4.6 Article

Using statistical and machine learning to help institutions detect suspicious access to electronic health records

Related references

Note: Only part of the references are listed.
Article Computer Science, Interdisciplinary Applications

Situation-Based Access Control: Privacy management via modeling of patient data access scenarios

Mor Peleg et al.

JOURNAL OF BIOMEDICAL INFORMATICS (2008)

Review Computer Science, Information Systems

A Research Agenda for Personal Health Records (PHRs)

David C. Kaelber et al.

JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2008)

Article Engineering, Biomedical

HIPAA compliant auditing system for medical images

Z Zhou et al.

COMPUTERIZED MEDICAL IMAGING AND GRAPHICS (2005)

Article Radiology, Nuclear Medicine & Medical Imaging

Multidimensional analysis: A management tool for monitoring HIPAA compliance and departmental performance

RM Coleman et al.

JOURNAL OF DIGITAL IMAGING (2004)

Article Computer Science, Information Systems

A contextual role-based access control authorization model for electronic patient record

GHMB Motta et al.

IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE (2003)

Article Business, Finance

A decision aid for assessing the likelihood of fraudulent financial reporting

TB Bell et al.

AUDITING-A JOURNAL OF PRACTICE & THEORY (2000)