Outsourcing Medical Data Analyses: Can Technology Overcome Legal, Privacy, and Confidentiality Issues?

Journal of Medical Internet Research - Tập 15 Số 12 - Trang e283
Boštjan Brumen1, Marjan Heričko, Andrej Sevčnikar, Jernej Završnik, Marko Hölbl
1Institute of Informatics, Faculty of Electrical Engineering and Computer Science, University of Maribor, Maribor, Slovenia

Tóm tắt

Từ khóa


Tài liệu tham khảo

Coldman, B, 2012, Stanford Medicine Magazine, 29, 20

HirschlerBReuters US Edition201012012012-11-12Roche fears drug industry drowning in "spam" datahttp://www.reuters.com/article/2010/12/01/roche-data-idUSLDE6B01XF201012016C7aBng8x

MooreRLD’AoustJMcDonaldRHDisktape storage cost modelsProceedings of the IS&T Archiving2007IS&T ArchivingMay 21-25, 2007Arlington, VA2932

10.1016/j.ijinfomgt.2013.01.001

Post, SG, 2004, Encyclopedia of Bioethics

GlobalWebIndex Reports20132013-11-25Stream Social Global Report, Q1 2013http://blog.globalwebindex.net/Stream-Social6LOPTTrf8

RooneyBThe Wall Street Journal201304192013-05-23Facebook Understands Europe's Privacy Fears Says Sandberghttp://blogs.wsj.com/tech-europe/2013/04/19/facebook-understands-europes-privacy-fears-says-sandberg/tab/print/6GpDRK6Fu

SegallLCNN Money20112013-05-23Facebook was "the first innovator in privacy" COO sayshttp://money.cnn.com/2011/12/01/technology/facebook_privacy/index.htm6GpDuQ7Tn

CavoukianAPrivacy by Design: Take the Challenge200903302013-12-09Toronto, ONOffice of the Privacy Commissioner (Ontario)http://www.ipc.on.ca/images/Resources/PrivacybyDesignBook.pdf6LkJCqPfQ

CavoukianAChanliauMPrivacy and Security by Design: A Convergence of Paradigms201302282013-12-09Ontario, CanadaOffice of the Privacy Commissioner (Ontario)http://www.ipc.on.ca/images/resources/pbd-convergenceofparadigms.pdf6LkJHxlbH

Cavoukian, A, 1997, Who Knows: Safeguarding Your Privacy in a Networked World

Allen, AL, 2007, Privacy Law and Society

AllenALThe Stanford Encyclopedia of Philosophy (Spring 2011 Edition)20112012-05-23Privacy and Medicinehttp://plato.stanford.edu/entries/privacy/67s9rEhDU

Privacy Rights Clearinghouse20122012-09-14Chronology of Data Breaches: Security Breaches 2005-Presenthttp://www.privacyrights.org/sites/privacyrights.org/files/static/Chronology-of-Data-Breaches_-_Privacy-Rights-Clearinghouse.csv6AfYySWJK

10.1109/cbms.2008.101

10.2196/jmir.1972

10.1016/j.ijmedinf.2008.06.013

Solove, DJ, 2006, The University of Pennsylvania Law Review, 154, 477, 10.2307/40041279

Barnes, J, 1995, The Complete Works of Aristotle: The Revised Oxford Translation

Roy, J, 1999, Greece & Rome, 46, 1, 10.1017/S0017383500026036

ShieldsJMA Sacrifice to Athena: Oikos and Polis in Sophoclean Drama19912012-09-26http://www.facstaff.bucknell.edu/jms089/Z-Unpublished%20Work/Athena.pdf6Axq3vRN7

Warren, SD, 1890, Harvard Law Review, 4, 193, 10.2307/1321160

DeCewJWThe Stanford Encyclopedia of Philosophy20082012-05-23Stanford, CAStanford UniversityPrivacyhttp://plato.stanford.edu/entries/privacy/67s9rEhDU

Prosser, WL, 1960, California Law Review, 48, 383, 10.2307/3478805

Nagel, T, 2002, Concealment and Exposure: And Other Essays, 10.1093/oso/9780195152937.001.0001

Moore, AD, 2003, American Philosophical Quarterly, 40, 215

Gavison, R, 1980, Yale Law Journal, 89, 421, 10.2307/795891

Allen, AL, 1988, Uneasy Access: Privacy for Women in a Free Society

Bok, S, 1983, Secrets: On the Ethics of Concealment and Revelation

10.1017/S026505250000217X

Allen, AL, 1997, Genetic Secrets: Protecting Privacy and Confidentiality in the Genetic Era

Kenny, DJ, 1982, J Med Ethics, 8, 9, 10.1136/jme.8.1.9

Sharpe, VA, 2005, Hastings Cent Rep, 35, 49, 10.2307/3528564

1994, High-tech privacy issues in health care: hearings before the Subcommittee on Technology and the Law of the Committee on the Judiciary, United States Senate, One Hundred Third Congress, first and second sessions... October 27, 1993, and January 27, 1994, 141

Public Law 104–191: Health Insurance Portability Accountability Act19962013-11-02Washington, DCUS Governmenthttp://www.gpo.gov/fdsys/pkg/PLAW-104publ191/pdf/PLAW-104publ191.pdf6KpyJGjxy

Department of Health and Human ServicesFederal Register200208142013-12-10Washington, DCOffice of the SecretaryStandards for Privacy of Individually Identifiable Health Information; 45 CFR Parts 160 and 164http://www.hhs.gov/ocr/privacy/hipaa/administrative/privacyrule/privrulepd.pdf6LlJFBtXT

Department of Health and Human ServicesFederal Register200302202013-12-10Washington, DCOffice of the SecretaryHealth Insurance Reform: Security Standards; 45 CFR Parts 160, 162 and 164http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/securityrulepdf.pdf6LlJKlyWD

US Department of Health and Human Services20122012-09-17Summary of the HIPAA Security Rulehttp://www.hhs.gov/ocr/privacy/hipaa/understanding/srsummary.html6AjvRCCgf

Department of Health and Human ServicesFederal Register200908242013-12-10Washington, DCOffice of the SecretaryHITECH Breach Notification Interim Final Rulehttp://www.gpo.gov/fdsys/pkg/FR-2009-08-24/pdf/E9-20169.pdf6LlJRW0AM

US Department of Health and Human Services20122012-05-22Health Information Privacy: HITECH Breach Notification Interim Final Rulehttp://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/breachnotificationifr.html67qTJ4Opw

EUR-Lex199511232013-12-10Directive 95/46/EC of the European Parliamentof the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal dataon the free movement of such datahttp://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:EN:NOT6LlJgqfcX

EUR-Lex200101122013-12-10Regulation (EC) No 45/2001 of the European Parliament and of the Council of 18 December 2000 on the protection of individuals with regard to the processing of personal data by the Community institutions and bodies and on the free movement of such datahttp://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32001R0045:en:HTML6LlJq5EJR

EUR-Lex20122013-05-21Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the protection of individuals with regard to the processing of personal data by competent authorities for the purposes of prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, the free movement of such datahttp://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:52012PC0010:en:NOT6GmQI0E0p

SenguptaSThe New York Times20120124Europe weighs tough law on online privacyhttp://www.nytimes.com/2012/01/24/technology/europe-weighs-a-tough-law-on-online-privacy-and-user-data.html?pagewanted=all&_r=06LlK0Qjdi

SenguptaSThe New York Times201201242013-05-21Facebook's Sandberg gently warns Europe about privacy ruleshttp://bits.blogs.nytimes.com/2012/01/24/facebooks-sandberg-gently-warns-europe-about-privacy-rules/6GmRYxbkO

legislation.gov.uk19982013-11-01Data Protection Act 1998http://www.legislation.gov.uk/ukpga/1998/29/contents6KoWdlyKS

Bundesministerium der Justiz20032013-12-10Federal Data Protection Act in the version promulgated on 14 January 2003 (Federal Law Gazette I p. 66), as most recently amended by Article 1 of the Act of 14 August 2009 (Federal Law Gazette I p. 2814)http://www.gesetze-im-internet.de/englisch_bdsg/englisch_bdsg.html6LlKPmn4q

NHS Information Governance200801312012-10-08Guidelines on use of encryption to protect person identifiable and sensitive information http://www.connectingforhealth.nhs.uk/systemsandservices/infogov/security/encryptionguide.pdf6BG63xlpv

British Medical AssociationNHS Connecting for HealthJoint guidance on protecting electronic patient information20082012-10-08http://www.connectingforhealth.nhs.uk/systemsandservices/infogov/links/jointguidance.pdf/at_download/file6BG6cI6pJ

CliftonCMarksDSecurity and privacy implications of data miningProceedings of the ACM SIGMOD Workshop1996ACM SIGMOD Workshop on Data Mining and Knowledge DiscoveryJune 1996Montreal, QCNew York, NYACM1519

10.1145/76894.76895

2006, Diabetes Care, 29 Suppl 1, S43

10.1145/335191.335438

10.1145/375551.375602

10.2196/jmir.1335

10.1109/infcom.2010.5461951

10.1145/359168.359172

BarkerWCBarkerESP 800-67: Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher20122013-12-10Gaithersburg, MDNational Institute of Standards and Technologyhttp://csrc.nist.gov/publications/nistpubs/800-67-Rev1/SP-800-67-Rev1.pdf6LlLHuSsN

Federal Information Processing Standards Publication 197: Advanced Encryption Standard (AES)20012013-12-10Springfield, VANational Technical Information Servicehttp://csrc.nist.gov/publications/fips/fips197/fips-197.pdf6LlLWEbeb

National Institute of Standards and TechnologySKIPJACK and KEA Algorithm Specifications19982013-12-10http://csrc.nist.gov/groups/STM/cavp/documents/skipjack/skipjack.pdf6LlNFPSrS

Stallings, W, 2006, Cryptography and Network Security: Principles and Practice

Witten, IH, 2005, Data Mining: Practical Machine Learning Tools and Techniques

AsuncionANewmanDUCI Machine Learning Repository20102012-11-09Irvine, CAUniversity of California at Irvinehttp://archive.ics.uci.edu/ml/datasets.html6C2hgsRrX

AsuncionANewmanDUCI Machine Learning Repository - selected datasets2010Irvine, CAUniversity of California at Irvinehttp://archive.ics.uci.edu/ml/datasets.html?format=mat&task=cla&att=&area=life&numAtt=&numIns=&type=mvar&sort=nameUp&view=table6C2hPCTiA

The Software Environment for the Advancement of Scholarly ResearchUCI ARFF Dataset Repository20122012-11-12Champaign, ILGraduate School of Library and Information Science, University of Illinois at Urbana-Champaign, SEASRhttp://repository.seasr.org/Datasets/UCI/arff/6C7YkJWal

Quinlan, RJ, 1993, C4. 5: Programs for Machine Learning

Cohen, PR, 1995, Empirical Methods for Artificial Intelligence

AsuncionANewmanDUCI Machine Learning Repository - Pima Indians Diabetes Data Set20102012-10-15Irvine, CAUniversity of California at Irvinehttp://archive.ics.uci.edu/ml/datasets/Pima%20Indians%20Diabetes6BQoPVyou

SmithJWEverhartJDicksonWUsing the ADAP learning algorithm to forecast the onset of diabetes mellitus198812th Annual Symposium on Computer Applications and Medical CareJune 1988Washington, DCPiscataway, NJIEEE Computer Society Press

Melton, J, 2002, SQL: 1999: Understanding Relational Language Components

10.1109/MC.2013.86

Pearson, S, 2013, Privacy and Security for Cloud Computing, 10.1007/978-1-4471-4189-1

Dzemyda, G, 2011, Informatica (Lithuan), 22, 1, 10.15388/Informatica.2011.310

Shotton, J, 2013, Decision Forests for Computer Vision and Medical Image Analysis (Advances in Computer Vision and Pattern Recognition), 313, 10.1007/978-1-4471-4929-3_21

Stahl, F, 2013, Scaling Up Data Mining Techniques to Large Datasets Using Parallel and Distributed Processing, 243

Pfleeger, CP, 2003, Security in Computing

ClarkDDWilsonDA comparison of commercial and military computer security policiesProceedings of the 1987 IEEE Symposium19871987 IEEE Symposium on Security and PrivacyApril 27-29, 1987Oakland, CAPiscataway, NJIEEE Computer Society

10.1109/SECPRI.1988.8106

10.1109/RISP.1990.63851

10.1145/1666420.1666444

CavoukianAPrivacy by Design20132013-05-247 Foundational Principleshttp://www.privacybydesign.ca/index.php/about-pbd/7-foundational-principles/6GqwiKldy

10.1136/jamia.2010.005637

CavoukianAPrivacy by Design20132013-05-23Big Data & Privacy Together - It Is Achievablehttp://www.privacybydesign.ca/index.php/big-data-privacy-together-is-achievable/6GpVPLaXK