100,763 Hits in 6.3 sec

A Review of Anonymization for Healthcare Data [article]

Iyiola E. Olatunji, Jens Rauch, Matthias Katzensteiner, Megha Khosla
2021 arXiv   pre-print
In this paper, we review the existing anonymization techniques and their applicability to various types (relational and graph-based) of health data.  ...  Besides, we provide an overview of possible attacks on anonymized data.  ...  Anonymization approach for graph-based health data can be achieved either by removing edges and node labels (naïve anonymization) or by adding new edges or nodes to modify the structure of the graph (structural  ... 
arXiv:2104.06523v1 fatcat:tqarq3ktszho3hjkqvqefjqd2q

A New Privacy Approach using Graph-EMD

CH.M.H Saibaba, V. Uday Kumar, K. Praveenkumar, Debnath Bhattacharyya
2016 International Journal of Software Engineering and Its Applications  
Existing systems like k-anonymity, l-diversity and t-closeness are already existed but they can't provide better privacy measures. Each existing method carries different types of problems.  ...  Privacy is the word which can listen everywhere in the data mining for data preserving. It should be provided the security to the data in many ways.  ...  With electronic health record data, minimization of such disclosure risks is of high priority.  ... 
doi:10.14257/ijseia.2016.10.7.02 fatcat:lbgeog5dkved3e3e2vfh75idny

Privacy in the age of Pervasive Internet and Big Data Analytics – Challenges and Opportunities

Saraswathi Punagin, Arti Arya
2015 International Journal of Modern Education and Computer Science  
information and communicating with each other, it is but natural that big data will be generated and analyzed for the purpose of "smart business" and "personalization".  ...  In the age of pervasive internet where people are communicating, networking, buying, paying bills, managing their health and finances over the internet, where sensors and machines are tracking real-time  ...  For example: For equivalence class C2, in Table 2 , sensitive attribute of health condition is represented by (l=2) diverse values, namely, Incontinence and STD. So this class is 2-diverse.  ... 
doi:10.5815/ijmecs.2015.07.05 fatcat:twrxbhfuznbbdnzlceviavgqpu

Fusing mobile, sensor, and social data to fully enable context-aware computing

Aaron Beach, Mike Gartrell, Xinyu Xing, Richard Han, Qin Lv, Shivakant Mishra, Karim Seada
2010 Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications - HotMobile '10  
We offer So-cialFusion as a system capable of systematically integrating such diverse mobile, social, and sensing input streams and effectuating the appropriate context-aware output action.  ...  video screens, music jukeboxes, and mobile health applications.  ...  We propose SocialFusion as a context-aware system capable of integrating these diverse data streams to effectuate context-aware actions both for individuals and for groups of people.  ... 
doi:10.1145/1734583.1734599 dblp:conf/wmcsa/BeachGXHLMS10 fatcat:76czdvgek5dqvb5x2z43pb3sba

Privacy preservation techniques in big data analytics: a survey

P. Ram Mohan Rao, S. Murali Krishna, A. P. Siva Kumar
2018 Journal of Big Data  
One of the applications of data analytics is recommendation systems which is widely used by ecommerce sites like Amazon, Flip kart for suggesting products to customers based on their buying habits leading  ...  preservation in unstructured data.  ...  Acknowledgements I would like to thank my guides, for supporting my work and for suggesting necessary corrections. Data Lake Sqoop to load data from RDBMS Apache Flume  ... 
doi:10.1186/s40537-018-0141-8 fatcat:bynyxdyolrbopmjobf6qetcffm

Route Map of Privacy Preservation to IOT

Mr Pravin N. Kathavate, Dr J. Amudhavel
2018 International Journal of Engineering & Technology  
In medical field, data is usually distributed horizontally with diverse regions carrying a similar set of characteristics for various anonymization techniques.  ...  Here, the literature analyses on diverse techniques associated with data hiding, data preservation and data anonymization along with data restoration properties.  ...  Table III III Preserved Data For Diverse Diseases In Each Contribution Sl.  ... 
doi:10.14419/ijet.v7i2.7.11076 fatcat:g3ahrvxvnjaifaxyra5b7yuteu

Diversity Competence in Healthcare: Experts' Views on the Most Important Skills in Caring for Migrant and Minority Patients

Sandra Ziegler, Camilla Michaëlis, Janne Sørensen
2022 Societies  
The sciences offer multiple terms for what we are calling 'diversity competence'.  ...  We assume that teaching and developing this competence is a complex, time-consuming task, yet health professionals' time for further training is limited.  ...  Acknowledgments: We thank our student assistants Diana Meyer (Heidelberg University Hospital) and Julie Marie Møller Olsen (University of Copenhagen) for their help with data management.  ... 
doi:10.3390/soc12020043 fatcat:ohr6hz22q5bx5e6ksn7kcvclcm

Open Data Release and Privacy Concerns: Complexity in Mitigating Vulnerability with Controlled Perturbation

Shah Imran Alam, Ihtiram Raza Khan, Syed Imtiyaz Hassan, Farheen Siddiqui, M. Afshar Alam, Anil Kumar Mahto, Rijwan Khan
2021 Journal of Food Quality  
structured microdata.  ...  In this research, we have used the K-anonymity algorithm and compared the results with the addon of l-diversity.  ...  Hence, diversity is good for privacy control and less evil for data quality.  ... 
doi:10.1155/2021/9929049 fatcat:gfcoqittfvfwjed57gh5xahol4

Navigating regulatory change: preliminary lessons learned during the healthcare provider transition to ICD-10-CM/PCS

Veronica E Jackson, Alexander Muckerman
2012 Perspectives in health information management  
As expected, the integrated health systems surveyed seem to be on or ahead of schedule for the ICD-10-CM/PCS coding transition.  ...  health systems.  ...  Acknowledgments The authors wish to thank the following individuals for their contributions and support for this  ... 
pmid:22548022 pmcid:PMC3329201 fatcat:xhyauvbwu5aldkf4kyebkeeh54

Personal Information Privacy: What's Next?

Khodor Hammoud, Salima Benbernou, Mourad Ouziri, Yücel Saygin, Rafiqul Haque, Yehia Taher
2019 International Conference on Big Data and Cyber-Security Intelligence  
In this work, we perform a summary of the available algorithms for providing privacy in structured data, and analyze the popular tools that handle privacy in textual data; namely medical data.  ...  These privacy rules apply regardless of the data structure, whether it being structured or unstructured.  ...  These methods are not applicable for providing privacy for textual data. They were made at a time were structured data was the governing method for data storage. B.  ... 
dblp:conf/bdcsintell/HammoudBOSHT19 fatcat:h5c34gfg4vbrzbjjf4iahgmvua

Perceptions of faculty in health care and social sciences on teaching international students

Efi (Efthymia) Mantzourani, Nick Courtier, Steve Davies, Geinor Bean
2015 Currents in Pharmacy Teaching and Learning  
Increased cultural diversity of higher education (HE) students has created both learning opportunities and teaching challenges for vocational health care programs.  ...  This study explores the awareness of health care teaching staff on issues related to internationalization, perceived responsibility in supporting international students, and teaching practices toward an  ...  (c) Awareness of cultural diversity in the classroom.  ... 
doi:10.1016/j.cptl.2015.06.018 fatcat:dalcbzmtbvgslgfnerqi6eumge

Big data privacy: a technological perspective and review

Priyank Jain, Manasi Gyanchandani, Nilay Khare
2016 Journal of Big Data  
On the premise of this definition, the properties of big Abstract Big data is a term used for very large data sets that have more varied and complex structure.  ...  It's the large volume of data-both structured and unstructured-that inundates a business on a day-to-day basis.  ...  The l-diversity model includes the promotion of intra-group diversity for sensitive values in the anonymization mechanism.  ... 
doi:10.1186/s40537-016-0059-y fatcat:hol5lhemzvawzc6yyxe4paa7zu

Anonymization Techniques for Privacy Preserving Data Publishing: A Comprehensive Survey

Abdul Majeed, Sungchang Lee
2020 IEEE Access  
We systematically categorize the existing anonymization techniques into relational and structural anonymization, and present an up to date thorough review on existing anonymization techniques and metrics  ...  used for their evaluation.  ...  STRUCTURAL ANONYMIZATION TECHNIQUES USED FOR THE SOCIAL NETWORKS DATA ANONYMIZATION Structural anonymization refers to the modification in the structural properties of the social network (SN) data (i.e  ... 
doi:10.1109/access.2020.3045700 fatcat:zpgu4vvjwneyhhvche3rf2lbze

The Diversity Issue Revisited: International Students in Clinical Environment

Marianne Pitkäjärvi, Elina Eriksson, Kaisu Pitkälä
2012 ISRN Nursing  
Awareness of strategies that enhance understanding, acceptance, and appreciation of cultural and linguistic diversity in any health care setting are needed.  ...  Concerning structural arrangements set up to facilitate preceptorship and approach to cultural diversity in the learning environment, the two groups' opinions were similar.  ...  In addition to intensive language instruction for international students, awareness of strategies that enhance understanding, acceptance, and appreciation of cultural and linguistic diversity in any health  ... 
doi:10.5402/2012/294138 pmid:22548188 pmcid:PMC3324143 fatcat:y2c2ovytovfnlngj332zqrgabu

Privacy and data security in E-health: Requirements from the user's perspective

Wiktoria Wilkowska, Martina Ziefle
2012 Health Informatics Journal  
In particular, analysis of data with respect to gender, health-status and age (young, middle-aged and old users) revealed that females and healthy adults require, and insist on, the highest security and  ...  Specifically, we focused on the perceived importance of data security and privacy issues.  ...  Women ascribe a higher relevance to the protection and controlled access to their health data, and they insist more than men on using E-health anonymously and in a private manner.  ... 
doi:10.1177/1460458212442933 pmid:23011814 fatcat:sowj6tyslbhaljpno7cbzabs5q
« Previous Showing results 1 — 15 out of 100,763 results