Can Transparency Enhancing Tools Support Patient's Accessing Electronic Health Records?

被引:5
作者
Ferreira, Ana [1 ,2 ]
Lenzini, Gabriele [2 ]
机构
[1] Univ Luxembourg, Inst Cognit Sci & Assessment, Luxembourg, Luxembourg
[2] Univ Luxembourg, Interdisciplinary Ctr Secur Reliabil & Trust, Luxembourg, Luxembourg
来源
NEW CONTRIBUTIONS IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1, PT 1 | 2015年 / 353卷
关键词
transparency enhancing tools; electronic health records; security and privacy; PRIVACY; INFORMATION;
D O I
10.1007/978-3-319-16486-1_111
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Patients that access their health records take more care of their health and, when in therapy, commit more seriously to improve their condition. This leads to a more effective and more efficient healthcare management, and is also in agreement with European directives on data protection. However, accessing medical data can be risky. Security should be assured and it should be evident to the patients, who has access to what data and any violation to patient's privacy requirements should be reported. We call this property transparency. Precisely this work looks into the Transparency Enhancing Tools that have been proposed to increase people's awareness about security and privacy on the Internet, and discusses to which extent these tools can empower transparency in healthcare.
引用
收藏
页码:1121 / 1132
页数:12
相关论文
共 27 条
[1]  
Ardagna C., 2007, DIGITAL PRIVACY O, P307
[2]  
Augusto AB, 2012, IFIP ADV INF COMM TE, V376, P61
[3]   Access to EHR and access control at a moment in the past: a discussion of the need and an exploration of the consequences [J].
Bakker, B .
INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2004, 73 (03) :267-270
[4]   Patient access to complex chronic disease records on the Internet [J].
Bartlett, Cherry ;
Simpson, Keith ;
Turner, A. Neil .
BMC MEDICAL INFORMATICS AND DECISION MAKING, 2012, 12
[5]   Transforming patient and family access to medical information: utilisation patterns of a patient-accessible electronic health record [J].
Burke, Redmond P. ;
Rossi, Anthony F. ;
Wilner, Bryan R. ;
Hannan, Robert L. ;
Zabinsky, Jennifer A. ;
White, Jeffrey A. .
CARDIOLOGY IN THE YOUNG, 2010, 20 (05) :477-484
[6]   Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing [J].
Erkin, Zekeriya ;
Veugen, Thijs ;
Toft, Tomas ;
Lagendijk, Reginald L. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) :1053-1066
[7]  
Ferreira A., 2014, IEEE 3 INT C SER GAM
[8]   How to securely break into RBAC: the BTG-RBAC model [J].
Ferreira, Ana ;
Chadwick, David ;
Farinha, Pedro ;
Correia, Ricardo ;
Zao, Gansen ;
Chilro, Rui ;
Antunes, Luis .
25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, :23-+
[9]  
Ferreira A, 2007, STUD HEALTH TECHNOL, V127, P77
[10]  
H. S. T. Committee, 2010, HL7 ROL BAS ACC CONT