» Authors » Carl A Gunter

Carl A Gunter

Explore the profile of Carl A Gunter including associated specialties, affiliations and a list of published articles. Areas
Snapshot
Articles 11
Citations 225
Followers 0
Related Specialty
Top 10 Co-Authors
Published In
Affiliations
Soon will be listed here.
Recent Articles
1.
Sherkow J, Ram N, Gunter C
South Calif Law Rev . 2023 Nov; 96(PS1):1-14. PMID: 37928339
In recent years, police have increasingly made use of consumer genomic databases to solve a variety of crimes, from long-cold serial killings to assaults. They do so frequently without judicial...
2.
Zhang A, Lu X, Gunter C, Yao S, Tao F, Zhu R, et al.
Learn Health Syst . 2019 Jun; 2(3):e10057. PMID: 31245585
A medical specialty indicates the skills needed by health care providers to conduct key procedures or make critical judgments. However, documentation about specialties may be lacking or inaccurately specified in...
3.
Wang W, Chen G, Pan X, Zhang Y, Wang X, Bindschaedler V, et al.
Conf Comput Commun Secur . 2019 Mar; 2017:2421-2434. PMID: 30853868
Side-channel risks of Intel's SGX have recently attracted great attention. Under the spotlight is the newly discovered page-fault attack, in which an OS-level adversary induces page faults to observe the...
4.
Kotz D, Gunter C, Kumar S, Weiner J
Computer (Long Beach Calif) . 2017 Mar; 49(6):22-30. PMID: 28344359
Mobile health technology has great potential to increase healthcare quality, expand access to services, reduce costs, and improve personal wellness and public health. However, mHealth also raises significant privacy and...
5.
Chen Y, Xie W, Gunter C, Liebovitz D, Mehrotra S, Zhang H, et al.
AMIA Annu Symp Proc . 2016 Mar; 2015:416-25. PMID: 26958173
Complexity in clinical workflows can lead to inefficiency in making diagnoses, ineffectiveness of treatment plans and uninformed management of healthcare organizations (HCOs). Traditional strategies to manage workflow complexity are based...
6.
Naveed M, Ayday E, Clayton E, Fellay J, Gunter C, Hubaux J, et al.
ACM Comput Surv . 2015 Dec; 48(1). PMID: 26640318
Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to...
7.
He D, Naveed M, Gunter C, Nahrstedt K
AMIA Annu Symp Proc . 2015 May; 2014:645-54. PMID: 25954370
Mobile Health (mHealth) applications lie outside of regulatory protection such as HIPAA, which requires a baseline of privacy and security protections appropriate to sensitive medical data. However, mHealth apps, particularly...
8.
Chen Y, Ghosh J, Bejan C, Gunter C, Gupta S, Kho A, et al.
J Biomed Inform . 2015 Apr; 55:82-93. PMID: 25841328
Objective: Data in electronic health records (EHRs) is being increasingly leveraged for secondary uses, ranging from biomedical association studies to comparative effectiveness. To perform studies at scale and transfer knowledge...
9.
Anthony D, Campbell A, Candon T, Gettinger A, Kotz D, Marsch L, et al.
IEEE Secur Priv . 2014 Nov; 11(6):25-33. PMID: 25379030
Dartmouth College's Institute for Security, Technology, and Society conducted three workshops on securing information technology in healthcare, attended by a diverse range of experts in the field. This article summarizes...
10.
Zhang W, Gunter C, Liebovitz D, Tian J, Malin B
AMIA Annu Symp Proc . 2011 Dec; 2011:858-67. PMID: 22195144
Electronic Medical Records (EMRs) provide convenient access to patient data for parties who should have it, but, unless managed properly, may also provide it to those who should not. Distinguishing...