Scientific Research and Essays

  • Abbreviation: Sci. Res. Essays
  • Language: English
  • ISSN: 1992-2248
  • DOI: 10.5897/SRE
  • Start Year: 2006
  • Published Articles: 2768

Full Length Research Paper

Sharing healthcare information based on privacy preservation

Asmaa Hatem Rashid* and Norizan Binti Mohd Yasin
Department of Information Science, Faculty of Computer Science and IT, University of Malaya, Kuala Lampur, 50603 KL, Malaysia.
Email: [email protected]

  •  Received: 07 May 2011
  •  Accepted: 19 November 2014
  •  Published: 15 March 2015

References

Act A (1996). Health insurance portability and accountability act of 1996. Public Law, 104, 191.
 
Aggarwal CC, Philip SY (2008). A general survey of privacy-preserving data mining models and algorithms: Springer.
Crossref
 
Aggelidis VP, Chatzoglou PD (2009). Using a modified technology acceptance model in hospitals. International J. Med. Informatics. 78(2):115.
Crossref
 
Ahmed NS, Yasin NM (2012). Improvement the Cooperation Feature in Distributed Healthcare Information Systems Based on the Fractal Approach: An Empirical Study. Adv. Mater. Res. 463:861-867.
Crossref
 
Ammenwerth E, Gräber S, Herrmann G, Bürkle T, König J (2003). Evaluation of health information systems—problems and challenges. Int. J. Med. Inf. 71(2):125-135.
Crossref
 
Anshari M, Almunawar MN (2012). Evaluating CRM implementation in healthcare organization. arXiv preprint arXiv: 1204:3689.
 
Aramaki E, Imai T, Miyo K, Ohe K (2006). Automatic deidentification by using sentence features and label consistency.
 
Arora NK (2003). Interacting with cancer patients: the significance of physicians' communication behavior. Soc. Sci. Med. 57(5):791-806.
Crossref
 
Barak B, Chaudhuri K, Dwork C, Kale S, McSherry F, Talwar K (2007). Privacy, accuracy, and consistency too: a holistic solution to contingency table release. Paper presented at the Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems.
Crossref
 
Bayardo RJ, Agrawal R (2005). Data privacy through optimal k-anonymization.
 
Biafore S (1999). Predictive solutions bring more power to decision makers. Health Manage. Technol. 20(10):12.
 
Blumenthal D (2009). Stimulating the adoption of health information technology. New Engl. J. Med. 360(15):1477-1479.
Crossref
 
Buntin MB, Burke MF, Hoaglin MC, Blumenthal D (2011). The benefits of health information technology: a review of the recent literature shows predominantly positive results. Health Affairs, 30(3):464-471.
Crossref
 
Byun J-W, Bertino E, Li N (2005). Purpose based access control of complex data for privacy protection. Paper presented at the Proceedings of the tenth ACM symposium on Access control models and technologies.
Crossref
 
Campan A, Truta T (2009). Data and structural k-anonymity in social networks. Privacy, Security, and Trust in KDD. pp. 33-54.
 
Chen L, Yang J-J, Wang Q, Niu Y (2012). A framework for privacy-preserving healthcare data sharing. Paper presented at the e-Health Networking, Applications and Services (Healthcom), 2012 IEEE 14th International Conference on.
Crossref
 
Chen L, Yang JJ, Wang Q, Niu Y (2012). A framework for privacy-preserving healthcare data sharing. Paper presented at the e-Health Networking, Applications and Services (Healthcom), 2012 IEEE 14th International Conference on; 01/2012.
Crossref
 
Chiu C-C, Tsai C-Y (2007). A k-anonymity clustering method for effective data privacy preservation. Advanced Data Mining and Applications. pp. 89-99.
 
Christy T (1997). Analytical tools help health firms fight fraud. Insurance and Technology, 22(3):22-26.
 
Clifton C, Atallah M (2007). Collaborative Research: ITR: Distributed Data Mining to Protect Information Privacy.
 
Clifton C, Kantarcioǧlu M, Doan A, Schadow G, Vaidya J, Elmagarmid A, Suciu D (2004). Privacy-preserving data integration and sharing. Paper presented at the Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery.
Crossref
 
Dalenius T (1977). Towards a methodology for statistical disclosure control. Statistik Tidskrift, 15(429-444):2-1.
 
Dean BB, Lam J, Natoli JL, Butler Q, Aguilar D, Nordyke RJ (2010). Use of Electronic Medical Records for Health Outcomes Research: A Literature Review. Med. Care Res. Rev. 66(6):611-638.
Crossref
 
DIRECTIVE HAT (1997). Council Directive 97/43/Euratom of 30 June 1997 on health protection of individuals against the dangers of ionizing radiation in relation to medical exposure, and repealing Directive 84/466/Euratom. Official J. No. L, 180(09/07):0022-0027.
 
El Emam K, Arbuckle L, Koru G, Eze B, Gaudette L, Neri E, Gluck J (2012). De-identification methods for open health data: the case of the Heritage Health Prize claims dataset. J. Med. Internet Res.14(1).
Crossref
 
El Emam K, Dankar FK (2008). Protecting privacy using k-anonymity. J. Am. Med. Inf. Assoc. 15(5):627-637.
Crossref
 
El Emam K, Dankar FK, Issa R, Jonker E, Amyot D, Cogo E, Vaillancourt R (2009). A globally optimal k-anonymity method for the de-identification of health data. J. Am. Med. Inf. Assoc. 16(5):670-682.
Crossref
 
El Emam K, Fineberg A (2009). An overview of techniques for de-identifying personal health information. Access to Information and Privacy Division of Health Canada.
 
El Emam K, Jonker E, Fineberg A (2011). The Case for De-identifying Personal Health Information.
 
Ernstmann N, Ommen O, Neumann M, Hammer A, Voltz R, Pfaff H (2009). Primary care physician's attitude towards the GERMAN e-Health Card Project—Determinants and Implications. J. Med. Syst. 33(3):181-188.
Crossref
 
Fried B, Carpenter WR, Deming WE (2011). Understanding and improving team effectiveness in quality improvement. McLaughlin and Kaluzny's Continuous Quality Improvement in Health Care, P. 117.
 
Fung B, Wang K, Wang L, Hung PCK (2009). Privacy-preserving data publishing for cluster analysis. Data and Knowledge Engineering, 68(6):552-575.
Crossref
 
Fung BCM, Wang K, Chen R, Yu PS (2010). Privacy-preserving data publishing: A survey of recent developments. ACM Comput. Surv. 42(4):1-53.
Crossref
 
Fung BCM, Wang K, Chen R, Yu PS (2010). Privacy-Preserving Data Publishing: A Survey of Recent Developments. Acm Computing Surveys, 42(4).
Crossref
 
Gaboury I, Bujold M, Boon H, Moher D (2009). Interprofessional collaboration within Canadian integrative healthcare clinics: Key components. Soc. Sci. Med. 69(5):707-715.
Crossref
 
Gardner J, Xiong L (2008). HIDE: An integrated system for health information de-identification.
 
Gardner J, Xiong L (2009). An integrated framework for de-identifying unstructured medical data. Data and Knowledge Engineering, 68(12):1441-1451.
Crossref
 
Gkoulalas-Divanis A, Loukides G (2011). Medical Data Sharing: Privacy Challenges and Solutions.
 
Gkoulalas-Divanis A, Verykiosc VS (2009). An overview of privacy preserving data mining. Crossroads, 15(4):6.
 
Glanz K, Rimer BK, Viswanath K (2008). Health behavior and health education: theory, research, and practice: John Wiley and Sons.
 
Goldzweig CL, Towfigh A, Maglione M, Shekelle PG (2009). Costs and benefits of health information technology: new trends from the literature. Health Affairs 28(2):w282-w293.
Crossref
 
Goryczka S, Xiong L, Fung BC (2013). Secure Distributed Data Anonymization and Integration with m-Privacy.
 
Hillestad R, Bigelow J, Bower A, Girosi F, Meili R, Scoville R, Taylor R (2005). Can electronic medical record systems transform health care? Potential health benefits, savings, and costs. Health Affairs, 24(5):1103-1117.
Crossref
 
Hripcsak G, Bloomrosen M, FlatelyBrennan P, Chute CG, Cimino J, Detmer DE, Hammond WE (2014). Health data use, stewardship, and governance: ongoing gaps and challenges: a report from AMIA's 2012 Health Policy Meeting. J. Am. Med. Inf. Assoc. 21(2):204-211.
Crossref
 
Itani W, Kayssi A, Chehab A (2009). Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures. Paper presented at the Dependable, Autonomic and Secure Computing, DASC'09. Eighth IEEE International Conference on.
 
Jiang W, Clifton C (2006). A secure distributed framework for achieving k-anonymity. The VLDB Journal—The International Journal on Very Large Data Bases, 15(4):316-333.
 
Jiang, W., and Clifton, C. (2006). A secure distributed framework for achieving k-anonymity. Vldb Journal, 15(4), 316-333.
Crossref
 
Jurczyk P, Xiong L (2009). Distributed anonymization: Achieving privacy for both data subjects and data providers Data and Applications Security XXIII (pp. 191-207): Springer.
 
Kaye R, Kokia E, Shalev V, Idar D, Chinitz D (2010). Barriers and success factors in health information technology: A practitioner's perspective. J. Manage. Market. Healthcare 3(2):163-175.
Crossref
 
Koh HC, Tan G (2011). Data mining applications in healthcare. J. Healthcare Inf. Manage. 19(2):65.
 
Kohn LT, Corrigan J, Donaldson MS (1999). To err is human: Building a safer health system. Committee on Health Care in America. Institute of Medicine: Washington (DC): National Academy Press.
 
Kuziemsky CE, O'Sullivan TL, Corneil W (2012). An Upstream-Downstream Approach for Disaster Management Information Systems Design. Paper presented at the Proceedings of the ISCRAM Conference.
 
Kuziemsky CE, Varpio L (2011). A model of awareness to enhance our understanding of interprofessional collaborative care delivery and health information system design to support it. Int. J. Med. Inf. 80(8):e150-e160.
Crossref
 
Lau EC, Mowat FS, Kelsh MA, Legg JC, Engel-Nitz NM, Watson HN, Whyte JL (2011). Use of electronic medical records (EMR) for oncology outcomes research: assessing the comparability of EMR information to patient registry and health claims data. Clin. Epidemiol. 3:259.
 
LeFevre K, DeWitt DJ, Ramakrishnan R (2005). Incognito: Efficient full-domain k-anonymity.
 
LeFevre K, DeWitt DJ, Ramakrishnan R (2006). Mondrian multidimensional k-anonymity.
 
Lezzar F, Zidani A, Atef C (2012). A Collaborative Web-based Application for Health Care Tasks Planning. Paper presented at the ICWIT.
 
Lu YC, Xiao Y, Sears A, Jacko JA (2005). A review and a framework of handheld computer adoption in healthcare. Int. J. Med. Inf. 74(5):409.
Crossref
 
Ludman EJ, Fullerton SM, Spangler L, Trinidad SB, Fujii MM, Jarvik GP, Burke W (2010). Glad you asked: participants' opinions of re-consent for dbGaP data submission. J. Empirical Res. Human Res. ethics: JERHRE, 5(3):9.
Crossref
 
Makoul G, Curry RH, Tang PC (2001). The use of electronic medical records communication patterns in outpatient encounters. J. Am. Med. Inf. Assoc. 8(6):610-615.
Crossref
 
Milley A (2000). Healthcare and Data Mining Using data for clinical, customer service and financial results. Health Manage. Technol. 21(8):44-45.
 
Morton S, Mahoui M, Gibson PJ (2012). Data anonymization using an improved utility measurement. Paper presented at the Proceedings of the 2nd ACM SIGHIT symposium on International health informatics.
Crossref
 
Narayanan A, Shmatikov V (2009). De-anonymizing social networks. Paper presented at the Security and Privacy, 2009 30th IEEE Symposium on.
 
Neamatullah I, Douglass MM, Li-wei HL, Reisner A, Villarroel M, Long WJ, Clifford GD (2008). Automated de-identification of free-text medical records. Bmc Medical Informatics and Decision Making, 8(1):32.
Crossref
 
Nergiz ME, Clifton C (2007). Thoughts on k-anonymization. Data and Knowledge Engineering, 63(3):622-645.
Crossref
 
Neumann RG (2010). Information Extraction. Architect. 2: 05.11.
 
Nosowsky R, Giordano TJ (2006). The Health Insurance Portability and Accountability Act of 1996 (HIPAA) privacy rule: implications for clinical research. Annu. Rev. Med. 57:575-590.
Crossref
 
Organization WH (2010). Country Cooperation Strategy for WHO and Egypt 2010–2014. Cario.
 
Parmar AA, Rao UP, Patel DR (2011). Blocking based approach for classification Rule hiding to Preserve the Privacy in Database.
 
Qi X, Zong M (2012). An Overview of Privacy Preserving Data Mining. Procedia Environ. Sci. 12:1341-1347.
Crossref
 
Rashid AH, Yasin NBM (2012). Anonymization Approach for Protect Privacy of Medical Data and Knowledge Management. Medical Informatics, Prof. Shaul Mordechai (Ed.), ISBN: 978-953-51-0259-5, InTech.
Crossref
 
Reddy MC, Gorman P, Bardram J (2011). Special issue on supporting collaboration in healthcare settings: The role of informatics. Int. J. Med. Inf. 80(8):541-543.
Crossref
 
Ruxwana NL, Herselman ME, Conradie DP (2010). ICT applications as e-health solutions in rural healthcare in the Eastern Cape Province of South Africa. Health Inf. Manage. J. 39(1):17-26.
 
Sacharidis D, Mouratidis K, Papadias D (2010). K-anonymity in the presence of external databases. Knowledge and Data Engineering, IEEE Transactions on, 22(3):392-403.
 
Samarati P (2001). Protecting respondents identities in microdata release. Knowledge and Data Engineering, IEEE Transactions on, 13(6):1010-1027.
 
Scandurra I, Hägglund M, Koch S (2008). From user needs to system specifications: multi-disciplinary thematic seminars as a collaborative design method for development of health information systems. J. Biomed. Inf. 41(4):557-569.
Crossref
 
Scott RE (2007). e-Records in health—Preserving our future. Int. J. Med. Inf. 76(5):427-431.
Crossref
 
Sibanda T, Uzuner O (2006). Role of Local Context in De-identification of Ungrammatical, Fragmented Text. North American Chapter of Association for Computational Linguistics/Human Language Technology (NAACL-HLT).
 
Silver M, Sakata T, Su H-C, Herman C, Dolins SB, O Shea MJ (2001). Case study: how to apply data mining techniques in a healthcare data warehouse. J. Healthcare Inf. Manage. 15(2):155-164.
 
Smith HE (2001). A Context-Based Access Control Model for HIPAA Privacy and Security Compliance. SANS Security Essentials. CISSP.
 
Sokolova M, El Emam K, Arbuckle L, Neri E, Rose S, Jonker E (2012). P2P Watch: Personal Health Information Detection in Peer-to-Peer File-Sharing Networks. J. Med. Internet Res. 14(4).
Crossref
 
Sweeney L (1997). Guaranteeing anonymity when sharing medical data, the Datafly System. Paper presented at the Proceedings of the AMIA Annual Fall Symposium.
 
Sweeney L (2002a). Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05):571-588.
Crossref
 
Sweeney L (2002b). k-anonymity: A model for protecting privacy. International Journal of Uncertainty Fuzziness and Knowledge Based Systems, 10(5):557-570.
Crossref
 
Tassa T, Gudes E (2012). Secure distributed computation of anonymized views of shared databases. ACM Transactions on Database Systems (TODS), 37(2):11.
Crossref
 
Tierney WM, Achieng M, Baker E, Bell A, Biondich P, Braitstein P, McKown B (2010). Experience implementing electronic health records in three East African countries. Stud Health Technol. Inf. 160(Pt 1):371-375.
 
Truta TM, Vinay B (2006). Privacy protection: p-sensitive k-anonymity property. Paper presented at the Data Engineering Workshops, 2006. Proceedings. 22nd International Conference on.
 
Tsui FC, Espino JU, Dato VM, Gesteland PH, Hutman J, Wagner MM. (2003). Technical description of RODS: a real-time public health surveillance system. J. Am. Med. Inf. Assoc. 10(5):399-408.
Crossref
 
Vaidya J, Zhu M, Clifton CW (2006). Privacy preserving data mining (Vol. 19): Springer-Verlag New York Inc.
 
Van Vactor JD (2012). Collaborative leadership model in the management of health care. J. Bus. Res. 65(4):555-561.
Crossref
 
Wang B, Yang J (2011). The state of the art and tendency of privacy preserving data mining.
 
Wang C, Wang Q, Ren K, Lou W (2010). Privacy-preserving public auditing for data storage security in cloud computing. Paper presented at the INFOCOM, 2010 Proceedings IEEE.
Crossref
 
Wang SJ, Middleton B, Prosser LA, Bardon CG, Spurr CD, Carchidi PJ, Sussman AJ (2003). A cost-benefit analysis of electronic medical records in primary care. The Am. J. Med. 114(5):397-403.
Crossref
 
Weir CR, Hammond KW, Embi PJ, Efthimiadis EN, Thielke SM, Hedeen AN (2011). An exploration of the impact of computerize