Roadmap to Successful Digital Health Ecosystems 2022
DOI: 10.1016/b978-0-12-823413-6.00014-8
|View full text |Cite
|
Sign up to set email alerts
|

Health data security and privacy: Challenges and solutions for the future

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 44 publications
0
1
0
Order By: Relevance
“…Another works showing health data security challenges and solutions, focusing on access control, cryptography, data de-identification, and privacy-preserving distributed data mining. Realistic use cases illustrate implementation, guiding healthcare institutions in crafting cybersecurity policies to meet GDPR, HIPAA, and other regulations [27]. The mHealth applications act as telemedicine platforms, enabling remote consultations and prescription deliveries, particularly beneficial in underserved or rural regions.…”
Section: Cryptography For Healthcarementioning
confidence: 99%
See 1 more Smart Citation
“…Another works showing health data security challenges and solutions, focusing on access control, cryptography, data de-identification, and privacy-preserving distributed data mining. Realistic use cases illustrate implementation, guiding healthcare institutions in crafting cybersecurity policies to meet GDPR, HIPAA, and other regulations [27]. The mHealth applications act as telemedicine platforms, enabling remote consultations and prescription deliveries, particularly beneficial in underserved or rural regions.…”
Section: Cryptography For Healthcarementioning
confidence: 99%
“…Literature study [27] Access control, cryptography along with data de-identification and privacypreserving, distributed data mining.…”
Section: [23]mentioning
confidence: 99%
“…However, security and privacy challenges impede the widespread adoption of cloud services because they are susceptible to privacy and security threats [ 7 ]. Patients and health care organizations are afraid of losing control over the EMR when storing it on untrusted third-party clouds [ 8 ]. Finally, besides handling the privacy and security threats in cloud environments, cloud-based EMR applications must comply with the legal requirements regarding privacy and security imposed by the General Data Protection Regulation (GDPR) [ 9 ].…”
Section: Introductionmentioning
confidence: 99%