{"title":"在计算机病历中实施知情权安全","authors":"K. Bobis","doi":"10.1109/PCCC.1994.504107","DOIUrl":null,"url":null,"abstract":"Alrstmct The advent of tke Computer-based Patient Reeord (CPR) has initiated much discussion concerning tlre problems involved with meving the CPR from concept to reality. The issues raised include the content of the CPR, its cost, eEects on system performance, and its legal aspects. Conspicuously absent in most of these discussions is the need for a clearly defined security structure which would control the daily use of the CPR by healthcare professionals.","PeriodicalId":203232,"journal":{"name":"Proceeding of 13th IEEE Annual International Phoenix Conference on Computers and Communications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1994-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Implementing right to know security in the computer based patient record\",\"authors\":\"K. Bobis\",\"doi\":\"10.1109/PCCC.1994.504107\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Alrstmct The advent of tke Computer-based Patient Reeord (CPR) has initiated much discussion concerning tlre problems involved with meving the CPR from concept to reality. The issues raised include the content of the CPR, its cost, eEects on system performance, and its legal aspects. Conspicuously absent in most of these discussions is the need for a clearly defined security structure which would control the daily use of the CPR by healthcare professionals.\",\"PeriodicalId\":203232,\"journal\":{\"name\":\"Proceeding of 13th IEEE Annual International Phoenix Conference on Computers and Communications\",\"volume\":\"42 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1994-04-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceeding of 13th IEEE Annual International Phoenix Conference on Computers and Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PCCC.1994.504107\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceeding of 13th IEEE Annual International Phoenix Conference on Computers and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PCCC.1994.504107","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Implementing right to know security in the computer based patient record
Alrstmct The advent of tke Computer-based Patient Reeord (CPR) has initiated much discussion concerning tlre problems involved with meving the CPR from concept to reality. The issues raised include the content of the CPR, its cost, eEects on system performance, and its legal aspects. Conspicuously absent in most of these discussions is the need for a clearly defined security structure which would control the daily use of the CPR by healthcare professionals.