Gritzalis et al., 2001 - Google Patents
Developing a European Computer Security Incident Reporting Service for Health CareGritzalis et al., 2001
- Document ID
- 12630836405186811952
- Author
- Gritzalis D
- Mavroudakis K
- Katsikas S
- Publication year
- Publication venue
- Implementing Secure Healthcare Telematics Applications in Europe
External Links
- 230000036541 health 0 title abstract description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
- G06F19/322—Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/34—Computer-assisted medical diagnosis or treatment, e.g. computerised prescription or delivery of medication or diets, computerised local control of medical devices, medical expert systems or telemedicine
- G06F19/345—Medical expert systems, neural networks or other automated diagnosis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
- G06F19/324—Management of patient independent data, e.g. medical references in digital format
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/34—Computer-assisted medical diagnosis or treatment, e.g. computerised prescription or delivery of medication or diets, computerised local control of medical devices, medical expert systems or telemedicine
- G06F19/3487—Medical report generation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/22—Health care, e.g. hospitals; Social work
- G06Q50/24—Patient record management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Swanson et al. | Generally accepted principles and practices for securing information technology systems | |
Herrmann | Complete guide to security and privacy metrics: measuring regulatory compliance, operational resilience, and ROI | |
CISSP et al. | Official (ISC) 2 guide to the CISSP exam | |
Krutz et al. | The CISSP Prep Guide: Mastering the ten domains of computer security | |
Krutz et al. | The CISSP Prep Guide: Gold Edition | |
WO2010091372A2 (en) | Method and system for providing response services | |
Holbrook et al. | Site security handbook | |
CISM et al. | Business continuity and disaster recovery for infosec managers | |
Maiwald et al. | Security planning & disaster recovery | |
Wack | Establishing a computer security incident response capability (CSIRC) | |
Ngoepe et al. | Security, privacy and ethics in electronic records management in the South African public sector | |
Allinson | Information systems audit trails in legal proceedings as evidence | |
Gritzalis et al. | Developing a European Computer Security Incident Reporting Service for Health Care | |
Czuprynski | Data Security for Schools: A Legal and Policy Guide for School Boards. | |
Davis | Healthcare entities and data breach threat indicators and deterrence: a quantitative study | |
Feldman et al. | CISSPĀ® Study Guide | |
Braithwaite | Securing e-business systems: A guide for managers and executives | |
Pfleeger et al. | Harmonizing privacy with security principles and practices | |
Ma | A study on information security objectives and practices | |
Holbrook et al. | RFC1244: Site Security Handbook | |
Krutz et al. | The CISSP prep guide: mastering the CISSP and ISSEP exams | |
Casas | An information security risk assessment model for public and university administrators | |
Curry et al. | Site Security Handbook | |
Chan | A comparative study of reported and unreported computer crimes | |
Martin | Key determinants of information availability: a multiple case study |