Abstract
As the amount of electronic medical record (EMR) denoting its big data characteristic are being collected by several healthcare institutions increases, privacy concerns also increases. Patients need to disclose their private information in order to be diagnosed and given appropriate treatments. There are several mechanisms used today to protect patients’ personal information but there are few studies conducted from patients’ perspective. This paper highlights the literature review on privacy preferences in healthcare environment. It then, further identifies the factors that influence privacy preferences based on secondary data obtained from journals, conference papers and books. The findings of this on-going study proceed with designing a proposed conceptual model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mont MC, Pearson S, Creese S et al (2011) A conceptual model for privacy policies with consent and revocation requirements. In: Fischer-Hübner S, Duquenoy P, Hansen M et al (eds) Privacy and identity management for life. Springer, Berlin, pp 258–270
Manyika J, Chui M, Brown B et al (2011) Big data: the next frontier for innovation, competition, and productivity. McKinsey Global Institute, Sydney
Ghazinour K, Majedi M, Barker K (2009) A lattice-based privacy aware access control model. In: 2009 International conference on computational science and engineering, IEEE, Vancouver, BC, pp 154–159
Tankard C (2012) Big data security. Netw secur: 5–8. doi: 10.1016/S1353-4858(12)70063-6
Varonis (2012) Big data and infosecurity: Research Report
Sandıkkaya MT, Decker B De, Naessens V (2011) Privacy in commercial medical storage systems. In: Szomszor M, Kostkova P (eds) Electronic healthcare. Springer, Berlin, pp 247–258
Mercuri RT (2004) The HIPAA-potamus in health care data security. Commun ACM 47:25–28
Hong Y, Lu S, Liu Q et al (2007) A hierarchical approach to the specification of privacy preferences. In: IIT’07 4th IEEE International conference on innovations in information technology, Dubai, 2007, pp 660–664
Hong Y, Lu S, Liu Q et al (2008) Preserving privacy in E-health systems using hippocratic databases. In: 32nd Annual IEEE international computer software and applications conference. IEEE, 2008, pp 692–697
Armellin G, Betti D, Casati F, Chiasera A (2010) Privacy preserving event driven integration for interoperating social and health systems. In: Jonker W, Petković M (eds) SDM’10 Proceedings of the 7th VLDB conference on secure data management. Springer, Berlin, pp 54–69
Samsuri S, Ismail Z, Ahmad R (2013) Adopting a knowledge management concept in securing the privacy of electronic medical record systems. In: Uden L, Francisco Herrera JBP, Rodríguez JMC (eds) 7th International conference on KMOes, the realization of knowledge management (KM) concept is considered as significant. This concept can be applied in considering information privacy as a component in designing a computerized system. Consequently, this. Springer, Berlin, pp 547–558
Hassan NH, Ismail Z (2012) A conceptual model for investigating factors influencing information security culture in healthcare environment. Procedia: Soc Behavioral Sci Elsevier, Jakarta, pp 1007–1012
Kolter J, Pernul G (2009) Generating user-understandable privacy preferences. In: 2009 International conference on availability, reliability and security. IEEE, Fukuoka, pp 299–306
Willison DJ, Steeves V, Charles C et al (2009) Consent for use of personal information for health research: do people with potentially stigmatizing health conditions and the general public differ in their opinions? BMC Med Ethics 10:10. doi:10.1186/1472-6939-10-10
Samsuri S, Ismail Z, Ahmad R (2011) Privacy models for protecting personal medical information: A preliminary study. In: 2011 International conference on research and innovation in information systems. IEEE, pp 1–5
United States Public Law 104-191 (1996) Health Insurance Portability and Accountability Act
Appari A, Eric Johnson M (2010) Information security and privacy in healthcare: current state of research. Int J Internet Enterp Manag 6:279–314
Shoniregun C a., Dube K, Mtenzi F (2010) Securing e-Healthcare Information. Electronic Healthcare Information Security, Advances in Information Security. Springer, Boston, pp 29–57
Damschroder LJ, Pritts JL, Neblo MA et al (2007) Patients, privacy and trust: Patients’ willingness to allow researchers to access their medical records. Soc Sci Med 64:223–235. doi: 10.1016/j.socscimed.2006.08.045
Mobach MP (2009) Counter design influences the privacy of patients in health care. Soc Sci Med 68:1000–1005. doi: 10.1016/j.socscimed.2008.12.002
Mekovec R, Vrcek N (2011) Factors that influence internet users’ privacy perception. In: Proceedings of the ITI 2011 33rd International conference on information technology interfaces (ITI), IEEE, Dubrovnik, pp 227–232
Schwaig KS, Segars AH, Grover V, Fiedler KD (2013) A model of consumers’ perceptions of the invasion of information privacy. Info Manag 50:1–12. doi:http://dx.doi.org/10.1016/j.im.2012.11.002
Mohamed N, Ahmad IH (2012) Information privacy concerns, antecedents and privacy measure use in social networking sites: evidence from Malaysia. Comput Hum Behav 28:2366–2375. doi: 10.1016/j.chb.2012.07.008
Li Y (2012) Theories in online information privacy research: a critical review and an integrated framework. Decis Support Syst 54:471–481. doi:10.1016/j.dss.2012.06.010
Sankar P, Moran S, Merz JF, Jones NL (2003) Patient perspectives on medical confidentiality: a review of the literature. J Gen Intern Med 18:659–669
King NJ, Raja VT (2012) Protecting the privacy and security of sensitive customer data in the cloud. Comput Law Secure Rev 28:308–319. doi:10.1016/j.clsr.2012.03.003
Tesema T (2010) Patient’s perception of health information security: the case of selected public and private hospitals in Addis Ababa. In: 2010 Sixth international conference on information assurance and security (IAS), IEEE, Atlanta, GA, 179–184
Bansal G, Zaheid FM, Gefen D (2007) The impact of personal dispositions on privacy and trust in disclosing health information online. In: Proceedings of the AMCIS 2007
Samy GN, Ahmad R, Ismail Z (2009) Threats to health information security. In: 2009 Fifth international conference on information assurance and security. IEEE, pp 540–543
Deng M, Wuyts K, Scandariato R et al (2010) A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requir Eng 16:3–32. doi:10.1007/s00766-010-0115-7
Policy Engagement Network (2010) Electronic health privacy and security in developing countries and humanitarian operations, pp 1–28
AbuKhousa E, Mohamed N, Al-Jaroodi J (2012) e-Health cloud: opportunities and challenges. Futur Internet 4:621–645. doi:10.3390/fi4030621
Ardagna CA, Capitani S De (2011) Privacy models and languages: access control and data handling policies. In: Camenisch J, Leenes R, Sommer D (eds) Digital privacy, part III. Springer, Berlin, pp 309–329
Trojer T, Katt B, Schabetsberger T et al (2012) The process of policy authoring of patient-controlled privacy preferences. In: Kostkova P, Szomszor M, Fowler D (eds) Electronic healthcare. Springer, Berlin, pp 97–104
Samsuri S, Ahmad R, Ismail Z (2011) Towards implementing a privacy policy: an observation on existing practices in hospital information system. J e-Health Manag 2011:1–9. doi:10.5171/2011.345834
Acknowledgments
This study is funded by Zamalah Scholarship provided by Universiti Teknologi Malaysia (UTM) and Research University Grant (RUG) from UTM and Ministry of Higher Education (MOHE) Malaysia with the project number Q.K 130000.2138.01H98.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Rahim, F.A., Ismail, Z., Samy, G.N. (2014). A Conceptual Model for Privacy Preferences in Healthcare Environment. In: Uden, L., Wang, L., Corchado Rodríguez, J., Yang, HC., Ting, IH. (eds) The 8th International Conference on Knowledge Management in Organizations. Springer Proceedings in Complexity. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-7287-8_18
Download citation
DOI: https://doi.org/10.1007/978-94-007-7287-8_18
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-7286-1
Online ISBN: 978-94-007-7287-8
eBook Packages: Computer ScienceComputer Science (R0)