Outsourcing Medical Data Analyses: Can Technology Overcome Legal, Privacy, and Confidentiality Issues?
Tóm tắt
Từ khóa
Tài liệu tham khảo
Coldman, B, 2012, Stanford Medicine Magazine, 29, 20
HirschlerBReuters US Edition201012012012-11-12Roche fears drug industry drowning in "spam" datahttp://www.reuters.com/article/2010/12/01/roche-data-idUSLDE6B01XF201012016C7aBng8x
MooreRLD’AoustJMcDonaldRHDisktape storage cost modelsProceedings of the IS&T Archiving2007IS&T ArchivingMay 21-25, 2007Arlington, VA2932
Post, SG, 2004, Encyclopedia of Bioethics
GlobalWebIndex Reports20132013-11-25Stream Social Global Report, Q1 2013http://blog.globalwebindex.net/Stream-Social6LOPTTrf8
RooneyBThe Wall Street Journal201304192013-05-23Facebook Understands Europe's Privacy Fears Says Sandberghttp://blogs.wsj.com/tech-europe/2013/04/19/facebook-understands-europes-privacy-fears-says-sandberg/tab/print/6GpDRK6Fu
SegallLCNN Money20112013-05-23Facebook was "the first innovator in privacy" COO sayshttp://money.cnn.com/2011/12/01/technology/facebook_privacy/index.htm6GpDuQ7Tn
CavoukianAPrivacy by Design: Take the Challenge200903302013-12-09Toronto, ONOffice of the Privacy Commissioner (Ontario)http://www.ipc.on.ca/images/Resources/PrivacybyDesignBook.pdf6LkJCqPfQ
CavoukianAChanliauMPrivacy and Security by Design: A Convergence of Paradigms201302282013-12-09Ontario, CanadaOffice of the Privacy Commissioner (Ontario)http://www.ipc.on.ca/images/resources/pbd-convergenceofparadigms.pdf6LkJHxlbH
Cavoukian, A, 1997, Who Knows: Safeguarding Your Privacy in a Networked World
Allen, AL, 2007, Privacy Law and Society
AllenALThe Stanford Encyclopedia of Philosophy (Spring 2011 Edition)20112012-05-23Privacy and Medicinehttp://plato.stanford.edu/entries/privacy/67s9rEhDU
Privacy Rights Clearinghouse20122012-09-14Chronology of Data Breaches: Security Breaches 2005-Presenthttp://www.privacyrights.org/sites/privacyrights.org/files/static/Chronology-of-Data-Breaches_-_Privacy-Rights-Clearinghouse.csv6AfYySWJK
Barnes, J, 1995, The Complete Works of Aristotle: The Revised Oxford Translation
ShieldsJMA Sacrifice to Athena: Oikos and Polis in Sophoclean Drama19912012-09-26http://www.facstaff.bucknell.edu/jms089/Z-Unpublished%20Work/Athena.pdf6Axq3vRN7
DeCewJWThe Stanford Encyclopedia of Philosophy20082012-05-23Stanford, CAStanford UniversityPrivacyhttp://plato.stanford.edu/entries/privacy/67s9rEhDU
Moore, AD, 2003, American Philosophical Quarterly, 40, 215
Allen, AL, 1988, Uneasy Access: Privacy for Women in a Free Society
Bok, S, 1983, Secrets: On the Ethics of Concealment and Revelation
Allen, AL, 1997, Genetic Secrets: Protecting Privacy and Confidentiality in the Genetic Era
1994, High-tech privacy issues in health care: hearings before the Subcommittee on Technology and the Law of the Committee on the Judiciary, United States Senate, One Hundred Third Congress, first and second sessions... October 27, 1993, and January 27, 1994, 141
Public Law 104–191: Health Insurance Portability Accountability Act19962013-11-02Washington, DCUS Governmenthttp://www.gpo.gov/fdsys/pkg/PLAW-104publ191/pdf/PLAW-104publ191.pdf6KpyJGjxy
Department of Health and Human ServicesFederal Register200208142013-12-10Washington, DCOffice of the SecretaryStandards for Privacy of Individually Identifiable Health Information; 45 CFR Parts 160 and 164http://www.hhs.gov/ocr/privacy/hipaa/administrative/privacyrule/privrulepd.pdf6LlJFBtXT
Department of Health and Human ServicesFederal Register200302202013-12-10Washington, DCOffice of the SecretaryHealth Insurance Reform: Security Standards; 45 CFR Parts 160, 162 and 164http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/securityrulepdf.pdf6LlJKlyWD
US Department of Health and Human Services20122012-09-17Summary of the HIPAA Security Rulehttp://www.hhs.gov/ocr/privacy/hipaa/understanding/srsummary.html6AjvRCCgf
Department of Health and Human ServicesFederal Register200908242013-12-10Washington, DCOffice of the SecretaryHITECH Breach Notification Interim Final Rulehttp://www.gpo.gov/fdsys/pkg/FR-2009-08-24/pdf/E9-20169.pdf6LlJRW0AM
US Department of Health and Human Services20122012-05-22Health Information Privacy: HITECH Breach Notification Interim Final Rulehttp://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/breachnotificationifr.html67qTJ4Opw
EUR-Lex199511232013-12-10Directive 95/46/EC of the European Parliamentof the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal dataon the free movement of such datahttp://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:EN:NOT6LlJgqfcX
EUR-Lex200101122013-12-10Regulation (EC) No 45/2001 of the European Parliament and of the Council of 18 December 2000 on the protection of individuals with regard to the processing of personal data by the Community institutions and bodies and on the free movement of such datahttp://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32001R0045:en:HTML6LlJq5EJR
EUR-Lex20122013-05-21Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the protection of individuals with regard to the processing of personal data by competent authorities for the purposes of prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, the free movement of such datahttp://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:52012PC0010:en:NOT6GmQI0E0p
SenguptaSThe New York Times20120124Europe weighs tough law on online privacyhttp://www.nytimes.com/2012/01/24/technology/europe-weighs-a-tough-law-on-online-privacy-and-user-data.html?pagewanted=all&_r=06LlK0Qjdi
SenguptaSThe New York Times201201242013-05-21Facebook's Sandberg gently warns Europe about privacy ruleshttp://bits.blogs.nytimes.com/2012/01/24/facebooks-sandberg-gently-warns-europe-about-privacy-rules/6GmRYxbkO
legislation.gov.uk19982013-11-01Data Protection Act 1998http://www.legislation.gov.uk/ukpga/1998/29/contents6KoWdlyKS
Bundesministerium der Justiz20032013-12-10Federal Data Protection Act in the version promulgated on 14 January 2003 (Federal Law Gazette I p. 66), as most recently amended by Article 1 of the Act of 14 August 2009 (Federal Law Gazette I p. 2814)http://www.gesetze-im-internet.de/englisch_bdsg/englisch_bdsg.html6LlKPmn4q
NHS Information Governance200801312012-10-08Guidelines on use of encryption to protect person identifiable and sensitive information http://www.connectingforhealth.nhs.uk/systemsandservices/infogov/security/encryptionguide.pdf6BG63xlpv
British Medical AssociationNHS Connecting for HealthJoint guidance on protecting electronic patient information20082012-10-08http://www.connectingforhealth.nhs.uk/systemsandservices/infogov/links/jointguidance.pdf/at_download/file6BG6cI6pJ
CliftonCMarksDSecurity and privacy implications of data miningProceedings of the ACM SIGMOD Workshop1996ACM SIGMOD Workshop on Data Mining and Knowledge DiscoveryJune 1996Montreal, QCNew York, NYACM1519
2006, Diabetes Care, 29 Suppl 1, S43
BarkerWCBarkerESP 800-67: Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher20122013-12-10Gaithersburg, MDNational Institute of Standards and Technologyhttp://csrc.nist.gov/publications/nistpubs/800-67-Rev1/SP-800-67-Rev1.pdf6LlLHuSsN
Federal Information Processing Standards Publication 197: Advanced Encryption Standard (AES)20012013-12-10Springfield, VANational Technical Information Servicehttp://csrc.nist.gov/publications/fips/fips197/fips-197.pdf6LlLWEbeb
National Institute of Standards and TechnologySKIPJACK and KEA Algorithm Specifications19982013-12-10http://csrc.nist.gov/groups/STM/cavp/documents/skipjack/skipjack.pdf6LlNFPSrS
Stallings, W, 2006, Cryptography and Network Security: Principles and Practice
Witten, IH, 2005, Data Mining: Practical Machine Learning Tools and Techniques
AsuncionANewmanDUCI Machine Learning Repository20102012-11-09Irvine, CAUniversity of California at Irvinehttp://archive.ics.uci.edu/ml/datasets.html6C2hgsRrX
AsuncionANewmanDUCI Machine Learning Repository - selected datasets2010Irvine, CAUniversity of California at Irvinehttp://archive.ics.uci.edu/ml/datasets.html?format=mat&task=cla&att=&area=life&numAtt=&numIns=&type=mvar&sort=nameUp&view=table6C2hPCTiA
The Software Environment for the Advancement of Scholarly ResearchUCI ARFF Dataset Repository20122012-11-12Champaign, ILGraduate School of Library and Information Science, University of Illinois at Urbana-Champaign, SEASRhttp://repository.seasr.org/Datasets/UCI/arff/6C7YkJWal
Quinlan, RJ, 1993, C4. 5: Programs for Machine Learning
Cohen, PR, 1995, Empirical Methods for Artificial Intelligence
AsuncionANewmanDUCI Machine Learning Repository - Pima Indians Diabetes Data Set20102012-10-15Irvine, CAUniversity of California at Irvinehttp://archive.ics.uci.edu/ml/datasets/Pima%20Indians%20Diabetes6BQoPVyou
SmithJWEverhartJDicksonWUsing the ADAP learning algorithm to forecast the onset of diabetes mellitus198812th Annual Symposium on Computer Applications and Medical CareJune 1988Washington, DCPiscataway, NJIEEE Computer Society Press
Melton, J, 2002, SQL: 1999: Understanding Relational Language Components
Shotton, J, 2013, Decision Forests for Computer Vision and Medical Image Analysis (Advances in Computer Vision and Pattern Recognition), 313, 10.1007/978-1-4471-4929-3_21
Stahl, F, 2013, Scaling Up Data Mining Techniques to Large Datasets Using Parallel and Distributed Processing, 243
Pfleeger, CP, 2003, Security in Computing
ClarkDDWilsonDA comparison of commercial and military computer security policiesProceedings of the 1987 IEEE Symposium19871987 IEEE Symposium on Security and PrivacyApril 27-29, 1987Oakland, CAPiscataway, NJIEEE Computer Society
CavoukianAPrivacy by Design20132013-05-247 Foundational Principleshttp://www.privacybydesign.ca/index.php/about-pbd/7-foundational-principles/6GqwiKldy
CavoukianAPrivacy by Design20132013-05-23Big Data & Privacy Together - It Is Achievablehttp://www.privacybydesign.ca/index.php/big-data-privacy-together-is-achievable/6GpVPLaXK