메뉴 건너뛰기




Volumn 8, Issue 3, 2016, Pages 1560-1580

Privacy and security in the era of digital health: What should translational researchers know and do about it?

Author keywords

Confidentiality; Cyber security; Digital health; Privacy; Translational research

Indexed keywords

AWARENESS; HUMAN; INTERNET; PRIVACY; RESPONSIBILITY; SCIENTIST;

EID: 84964467416     PISSN: None     EISSN: 19438141     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (137)

References (47)
  • 1
    • 84964502713 scopus 로고    scopus 로고
    • SMAC (social, mobile, analytics and cloud) definition
    • Rouse M. SMAC (social, mobile, analytics and cloud) definition. TechTarget 2014.
    • (2014) TechTarget
    • Rouse, M.1
  • 3
    • 67249143791 scopus 로고    scopus 로고
    • Empirical analysis and statistical modeling of attack processes based on honeypots. Ieee/ifip international conference on dependable systems and networks (dsn-2006)
    • Kaâniche M, Deswarte Y, Alata E, Dacier M and Nicomette V. Empirical analysis and statistical modeling of attack processes based on honeypots. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2006), Workshop on Empirical Evaluation of Dependability and Security (WEEDS) 2006; 119-124.
    • (2006) Workshop on Empirical Evaluation of Dependability and Security (WEEDS) , pp. 119-124
    • Kaâniche, M.1    Deswarte, Y.2    Alata, E.3    Dacier, M.4    Nicomette, V.5
  • 10
    • 84964458676 scopus 로고    scopus 로고
    • http://www.justice.gov 2015.
    • (2015)
  • 14
    • 85091527007 scopus 로고    scopus 로고
    • Exploring the far side of mobile health: Information security and privacy of mobile health apps on ios and android
    • Dehling T, Gao F, Schneider S and Sunyaev A. Exploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Apps on iOS and Android. JMIR mHealth and uHealth 2015; 3: e8.
    • (2015) JMIR Mhealth and Uhealth , vol.3 , pp. 8
    • Dehling, T.1    Gao, F.2    Schneider, S.3    Sunyaev, A.4
  • 16
    • 84964548216 scopus 로고    scopus 로고
    • State of Mobile App Security. 2014.
    • (2014)
  • 19
    • 84964414849 scopus 로고    scopus 로고
    • We can track you if you take the metro: Tracking metro riders using accelerometers on smartphones
    • Hua J, Shen Z and Zhong S. We Can Track You If You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones. arXiv preprint arXiv: 1505.05958 2015.
    • (2015) Arxiv Preprint Arxiv , vol.1505 , pp. 05958
    • Hua, J.1    Shen, Z.2    Zhong, S.3
  • 22
    • 84964540746 scopus 로고    scopus 로고
    • Vincent medical group
    • Substitute Notice-Email Phishing Incident St. Vincent Medical Group, Inc. 2014.
    • (2014) Inc
  • 23
    • 84964540734 scopus 로고    scopus 로고
    • Phishing scam breach compromises data of 39k
    • McCann E. Phishing scam breach compromises data of 39K. Health IT News 2015.
    • (2015) Health IT News
    • McCann, E.1
  • 24
    • 84964548192 scopus 로고    scopus 로고
    • Fake ssl certificates deployed across the internet
    • Mutton P. Fake SSL certificates deployed across the internet. NetCraft 2014.
    • (2014) Netcraft
    • Mutton, P.1
  • 26
    • 77950684579 scopus 로고    scopus 로고
    • Taming the blue beast: A survey of bluetooth-based threats
    • Dunning JP. Taming the Blue Beast: A Survey of Bluetooth-Based Threats. IEEE Privacy and Security 2010; 20-27.
    • (2010) IEEE Privacy and Security , pp. 20-27
    • Dunning, J.P.1
  • 28
    • 84964442818 scopus 로고    scopus 로고
    • Wifi experiment shows just how unsafe wifi “hotspots” can be
    • DaSilva J. WiFi experiment shows just how unsafe WiFi “hotspots” can be. Spot on Networks 2015.
    • (2015) Spot on Networks
    • Dasilva, J.1
  • 29
    • 84964504202 scopus 로고    scopus 로고
    • Information-centric security
    • Rouse M. Information-Centric Security. Tech Target 2012.
    • (2012) Tech Target
    • Rouse, M.1
  • 31
    • 84964566434 scopus 로고    scopus 로고
    • http://www.splashdata.com 2015.
    • (2015)
  • 33
    • 78049416058 scopus 로고    scopus 로고
    • Gartner: Seven cloud-computing security risks
    • Brodkin J. Gartner: Seven cloud-computing security risks. Network World 2008.
    • (2008) Network World
    • Brodkin, J.1
  • 37
    • 84919600992 scopus 로고    scopus 로고
    • Nih policy supports broader sharing of genomic data, strengthens informed-consent rules: Research participants must give consent for secondary sharing, even if data are de-identified
    • NIH policy supports broader sharing of genomic data, strengthens informed-consent rules: research participants must give consent for secondary sharing, even if data are de-identified. Am J Med Genet A 2015; 167a: viii-ix.
    • (2015) Am J Med Genet A , vol.167a , pp. viii-ix
  • 38
    • 82555187188 scopus 로고    scopus 로고
    • A systematic review of re-identification attacks on health data
    • Emam KE, Jonker E, Arbuckle L and Malin B. A systematic review of re-identification attacks on health data. PLoS One 2011; 6: e28071.
    • (2011) Plos One , vol.6
    • Emam, K.E.1    Jonker, E.2    Arbuckle, L.3    Malin, B.4
  • 39
    • 82555187188 scopus 로고    scopus 로고
    • A systematic review of re-identification attacks on health data
    • El Emam K, Jonker E, Arbuckle L and Malin B. A systematic review of re-identification attacks on health data. PLoS One 2011; 6: e28071.
    • (2011) Plos One , vol.6
    • El Emam, K.1    Jonker, E.2    Arbuckle, L.3    Malin, B.4
  • 40
    • 84877287784 scopus 로고    scopus 로고
    • Genomic biomarkers for personalized medicine: Development and validation in clinical studies
    • Matsui S. Genomic biomarkers for personalized medicine: development and validation in clinical studies. Comput Math Methods Med 2013; 2013: 865980.
    • (2013) Comput Math Methods Med , vol.865 , Issue.980 , pp. 2013
    • Matsui, S.1
  • 41
    • 84964548353 scopus 로고    scopus 로고
    • Matching known patients to health records in washington state data. Dataprivacy
    • Sweeney L. Matching Known Patients to Health Records in Washington State Data. DataPrivacy. org 2013.
    • (2013) Org
    • Sweeney, L.1
  • 44
    • 84938572122 scopus 로고    scopus 로고
    • Choosing blindly but wisely: Differentially private solicitation of dna datasets for disease marker discovery
    • Zhao Y, Wang X, Jiang X, Ohno-Machado L and Tang H. Choosing blindly but wisely: differentially private solicitation of DNA datasets for disease marker discovery. J Am Med Inform Assoc 2015; 22: 100-8.
    • (2015) J am Med Inform Assoc , vol.22 , pp. 100-108
    • Zhao, Y.1    Wang, X.2    Jiang, X.3    Ohno-Machado, L.4    Tang, H.5
  • 45
    • 84964435554 scopus 로고    scopus 로고
    • The significance of president obama’s precision medicine initiative
    • Daniel GW and Romine M. The significance of President Obama’s Precision Medicine Initiative. Brookings 2915.
    • Brookings
    • Daniel, G.W.1    Romine, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.