Search Articles

View query in Help articles search

Search Results (1 to 10 of 3107 Results)

Download search results: END BibTex RIS


Mobile Health Systems for Community-Based Primary Care: Identifying Controls and Mitigating Privacy Threats

Mobile Health Systems for Community-Based Primary Care: Identifying Controls and Mitigating Privacy Threats

To answer this question, a Privacy Impact Assessment (PIA) framework is chosen as a strategy for realizing privacy by design.

Leonardo Horn Iwaya, Simone Fischer-Hübner, Rose-Mharie Åhlfeldt, Leonardo A Martucci

JMIR Mhealth Uhealth 2019;7(3):e11642

Privacy-Preserving Patient Similarity Learning in a Federated Environment: Development and Analysis

Privacy-Preserving Patient Similarity Learning in a Federated Environment: Development and Analysis

and (3) how to preserve privacy while still allowing the computation of the patient representation and the search of similar patients across institutions?

Junghye Lee, Jimeng Sun, Fei Wang, Shuang Wang, Chi-Hyuck Jun, Xiaoqian Jiang

JMIR Med Inform 2018;6(2):e20

The Current State of Research, Challenges, and Future Research Directions of Blockchain Technology in Patient Care: Systematic Review

The Current State of Research, Challenges, and Future Research Directions of Blockchain Technology in Patient Care: Systematic Review

Due to legal requirements to preserve patient privacy and secure protected health information, health care data must also be safe and anonymous when stored.

Polina Durneva, Karlene Cousins, Min Chen

J Med Internet Res 2020;22(7):e18619

Reliability of Supervised Machine Learning Using Synthetic Data in Health Care: Model to Preserve Privacy for Data Sharing

Reliability of Supervised Machine Learning Using Synthetic Data in Health Care: Model to Preserve Privacy for Data Sharing

IntroductionBackgroundNational health care departments hold volumes of data on patients and the population, and this information is not being used to its full potential due to valid privacy concerns.

Debbie Rankin, Michaela Black, Raymond Bond, Jonathan Wallace, Maurice Mulvenna, Gorka Epelde

JMIR Med Inform 2020;8(7):e18910

Exploring the Privacy-Preserving Properties of Word Embeddings: Algorithmic Validation Study

Exploring the Privacy-Preserving Properties of Word Embeddings: Algorithmic Validation Study

in this paper, we showed that as no perfect PHI search algorithm exists, data secured this way can be exploited because traces of identities remain in the text and are detectable even in embeddings that are generated from it.Specifically, we discussed the privacy

Mohamed Abdalla, Moustafa Abdalla, Graeme Hirst, Frank Rudzicz

J Med Internet Res 2020;22(7):e18055

Cybersecurity Risks in a Pandemic

Cybersecurity Risks in a Pandemic

Services like Zoom currently do not offer end-to-end encryption, making it not truly HIPAA-compliant, even though the Department of Health and Human Services Office for Civil Rights has relaxed enforcement of HIPAA’s privacy rule during the COVID-19 pandemic

Christina Meilee Williams, Rahul Chaturvedi, Krishnan Chakravarthy

J Med Internet Res 2020;22(9):e23692

Enhancing Privacy Controls for Patients via a Selective Authentic Electronic Health Record Exchange Service: Qualitative Study of Perspectives by Medical Professionals and Patients

Enhancing Privacy Controls for Patients via a Selective Authentic Electronic Health Record Exchange Service: Qualitative Study of Perspectives by Medical Professionals and Patients

A well-acknowledged definition of privacy was provided by the German Constitutional Court, which defined privacy as the right to informational self-determination [1], allowing individuals to determine for themselves (and thereby control) what personal information

Ala Sarah Alaqra, Simone Fischer-Hübner, Erik Framner

J Med Internet Res 2018;20(12):e10954