Witnesses for the Doctor in the Loop

The “doctor in the loop” is a new paradigm in information driven medicine, picturing the doctor as authority inside a loop supplying an expert system with information on actual patients, treatment results and possible additional (side-)effects, as well as general information in order to enhance data driven medical science, as well as giving back treatment advice to the doctor himself. While this approach offers several positive aspects related to P4 medicine (personal, predictive, preventive and participatory), it also relies heavily on the authenticity of the data and increases the reliance on the security of databases, as well as on the correctness of machine learning algorithms. In this paper we propose a solution in order to protect the doctor in the loop against responsibility derived from manipulated data, thus enabling this new paradigm to gain acceptance in the medical community.

[1]  Edgar R. Weippl,et al.  Protecting Anonymity in Data-Driven Biomedical Science , 2014, Interactive Knowledge Discovery and Data Mining in Biomedical Informatics.

[2]  Edgar R. Weippl,et al.  InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.

[3]  Dennis Lupiana,et al.  Development of a framework to leverage knowledge management systems to improve security awareness. , 2008 .

[4]  Ebrahim Randeree Secure Health Knowledge: Balancing Security, Privacy and Access , 2005, AMCIS.

[5]  Merrill Warkentin,et al.  User Interaction with Healthcare Information Systems: Do Healthcare Professionals Want to Comply with HIPAA? , 2006, AMCIS.

[6]  Igor Jurisica,et al.  Knowledge Discovery and Data Mining in Biomedical Informatics: State-of-the-Art and Future Challenges , 2014 .

[7]  Angela Sasse,et al.  Humans in the Loop Human – Computer Interaction and Security , 2022 .

[8]  Peter Kieseberg,et al.  Anonymity and Pseudonymity in Data-Driven Science , 2014 .

[9]  Matt Blaze,et al.  Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System , 2011, USENIX Security Symposium.

[10]  Edgar R. Weippl,et al.  Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations , 2014, Digit. Investig..

[11]  Stefan Fenz,et al.  A taxonomy for privacy enhancing technologies , 2015, Comput. Secur..