Seeing through health information technology: the need for transparency in software, algorithms, data privacy, and regulation

被引:11
|
作者
Kaplan, Bonnie [1 ]
机构
[1] Yale Univ, New Haven, CT 06520 USA
来源
JOURNAL OF LAW AND THE BIOSCIENCES | 2021年 / 7卷 / 01期
关键词
algorithms; big data; health privacy; electronic medical records and decision support systems; mHealth; intellectual property; SECONDARY USE; CHALLENGES; CARE;
D O I
10.1093/jlb/lsaa062
中图分类号
B82 [伦理学(道德学)];
学科分类号
摘要
[No abstract available]
引用
收藏
页数:18
相关论文
共 50 条
  • [21] Hybrid Data Privacy and Anonymization Algorithms for Smart Health Applications
    Fakeeroodeen Y.N.
    Beeharry Y.
    [J]. SN Computer Science, 2021, 2 (2)
  • [22] Privacy Policy Enforcement For Health Information Data Access
    Currim, Faiz
    Jung, Eunjin
    Xiao, Xin
    Jo, Insoon
    [J]. 1ST ACM INTERNATIONAL WORKSHOP ON MEDICAL-GRADE WIRELESS NETWORKS, 2009, : 39 - 44
  • [23] Contextualizing privacy on health-related use of information technology
    Park, Yong Jin
    Shin, Donghee Don
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2020, 105
  • [24] The Study of Privacy Preserving Data Mining Technology for Information Security
    Li, Heng
    Wu, Xuefang
    [J]. MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 3532 - 3535
  • [25] Software-Related Recalls of Health Information Technology and Other Medical Devices: Implications for FDA Regulation of Digital Health
    Ronquillo, Jay G.
    Zuckerman, Diana M.
    [J]. MILBANK QUARTERLY, 2017, 95 (03): : 535 - 553
  • [26] Surf's up! Protecting the privacy of health information on the Internet - We need new privacy laws and better encryption of information
    Graber, MA
    [J]. WESTERN JOURNAL OF MEDICINE, 2002, 176 (02): : 79 - 81
  • [27] Parallel Algorithms through Approximation: Graphs, Data Privacy and Machine Learning
    Pothen, Alex
    [J]. CF '19 - PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS, 2019, : 340 - 340
  • [28] Personal Health Information, Privacy and Surveillance: Do We Need a Critical Voice?
    Whetton, Sue
    [J]. MEDINFO 2013: PROCEEDINGS OF THE 14TH WORLD CONGRESS ON MEDICAL AND HEALTH INFORMATICS, PTS 1 AND 2, 2013, 192 : 234 - 238
  • [29] On breaching enterprise data privacy through adversarial information fusion
    Ganta, Srivatsava Ranjit
    Acharya, Raj
    [J]. 2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOP, VOLS 1 AND 2, 2008, : 313 - 316
  • [30] ENGAGING CONSUMERS THROUGH HEALTH INFORMATION TECHNOLOGY
    Austin, Robin R.
    Hiniker, Jerri
    Westra, Bonnie L.
    [J]. CIN-COMPUTERS INFORMATICS NURSING, 2012, 30 (08) : 400 - 401