Journal Navigation
Privacy in Health Informatics
Volume 3
Guest Editorial Preface
For Volume 3, Issue 2
View Full Issue
Published: Apr 1, 2012
DOI: 10.4018/jcmam.2012040101
Volume 3
Ruoyu Wu, Gail-Joon Ahn, Hongxin Hu
In modern healthcare environments, there is a strong need to create an infrastructure that reduces time-consuming efforts and costly operations to obtain a patient’s complete medical record and... Show More
Download Sample (PDF): Article
Cite Article

MLA

Wu, Ruoyu, et al. "Towards HIPAA-Compliant Healthcare Systems in Cloud Computing." IJCMAM vol.3, no.2 2012: pp.1-22. http://doi.org/10.4018/jcmam.2012040101

APA

Wu, R., Ahn, G., & Hu, H. (2012). Towards HIPAA-Compliant Healthcare Systems in Cloud Computing. International Journal of Computational Models and Algorithms in Medicine (IJCMAM), 3(2), 1-22. http://doi.org/10.4018/jcmam.2012040101

Chicago

Wu, Ruoyu, Gail-Joon Ahn, and Hongxin Hu. "Towards HIPAA-Compliant Healthcare Systems in Cloud Computing," International Journal of Computational Models and Algorithms in Medicine (IJCMAM) 3, no.2: 1-22. http://doi.org/10.4018/jcmam.2012040101

Export Reference

Mendeley
Published: Apr 1, 2012
DOI: 10.4018/jcmam.2012040102
Volume 3
Jason King, Ben Smith, Laurie Williams
Inadequate audit mechanisms may result in undetected misuse of data in software-intensive systems. In the healthcare domain, electronic health record (EHR) systems should log the creating, reading... Show More
Download Sample (PDF): Article
Cite Article

MLA

King, Jason, et al. "Audit Mechanisms in Electronic Health Record Systems: Protected Health Information May Remain Vulnerable to Undetected Misuse." IJCMAM vol.3, no.2 2012: pp.23-42. http://doi.org/10.4018/jcmam.2012040102

APA

King, J., Smith, B., & Williams, L. (2012). Audit Mechanisms in Electronic Health Record Systems: Protected Health Information May Remain Vulnerable to Undetected Misuse. International Journal of Computational Models and Algorithms in Medicine (IJCMAM), 3(2), 23-42. http://doi.org/10.4018/jcmam.2012040102

Chicago

King, Jason, Ben Smith, and Laurie Williams. "Audit Mechanisms in Electronic Health Record Systems: Protected Health Information May Remain Vulnerable to Undetected Misuse," International Journal of Computational Models and Algorithms in Medicine (IJCMAM) 3, no.2: 23-42. http://doi.org/10.4018/jcmam.2012040102

Export Reference

Mendeley
Published: Apr 1, 2012
DOI: 10.4018/jcmam.2012040103
Volume 3
Thomas Trojer, Basel Katt, Ruth Breu, Thomas Schabetsberger, Richard Mair
A central building block of data privacy is the individual right of information self-determination. Following from that when dealing with shared electronic health records (SEHR), citizens, as the... Show More
Download Sample (PDF): Article
Cite Article

MLA

Trojer, Thomas, et al. "Managing Privacy and Effectiveness of Patient-Administered Authorization Policies." IJCMAM vol.3, no.2 2012: pp.43-62. http://doi.org/10.4018/jcmam.2012040103

APA

Trojer, T., Katt, B., Breu, R., Schabetsberger, T., & Mair, R. (2012). Managing Privacy and Effectiveness of Patient-Administered Authorization Policies. International Journal of Computational Models and Algorithms in Medicine (IJCMAM), 3(2), 43-62. http://doi.org/10.4018/jcmam.2012040103

Chicago

Trojer, Thomas, et al. "Managing Privacy and Effectiveness of Patient-Administered Authorization Policies," International Journal of Computational Models and Algorithms in Medicine (IJCMAM) 3, no.2: 43-62. http://doi.org/10.4018/jcmam.2012040103

Export Reference

Mendeley
Published: Apr 1, 2012
DOI: 10.4018/jcmam.2012040104
Volume 3
Matt Matlock, Nakeisha Schimke, Liang Kong, Stephen Macke, John Hale
In neuroscience, collaboration and data sharing are undermined by concerns over the management of protected health information (PHI) and personal identifying information (PII) in neuroimage... Show More
Download Sample (PDF): Article
Cite Article

MLA

Matlock, Matt, et al. "Systematic Redaction for Neuroimage Data." IJCMAM vol.3, no.2 2012: pp.63-75. http://doi.org/10.4018/jcmam.2012040104

APA

Matlock, M., Schimke, N., Kong, L., Macke, S., & Hale, J. (2012). Systematic Redaction for Neuroimage Data. International Journal of Computational Models and Algorithms in Medicine (IJCMAM), 3(2), 63-75. http://doi.org/10.4018/jcmam.2012040104

Chicago

Matlock, Matt, et al. "Systematic Redaction for Neuroimage Data," International Journal of Computational Models and Algorithms in Medicine (IJCMAM) 3, no.2: 63-75. http://doi.org/10.4018/jcmam.2012040104

Export Reference

Mendeley
IGI Global Open Access Collection

IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface that can easily searched or integrated into library discovery systems. Browse IGI Global Open
Access Collection

Contact
Author Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.com

Open Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.com

Production-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.com

Rights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.com

Publication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.com

Discoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com

Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100