Proceedings of the 11th international conference on World Wide Web
Principles and Practice of Information Security
Principles and Practice of Information Security
Health Level-7 compliant clinical patient records system
Proceedings of the 2004 ACM symposium on Applied computing
The HIPAA-potamus in health care data security
Communications of the ACM - Has the Internet become indispensable?
Corporate Computer and Network Security
Corporate Computer and Network Security
A New Feature Detection Mechanism and Its Application in Secured ECG Transmission with Noise Masking
Journal of Medical Systems
A privacy framework for mobile health and home-care systems
Proceedings of the first ACM workshop on Security and privacy in medical and home-care systems
Biometrics for Electronic Health Records
Journal of Medical Systems
2009 Information Security Curriculum Development Conference
Security management in Wireless Sensor Networks for healthcare
International Journal of Mobile Communications
Privacy in mobile technology for personal healthcare
ACM Computing Surveys (CSUR)
Privacy management in dynamic groups: understanding information privacy in medical practices
Proceedings of the 2013 conference on Computer supported cooperative work
Enforcing Minimum Necessary Access in Healthcare Through Integrated Audit and Access Control
Proceedings of the International Conference on Bioinformatics, Computational Biology and Biomedical Informatics
Privacy practices in collaborative environments: a study of emergency department staff
Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing
Hi-index | 0.00 |
This paper discusses the challenges associated with privacy in health care in the electronic information age based on the Health Insurance Portability and Accountability Act (HIPAA) and the Security Rules. We examine the storing and transmission of sensitive patient data in the modern health care system and discuss current security practices that health care providers institute to comply with HIPAA Security Rule regulations. Based on our research results, we address current outstanding issues that act as impediments to the successful implementation of security measures and conclude the discussion and offer possible avenues of future research.