Skip to main content

Lecture 11 Biomedical Data: Privacy, Safety, and Security

  • Chapter
  • First Online:
Biomedical Informatics
  • 2275 Accesses

Abstract

After this lecture, you…

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Amalberti R, Auroy Y, Berwick D, Barach P (2005) Five system barriers to achieving ultrasafe health care. Ann Intern Med 142(9):756–764

    Article  Google Scholar 

  • Amalberti R, Benhamou D, Auroy Y, Degos L (2011) Adverse events in medicine: easy to count, complicated to understand, and complex to prevent. J Biomed Inform 44(3):390–394

    Article  Google Scholar 

  • Auinger A, Ebner M, Nedbal D, Holzinger A (2009) Mixing content and endless collaboration—mashups: towards future personal learning environments. In: Stephanidis C (ed) Universal access in human-computer interaction hci, part III: applications and services, HCI International 2009, vol 5616, Lecture notes in computer science (LNCS). Springer, Berlin, pp 14–23

    Google Scholar 

  • Avizienis A, Laprie JC, Randell B (2001) Fundamental concepts of dependability. Tech Rep Comput Sci Univ Newcastle 1145(CS-TR-739):7–12

    Google Scholar 

  • Bardram JE, Norskov N (2008) A context-aware patient safety system for the operating room. Proceedings of the 10th International conference on ubiquitous computing. ACM, Seoul, Korea, pp 272–281

    Google Scholar 

  • Bates DW, Gawande AA (2003) Improving safety with information technology. N Engl J Med 348(25):2526–2534

    Article  Google Scholar 

  • CarriĂłn I, Fernández-Alemán J, Toval A (2011) Usable privacy and security in personal health records. In: Campos P, Graham N, Jorge J, Nunes N, Palanque P, Winckler M (eds) INTERACT 2011, vol 6949, Lecture notes in computer science (LNCS). Springer, Berlin, pp 36–43

    Chapter  Google Scholar 

  • Fox R, Cooley J, Hauswirth M (2011) Creating a virtual personal health record using mashups. IEEE Internet Comput 15(4):23–30

    Article  Google Scholar 

  • Garrouste-Orgeas M, Philippart F, Bruel C, Max A, Lau N, Misset B (2012) Overview of medical errors and adverse events. Ann Int Care 2(1):2

    Article  Google Scholar 

  • Holzinger A, Schwaberger K, Weitlaner M (2005) Ubiquitous computing for hospital applications: RFID-applications to enable research in real-life environments. 29th Annual international conference on computer software & applications (IEEE COMPSAC). IEEE, Edinburgh, pp 19–20

    Google Scholar 

  • Holzinger A, Searle G, Wernbacher M (2011) The effect of previous exposure to technology (PET) on acceptance and its importance in usability engineering. Univ Access Inf Soc Int J 10(3):245–260

    Article  Google Scholar 

  • Leape LL, Berwick DM (2005) Five years after to err is human. JAMA 293(19):2384–2390

    Article  Google Scholar 

  • Manjunath PS, Palte H, Gayer S (2010) Wrong site surgery—a clear and constant fear. Br Med J 341:c1103

    Article  Google Scholar 

  • Neubauer T, Heurix J (2011) A methodology for the pseudonymization of medical data. Int J Med Inform 80(3):190–204

    Article  Google Scholar 

  • Reason J (1997) Management of the risks of organizational accidents. Ashgate, Brookfield, VT

    Google Scholar 

  • Reason J (2000) Human error: models and management. Br Med J 320(7237):768–770

    Article  Google Scholar 

  • Rodrigues S, Brandao P, Nelas L, Neves J, Alves VA (2010) Logic Programming Based Adverse Event Reporting and Learning System. IEEE/ACIS 9th International conference on computer and information science (ICIS), 18–20 Aug 2010, pp 189–194

    Google Scholar 

  • Safran C, Bloomrosen M, Hammond WE, Labkoff S, Markel-Fox S, Tang PC, Detmer DE (2007) Toward a national framework for the secondary use of health data: an American Medical Informatics Association white paper. J Am Med Inform Assoc 14(1):1–9

    Article  Google Scholar 

  • Stelfox HT, Palmisani S, Scurlock C, Orav E, Bates D (2006) The “To Err is Human” report and the patient safety literature. Qual Saf Health Care 15(3):174–178

    Article  Google Scholar 

  • Sundt TM, Brown JP, Uhlig PN (2005) Focus on patient safety: good news for the practicing surgeon. Ann Thorac Surg 79(1):11–15

    Article  Google Scholar 

  • Tapp L, Elwyn G, Edwards A, Holm S, Eriksson T (2009) Quality improvement in primary care: ethical issues explored. Int J Health Care Qual Assur 22(1):8–29

    Article  Google Scholar 

  • Wang C, Huang DJ (2013) The HIPAA conundrum in the era of mobile health and communications. JAMA 310(11):1121–1122

    Article  Google Scholar 

  • Weippl E, Holzinger A, Tjoa AM (2006) Security aspects of ubiquitous computing in health care. Elektrotech Informationstech 123(4):156–162

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

1 Supplementary Materials

Below is the link to the electronic supplementary material.

11_LV444_152_BIOMEDICAL_DATA_PRIVACY_2013-14_lowres.pdf (PDF 5.36 MB)

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Holzinger, A. (2014). Lecture 11 Biomedical Data: Privacy, Safety, and Security. In: Biomedical Informatics. Springer, Cham. https://doi.org/10.1007/978-3-319-04528-3_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-04528-3_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-04527-6

  • Online ISBN: 978-3-319-04528-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics