-
Genetic Testing and Molecular Biomarkers Sep 2023
Topics: Humans; Privacy; Genetic Testing; Genetic Privacy; Confidentiality
PubMed: 37702624
DOI: 10.1089/gtmb.2023.29076.persp -
Journal of the American Psychoanalytic... Oct 2023
Topics: Humans; Privacy; Writing; Sexual Behavior
PubMed: 38140968
DOI: 10.1177/00030651231208340 -
Studies in Health Technology and... May 2022Synthetic data has been more and more used in the last few years. While its applications are various, measuring its utility and privacy is seldom an easy task. Since...
Synthetic data has been more and more used in the last few years. While its applications are various, measuring its utility and privacy is seldom an easy task. Since there are different methods of evaluating these issues, which are dependent on data types, use cases and purpose, a generic method for evaluating utility and privacy does not exist at the moment. So, we introduced a compilation of the most recent methods for evaluating privacy and utility into a single executable in order to create a report of the similarities and potential privacy breaches between two datasets, whether it is related to synthetic or not. We catalogued 24 different methods, from qualitative to quantitative, column-wise or table-wise evaluations. We hope this resource can help scientists and industries get a better grasp of the synthetic data they have and produce more easily and a better basis to create a new, more broad method for evaluating dataset similarities.
Topics: Organizations; Privacy
PubMed: 35612009
DOI: 10.3233/SHTI220389 -
The American Journal of Bioethics : AJOB Jul 2022
Topics: Genetic Privacy; Humans; Privacy
PubMed: 35737492
DOI: 10.1080/15265161.2022.2075972 -
The Lancet. Digital Health Apr 2023
Topics: Privacy; Confidentiality; Wearable Electronic Devices
PubMed: 36963905
DOI: 10.1016/S2589-7500(23)00055-9 -
Sensors (Basel, Switzerland) May 2022Under the Internet of Things paradigm, the emergence and use of a wide variety of connected devices and personalized telematics services have proliferated recently. As a... (Review)
Review
Under the Internet of Things paradigm, the emergence and use of a wide variety of connected devices and personalized telematics services have proliferated recently. As a result, along with the penetration of these devices in our daily lives, the users' security and privacy have been compromised due to some weaknesses in connected devices and underlying applications. This article focuses on analyzing the security and privacy of such devices to promote safe Internet use, especially by young people. First, the connected devices most used by the target group are classified, and an exhaustive analysis of the vulnerabilities that concern the user is performed. As a result, a set of differentiated security and privacy issues existing in the devices is identified. The study reveals that many of these vulnerabilities are related to the fact that device manufacturers often prioritize functionalities and services, leaving security aspects in the background. These companies even exploit the data linked to the use of these devices for various purposes, ignoring users' privacy rights. This research aims to raise awareness of severe vulnerabilities in devices and to encourage users to use them correctly. Our results help other researchers address these issues with a more global perspective.
Topics: Adolescent; Computer Security; Humans; Privacy
PubMed: 35684588
DOI: 10.3390/s22113967 -
Informatics For Health & Social Care Apr 2022Health chatbots interview patients and collect health data. This process makes demands on data security and data privacy. To identify how and to what extent security and... (Review)
Review
Health chatbots interview patients and collect health data. This process makes demands on data security and data privacy. To identify how and to what extent security and privacy are considered in current health chatbots. We conducted a scoping review by searching three bibliographic databases (PubMed, ACM Digital Library, IEEExplore) for papers reporting on chatbots in healthcare. We extracted which, how, and where data is stored by health chatbots and identified which external services have access to the data. Out of 1026 retrieved papers, we included 70 studies in the qualitative synthesis. Most papers report on chatbots that collect and process personal health data, usually in the context of mental health coaching applications. The majority did not provide any information regarding security or privacy aspects. We were able to determine limitations in literature and identified concrete challenges, including data access and usage of (third-party) services, data storage, data security methods, use case peculiarities and data privacy, as well as legal requirements. Data privacy and security in health chatbots are still underresearched and related information is underrepresented in scientific literature. By addressing the five key challenges in future, the transfer of theoretical solutions into practice can be facilitated.
Topics: Communication; Computer Security; Delivery of Health Care; Humans; Mental Health; Privacy
PubMed: 34617857
DOI: 10.1080/17538157.2021.1983578 -
Sensors (Basel, Switzerland) Nov 2022Modern vehicles are more complex and interconnected than ever before, which also means that attack surfaces for vehicles have increased significantly. Malicious... (Review)
Review
Modern vehicles are more complex and interconnected than ever before, which also means that attack surfaces for vehicles have increased significantly. Malicious cyberattacks will not only exploit personal privacy and property, but also affect the functional safety of electrical/electronic (E/E) safety-critical systems by controlling the driving functionality, which is life-threatening. Therefore, it is necessary to conduct cybersecurity testing on vehicles to reveal and address relevant security threats and vulnerabilities. Cybersecurity standards and regulations issued in recent years, such as ISO/SAE 21434 and UNECE WP.29 regulations (R155 and R156), also emphasize the indispensability of cybersecurity verification and validation in the development lifecycle but lack specific technical details. Thus, this paper conducts a systematic and comprehensive review of the research and practice in the field of automotive cybersecurity testing, which can provide reference and advice for automotive security researchers and testers. We classify and discuss the security testing methods and testbeds in automotive engineering. Furthermore, we identify gaps and limitations in existing research and point out future challenges.
Topics: Computer Security; Privacy
PubMed: 36501913
DOI: 10.3390/s22239211 -
Studies in Health Technology and... Nov 2022From beginning to today, pHealth has been a data driven service that collects and uses personal health information (PHI) for personal health services and personalized...
From beginning to today, pHealth has been a data driven service that collects and uses personal health information (PHI) for personal health services and personalized healthcare. As a result, pHealth services use intensively ICT technology, sensors, computers and mathematical algorithms. In past, pHealth applications were focused to certain health or sickness related problem, but in today they use mobile devices, wireless networks, Web-technology and Cloud platforms. In future, pHealth uses information systems that are highly distributed, dynamic, increasingly autonomous, multi-stakeholder data driven eco-system having ability to monitor anywhere person's regular life, movements and health related behaviours. Because privacy and trust are pre-requirements for successful pHealth, this development raises huge privacy and trust challenges to be solved. Researchers have shown that current privacy approaches and solutions used in pHealth do not offer acceptable level of privacy, and trust is only an illusion. This indicates, that today's privacy models and technology shall not be moved to the future pHealth. The authors have analysed interesting new privacy and trust ideas published in journals, and found that they seem to be effective but offer only a partial solution. To solve this weakness, the authors used a holistic system view to aspects impacting privacy and trust in pHealth, and created a template that can be used in planning and development future pHealth services. The authors also propose a tentative solution for future trustworthy pHealth. It combines privacy as personal property and trust as legal binding fiducial duty approaches, and uses a Blockchain-based smart contract solution to store person's privacy and trust requirements and service providers' promises.
Topics: Humans; Privacy; Trust; Health Records, Personal; Computers; Computers, Handheld
PubMed: 36325851
DOI: 10.3233/SHTI220968 -
The American Journal of Bioethics : AJOB Jul 2022Increasing privacy concerns are arising from expanding use of aggregated personal information in health practices. Conversely, in light of the promising benefits of data... (Review)
Review
Increasing privacy concerns are arising from expanding use of aggregated personal information in health practices. Conversely, in light of the promising benefits of data driven healthcare, privacy is being frequently dismissed as outdated, costly and ultimately egotistical. This paper aims to review the theoretical framework on privacy in order to overcome the often simplistic debate between the primacy of individual or collective interests. As a result, it is argued that although privacy can be understood as freedom of personal choice in matters of sharing intimacy, it is foundational to both community belonging and to social and political organizations at large. Ethical decisions on the use of data analytics technologies in health practices should also take into account the social effects of violating privacy.
Topics: Confidentiality; Delivery of Health Care; Humans; Privacy; Technology
PubMed: 35254963
DOI: 10.1080/15265161.2022.2040648