Privacy and data security in E-health: Requirements from the user's perspective

被引:122
作者
Wilkowska, Wiktoria [1 ]
Ziefle, Martina [1 ]
机构
[1] Rhein Westfal TH Aachen, D-52062 Aachen, Germany
关键词
E-health; gender; medical assistive technologies; privacy; security; TECHNOLOGY; ACCEPTANCE; GENDER;
D O I
10.1177/1460458212442933
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
In this study two currently relevant aspects of using medical assistive technologies were addressed-security and privacy. In a two-step empirical approach that used focus groups (n = 19) and a survey (n = 104), users' requirements for the use of medical technologies were collected and evaluated. Specifically, we focused on the perceived importance of data security and privacy issues. Outcomes showed that both security and privacy aspects play an important role in the successful adoption of medical assistive technologies in the home environment. In particular, analysis of data with respect to gender, health-status and age (young, middle-aged and old users) revealed that females and healthy adults require, and insist on, the highest security and privacy standards compared with males and the ailing elderly.
引用
收藏
页码:191 / 201
页数:11
相关论文
共 29 条
[1]   Social, ethical and legal barriers to E-health [J].
Anderson, James G. .
INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2007, 76 (5-6) :480-483
[2]  
[Anonymous], 2006, P HUMAN FACTORS ERGO, DOI DOI 10.1177/154193120605000203
[3]  
[Anonymous], 1995, Diffusion of innovations
[4]  
Arning K, 2009, LECT NOTES COMPUT SC, V5889, P20
[5]  
Austad Steven N, 2006, Gend Med, V3, P79, DOI 10.1016/S1550-8579(06)80198-1
[6]   Challenges associated with privacy in health care industry: Implementation of HIPAA and the security rules [J].
Choi Y.B. ;
Capitan K.E. ;
Krause J.S. ;
Streeper M.M. .
Journal of Medical Systems, 2006, 30 (1) :57-64
[7]  
Corritore Cynthia L., 2011, E-Health, Assistive Technologies and Applications for Assisted Living: Challenges and Solutions, P49, DOI 10.4018/978-1-60960-469-1.ch003
[8]  
Cvrcek Dan, 2006, Proceedings of the 5th ACM workshop on privacy in electronic society, P109, DOI DOI 10.1145/1179601.1179621
[9]  
De Capitani di Vimercati Sabrina, 2011, Foundations of Security Analysis and Design VI. FOSAD Tutorial Lectures: LNCS 6858, P1, DOI 10.1007/978-3-642-23082-0_1
[10]  
Feith A., 2009, P INT S COMP COMM CO, P201