scholarly journals Using PaCO2 as a sensitive information for detection of respiratory deterioration in severe COVID-19 patients

Author(s):  
Johan Schmitt ◽  
Marc Danguy Des Deserts ◽  
Anaelle Le Roux ◽  
Philippe Aries ◽  
Christophe Giacardi
2016 ◽  
Vol 5 (3) ◽  
pp. 1
Author(s):  
PRASAD KAKI LEELA ◽  
ANUSHA P ◽  
JYOTHI G ◽  
DILEEPKUMAR K ◽  
◽  
...  

2018 ◽  
Author(s):  
Abby Rudolph ◽  
April Young ◽  
Jennifer Havens

BACKGROUND Geographic momentary assessments (GMA) collect real-time behavioral data in one’s natural environment using a smartphone and could potentially increase the ecological validity of behavioral data. Several studies have evaluated the feasibility and acceptability of GMA among persons who use drugs (PWUD) and men who have sex with men (MSM), but fewer have discussed privacy, confidentiality, and safety concerns, particularly when illegal or stigmatized behavioral data were collected. OBJECTIVE This study explores perceptions regarding privacy, confidentiality, and safety of GMA research among PWUD and MSM recruited in three different settings (rural Appalachia, a mid-sized city in the South, and a mid-Atlantic city). METHODS Between November 2014 and April 2017 we recruited 35 PWUD from rural Appalachian Kentucky (N=20) and Baltimore, Maryland (N=15), and 20 MSM from Lexington, Kentucky to complete semi-structured qualitative interviews. Through thematic analyses, we identified and compared privacy, confidentiality, and safety concerns by demographic characteristics, risk behaviors, and setting. RESULTS Privacy, confidentiality, and safety concerns varied by setting, age, smartphone ownership, use of illegal drugs, and history of drug-related arrests. Among those who used drugs, participants reported concerns with being tracked and burden associated with carrying and safeguarding study phones and responding to survey prompts. Privacy and confidentiality concerns were noted in each setting, but tracking concerns were greatest among Baltimore participants and led many to feel that they (or others) would be unwilling to participate or comply with study procedures. While locations considered to be sensitive varied by setting, participants in all settings said they would take measures to prevent sensitive information from being collected (i.e. intentionally disable devices, leave phones at home, alter response times). CONCLUSIONS Privacy, confidentiality, and safety concerns may limit the accuracy of risk location information, study compliance, and participation. As concerns were often greatest among those engaging in illegal behaviors and with the highest risk behaviors, selection bias and non-response bias could negatively influence the representativeness and validity of study findings.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Hussein Abulkasim ◽  
Atefeh Mashatan ◽  
Shohini Ghose

AbstractQuantum key agreement enables remote participants to fairly establish a secure shared key based on their private inputs. In the circular-type multiparty quantum key agreement mode, two or more malicious participants can collude together to steal private inputs of honest participants or to generate the final key alone. In this work, we focus on a powerful collusive attack strategy in which two or more malicious participants in particular positions, can learn sensitive information or generate the final key alone without revealing their malicious behaviour. Many of the current circular-type multiparty quantum key agreement protocols are not secure against this collusive attack strategy. As an example, we analyze the security of a recently proposed multiparty key agreement protocol to show the vulnerability of existing circular-type multiparty quantum key agreement protocols against this collusive attack. Moreover, we design a general secure multiparty key agreement model that would remove this vulnerability from such circular-type key agreement protocols and describe the necessary steps to implement this model. The proposed model is general and does not depend on the specific physical implementation of the quantum key agreement.


Author(s):  
Cédric du Mouza ◽  
Elisabeth Métais ◽  
Nadira Lammari ◽  
Jacky Akoka ◽  
Tatiana Aubonnet ◽  
...  

2021 ◽  
Vol 27 (1) ◽  
pp. 146045822098003
Author(s):  
Tania Moerenhout ◽  
Ignaas Devisch ◽  
Laetitia Cooreman ◽  
Jodie Bernaerdt ◽  
An De Sutter ◽  
...  

Patient access to electronic health records gives rise to ethical questions related to the patient-doctor-computer relationship. Our study aims to examine patients’ moral attitudes toward a shared EHR, with a focus on autonomy, information access, and responsibility. A de novo self-administered questionnaire containing three vignettes and 15 statements was distributed among patients in four different settings. A total of 1688 valid questionnaires were collected. Patients’ mean age was 51 years, 61% was female, 50% had a higher degree (college or university), and almost 50% suffered from a chronic illness. Respondents were hesitant to hide sensitive information electronically from their care providers. They also strongly believed hiding information could negatively affect the quality of care provided. Participants preferred to be informed about negative test results in a face-to-face conversation, or would have every patient decide individually how they want to receive results. Patients generally had little experience using patient portal systems and expressed a need for more information on EHRs in this survey. They tended to be hesitant to take up control over their medical data in the EHR and deemed patients share a responsibility for the accuracy of information in their record.


Author(s):  
Fawad Masood ◽  
Maha Driss ◽  
Wadii Boulila ◽  
Jawad Ahmad ◽  
Sadaqat Ur Rehman ◽  
...  

AbstractMedical images possess significant importance in diagnostics when it comes to healthcare systems. These images contain confidential and sensitive information such as patients’ X-rays, ultrasounds, computed tomography scans, brain images, and magnetic resonance imaging. However, the low security of communication channels and the loopholes in storage systems of hospitals or medical centres put these images at risk of being accessed by unauthorized users who illegally exploit them for non-diagnostic purposes. In addition to improving the security of communication channels and storage systems, image encryption is a popular strategy adopted to ensure the safety of medical images against unauthorized access. In this work, we propose a lightweight cryptosystem based on Henon chaotic map, Brownian motion, and Chen’s chaotic system to encrypt medical images with elevated security. The efficiency of the proposed system is proved in terms of histogram analysis, adjacent pixels correlation analysis, contrast analysis, homogeneity analysis, energy analysis, NIST analysis, mean square error, information entropy, number of pixels changing rate, unified average changing intensity, peak to signal noise ratio and time complexity. The experimental results show that the proposed cryptosystem is a lightweight approach that can achieve the desired security level for encrypting confidential image-based patients’ information.


Sign in / Sign up

Export Citation Format

Share Document