Results 21 to 30 of about 586,884 (284)
Analysis of patients’ privacy and associated factors in the perioperative period
BackgroundHealthcare professionals recognize how to protect patient privacy in order to effectively reduce the occurrence of conflict between the two parties.
Mingyang Tan, Hongyu Li, Xiaofei Wang
doaj +1 more source
Density-Based Outlier Detection for Safeguarding Electronic Patient Record Systems
This paper concerns the detection of abnormal data usage and unauthorized access in large-scale critical networks, specifically healthcare infrastructures. Hospitals in the U.K.
Aaron J. Boddy +3 more
doaj +1 more source
Patient privacy and confidentiality
The NHS is engaged in a debate about what can and cannot be done legitimately with patients' data. On one hand, anxieties exist about who should have access to the data and for what purposes; on the other hand, requirements for more accountability, performance assessment, effective health protection, and efficient administration are increasing the need
Jim, Chalmers, Rod, Muir
openaire +3 more sources
Patient-powered research networks: building capacity for conducting patient-centered clinical outcomes research. [PDF]
The Patient-Centered Outcomes Research Institute (PCORI) recently launched PCORnet to establish a single inter-operable multicenter data research network that will support observational research and randomized clinical trials.
Andrew A. Nierenberg +24 more
core +1 more source
Histopathological Image Retrieval Based on Asymmetric Residual Hash and DNA Coding
Histopathological image retrieval is a key technology for computer-aided diagnosis. However, patients are reluctant to reveal their privacy in histopathological image retrieval.
Shuli Cheng, Liejun Wang, Anyu Du
doaj +1 more source
Photo by Christian Wiediger on Unsplash INTRODUCTION Huge amounts of public data on the internet and the ease with which we regularly search it have resulted in the phenomenon called Patient-Targeted Googling (PTG).
Emily Beer
doaj +5 more sources
Standardization of guidelines for patient photograph deidentification [PDF]
IMPORTANCE: This work was performed to advance patient care by protecting patient anonymity. OBJECTIVES: This study aimed to analyze the current practices used in patient facial photograph deidentification and set forth standardized guidelines for ...
Roberts, Erik +2 more
core +2 more sources
Privacy-Preserving Patient Similarity Learning in a Federated Environment: Development and Analysis [PDF]
Background: There is an urgent need for the development of global analytic frameworks that can perform analyses in a privacy-preserving federated environment across multiple institutions without privacy leakage.
Ebadollahi, S +8 more
core +2 more sources
Medshare: A Novel Hybrid Cloud for Medical Resource Sharing Among Autonomous Healthcare Providers
Legacy electronic health record systems were not developed with the level of connectivity expected from them nowadays. Therefore, interoperability weakness inherent in the legacy systems can result in poor patient care and waste of financial resources ...
Yilong Yang +6 more
doaj +1 more source
Implantable Medical Device Security
Implantable medical devices, or IMDs for short, are medical instruments that are placed into the human body through surgery. IMDs are typically used for treating chronic diseases.
Luigi Catuogno, Clemente Galdi
doaj +1 more source

