2005
DOI: 10.1016/j.ijmedinf.2004.03.008
|View full text |Cite
|
Sign up to set email alerts
|

Privacy protection for clinical and genomic data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2007
2007
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…In light of recent work suggesting that people prefer to withhold information from medical professionals in the presence of security concerns [ 34 ], it is essential to identify ways to ensure both meaningful use of health information and trustworthy sharing practices that safeguard patient privacy. Priorities for further exploration and practical application might include: privacy by design principles that incorporate privacy protection in the design stage, rather than viewing it as an add-on requirement [ 57 ], privacy enhancing techniques [ 58 ], differential mechanisms that enhance de-identification in database searches [ 59 , 60 ], dynamic context-aware policies [ 61 ], purpose-based policies [ 62 ] and notification of privacy breaches to data subjects [ 63 ]. Patient control and choice could also be increased through the use of dynamic informed consent and revocation options, formally allowing nuanced preference management as part of EHR systems [ 64 ].…”
Section: Discussionmentioning
confidence: 99%
“…In light of recent work suggesting that people prefer to withhold information from medical professionals in the presence of security concerns [ 34 ], it is essential to identify ways to ensure both meaningful use of health information and trustworthy sharing practices that safeguard patient privacy. Priorities for further exploration and practical application might include: privacy by design principles that incorporate privacy protection in the design stage, rather than viewing it as an add-on requirement [ 57 ], privacy enhancing techniques [ 58 ], differential mechanisms that enhance de-identification in database searches [ 59 , 60 ], dynamic context-aware policies [ 61 ], purpose-based policies [ 62 ] and notification of privacy breaches to data subjects [ 63 ]. Patient control and choice could also be increased through the use of dynamic informed consent and revocation options, formally allowing nuanced preference management as part of EHR systems [ 64 ].…”
Section: Discussionmentioning
confidence: 99%
“…is approach relies on generators to generate high-quality training data points; therefore, it performs poorly in complex datasets [6]. Phan et al combined a deep encoder with various privacy techniques, adding a global sensitivity computing layer to the encoder based on a gradient descent approach to provide optimal perturbation parameters and then fine-tuning model parameters using a back-propagation algorithm [7].…”
Section: Introductionmentioning
confidence: 99%
“…Data security and patient confidentiality is fundamental to this study. Stringent privacy protections guiding the release and use of the data are in place using pseudonymization (use of pseudo-identities to replace true individuals' identities) [63][64]. Only de-identified data are requested for this study.…”
Section: Resultsmentioning
confidence: 99%