Search

Your search keyword '"Protected health information"' showing total 54 results

Search Constraints

Start Over You searched for: Descriptor "Protected health information" Remove constraint Descriptor: "Protected health information" Publisher ieee Remove constraint Publisher: ieee
54 results on '"Protected health information"'

Search Results

1. Secure Medical Data Against Unauthorized Access Using Decoy Technology in Distributed Edge Computing Networks

2. Clinical de-identification using sub-document analysis and ELECTRA

3. HIPAA-based Analysis on the Awareness Level of Medical Personnel in Indonesia to Secure Electronic Protected Health Information (ePHI)

4. Blockchain Based Smart Healthcare System for Chronic –Illness Patient Monitoring

5. The triple challenge for the healthcare industry: Sustainability, privacy, and cloud-centric regulatory compliance.

6. Cybersecurity in Medical Private Practice: Results of a Survey in Audiology

7. Towards Dynamic Access Control for Privacy

8. Detecting Protected Health Information with an Incremental Learning Ensemble: A Case Study on New Zealand Clinical Text

9. Protected Health Information De-Identification on Visual and Textual Features using Transfer Learning

10. Healthcare Biometrics Security and Regulations: Biometrics Data Security and Regulations Governing PHI and HIPAA Act for Patient Privacy

11. Comprehend Medical: A Named Entity Recognition and Relationship Extraction Web Service

12. Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions

13. Indonesian Protected Health Information Removal using Named Entity Recognition

14. Weighted Itemsets Error (WIE) Approach for Evaluating Generated Synthetic Patient Data

15. Research into Making Healthcare Green with Cloud, Green IT, and Data Science to Reduce Healthcare Costs and Combat Climate Change

16. Strategy and Solution to comply with GDPR : Guideline to comply major articles and save penalty from non-compliance

17. Redaction of Protected Health Information in EHRs using CRFs and Bi-directional LSTMs

18. PHIs (Protected Health Information) identification from free text clinical records based on machine learning

19. Cloud Based Big Data Platform for Image Analytics

20. Exploring Organizational Culture for Information Security in Healthcare Organizations: A Literature Review

21. Engineering Scalable, Secure, Multi-Tenant Cloud for Healthcare Data

22. Improving the information security of personal electronic health records to protect a patient's health information

23. Risks in Handling Healthcare Data and a New Ethical Approach for Healthcare Organizations

24. Privacy Requirements for mobile e-Service in the Health Authority - Abu Dhabi (HAAD)

25. Automatic de-identification of medical records with a multilevel hybrid semi-supervised learning approach

26. The rise of mobile technology in healthcare: the challenge of securing teleradiology

27. Context-aware, knowledge-intensive, and patient-centric Mobile Health Care Model

28. Formally expressing HIPAA privacy policies for web services

29. Healthcare Privacy: How Secure Are the VOIP/Video-Conferencing Tools for PHI Data?

30. Calculating a hospital's IT Energy Efficiency and determining cost effective ways for improvement

31. Automatic verification of health regulatory compliance in cloud computing

32. An informal method for identifying standards to enable meaningful exchange of public health records

33. Different Perception and Attitude toward Medical Data That Including Protected Health Information in Clinical Research

34. Privacy, security and storage issues in medical data management

35. Information Security of EHRs

36. University of California Research eXchange (UCReX): A Federated Cohort Discovery System

37. Secure scalable disaster electronic medical record and tracking system

38. The role of data use agreements in specifying legally compliant software requirements

39. HCPP: Cryptography Based Secure EHR System for Patient Privacy and Emergency Healthcare

40. A Secure Distributed File System for Medical Image Archiving

41. Role-Based Access To Portable Personal Health Records

42. Why Privacy Matters in Health Care Delivery: A Value Proposition

43. A Study of U.S. Battlefield Medical Treatment/Evacuation Compliance with HIPAA Requirements

44. Aligning Requirements with HIPAA in the iTrust System

45. Pseudonymization for improving the Privacy in E-Health Applications

46. Privacy Access Control Model for Aggregated e-Health Services

47. Research Issues of Privacy Access Control Model for Mobile Ad Hoc Healthcare Applications with XACML

48. Computer-assisted de-identification of free text in the MIMIC II database

49. HIPPA's compliant Auditing System for Medical Imaging System

50. De-identification algorithm for free-text nursing notes

Catalog

Books, media, physical & digital resources