401
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Privacy and security concerns in online health services

References

  • Agaku, I. T., Adisa, A. O., Ayo-Yusuf, O. A., & Connolly, G. N. 2014. Concern about Security and Privacy, and Perceived Control over Collection and Use of Health Information Are Related to Withholding of Health Information from Healthcare Providers. Journal of the American Medical Informatics Association, 21:374-378.
  • Anderson, C. L., and R. Agarwal. 2011. “The Digitization of Healthcare: Boundary Risks, Emotion, and Consumer Willingness to Disclose Personal Health Information.” Information Systems Research 22 (3): 469–490. doi:10.1287/isre.1100.0335.
  • Center for Connected Health Policy. 2013. State Telehealth Laws and Reimbursement Policies: A Comprehensive Scan of the 50 States and the District of Columbia [Internet]. Sacramento, CA: The Center. November. http://www.cchpca.org/sites/default/files/uploader/State%20Telehealth%20Laws%20and%20Reimbursement%20Policies%20Final%20Nov.%202013.pdf
  • Dixon, R. F. 2010. “Enhancing Primary Care through Online Communication.” Health Affairs 29 (7): 1364–1369. doi:10.1377/hlthaff.2010.0110.
  • Gaylin, D. S., A. Moiduddin, S. Mohamoud, K. Lundeen, and J. A. Kelly. 2011. “Public Attitudes about Health Information Technology, and Its Relationship to Health Care Quality, Costs, and Privacy.” Health Services Research 46 (3): 920–938. doi:10.1111/hesr.2011.46.issue-3.
  • Goldfarb, A., and C. Tucker. 2012. “Shifts in Privacy Concerns.” The American Economic Review 102 (3): 349–353. doi:10.1257/aer.102.3.349.
  • Hall, J. L., and D. McGraw. 2014. “For Telehealth to Succeed, Privacy and Security Risks Must Be Identified and Addressed.” Health Affairs 33 (2): 216–221. doi:10.1377/hlthaff.2013.0997.
  • Hsieh, R. 2014. “Improving HIPAA Enforcement and Protecting Patient Privacy in a Digital Healthcare Environment.” Loy. U. Chi. LJ 46: 175.
  • King, J., M. F. Furukawa, and M. B. Buntin. 2013. “Geographic Variation in Ambulatory Electronic Health Record Adoption: Implications for Underserved Communities.” Health Services Research 48 (6pt1): 2037–2059. doi:10.1111/hesr.2013.48.issue-6pt1.
  • McGraw, D. 2013. “Building Public Trust in Uses of Health Insurance Portability and Accountability Act De-Identified Data.” Journal of the American Medical Informatics Association 20 (1): 29–34. doi:10.1136/amiajnl-2012-000936.
  • Miller, A. R., and C. Tucker. 2009. “Privacy Protection and Technology Diffusion: The Case of Electronic Medical Records.” Management Science 55 (7): 1077–1093. doi:10.1287/mnsc.1090.1014.
  • Miller, A. R., and C. E. Tucker. 2011. “Encryption and the Loss of Patient Data.” Journal of Policy Analysis and Management 30 (3): 534–556. doi:10.1002/pam.20590.
  • Rainie, L., S. Kiesler, R. Kang, M. Madden, M. Duggan, S. Brown, and L. Dabbish. 2013. Anonymity, Privacy, and Security Online, Pew Research Center's Internet & American Life Project. Washington DC: Pew Research Center.
  • Simon, S., J. S. Evans, A. Benjamin, D. Delano, and D. Bates. 2009. “Patients’ Attitudes toward Electronic Health Information Exchange: Qualitative Study.” Journal of Medical Internet Research 11 (3): e30. doi:10.2196/jmir.1164.
  • Stigler, G. J. 1980. “An Introduction to Privacy in Economics and Politics.” The Journal of Legal Studies 9 (4): 623–644. doi:10.1086/467657.
  • Yang, Y. T., and R. D. Silverman. 2014. “Mobile Health Applications: The Patchwork of Legal and Liability Issues Suggests Strategies to Improve Oversight.” Health Affairs 33 (2): 222–227. doi:10.1377/hlthaff.2013.0958.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.