scholarly journals Data & Civil Rights: Health Primer

2017 ◽  
Author(s):  
Alex Rosenblat ◽  
Kate Wikelius ◽  
danah boyd ◽  
Seeta Peña Gangadharan ◽  
Corrine Yu

Data plays a central role in both medicine and insurance, enabling advances and creating new challenges. Although legislative efforts have attempted to protect the privacy of people’s health data, many other kinds of data can reveal sensitive health information about an individual. People’s medical conditions or health habits can be inferred from many sources, including their purchases, phone call patterns, fitness tracking apps, posts on social media, and browsing histories. Sometimes, medical information that reveals sensitive information about an individual can be linked to the medical state of a relative. However, accuracy of these inferences may be a problem, and inaccurate inference can result in social stigma and harmful reputational effects on the wrongly categorized individual. In addition, the kinds of inferences generated and used by marketers and insurance companies may not be useful when applied to the context of patient care. Not only does misuse of data have consequences for individuals seeking fair access to healthcare, but inappropriate practices also erode productive efforts to use data to empower people, personalize medicine, and develop innovations that can advance healthcare.

2020 ◽  
Vol 158 (04) ◽  
pp. 345-350
Author(s):  
Christian Juhra ◽  
Jörg Ansorg ◽  
David Alexander Back ◽  
Dominik John ◽  
Andrea Kuckuck-Winkelmann ◽  
...  

AbstractNew communication technologies allow patients to communicate with their physicians from anywhere using computer or smartphone. Adding video to the mere phone call optimizes the personal contact between patient and physicians regardless of distance. Legal and reimbursements requirements must be taken into account, especially only certified software products must be used. In addition, patient consent is needed and confidentiality must be assured. The video patient consultation can be reimbursed by the health insurance companies. As with all new technologies, the introduction of these video consultations faced some challenges. Although patients and physicians have expressed great interest in this technology, it has been rarely used so far. The current COVID crisis increased the need for video consultations resulting in an increasing use of video patient consultation. It can be expected that this demand will still exists after the COVID crisis.


2021 ◽  
Vol 11 (12) ◽  
pp. 3164-3173
Author(s):  
R. Indhumathi ◽  
S. Sathiya Devi

Data sharing is essential in present biomedical research. A large quantity of medical information is gathered and for different objectives of analysis and study. Because of its large collection, anonymity is essential. Thus, it is quite important to preserve privacy and prevent leakage of sensitive information of patients. Most of the Anonymization methods such as generalisation, suppression and perturbation are proposed to overcome the information leak which degrades the utility of the collected data. During data sanitization, the utility is automatically diminished. Privacy Preserving Data Publishing faces the main drawback of maintaining tradeoff between privacy and data utility. To address this issue, an efficient algorithm called Anonymization based on Improved Bucketization (AIB) is proposed, which increases the utility of published data while maintaining privacy. The Bucketization technique is used in this paper with the intervention of the clustering method. The proposed work is divided into three stages: (i) Vertical and Horizontal partitioning (ii) Assigning Sensitive index to attributes in the cluster (iii) Verifying each cluster against privacy threshold (iv) Examining for privacy breach in Quasi Identifier (QI). To increase the utility of published data, the threshold value is determined based on the distribution of elements in each attribute, and the anonymization method is applied only to the specific QI element. As a result, the data utility has been improved. Finally, the evaluation results validated the design of paper and demonstrated that our design is effective in improving data utility.


Healthcare ◽  
2021 ◽  
Vol 9 (10) ◽  
pp. 1284
Author(s):  
Elena Riza ◽  
Achilleas Lazarou ◽  
Pania Karnaki ◽  
Dina Zota ◽  
Margarita Nassi ◽  
...  

The application of the electronic algorithm developed by the Mig-Healthcare project was pilot tested in a sample of migrants and refugees in 2 Reception and Identification Centres (RICs), temporary settlements, in Greece using portable devices. The questions relate to health literacy issues, to mental health, to vaccination history, to lifestyle habits such as smoking, alcohol intake, diet, to the presence of diseases such as heart disease or diabetes, to the use of prevention services and to dental care. A total of 82 adults, 50 women and 32 men, participated. Data analysis showed that 67.1% (55) of the respondents had difficulty in understanding medical information and 57.3% (47) did not know where to seek medical help for a specific health problem. Four main areas of health problems were identified and further action is required: (A) mental health concerns, (B) vaccinations, (C) obesity, and (D) dental hygiene. Direct linkage with the “Roadmap and Toolbox” section of the project’s website gave the respondents access to many sources and tools, while through the use of the interactive map, specific referral points of healthcare delivery in their area were identified. IT-based intervention in migrant and refugee populations in Greece are effective in increasing health literacy levels and identifying areas for health promotion interventions in these groups. Through linkage with the project’s database, access to healthcare provision points and action to seek appropriate healthcare when necessary are encouraged. Given the attenuated vulnerability profile of people living in temporary settlements, this algorithm can be easily used in primary care settings to improve migrant and refugee health.


PEDIATRICS ◽  
1983 ◽  
Vol 71 (4) ◽  
pp. 706-710

OVERVIEW Minority women physicians may be defined as those of nonwhite racial and ethnic identification. There is a paucity of data available on these women. Until the passage of the 1964 Civil Rights Act and the impact of affirmative action programs, reliable statistics regarding minorities were scarce. Subsequently, a data base identifying racial/ethnic origin as well as sex of medical students and physicians has been evolving. Many sources are currently unable to provide such information because most applications are without racial identification. Neither the American Board of Pediatrics (ABP) nor the American Academy of Pediatrics (AAP) maintain data regarding racial/ethnic origin of members. In the 1970s there was a rapid increase in admissions of both women and minorities in US medical schools. First-year enrollment in 1980-1981 included 14.1% minority men and women (Table 1). The number of minority women entering medical school increased from 266 (2.2%) in 1971-1972 to 1,066 (6.2%) in 1981-1982 (Table 2). In departments of pediatrics in US medical schools in 1982, minority women represented 17% of all faculty members. Of 201 minority women, there were 127 Asian, 37 black, 24 Puerto Rican, three Mexican-American, nine other Hispanic, and one American Indian. The most significant increase in representation has occurred in the Asian ethnic group. Minority populations have poorer health status and are at higher risk with respect to accessibility, availability, and utilization of health services. The recruitment and training of minority physicians is important in providing culturally sensitive health care acceptable to bilingual and bicultural minorities. Most minority groups have career development problems that may be related to their ethnic and cultural background.


Stroke ◽  
2017 ◽  
Vol 48 (suppl_1) ◽  
Author(s):  
Jonathan Muller ◽  
Barbara Gatton ◽  
Linda Fox ◽  
Joseph A Bove ◽  
Johanna Donovan Turner ◽  
...  

Background and Purpose: At least 12% of stroke patients are readmitted to a hospital within 30 days of discharge. We know that patients hospitalized for other conditions are less likely to be readmitted within 30 days if they are seen by their PCP shortly after discharge. However, less than a third of patients in the New York metropolitan area admitted for heart failure, heart attacks, and pneumonia see their PCP within 14 days after discharge and nearly 40% of patients do not adhere to their prescribed regimen. In the case of cerebrovascular diseases, outpatient follow-up may prevent the majority of avoidable readmissions. The purpose of this project is to identify and reduce unnecessary, unplanned hospital readmissions after stroke. Our goal is to encourage patient adherence to prescribed medication and other therapies, as well as to ensure timely follow-up with their PCP. Methods: Stroke and transient ischemic attack (TIA) patients with a disposition of either home or short-term rehabilitation are visited and offered enrollment. Participants are given a kit which includes a personalized binder (to manage essential medical information) and a 28-slot pill box. Each patient then receives 3 phone call interviews at 7, 21 and 32 days after discharge. The aim of the phone calls is to identify obstacles to compliance with treatment regimen and follow-up care. Results: From January 2015 to June 2016, 247 patients were enrolled and followed up. Within 30 days of discharge, 10% were readmitted and 50% of all readmissions occurred within the first 7 days. Of those readmitted, 19% were due to an injury from physical therapy. Data from follow-up phone calls revealed that 83% were taking all prescribed medications, 89% had completed a follow-up with any physician, 69% were using the binder, and 61% had done all three. Conclusions: While we have not enrolled enough patients to see a statistically significant reduction in readmissions, our interviews showed that weather, depression, as well as a lack of insurance, family support, and a home health aide are all determinants on how patients will follow their prescribed regimen. The results of this study have allowed us to begin implementing stroke support groups and pre-discharge follow-up appointment scheduling.


Author(s):  
Kirsten E. Shepherd-Barr

The decades 1960–80 witnessed a seismic shift in modern drama. The rage that came to define, and fuel, much of the drama in the 1960s and 1970s is directed at the audience. ‘Absurdism, protest, and commitment’ shows it is a post-war rage stemming from many sources: the Vietnam War, the Cold War, a feeling of betrayal by government and politicians, the Civil Rights Movement, Black Power, gay rights, feminism, the growing gap between rich and poor, and ethnic oppression. It is all about denying the audience what it expects of a play, provoking it out of real or perceived complacency, startling, and offending it. The plays of Pinter, Shepard, Beckett, Stoppard, Friel, and Fugard are discussed.


2007 ◽  
Vol 35 (S2) ◽  
pp. 36-39 ◽  
Author(s):  
John H. Dodge

Predictive medical information is used by underwriters to assess the future risk of a claim in medically based insurance products such as health, life, and disability insurance. Medical underwriting involves the science of evaluating medical information to determine the risk for groups of individuals with various medical conditions. In disability insurance, this involves an evaluation of medical information to predict the risk of becoming disabled.Before discussing medical underwriting, an understanding of certain terms used by disability insurance companies and the products that are available is required. The first is the definition of disability. The Americans with Disabilities Act (ADA) defines disability as the following:A physical or mental impairment that substantially limits one or more of the major life activities; or has a record of such an impairment; or is regarded as having such an impairment even when no impairment exists, no substantial limitation results from the impairment, or the impairment is only substantially limiting because of the attitudes of others.


2021 ◽  
Author(s):  
Giorgia Bincoletto

In the digital age, e-health technologies play a pivotal role in the processing of medical information. As personal health data represent sensitive information concerning a data subject, enhancing data protection and security of systems and practices has become a primary concern. This book explores how an e-health system could be developed and how data processing activities could be carried out to apply data protection principles and requirements from the design stage. There is currently a lack of clarity and knowledge on the topic among developers, data controllers and stakeholders. The research attempts to bridge the gap between the legal and technical disciplines on DPbD by providing a set of guidelines for the implementation of the principle in the e-health care sector.


Author(s):  
Vincenzo Butticè ◽  
Massimo G. Colombo

Fundraising has proved difficult for many entrepreneurs and ventures in the early stages of their businesses because of significant information asymmetries with investors and a lack of collateral. In an attempt to overcome such difficulties, since the early 2010s, some entrepreneurs have come to rely on the Internet in order to directly seek funding from the general public, or the “crowd.” The practice of collecting small amounts of capital from the “crowd” of Internet users is called crowdfunding. Crowdfunding research is a relative newcomer to the discipline of entrepreneurial finance. However, the availability of easy-to-access data, the diffusion of this funding channel among entrepreneurs, and increasing policy attention have made crowdfunding one of the most investigated areas of research in entrepreneurial finance. The literature has discussed crowdfunding as more than a simple mean of financing. Crowdfunding also allows entrepreneurs to develop a virtual community of followers, which provides a valuable source of information with which to test and improve early versions of innovative products. Moreover, crowdfunding represents a method of gaining information about market response to a given product and the size of demand for that product, and is a powerful marketing instrument that can be used to increase brand awareness and to promote the arts, social initiatives, and financial inclusion. However, crowdfunding also entails a number of pitfalls for entrepreneurs. In order to collect financial resources from the crowd, entrepreneurs are required to share sensitive information online. This includes information about the entrepreneurial initiative, the team, and the business model they are using. The provision of this information may facilitate product counterfeiting, or the appropriation of the value of the idea by other firms or entrepreneurs. Moreover, crowdfunding entails the risk of social stigma if the funding campaign results in a failure, because information about the performance of the crowdfunding campaign usually remains accessible online. Finally, crowdfunding entails additional challenges related to the management of the crowd of backers after the campaign, since several backers will be active providers of feedback and will interact with the entrepreneurs through direct communication. Despite these disadvantages crowdfunding has become a widely used funding source for entrepreneurs looking for financing for sustainable projects, creative initiatives, and innovative ideas.


2020 ◽  
Vol 2020 ◽  
pp. 1-10 ◽  
Author(s):  
Kun Tang ◽  
Wenjuan Tang ◽  
Entao Luo ◽  
Zhiyuan Tan ◽  
Weizhi Meng ◽  
...  

In this paper, we consider the issue of the secure transmissions for the cognitive radio-based Internet of Medical Things (IoMT) with wireless energy harvesting. In these systems, a primary transmitter (PT) will transmit its sensitive medical information to a primary receiver (PR) by a multi-antenna-based secondary transmitter (ST), where we consider that a potential eavesdropper may listen to the PT’s sensitive information. Meanwhile, the ST also transmits its own information concurrently by utilizing spectrum sharing. We aim to propose a novel scheme for jointly designing the optimal parameters, i.e., energy harvesting (EH) time ratio and secure beamforming vectors, for maximizing the primary secrecy transmission rate while guaranteeing secondary transmission requirement. For solving the nonconvex optimization problem, we transfer the problem into convex optimization form by adopting the semidefinite relaxation (SDR) method and Charnes–Cooper transformation technique. Then, the optimal secure beamforming vectors and energy harvesting duration can be obtained easily by utilizing the CVX tools. According to the simulation results of secrecy transmission rate, i.e., secrecy capacity, we can observe that the proposed protocol for the considered system model can effectively promote the primary secrecy transmission rate when compared with traditional zero-forcing (ZF) scheme, while ensuring the transmission rate of the secondary system.


Sign in / Sign up

Export Citation Format

Share Document