Skip to main content

User-Centered Evaluation of Privacy Models for Protecting Personal Medical Information

  • Conference paper
Informatics Engineering and Information Science (ICIEIS 2011)

Abstract

Privacy has always been a crucial element in the management of personal medical information. It warrants a comprehensive model during the designing stage of the management system in order to conserve the security of the information. One of the key success factors in protecting the privacy of information is measured by the ability of the users in controlling the flow of the information in the system. This research concentrates on the integrated models of privacy protection for health information environment which can be applied as guidance while designing a secured electronic medical record for health information system (HIS). The system’s effectiveness that uses this integrated model is suggested to be evaluated with the user-centred evaluation model (UPEM). This privacy protection model outlined four important components which were based on the findings from the interviews conducted namely legislation, ethic, technology and culture.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gostin, L.O.: Health Information Privacy. Cornell Law Review (1995), http://www.lexisnexis.com

  2. Leino-Kilpi, H., Valimaki, M., Dassen, T., Gasull, M., Lemonidou, C., Scott, A., Arndt, M.: Privacy: a review of the literature. International Journal of Nursing Studies 38, 663–671 (2001)

    Article  Google Scholar 

  3. Dehghantanha, A., Mahmod, R., Udzir, N.I., Zukarnain, Z.A.: UPEM: User-centered Privacy Evaluation Model in Pervasive Computing Systems. Ubiquitous Computing and Communication Journal (2009), http://www.ubicc.org/files/pdf/Paper%20ID%20360%20-%20UPEM_360.pdf (accessed on November 2010)

  4. Cavoukian, A.: A Guide to the Personal Health Information Protection Act. Information and Privacy Commissioner of Ontario 46 (2004)

    Google Scholar 

  5. Perera, G., Holbrook, A., Thabane, L., Foster, G., Willison, D.J.: Views on health information sharing and privacy from primary care practices using electronic medical records. International Journal of Medical Information 80, 94–101 (2011)

    Article  Google Scholar 

  6. Smith, B., Austin, A., Brown, M., King, J., Lankford, J., Meneely, A., Williams, L.: Challenges for protecting the privacy of health information: required certification can leave common vulnerabilities undetected. In: SPIMACS 2010, Chicago, Illinois, USA (2010)

    Google Scholar 

  7. Westin, A.: Privacy and Health Information Technology, Information Technology, Health Records and Privacy. Columbia University, Washington D.C., USA (2004)

    Google Scholar 

  8. Westin, A.F.: Privacy and freedom. Atheneum, New York (1967)

    Google Scholar 

  9. Fried, C.: Privacy, Philosophical Dimensions of Privacy. In: Schoeman, F.D. (ed.), pp. 203–222. Cambridge University Press, New York (1984)

    Google Scholar 

  10. Moor, J.H.: Towards a Theory of Privacy in the Information Age. In: CEPE 1997, Computers and Society, pp. 27–32 (1997)

    Google Scholar 

  11. Whitley, E.A.: Informational privacy, consent and the “control” of personal data. Information Security Technical Report 14, 154–159 (2009)

    Article  Google Scholar 

  12. Holvast, J.: History of Privacy. In: Matyáš, V., Fischer-Hübner, S., Cvrček, D., Švenda, P. (eds.) IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS. IFIP AICT, vol. 298, pp. 13–42. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  13. Fischer-Hübner, S., Thomas, D.: Privacy and Security at risk in the Global Information Society. In: Loade, B. (ed.) Cybercrime. Routledge, London (2000)

    Google Scholar 

  14. Fischer-Hübner, S.: Privacy-Enhancing Technologies (PET), Course Description. Karlstad University Division for Information Technology, Karlstad (2001)

    Google Scholar 

  15. Swire, P.: Privacy Today, International Association of Privacy Professionals (2008), http://www.privacyassociation.org (accessed on November 2010)

  16. Dehghantanha, A., Mahmod, R.: UPM: User-centered Privacy Model in Pervasive Computing Systems. In: 2009 International Conference on Future Computer and Communication, pp. 65–70 (2009)

    Google Scholar 

  17. Karat, J., Karat, C.M., Broodie, C.: Human Computer Interaction viewed from the intersection of privacy, security and trust. In: Sears, A., Jacko, J.A. (eds.) The Human Computer Interaction Handbook: Fundamentals, Evolving Technologies and Emerging Applications, 2nd edn. Lawrence Erlbaum Associates, New York (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Samsuri, S., Ismail, Z., Ahmad, R. (2011). User-Centered Evaluation of Privacy Models for Protecting Personal Medical Information. In: Abd Manaf, A., Zeki, A., Zamani, M., Chuprat, S., El-Qawasmeh, E. (eds) Informatics Engineering and Information Science. ICIEIS 2011. Communications in Computer and Information Science, vol 251. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25327-0_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25327-0_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25326-3

  • Online ISBN: 978-3-642-25327-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics