Big Data Security and Privacy Issues in Healthcare
@article{Patil2014BigDS, title={Big Data Security and Privacy Issues in Healthcare}, author={Harsh Kupwade Patil and R. Seshadri}, journal={2014 IEEE International Congress on Big Data}, year={2014}, pages={762-765} }
With the ever-increasing cost for healthcare and increased health insurance premiums, there is a need for proactive healthcare and wellness. In addition, the new wave of digitizing medical records has seen a paradigm shift in the healthcare industry. As a result, the healthcare industry is witnessing an increase in sheer volume of data in terms of complexity, diversity and timeliness. As healthcare experts look for every possible way to lower costs while improving care process, delivery and…
172 Citations
Big healthcare data: preserving security and privacy
- Computer Science, MedicineJournal of Big Data
- 2017
The state-of-the-art security and privacy challenges in big data as applied to healthcare industry are surveyed, howSecurity and privacy issues occur in case of big healthcare data are assessed and ways in which they may be addressed are discussed.
Big Data Security in Healthcare: Survey on Frameworks and Algorithms
- Computer Science, Medicine2017 IEEE 7th International Advance Computing Conference (IACC)
- 2017
The current healthcare security scenario in big data environments has been summarized along with challenges faced and security issues that need attention.
Medical (Healthcare) Big Data Security and Privacy Issues
- Computer Science, Medicine
- 2018
Various security and privacy concerns surrounding medical (healthcare) big data must be addressed in order to provide better and safe access of records online and make the system acceptable worldwide with the contribution of healthy economic growth.
An exhaustive survey on security and privacy issues in Healthcare 4.0
- Medicine, Computer ScienceComput. Commun.
- 2020
A Review on Big Data Security and Privacy in Healthcare Applications
- Computer Science
- 2017
In this chapter the term Big Data and its usage in healthcare applications is discussed and the questions and issues are highlighted and discussed in the last section of the chapter to emphasize on the broad and pre-deployment issues.
Security Challenges Associated with Big Data in Health Care System
- Computer ScienceInternational Journal of Engineering and Advanced Technology
- 2019
The state-of-the-art security challenges in big data are surveyed, how security issues arise in the case of large healthcare data is assessed, and ways to address them are discussed.
Big Data, Privacy, and Healthcare
- Computer Science, MedicineResearch Anthology on Privatizing and Securing Data
- 2019
Due to rapid development of big data tools and technologies, it is possible to improve disease diagnosis more efficiently than ever before, but security and privacy are two major issues when dealing with big data in the healthcare industry.
A Survey on Security and Privacy Issues in Modern Healthcare Systems
- Computer Science, MedicineACM Trans. Comput. Heal.
- 2021
This article explores various security and privacy threats to healthcare systems and discusses the consequences of these threats, including a detailed survey of different potential attacks and their impacts.
Blockchain in Healthcare: Challenges and Solutions
- Computer ScienceBig Data Analytics for Intelligent Healthcare Management
- 2019
References
SHOWING 1-10 OF 16 REFERENCES
The 'big data' revolution in healthcare: Accelerating value and innovation
- Medicine, Political Science
- 2016
An era of open information in healthcare is now under way, as pharmaceutical companies and other organizations aggregate years of research and development data in electronic databases to bring the industry to the tipping point.
The Health Insurance Portability and Accountability Act.
- Political Science, MedicineTennessee medicine : journal of the Tennessee Medical Association
- 1997
The Health Insurance Portability and Accountability Act, also known as HIPAA, was designed to protect health insurance coverage for workers and their families while between jobs and establishes standards for electronic health care transactions.
Health Information Technology for Economic and Clinical Health Act
- Medicine
- 2011
EMRs enable improvements in health care by storing data in a structured fashion andPhysician, staff, and patient remain key to the successful deployment and usage of this powerful tool.
Wireless Sensor Network Security
- Computer Science
- 2008
This book provides a deep overview of the major security issues that any WSN designers have to face, and also gives a comprehensive guide of existing solutions and open problems.
Health care economic analyses and value-based medicine.
- Medicine, Political ScienceSurvey of ophthalmology
- 2003
The internet of things: a survey
- Computer ScienceInf. Syst. Frontiers
- 2015
The definitions, architecture, fundamental technologies, and applications of IoT are systematically reviewed and the major challenges which need addressing by the research community and corresponding potential solutions are investigated.
Wireless Sensor Network Security
- Computer ScienceInt. J. Distributed Sens. Networks
- 2013
Durant ces dernieres annees, l’utilisation des reseaux de capteurs sans fils (RCSF), est devenu tres repandue, ainsi que le controle d’acces au RCSF are traitons trois points fondamentaux de the securite des RCSFs.
Body Area Sensor Networks: Challenges and Opportunities
- Computer ScienceComputer
- 2009
Body area sensors can enable novel applications in and beyond healthcare, but research must address obstacles such as size, cost, compatibility, and perceived value before networks that use such…
The Evolution of Cognitive Bias
- Psychology, Biology
- 2015
This chapter describes research documenting adaptive biases across many domains, including inferences about danger, the cooperativeness of others, and the sexual and romantic interests of prospective mates, and addresses the question of why biases often seem to be implemented at the cognitive level, producing genuine misperceptions, rather than merely biases in enacted behavior.
IV. REFERENCES
- IV. REFERENCES