Skip to main content

A Conceptual Model for Privacy Preferences in Healthcare Environment

  • Conference paper
  • First Online:
Book cover The 8th International Conference on Knowledge Management in Organizations

Abstract

As the amount of electronic medical record (EMR) denoting its big data characteristic are being collected by several healthcare institutions increases, privacy concerns also increases. Patients need to disclose their private information in order to be diagnosed and given appropriate treatments. There are several mechanisms used today to protect patients’ personal information but there are few studies conducted from patients’ perspective. This paper highlights the literature review on privacy preferences in healthcare environment. It then, further identifies the factors that influence privacy preferences based on secondary data obtained from journals, conference papers and books. The findings of this on-going study proceed with designing a proposed conceptual model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mont MC, Pearson S, Creese S et al (2011) A conceptual model for privacy policies with consent and revocation requirements. In: Fischer-Hübner S, Duquenoy P, Hansen M et al (eds) Privacy and identity management for life. Springer, Berlin, pp 258–270

    Chapter  Google Scholar 

  2. Manyika J, Chui M, Brown B et al (2011) Big data: the next frontier for innovation, competition, and productivity. McKinsey Global Institute, Sydney

    Google Scholar 

  3. Ghazinour K, Majedi M, Barker K (2009) A lattice-based privacy aware access control model. In: 2009 International conference on computational science and engineering, IEEE, Vancouver, BC, pp 154–159

    Google Scholar 

  4. Tankard C (2012) Big data security. Netw secur: 5–8. doi: 10.1016/S1353-4858(12)70063-6

  5. Varonis (2012) Big data and infosecurity: Research Report

    Google Scholar 

  6. Sandıkkaya MT, Decker B De, Naessens V (2011) Privacy in commercial medical storage systems. In: Szomszor M, Kostkova P (eds) Electronic healthcare. Springer, Berlin, pp 247–258

    Google Scholar 

  7. Mercuri RT (2004) The HIPAA-potamus in health care data security. Commun ACM 47:25–28

    Google Scholar 

  8. Hong Y, Lu S, Liu Q et al (2007) A hierarchical approach to the specification of privacy preferences. In: IIT’07 4th IEEE International conference on innovations in information technology, Dubai, 2007, pp 660–664

    Google Scholar 

  9. Hong Y, Lu S, Liu Q et al (2008) Preserving privacy in E-health systems using hippocratic databases. In: 32nd Annual IEEE international computer software and applications conference. IEEE, 2008, pp 692–697

    Google Scholar 

  10. Armellin G, Betti D, Casati F, Chiasera A (2010) Privacy preserving event driven integration for interoperating social and health systems. In: Jonker W, Petković M (eds) SDM’10 Proceedings of the 7th VLDB conference on secure data management. Springer, Berlin, pp 54–69

    Google Scholar 

  11. Samsuri S, Ismail Z, Ahmad R (2013) Adopting a knowledge management concept in securing the privacy of electronic medical record systems. In: Uden L, Francisco Herrera JBP, Rodríguez JMC (eds) 7th International conference on KMOes, the realization of knowledge management (KM) concept is considered as significant. This concept can be applied in considering information privacy as a component in designing a computerized system. Consequently, this. Springer, Berlin, pp 547–558

    Google Scholar 

  12. Hassan NH, Ismail Z (2012) A conceptual model for investigating factors influencing information security culture in healthcare environment. Procedia: Soc Behavioral Sci Elsevier, Jakarta, pp 1007–1012

    Google Scholar 

  13. Kolter J, Pernul G (2009) Generating user-understandable privacy preferences. In: 2009 International conference on availability, reliability and security. IEEE, Fukuoka, pp 299–306

    Google Scholar 

  14. Willison DJ, Steeves V, Charles C et al (2009) Consent for use of personal information for health research: do people with potentially stigmatizing health conditions and the general public differ in their opinions? BMC Med Ethics 10:10. doi:10.1186/1472-6939-10-10

    Article  Google Scholar 

  15. Samsuri S, Ismail Z, Ahmad R (2011) Privacy models for protecting personal medical information: A preliminary study. In: 2011 International conference on research and innovation in information systems. IEEE, pp 1–5

    Google Scholar 

  16. United States Public Law 104-191 (1996) Health Insurance Portability and Accountability Act

    Google Scholar 

  17. Appari A, Eric Johnson M (2010) Information security and privacy in healthcare: current state of research. Int J Internet Enterp Manag 6:279–314

    Article  Google Scholar 

  18. Shoniregun C a., Dube K, Mtenzi F (2010) Securing e-Healthcare Information. Electronic Healthcare Information Security, Advances in Information Security. Springer, Boston, pp 29–57

    Google Scholar 

  19. Damschroder LJ, Pritts JL, Neblo MA et al (2007) Patients, privacy and trust: Patients’ willingness to allow researchers to access their medical records. Soc Sci Med 64:223–235. doi: 10.1016/j.socscimed.2006.08.045

    Google Scholar 

  20. Mobach MP (2009) Counter design influences the privacy of patients in health care. Soc Sci Med 68:1000–1005. doi: 10.1016/j.socscimed.2008.12.002

    Google Scholar 

  21. Mekovec R, Vrcek N (2011) Factors that influence internet users’ privacy perception. In: Proceedings of the ITI 2011 33rd International conference on information technology interfaces (ITI), IEEE, Dubrovnik, pp 227–232

    Google Scholar 

  22. Schwaig KS, Segars AH, Grover V, Fiedler KD (2013) A model of consumers’ perceptions of the invasion of information privacy. Info Manag 50:1–12. doi:http://dx.doi.org/10.1016/j.im.2012.11.002

    Google Scholar 

  23. Mohamed N, Ahmad IH (2012) Information privacy concerns, antecedents and privacy measure use in social networking sites: evidence from Malaysia. Comput Hum Behav 28:2366–2375. doi: 10.1016/j.chb.2012.07.008

  24. Li Y (2012) Theories in online information privacy research: a critical review and an integrated framework. Decis Support Syst 54:471–481. doi:10.1016/j.dss.2012.06.010

  25. Sankar P, Moran S, Merz JF, Jones NL (2003) Patient perspectives on medical confidentiality: a review of the literature. J Gen Intern Med 18:659–669

    Article  Google Scholar 

  26. King NJ, Raja VT (2012) Protecting the privacy and security of sensitive customer data in the cloud. Comput Law Secure Rev 28:308–319. doi:10.1016/j.clsr.2012.03.003

  27. Tesema T (2010) Patient’s perception of health information security: the case of selected public and private hospitals in Addis Ababa. In: 2010 Sixth international conference on information assurance and security (IAS), IEEE, Atlanta, GA, 179–184

    Google Scholar 

  28. Bansal G, Zaheid FM, Gefen D (2007) The impact of personal dispositions on privacy and trust in disclosing health information online. In: Proceedings of the AMCIS 2007

    Google Scholar 

  29. Samy GN, Ahmad R, Ismail Z (2009) Threats to health information security. In: 2009 Fifth international conference on information assurance and security. IEEE, pp 540–543

    Google Scholar 

  30. Deng M, Wuyts K, Scandariato R et al (2010) A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requir Eng 16:3–32. doi:10.1007/s00766-010-0115-7

    Article  Google Scholar 

  31. Policy Engagement Network (2010) Electronic health privacy and security in developing countries and humanitarian operations, pp 1–28

    Google Scholar 

  32. AbuKhousa E, Mohamed N, Al-Jaroodi J (2012) e-Health cloud: opportunities and challenges. Futur Internet 4:621–645. doi:10.3390/fi4030621

    Article  Google Scholar 

  33. Ardagna CA, Capitani S De (2011) Privacy models and languages: access control and data handling policies. In: Camenisch J, Leenes R, Sommer D (eds) Digital privacy, part III. Springer, Berlin, pp 309–329

    Google Scholar 

  34. Trojer T, Katt B, Schabetsberger T et al (2012) The process of policy authoring of patient-controlled privacy preferences. In: Kostkova P, Szomszor M, Fowler D (eds) Electronic healthcare. Springer, Berlin, pp 97–104

    Google Scholar 

  35. Samsuri S, Ahmad R, Ismail Z (2011) Towards implementing a privacy policy: an observation on existing practices in hospital information system. J e-Health Manag 2011:1–9. doi:10.5171/2011.345834

    Article  Google Scholar 

Download references

Acknowledgments

This study is funded by Zamalah Scholarship provided by Universiti Teknologi Malaysia (UTM) and Research University Grant (RUG) from UTM and Ministry of Higher Education (MOHE) Malaysia with the project number Q.K 130000.2138.01H98.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fiza Abdul Rahim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Rahim, F.A., Ismail, Z., Samy, G.N. (2014). A Conceptual Model for Privacy Preferences in Healthcare Environment. In: Uden, L., Wang, L., Corchado Rodríguez, J., Yang, HC., Ting, IH. (eds) The 8th International Conference on Knowledge Management in Organizations. Springer Proceedings in Complexity. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-7287-8_18

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-7287-8_18

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-7286-1

  • Online ISBN: 978-94-007-7287-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics