197
Views
2
CrossRef citations to date
0
Altmetric
THEMED ARTICLES: DATA COMMUNICATIONS & NETWORK SECURITY

Secure Mobile Device Use in Healthcare Guidance from HIPAA and ISO17799

&
Pages 333-342 | Published online: 10 Dec 2007

REFERENCES

  • 104th U.S. Congress. Health Insurance Portability and Accountability Act of 1996, Public Law 104–191.
  • Borzo , J. 2005 . A New Physician's Assistant: Handheld devices are becoming critical tools for some doctors and nurses. . The Wall Street Journal, the Journal Report: Personal Health. , : R5
  • Campbell , R. , Al-Muhtadi , J. , Naldurg , P. , Sampemane , G. and Mckunas , M. D. 2002 . “ Towards Security and Privacy for Pervasive Computing. ” . In Mext-NSF0JSPS International Symposium, ISSS , 1 – 15 . Heidelberg : Springer-Berlin . Tokyo, November 2002
  • Canadian Institute of Health Research. (2001). Selected International Legal Norms on the Protection of Personal Information in Health Research. CIHR. Retrieved October 20, 2006 from http://www.cihr-irsc.gc.ca/e/documents/protection_pi_e.pdf
  • Eneida , A. M. , Chen , E. S. , Stetson , P. D. , Mcknight , L. K. , Lei , J. and Cimino , J. J. 2004 . Approach to Mobile Information and Communication for Healthcare. . International Journal of Informatics , 73 : 631 – 638 .
  • EU Directive. 1995, November 32 . European Union Directive on Data Protection. . Journal of the European Communities, L. , 281 : 31
  • Hameed , K. 2003 . The application of mobile computing and technology to health care services. . Telematics and Informatics Archive , 20 ( 2 ) : 99 – 106 .
  • Haux , R. 2006 . Health information systems- past, present, future. Medical Informatics. . International Journal of Medical Informatics , 75 : 268 – 281 .
  • Haworth , D. A. and Pietron , L. R. 2006 . Sarbanes-Oxley: Achieving compliance by starting with ISO 17799. . Information Systems Management , 23 ( 1 ) : 73 – 87 .
  • Karygiannis, T. & Owens, L. (2002). Wireless Network Security 802.11, Bluetooth and Handheld Devices. National Institute of Standard and Technology Pub. 800–48. Retrieved 4 March 2006 from http://csrc.nist.gov/publications/nistpubs/800–48/NIST_SP_800–48.pdf
  • Light , J. 2004, April . “ Security, privacy and trust issues raised by the Personal Server Concept. ” . In SPCC Workshop on Security and Privacy at the Conference on Pervasive Computing. , Vienna , Austria : Intel Research .
  • Linhoff , M. 2002 . “ Mobile computing in medical and healthcare industry. ” . In Mobile Computing in Medicine, Second Conference on Mobile Computing in Medicine, Workshop of the Project Group Mocomed, Gmds-Fachbereich Medizinische informatik &Amp , Vol. 15. GI Edited by: Bludau , H. and Koop , A. 217 – 225 . Gi-Fachausschuss 4.7 : LNI .
  • Lu , Xiao , Y. C. , Sears , Y. , A. and Jacko , J. A. 2005 . A review and a framework of handheld computer adoption in healthcare. . International Journal of Medical Informatics , 74 ( 5 ) : 409 – 422 .
  • Luo , J. 2004 . Portable Computing in Psychiatry. Psychiatry. . The Canadian Journal of Psychiatry , 49 : 24 – 30 .
  • Michael , J. , Schoppmann , J. D. , Denise , L. and Sanders , J. D. 2004 . HIPAA Compliance: The Law, Reality, and Recommendations. . Journal of the American College of Radiology , 1 ( 10 ) : 728 – 733 .
  • National Research Council (NRC) . 1997 . Committee on Maintaining Privacy and Security in Healthcare Applications of the National Information Infrastructure. , Washington , DC : National Academy Press . For the Record: Protecting Electronic Health Information.
  • Nealon , J. and Moreno , A. The application of agent technology to health care. Proceedings of the Workshop “AgentCities: research in large scale open agent environments”, in the 1st International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 2002) . Bologna , Italy. pp. 169 – 173 .
  • OECD (1980). OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. Retrieved September 20 from http://www.oecd.org/
  • Rasmussen, M. (2005). Revised ISO 17799 Boosts Information Security Management Relevance Analyst Report, Forrester Research. Retrieved from //www.csoonline.com/analyst/report3730.html
  • Stanford , V. 2002 . Pervasive Health Care Applications Face Tough Security Challenges. . IEEE Pervasive Computing , 1 ( 2 ) : 8 – 12 .
  • Ten Duis , H. J. and Van der Werken, C. 2003 . Trauma care systems in The Netherlands . Injury , 34 ( 9 ) : 722 – 727 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.