scholarly journals Privacy Protection and Secondary Use of Health Data: Strategies and Methods

2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Dingyi Xiang ◽  
Wei Cai

Health big data has already been the most important big data for its serious privacy disclosure concerns and huge potential value of secondary use. Measurements must be taken to balance and compromise both the two serious challenges. One holistic solution or strategy is regarded as the preferred direction, by which the risk of reidentification from records should be kept as low as possible and data be shared with the principle of minimum necessary. In this article, we present a comprehensive review about privacy protection of health data from four aspects: health data, related regulations, three strategies for data sharing, and three types of methods with progressive levels. Finally, we summarize this review and identify future research directions.

Author(s):  
Zheng Wang ◽  
Zhixiang Wang ◽  
Yinqiang Zheng ◽  
Yang Wu ◽  
Wenjun Zeng ◽  
...  

An efficient and effective person re-identification (ReID) system relieves the users from painful and boring video watching and accelerates the process of video analysis. Recently, with the explosive demands of practical applications, a lot of research efforts have been dedicated to heterogeneous person re-identification (Hetero-ReID). In this paper, we provide a comprehensive review of state-of-the-art Hetero-ReID methods that address the challenge of inter-modality discrepancies. According to the application scenario, we classify the methods into four categories --- low-resolution, infrared, sketch, and text. We begin with an introduction of ReID, and make a comparison between Homogeneous ReID (Homo-ReID) and Hetero-ReID tasks. Then, we describe and compare existing datasets for performing evaluations, and survey the models that have been widely employed in Hetero-ReID. We also summarize and compare the representative approaches from two perspectives, i.e., the application scenario and the learning pipeline. We conclude by a discussion of some future research directions. Follow-up updates are available at https://github.com/lightChaserX/Awesome-Hetero-reID


Big Data ◽  
2016 ◽  
pp. 2368-2387
Author(s):  
Hajime Eto

As this book has the limited numbers of chapters and pages, many important issues remain unanalyzed. This chapter picks up and roughly discusses some of them for the future analyses in more analytical ways. The focuses are placed on how to apply the data scientific methods to the analyses of public voice, claims and behaviors of tourists, customers and the general publics by using the big data already acquired and stored somewhere.


Author(s):  
Mondher Feki

Big data has emerged as the new frontier in supply chain management; however, few firms know how to embrace big data and capitalize on its value. The non-stop production of massive amounts of data on various digital platforms has prompted academics and practitioners to focus on the data economy. Companies must rethink how to harness big data and take full advantage of its possibilities. Big data analytics can help them in giving valuable insights. This chapter provides an overview of big data analytics use in the supply chain field and underlines its potential role in the supply chain transformation. The results show that big data analytics techniques can be categorized into three types: descriptive, predictive, and prescriptive. These techniques influence supply chain processes and create business value. This study sets out future research directions.


2022 ◽  
pp. 1477-1503
Author(s):  
Ali Al Mazari

HIV/AIDS big data analytics evolved as a potential initiative enabling the connection between three major scientific disciplines: (1) the HIV biology emergence and evolution; (2) the clinical and medical complex problems and practices associated with the infections and diseases; and (3) the computational methods for the mining of HIV/AIDS biological, medical, and clinical big data. This chapter provides a review on the computational and data mining perspectives on HIV/AIDS in big data era. The chapter focuses on the research opportunities in this domain, identifies the challenges facing the development of big data analytics in HIV/AIDS domain, and then highlights the future research directions of big data in the healthcare sector.


Author(s):  
Suzanne Roff-Wexler

Following a brief review of literature on big data as well as wisdom, this chapter provides a definition of data-based wisdom in the context of healthcare organizations and their visions. The author addresses barriers and ways to overcome barriers to data-based wisdom. Insights from interviews with leading healthcare professionals add practical meaning to the discussion. Finally, future research directions and questions are suggested, including the role of synchronicity and serendipity in data-based wisdom. In this chapter, developing data-based wisdom systems that flourish Wisdom, Virtue, Intellect, and Knowledge are encouraged.


Author(s):  
David Chan

Studies of team-level constructs can produce new insights when researchers explicitly take into account several critical conceptual and methodological issues. This article explicates the conceptual bases for multilevel research on team constructs and discusses specific issues relating to conceptual frameworks, measurement, and data analysis. To advance programmatic research involving team-level constructs, several future research directions concerning issues of substantive content (i.e., changes in the nature of work and teams, member-team fit, linking team-level constructs to higher-level constructs) and strategic approaches (i.e., the construct's theoretical roles, dimensionality and specificity, malleability and changes over time, relationships with Big Data) are proposed.


Author(s):  
Yan Bai ◽  
Lirong Dai ◽  
Juan Li

With the widespread eHealth usage, security of eHealth services is becoming increasingly important. In this paper, we analyze the security problems in eHealth systems, discuss various approaches of securing health data collection and sharing proposed in the recent literature on eHealth security, and provide comparative evaluations that include advantages and limitations of each approach. Possible future research directions on each approach for enhancing security for eHealth applications are also suggested.


Sign in / Sign up

Export Citation Format

Share Document