Sie sind auf Seite 1von 11

SECURITY AND

PRIVACY

Assignment 3
By Taylor K. Cobb

TABLE OF CONTENTS
Topics of Interest

Article 1: Secure provision of patient-centered health information technology


services in public networks--leveraging security and privacy features provided
by the German nationwide health information technology infrastructure
Article 2: Securing the Data Economy: Translating Privacy and Enacting
Security in the Development of DataSHIELD
Article 3: Research Ethics and Public Trust, Preconditions for Continued
Growth of Internet Mediated Research Public Confidence in Internet Mediate
Research
Article 4: Sounding Off On Social Media: The Ethics of Patient Storytelling in
the Modern Era

TOPICS OF INTEREST
Social networking (via Facebook, Twitter,
etc.)
Patient confidentiality
Health Insurance Portability and
Accountability Act

SECURE PROVISION OF PATIENT-CENTERED HEALTH INFORMATION


TECHNOLOGY SERVICES IN PUBLIC NETWORKS--LEVERAGING
SECURITY AND PRIVACY FEATURES PROVIDED BY THE GERMAN
NATIONWIDE HEALTH INFORMATION TECHNOLOGY INFRASTRUCTURE

Health information technology provides an opportunity for


patient-focused service, which, in turn, improves the
medical experience. Its an important part of health care
in the modern world, and must be focused on the patient.
Providing patient-centered services is essential to the
functioning of health services, but there have been
insecure network concerns as a result of information
becoming less private. This is being addressed by the
German Nationwide Health Information Technology
Infrastructure.
4

SECURING THE DATA ECONOMY:


TRANSLATING PRIVACY AND
ENACTING SECURITY IN THE
DEVELOPMENT
OFis almost
DATASHIELD
Since
modern-day biological science
entirely data-based,
data sharing has, according to this article, become a new, and
highly profitable form of economy. While this has allowed for
improvements in the efficiency of data transfer on an industrial
level, it has also created an unfortunate gateway to the misuse of
data transfer for private and individual data. In order to make
transfers more simple and effective, the DataSHIELD system was
developed, but this opened up the concern of data security, as it
allowed the program to duplicate results drawn by a number of
other systems without their express consent.

RESEARCH ETHICS AND PUBLIC


TRUST, PRECONDITIONS FOR
CONTINUED GROWTH OF INTERNET
MEDIATED RESEARCH PUBLIC
CONFIDENCE IN INTERNET MEDIATE
The article I read details the need for internet mediated
research, explainingRESEARCH
the importance of safety and ethics
in the transference of human data. This article was
mainly an argument for the protection of the right to
privacy in a time when human data is no necessarily as
secure as one would expect. The scholars asserted that
the public should consider internet mediated research an
affront to the natural rights of a human being. The
suggestion was made, through the article, for preventive
and protective measures be taken to avoid controversy
and social upheaval.
6

SOUNDING OFF ON SOCIAL MEDIA: THE


ETHICS OF PATIENT STORYTELLING IN THE
MODERN ERA
One of the most troubling issues with modern security and privacy
is the emergence of social media. The publics willingness to post
even the most private of matters is disconcerting and dangerous.
This article described how in medical environments patient
information, which according to the Health Insurance Portability
and Accountability Act, is intended to be completely confidential,
has been leaked on employees Twitter feeds and Facebook
timelines, exposing otherwise secure details about others lives,
and making their private information accessible to the common
man.

SECURING DATA AT HOME

Budget
Bank statements
Credit reports
Passwords
Health records

EXPERT LORRIE CRANOR


SPEAKS UP

BIBLIOGRAPHY
Dehling, T., & Sunyaev, A. (2014). Secure provision of patient-centered health information technology
services in public networks-- leveraging security and privacy features provided by the german
nationwide health information technology infrastructure.Electronic Markets,24(2), 89-99.
doi:http://dx.doi.org/10.1007/s12525- 013-0150-6
Digital image. Internet Society. N.p., n.d. Web. 26 June 2015. <http://www.internetsociety.org/whatwe-do/internet-technology- matters/routing-security>.
Koene, Ansgar, Elvira Perez, Christopher J. Carter, Ramona Statache, Svenja Adolphs, Claire OMalley,
Tom Rodden, and Derek McAuley. Research Ethics and Public Trust, Preconditions for Continued
Growth of Internet Mediated Research Public Confidence in Internet Mediate Research.
ResearchGate. N.p., n.d. Web. 19 June 2015
10

BIBLIOGRAPHY (CONTD)
"Lorrie Cranor: Online Security and Privacy." YouTube. YouTube, n.d. Web. 26 June 2015.
Murtagh, M. J., Demir, I., Jenkings, K. N., Wallace, S. E., Murtagh, B., Boniol, M., . . . Burton, P. R.
(2012). Securing the data economy: Translating privacy and enacting security in the
development of DataSHIELD.Public Health Genomics,15(5), 243-53.
doi:http://dx.doi.org/10.1159/000336673
Wells, Deva M., Keren Lehavot, PhD, and Margaret L. Isaac, MD. Sounding Off On Social Media:
The Ethics of Patient Storytelling in the Modern Era. (2015): n. pag. Web. 19 June 2015.

11

Das könnte Ihnen auch gefallen