Results 31 to 40 of about 73,868 (305)
VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance
Voice over the Internet Protocol (VoIP) systems such as Adobe ConnectNow, Skype, ooVoo, etc. may include the use of software applications for telerehabilitation (TR) therapy that can provide voice and video teleconferencing between patients and ...
Valerie J.M. Watzlaf +2 more
doaj +1 more source
AI Powered Biobanks From Static Archives to Dynamic Discovery Engines
Large language models (LLMs) provide a potential framework for transforming biobanks from static data repositories into intelligent discovery engines. By enabling unified representation and analysis of multimodal biomedical data, LLM‐based systems facilitate dynamic risk prediction, biomarker identification, and mechanistic interpretation, thereby ...
Wenzhen Yin +5 more
wiley +1 more source
Healthcare systems and applications are increasingly used to improve patient care. However, these applications face data security, privacy, and regulatory compliance challenges.
Farah Elkourdi +4 more
doaj +1 more source
Electronic Prescribing and HIPAA Privacy Regulation
Electronic prescribing offers the prospect of safer medication management, but fulfillment of that promise depends on ready access to personal health information from many sources, thus raising new concerns about information privacy and security. Federal
Michael D. Greenberg +2 more
doaj +1 more source
Storing and Using Health Data in a Virtual Private Cloud
Electronic health records are being adopted at a rapid rate due to increased funding from the US federal government. Health data provide the opportunity to identify possible improvements in health care delivery by applying data mining and statistical ...
Regola, Nathan, Chawla, Nitesh V
doaj +1 more source
Modifications to Health Insurance Portability and Accountability Act (HIPAA) have allowed for the disclosure of patient protected health information (PHI) for the purpose of hospital fundraising.
Uma V Mahajan BS +3 more
doaj +1 more source
Double Secret Protection: Bridging Federal and State Law To Protect Privacy Rights for Telemental and Mobile Health Users [PDF]
Mental health care in the United States is plagued by stigma, cost, and access issues that prevent many people from seeking and continuing treatment for mental health conditions. Emergent technology, however, may offer a solution.
Sherman, Josh
core +1 more source
Raising the visibility of protected data: A pilot data catalog project [PDF]
Sharing research data that is protected for legal, regulatory, or contractual reasons can be challenging and current mechanisms for doing so may act as barriers to researchers and discourage data sharing.
Coates, Heather L., Foster, Erin D.
core
Standardization of guidelines for patient photograph deidentification [PDF]
IMPORTANCE: This work was performed to advance patient care by protecting patient anonymity. OBJECTIVES: This study aimed to analyze the current practices used in patient facial photograph deidentification and set forth standardized guidelines for ...
Roberts, Erik +2 more
core +2 more sources
AI‐Driven Cancer Multi‐Omics: A Review From the Data Pipeline Perspective
The exponential growth of cancer multi‐omics data brings opportunities and challenges for precision oncology. This review systematically examines AI's role in addressing these challenges, covering generative models, integration architectures, Explainable AI for clinical trust, clinical applications, and key directions for clinical translation.
Shilong Liu, Shunxiang Li, Kun Qian
wiley +1 more source

