Role of Data Science in Enhancing Privacy in E-Healthcare Systems

Authors

  • Manas Kumar Yogi Assistant Professor, Department of Computer Science and Engineering, Pragati Engineering College (A), Surampalem, Andhra Pradesh, India
  • Muktineni Urjitha Bala Student, Department of Computer Science and Engineering, Pragati Engineering College (A), Surampalem, Andhra Pradesh, India
  • K. Venkateswari Student, Department of Computer Science and Engineering, Pragati Engineering College (A), Surampalem, Andhra Pradesh, India

Keywords:

Data science, Privacy, e-healthcare, Security, Encryption

Abstract

The test is that while learning and data science are basic empowering agents of productivity and viability in present day associations, exploiting them often implies entrusting delicate data to outer sellers. The overall privacy model will in general be binary: either the data science as a specialist resource has the association's full trust and gets immediate admittance to the data, or they do not have the trust and they get no entrance by any means. This "full trust" model makes an either/or circumstance that sets associations up to need to pick security or advancement. Fortunately, there are a few promising data privacy innovations that can facilitate that strain. These are "fractional trust" models that give more space to both security and advancement. In this study we try to throw sufficient light on the various works related to privacy in healthcare systems and also discuss the various dimensions of privacy where suitable data science mechanisms are been deployed for the greater good of patients who are always worried about their sensitive data being leaked.

References

Alhadeff J, Van Alsenoy B, Dumortier J. The accountability principle in data protection regulation: origin, development and future directions. UK: Palgrave Macmillan; 2012.

Avison DE, Lau F, Myers MD, Nielsen PA. Action research. Commun ACM. 1999 Jan 1; 42(1): 94 97.

Baskerville RL. Investigating information systems with action research. Commun Assoc Inf Syst 1999 Oct 9; 2(1): 19.

Baskerville RL, Wood Harper AT. A critical perspective on action research as a method for information systems research. J Inf Technol. 199 6 Sep 1; 11 ( 235 246.

Local BBB ( International Association of Better Business Bureaus [ Better Business Bureau. Available from: https://www.bb b.org/local bbb/international association of better business bureaus

Bennett C, Bayley R, Charlesworth A, Clarke R. Privacy Impact Assessments: International study of their application and effects. UK: Loughborough University 2007 Oct.

Stutz O, Todt S, Venzk e Caprarese S, Boll S, Heuten W, Wallbaum T. Implementing Data Protection and Information Security in AAL. Ambient Assisted Living. 2016:59.

Cavoukian A ( Privacy by design… Take the challenge. Information and Privacy Commissioner of Ontario ( [ http://www.ipc.on.ca/images/Resources/PrivacybyDesignBook.pdf (accessed 10 October 2012).

Cavoukian A ( Privacy by design: the 7 foundation al principles. Information and Privacy Commissioner of Ontario ( [ http://privacybydesign.ca/about/principles/ (accessed 10 October 2012).

Clarke R. Privacy impact assessment: Its origins and development. Comput Law Secur Rev 2009 Jan 1; 25(2): 123 135.

Clarke R. An evaluation of privacy impact assessment guidance documents. Int Data Priv Law. 2011 Feb 15; 1(2): 111 120.

Cranor LF. Necessary but not sufficient: Standardized mechanisms for privacy notice and choice. J. on Telecomm. High Tech. L. 2012; 10: 273 308

Davison R, Martinsons MG, Kock N. Principles of canonical action research. Inf Syst J 2004 Jan; 14(1): 65 86.

Mul ligan DK, Koopman C, Doty N. Privacy is an essentially contested concept: a multi dimensional analytic for mapping privacy. Philos Trans Royal Soc A: Math, Phys Eng Sci. 2016 Dec 28; 374(2083): 20160118.

Mooney SJ, Pejaver V. Big data in public health: terminology, machine learning, and privacy. Annu Rev Public Health 2018 Apr 1; 39: 95 112.

Price WN, Cohen IG. Privacy in the age of medical big data. Nat Med 2019 Jan; 25(1): 37 43.

Sun W, Cai Z, Li Y, Liu F, Fang S, Wang G. Security and privacy in the medical internet of things: a review. Secur Commun Netw. 2018; 2018: 5978636( 9 p)

Published

2023-04-29