SAFER
Safety Assurance Factors
for EHR Resilience
References
1. Howard, J., Clark, E. C., Friedman, A., Crosson, J. C., Pellerano, M., Crabtree, B. F., ... & Cohen, D. J. (2013). Electronic health
record impact on work burden in small, unaffiliated, community-based primary care practices. Journal of General Internal
Medicine, 28(1), 107-113.
2. Sittig, D. F., Campbell, E. M., Guappone, K. P., Dykstra, R. H., & Ash, J. S. (2007). Recommendations for monitoring and evaluation
of in-patient computer-based provider order entry systems: results of a Delphi survey. American Medical Informatics Association Annual
Symposium Proceedings, 2007, 671–675.
3. Haskins, M. (2002). Legible charts! Experiences in converting to electronic medical records. Canadian Family Physician, 48, 768.
4. Fernández-Alemán, J. L., Señor, I. C., Lozoya, P. Á. O., & Toval, A. (2013). Security and privacy in electronic health records: a
systematic literature review. Journal of Biomedical Informatics, 46(3), 541-562.
5. Donaldson, S. E., Siegel, S. G., Williams, C. K., & Aslam, A. (2015). Enterprise Cybersecurity Capabilities. In Enterprise Cybersecurity
(pp. 311-334). Apress.
6. O'Connor, K. J. (2005). Everything you always wanted to know about software escrow agreements--and then some! Journal of
Healthcare Information Management, 19(1), 10.
7. Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583-592.
8. Tipton, S. J., Forkey, S., & Choi, Y. B. (2016). Toward proper authentication methods in electronic medical record access compliant to
HIPAA and CIA triangle. Journal of Medical Systems, 40(4), 1-8.
9. Sasse, M. A. (2013, August). “Technology Should Be Smarter Than This!”: A Vision for Overcoming the Great Authentication Fatigue.
Workshop on Secure Data Management (pp. 33-36). Springer International Publishing.
10. Clayton, P. D., Boebert, W. E., Defriese, G. H., Dowell, S. P., Fennell, M. L., Frawley, K. A., ... & Rindfleisch, T. C. (1997). For the
record: protecting electronic health information. National Research Council. (Washington, DC: National Academy Press, 1997).
11. Cresswell, K. M., Mozaffar, H., Lee, L., Williams, R., & Sheikh, A. (2016). Safety risks associated with the lack of integration and
interfacing of hospital health information technologies: a qualitative study of hospital electronic prescribing systems in England. BMJ
Quality & Safety.
12. Berger, R. G., & Baba, J. (2009). The realities of implementation of Clinical Context Object Workgroup (CCOW) standards for
integration of vendor disparate clinical software in a large medical center. International Journal of Medical Informatics, 78(6), 386-390.
13. Ancker, J. S., Singh, M. P., Thomas, R., Edwards, A., Snyder, A., Kashyap, A., & Kaushal, R. (2013). Predictors of success for
electronic health record implementation in small physician practices. Applied Clinical Informatics,4(1), 12-24.
14. Wright, A., Aaron, S., & Sittig, D. F. (2016). Testing electronic health records in the “production” environment: an essential step in the
journey to a safe and effective health care system. Journal of the American Medical Informatics Association.
15. Frankel, A., Grillo, S. P., Baker, E. G., Huber, C. N., Abookire, S., Grenham, M., ... & Gandhi, T. K. (2005). Patient safety leadership
WalkRounds™ at Partners HealthCare: learning from implementation. The Joint Commission Journal on Quality and Patient Safety,
31(8), 423-437.
16. Lowry, S. Z., Quinn, M. T., Ramaiah, M., Schumacher, R. M., Patterson, E. S., North, R., ... & Abbott, P. (2012). Technical
evaluation, testing, and validation of the usability of electronic health records. National Institute of Standards and Technology.
17. Li, A. C., Kannry, J. L., Kushniruk, A., Chrimes, D., McGinn, T. G., Edonyabo, D., & Mann, D. M. (2012). Integrating usability testing
and think-aloud protocol analysis with “near-live” clinical simulations in evaluating clinical decision support. International Journal of
Medical Informatics, 81(11), 761-772.
18. Murphy, A. R., Reddy, M. C., & Xu, H. (2014, February). Privacy practices in collaborative environments: a study of emergency
department staff. Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing (pp.
269-282). ACM.
19. Benusa, A., & Chen, J. (2015). HIPAA compliance challenges: a case study of a small healthcare provider. Proceedings of the 5th
International Conference on IS Management and Evaluation 2015: ICIME 2015 (p. 161). Academic Conferences Limited.
20. Nelson, R., & Staggers, N. (2014). Health informatics: an interprofessional approach. Elsevier Health Sciences.
21. Pageler, N. M., G’Sell, M. J. G., Chandler, W., Mailes, E., Yang, C., & Longhurst, C. A. (2016). A rational approach to legacy data
validation when transitioning between electronic health record systems. Journal of the American Medical Informatics Association.
SAFER Self-Assessment | System Configuration