Wearable Health Devices

Author(s):  
Michael Snyder

What other types of personal health information can be readily collected? Most health-related measurements are administered in or through a doctor’s office and are typically taken when we are sick; the measurements that are taken when we are healthy are infrequent, and we often...

2019 ◽  
Vol 9 (6) ◽  
pp. 1196-1204 ◽  
Author(s):  
Rafiullah Khan ◽  
Muhammad Arshad Islam ◽  
Mohib Ullah ◽  
Muhammad Aleem ◽  
Muhammad Azhar Iqbal

The increasing use of web search engines (WSEs) for searching healthcare information has resulted in a growing number of users posting personal health information online. A recent survey demonstrates that over 80% of patients use WSE to seek health information. However, WSE stores these user's queries to analyze user behavior, result ranking, personalization, targeted advertisements, and other activities. Since health-related queries contain privacy-sensitive information that may infringe user's privacy. Therefore, privacy-preserving web search techniques such as anonymizing networks, profile obfuscation, private information retrieval (PIR) protocols etc. are used to ensure the user's privacy. In this paper, we propose Privacy Exposure Measure (PEM), a technique that facilitates user to control his/her privacy exposure while using the PIR protocols. PEM assesses the similarity between the user's profile and query before posting to WSE and assists the user in avoiding privacy exposure. The experiments demonstrate 37.2% difference between users' profile created through PEM-powered-PIR protocol and other usual users' profile. Moreover, PEM offers more privacy to the user even in case of machine-learning attack.


2002 ◽  
Vol 28 (4) ◽  
pp. 491-502
Author(s):  
Mary L. Durham

While the new Health Insurance Privacy and Accountability Act (HIPAA) research rules governing privacy, confidentiality and personal health information will challenge the research and medical communities, history teaches us that the difficulty of this challenge pales in comparison to the potential harms that such regulations are designed to avoid. Although revised following broad commentary from researchers and healthcare providers around the country, the HIPAA privacy requirements will dramatically change the way healthcare researchers do their jobs in the United States. Given our reluctance to change, we risk overlooking potentially valid reasons why access to personal health information is restricted and regulated. In an environment of electronic information, public concern, genetic information and decline of public trust, regulations are ever-changing. Six categories of HIPAA requirements stand out as transformative: disclosure accounting/tracking, business associations, institutional review board (IRB) changes, minimum necessary requirements, data de-identification, and criminal and civil penalties.


JAMA ◽  
2015 ◽  
Vol 313 (14) ◽  
pp. 1424 ◽  
Author(s):  
David Blumenthal ◽  
Deven McGraw

2011 ◽  
Vol 84 (2) ◽  
pp. e9-e12 ◽  
Author(s):  
Paul A. Teixeira ◽  
Peter Gordon ◽  
Eli Camhi ◽  
Suzanne Bakken

Sign in / Sign up

Export Citation Format

Share Document