Search results for "confidentiality"

showing 10 items of 50 documents

Effects of record linkage errors on registry-based follow-up studies

1997

The importance of reliable record linkage for high quality-population-based disease registration is widely recognized. Systematic methodologic work is lacking, however, on the effects of record linkage errors on the use of disease registries for epidemiologic purposes. The present paper provides algebraic models describing the effects of record linkage errors on monitoring survival of registered patients, which is commonly performed by matching registry records against a database of death certificates, and on registry-based incidence follow-up of external cohorts. Homonym errors, that is, erroneous linkage of records that pertain to distinct individuals, lead to underestimation of survival …

Statistics and ProbabilityMatching (statistics)medicine.medical_specialtyEpidemiologyDeath CertificatesBiasGermanyNeoplasmsEpidemiologymedicineHumansRegistriesSurvival rateSurvival analysisLinkage (software)business.industryIncidence (epidemiology)Follow up studiesReproducibility of ResultsSurvival RatePopulation SurveillanceForms and Records ControlMedical Record LinkagebusinessConfidentialityRecord linkageFollow-Up StudiesDemographyStatistics in Medicine
researchProduct

The Public-Key-Infrastructure of the Radiological Society of Germany.

2005

Pretty Good Privacy (PGP) encoding is based on the Public-Key-Procedure and permits the safe transmission of medical data. Furthermore it allows the use of an electronic signature provided that keys used belong to the key owner and that the key owner's identity is guaranteed by a trusted third party. Under the auspices of the Radiological Society of Germany (Deutsche Rontgengesellschaft, DRG) its IT-Working Group (Arbeitsgemeinschaft fur Informationstechnik, @GIT) built up an appropriate Certification Authority including the required Public-Key-Infrastructure. These @GIT certified PGP keys allow the legal use of telemedicine in Germany. Digital signatures based to those certified keys corre…

Teleradiologybusiness.industryPublic key infrastructureGeneral MedicineCertificationTrusted third partyComputer securitycomputer.software_genreElectronic signatureDigital signatureGermanyCertificate authorityMedicineHumansRadiology Nuclear Medicine and imagingThe InternetKey serverbusinessSocietiescomputerAlgorithmsComputer SecurityConfidentialitySoftwareEuropean journal of radiology
researchProduct

Privacy Violation Classification of Snort Ruleset

2010

Published version of a paper presented at the 2010 18th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/PDP.2010.87 It is important to analyse the privacy impact of Intrusion Detection System (IDS) rules, in order to understand a…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424Information privacyNaive Bayes classifierComputer scienceRelational databasePrivacy softwareData securityConfidentialityNetwork monitoringIntrusion detection systemData miningcomputer.software_genrecomputer
researchProduct

Trust-based framework for security enhancement of P2PSIP communication systems

2009

Today, Peer-to-Peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced trustworthiness and may cause security problems, e.g. privacy leaks, unpredictable availability, etc. In this paper, we investigate on P2PSIP security issues and propose a subjective based trust model that offers trust services during P2PSIP session establishment. The main issues considered in this model include opinion calculation, opinion maintenance, data confidentiality and integrity, message rou…

business.industryNetwork securityComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSCryptographyCommunications systemComputer securitycomputer.software_genreDistributed hash tableNAT traversalServerConfidentialitybusinessChord (peer-to-peer)computerComputer network2009 International Conference for Internet Technology and Secured Transactions, (ICITST)
researchProduct

Online Professionalism-2018 Update of European Association of Urology (@Uroweb) Recommendations on the Appropriate Use of Social Media.

2018

Abstract Context Social media (SoMe) has transformed communication among health care professionals by enabling rapid and global information exchange. Yet, the novelty of SoMe and concerns about potential risks continue to be barriers to adoption. Objective To encourage appropriate professional use of SoMe by physicians in concordance with best practices and to update practical guidelines for effective and professional use of these communication technologies. Evidence aquisition The European Association of Urology (EAU; @Uroweb) brought together a committee of SoMe stakeholders in the urology field. PubMed and the grey literature were searched to identify SoMe position papers by other medica…

medicine.medical_specialtyFacebookAttitude of Health Personnel[SDV]Life Sciences [q-bio]Best practicemedia_common.quotation_subjectUrologistsUrologyTwitterWhatsApp030232 urology & nephrologyUrologyContext (language use)Guidelines[SDV.MHEP.UN]Life Sciences [q-bio]/Human health and pathology/Urology and NephrologyDigital media03 medical and health sciences0302 clinical medicineHonestyHealth caremedicineHumansSocial mediaCooperative BehaviorPhysician's RoleDigital mediamedia_commonCourtesybusiness.industryAttitude to ComputersYouTubeDigitalizationGrey literature3. Good healthScholarly CommunicationProfessionalism030220 oncology & carcinogenesisInstagramInterdisciplinary CommunicationbusinessProfessional MisconductSocial MediaConfidentialityEuropean urology
researchProduct

Consenso de expertos sobre propuestas de información al paciente en tratamiento con sales de litio

2021

Introduction: Lithium is one of the first therapeutic options for bipolar disorder, which is characterized by recurrent mood swings that strongly reduce quality of life. Our purpose was to achieve professional consensus criteria to define the contents of an information sheet for patients with bipolar disorder that are starting treatment with lithium. Material and methods: A modified Delphi method in two rounds was used. The Scientific Committee—made up by nine psychiatrists—created a 20-item questionnaire about the information that must be given to the patient treated with lithium and selected a panel of ambulatory and hospital psychiatric experts to agree on this information. Panelists sco…

medicine.medical_specialtyLithium (medication)business.industryMood swingExpert consensusmedicine.disease030227 psychiatryLikert scale03 medical and health sciencesPsychiatry and Mental health0302 clinical medicineQuality of life (healthcare)Health caremedicineConfidentialityMedical physicsBipolar disordermedicine.symptomPsychologybusiness030217 neurology & neurosurgerymedicine.drugRevista de Psiquiatría y Salud Mental
researchProduct

Pacientu datu konfidencialitātes ievērošanas biežākie iespējamie traucējošie faktori intensīvās terapijas klīnikas māsu darbā

2021

Bakalaura darba tēma ir „Pacientu datu konfidencialitātes ievērošanas biežākie iespējamie traucējošie faktori intensīvās terapijas klīnikas māsu darbā”. Tēmas aktualitāti nosaka drošības, likumdošanas un ētikas vērtību izpratne veselības aprūpes speciālistu vidū. Pacientu datu apstrāde ir neatņemama veselības aprūpes sastāvdaļa, un tā jāveic atbilstoši normatīvajiem aktiem. Darba mērķis bija noskaidrot pacientu datu konfidencialitātes ievērošanas biežākos iespējamos traucējošos faktorus intensīvās terapijas klīnikas māsu darbā. Uzdevumi bija apskatīt normatīvos aktus, zinātnisko literatūru un pētījumus par pacientu datu konfidencialitāti un informāciju par konfidencialitātes ievērošanas bie…

pacientu datikonfidencialitāteconfidentialitypatient dataMedicīna
researchProduct

"Last Signification Bits" Method for Watermarking of Medical Image

2011

International audience; In this paper, we present a new approach for watermarking of medical image that we are trying to adapt to telemedicine. This approach is intended to insert a set of data in a medical image. These data should be imperceptible and robust to various attacks. It's containing the signature of the original image, the data specific to the patient and his diagnostic. The purpose of the watermarking method is to check the integrity and preservation of the confidentiality of patient data in a network sharing. This approach is based on the use the LSB (least significant bits) of the image and tools borrowed from cryptography.

telemedicine.[INFO.INFO-TI] Computer Science [cs]/Image Processing [eess.IV]LSBsMedical[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV][ INFO.INFO-TI ] Computer Science [cs]/Image ProcessingtelemedicineWatermarkingConfidentiality
researchProduct

Social Media as Platform for Stimulating Urban Changes

2016

Images have always been an important part of city planning – current images of place, images with planned improvements, maps and sketches. Some time ago all that was a private property of stakeholders like planner and client. But nowadays this confidentiality rather much has vanished – no copyrights or competition is noteworthy. Plans do not have their privacy anymore. They are exposed even before they got implemented. This article will display why city planners share the images of their ideas, of their dreams in public (mostly in blogs and social networks) – why it is important for them and what kind of feedback they are waiting for. This article is based on case study where 12 respondents…

urban plannerscomputer.software_genrevisual imaginationRather muchlcsh:Communication. Mass mediaCompetition (economics)city planningUrban planningConfidentialitySocial mediaindirect communicationlcsh:B1-5802computer.programming_languageMultimediacommunicationbusiness.industrylcsh:Philosophy (General)RealisationGeneral MedicinePublic relationsPlannerlcsh:P87-96imagesGeographyPrivate propertybusinesscomputeridea sharingCoactivity: Philosophy, Communication
researchProduct

Konfidencialitātes princips mediācijā

2015

Article 7 of the Mediation Directive sets a confidentiality rule, provides minimum regulation regarding it and urges Member States to tolerate it and create a set of national rules in order to protect confidentiality in mediation. The aim of this article is to analyse the principle of confidentiality in mediation, to explain its particular qualities and assess the importance of it. Mediācijas direktīvas 7. pants nosaka konfidencialitātes principu, nodrošina tā obligāto regulējumu un mudina dalībvalstis to pieļaut un cienīt, kā arī izveidot nacionālus likumus, lai aizsargātu konfidencialitātes principu mediācijā. Šā raksta mērķis ir izvērtēt konfidencialitātes principu mediācijā, noskaidrot …

“bezaizsprieduma princips”business.industrymediācijaInternet privacyMediācijas direktīvaMediation Directivewithout prejudice ruleMediation“mediācijas privilēģija”mediationconfidentiality ruleConfidentialityPsychologybusinessmediation privilegekonfidencialitātes principsSOCRATES. Rīgas Stradiņa universitātes Juridiskās fakultātes elektroniskais juridisko zinātnisko rakstu žurnāls / SOCRATES. Rīga Stradiņš University Faculty of Law Electronic Scientific Journal of Law
researchProduct