TITLE

ANONYMIZATION CLINICAL DATA: PRIVACY CASE STUDY

AUTHOR(S)
Rahim, Yahaya Abd.; thman, Mohd Azlishah; Pee, AhmadNaim Che; Iskandar Othman, Mohd Fairuz
PUB. DATE
July 2014
SOURCE
Journal of Engineering & Applied Sciences;Jul2014, Vol. 9 Issue 7, p988
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Privacy includes the right of individuals and organizations to determine for themselves when, how and to what extent information about them is communicated to others. The growing need of managing large amounts of data in hospital or clinical raises important legal and ethical challenges. This paper introduces and show the testing implementation of the privacy-protection problems, and highlights the relevance of trusted third parties and of privacy-enhancing techniques (PETs) in the context of data collection, e.g., for research. Practical approache on the pseudonymization model for batch data collection are presented. The actual application of the described techniques today proves the possible benefits for medicine that innovative privacy-enhancing techniques can provide. Technical PET solutions can unlock valuable data sources, otherwise not available.
ACCESSION #
97273143

 

Related Articles

  • THE INFLUENCE OF ENTROPY TO PRIVACY PROTECTION USING TWO TEMPLATES APPROACH. KUNJADIC, Goran; VEINOVIC, Mladen; MILOSAVLJEVIC, Milan M. // Metalurgia International;May2013, Vol. 18 Issue 5, p195 

    Privacy policy based on biometric data, in conjunction with cryptography is very important as it provides unique protection of biometric data. The usual solutions use only one biometric template, analyzing its entropy and defining the method for error correction, because biometric data are nosy...

  • DATA PRIVACY LAWS IN LATIN AMERICA: AN OVERVIEW. Tobón, Camila // International Law News;Spring2015, Vol. 44 Issue 2, p1 

    This article summarizes the current regulatory regime concerning data privacu laws in Latin America, explaining the practical overtones of varied requirements. A right to privacy that protects personal information is enshrined in the constitutions of all Latin American countries. Data...

  • Enabling the new economic actor: data protection, the digital economy, and the Databox. Crabtree, Andy; Lodge, Tom; Colley, James; Greenhalgh, Chris; Mortier, Richard; Haddadi, Hamed // Personal & Ubiquitous Computing;Nov2016, Vol. 20 Issue 6, p947 

    This paper offers a sociological perspective on data protection regulation and its relevance to design. From this perspective, proposed regulation in Europe and the USA seeks to create a new economic actor-the consumer as personal data trader-through new legal frameworks that shift the locus of...

  • A Privacy Protection Model of Data Publication Based on Game Theory. Kuang, Li; Zhu, Yujia; Li, Shuqi; Yan, Xuejin; Yan, Han; Deng, Shuiguang // Security & Communication Networks;10/14/2018, p1 

    With the rapid development of sensor acquisition technology, more and more data are collected, analyzed, and encapsulated into application services. However, most of applications are developed by untrusted third parties. Therefore, it has become an urgent problem to protect users’ privacy...

  • An Exploratory Analysis of Data Breaches From 2005-2011: Trends and Insights. Ayyagari, Ramakrishna // Journal of Information Privacy & Security;2012, Vol. 8 Issue 2, p33 

    Data breaches have become one of the biggest problems for organizations, costing an average of $7.2 million per breach (Symantec, 2011). Previous research on data breaches has focused on: (i) reducing the possibility of data breach by addressing employee compliance behavior, and (ii)...

  • Privacy or Security? Ashling, Jim // Information Today;Feb2004, Vol. 21 Issue 2, p23 

    The article discusses privacy and security issues in information services in Great Britain. Privacy, data protection, spam and security are all issues that are high on the British and international agendas, with the daily news challenging legislation as it hits the books. Two tragic events...

  • CISOs: From No Seat to Multiple Hats. SHERRY, DAVID J. // Information Security;Apr2013, Vol. 15 Issue 3, p8 

    The article discusses how security has evolved towards a broader focus in risk management with the mindset and role for security leaders and present chief information security officers (CISOs) becoming more risk-based in nature. Most CISO's responsibilities now include privacy and its related...

  • Internet Spy. Dancer, Helen // Bulletin with Newsweek;05/11/99, Vol. 117 Issue 6173, p84 

    Reports on the personal information gathered by people who use the Internet. How much of the information taken is done without the user's knowledge; How registration of computers is a conscious offering of personal information by the owner of the computer; Efforts by computer companies such as...

  • Controlling Inference: Avoiding P-level Reduction During Analysis. Williams, Adepele; Barker, Ken // Journal of Research & Practice in Information Technology;Aug2008, Vol. 40 Issue 3, p163 

    This paper presents a concept hierarchy-based approach to privacy preserving data collection for data mining called the P-level model. The P-level model allows data providers to divulge information at any chosen privacy level (P-level), for any attribute. Data collected at a high P-level...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics