2020
DOI: 10.1016/j.ijmedinf.2020.104123
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation framework for automatic privacy auditing tools for hospital data breach detections: A case study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…Yesmin et al [16] deal with the privacy of patients' data in terms of the interoperability of systems and the employees' access to information. Also, they tell us that there is no framework for evaluating privacy audit tools in hospitals yet.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Yesmin et al [16] deal with the privacy of patients' data in terms of the interoperability of systems and the employees' access to information. Also, they tell us that there is no framework for evaluating privacy audit tools in hospitals yet.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, the authors exposed user data principles as: sensitivity, privacy and protection, breaches precaution, ethics. The study of Yesmin and Carter [16] was concerned about the patient data through authorized and unauthorized access. The authors developed a framework that audits this access, although the study was limited as real patient information could not validate the tool.…”
Section: Related Workmentioning
confidence: 99%
“…It also states that data sensitivity classification is contextual; data protection and privacy are important and must be maintained even in times of crisis; information leaks are inevitable, so organizations should always protect themselves; ethics in data manipulation is mandatory for more efficient analysis. The work of [13] deals with the privacy of patients' data in terms of the interoperability of systems and the employees' access to information. In addition, it tells us that there is no framework for evaluating privacy audit tools in hospitals yet.…”
Section: Related Workmentioning
confidence: 99%
“…The encryption application meant to protect the data was found in the works of [14], [15] and [13]. The related works did not contain any direct mention of it; instead, it was briefly cited in [13]. The privacy application in the user profile is cited by all related works.…”
Section: Related Workmentioning
confidence: 99%