• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

Adoption of security and confidentiality features in an operational community health information network: the Comox Valley experience--case example.

作者信息

Moehr J R, McDaniel J G

机构信息

School of Health Information Science, University of Victoria, BC, Canada.

出版信息

Int J Med Inform. 1998 Mar;49(1):81-7. doi: 10.1016/s1386-5056(98)00014-8.

DOI:10.1016/s1386-5056(98)00014-8
PMID:9723805
Abstract

Since 1993, a budding community health information network (CHIN) has been in operation in the Comox Valley in Canada. A general hospital and three multi-doctor clinics are linked electronically. The clinics operate without paper charts using a comprehensive clinic information system. The link is provided by RSALink, a commercial message exchange service, based on Health Link, a system developed at the University of Victoria (McDaniel et al., Can. Med. Inform. 1 (1994) 40-41; McDaniel, Dissertation, University of Victoria, Canada, 1994). Health Link is a highly adaptable message exchange service with rich functionality. Despite this, the system is used exclusively to receive laboratory results transmitted by the hospital's laboratory system (RSAStat). The results are deposited in the patient data base of a commercial clinic information system (CliniCare). This case is instructive because the users' selection of services available through Health Link allows us to observe the preferences in this informational sophisticated environment. Laboratory data transmission is appreciated as highly beneficial. The reliability, security and ample privacy protection and authentication features of Health Link, in contrast, are used in a black box mode and are not consciously exploited. This is consistent with our experience of the use of other systems which have operated for a substantial time, essentially without serious protection features. Our experience suggests that security and confidentiality features are exploited only to the extent that they do not require additional effort or conscientious intervention. This puts the system provider in the difficult position of either offering interactive systems that nobody will use, or providing automated features that nobody is aware of and that are therefore not used to full advantage--if at all.

摘要

相似文献

1
Adoption of security and confidentiality features in an operational community health information network: the Comox Valley experience--case example.
Int J Med Inform. 1998 Mar;49(1):81-7. doi: 10.1016/s1386-5056(98)00014-8.
2
Data security and patient confidentiality: the manager's role.数据安全与患者保密:管理者的职责
Int J Biomed Comput. 1996 Oct;43(1-2):115-9. doi: 10.1016/s0020-7101(96)01236-6.
3
Medical network security and viruses.医疗网络安全与病毒
Stud Health Technol Inform. 1991;1:271-84.
4
Medical information retrieval and WWW browsers at Mayo.梅奥诊所的医学信息检索与万维网浏览器
Proc Annu Symp Comput Appl Med Care. 1995:903-7.
5
Protecting patient privacy and data quality in a community health information network.
J Healthc Qual. 1996 Nov-Dec;18(6):17-21. doi: 10.1111/j.1945-1474.1996.tb00865.x.
6
The impact of technology on the confidentiality of health information.技术对健康信息保密性的影响。
Top Health Inf Manage. 1996 May;16(4):13-21.
7
[A computerized system for the management of letters of authorization for access to sensitive data in a research and teaching hospital].
Ig Sanita Pubbl. 2012 Jan-Feb;68(1):19-28.
8
How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems.如何(不)在分布式网络中保护基因组数据隐私:利用踪迹重新识别来评估和设计匿名保护系统。
J Biomed Inform. 2004 Jun;37(3):179-92. doi: 10.1016/j.jbi.2004.04.005.
9
Implementing security in computer based patient records clinical experiences.在基于计算机的患者记录中实施安全措施的临床经验。
Medinfo. 1995;8 Pt 1:657-60.
10
Managing secure computer systems and networks.
Int J Biomed Comput. 1996 Oct;43(1-2):47-52. doi: 10.1016/s0020-7101(96)01226-3.

引用本文的文献

1
The chunampet community health information management system: A health and demographic surveillance system from a rural South India.春纳姆佩特社区健康信息管理系统:来自印度南部农村的一个健康与人口监测系统。
J Educ Health Promot. 2021 May 31;10(1):178. doi: 10.4103/jehp.jehp_596_20. eCollection 2021.
2
An enhanced security solution for electronic medical records based on AES hybrid technique with SOAP/XML and SHA-1.一种基于AES混合技术与SOAP/XML和SHA-1的电子病历增强安全解决方案。
J Med Syst. 2013 Oct;37(5):9971. doi: 10.1007/s10916-013-9971-2. Epub 2013 Sep 14.