 – reference: Tasatanattakool P., Chian T. (2017) User authentication algorithm with role-based access control for electronic health systems to prevent abuse of patient privacy. In: 2017 3rd IEEE International Conference on Computer and Communications (ICCC), pp. 1019–1024 https://doi.org/10.1109/CompComm.2017.8322697 – reference: Dybå TDingsøyr TEmpirical studies of agile software development: A systematic reviewInf. Softw. Technol.20085083385910.1016/j.infsof.2008.01.006https://doi.org/10.1016/j.infsof.2008.01.006 – reference: PaiMMMGanigaRPaiRMSinhaRKStandard electronic health record (EHR) framework for Indian healthcare systemHealth Serv. Outcomes Res. Method.202121333936210.1007/s10742-020-00238-0 – reference: SharmaYBalamuruganBPreserving the privacy of electronic health records using blockchainProcedia Computer Science202017317118010.1016/j.procs.2020.06.021https://doi.org/10.1016/j.procs.2020.06.021, international Conference on Smart Sustainable Intelligent Computing and Applications under ICITETM2020 – reference: HäyrinenKSarantoKNykänenPDefinition, structure, content, use and impacts of electronic health records: a review of the research literatureInt. J. Med. Informatics200877529130410.1016/j.ijmedinf.2007.09.001 – reference: Kanwal T., Anjum A., Khan A. (2020) Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities. Cluster Computing https://doi.org/10.1007/s10586-020-03106-1 – reference: Kitchenham B. (2004) Procedures for performing systematic reviews. Keele, UK, Keele Univ, 33 – reference: NwekeLYengPWolthusenSYangBUnderstanding attribute-based access control for modelling and analysing healthcare professionals’ security practicesInt. J. Adv. Comput. Sci. Appl.202011683690https://doi.org/10.14569/IJACSA.2020.0110286 – reference: Scholl M. A., Stine K. M., Hash J., Bowen P., Johnson L. A., Smith C. D., Steinberg D. I. (2008) SP 800-66 Rev. 1. an introductory resource guide for implementing the health insurance portability and accountability act (HIPAA) security rule, national institute of standards & technology, Gaithersburg, MD, USA, chap, 1 – reference: GDPR (2016) Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/ EC (General Data Protection Regulation). http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG&toc=OJ:L:2016:119:TOC – reference: Mehndiratta P., Sachdeva S., Kulshrestha S. (2014) A model of privacy and security for electronic health records. In: Madaan A., Kikuchi S., Bhalla S. (eds) Databases in Networked Information Systems, Springer International Publishing, Cham, pp. 202?213 – reference: Mamun Q., Rana M. (2017) A robust authentication model using multi-channel communication for eHealth systems to enhance privacy and security. In: 2017 8th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pp. 255–260 https://doi.org/10.1109/IEMCON.2017.8117210 – reference: RezaeibaghaFMuYDistributed clinical data sharing via dynamic access-control policy transformationInt. J. Med. Informatics201689253110.1016/j.ijmedinf.2016.02.002https://doi.org/10.1016/j.ijmedinf.2016.02.002 – reference: Al Baqari M., Barka E. (2020) Biometric-based blockchain EHR system (BBEHR). In: 2020 International Wireless Communications and Mobile Computing (IWCMC), pp. 2228–2234, https://doi.org/10.1109/IWCMC48107.2020.9148357 – reference: HIPAA (2013b) Summary of the HIPAA Privacy Rule. https://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/understanding/summary/privacysummary.pdf – reference: Odeh A., Keshta I., Aboshgifa A., Abdelfattah E. (2022) Privacy and security in mobile health technologies: Challenges and concerns. In: 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0065–0071 https://doi.org/10.1109/CCWC54503.2022.9720863 – reference: Ahmadian L., Salehi Nejad S., Khajouei R. (2015) Evaluation methods used on health information systems (hiss) in Iran and the effects of hiss on Iranian healthcare: A systematic review. International Journal of Medical Informatics, 84. https://doi.org/10.1016/j.ijmedinf.2015.02.002 – reference: EdemacuKParkHKJangBKimJWPrivacy provision in collaborative eHealth with attribute-based encryption: survey, challenges and future directionsIEEE Access20197896148963610.1109/ACCESS.2019.2925390 – reference: EomJLeeKPatient-controlled attribute-based encryption for secure electronic health records systemJ. Med. Syst.20164025310.1007/s10916-016-0621-327714562 – reference: Jayabalan M., O’Daniel T. (2017) Continuous and transparent access control framework for electronic health records: A preliminary study. In: 2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE), pp. 165–170 https://doi.org/10.1109/ICITISEE.2017.8285487 – reference: Nortey R. N., Yue L., Agdedanu PR, Adjeisah M (2019) Privacy module for distributed electronic health records (EHRs) using the blockchain. In: 2019 IEEE 4th International Conference on Big Data Analytics (ICBDA), pp. 369–374 https://doi.org/10.1109/ICBDA.2019.8713188 – reference: HITECH (2009) Health information technology for economic and clinical health (HITECH) act. http://www.hhs.gov/hipaa/for-professionals/specialtopics/HITECH-act-enforcement-interim-final-rule/, last Accessed 16 September 2020 – reference: Ibrahim A., Singhal M. (2016a) An abstract architecture design for medical information exchange. In: 2016 International Conference on Industrial Informatics and Computer Systems (CIICS), pp. 1–6 https://doi.org/10.1109/ICCSII.2016.7462427 – reference: Sun Y., Zhang R., Wang X., Gao K., Liu L. (2018) A decentralizing attribute-based signature for healthcare blockchain. In: 2018 27th International Conference on Computer Communication and Networks (ICCCN), pp. 1–9 https://doi.org/10.1109/ICCCN.2018.8487349 – reference: Ismail L., Materwala H. (2020) BlockHR: A blockchain-based framework for health records management. In: Proceedings of the 12th International Conference on Computer Modeling and Simulation, Association for Computing Machinery, New York, NY, USA, ICCMS ’20, p 164–168 https://doi.org/10.1145/3408066.3408106 – reference: GhazviniAShukurZSecurity challenges and success factors of electronic healthcare systemProcedia Technol.20131121221910.1016/j.protcy.2013.12.1834th International Conference on Electrical Engineering and Informatics, ICEEI 2013. https://doi.org/10.1016/j.protcy.2013.12.183 – reference: Hakim S. A., Sensuse D. I. (2018) Knowledge mapping system implementation in knowledge management: A systematic literature review. In: 2018 International Conference on Information Management and Technology (ICIMTech), pp. 131–136 https://doi.org/10.1109/ICIMTech.2018.8528190 – reference: Aslam U., Sohail A., Aziz H. I. T., Vistro M. (2019) The importance of preserving the anonymity in healthcare data: a survey. International Journal Of Scientific & Technology Research 8(11), NOVEMBER 2019 – reference: GuoRShiHZhaoQZhengDSecure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systemsIEEE Access20186116761168610.1109/ACCESS.2018.2801266 – reference: Grana M., Jackwoski K. (2015) Electronic health record: a review. In: 2015 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), IEEE Computer Society, Los Alamitos, CA, USA, pp. 1375–1382. https://doi.org/10.1109/BIBM.2015.7359879 – volume: 11 start-page: 683 year: 2020 ident: 1795_CR54 publication-title: Int. J. Adv. Comput. Sci. Appl. doi: 10.14569/IJACSA.2020.0110286 – ident: 1795_CR50 – ident: 1795_CR29 – ident: 1795_CR53 doi: 10.1109/ICBDA.2019.8713188 – ident: 1795_CR60 doi: 10.4018/978-1-5225-7071-4.ch004 – ident: 1795_CR39 doi: 10.1109/ICITISEE.2017.8285487 – ident: 1795_CR37 doi: 10.1145/3408066.3408106 – volume: 21 start-page: 339 issue: 3 year: 2021 ident: 1795_CR56 publication-title: Health Serv. Outcomes Res. Method. doi: 10.1007/s10742-020-00238-0 – ident: 1795_CR70 doi: 10.1109/CSCI46756.2018.00143 – volume: 43 start-page: 124 issue: 5 year: 2019 ident: 1795_CR16 publication-title: J. Med. Syst. doi: 10.1007/s10916-019-1250-4 – volume: 102528 start-page: 53 year: 2020 ident: 1795_CR26 publication-title: Journal of Information Security and Applications doi: 10.1016/j.jisa.2020.102528 – ident: 1795_CR32 doi: 10.1109/TrustCom/BigDataSE.2019.00085 – ident: 1795_CR64 doi: 10.6028/NIST.SP.800-66r1 – ident: 1795_CR1 doi: 10.5220/0006608103120321 – ident: 1795_CR30 doi: 10.13140/RG.2.1.1508.4405 – volume: 3 start-page: i68 year: 2010 ident: 1795_CR69 publication-title: Quality & Safety in Health Care 19 Suppl doi: 10.1136/qshc.2010.042085 – ident: 1795_CR35 doi: 10.1109/ICCSII.2016.7462427 – volume: 79 start-page: 99 year: 2015 ident: 1795_CR8 publication-title: Knowl.-Based Syst. doi: 10.1016/j.knosys.2015.02.004 – volume: 46 start-page: 541 issue: 3 year: 2013 ident: 1795_CR18 publication-title: J. Biomed. Inform. doi: 10.1016/j.jbi.2012.12.003 – ident: 1795_CR28 – ident: 1795_CR77 doi: 10.1109/TDSC.2019.2946073 – ident: 1795_CR20 – ident: 1795_CR5 doi: 10.1155/2019/7516035 – volume: 36 start-page: 1161 issue: 6, Part B year: 2016 ident: 1795_CR19 publication-title: Int. J. Inf. Manag. doi: 10.1016/j.ijinfomgt.2016.07.006 – ident: 1795_CR3 doi: 10.1016/j.ijmedinf.2015.02.002 – volume: 7 start-page: 89614 year: 2019 ident: 1795_CR14 publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2925390 – ident: 1795_CR31 doi: 10.6028/NIST.SP.800-162 – volume: 12 start-page: 3 issue: 1 year: 2005 ident: 1795_CR11 publication-title: J. Am. Med. Inform. Assoc. doi: 10.1197/jamia.M1664 – volume: 35 start-page: 8 issue: 1 year: 2018 ident: 1795_CR43 publication-title: Balkan Med. J. doi: 10.4274/balkanmedj.2017.0966 – ident: 1795_CR38 doi: 10.1109/ICESC51422.2021.9532644 – ident: 1795_CR4 doi: 10.1109/IWCMC48107.2020.9148357 – ident: 1795_CR61 – volume: 20 start-page: e10725 issue: 7 year: 2018 ident: 1795_CR10 publication-title: J Med Internet Res doi: 10.2196/10725 – ident: 1795_CR23 doi: 10.1109/BIBM.2015.7359879 – ident: 1795_CR57 doi: 10.14236/ewic/EASE2008.8 – volume: 50 start-page: 4 year: 2014 ident: 1795_CR22 publication-title: J. Biomed. Inform. doi: 10.1016/j.jbi.2014.06.002 – ident: 1795_CR48 doi: 10.1109/TrustCom.2016.0105 – volume: 9 start-page: 3496 issue: 16 year: 2016 ident: 1795_CR81 publication-title: Security and Communication Networks doi: 10.1002/sec.1556 – ident: 1795_CR27 – ident: 1795_CR46 – ident: 1795_CR7 doi: 10.14569/IJACSA.2016.070464 – volume: 24 start-page: 1694 year: 2018 ident: 1795_CR40 publication-title: Adv. Sci. Lett. doi: 10.1166/asl.2018.11139 – volume: 27 start-page: 841 issue: 6 year: 2019 ident: 1795_CR63 publication-title: European Journal of Human Genetics : EJHG doi: 10.1038/s41431-019-0340-6 – volume: 50 start-page: 833 year: 2008 ident: 1795_CR13 publication-title: Inf. Softw. Technol. doi: 10.1016/j.infsof.2008.01.006 – volume: 114 start-page: 2235 issue: 3 year: 2020 ident: 1795_CR41 publication-title: Wireless Pers. Commun. doi: 10.1007/s11277-020-07474-0 – volume: 22 start-page: 1299 issue: 4 year: 2018 ident: 1795_CR76 publication-title: IEEE J Biomed Health Inform doi: 10.1109/JBHI.2017.2721545 – volume: 77 start-page: 291 issue: 5 year: 2008 ident: 1795_CR34 publication-title: Int. J. Med. Informatics doi: 10.1016/j.ijmedinf.2007.09.001 – volume: 64 start-page: 1 year: 2015 ident: 1795_CR58 publication-title: Inf. Softw. Technol. doi: 10.1016/j.infsof.2015.03.007 – volume: 89 start-page: 25 year: 2016 ident: 1795_CR62 publication-title: Int. J. Med. Informatics doi: 10.1016/j.ijmedinf.2016.02.002 – volume: 6 start-page: 11676 year: 2018 ident: 1795_CR24 publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2801266 – volume: 060 start-page: 060 issue: 01 year: 2018 ident: 1795_CR47 publication-title: Yearb Med Inform – volume: 65 start-page: 76 year: 2017 ident: 1795_CR59 publication-title: J. Biomed. Inform. doi: 10.1016/j.jbi.2016.11.001 – volume: 28 start-page: S63 issue: Supplement 1 year: 2015 ident: 1795_CR12 publication-title: The Journal of the American Board of Family Medicine doi: 10.3122/jabfm.2015.S1.150133 – volume: 40 start-page: 253 year: 2016 ident: 1795_CR15 publication-title: J. Med. Syst. doi: 10.1007/s10916-016-0621-3 – volume: 7 start-page: 147782 year: 2019 ident: 1795_CR66 publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2946373 – ident: 1795_CR2 – ident: 1795_CR72 doi: 10.4018/978-1-59904-690-7 – ident: 1795_CR52 doi: 10.1109/ACCESS.2019.2917555 – volume: 200 start-page: 108500 year: 2021 ident: 1795_CR80 publication-title: Comput. Netw. doi: 10.1016/j.comnet.2021.108500 – ident: 1795_CR78 doi: 10.1109/ICHI.2015.92 – ident: 1795_CR71 doi: 10.1109/ICCCN.2018.8487349 – volume: 11 start-page: 212 year: 2013 ident: 1795_CR21 publication-title: Procedia Technol. doi: 10.1016/j.protcy.2013.12.183 – volume: 68 start-page: 1 year: 2017 ident: 1795_CR79 publication-title: Futur. Gener. Comput. Syst. doi: 10.1016/j.future.2016.08.011 – ident: 1795_CR36 doi: 10.1109/CHASE.2016.24 – ident: 1795_CR44 doi: 10.1016/j.eij.2020.07.003 – volume: 8 start-page: 136947 year: 2020 ident: 1795_CR65 publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3011099 – ident: 1795_CR51 doi: 10.1007/978-3-319-05693-7_13 – volume: 22 start-page: 1072 issue: 5 year: 2015 ident: 1795_CR45 publication-title: J. Am. Med. Inform. Assoc. doi: 10.1093/jamia/ocv038 – ident: 1795_CR74 – volume: 173 start-page: 171 year: 2020 ident: 1795_CR67 publication-title: Procedia Computer Science doi: 10.1016/j.procs.2020.06.021 – ident: 1795_CR73 doi: 10.1109/CompComm.2017.8322697 – ident: 1795_CR9 – ident: 1795_CR68 doi: 10.1109/ICDIPC.2016.7470795 – ident: 1795_CR75 doi: 10.1109/GLOCOMW.2018.8644088 – ident: 1795_CR25 doi: 10.1109/ICIMTech.2018.8528190 – ident: 1795_CR55 doi: 10.1109/CCWC54503.2022.9720863 – ident: 1795_CR17 doi: 10.1109/COMPSAC.2019.00106 – volume: 39 start-page: 165 issue: 1 year: 2015 ident: 1795_CR6 publication-title: J Med Syst doi: 10.1007/s10916-014-0165-3 – volume: 43 start-page: 320 issue: 10 year: 2019 ident: 1795_CR33 publication-title: J. Med. Syst. doi: 10.1007/s10916-019-1445-8 – ident: 1795_CR42 doi: 10.1007/s10586-020-03106-1 – ident: 1795_CR49 doi: 10.1109/IEMCON.2017.8117210 |
SSID | ssj0033329 ssib060165803 |
Score | 2.466409 |
SecondaryResourceType | review_article |
Snippet | Main
Electronic health record (EHR) applications are digital versions of paper-based patient health information. Traditionally, medical records are made on... MainElectronic health record (EHR) applications are digital versions of paper-based patient health information. Traditionally, medical records are made on... |
SourceID | proquest crossref springer |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 435 |
SubjectTerms | Blockchain Cryptography Electronic health records Electronic medical records Epidemiology Health Promotion and Disease Prevention Interoperability Literature reviews Mapping Medical records Medicine Medicine & Public Health Privacy Public Health Review Article |
SummonAdditionalLinks | – databaseName: ProQuest Technology Collection dbid: 8FG link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LSwMxEA5aL4KIT6xWycGbBrd57MOLiliLB_Fgobdlk02koNvaVsH-eiePdVGw5-zmMJnMNzOZ-Qah00ImXZlGnCiqFeGAOCQVwpCSGhOlnItMO7bPx7g_4A9DMQwJt1koq6xtojPU5VjZHPkFwJKtggN4vZq8Ezs1yr6uhhEaq2itC0hj9Tzt3df6ZJlGhBu-5C0zY8xNLYNLCpFTylhoogmtdMwWD1FbqJBkgix-A1Xjff55MHU41NtCm8GBxDf-xLfRiq520IbPvmHfVLSLrp-mo89CfeFRhZtBN9g3PWKfmJld4gI3RM74rbBUDS_YEc7uoUHv7vm2T8KsBBByxuaExpLy0ihpipSbLi0LCr5cbDJp4JBiCFsUBKA6ERpWbINPzAG7wLbFyiQy1mwftapxpQ8Q1iVPhYo0hI6SCyUyYxPHRiVRUsKWtI26tWByFYjE7TyL17yhQLbCzEGYuRNmvmijs59_Jp5GY-nXnVreebhSs7xRgDY6r8-gWf5_t8Plux2hdQqOiq8r66DWfPqhj8HRmMsTp03flFvMeg priority: 102 providerName: ProQuest |
Title | Privacy in electronic health records: a systematic mapping study |
URI | https://link.springer.com/article/10.1007/s10389-022-01795-z https://www.proquest.com/docview/2930094893 |
Volume | 32 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dS8MwED90ggjitzg_Rh5808qaJm3qk3PsA0URcTCfSpMmMtQpbgrur_fSD6tDBV9SaNLQ3CW5u-TudwD7sQxcKerMUVQrh6HEcQTnxkmoMXXBGA91ivZ56Xd77KzP-3lQ2Kjwdi-uJNOd-kuwm2fde6h1JQhC7kxmYY67IhQVmGt0bs9bxQ7seV6anQwXI1pIwvPyYJmfe_kukEotc-piNJU37WXoFX-auZncH72O5ZGaTIE4_ncoK7CUK6Ckkc2YVZjRwzWYv8iv2NdgMTvII1l80jqcXL0M3mL1TgZDUubMIVn8JMnOeEbHJCYlJjR5jC3qwx1JsWs3oNdu3TS7Tp52AfkVemOH-pKyxChpYsGMS5OYolrom1Aa5LePFpBCW1YHXGONjRXyGYpB3CZ9ZQLpa28TKsOnod4CohMmuKprtEIl44qHxp5BGxXUgwS7pFVwC9pHKsckt6kxHqISTdmSKkJSRSmpokkVDj6_ec4QOf5svVuwNMpX5yjCYVqPSlTVqnBYcKis_r237f8134EFijpQ5rK2C5Xxy6veQx1mLGswG_QDLEXTtWW7U8snMT5PW5dX1_i26Tex7NHGB-Fq7Os |
linkProvider | Springer Nature |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LS8NAEB5qPSiI-MRq1T3oSYPtZjcPQVTU0moVDy30FpPNrhS0rW1V2h_lb3Q2mxgU9OZ5kyGZnZ3XznwDsBdGbjXyKswSVAqLocWxPM6VFVOlKh5j3JcJ2uedU2-z6w7vFOAj64XRZZWZTkwUddwXOkd-hGZJV8GheT0dvFh6apS-Xc1GaBixuJGTdwzZRieNS9zffUprV62LupVOFcDP8e2xRZ2IsliJSIUeU1UahxS9Hkf5kcLfcdDBFxiqSZdLXNGtMA5DLY9awBHKjRxpI90ZmGU6M47nx-18mW-NbMKTYU_GEti2nUxJQ6WAkZpn22nTTtq6Z-tiJaoLI1yfW9PvhjH3dn9c0CZ2r7YEi6nDSs6NhC1DQfZWYMFk-4hpYlqFs_th9y0UE9LtkXywDjFNlsQkgkbHJCQ5cDR5DjU0xCNJAG7XoP0vXFyHYq_fkxtAZMw8LioSQ9WIccF9pRPVSrgVN0aStATVjDGBSIHL9fyMpyCHXNbMDJCZQcLMYFqCg693Bga248-nyxm_g_QIj4Jc4EpwmO1Bvvw7tc2_qe3CXL112wyajbubLZin6CSZmrYyFMfDV7mNTs442kkki8DDf4vyJ2nEC8o |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LS8NAEB60gggiPrE-96AnDbb7yEMQFWtprUgPFnqLyWZXClq1rYr-NH-ds9mkQcHePG8yJLOz89qZbwD2otirxn6FO5Iq6XC0OI4vhHYSqnXF51wEKkX7vHEbHX7VFd0p-Mp7YUxZZa4TU0WdPEmTIz9Cs2Sq4NC8HumsLKJdq58-vzhmgpS5ac3HaVgRaamPdwzfhifNGu71PqX1y9uLhpNNGMBPC9jIoW5MeaJlrCOf6ypNIooekKuDWOOvuejsSwzblCcUrpi2GJejxkeN4Ertxa5iSHcaZjyGXhWeJa87NuUG5USkg5-sVWCMpRPTUEFg1OYzljXwZG18zBQuUVMk4QXC-fxpJAvP99dlbWoD64uwkDmv5NxK2xJMqf4yzNvMH7ENTStw1h703iL5QXp9UgzZIbbhktik0PCYRKQAkSaPkYGJuCcp2O0qdP6Fi2tQ6j_11ToQlXBfyIrCsDXmQopAm6S1ll7FS5AkLUM1Z0woMxBzM0vjISzglw0zQ2RmmDIz_CzDwfidZwvhMfHprZzfYXach2EhfGU4zPegWP6b2sZkarswi0IcXjdvWpswR9FfsuVtW1AaDV7VNvo7o3gnFSwCd_8tyd_pSxAJ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Privacy+in+electronic+health+records%3A+a+systematic+mapping+study&rft.jtitle=Journal+of+public+health&rft.au=Tertulino%2C+Rodrigo&rft.au=Antunes%2C+Nuno&rft.au=Morais%2C+Higor&rft.date=2024-03-01&rft.pub=Springer+Berlin+Heidelberg&rft.issn=2198-1833&rft.eissn=1613-2238&rft.volume=32&rft.issue=3&rft.spage=435&rft.epage=454&rft_id=info:doi/10.1007%2Fs10389-022-01795-z&rft.externalDocID=10_1007_s10389_022_01795_z |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2198-1833&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2198-1833&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2198-1833&client=summon |