Abstract
Privacy has always been a crucial element in the management of personal medical information. It warrants a comprehensive model during the designing stage of the management system in order to conserve the security of the information. One of the key success factors in protecting the privacy of information is measured by the ability of the users in controlling the flow of the information in the system. This research concentrates on the integrated models of privacy protection for health information environment which can be applied as guidance while designing a secured electronic medical record for health information system (HIS). The system’s effectiveness that uses this integrated model is suggested to be evaluated with the user-centred evaluation model (UPEM). This privacy protection model outlined four important components which were based on the findings from the interviews conducted namely legislation, ethic, technology and culture.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Gostin, L.O.: Health Information Privacy. Cornell Law Review (1995), http://www.lexisnexis.com
Leino-Kilpi, H., Valimaki, M., Dassen, T., Gasull, M., Lemonidou, C., Scott, A., Arndt, M.: Privacy: a review of the literature. International Journal of Nursing Studies 38, 663–671 (2001)
Dehghantanha, A., Mahmod, R., Udzir, N.I., Zukarnain, Z.A.: UPEM: User-centered Privacy Evaluation Model in Pervasive Computing Systems. Ubiquitous Computing and Communication Journal (2009), http://www.ubicc.org/files/pdf/Paper%20ID%20360%20-%20UPEM_360.pdf (accessed on November 2010)
Cavoukian, A.: A Guide to the Personal Health Information Protection Act. Information and Privacy Commissioner of Ontario 46 (2004)
Perera, G., Holbrook, A., Thabane, L., Foster, G., Willison, D.J.: Views on health information sharing and privacy from primary care practices using electronic medical records. International Journal of Medical Information 80, 94–101 (2011)
Smith, B., Austin, A., Brown, M., King, J., Lankford, J., Meneely, A., Williams, L.: Challenges for protecting the privacy of health information: required certification can leave common vulnerabilities undetected. In: SPIMACS 2010, Chicago, Illinois, USA (2010)
Westin, A.: Privacy and Health Information Technology, Information Technology, Health Records and Privacy. Columbia University, Washington D.C., USA (2004)
Westin, A.F.: Privacy and freedom. Atheneum, New York (1967)
Fried, C.: Privacy, Philosophical Dimensions of Privacy. In: Schoeman, F.D. (ed.), pp. 203–222. Cambridge University Press, New York (1984)
Moor, J.H.: Towards a Theory of Privacy in the Information Age. In: CEPE 1997, Computers and Society, pp. 27–32 (1997)
Whitley, E.A.: Informational privacy, consent and the “control” of personal data. Information Security Technical Report 14, 154–159 (2009)
Holvast, J.: History of Privacy. In: Matyáš, V., Fischer-Hübner, S., Cvrček, D., Švenda, P. (eds.) IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS. IFIP AICT, vol. 298, pp. 13–42. Springer, Heidelberg (2009)
Fischer-Hübner, S., Thomas, D.: Privacy and Security at risk in the Global Information Society. In: Loade, B. (ed.) Cybercrime. Routledge, London (2000)
Fischer-Hübner, S.: Privacy-Enhancing Technologies (PET), Course Description. Karlstad University Division for Information Technology, Karlstad (2001)
Swire, P.: Privacy Today, International Association of Privacy Professionals (2008), http://www.privacyassociation.org (accessed on November 2010)
Dehghantanha, A., Mahmod, R.: UPM: User-centered Privacy Model in Pervasive Computing Systems. In: 2009 International Conference on Future Computer and Communication, pp. 65–70 (2009)
Karat, J., Karat, C.M., Broodie, C.: Human Computer Interaction viewed from the intersection of privacy, security and trust. In: Sears, A., Jacko, J.A. (eds.) The Human Computer Interaction Handbook: Fundamentals, Evolving Technologies and Emerging Applications, 2nd edn. Lawrence Erlbaum Associates, New York (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Samsuri, S., Ismail, Z., Ahmad, R. (2011). User-Centered Evaluation of Privacy Models for Protecting Personal Medical Information. In: Abd Manaf, A., Zeki, A., Zamani, M., Chuprat, S., El-Qawasmeh, E. (eds) Informatics Engineering and Information Science. ICIEIS 2011. Communications in Computer and Information Science, vol 251. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25327-0_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-25327-0_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25326-3
Online ISBN: 978-3-642-25327-0
eBook Packages: Computer ScienceComputer Science (R0)