183
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Planning security architecture for health survey data storage and access

&
Pages 57-63 | Received 05 Sep 2018, Accepted 08 Mar 2019, Published online: 15 Apr 2019

References

  • Barrett, D. J., & Silverman, R. E. (2001). SSH, the secure shell: The definitive guide. O‘Reilly Media, Inc., Sebastopol, CA, USA.
  • Centers for Disease Control and Prevention. (2003). HIPAA privacy rule and public health. Guidance from CDC and the US department of health and human services. MMWR: Morbidity and Mortality Weekly Report, 52(Suppl. 1), 1–17.
  • Cohen, I. G., & Mello, M. M. (2018). HIPAA and protecting health information in the 21st century. JAMA, 320(3), 231–232.
  • El Emam, K. (2008). Heuristics for de-identifying health data. IEEE Security & Privacy, 6(4) 58–61.
  • Freier, A., Karlton, P., & Kocher, P. (2011). The secure sockets layer (SSL) protocol version 3.0 (No. RFC 6101).
  • German, R. R., Lee, L. M., Horan, J., Milstein, R., Pertowski, C., & Waller, M. (2001). Updated guidelines for evaluating public health surveillance systems. MMWR. Recommendations and Reports, 50(1), 1–35.
  • Hulitt, E., & Vaughn, R. B. (2010). Information system security compliance to FISMA standard: A quantitative measure. Telecommunication Systems, 45(2–3), 139–152.
  • Jouini, M., Rabai, L. B. A., & Aissa, A. B. (2014). Classification of security threats in information systems. Procedia Computer Science, 32, 489–496.
  • Kenneally, E. E., & Claffy, K. (2010). Dialing privacy and utility: A proposed data-sharing framework to advance internet research. IEEE Security & Privacy, 8(4), 31–39.
  • Liu, S., & Kuhn, R. (2010). Data loss prevention. IT Professional, 12(2), 10–13.
  • López, O. (2004). 21 CFR part 11: Complete guide to international computer validation compliance for the pharmaceutical industry. CRC Press, Boca Raton, FL, USA.
  • Lumpkin, J. R. (2000). Perspective: E-Health, HIPAA, and beyond: The chair of the expert advisory board on health data outlines the most important issues in developing a secure health information system. Health Affairs, 19(6), 149–151.
  • Luxton, D. D., Kayl, R. A., & Mishkind, M. C. (2012). mHealth data security: The need for HIPAA-compliant standardization. Telemedicine and e-Health, 18(4), 284–288.
  • Menikoff, J., Kaneshiro, J., & Pritchard, I. (2017). The common rule, updated. New England Journal of Medicine, 376(7), 613–615.
  • National Archives. The Privacy Act of 1974. Retrieved from https://www.archives.gov/about/laws/privacy-act-1974.html
  • National Institute of Standards and Technology. (2004). Standards for security categorization of federal information and information systems. Retrieved from https://csrc.nist.gov/csrc/media/publications/fips/199/final/documents/fips-pub-199-final.pdf
  • National Institute of Standards and Technology. (2006). Minimum security requirements for federal information and information systems. Retrieved from https://csrc.nist.gov/csrc/media/publications/fips/200/final/documents/fips-pub-200-final.pdf
  • O‘Connor, M. K., Netting, F. E., & Thomas, M. L. (2008). Grounded theory: Managing the challenge for those facing institutional review board oversight. Qualitative Inquiry, 14(1), 28–45.
  • O‘Keefe, C. M., & Rubin, D. B. (2015). Individual privacy versus public good: Protecting confidentiality in health research. Statistics in Medicine, 34(23), 3081–3103.
  • Radack, S. (2004). Federal Information Processing Standard (FIPS) 199, standards for security. National Institute of Standards and Technology, Gaithersburg, MD, USA.
  • Shaffer, G. (2000). Globalization and social protection: The impact of EU and international rules in the ratcheting up of US privacy standards. Yale Journal of International Law, 25, 1.
  • Tisnado, D. M., Adams, J. L., Liu, H., Damberg, C. L., Chen, W. P., Hu, F. A., … Kahn, K. L. (2006). What is the concordance between the medical record and patient self-report as data sources for ambulatory care? Medical Care, 44, 132–140.
  • Todorov, D. (2007). Mechanics of user identification and authentication: Fundamentals of identity management. Auerbach Publications/CRC Press, Boca Raton, FL, USA.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.