Search results for "confidentiality"
showing 10 items of 50 documents
Effects of record linkage errors on registry-based follow-up studies
1997
The importance of reliable record linkage for high quality-population-based disease registration is widely recognized. Systematic methodologic work is lacking, however, on the effects of record linkage errors on the use of disease registries for epidemiologic purposes. The present paper provides algebraic models describing the effects of record linkage errors on monitoring survival of registered patients, which is commonly performed by matching registry records against a database of death certificates, and on registry-based incidence follow-up of external cohorts. Homonym errors, that is, erroneous linkage of records that pertain to distinct individuals, lead to underestimation of survival …
The Public-Key-Infrastructure of the Radiological Society of Germany.
2005
Pretty Good Privacy (PGP) encoding is based on the Public-Key-Procedure and permits the safe transmission of medical data. Furthermore it allows the use of an electronic signature provided that keys used belong to the key owner and that the key owner's identity is guaranteed by a trusted third party. Under the auspices of the Radiological Society of Germany (Deutsche Rontgengesellschaft, DRG) its IT-Working Group (Arbeitsgemeinschaft fur Informationstechnik, @GIT) built up an appropriate Certification Authority including the required Public-Key-Infrastructure. These @GIT certified PGP keys allow the legal use of telemedicine in Germany. Digital signatures based to those certified keys corre…
Privacy Violation Classification of Snort Ruleset
2010
Published version of a paper presented at the 2010 18th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/PDP.2010.87 It is important to analyse the privacy impact of Intrusion Detection System (IDS) rules, in order to understand a…
Trust-based framework for security enhancement of P2PSIP communication systems
2009
Today, Peer-to-Peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced trustworthiness and may cause security problems, e.g. privacy leaks, unpredictable availability, etc. In this paper, we investigate on P2PSIP security issues and propose a subjective based trust model that offers trust services during P2PSIP session establishment. The main issues considered in this model include opinion calculation, opinion maintenance, data confidentiality and integrity, message rou…
Online Professionalism-2018 Update of European Association of Urology (@Uroweb) Recommendations on the Appropriate Use of Social Media.
2018
Abstract Context Social media (SoMe) has transformed communication among health care professionals by enabling rapid and global information exchange. Yet, the novelty of SoMe and concerns about potential risks continue to be barriers to adoption. Objective To encourage appropriate professional use of SoMe by physicians in concordance with best practices and to update practical guidelines for effective and professional use of these communication technologies. Evidence aquisition The European Association of Urology (EAU; @Uroweb) brought together a committee of SoMe stakeholders in the urology field. PubMed and the grey literature were searched to identify SoMe position papers by other medica…
Consenso de expertos sobre propuestas de información al paciente en tratamiento con sales de litio
2021
Introduction: Lithium is one of the first therapeutic options for bipolar disorder, which is characterized by recurrent mood swings that strongly reduce quality of life. Our purpose was to achieve professional consensus criteria to define the contents of an information sheet for patients with bipolar disorder that are starting treatment with lithium. Material and methods: A modified Delphi method in two rounds was used. The Scientific Committee—made up by nine psychiatrists—created a 20-item questionnaire about the information that must be given to the patient treated with lithium and selected a panel of ambulatory and hospital psychiatric experts to agree on this information. Panelists sco…
Pacientu datu konfidencialitātes ievērošanas biežākie iespējamie traucējošie faktori intensīvās terapijas klīnikas māsu darbā
2021
Bakalaura darba tēma ir „Pacientu datu konfidencialitātes ievērošanas biežākie iespējamie traucējošie faktori intensīvās terapijas klīnikas māsu darbā”. Tēmas aktualitāti nosaka drošības, likumdošanas un ētikas vērtību izpratne veselības aprūpes speciālistu vidū. Pacientu datu apstrāde ir neatņemama veselības aprūpes sastāvdaļa, un tā jāveic atbilstoši normatīvajiem aktiem. Darba mērķis bija noskaidrot pacientu datu konfidencialitātes ievērošanas biežākos iespējamos traucējošos faktorus intensīvās terapijas klīnikas māsu darbā. Uzdevumi bija apskatīt normatīvos aktus, zinātnisko literatūru un pētījumus par pacientu datu konfidencialitāti un informāciju par konfidencialitātes ievērošanas bie…
"Last Signification Bits" Method for Watermarking of Medical Image
2011
International audience; In this paper, we present a new approach for watermarking of medical image that we are trying to adapt to telemedicine. This approach is intended to insert a set of data in a medical image. These data should be imperceptible and robust to various attacks. It's containing the signature of the original image, the data specific to the patient and his diagnostic. The purpose of the watermarking method is to check the integrity and preservation of the confidentiality of patient data in a network sharing. This approach is based on the use the LSB (least significant bits) of the image and tools borrowed from cryptography.
Social Media as Platform for Stimulating Urban Changes
2016
Images have always been an important part of city planning – current images of place, images with planned improvements, maps and sketches. Some time ago all that was a private property of stakeholders like planner and client. But nowadays this confidentiality rather much has vanished – no copyrights or competition is noteworthy. Plans do not have their privacy anymore. They are exposed even before they got implemented. This article will display why city planners share the images of their ideas, of their dreams in public (mostly in blogs and social networks) – why it is important for them and what kind of feedback they are waiting for. This article is based on case study where 12 respondents…
Konfidencialitātes princips mediācijā
2015
Article 7 of the Mediation Directive sets a confidentiality rule, provides minimum regulation regarding it and urges Member States to tolerate it and create a set of national rules in order to protect confidentiality in mediation. The aim of this article is to analyse the principle of confidentiality in mediation, to explain its particular qualities and assess the importance of it. Mediācijas direktīvas 7. pants nosaka konfidencialitātes principu, nodrošina tā obligāto regulējumu un mudina dalībvalstis to pieļaut un cienīt, kā arī izveidot nacionālus likumus, lai aizsargātu konfidencialitātes principu mediācijā. Šā raksta mērķis ir izvērtēt konfidencialitātes principu mediācijā, noskaidrot …