A Study on Data Protection and Privacy Issues in Healthcare Data

2021 ◽  
pp. 289-297
Author(s):  
Nidhi Gupta ◽  
Ambar Dutta
2020 ◽  
pp. 1989-2001
Author(s):  
Wafaa Faisal Mukhtar ◽  
Eltayeb Salih Abuelyaman

Healthcare big data streams from multiple information sources at an alarming volume, velocity, and variety. The challenge that faces the healthcare industry is extracting meaningful value from such sources. This chapter investigates the diversity and forms of data in the healthcare sector, reviews the methods used to search and analyze these data throughout the past years, and the use of machine learning and data mining techniques to mine useful knowledge from such data. The chapter will also highlight innovations of particular systems and tools which spot the fine approaches for different healthcare data, raise the standard of care and recap the tools and data collection methods. The authors emphasize some of ethical issues regarding processing these records and some data privacy issues.


Author(s):  
Amavey Tamunobarafiri ◽  
Shaun Aghili ◽  
Sergey Butakov

Cloud computing has been massively adopted in healthcare, where it attracts economic, operational, and functional advantages beneficial to insurance providers. However, according to Identity Theft Resource Centre, over twenty-five percent of data breaches in the US targeted healthcare. The HIPAA Journal reported an increase in healthcare data breaches in the US in 2016, exposing over 16 million health records. The growing incidents of cyberattacks in healthcare are compelling insurance providers to implement mitigating controls. Addressing data security and privacy issues before cloud adoption protects from monetary and reputation losses. This article provides an assessment tool for health insurance providers when adopting cloud vendor solutions. The final deliverable is a proposed framework derived from prominent cloud computing and governance sources, such as the Cloud Security Alliance, Cloud Control Matrix (CSA, CCM) v 3.0.1 and COBIT 5 Cloud Assurance.


2007 ◽  
Vol 14 (2) ◽  
pp. 189-195 ◽  
Author(s):  
Renate Gertz

AbstractOn the 1st of December 2006, the Court of Session in Edinburgh issued the first decision on Freedom of Information and health data regarding a request for information on incidences of childhood leukemia, in the range of 0 - 14 years, by year and census ward from 1990 to 2003 for the Dumfries and Galloway postal areas. The case, which provides an example for the collision course between the Freedom of Information and Data Protection regime, had been anticipated as a landmark decision, however, due to several problems and inconsistencies it sadly failed to meet those expectations.


Electronics ◽  
2021 ◽  
Vol 10 (16) ◽  
pp. 2034
Author(s):  
Aitizaz Ali ◽  
Hasliza A. Rahim ◽  
Muhammad Fermi Pasha ◽  
Rafael Dowsley ◽  
Mehedi Masud ◽  
...  

According to the security breach level index, millions of records are stolen worldwide on every single day. Personal health records are the most targeted records on the internet, and they are considered sensitive, and valuable. Security and privacy are the most important parameters of cryptography and encryption. They reduce the availability of data on patients and healthcare to the appropriate personnel and ultimately lead to a barrier in the transfer of healthcare into a digital health system. Using a permission blockchain to share healthcare data can reduce security and privacy issues. According to the literature, most healthcare systems rely on a centralized system, which is more prone to security vulnerabilities. The existing blockchain-based healthcare schemes provide only a data-sharing framework, but they lack security and privacy. To cope with these kinds of security issues, we have designed a novel security algorithm that provides security as well as privacy with much better efficiency and a lower cost. Hence, in this research, we have proposed a patient healthcare framework that provides greater security, reliability, and authentication compared to existing blockchain-based access control.


2016 ◽  
pp. 379-402 ◽  
Author(s):  
Scott Amyx

This chapter identifies concerns about, and the managerial implications of, data privacy issues related to wearables and the IoT; it also offers some enterprise solutions to the complex concerns arising from the aggregation of the massive amounts of data derived from wearables and IoT devices. Consumer and employee privacy concerns are elucidated, as are the problems facing managers as data management and security become an important part of business operations. The author provides insight into how companies are currently managing data as well as some issues related to data security and privacy. A number of suggestions for improving the approach to data protection and addressing concerns about privacy are included. This chapter also examines trending issues in the areas of data protection and the IoT, and contains thought-provoking discussion questions pertaining to business, wearables/IoT data, and privacy issues.


Sign in / Sign up

Export Citation Format

Share Document