Abstract
After this lecture, you…
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Amalberti R, Auroy Y, Berwick D, Barach P (2005) Five system barriers to achieving ultrasafe health care. Ann Intern Med 142(9):756–764
Amalberti R, Benhamou D, Auroy Y, Degos L (2011) Adverse events in medicine: easy to count, complicated to understand, and complex to prevent. J Biomed Inform 44(3):390–394
Auinger A, Ebner M, Nedbal D, Holzinger A (2009) Mixing content and endless collaboration—mashups: towards future personal learning environments. In: Stephanidis C (ed) Universal access in human-computer interaction hci, part III: applications and services, HCI International 2009, vol 5616, Lecture notes in computer science (LNCS). Springer, Berlin, pp 14–23
Avizienis A, Laprie JC, Randell B (2001) Fundamental concepts of dependability. Tech Rep Comput Sci Univ Newcastle 1145(CS-TR-739):7–12
Bardram JE, Norskov N (2008) A context-aware patient safety system for the operating room. Proceedings of the 10th International conference on ubiquitous computing. ACM, Seoul, Korea, pp 272–281
Bates DW, Gawande AA (2003) Improving safety with information technology. N Engl J Med 348(25):2526–2534
Carrión I, Fernández-Alemán J, Toval A (2011) Usable privacy and security in personal health records. In: Campos P, Graham N, Jorge J, Nunes N, Palanque P, Winckler M (eds) INTERACT 2011, vol 6949, Lecture notes in computer science (LNCS). Springer, Berlin, pp 36–43
Fox R, Cooley J, Hauswirth M (2011) Creating a virtual personal health record using mashups. IEEE Internet Comput 15(4):23–30
Garrouste-Orgeas M, Philippart F, Bruel C, Max A, Lau N, Misset B (2012) Overview of medical errors and adverse events. Ann Int Care 2(1):2
Holzinger A, Schwaberger K, Weitlaner M (2005) Ubiquitous computing for hospital applications: RFID-applications to enable research in real-life environments. 29th Annual international conference on computer software & applications (IEEE COMPSAC). IEEE, Edinburgh, pp 19–20
Holzinger A, Searle G, Wernbacher M (2011) The effect of previous exposure to technology (PET) on acceptance and its importance in usability engineering. Univ Access Inf Soc Int J 10(3):245–260
Leape LL, Berwick DM (2005) Five years after to err is human. JAMA 293(19):2384–2390
Manjunath PS, Palte H, Gayer S (2010) Wrong site surgery—a clear and constant fear. Br Med J 341:c1103
Neubauer T, Heurix J (2011) A methodology for the pseudonymization of medical data. Int J Med Inform 80(3):190–204
Reason J (1997) Management of the risks of organizational accidents. Ashgate, Brookfield, VT
Reason J (2000) Human error: models and management. Br Med J 320(7237):768–770
Rodrigues S, Brandao P, Nelas L, Neves J, Alves VA (2010) Logic Programming Based Adverse Event Reporting and Learning System. IEEE/ACIS 9th International conference on computer and information science (ICIS), 18–20 Aug 2010, pp 189–194
Safran C, Bloomrosen M, Hammond WE, Labkoff S, Markel-Fox S, Tang PC, Detmer DE (2007) Toward a national framework for the secondary use of health data: an American Medical Informatics Association white paper. J Am Med Inform Assoc 14(1):1–9
Stelfox HT, Palmisani S, Scurlock C, Orav E, Bates D (2006) The “To Err is Human” report and the patient safety literature. Qual Saf Health Care 15(3):174–178
Sundt TM, Brown JP, Uhlig PN (2005) Focus on patient safety: good news for the practicing surgeon. Ann Thorac Surg 79(1):11–15
Tapp L, Elwyn G, Edwards A, Holm S, Eriksson T (2009) Quality improvement in primary care: ethical issues explored. Int J Health Care Qual Assur 22(1):8–29
Wang C, Huang DJ (2013) The HIPAA conundrum in the era of mobile health and communications. JAMA 310(11):1121–1122
Weippl E, Holzinger A, Tjoa AM (2006) Security aspects of ubiquitous computing in health care. Elektrotech Informationstech 123(4):156–162
Author information
Authors and Affiliations
1 Supplementary Materials
Below is the link to the electronic supplementary material.
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Holzinger, A. (2014). Lecture 11 Biomedical Data: Privacy, Safety, and Security. In: Biomedical Informatics. Springer, Cham. https://doi.org/10.1007/978-3-319-04528-3_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-04528-3_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-04527-6
Online ISBN: 978-3-319-04528-3
eBook Packages: EngineeringEngineering (R0)