Results 21 to 30 of about 586,884 (284)

Analysis of patients’ privacy and associated factors in the perioperative period

open access: yesFrontiers in Medicine, 2023
BackgroundHealthcare professionals recognize how to protect patient privacy in order to effectively reduce the occurrence of conflict between the two parties.
Mingyang Tan, Hongyu Li, Xiaofei Wang
doaj   +1 more source

Density-Based Outlier Detection for Safeguarding Electronic Patient Record Systems

open access: yesIEEE Access, 2019
This paper concerns the detection of abnormal data usage and unauthorized access in large-scale critical networks, specifically healthcare infrastructures. Hospitals in the U.K.
Aaron J. Boddy   +3 more
doaj   +1 more source

Patient privacy and confidentiality

open access: yesBMJ, 2003
The NHS is engaged in a debate about what can and cannot be done legitimately with patients' data. On one hand, anxieties exist about who should have access to the data and for what purposes; on the other hand, requirements for more accountability, performance assessment, effective health protection, and efficient administration are increasing the need
Jim, Chalmers, Rod, Muir
openaire   +3 more sources

Patient-powered research networks: building capacity for conducting patient-centered clinical outcomes research. [PDF]

open access: yes, 2014
The Patient-Centered Outcomes Research Institute (PCORI) recently launched PCORnet to establish a single inter-operable multicenter data research network that will support observational research and randomized clinical trials.
Andrew A. Nierenberg   +24 more
core   +1 more source

Histopathological Image Retrieval Based on Asymmetric Residual Hash and DNA Coding

open access: yesIEEE Access, 2019
Histopathological image retrieval is a key technology for computer-aided diagnosis. However, patients are reluctant to reveal their privacy in histopathological image retrieval.
Shuli Cheng, Liejun Wang, Anyu Du
doaj   +1 more source

Googling Patients

open access: yesVoices in Bioethics, 2022
Photo by Christian Wiediger on Unsplash INTRODUCTION Huge amounts of public data on the internet and the ease with which we regularly search it have resulted in the phenomenon called Patient-Targeted Googling (PTG).
Emily Beer
doaj   +5 more sources

Standardization of guidelines for patient photograph deidentification [PDF]

open access: yes, 2016
IMPORTANCE: This work was performed to advance patient care by protecting patient anonymity. OBJECTIVES: This study aimed to analyze the current practices used in patient facial photograph deidentification and set forth standardized guidelines for ...
Roberts, Erik   +2 more
core   +2 more sources

Privacy-Preserving Patient Similarity Learning in a Federated Environment: Development and Analysis [PDF]

open access: yes, 2018
Background: There is an urgent need for the development of global analytic frameworks that can perform analyses in a privacy-preserving federated environment across multiple institutions without privacy leakage.
Ebadollahi, S   +8 more
core   +2 more sources

Medshare: A Novel Hybrid Cloud for Medical Resource Sharing Among Autonomous Healthcare Providers

open access: yesIEEE Access, 2018
Legacy electronic health record systems were not developed with the level of connectivity expected from them nowadays. Therefore, interoperability weakness inherent in the legacy systems can result in poor patient care and waste of financial resources ...
Yilong Yang   +6 more
doaj   +1 more source

Implantable Medical Device Security

open access: yesCryptography
Implantable medical devices, or IMDs for short, are medical instruments that are placed into the human body through surgery. IMDs are typically used for treating chronic diseases.
Luigi Catuogno, Clemente Galdi
doaj   +1 more source

Home - About - Disclaimer - Privacy