Privacy Protection and Secondary Use of Health Data: Strategies and Methods

被引:29
|
作者
Xiang, Dingyi [1 ,2 ]
Cai, Wei [3 ]
机构
[1] East China Univ Polit Sci & Law, Internet Rule Law Inst, Shanghai, Peoples R China
[2] Northeast Forest Univ, Humanities & Law Sch, Harbin, Heilongjiang, Peoples R China
[3] Beidahuang Informat Co, Harbin, Heilongjiang, Peoples R China
关键词
INFORMATION; MICRODATA; RECORDS;
D O I
10.1155/2021/6967166
中图分类号
Q81 [生物工程学(生物技术)]; Q93 [微生物学];
学科分类号
071005 ; 0836 ; 090102 ; 100705 ;
摘要
Health big data has already been the most important big data for its serious privacy disclosure concerns and huge potential value of secondary use. Measurements must be taken to balance and compromise both the two serious challenges. One holistic solution or strategy is regarded as the preferred direction, by which the risk of reidentification from records should be kept as low as possible and data be shared with the principle of minimum necessary. In this article, we present a comprehensive review about privacy protection of health data from four aspects: health data, related regulations, three strategies for data sharing, and three types of methods with progressive levels. Finally, we summarize this review and identify future research directions.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] A Journey on Privacy protection strategies in big data
    Viji, D.
    Saravanan, K.
    Hemavathi, D.
    [J]. 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 1344 - 1347
  • [2] How Should Health Data Be Used?: Privacy, Secondary Use, and Big Data Sales
    Kaplan, Bonnie
    [J]. CAMBRIDGE QUARTERLY OF HEALTHCARE ETHICS, 2016, 25 (02) : 312 - 329
  • [3] Research on the Strategies of Data Privacy Protection in Cloud Computing
    Li, Yi
    Zhang, Bo
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SECURITY (CSIS 2016), 2016, : 475 - 481
  • [4] PATIENT PRIVACY AND DATA CONFIDENTIALITY AND THE USE OF SECONDARY DATA
    Dean, B. B.
    Aguilar, D.
    Whyte, J.
    Nordyke, R.
    [J]. VALUE IN HEALTH, 2009, 12 (03) : A91 - A91
  • [5] Privacy protection and aggregate health data: a review of tabular cell suppression methods (not) employed in public health data systems
    Matthews, Gregory J.
    Harel, Ofer
    Aseltine, Robert H., Jr.
    [J]. HEALTH SERVICES AND OUTCOMES RESEARCH METHODOLOGY, 2016, 16 (04) : 258 - 270
  • [6] A Privacy Framework for Secondary Use of Medical Data
    Heath, Jennifer
    [J]. 2013 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGY AND SOCIETY (ISTAS), 2013, : 174 - 179
  • [7] Policies and strategies to facilitate secondary use of research data in the health sciences
    Burton, Paul R.
    Banner, Natalie
    Elliot, Mark J.
    Knoppers, Bartha Maria
    Banks, James
    [J]. INTERNATIONAL JOURNAL OF EPIDEMIOLOGY, 2017, 46 (06) : 1729 - 1733
  • [8] Privacy protection methods of location services in big data
    Liu, Wenfeng
    Wu, Juanjuan
    Xi, Zhong
    [J]. OPEN COMPUTER SCIENCE, 2022, 12 (01) : 389 - 402
  • [9] Data Privacy Protection: A Study on Students Awareness of Personal Data Privacy Protection in an E-Health Environment
    Mohamed, Alif Aiman Bin Seeni
    Chen, Lim Fung
    [J]. ADVANCED SCIENCE LETTERS, 2017, 23 (06) : 5299 - 5303
  • [10] Ethical Collection, Storage, and Use of Public Health Data A Proposal for a National Privacy Protection
    Lee, Lisa M.
    Gostin, Lawrence O.
    [J]. JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION, 2009, 302 (01): : 82 - 84