메뉴 건너뛰기




Volumn 1, Issue 2, 2010, Pages 12-23

Privacy challenges in the use of eHealth systems for Public Health management

Author keywords

Anonymity; Data mining; EHealth; Privacy; Privacy challenges; Public health; Surveillance

Indexed keywords


EID: 84872974719     PISSN: 1947315X     EISSN: 19473168     Source Type: Journal    
DOI: 10.4018/jehmc.2010040102     Document Type: Article
Times cited : (17)

References (26)
  • 2
    • 33947623659 scopus 로고    scopus 로고
    • Social, ethical and legal barriers to EHealth
    • doi:10.1016/j.ijmedinf.2006.09.016
    • Anderson, J. G. (2007). Social, ethical and legal barriers to EHealth. International Journal of Medical Informatics, 76(5-6), 480-483. doi:10.1016/j.ijmedinf.2006.09.016
    • (2007) International Journal of Medical Informatics , vol.76 , Issue.5-6 , pp. 480-483
    • Anderson, J.G.1
  • 3
    • 39049122747 scopus 로고    scopus 로고
    • Privacy and security in public health: Maintaining the delicate balance between personal privacy and population safety
    • Washington, DC: IEEE
    • Baker, D. B. (2006). Privacy and Security in Public Health: Maintaining the Delicate Balance between Personal Privacy and Population Safety. In Proceedings of the 22nd Annual Computer Security Applications Conference (Vol. 12, No. 1, pp. 3-22). Washington, DC: IEEE.
    • (2006) Proceedings of the 22nd Annual Computer Security Applications Conference , vol.12 , Issue.1 , pp. 3-22
    • Baker, D.B.1
  • 6
    • 0033464665 scopus 로고    scopus 로고
    • Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation
    • doi:10.1287/orsc.10.1.104
    • Culnan, M., & Armstrong, P. (1999). Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organization Science, 10(1), 104-115. doi:10.1287/orsc.10.1.104
    • (1999) Organization Science , vol.10 , Issue.1 , pp. 104-115
    • Culnan, M.1    Armstrong, P.2
  • 8
    • 7744226711 scopus 로고
    • Privacy: A rational context
    • Erman, M. D., Williams, M. B., & Gutierrez, C. (Eds.), New York: Oxford University Press
    • Fried, C. (1990). Privacy: A Rational Context. In Erman, M. D., Williams, M. B., & Gutierrez, C. (Eds.), Computers, Ethics & Society. New York: Oxford University Press.
    • (1990) Computers, Ethics & Society
    • Fried, C.1
  • 9
    • 0037749111 scopus 로고    scopus 로고
    • Harris Interactive Inc, Hackensack, NJ: Privacy & American Business
    • Harris Interactive Inc. (2002). Privacy On and Off the Internet: What Consumers Want. Hackensack, NJ: Privacy & American Business.
    • (2002) Privacy on and off the Internet: What Consumers Want
  • 11
    • 33947697872 scopus 로고    scopus 로고
    • The guideline of the personal health data structure to secure safety healthcare: The balance between use and protection to satisfy the patients' needs
    • doi:10.1016/j.ijmedinf.2006.09.005
    • Ishikawa, K. (2007). The guideline of the personal health data structure to secure safety healthcare: The balance between use and protection to satisfy the patients' needs. International Journal of Medical Informatics, 76(5-6), 480-483. doi:10.1016/j.ijmedinf.2006.09.005
    • (2007) International Journal of Medical Informatics , vol.76 , Issue.5-6 , pp. 480-483
    • Ishikawa, K.1
  • 12
    • 60049086085 scopus 로고    scopus 로고
    • Privacy interests in prescription data, Part 1: Prescriber Privacy
    • doi:10.1109/MSP.2009.14
    • Kosseim, P. (2009). Privacy interests in prescription data, Part 1: Prescriber Privacy. IEEE Security & Privacy, 7(1), 72-76. doi:10.1109/MSP.2009.14
    • (2009) IEEE Security & Privacy , vol.7 , Issue.1 , pp. 72-76
    • Kosseim, P.1
  • 13
    • 39449106296 scopus 로고    scopus 로고
    • A cryptographic key management solution for HIPAA privacy/security regulations
    • doi:10.1109/TITB.2007.906101
    • Lee, W.-B., & Lee, C.-D. (2008). A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations. IEEE Transactions on Information Technology in Biomedicine, 12(1), 34-41. doi:10.1109/TITB.2007. 906101
    • (2008) IEEE Transactions on Information Technology in Biomedicine , vol.12 , Issue.1 , pp. 34-41
    • Lee, W.-B.1    Lee, C.-D.2
  • 14
    • 34447262334 scopus 로고    scopus 로고
    • A computational model to protect patient data from location-based re-identification
    • doi:10.1016/j.artmed.2007.04.002
    • Malin, B. (2007). A computational model to protect patient data from location-based re-identification. Artificial Intelligence in Medicine, 40, 223-239. doi:10.1016/j.artmed.2007.04.002
    • (2007) Artificial Intelligence in Medicine , vol.40 , pp. 223-239
    • Malin, B.1
  • 15
    • 0029381514 scopus 로고
    • Data management issues for emerging diseases and new tools for managing,surveillance and laboratory data
    • doi:10.3201/eid0104.950403
    • Martin, S. M., & Bean, N. H. (1995). Data management issues for emerging diseases and new tools for managing,surveillance and laboratory data. Emerging Infectious Diseases, 1(4). doi:10.3201/eid0104.950403
    • (1995) Emerging Infectious Diseases , vol.1 , Issue.4
    • Martin, S.M.1    Bean, N.H.2
  • 17
    • 84976793562 scopus 로고
    • Values, personal information privacy, and regulatory approaches
    • doi:10.1145/219663.219683
    • Milberg, S. J., Burke, S. J., Smith, H. J., & Kallman, E. A. (1995). Values, Personal Information Privacy, and Regulatory Approaches. Communications of the ACM, 38, 65-74. doi:10.1145/219663.219683
    • (1995) Communications of the ACM , vol.38 , pp. 65-74
    • Milberg, S.J.1    Burke, S.J.2    Smith, H.J.3    Kallman, E.A.4
  • 19
    • 0042923706 scopus 로고    scopus 로고
    • Towards a theory of privacy in the information age
    • doi:10.1145/270858.270866
    • Moor, J. H. (1997). Towards a theory of privacy in the information age. ACM SIGCAS Computers and Society, 27, 27-32. doi:10.1145/270858.270866
    • (1997) ACM SIGCAS Computers and Society , vol.27 , pp. 27-32
    • Moor, J.H.1
  • 21
    • 0008144259 scopus 로고    scopus 로고
    • Anonymity, unobservability and pseudonymity: A Proposal for Terminology
    • Federrath, H. (Ed.), New York: Springer Verlag
    • Pfitzmann, A., & Hansen, M. (2000). Anonymity, unobservability and pseudonymity: A Proposal for Terminology. In Federrath, H. (Ed.), Designing Privacy enhancing technologies. New York: Springer Verlag.
    • (2000) Designing Privacy Enhancing Technologies
    • Pfitzmann, A.1    Hansen, M.2
  • 24
    • 68749118482 scopus 로고    scopus 로고
    • Are electronic health records ready for genomic medicine?
    • doi:10.1097/GIM.0b013e3181a53331
    • Scheuner, M. T. (2009). Are electronic health records ready for genomic medicine? Genetics in Medicine, 11(7), 510-517. doi:10.1097/GIM.0b013e3181a53331
    • (2009) Genetics in Medicine , vol.11 , Issue.7 , pp. 510-517
    • Scheuner, M.T.1
  • 25
    • 52149113254 scopus 로고    scopus 로고
    • Philosophical theories of privacy: Implications for an adequate online privacy policy
    • doi:10.1111/j.1467-9973.2006.00474.x
    • Tavani, H. T. (2007). Philosophical theories of privacy: Implications for an adequate online privacy policy. Metaphilosophy, 38(1), 1-11. doi:10.1111/j.1467-9973.2006.00474.x
    • (2007) Metaphilosophy , vol.38 , Issue.1 , pp. 1-11
    • Tavani, H.T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.