2022
DOI: 10.2196/39947
|View full text |Cite
|
Sign up to set email alerts
|

Theoretical Approach and Scale Construction of Patient Privacy Protection Behavior of Doctors in Public Medical Institutions in China: Pilot Development Study

Abstract: Background Considering the high incidence of medical privacy disclosure, it is of vital importance to study doctors’ privacy protection behavior and its influencing factors. Objective We aim to develop a scale for doctors’ protection of patients’ privacy in Chinese public medical institutions, following construction of a theoretical model framework through grounded theory, and subsequently to validate the scale to measure this protection behavior. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 38 publications
0
0
0
Order By: Relevance
“…30 Our team also promotes better patient privacy protection by constructing a theoretical framework for doctor-patient confidentiality. 31…”
Section: Ai In Data Governancementioning
confidence: 99%
See 1 more Smart Citation
“…30 Our team also promotes better patient privacy protection by constructing a theoretical framework for doctor-patient confidentiality. 31…”
Section: Ai In Data Governancementioning
confidence: 99%
“…Our team previously conducted an exploratory study on the intrinsic mechanism of doctors’ patient-protective behavior in Chinese public medical institutions and constructed a theoretical model framework for such behavior. 31 At the technical level, the privacy algorithm creates bridges between data elements and data values by employing multiple secure computing, blockchain technology, homomorphic encryption, and zero knowledge protocols, including anonymity, access control models, special processing and control, and role control models based on privacy expansion, encryption, and correlation technologies for datasets. We also require the adoption of decentralized storage solutions to safeguard data security.…”
Section: Application Of Spray-type Aimentioning
confidence: 99%