資料載入處理中...
臺灣人文及社會科學引文索引資料庫系統
:::
網站導覽
國圖首頁
聯絡我們
操作說明
English
行動版
(18.116.231.80)
登入
字型:
**字體大小變更功能,需開啟瀏覽器的JAVASCRIPT,如您的瀏覽器不支援,
IE6請利用鍵盤按住ALT鍵 + V → X → (G)最大(L)較大(M)中(S)較小(A)小,來選擇適合您的文字大小,
如為IE7以上、Firefoxy或Chrome瀏覽器則可利用鍵盤 Ctrl + (+)放大 (-)縮小來改變字型大小。
來源文獻查詢
引文查詢
瀏覽查詢
作者權威檔
引用/點閱統計
我的研究室
資料庫說明
相關網站
來源文獻查詢
/
簡易查詢
/
查詢結果列表
/
詳目列表
:::
詳目顯示
第 1 筆 / 總合 1 筆
/1
頁
來源文獻資料
摘要
外文摘要
引文資料
題名:
醫療資料庫之隱私權保護技術探討
書刊名:
電腦稽核
作者:
莊玉如
/
曹怡茹
出版日期:
2012
卷期:
25
頁次:
頁30-43
主題關鍵詞:
醫療資料庫
;
隱私保護
;
匿名化分類
;
資料分類
;
Medical database
;
Privacy protection
;
Anonymizing classification
;
Data classification
原始連結:
連回原系統網址
相關次數:
被引用次數:期刊(
2
) 博士論文(0) 專書(0) 專書論文(0)
排除自我引用:
2
共同引用:0
點閱:4
隨著資訊技術的發展,資料庫在許多領域對於資料的蒐集、累積、彙整、統計、分析與行政管理、學術研究等應用均具有龐大的效益,藉由分析資料中所隱含的訊息,可以協助相關計畫的研擬或政策的制訂。當資料可以更方便地被蒐集與彙整時,使用者便可能因此推論出額外的資訊,導致特定個體的隱私遭到損害,特別是醫療資料庫,內容大多包含了病患極為隱私且不願被隨意洩露的投保及就醫紀錄,醫療紀錄若缺乏隱私,使病患資料外流,將可能導致失業、受歧視、身分被盜用或發生其他令人難堪的情況,然而,一昧隱藏可能洩漏隱私的資訊將造成相關研究難以進行,因此,我們實有必要針對醫療資料庫之隱私權保護技術進行探討,在不影響現有的資訊處理流程下,制訂一套匿名化分類系統以兼顧醫療資訊品質及病患的隱私。由於,國內醫院醫療資料庫為申報費用大多根據健保局規定制定資料欄位,因此,本研究雖以個案醫院醫療資料庫作為研究對象,分析欄位特性與病患隱私及醫藥衛生研究的相關性,然研究成果可類推至國內其他醫療資料庫。
以文找文
With the development of computer science, databases have huge benefits in data collection, accumulation, aggregate, statistics, analysis and administration, academic research and other applications by analyzing information provided by the implicit message. Databases can assist the relevant project to develop or policy-making. When the data can be collected more easily, the user may infer additional information and some particular individual's privacy has been damaged. Especially, the medical information database contains most of the content is extremely patient privacy and unwilling to be leaked insurance and medical treatment records. However, that indiscriminate hide may result in leakage of privacy information will be difficult to carry out relevant research. Therefore, we have a need for the medical database to explore the privacy protection technology. Without prejudice to the existing data processing procedures, we design an anonymizing classification system for medical database takes into account both quality and patient privacy. This research is not only a case for the hospital medical database, analysis of field characteristics, patient privacy and the relevance of medical and health research but the results by analogy to other hospital medical database.
以文找文
期刊論文
1.
Beckwith, B. A.、Mahaadevan, R.、Balis, U. J.、Kuo, F.(2006)。Development and evaluation of an open source software tool for deidentification of pathology reports。BMC Medical Informatics and Decision Making,6,12。
2.
Behlen, F. M.、Johnson, S. B.(1999)。Multicenter patient records research: Security policies and tools。Journal of the American Medical Informatics Association,6(6),435-443。
3.
El Emam, K.、Dankar, F. K.、Issa, R.、Jonker, E.、Amyot, D.、Cogo, E.(2009)。A Globally Optimal k-Anonymity Method for the De-Identifi cation of Health Data。Journal of the American Medical Informatics Association,16(5),670-682。
4.
Fung, B. C. M.、Wang, K.、Yu, P. S.(2007)。Anonymizing classifi cation data for privacy preservation。IEEE Transactions on Knowledge and Data Engineering,19(5),711-725。
5.
Hundepool, A.(2001)。Computational aspects of statistical confidentiality the CASC-project。Statistical Journal of the United Nations Economic Commission for Europe,18(4),315-320。
6.
Nordholt, E. S.(2001)。Statistical disclosure control (SDC) in practice: Some examples in official statistics of statistics netherlands。Statistical Journal of the United Nations Economic Commission for Europe,18(4),321-328。
7.
Sweeney, L.(1997)。Guaranteeing Anonymity when Sharing Medical Data, the Datafly System。Journal of the American Medical Informatics Association,4(SUPPL.),51-55。
8.
Sweeney, L.(1998)。Three computational systems for disclosing medical data in the year 1999。Stud Health Technol Inform,52(2),1124-1129。
9.
Sweeney, L.(2002)。Achieving k-anonymity privacy protection using generalization and suppression。International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems,10(5),571-588。
10.
Sweeney, Latanya(2002)。k-anonymity: A model for protecting privacy。International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems,10(5),557-570。
會議論文
1.
Buccafurri, F.、Lax, G.(2009)。An Efficient K-anonymous Localization technique for assistive environments。The ACM International Conference Proceeding Series。Corfu。
2.
Chowdhury, S. H.、Sheikh, I. A.、Mohammad, T.(2009)。A privacy enhancing approach for identity inference protection in location-based services。International Computer Software and Applications Conference。Seattle, WA。
3.
Fung, B. C. M.、Wang, K.、Wang, L.、Debbabi, M.(2008)。A framework for privacy-preserving cluster analysis。The IEEE International Conference on Intelligence and Security Informatics, 2008。Taipei。
4.
Gupta, A.、Sunsunwal, A.、Singhal, S.(2008)。Data-Part: A technique for Privacy Protection in databases。The IEEE INMIC 2008: 12th IEEE International Multitopic Conference。Karachi。
5.
Hundepool, A. J.、Willenborg, L. C. R. J.(1997)。μ- and τ-Argus: Software for Statistical Disclosure Control。The Record Linkage Techniques-1997: Proceedings of an International Workshop and Exposition。Arlington, VA。
6.
Li, J.、Ooi, B. C.、Wang, W.(2008)。Anonymizing streaming data for privacy protection。International Conference on Data Engineering。Cancun。
7.
Shand, B.、Rashbass, J.(2005)。Protecting privacy in tabular healthcare data: Explicit uncertainty for disclosure control。The 2005 ACM Workshop on Privacy in the Electronic Society。Alexandria, VA。
8.
Shankar, P.、Ganapathy, V.、Iftode, L.(2009)。Privately querying location-based services with sybilquery。The ACM International Conference Proceeding Series。Orlando, FL。
9.
Wang, K.、Fung, B. C. M.、Dong, G.(2005)。Integrating private databases for data analysis。the Lecture Notes in Computer Science。Atlanta, GA。
10.
Wang, K.、Fung, B. C. M.、Yu, P. S.(2005)。Template-based privacy preservation in classification problems KeWang。IEEE International Conference on Data Mining。ICDM, Houston, TX。
11.
Zhu, Y.、Peng, L.(2007)。Study on K-anonymity models of sharing medical information。ICSSSM'07: 2007 International Conference on Service Systems and Service Management。Changdu。
學位論文
1.
李柏逸(2007)。以道路網路狀的遮蓋機制來保護位置隱私權(碩士論文)。國立交通大學。
延伸查詢
圖書
1.
王大為、江育誠、徐讚昇、廖純中(2002)。資料隱私保護軟體Cellsecu的實作。
延伸查詢
2.
王大為、徐讚昇、廖純中(2001)。健保資料庫個人隱私保護機制研究。中央健保局。
延伸查詢
3.
消費者行動(2008)。敏感資料。消費者行動社區教育項目製作出版。
延伸查詢
4.
陸義淋(2003)。確立及推廣醫療資訊安全與隱私保護之政策計劃第二期工作計畫書。行政院衛生署。
延伸查詢
圖書論文
1.
Campan, A.、Truta, T. M.(2009)。Data and structural K-anonymity in social networks。Lecture Notes in Computer Science (including subseries Lecture Notes in Artifi cial Intelligence and Lecture Notes in Bioinformatics。Las Vegas, NV:LNCS。
2.
Franconi, L.、Polettini, S.(2004)。Individual Risk Estimation in μ-Argus: A Review。Lecture Notes in Computer Science (including subseries Lecture Notes in Artifi cial Intelligence and Lecture Notes in Bioinformatics)。LNCS。
3.
Kisilevich, S.、Elovici, Y.、Shapira, B.、Rokach, L.(2009)。KACTUS 2: Privacy preserving in classification tasks using k-anonymity。Lecture Notes in Computer Science (including subseries Lecture Notes in Artifi cial Intelligence and Lecture Notes in Bioinformatics)。New Brunswick, NJ:LNCS。
4.
Sanchez, J. A.、Urrutia, J.、Ripoll, E.(2004)。Trade-off between disclosure risk and information loss using multivariate microaggregation: A case study on business data。Lecture Notes in Computer Science (including subseries Lecture Notes in Artifi cial Intelligence and Lecture Notes in Bioinformatics)。
推文
當script無法執行時可按︰
推文
推薦
當script無法執行時可按︰
推薦
引用網址
當script無法執行時可按︰
引用網址
引用嵌入語法
當script無法執行時可按︰
引用嵌入語法
轉寄
當script無法執行時可按︰
轉寄
top
:::
相關期刊
相關論文
相關專書
相關著作
熱門點閱
1.
Patient Data Accessibility for Biotech and Medicine Industry Start-ups in Taiwan
2.
個人資料保護於雲端運算時代之法律爭議初探暨比較法分析:以健保資料為例
無相關博士論文
無相關書籍
無相關著作
無相關點閱
QR Code