SAFER Self-Assessment | System Interfaces
SAFER
Safety Assurance Factors
for EHR Resilience
References
20. Aarts, J. (2012). Towards safe electronic health records: A socio-technical perspective and the need for incident
reporting. Health Policy and Technology, 1(1), 8-15.
21. Jensen, S., Kushniruk, A. W., & Nøhr, C. (2015). Clinical simulation: A method for development and evaluation of clinical
information systems. Journal of Biomedical Informatics, 54, 65-76.
22. Mostefaoui, G. K., Wilson, G., Ma, X., Simpson, A., Power, D., Russell, D., & Slaymaker, M. (2009). The Development,
Testing, and Deployment of a Web Services Infrastructure for Distributed Healthcare Delivery, Research, and Training.
23. Abel, D., Gavidi, B., Rollings, N., & Chandra, R. (2015). Development of an Android Application for an Electronic Medical
Record System in an Outpatient Environment for Healthcare in Fiji. arXiv preprint arXiv:1503.00810.
24. Wright, A., Aaron, S., & Sittig, D. F. (2016). Testing electronic health records in the “production” environment: an
essential step in the journey to a safe and effective health care system. Journal of the American Medical Informatics
Association, ocw039.
25. Nanda, A., Mani, S., Sinha, S., Harrold, M. J., & Orso, A. (2011, March). Regression testing in the presence of non-code
changes. In 2011 Fourth IEEE International Conference on Software Testing, Verification and Validation (pp. 21-30). IEEE.
26. Carlson, S. D. (2015). Testing in the healthcare informatics environment. Mastering Informatics: A Heatlhcare Handbook
for Success, 61.
27. Smokers prescribed Viagra to quit. (2006, December 13). BBC.
28. Cucoranu, I. C., Parwani, A. V., West, A. J., Romero-Lauro, G., Nauman, K., Carter, A. B., ... & Pantanowitz, L. (2013).
Privacy and security of patient data in the pathology laboratory. Journal of Pathology Informatics, 4.
29. Payne, T., Lovis, C., & Debande, B. (2014). Troubleshooting: what can go wrong and how to fix it. Practical Guide to
Clinical Computing Systems: Design, Operations, and Infrastructure, 242.
30. Mykkänen, J., Porrasmaa, J., Rannanheimo, J., & Korpela, M. (2003). A process for specifying integration for multi-tier
applications in healthcare. International Journal of Medical Informatics, 70(2), 173-182.
31. Wu, Y., Yao, X., Sun, P., Hu, Y., Zhu, Y., & Hu, Y. (2013). Development of community health service-oriented computer-
assisted information system for diagnosis and treatment of respiratory diseases. Family Medicine and Community Health,
1(4), 1-9.
32. Wright, A., Hickman, T. T. T., McEvoy, D., Aaron, S., Ai, A., Andersen, J. M., ... & Bates, D. W. (2016). Analysis of
clinical decision support system malfunctions: a case series and survey. Journal of the American Medical Informatics
Association, ocw005.
33. Byrne, C. M., Mercincavage, L. M., Bouhaddou, O., Bennett, J. R., Pan, E. C., Botts, N. E., ... & Cromwell, T. (2014). The
Department of Veterans Affairs’ (VA) implementation of the Virtual Lifetime Electronic Record (VLER): findings and lessons
learned from Health Information Exchange at 12 sites. International Journal of Medical Informatics, 83(8), 537-547.
34. Baird, G. (2013). Preanalytical considerations in blood gas analysis. Biochemia Medica, 23(1), 19-27.
35. Rinard, M., Cadar, C., Dumitran, D., Roy, D. M., & Leu, T. (2004, December). A dynamic technique for eliminating buffer
overflow vulnerabilities (and other memory errors). In Computer Security Applications Conference, 2004. 20th Annual (pp.
82-90). IEEE.
36. Papp, D., Ma, Z., & Buttyan, L. (2015, July). Embedded systems security: Threats, vulnerabilities, and attack taxonomy.
In Privacy, Security and Trust (PST), 2015 13th Annual Conference on (pp. 145-152). IEEE.