scholarly journals Consequences for research if use of anonymised patient data breaches confidentiality

BMJ ◽  
1999 ◽  
Vol 319 (7221) ◽  
pp. 1366-1366 ◽  
Author(s):  
J. Walton ◽  
R. Doll ◽  
W. Asscher ◽  
R. Hurley ◽  
M. Langman ◽  
...  
Keyword(s):  
Author(s):  
Tafheem Ahmad Wani ◽  
Antonette Mendoza ◽  
Kathleen Gray

Background: Healthcare is among the leading industries which drives the use of personal devices for work purposes (BYOD). However, allowing BYOD for healthcare workers comes at a cost, as it puts sensitive information assets such as patient data residing on personal devices at risk of potential data breaches. Objective: Previous review of the literature has highlighted the dearth of empirical studies in hospital settings regarding BYOD usage. As such, this paper aims to report BYOD usage trends in Australian hospitals through a national survey, first of its kind in Australia. Methods: An anonymous survey was conducted online among health IT personnel, asking them about their experiences about BYOD usage in their hospitals. 28 responses were collected based on public Australian hospitals, which included 21 hospital groups and 7 standalone hospitals, likely to represent more than 100 hospitals in total. Survey responses were quantitatively analysed through descriptive statistical analysis and cross tabulation. Results: BYOD is allowed in majority of the hospitals, and among all major staff groups, with doctors being the leading group. Participants ranked reasons for allowing BYOD, and most of them were related to improvement in clinical productivity, efficiency and mobility for clinical staff. Challenges were generally related to data security such as patient data breaches and compliance with data security laws, according to them. More than two thirds of hospitals had a cybersecurity officer employed, and CIOs were the most dominant group who held responsibility for managing BYOD within the hospital. Conclusion: This paper provides a starting point for better understanding of BYOD usage in a complex healthcare environment based on empirical evidence, one which highlights the security-usability conundrum, confirming previous literature themes.


1989 ◽  
Vol 28 (02) ◽  
pp. 69-77 ◽  
Author(s):  
R. Haux

Abstract:Expert systems in medicine are frequently restricted to assisting the physician to derive a patient-specific diagnosis and therapy proposal. In many cases, however, there is a clinical need to use these patient data for other purposes as well. The intention of this paper is to show how and to what extent patient data in expert systems can additionally be used to create clinical registries and for statistical data analysis. At first, the pitfalls of goal-oriented mechanisms for the multiple usability of data are shown by means of an example. Then a data acquisition and inference mechanism is proposed, which includes a procedure for controlling selection bias, the so-called knowledge-based attribute selection. The functional view and the architectural view of expert systems suitable for the multiple usability of patient data is outlined in general and then by means of an application example. Finally, the ideas presented are discussed and compared with related approaches.


1996 ◽  
Vol 35 (02) ◽  
pp. 88-92 ◽  
Author(s):  
E.-H. W. Kluge

AbstractKay and Purves' proposed narratological model of the medical record is based on the familiar phenomenological insight that the perception of data is conditioned by the conceptual framework of the perceiver. Unfortunately, unless handled very carefully, this approach will make the significance of a medical record unique to the person who constructed it and impermeable to outside scrutiny. However, when integrated into the analog-model of the medical record, the narratological model can be accommodated as the clinician-relative construction of a patient profile within the data that make up the medical record. Some implications for the construction of expert systems and competence analysis are indicated.


Diabetes ◽  
2019 ◽  
Vol 68 (Supplement 1) ◽  
pp. 393-P
Author(s):  
KHAWLA F. ALI ◽  
LIMA LAWRENCE ◽  
LAUREN A. BUEHLER ◽  
RONALD R. GAMBINO ◽  
MARWAN HAMATY

Sign in / Sign up

Export Citation Format

Share Document