000 | 04605nam a22005295i 4500 | ||
---|---|---|---|
001 | 978-3-319-23633-9 | ||
003 | DE-He213 | ||
005 | 20200421111155.0 | ||
007 | cr nn 008mamaa | ||
008 | 151126s2015 gw | s |||| 0|eng d | ||
020 |
_a9783319236339 _9978-3-319-23633-9 |
||
024 | 7 |
_a10.1007/978-3-319-23633-9 _2doi |
|
050 | 4 | _aQA76.9.D3 | |
072 | 7 |
_aUN _2bicssc |
|
072 | 7 |
_aUMT _2bicssc |
|
072 | 7 |
_aCOM021000 _2bisacsh |
|
082 | 0 | 4 |
_a005.74 _223 |
245 | 1 | 0 |
_aMedical Data Privacy Handbook _h[electronic resource] / _cedited by Aris Gkoulalas-Divanis, Grigorios Loukides. |
250 | _a1st ed. 2015. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2015. |
|
300 |
_aXLIII, 832 p. 256 illus., 160 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aIntroduction to Medical Privacy -- A survey of anonymization algorithms for electronic health records -- Differentially Private Histogram and Synthetic Data Publication -- Evaluating the Utility of Differential Privacy -- SECRETA -- Putting Statistical Disclosure Control into Practice -- Utility-constrained Electronic Health Record Data Publishing Through Generalization and Disassociation -- Methods to Mitigate Risk of Composition Attack in Independent Data Publications -- Statistical Disclosure Limitation for Health Data -- A Review of Privacy Preserving Mechanisms for Record Linkage -- Application of Privacy Preserving Techniques in Operational Record Linkage Centres -- Privacy Considerations for Health Information Exchanges -- Managing Access Control in Collaborative Processes for Healthcare Applications -- Automating Consent Management Lifecycle for Electronic Healthcare Systems -- e-Health Cloud -- Preserving Genome Privacy in Research Studies -- Private Genome Data Dissemination -- Threats and Solutions for Genomic Data Privacy -- Medical Image Security -- Privacy Considerations and Techniques for Neuroimages -- Data Privacy Issues with RFID in Healthcare -- Privacy Preserving Classification of ECG Signals in Mobile e-Health Applications -- Strengthening Privacy in Healthcare Social Networks -- Privacy Law, Data Sharing Policies, and Medical Data -- HIPAA and Human Error -- De-identification of Unstructured Clinical Data for Patient Privacy Protection -- Challenges in Synthesizing Surrogate PHI in Narrative EMRs -- Building on Principles -- Epilogue. | |
520 | _aThis handbook covers Electronic Medical Record (EMR) systems, which enable the storage, management, and sharing of massive amounts of demographic, diagnosis, medication, and genomic information. It presents privacy-preserving methods for medical data, ranging from laboratory test results to doctors' comments. The reuse of EMR data can greatly benefit medical science and practice, but must be performed in a privacy-preserving way according to data sharing policies and regulations. Written by world-renowned leaders in this field, each chapter offers a survey of a research direction or a solution to problems in established and emerging research areas. The authors explore scenarios and techniques for facilitating the anonymization of different types of medical data, as well as various data mining tasks. Other chapters present methods for emerging data privacy applications and medical text de-identification, including detailed surveys of deployed systems. A part of the book is devoted to legislative and policy issues, reporting on the US and EU privacy legislation and the cost of privacy breaches in the healthcare domain. This reference is intended for professionals, researchers and advanced-level students interested in safeguarding medical data. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aHealth informatics. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aData structures (Computer science). | |
650 | 0 | _aDatabase management. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aDatabase Management. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aData Structures, Cryptology and Information Theory. |
650 | 2 | 4 | _aHealth Informatics. |
700 | 1 |
_aGkoulalas-Divanis, Aris. _eeditor. |
|
700 | 1 |
_aLoukides, Grigorios. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319236322 |
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-23633-9 |
912 | _aZDB-2-SCS | ||
942 | _cEBK | ||
999 |
_c53456 _d53456 |