Sciweavers

39 search results - page 6 / 8
» SHAMAN Research and Implementation of an Electronic Medical ...
Sort
View
JITECH
2007
136views more  JITECH 2007»
13 years 6 months ago
A computer scientist's reactions to NPfIT
This paper contains a set of personal views relating to NHS Connecting for Health’s National Programme for IT (NPfIT), and in particular its Care Records Service, written from t...
Brian Randell
HICSS
2010
IEEE
174views Biometrics» more  HICSS 2010»
13 years 11 months ago
Developing an EMR Simulator to Assess Users' Perception of Document Quality
Simulators are used in research and training because they provide a realistic and safe environment for participants. In the course of conducting a comprehensive study of patient c...
Efthimis N. Efthimiadis, Kenric W. Hammond, Ryan L...
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
13 years 10 months ago
Specifying and Analyzing Workflows for Automated Identification and Data Capture
Humans use computers to carry out tasks that neither is able to do easily alone: humans provide eyes, hands, and judgment while computers provide computation, networking, and stor...
Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, An...
ICDE
2007
IEEE
223views Database» more  ICDE 2007»
14 years 11 days ago
Privacy Access Control Model with Location Constraints for XML Services
Information privacy is usually concerned with the confidentiality of personal identifiable information (PII), such as electronic medical records. Nowadays XML services are used to...
Yi Zheng, Yongming Chen, Patrick C. K. Hung
VLDB
2004
ACM
105views Database» more  VLDB 2004»
13 years 11 months ago
Tamper Detection in Audit Logs
Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, fina...
Richard T. Snodgrass, Shilong (Stanley) Yao, Chris...