:::

詳目顯示

回上一頁
題名:醫療資料庫之隱私權保護技術探討
書刊名:電腦稽核
作者:莊玉如曹怡茹
出版日期:2012
卷期:25
頁次:頁30-43
主題關鍵詞:醫療資料庫隱私保護匿名化分類資料分類Medical databasePrivacy protectionAnonymizing classificationData classification
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(2) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:2
  • 共同引用共同引用:0
  • 點閱點閱:4
隨著資訊技術的發展,資料庫在許多領域對於資料的蒐集、累積、彙整、統計、分析與行政管理、學術研究等應用均具有龐大的效益,藉由分析資料中所隱含的訊息,可以協助相關計畫的研擬或政策的制訂。當資料可以更方便地被蒐集與彙整時,使用者便可能因此推論出額外的資訊,導致特定個體的隱私遭到損害,特別是醫療資料庫,內容大多包含了病患極為隱私且不願被隨意洩露的投保及就醫紀錄,醫療紀錄若缺乏隱私,使病患資料外流,將可能導致失業、受歧視、身分被盜用或發生其他令人難堪的情況,然而,一昧隱藏可能洩漏隱私的資訊將造成相關研究難以進行,因此,我們實有必要針對醫療資料庫之隱私權保護技術進行探討,在不影響現有的資訊處理流程下,制訂一套匿名化分類系統以兼顧醫療資訊品質及病患的隱私。由於,國內醫院醫療資料庫為申報費用大多根據健保局規定制定資料欄位,因此,本研究雖以個案醫院醫療資料庫作為研究對象,分析欄位特性與病患隱私及醫藥衛生研究的相關性,然研究成果可類推至國內其他醫療資料庫。
With the development of computer science, databases have huge benefits in data collection, accumulation, aggregate, statistics, analysis and administration, academic research and other applications by analyzing information provided by the implicit message. Databases can assist the relevant project to develop or policy-making. When the data can be collected more easily, the user may infer additional information and some particular individual's privacy has been damaged. Especially, the medical information database contains most of the content is extremely patient privacy and unwilling to be leaked insurance and medical treatment records. However, that indiscriminate hide may result in leakage of privacy information will be difficult to carry out relevant research. Therefore, we have a need for the medical database to explore the privacy protection technology. Without prejudice to the existing data processing procedures, we design an anonymizing classification system for medical database takes into account both quality and patient privacy. This research is not only a case for the hospital medical database, analysis of field characteristics, patient privacy and the relevance of medical and health research but the results by analogy to other hospital medical database.
期刊論文
1.Beckwith, B. A.、Mahaadevan, R.、Balis, U. J.、Kuo, F.(2006)。Development and evaluation of an open source software tool for deidentification of pathology reports。BMC Medical Informatics and Decision Making,6,12。  new window
2.Behlen, F. M.、Johnson, S. B.(1999)。Multicenter patient records research: Security policies and tools。Journal of the American Medical Informatics Association,6(6),435-443。  new window
3.El Emam, K.、Dankar, F. K.、Issa, R.、Jonker, E.、Amyot, D.、Cogo, E.(2009)。A Globally Optimal k-Anonymity Method for the De-Identifi cation of Health Data。Journal of the American Medical Informatics Association,16(5),670-682。  new window
4.Fung, B. C. M.、Wang, K.、Yu, P. S.(2007)。Anonymizing classifi cation data for privacy preservation。IEEE Transactions on Knowledge and Data Engineering,19(5),711-725。  new window
5.Hundepool, A.(2001)。Computational aspects of statistical confidentiality the CASC-project。Statistical Journal of the United Nations Economic Commission for Europe,18(4),315-320。  new window
6.Nordholt, E. S.(2001)。Statistical disclosure control (SDC) in practice: Some examples in official statistics of statistics netherlands。Statistical Journal of the United Nations Economic Commission for Europe,18(4),321-328。  new window
7.Sweeney, L.(1997)。Guaranteeing Anonymity when Sharing Medical Data, the Datafly System。Journal of the American Medical Informatics Association,4(SUPPL.),51-55。  new window
8.Sweeney, L.(1998)。Three computational systems for disclosing medical data in the year 1999。Stud Health Technol Inform,52(2),1124-1129。  new window
9.Sweeney, L.(2002)。Achieving k-anonymity privacy protection using generalization and suppression。International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems,10(5),571-588。  new window
10.Sweeney, Latanya(2002)。k-anonymity: A model for protecting privacy。International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems,10(5),557-570。  new window
會議論文
1.Buccafurri, F.、Lax, G.(2009)。An Efficient K-anonymous Localization technique for assistive environments。The ACM International Conference Proceeding Series。Corfu。  new window
2.Chowdhury, S. H.、Sheikh, I. A.、Mohammad, T.(2009)。A privacy enhancing approach for identity inference protection in location-based services。International Computer Software and Applications Conference。Seattle, WA。  new window
3.Fung, B. C. M.、Wang, K.、Wang, L.、Debbabi, M.(2008)。A framework for privacy-preserving cluster analysis。The IEEE International Conference on Intelligence and Security Informatics, 2008。Taipei。  new window
4.Gupta, A.、Sunsunwal, A.、Singhal, S.(2008)。Data-Part: A technique for Privacy Protection in databases。The IEEE INMIC 2008: 12th IEEE International Multitopic Conference。Karachi。  new window
5.Hundepool, A. J.、Willenborg, L. C. R. J.(1997)。μ- and τ-Argus: Software for Statistical Disclosure Control。The Record Linkage Techniques-1997: Proceedings of an International Workshop and Exposition。Arlington, VA。  new window
6.Li, J.、Ooi, B. C.、Wang, W.(2008)。Anonymizing streaming data for privacy protection。International Conference on Data Engineering。Cancun。  new window
7.Shand, B.、Rashbass, J.(2005)。Protecting privacy in tabular healthcare data: Explicit uncertainty for disclosure control。The 2005 ACM Workshop on Privacy in the Electronic Society。Alexandria, VA。  new window
8.Shankar, P.、Ganapathy, V.、Iftode, L.(2009)。Privately querying location-based services with sybilquery。The ACM International Conference Proceeding Series。Orlando, FL。  new window
9.Wang, K.、Fung, B. C. M.、Dong, G.(2005)。Integrating private databases for data analysis。the Lecture Notes in Computer Science。Atlanta, GA。  new window
10.Wang, K.、Fung, B. C. M.、Yu, P. S.(2005)。Template-based privacy preservation in classification problems KeWang。IEEE International Conference on Data Mining。ICDM, Houston, TX。  new window
11.Zhu, Y.、Peng, L.(2007)。Study on K-anonymity models of sharing medical information。ICSSSM'07: 2007 International Conference on Service Systems and Service Management。Changdu。  new window
學位論文
1.李柏逸(2007)。以道路網路狀的遮蓋機制來保護位置隱私權(碩士論文)。國立交通大學。  延伸查詢new window
圖書
1.王大為、江育誠、徐讚昇、廖純中(2002)。資料隱私保護軟體Cellsecu的實作。  延伸查詢new window
2.王大為、徐讚昇、廖純中(2001)。健保資料庫個人隱私保護機制研究。中央健保局。  延伸查詢new window
3.消費者行動(2008)。敏感資料。消費者行動社區教育項目製作出版。  延伸查詢new window
4.陸義淋(2003)。確立及推廣醫療資訊安全與隱私保護之政策計劃第二期工作計畫書。行政院衛生署。  延伸查詢new window
圖書論文
1.Campan, A.、Truta, T. M.(2009)。Data and structural K-anonymity in social networks。Lecture Notes in Computer Science (including subseries Lecture Notes in Artifi cial Intelligence and Lecture Notes in Bioinformatics。Las Vegas, NV:LNCS。  new window
2.Franconi, L.、Polettini, S.(2004)。Individual Risk Estimation in μ-Argus: A Review。Lecture Notes in Computer Science (including subseries Lecture Notes in Artifi cial Intelligence and Lecture Notes in Bioinformatics)。LNCS。  new window
3.Kisilevich, S.、Elovici, Y.、Shapira, B.、Rokach, L.(2009)。KACTUS 2: Privacy preserving in classification tasks using k-anonymity。Lecture Notes in Computer Science (including subseries Lecture Notes in Artifi cial Intelligence and Lecture Notes in Bioinformatics)。New Brunswick, NJ:LNCS。  new window
4.Sanchez, J. A.、Urrutia, J.、Ripoll, E.(2004)。Trade-off between disclosure risk and information loss using multivariate microaggregation: A case study on business data。Lecture Notes in Computer Science (including subseries Lecture Notes in Artifi cial Intelligence and Lecture Notes in Bioinformatics)。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE