Protecting Data Privacy in Health Services Research

Protecting Data Privacy in Health Services Research
Author: Institute of Medicine
Publisher: National Academies Press
Total Pages: 208
Release: 2001-01-13
Genre: Computers
ISBN: 0309071879

The need for quality improvement and for cost saving are driving both individual choices and health system dynamics. The health services research that we need to support informed choices depends on access to data, but at the same time, individual privacy and patient-health care provider confidentiality must be protected.

Beyond the HIPAA Privacy Rule

Beyond the HIPAA Privacy Rule
Author: Institute of Medicine
Publisher: National Academies Press
Total Pages: 334
Release: 2009-03-24
Genre: Computers
ISBN: 0309124999

In the realm of health care, privacy protections are needed to preserve patients' dignity and prevent possible harms. Ten years ago, to address these concerns as well as set guidelines for ethical health research, Congress called for a set of federal standards now known as the HIPAA Privacy Rule. In its 2009 report, Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research, the Institute of Medicine's Committee on Health Research and the Privacy of Health Information concludes that the HIPAA Privacy Rule does not protect privacy as well as it should, and that it impedes important health research.

Data Protection and Privacy in Healthcare

Data Protection and Privacy in Healthcare
Author: Ahmed Elngar
Publisher: CRC Press
Total Pages: 269
Release: 2021-03-09
Genre: Technology & Engineering
ISBN: 1000349314

The Healthcare industry is one of the largest and rapidly developing industries. Over the last few years, healthcare management is changing from disease centered to patient centered. While on one side the analysis of healthcare data plays an important role in healthcare management, but on the other side the privacy of a patient’s record must be of equal concern. This book uses a research-oriented approach and focuses on privacy-based healthcare tools and technologies. It offers details on privacy laws with real-life case studies and examples, and addresses privacy issues in newer technologies such as Cloud, Big Data, and IoT. It discusses the e-health system and preserving its privacy, and the use of wearable technologies for patient monitoring, data streaming and sharing, and use of data analysis to provide various health services. This book is written for research scholars, academicians working in healthcare and data privacy domains, as well as researchers involved with healthcare law, and those working at facilities in security and privacy domains. Students and industry professionals, as well as medical practitioners might also find this book of interest.

Registries for Evaluating Patient Outcomes

Registries for Evaluating Patient Outcomes
Author: Agency for Healthcare Research and Quality/AHRQ
Publisher: Government Printing Office
Total Pages: 385
Release: 2014-04-01
Genre: Medical
ISBN: 1587634333

This User’s Guide is intended to support the design, implementation, analysis, interpretation, and quality evaluation of registries created to increase understanding of patient outcomes. For the purposes of this guide, a patient registry is an organized system that uses observational study methods to collect uniform data (clinical and other) to evaluate specified outcomes for a population defined by a particular disease, condition, or exposure, and that serves one or more predetermined scientific, clinical, or policy purposes. A registry database is a file (or files) derived from the registry. Although registries can serve many purposes, this guide focuses on registries created for one or more of the following purposes: to describe the natural history of disease, to determine clinical effectiveness or cost-effectiveness of health care products and services, to measure or monitor safety and harm, and/or to measure quality of care. Registries are classified according to how their populations are defined. For example, product registries include patients who have been exposed to biopharmaceutical products or medical devices. Health services registries consist of patients who have had a common procedure, clinical encounter, or hospitalization. Disease or condition registries are defined by patients having the same diagnosis, such as cystic fibrosis or heart failure. The User’s Guide was created by researchers affiliated with AHRQ’s Effective Health Care Program, particularly those who participated in AHRQ’s DEcIDE (Developing Evidence to Inform Decisions About Effectiveness) program. Chapters were subject to multiple internal and external independent reviews.

Capturing Social and Behavioral Domains and Measures in Electronic Health Records

Capturing Social and Behavioral Domains and Measures in Electronic Health Records
Author: Institute of Medicine
Publisher: National Academies Press
Total Pages: 287
Release: 2015-01-08
Genre: Medical
ISBN: 0309312450

Determinants of health - like physical activity levels and living conditions - have traditionally been the concern of public health and have not been linked closely to clinical practice. However, if standardized social and behavioral data can be incorporated into patient electronic health records (EHRs), those data can provide crucial information about factors that influence health and the effectiveness of treatment. Such information is useful for diagnosis, treatment choices, policy, health care system design, and innovations to improve health outcomes and reduce health care costs. Capturing Social and Behavioral Domains and Measures in Electronic Health Records: Phase 2 identifies domains and measures that capture the social determinants of health to inform the development of recommendations for the meaningful use of EHRs. This report is the second part of a two-part study. The Phase 1 report identified 17 domains for inclusion in EHRs. This report pinpoints 12 measures related to 11 of the initial domains and considers the implications of incorporating them into all EHRs. This book includes three chapters from the Phase 1 report in addition to the new Phase 2 material. Standardized use of EHRs that include social and behavioral domains could provide better patient care, improve population health, and enable more informative research. The recommendations of Capturing Social and Behavioral Domains and Measures in Electronic Health Records: Phase 2 will provide valuable information on which to base problem identification, clinical diagnoses, patient treatment, outcomes assessment, and population health measurement.

Privacy, Confidentiality, and Health Research

Privacy, Confidentiality, and Health Research
Author: William W. Lowrance
Publisher: Cambridge University Press
Total Pages: 203
Release: 2012-06-21
Genre: Computers
ISBN: 1107020875

Examines how privacy, confidentiality, consent, identifiability, safeguards and data sharing affect the pursuit of health research for the common good.

Data Protection on the Move

Data Protection on the Move
Author: Serge Gutwirth
Publisher: Springer
Total Pages: 492
Release: 2016-01-09
Genre: Law
ISBN: 9401773769

This volume brings together papers that offer methodologies, conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. It is one of the results of the eight annual International Conference on Computers, Privacy, and Data Protection, CPDP 2015, held in Brussels in January 2015. The book explores core concepts, rights and values in (upcoming) data protection regulation and their (in)adequacy in view of developments such as Big and Open Data, including the right to be forgotten, metadata, and anonymity. It discusses privacy promoting methods and tools such as a formal systems modeling methodology, privacy by design in various forms (robotics, anonymous payment), the opportunities and burdens of privacy self management, the differentiating role privacy can play in innovation. The book also discusses EU policies with respect to Big and Open Data and provides advice to policy makers regarding these topics. Also attention is being paid to regulation and its effects, for instance in case of the so-called ‘EU-cookie law’ and groundbreaking cases, such as Europe v. Facebook. This interdisciplinary book was written during what may turn out to be the final stages of the process of the fundamental revision of the current EU data protection law by the Data Protection Package proposed by the European Commission. It discusses open issues and daring and prospective approaches. It will serve as an insightful resource for readers with an interest in privacy and data protection.

Research Anthology on Privatizing and Securing Data

Research Anthology on Privatizing and Securing Data
Author: Management Association, Information Resources
Publisher: IGI Global
Total Pages: 2188
Release: 2021-04-23
Genre: Computers
ISBN: 1799889556

With the immense amount of data that is now available online, security concerns have been an issue from the start, and have grown as new technologies are increasingly integrated in data collection, storage, and transmission. Online cyber threats, cyber terrorism, hacking, and other cybercrimes have begun to take advantage of this information that can be easily accessed if not properly handled. New privacy and security measures have been developed to address this cause for concern and have become an essential area of research within the past few years and into the foreseeable future. The ways in which data is secured and privatized should be discussed in terms of the technologies being used, the methods and models for security that have been developed, and the ways in which risks can be detected, analyzed, and mitigated. The Research Anthology on Privatizing and Securing Data reveals the latest tools and technologies for privatizing and securing data across different technologies and industries. It takes a deeper dive into both risk detection and mitigation, including an analysis of cybercrimes and cyber threats, along with a sharper focus on the technologies and methods being actively implemented and utilized to secure data online. Highlighted topics include information governance and privacy, cybersecurity, data protection, challenges in big data, security threats, and more. This book is essential for data analysts, cybersecurity professionals, data scientists, security analysts, IT specialists, practitioners, researchers, academicians, and students interested in the latest trends and technologies for privatizing and securing data.

Internet of Healthcare Things

Internet of Healthcare Things
Author: Kavita Sharma
Publisher: John Wiley & Sons
Total Pages: 308
Release: 2022-03-09
Genre: Science
ISBN: 1119791766

INTERNET OF HEALTHCARE THINGS The book addresses privacy and security issues providing solutions through authentication and authorization mechanisms, blockchain, fog computing, machine learning algorithms, so that machine learning-enabled IoT devices can deliver information concealed in data for fast, computerized responses and enhanced decision-making. The main objective of this book is to motivate healthcare providers to use telemedicine facilities for monitoring patients in urban and rural areas and gather clinical data for further research. To this end, it provides an overview of the Internet of Healthcare Things (IoHT) and discusses one of the major threats posed by it, which is the data security and data privacy of health records. Another major threat is the combination of numerous devices and protocols, precision time, data overloading, etc. In the IoHT, multiple devices are connected and communicate through certain protocols. Therefore, the application of emerging technologies to mitigate these threats and provide secure data communication over the network is discussed. This book also discusses the integration of machine learning with the IoHT for analyzing huge amounts of data for predicting diseases more accurately. Case studies are also given to verify the concepts presented in the book. Audience Researchers and industry engineers in computer science, artificial intelligence, healthcare sector, IT professionals, network administrators, cybersecurity experts.