2015
DOI: 10.1007/978-3-319-16486-1_111
|View full text |Cite
|
Sign up to set email alerts
|

Can Transparency Enhancing Tools Support Patient’s Accessing Electronic Health Records?

Abstract: Abstract. Patients that access their health records take more care of their health and, when in therapy, commit more seriously to improve their condition. This leads to a more effective and more efficient healthcare management, and is also in agreement with European directives on data protection. However, accessing medical data can be risky. Security should be assured and it should be evident to the patients, who has access to what data and any violation to patient's privacy requirements should be reported. We… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…Achieving fairness through awareness or transparency can also improve trust [42,43]. Facilitating secured access to patient data can improve transparency [44] in the data and allow patients to validate their information. In our view, transparency fosters an understanding not only of the working principles of AI algorithms but also the algorithmic biases and biases due to underrepresentation.…”
Section: Trust In Human-ai Collaborationmentioning
confidence: 99%
“…Achieving fairness through awareness or transparency can also improve trust [42,43]. Facilitating secured access to patient data can improve transparency [44] in the data and allow patients to validate their information. In our view, transparency fosters an understanding not only of the working principles of AI algorithms but also the algorithmic biases and biases due to underrepresentation.…”
Section: Trust In Human-ai Collaborationmentioning
confidence: 99%
“…Unfortunately, although this past research has advanced our understanding of the strategies used by online scammers to deceive their victims (Wang et al 2012), these studies tend to draw on problematic samples (Ferreira et al 2015;Holt and Graves 2007), and provide no information regarding the interaction between the scammers and the victim throughout the progression of the criminal event (Atkins and Huang 2015;Ferreira and Lenzini 2015). As a result, no attention has been given to identifying the important cues that trigger offenders to pursue or abort fraud attempts.…”
Section: Online Fraudmentioning
confidence: 99%
“…To address this empirical gap, we draw on the criminal event perspective (Luckenbill 1977;Felson and Steadman 1983;Short 1998) to investigate how consistent is the use of "urgency" cues among online fraudsters when they attempt to defraud potential targets. Specifically, building on past research that focuses on fraudsters' deceptive strategies (Ferreira and Lenzini 2015;Atkins and Huang 2013), and drawing on claims from the Interpersonal Deception Theory (Buller and Burgoon 1996), we explore whether verbal and non-verbal cues of urgency are presented consistently to online fraud targets throughout the progression of an online non-payment fraud attempt. Moreover, integrating situational explanations of crime (Briar and Pilavin 1965;Osgood et al 1996) with Buller and Burgoon's (1996) claims, we explore whether fraudsters react to the emergence of situations conducive to online fraud by increasing the presentation of urgency cues throughout the progression of an online non-payment fraud attempt.…”
Section: Introductionmentioning
confidence: 99%
“…TETs can be subdivided into "ex-ante", which guide users before they make choices about exposing their data and "ex-post", which inform users about what data was disclosed and to whom [17]. Most of existing research on TETs focus on mobile phones and social networks [16,17] and scant research exists in adopting TETs in medical research [7]. Examples in the healthcare sector include tools to visualise what parts of an electronic health record are accessed, by whom and for what purposes [8] and privacy notifications, i.e.…”
Section: Introductionmentioning
confidence: 99%