Privacy Challenges in the Use of eHealth Systems for Public Health Management

Privacy is a major issue in information management for public health needs. For example, the surveillance of infectious diseases, such as HIV, is an important function of public health and it presents major privacy concerns for affected people. While their privacy must be protected, privacy concerns should not come in the way of effective data collection and surveillance. In this paper, the authors present a survey of published work covering privacy challenges in the use of eHealth systems, especially in the context of public health management. The authors identify and present the major privacy challenges, their effects on personal patient privacy and public health management based on the review of research in electronic data privacy and eHealth privacy. The authors also present a survey of privacy-preserving technologies and solutions that address these challenges.

[1]  Khaled El Emam,et al.  Privacy Interests in Prescription Data, Part I: Prescriber Privacy , 2009, IEEE Security & Privacy Magazine.

[2]  Dixie B. Baker,et al.  Privacy and Security in Public Health: Maintaining the Delicate Balance between Personal Privacy and Population Safety , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[3]  Daniel L. Moody,et al.  Using on-line medical knowledge to support evidence-based practice: a case study of a successful knowledge management project , 2002 .

[4]  Han de Vries,et al.  Are electronic health records ready for genomic medicine? , 2009, Genetics in Medicine.

[5]  Harry Henderson Privacy in the Information Age , 1999 .

[6]  P. Ray,et al.  Privacy Management in Consumer e-Health , 2007, 2007 9th International Conference on e-Health Networking, Application and Services.

[7]  Pradeep Kumar Ray,et al.  The Need for Technical Solutions for Maintaining the Privacy of EHR , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.

[8]  Jeongeun Kim The Development and Implementation of Patient Safety Information Systems (PSIS) , 2011 .

[9]  Milan Petkovic,et al.  Security, Privacy and Trust in Modern Data Management (Data-Centric Systems and Applications) , 2007 .

[10]  Louis Phee,et al.  Master-Slave Robotic System for Therapeutic Gastrointestinal Endoscopic Procedures , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.

[11]  N. Wickramasinghe Encyclopedia of Healthcare Information Systems , 2008 .

[12]  Nuno Laranjeiro,et al.  Benchmarking the Robustness of Web Services , 2007 .

[13]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[14]  Gurpreet Dhillon,et al.  Internet Privacy: Interpreting Key Issues , 2001, Inf. Resour. Manag. J..

[15]  N. Bean,et al.  Data management issues for emerging diseases and new tools for managing surveillance and laboratory data. , 1995, Emerging infectious diseases.

[16]  Charles K. Ayo,et al.  On Sharp Boundary Problem in Rule Based Expert Systems in the Medical Domain , 2010, Int. J. Heal. Inf. Syst. Informatics.

[17]  Thomas Neubauer,et al.  Applying a Threshold Scheme to the Pseudonymization of Health Data , 2007 .

[18]  James H. Moor,et al.  Towards a theory of privacy in the information age , 1997, CSOC.

[19]  Herman T. Tavani,et al.  PHILOSOPHICAL THEORIES OF PRIVACY: IMPLICATIONS FOR AN ADEQUATE ONLINE PRIVACY POLICY , 2007 .

[20]  James G. Anderson,et al.  Social, ethical and legal barriers to E-health , 2007, Int. J. Medical Informatics.

[21]  S. Sastry,et al.  Security and Privacy Issues with Health Care Information Technology , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.

[22]  Shinji Mase,et al.  The guideline of the personal health data structure to secure safety healthcare: The balance between use and protection to satisfy the patients' needs , 2007, Int. J. Medical Informatics.

[23]  Chien-Ding Lee,et al.  A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations , 2008, IEEE Transactions on Information Technology in Biomedicine.

[24]  H. Jeff Smith,et al.  Values, personal information privacy, and regulatory approaches , 1995, CACM.

[25]  Maria Moloney,et al.  Online Privacy: Measuring Individuals' Concerns , 2008, EC-Web.

[26]  Bradley Malin,et al.  A computational model to protect patient data from location-based re-identification , 2007, Artif. Intell. Medicine.

[27]  Mark S. Ackerman,et al.  Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.

[28]  Joseph Tan Advancing Technologies and Intelligence in Healthcare and Clinical Environments: Breakthroughs , 2012 .

[29]  A. Dwivedi Handbook of Research on Information Technology Management and Clinical Data Administration in Healthcare , 2009 .