2016 IEEE 18th International Conference on E-Health Networking, Applications and Services (Healthcom) 2016
DOI: 10.1109/healthcom.2016.7749426
|View full text |Cite
|
Sign up to set email alerts
|

Anatomy of log files: Implications for information accountability measures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“… 87 Intended for troubleshooting technical problems and HIPAA compliance, EHR usage logs originate from many interconnected information systems and sources (eg, devices). 93 Vendor-defined time metrics may not be generalizable between, or within, institutions or provide precise estimates in real-world settings. Therefore, given the value in measuring clinician EHR time, researchers should explore novel algorithmic methods to validate these metrics and EHR usage log data.…”
Section: Discussionmentioning
confidence: 99%
“… 87 Intended for troubleshooting technical problems and HIPAA compliance, EHR usage logs originate from many interconnected information systems and sources (eg, devices). 93 Vendor-defined time metrics may not be generalizable between, or within, institutions or provide precise estimates in real-world settings. Therefore, given the value in measuring clinician EHR time, researchers should explore novel algorithmic methods to validate these metrics and EHR usage log data.…”
Section: Discussionmentioning
confidence: 99%
“…auditing, is an essential part of access control as it ensures that users are held responsible for their actions by tracing the actions performed on a system to a particular user (Gregg, 2017). In the absence of auditing, the security and privacy of patients' information cannot be ensured through the use of security controls that merely limit access to information (Wickramage et al, 2016). For example, without auditing, any misuse of patient information by an authorised clinician would go undetected.…”
Section: Accountabilitymentioning
confidence: 99%