Filters








8,093 Hits in 5.8 sec

Technologies for the Pseudonymization of Medical Data: A Legal Evaluation

Thomas Neubauer, Mathias Kolb
2009 2009 Fourth International Conference on Systems  
This paper highlights research directions currently pursued for privacy protection in e-health and evaluates common pseudonymization approaches against legal and technical criteria.  ...  Although, it is a fundamental right of every individual to demand privacy and a variety of laws were enacted that demand the protection of patients' privacy, approaches for protecting privacy often do  ...  a competence center that is funded by the Austrian Federal Ministry of Economics and Labor (BMWA) as well as by the provincial government of Vienna.  ... 
doi:10.1109/icons.2009.48 dblp:conf/icons/NeubauerK09 fatcat:s4kthmkkjndzrcpmer5ppn3kxa

An Evaluation of Technologies for the Pseudonymization of Medical Data [chapter]

Thomas Neubauer, Mathias Kolb
2009 Studies in Computational Intelligence  
This paper highlights research directions currently pursued for privacy protection in e-health and evaluates common pseudonymization approaches against legal and technical criteria.  ...  Although, it is a fundamental right of every individual to demand privacy and a variety of laws were enacted that demand the protection of patients' privacy, approaches for protecting privacy often do  ...  This paper presents an evaluation of current privacy enhancing technologies that specifically aim at protecting medical data and, thus, can be used as a basis for EHR systems.  ... 
doi:10.1007/978-3-642-01209-9_5 fatcat:63nlofra3nbajklpzb346ozfb4

An evaluation of technologies for the pseudonymization of medical data

Thomas Neubauer, Andreas Ekelhart
2009 Proceedings of the 2009 ACM symposium on Applied Computing - SAC '09  
This paper highlights research directions currently pursued for privacy protection in e-health and evaluates common pseudonymization approaches against legal and technical criteria.  ...  Although, it is a fundamental right of every individual to demand privacy and a variety of laws were enacted that demand the protection of patients' privacy, approaches for protecting privacy often do  ...  This paper presents an evaluation of current privacy enhancing technologies that specifically aim at protecting medical data and, thus, can be used as a basis for EHR systems.  ... 
doi:10.1145/1529282.1529465 dblp:conf/sac/NeubauerE09 fatcat:hfchk6oeazbo3ah4gpa5st5kuq

Data Models for the Pseudonymization of DICOM Data

D Abouakil, J Heurix, T Neubauer
2011 2011 44th Hawaii International Conference on System Sciences  
However, for highly sensitive medical data this is often not sufficient. This paper presents a data model for systems using DICOM based on the PIPE pseudonymization approach.  ...  DICOM has become the most widely implemented and supported communications standard for medical imaging. The security of DICOM relies on the encryption of the communication channels.  ...  center Secure Business Austria funded by the Federal Ministry of Economy, Family and Youth of the Republic of Austria and by the City of Vienna.  ... 
doi:10.1109/hicss.2011.136 dblp:conf/hicss/AbouakilHN11 fatcat:2oxmuziskvcy7nvzal5smkbwpi

Future of Data Analytics in the Era of the General Data Protection Regulation in Europe

Katarzyna Kolasa, W. Ken Redekop, Alexander Berler, Vladimir Zah, Carl V. Asche
2020 PharmacoEconomics (Auckland)  
Real-world evidence collected from de-identified individuals throughout the continuum of healthcare represents the most valuable source in technology evaluation.  ...  In this article, a number of issues are considered and discussed, based upon the authors' experience, with the aim of helping the reader better understand the implications of the use of Big Data and the  ...  Portions of this work were presented during an Issue Panel at the International Society for Pharmacoeconomics and Outcomes Research (ISPOR) 21st European Congress in Barcelona, Spain in November 2018.  ... 
doi:10.1007/s40273-020-00927-1 pmid:32507960 fatcat:e5qb5barofbsjeaahy7ttye4bm

From Raw Data to FAIR Data: The FAIRification Workflow for Health Research

A. Anil Sinaci, Francisco J. Núñez-Benjumea, Mert Gencturk, Malte-Levin Jauer, Thomas Deserno, Catherine Chronaki, Giorgio Cangioli, Carlos Cavero-Barca, Juan M. Rodríguez-Pérez, Manuel M. Pérez-Pérez, Gokce B. Laleci Erturkmen, Tony Hernández-Pérez (+2 others)
2020 Methods of Information in Medicine  
GO FAIR - a bottom-up, stakeholder driven and self-governed initiative - defined a seven-step FAIRification process focusing on data, but also indicating the required work for metadata.  ...  Methods A common FAIRification workflow was developed by applying restrictions on existing steps and introducing new steps for specific requirements of health data.  ...  Acknowledgments This research was approved by the Comité Coordinador de Ética para la Investigación Biomédica en Andalucía (Ethical Biomedical Research Steering Board of Andalusia) chaired by PhD MD Mariano  ... 
doi:10.1055/s-0040-1713684 pmid:32620019 fatcat:a7mpkludszd5zauhy2nivhhbou

Incorporation of Multiple Sources into IT - and Data Protection Concepts: Lessons Learned from the FARKOR Project

Doris Lindoerfer, Ulrich Mansmann, Isabel Reinhardt
2020 Studies in Health Technology and Informatics  
Data are decrypted, integrated and analyzed in a secure part of the scientific evaluation center with no connection to the internet (SECSP).  ...  The presented concept guarantees participants privacy through different identifiers, separation of responsibilities, data pseudonymization, public-private key encryption of medical data and encrypted data  ...  Acknowledgements The FARKOR project is funded by the Innovation Committee of the Federal Joint Committee (G-BA) https://innovationsfonds.g-ba.de/): 01NVF17026. DL received funding from FARKOR.  ... 
doi:10.3233/shti200163 pmid:32570387 fatcat:jjpioxrqzjhthgt4sifprnr3p4

Data Sharing in Distributed Architectures – Concept and Implementation in HiGHmed [chapter]

Reto Wettstein, Hauke Hund, Christian Fegeler, Oliver Heinze
2021 Studies in Health Technology and Informatics  
Medical routine data has the potential to benefit research. However, transferring this data into a research context is difficult.  ...  For this reason Medical Data Integration Centers are being established in German university hospitals to consolidate data from primary information systems in a single location.  ...  Introduction Background The large volume of every day produced medical routine data can provide great potential for medical research [1] .  ... 
doi:10.3233/shti210548 pmid:34545826 fatcat:spiojdouunfh5p7f6zg7q6vlfa

Privacy Issues and Data Protection in Big Data: A Case Study Analysis under GDPR [article]

Nils Gruschka, Vasileios Mavroeidis, Kamer Vishi, Meiko Jensen
2018 arXiv   pre-print
We show which types of information might become a privacy risk, the employed privacy-preserving techniques in accordance with the legal requirements, and the influence of these techniques on the data processing  ...  In this paper, we discuss the current state of the legal regulations and analyze different data protection and privacy-preserving techniques in the context of big data analysis.  ...  248030/070) for the Norwegian University of Science and Technology (NTNU) for the period of 2015 -2019.  ... 
arXiv:1811.08531v1 fatcat:fsdwggnmszcstkklslc3t5flyi

Healthy Data Protection

Lothar Determann
2019 Social Science Research Network  
Progress in the medical field depends above all on data, specifically health information.  ...  Telemedicine and electronic health records have the potential to improve the effectiveness of treatments significantly.  ...  It also prevents the use of medical data as a tool for averting dangers for the public good.  ... 
doi:10.2139/ssrn.3357990 fatcat:6bqhdvjt6zfstlweryjw75qjwm

Big Data in the Health Sector [chapter]

Sonja Zillner, Sabrina Neururer
2016 New Horizons for a Data-Driven Economy  
A major prerequisite for medical research is the possibility to integrate data from various different sources to obtain a longitudinal view of the patients' history.  ...  by semantic annotation; (2) data silos are conquered by means of efficient technologies for semantic data sharing and exchange; (3) technical means backed by legal frameworks ensure the regulated sharing  ... 
doi:10.1007/978-3-319-21569-3_10 fatcat:uhrwv4fdvffqjmw6xzioqswbae

Legal assessment tool (LAT): an interactive tool to address privacy and data protection issues for data sharing

Wolfgang Kuchinke, Christian Krauth, René Bergmann, Töresin Karakoyun, Astrid Woollard, Irene Schluender, Benjamin Braasch, Martin Eckert, Christian Ohmann
2016 BMC Medical Informatics and Decision Making  
Methods: We employed concepts from computer science to create legal requirement clusters that enable legal interoperability between databases for the areas of data protection, data security, Intellectual  ...  The results provided by LAT are based on an analysis of the data access and sharing conditions for different kinds of data of major databases in Europe.  ...  Acknowledgements We thank all members of the BioMedBridges Use Case groups for providing valuable information about their databases, data repositories and their data bridges.  ... 
doi:10.1186/s12911-016-0325-0 pmid:27751180 pmcid:PMC5067915 fatcat:hwsom3x4wvfz5bvajhv7nuuyae

Recognition and Pseudonymization of Personal Data in Paper-Based Health Records [chapter]

Stefan Fenz, Johannes Heurix, Thomas Neubauer
2012 Lecture Notes in Business Information Processing  
This data has to be stored for decades due to legal reasons but is of no benefit for research organizations, as the unstructured medical data in paper-based health records cannot be efficiently used for  ...  This paper presents the MEDSEC system for the recognition and pseudonymization of personal data in paper-based health records.  ...  The research was funded by BRIDGE (#824884) and by COMET K1, FFG -Austrian Research Promotion Agency.  ... 
doi:10.1007/978-3-642-30359-3_14 fatcat:in7gvmsphfa4nb5xagxlmjn5gq

Blockchain Native Data Linkage

James Cunningham, Gail Davidge, Nigel Davies, Sarah Devaney, Søren Holm, Mike Harding, Gary Leeming, Victoria Neumann, John Ainsworth
2021 Frontiers in Blockchain  
Data providers holding sensitive medical data often need to exchange data pertaining to patients for whom they hold particular data.  ...  However, revealing the superset of identifiers for which a provider requires information can, in itself, leak sensitive private data.  ...  In the medical field in particular blockchain technologies have found legitimate use in a number of areas.  ... 
doi:10.3389/fbloc.2021.667388 doaj:36adf4aefad54139aec628e3f9b8e3c5 fatcat:p65tvk2csrg2jdbxmkpogr4dta

Data Protection and Ethics Requirements for Multisite Research with Health Data: A Comparative Examination of Legislative Governance Frameworks and the Role of Data Protection Technologies*

James Scheibner, Marcello Ienca, Sotiria Kechagia, Juan Ramon Troncoso-Pastoriza, Jean Louis Raisaro, Jean-Pierre Hubaux, Jacques Fellay, Effy Vayena
2020 Journal of Law and the Biosciences  
Accordingly, we adopt a comparative approach using the concept of data accessibility when examining data protection and research ethics laws in seven jurisdictions.  ...  Our paper then identifies the most significant regulatory barriers to the sharing of health-related data for multisite research.  ...  natural or legal responsible for processing the data at the request of the data controller Data custodian The natural or legal person responsible for handling or holding the data Data subject The natural  ... 
doi:10.1093/jlb/lsaa010 pmid:32733683 pmcid:PMC7381977 fatcat:2ssgfjrzhva3zevybhhndvofk4
« Previous Showing results 1 — 15 out of 8,093 results