Search Articles

View query in Help articles search

Search Results (1 to 10 of 248 Results)

Download search results: CSV END BibTex RIS

CSV download: Download all 248 search results (up to 5,000 articles maximum)

Privacy-by-Design Approach to Generate Two Virtual Clinical Trials for Multiple Sclerosis and Release Them as Open Datasets: Evaluation Study

Privacy-by-Design Approach to Generate Two Virtual Clinical Trials for Multiple Sclerosis and Release Them as Open Datasets: Evaluation Study

However, there is concern about privacy leakage due to the individual granularity of synthetic datasets [18-20]. Hence, there is a growing demand to explicitly assess privacy using quantitative metrics [11,21]. The field of virtual RCTs originally aimed to simulate the effect of new treatments with individual-level modeling [22].

Stanislas Demuth, Olivia Rousseau, Igor Faddeenkov, Julien Paris, Jérôme De Sèze, Béatrice Baciotti, Marianne Payet, Morgan Guillaudeux, Alban-Félix Barreteau, David Laplaud, Gilles Edan, Pierre-Antoine Gourraud

J Med Internet Res 2025;27:e71297


Synthetic Tabular Data Generation Under Horizontal Federated Learning Environments in Acute Myeloid Leukemia: Case-Based Simulation Study

Synthetic Tabular Data Generation Under Horizontal Federated Learning Environments in Acute Myeloid Leukemia: Case-Based Simulation Study

In this sense, it is important to mention differential privacy (DP), which is a technique that ensures the privacy of individuals by adding random noise to the data, making it nearly impossible to determine whether any individual’s data is included in a dataset or not.

Imanol Isasa, Mikel Catalina, Gorka Epelde, Naiara Aginako, Andoni Beristain

JMIR Med Inform 2025;13:e74116


Acceptability of Active and Passive Data Collection Methods for Mobile Health Research: Cross-Sectional Survey of an Online Adult Sample in the United States

Acceptability of Active and Passive Data Collection Methods for Mobile Health Research: Cross-Sectional Survey of an Online Adult Sample in the United States

Critical to understanding mechanisms driving willingness to share various data streams are concerns about data privacy, security, and control over generated data [3, 5]Once the data are collected, different members of a research team, often across different institutions, work with deidentified versions of the datasets. In some cases, data are stored indefinitely for algorithm development—seeking new purposes or uses for the data that were not originally considered.

Nelson Roque, John Felt

JMIR Form Res 2025;9:e64082


Physician Use of Large Language Models: A Quantitative Study Based on Large-Scale Query-Level Data

Physician Use of Large Language Models: A Quantitative Study Based on Large-Scale Query-Level Data

This allowed us to assess the risks of privacy breaches and identify specific instances where breaches may occur. We obtained permission from the Xiamen Moniu Investment Company to use their dataset for our secondary data analysis. At the time of data collection, the company obtained informed consent from all participants, and all records were subsequently anonymized to safeguard privacy and confidentiality. Participants received complimentary access to the Gen AI tool as compensation.

Lin Qiu, Chuang Tang, Xuan Bi, Gordon Burtch, Yanmin Chen, Heping Zhang

J Med Internet Res 2025;27:e76941


Determinants of Continuous Smartwatch Use and Data-Sharing Preferences With Physicians, Public Health Authorities, and Private Companies: Cross-Sectional Survey of Smartwatch Users

Determinants of Continuous Smartwatch Use and Data-Sharing Preferences With Physicians, Public Health Authorities, and Private Companies: Cross-Sectional Survey of Smartwatch Users

Concerns regarding privacy, data breaches, and trust in data-handling entities play crucial roles for end users in shaping their comfort levels [14,15]. Data sharing in health care has been investigated through several studies [16-19]. However, as technology continues to evolve and play a more dominant role in society, it is reasonable to expect attitudes to change.

Anthony James Goodings, Kayode Philip Fadahunsi, Derjung M Tarn, Jennifer Lutomski, Allison Chhor, Frances Shiely, Patrick Henn, John O'Donoghue

J Med Internet Res 2025;27:e67414


A Sociotechnical Approach to Bring-Your-Own-Device Security in Hospitals: Development and Pilot Testing of a Maturity Model Using Mixed Methods Action Research

A Sociotechnical Approach to Bring-Your-Own-Device Security in Hospitals: Development and Pilot Testing of a Maturity Model Using Mixed Methods Action Research

The selection process was facilitated through nominations from the hospital’s chief privacy officer to ensure the inclusion of individuals with relevant expertise and diverse perspectives. The criteria for participant selection included the following. IT professionals, cybersecurity managers, and policy makers responsible for BYOD decision-making, such as developing or implementing BYOD security strategies.

Tafheem Ahmad Wani, Antonette Mendoza, Kathleen Gray

JMIR Hum Factors 2025;12:e71912


Federated Analysis With Differential Privacy in Oncology Research: Longitudinal Observational Study Across Hospital Data Warehouses

Federated Analysis With Differential Privacy in Oncology Research: Longitudinal Observational Study Across Hospital Data Warehouses

Indeed, several privacy attacks [6,7] have been proposed to exploit common statistical analysis results and disclose private information. To mitigate these attacks, differential privacy (DP) can be used in combination with FA to provide stronger privacy guarantees. DP [8,9] is a method for computing statistical analyses on a sensitive dataset in such a way that the results do not compromise the privacy of the initial raw data.

Théo Ryffel, Perrine Créquit, Maëlle Baillet, Jason Paumier, Yasmine Marfoq, Olivier Girardot, Thierry Chanet, Ronan Sy, Louise Bayssat, Julien Mazières, Vincent Vuiblet, Julien Ancel, Maxime Dewolf, François Margraff, Camille Bachot, Jacek Chmiel

JMIR Med Inform 2025;13:e59685


Exploring the Barriers and Facilitators to Implementing a Smartphone App for Physicians to Improve the Management of Acute Myocardial Infarctions: Multicenter, Mixed Methods, Observational Study

Exploring the Barriers and Facilitators to Implementing a Smartphone App for Physicians to Improve the Management of Acute Myocardial Infarctions: Multicenter, Mixed Methods, Observational Study

App needs to work well App not working App requires redownloading Biometric authentication Log-in and password issues App data security App not working App registration process Backup option needed in case app fails Cell signal issues Concerns over alignment of app with privacy standards Patient data privacy Reliability of app technology Speed of ECGc transmission Technology failure User log-in and password issues Wi-Fi signal issues App data security App not working Backup option needed in case app fails Cell

Katelyn J Cullen, Hassan Mir, Madhu K Natarajan, Marija Corovic, Karen Mosleh, Jacob Crawshaw, Mathew Mercuri, Hassan Masoom, JD Schwalm

JMIR Mhealth Uhealth 2025;13:e60173


School-Based Online Surveillance of Youth: Systematic Search and Content Analysis of Surveillance Company Websites

School-Based Online Surveillance of Youth: Systematic Search and Content Analysis of Surveillance Company Websites

Under the Family Educational Rights and Privacy Act, schools can legally provide identifiable student information to contractors to perform school personnel functions [18]. Large language models can analyze a large amount of student online activity (ie, emails, web searches, direct messages, or private social media browsing and posting) if school administrators give that level of access to student data to online surveillance companies.

Alison O'Daffer, Wendy Liu, Cinnamon S Bloss

J Med Internet Res 2025;27:e71998


Responsible Governance of Tribal Public Health Data: Data Sharing Ethics and Common Challenges in the US Public Health System

Responsible Governance of Tribal Public Health Data: Data Sharing Ethics and Common Challenges in the US Public Health System

Even with limited access to local, state, and federal public health data systems, tribal public health authorities were able to carry out significant actions to protect the health of their communities during the COVID-19 pandemic and protect individuals most at risk of infection while respecting their privacy rights, pursuant to the Health Information Portability and Accountability Act (HIPAA) [6].

Alec J Calac, Luis R Gasca, William H Swain

J Med Internet Res 2025;27:e77249