<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "journalpublishing.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" dtd-version="2.0" xml:lang="en" article-type="research-article"><front><journal-meta><journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id><journal-id journal-id-type="publisher-id">jmir</journal-id><journal-id journal-id-type="index">1</journal-id><journal-title>Journal of Medical Internet Research</journal-title><abbrev-journal-title>J Med Internet Res</abbrev-journal-title><issn pub-type="epub">1438-8871</issn><publisher><publisher-name>JMIR Publications</publisher-name><publisher-loc>Toronto, Canada</publisher-loc></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">v28i1e58954</article-id><article-id pub-id-type="doi">10.2196/58954</article-id><article-categories><subj-group subj-group-type="heading"><subject>Viewpoint</subject></subj-group></article-categories><title-group><article-title>Assessing the Evolution and Influence of Medical Open Databases on Biomedical Research and Health Care Innovation: A 25-Year Perspective With a Focus on Privacy and Privacy-Enhancing Technologies</article-title></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><name name-style="western"><surname>Yang</surname><given-names>Albert</given-names></name><degrees>MD, PhD</degrees><xref ref-type="aff" rid="aff1">1</xref><xref ref-type="aff" rid="aff2">2</xref><xref ref-type="aff" rid="aff3">3</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Pan</surname><given-names>Mei-Lien</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff4">4</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Lu</surname><given-names>Henry Horng-Shing</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff5">5</xref><xref ref-type="aff" rid="aff6">6</xref><xref ref-type="aff" rid="aff7">7</xref><xref ref-type="aff" rid="aff8">8</xref><xref ref-type="aff" rid="aff9">9</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Lien</surname><given-names>Chung-Yueh</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff10">10</xref></contrib><contrib contrib-type="author" deceased="yes"><name name-style="western"><surname>Wang</surname><given-names>Da-Wei</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff11">11</xref><xref ref-type="fn" rid="de-fn1">&#x2020;</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Chen</surname><given-names>Chih-Hsiung</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff12">12</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Tarng</surname><given-names>Der-Cherng</given-names></name><degrees>MD, PhD</degrees><xref ref-type="aff" rid="aff2">2</xref><xref ref-type="aff" rid="aff13">13</xref><xref ref-type="aff" rid="aff14">14</xref><xref ref-type="aff" rid="aff15">15</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Niu</surname><given-names>Dau-Ming</given-names></name><degrees>MD, PhD</degrees><xref ref-type="aff" rid="aff2">2</xref><xref ref-type="aff" rid="aff14">14</xref><xref ref-type="aff" rid="aff16">16</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Chiou</surname><given-names>Shih-Hwa</given-names></name><degrees>MD, PhD</degrees><xref ref-type="aff" rid="aff3">3</xref><xref ref-type="aff" rid="aff17">17</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Wu</surname><given-names>Chun-Ying</given-names></name><degrees>MD, PhD</degrees><xref ref-type="aff" rid="aff18">18</xref><xref ref-type="aff" rid="aff19">19</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Sun</surname><given-names>Ying - Chou</given-names></name><degrees>MD</degrees><xref ref-type="aff" rid="aff20">20</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Chen</surname><given-names>Shih-Ann</given-names></name><degrees>MD</degrees><xref ref-type="aff" rid="aff2">2</xref><xref ref-type="aff" rid="aff21">21</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Wang</surname><given-names>Shuu-Jiun</given-names></name><degrees>MD</degrees><xref ref-type="aff" rid="aff2">2</xref><xref ref-type="aff" rid="aff22">22</xref><xref ref-type="aff" rid="aff23">23</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Sheu</surname><given-names>Wayne Huey-Herng</given-names></name><degrees>MD, PhD</degrees><xref ref-type="aff" rid="aff24">24</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Lin</surname><given-names>Chi-Hung</given-names></name><degrees>MD, PhD</degrees><xref ref-type="aff" rid="aff25">25</xref></contrib></contrib-group><aff id="aff1"><institution>Digital Medicine and Smart Healthcare Research Center, National Yang Ming Chiao Tung University</institution><addr-line>No. 155 Sec. 2 Linong St., Beitou Dist</addr-line><addr-line>Taipei City</addr-line><country>Taiwan</country></aff><aff id="aff2"><institution>School of Medicine, National Yang Ming Chiao Tung University</institution><addr-line>Taipei</addr-line><country>Taiwan</country></aff><aff id="aff3"><institution>Department of Medical Research, Taipei Veterans General Hospital</institution><addr-line>Taipei</addr-line><country>Taiwan</country></aff><aff id="aff4"><institution>Institute of Hospital and Health Care Administration, National Yang Ming Chiao Tung University</institution><addr-line>Taipei</addr-line><country>Taiwan</country></aff><aff id="aff5"><institution>Institute of Statistics, National Yang Ming Chiao Tung University</institution><addr-line>Hsinchu</addr-line><country>Taiwan</country></aff><aff id="aff6"><institution>Biomedical Artificial Intelligence Academy, Kaohsiung Medical University</institution><addr-line>Kaohsiung</addr-line><country>Taiwan</country></aff><aff id="aff7"><institution>Department of Artificial Intelligence in Medicine, Kaohsiung Medical University</institution><addr-line>Kaohsiung</addr-line><country>Taiwan</country></aff><aff id="aff8"><institution>Department of Medical Research, Kaohsiung Medical University Hospital</institution><addr-line>Kaohsiung</addr-line><country>Taiwan</country></aff><aff id="aff9"><institution>Department of Statistics and Data Science, Cornell University</institution><addr-line>Ithaca</addr-line><addr-line>NY</addr-line><country>United States</country></aff><aff id="aff10"><institution>Department of Information Management, National Taipei University of Nursing and Health Sciences</institution><addr-line>Taipei</addr-line><country>Taiwan</country></aff><aff id="aff11"><institution>Institute of Information Science, Academia Sinica</institution><addr-line>Taipei</addr-line><country>Taiwan</country></aff><aff id="aff12"><institution>Institute of Technology Law, National Yang Ming Chiao Tung University</institution><addr-line>Taipei</addr-line><country>Taiwan</country></aff><aff id="aff13"><institution>Department of Medicine, Taipei Veterans General Hospital</institution><addr-line>Taipei</addr-line><country>Taiwan</country></aff><aff id="aff14"><institution>Institute of Clinical Medicine, National Yang Ming Chiao Tung University</institution><addr-line>Taipei</addr-line><country>Taiwan</country></aff><aff id="aff15"><institution>Department and Institute of Physiology, National Yang Ming Chiao Tung University</institution><addr-line>Taipei</addr-line><country>Taiwan</country></aff><aff id="aff16"><institution>Department of Pediatrics, Taipei Veterans General Hospital</institution><addr-line>Taipei</addr-line><country>Taiwan</country></aff><aff id="aff17"><institution>Institute of Pharmacology, College of Medicine, National Yang Ming Chiao Tung University</institution><addr-line>Taipei</addr-line><country>Taiwan</country></aff><aff id="aff18"><institution>Institute of Biomedical Informatics, National Yang Ming Chiao Tung University</institution><addr-line>Taipei</addr-line><country>Taiwan</country></aff><aff id="aff19"><institution>Health Innovation Center, National Yang Ming Chiao Tung University</institution><addr-line>Taipei</addr-line><country>Taiwan</country></aff><aff id="aff20"><institution>Department of Radiology, Taipei Veterans General Hospital</institution><addr-line>Taipei</addr-line><country>Taiwan</country></aff><aff id="aff21"><institution>Department of Cardiovascular Center and Medical Research, Taichung Veterans General Hospital</institution><addr-line>Taichung</addr-line><country>Taiwan</country></aff><aff id="aff22"><institution>Department of Neurology, Neurological Institute, Taipei Veterans General Hospital</institution><addr-line>Taipei</addr-line><country>Taiwan</country></aff><aff id="aff23"><institution>Brain Research Center, National Yang Ming Chiao Tung University</institution><addr-line>Taipei</addr-line><country>Taiwan</country></aff><aff id="aff24"><institution>Institute of Molecular and Genomic Medicine, National Health Research Institutes</institution><addr-line>Taipei</addr-line><country>Taiwan</country></aff><aff id="aff25"><institution>Department of Biological Science &#x0026; Technology, National Chiao Tung University</institution><addr-line>Taipei</addr-line><country>Taiwan</country></aff><contrib-group><contrib contrib-type="editor"><name name-style="western"><surname>Eysenbach</surname><given-names>Gunther</given-names></name></contrib><contrib contrib-type="editor"><name name-style="western"><surname>Leung</surname><given-names>Tiffany</given-names></name></contrib></contrib-group><contrib-group><contrib contrib-type="reviewer"><name name-style="western"><surname>Imran</surname><given-names/></name></contrib><contrib contrib-type="reviewer"><name name-style="western"><surname>Sun</surname><given-names>Yanling</given-names></name></contrib></contrib-group><author-notes><corresp>Correspondence to Albert Yang, MD, PhD, Digital Medicine and Smart Healthcare Research Center, National Yang Ming Chiao Tung University, No. 155 Sec. 2 Linong St., Beitou Dist, Taipei City, 112, Taiwan, 886228267995; <email>accyang@nycu.edu.tw</email></corresp><fn fn-type="other" id="de-fn1"><label>&#x2020;</label><p>deceased</p></fn></author-notes><pub-date pub-type="collection"><year>2026</year></pub-date><pub-date pub-type="epub"><day>30</day><month>1</month><year>2026</year></pub-date><volume>28</volume><elocation-id>e58954</elocation-id><history><date date-type="received"><day>31</day><month>03</month><year>2024</year></date><date date-type="rev-recd"><day>28</day><month>10</month><year>2025</year></date><date date-type="accepted"><day>29</day><month>11</month><year>2025</year></date></history><copyright-statement>&#x00A9; Albert Yang, Mei-Lien Pan, Henry Horng-Shing Lu, Chung-Yueh Lien, Da-Wei Wang, Chih-Hsiung Chen, Der-Cherng Tarng, Dau-Ming Niu, Shih-Hwa Chiou, Chun-Ying Wu, Ying - Chou Sun, Shih-Ann Chen, Shuu-Jiun Wang, Wayne Huey-Herng Sheu, Chi-Hung Lin. Originally published in the Journal of Medical Internet Research (<ext-link ext-link-type="uri" xlink:href="https://www.jmir.org">https://www.jmir.org</ext-link>), 30.1.2026. </copyright-statement><copyright-year>2026</copyright-year><license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (<ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">https://creativecommons.org/licenses/by/4.0/</ext-link>), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research (ISSN 1438-8871), is properly cited. The complete bibliographic information, a link to the original publication on <ext-link ext-link-type="uri" xlink:href="https://www.jmir.org/">https://www.jmir.org/</ext-link>, as well as this copyright and license information must be included.</p></license><self-uri xlink:type="simple" xlink:href="https://www.jmir.org/2026/1/e58954"/><abstract><p>The integration of medical open databases with artificial intelligence (AI) technologies marks a transformative era in biomedical research and health care innovation. Over the past 25 years, initiatives like PhysioNet have revolutionized data access, fostering unprecedented levels of collaboration and accelerating medical discoveries. This rise of medical open databases presents challenges, particularly in harmonizing research enablement with patient confidentiality. In response, privacy laws such as the Health Insurance Portability and Accountability Act have been established, and privacy-enhancing technologies have been adopted to maintain this delicate balance. Privacy-enhancing technologies, including differential privacy, secure multiparty computation, and notably, federated learning (FL), have become instrumental in safeguarding personal health information. FL, in particular, represents a significant advancement by enabling the development and training of AI models on decentralized data. In Taiwan, significant strides have been made in aligning with these global data-sharing and privacy standards. We have actively promoted the sharing of medical data through the development of dynamic consent systems. These systems enable individuals to control and adjust their data-sharing preferences, ensuring transparency and continuity of consent in the ever-evolving landscape of digital health. Despite the challenges associated with privacy protections, the benefits, including improved diagnostics and treatment, are substantial. The availability of open databases has notably accelerated AI research, leading to significant advancements in medical diagnostics and treatments. As the landscape of health care research continues to evolve with open science and FL, the role of medical open databases remains crucial in shaping the future of medicine, promising enhanced patient outcomes and fostering a global research community committed to ethical integrity and privacy.</p></abstract><kwd-group><kwd>medical open databases</kwd><kwd>artificial intelligence</kwd><kwd>privacy-enhancing technologies</kwd><kwd>federated learning</kwd><kwd>dynamic consent systems</kwd></kwd-group></article-meta></front><body><sec id="s1" sec-type="intro"><title>Introduction</title><p>The emergence of medical open databases, coupled with advances in artificial intelligence (AI), heralds a significant change in biomedical research and health care innovation, facilitating an era of enhanced accessibility and data sharing [<xref ref-type="bibr" rid="ref1">1</xref>-<xref ref-type="bibr" rid="ref3">3</xref>]. This movement toward open data science, augmented by AI technologies, enables researchers worldwide to access a wealth of data, including physiological signals [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref5">5</xref>], genomic [<xref ref-type="bibr" rid="ref6">6</xref>], and health care information [<xref ref-type="bibr" rid="ref7">7</xref>], and, most prominently, large-scale medical imaging archives. While this review covers the broad spectrum of medical data, the impact of open imaging databases has been particularly transformative for the application of AI. This movement toward open data science fosters collaboration and speeds up the pace of medical discoveries.</p><p>AI&#x2019;s role in analyzing vast datasets has been instrumental in uncovering patterns and insights that would be impossible for humans to detect unaided, leading to breakthroughs in understanding diseases and patient care. Initiatives like annual challenges and shared toolboxes have spurred the development of novel algorithms and techniques, leveraging AI to address complex biomedical challenges and advance medical diagnostics and treatments. This synergy between open medical databases and AI is transforming the landscape of health care, promising a future of more accurate, efficient, and personalized medicine.</p><p>Simultaneously, this rise in open data repositories brings to the forefront crucial privacy concerns [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref8">8</xref>]. The necessity to balance the imperative of research enablement with the protection of patient confidentiality has never been more pronounced. In this context, laws such as the Health Insurance Portability and Accountability Act (HIPAA) play a pivotal role in shaping the landscape of data deidentification and anonymization processes, ensuring that shared data comply with strict privacy standards [<xref ref-type="bibr" rid="ref9">9</xref>]. Moreover, the introduction of privacy-enhancing technologies (PETs), such as differential privacy [<xref ref-type="bibr" rid="ref10">10</xref>], synthetic data [<xref ref-type="bibr" rid="ref11">11</xref>], homomorphic encryption [<xref ref-type="bibr" rid="ref12">12</xref>], secure multiparty computation [<xref ref-type="bibr" rid="ref13">13</xref>], and federated learning [<xref ref-type="bibr" rid="ref14">14</xref>], represents a proactive approach to safeguarding personal health information. These technologies provide the means to conduct meaningful research while upholding the principles of data privacy and security.</p><p>In a country like Taiwan, strides in medical data sharing suggest the global shift toward interconnected health systems, highlighting both advancements and ongoing challenges in securing patient data. The implementation of dynamic consent frameworks reflects a growing recognition of the need for more flexible approaches to data privacy, particularly in an era of personalized medicine and digital health records [<xref ref-type="bibr" rid="ref15">15</xref>]. As the landscape of medical research evolves with these developments, the interplay of data sharing, privacy, and technology continues to reshape the boundaries of what is possible in health care innovation, marking a critical junction in the journey toward more open, collaborative, and ethically responsible research environments.</p><p>This review aims to provide a 25-year perspective on the evolution of medical open databases, tracing their impact on biomedical research and health care innovation, and to examine how emerging PETs and data-governance frameworks, including dynamic consent systems, shape the ethical, technical, and collaborative landscape of digital medicine worldwide.</p></sec><sec id="s2"><title>The Rise of Medical Open Database</title><p>The rise of medical open databases represents a transformative shift in the landscape of biomedical research and health care innovation. Among the pioneers in this movement is PhysioNet. Established in 1999, PhysioNet is a pioneering open database that provides free access to a wide range of physiologic signals and related open-source software for research in medicine, physiology, and biomedical engineering [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref16">16</xref>]. It was initiated by a collaborative project involving researchers from Boston&#x2019;s Beth Israel Deaconess Medical Center/Harvard Medical School, Boston University, McGill University, and Massachusetts Institute of Technology [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref17">17</xref>]. The database contains a diverse collection of physiological datasets, including those related to cardiovascular and other complex biomedical signals [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref18">18</xref>]. PhysioNet has had a significant impact on the development of medical open databases, serving as a model for the establishment of similar resources. It has also played a key role in promoting the dissemination and exchange of medical resources.</p><p>A significant contribution of PhysioNet to the scientific community is its annual PhysioNet Challenge, which has markedly influenced the field by promoting innovation and collaboration among researchers and clinicians. These challenges stimulate the creation of novel algorithms and methods aimed at solving complex biomedical problems, thus expanding the limits of what can be achieved in medical data analysis and application. For instance, the challenges have catalyzed the development of innovative algorithms capable of detecting obstructive sleep apnea from electrocardiograms [<xref ref-type="bibr" rid="ref19">19</xref>], illustrating the practical impact of these competitions on advancing medical diagnostics and treatment strategies [<xref ref-type="bibr" rid="ref20">20</xref>].</p><p>Since the success of PhysioNet, numerous other medical open databases have emerged globally, fostering a more cooperative and transparent research atmosphere (<xref ref-type="fig" rid="figure1">Figure 1</xref>). The impact of these large-scale databases on biomedical discovery is profound. One notable example is the UK Biobank [<xref ref-type="bibr" rid="ref21">21</xref>], launched in 2006, which provides a vast repository of genetic and health information from half a million UK participants. This database has become an essential tool for unraveling the complex interplay between genetics, lifestyle, and disease, thereby enhancing our understanding of the factors influencing human health [<xref ref-type="bibr" rid="ref22">22</xref>-<xref ref-type="bibr" rid="ref25">25</xref>]. By leveraging large neuroimaging cohorts such as Alzheimer Disease Neuroimaging Initiative and the UK Biobank, researchers have developed AI-based models that generate an Alzheimer disease risk score from structural magnetic resonance imaging (MRI), enabling the identification of prediagnostic populations suitable for early intervention and preventive trials [<xref ref-type="bibr" rid="ref26">26</xref>]. In cardiovascular research, analysis of the UK Biobank&#x2019;s genetic and imaging data has enabled the development of NeuralCVD, a neural network&#x2013;based risk model that integrates polygenic and clinical predictors to estimate the 10-year risk of major adverse cardiac events, improving risk discrimination and reclassification beyond established clinical scores and Cox models, and highlighting the added predictive value of genetic predisposition in early prevention [<xref ref-type="bibr" rid="ref27">27</xref>]. Similarly, the Cancer Imaging Archive, inaugurated in 2011 in the United States, offers a dedicated platform for the cancer research community, enabling access to a comprehensive array of imaging datasets [<xref ref-type="bibr" rid="ref28">28</xref>].</p><fig position="float" id="figure1"><label>Figure 1.</label><caption><p>Historical development of major medical open databases and data-sharing platforms over the past 25 years.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="jmir_v28i1e58954_fig01.png"/></fig><p>Beyond these examples, the ecosystem of medical open databases has diversified into numerous specialized domains. For instance, OpenNeuro provides a vast repository for neuroimaging data, particularly functional magnetic resonance imaging, electroencephalogram, and magnetoencephalography, supporting reproducible brain research [<xref ref-type="bibr" rid="ref29">29</xref>]. The Neuroimaging Informatics Tools and Resources Clearinghouse offers a rich collection of imaging and data-processing tools [<xref ref-type="bibr" rid="ref30">30</xref>]. Similarly, the National Database for Autism Research [<xref ref-type="bibr" rid="ref31">31</xref>] and the Federal Interagency Traumatic Brain Injury Research informatics system [<xref ref-type="bibr" rid="ref32">32</xref>] provide deeply phenotyped datasets crucial for research in their respective fields. These platforms underscore the field&#x2019;s shift toward creating specialized, high-quality resources to tackle specific biomedical questions. They display how shared resources can drive forward innovation and improve patient care worldwide, illustrating the critical role of collaborative environments in the advancement of health care research and application.</p><p>Additionally, Kaggle, an online platform for data science and machine learning (ML) competitions, has emerged as a pivotal player in the field of ML analysis and data sharing [<xref ref-type="bibr" rid="ref33">33</xref>]. Launched in 2010, Kaggle facilitates collaboration and competition among data scientists and researchers by hosting challenges in various domains, including health care. These competitions often involve complex medical datasets, encouraging participants to develop innovative solutions and algorithms for disease prediction, medical imaging analysis [<xref ref-type="bibr" rid="ref34">34</xref>], and other health-related issues. Kaggle has not only democratized access to large medical datasets but has also fostered a global community where knowledge and techniques are openly shared. This environment has led to significant breakthroughs and advancements in medical research and analytics, further suggesting the importance of open data and collaborative problem-solving in improving health care outcomes and accelerating medical innovation.</p></sec><sec id="s3"><title>Balancing Privacy and the Need for Medical Open Databases</title><p>The success of open medical databases such as PhysioNet poses the challenge of balancing patient confidentiality with research enablement on open platforms [<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref36">36</xref>]. Research datasets in health care often contain protected health information (PHI), and the process of removing this information, a process known as deidentification or anonymization, can be challenging and prone to errors [<xref ref-type="bibr" rid="ref37">37</xref>]. Despite the use of these datasets, the need for deidentification introduces a significant barrier to data sharing due to the effort and cost involved.</p><p>The HIPAA, established in the United States in 1996, plays a vital role in safeguarding patients&#x2019; medical information. In response to the HIPAA mandate, U.S. Department of Health and Human Services published a final regulation in the form of the privacy rule in December 2000, which became effective on April 14, 2001. Central to this rule is the designation of 18 specific categories of PHI that, if disclosed, could be used to identify an individual (<xref ref-type="other" rid="box1">Textbox 1</xref>). These categories encompass a broad spectrum of personal data, including, but not limited to, names, geographic details smaller than a state, various identifiers like social security numbers, medical record numbers, and contact information, as well as certain biometric and photographic images [<xref ref-type="bibr" rid="ref38">38</xref>].</p><boxed-text id="box1"><title> Eighteen categories of protected health information.</title><list list-type="bullet"><list-item><p>Names</p></list-item><list-item><p>All geographic subdivisions smaller than a State</p></list-item><list-item><p>All elements of dates (except year) for dates directly related to an individual</p></list-item><list-item><p>Telephone numbers</p></list-item><list-item><p>Fax numbers</p></list-item><list-item><p>Electronic mail addresses</p></list-item><list-item><p>Social security numbers</p></list-item><list-item><p>Medical record numbers</p></list-item><list-item><p>Health plan beneficiary numbers</p></list-item><list-item><p>Account numbers</p></list-item><list-item><p>Certificate/license numbers</p></list-item><list-item><p>Vehicle identifiers and serial numbers</p></list-item><list-item><p>Device identifiers and serial numbers</p></list-item><list-item><p>Web URLs</p></list-item><list-item><p>IP address numbers</p></list-item><list-item><p>Biometric identifiers, including finger and voice prints</p></list-item><list-item><p>Full face photographic images and any comparable images</p></list-item><list-item><p>Any other unique identifying number, characteristic, or code</p></list-item></list></boxed-text><p>Additionally, HIPAA mandates that covered entities must ensure they do not possess knowledge that the remaining information could be used, whether alone or in conjunction with other data, to identify the subject. By strictly adhering to these guidelines, entities can share deidentified health information for broader uses, such as public health and research, without infringing on individual privacy rights, thus striking a balance between privacy protection and the beneficial use of health data [<xref ref-type="bibr" rid="ref39">39</xref>]. Despite these efforts, the tension between the promise of big data and patient privacy in health care research remains a challenge [<xref ref-type="bibr" rid="ref40">40</xref>].</p><p>PhysioNet is a pioneer in medical public databases, ensuring that the datasets it provides do not compromise individual privacy. This involves ensuring that any data shared does not contain PHI or has been sufficiently anonymized to prevent the identification of individuals. The challenges posed by the HIPAA privacy rule are not insignificant; they include the need for informed consent from data subjects and potential limitations on access to health information that can hinder clinical research [<xref ref-type="bibr" rid="ref41">41</xref>,<xref ref-type="bibr" rid="ref42">42</xref>]. Furthermore, the rule&#x2019;s interaction with other regulations, like the common rule, adds complexity to privacy concerns in research, leading to inconsistencies and additional burdens for researchers.</p><p>Despite these challenges, the privacy rule does allow for certain disclosures without patient authorization, particularly for public health purposes. This is intended to facilitate the use of medical data in important public health endeavors without undermining individual privacy protections [<xref ref-type="bibr" rid="ref43">43</xref>]. The balance sought by the HIPAA privacy rule between protecting privacy and facilitating research is a critical aspect of its implementation, particularly in the context of medical open databases. By navigating these regulations successfully, repositories can contribute to the advancement of medical research while ensuring compliance with privacy standards [<xref ref-type="bibr" rid="ref44">44</xref>].</p><p>The emergence of medical databases, such as the PhysioNet, UK Biobank, and the Cancer Imaging Archive, has significantly advanced collaborative research in health care [<xref ref-type="bibr" rid="ref45">45</xref>,<xref ref-type="bibr" rid="ref46">46</xref>]. These databases have the potential to transform cancer research and improve patient outcomes [<xref ref-type="bibr" rid="ref45">45</xref>]. However, the collection, linking, and use of data in biomedical research raise ethical concerns, particularly regarding privacy and security [<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref47">47</xref>,<xref ref-type="bibr" rid="ref48">48</xref>]. Despite these concerns, the benefits of open data in health care, including improved diagnostics and treatment, are substantial [<xref ref-type="bibr" rid="ref48">48</xref>]. The push for data sharing in cancer trials by pharmaceutical companies further underscores the importance of open medical databases in driving innovation and improving patient care [<xref ref-type="bibr" rid="ref49">49</xref>].</p></sec><sec id="s4"><title>Privacy Enhancing Technology</title><sec id="s4-1"><title>Overview</title><p>A range of studies have been conducted to explore the increasing frequency and impact of health care data breaches, highlighting the rising number of incidents and their detrimental effects on patient privacy and health care providers [<xref ref-type="bibr" rid="ref50">50</xref>-<xref ref-type="bibr" rid="ref53">53</xref>]. These breaches are often caused by a combination of technical, organizational, and human factors [<xref ref-type="bibr" rid="ref50">50</xref>-<xref ref-type="bibr" rid="ref52">52</xref>]. Human vulnerabilities, such as lack of awareness and training, play a significant role in these breaches [<xref ref-type="bibr" rid="ref51">51</xref>]. The use of the Swiss Cheese Model can help assess vulnerabilities and risks [<xref ref-type="bibr" rid="ref50">50</xref>]. Cloud computing breaches are a particular concern, highlighting the need for digital forensic readiness [<xref ref-type="bibr" rid="ref54">54</xref>]. Hacking and unauthorized internal disclosures are the most prevalent forms of attack [<xref ref-type="bibr" rid="ref53">53</xref>]. Further studies may examine specific cases and the implications for digital forensic readiness, emphasizing the importance of adhering to regulations.</p><p>Below, we reviewed several PETs and their applications in enhancing data privacy and security in health care settings (<xref ref-type="table" rid="table1">Table 1</xref>). PETs, such as encryption, anonymization techniques, and secure multiparty computation, offer powerful mechanisms to protect sensitive health data. Implementing these technologies, alongside robust privacy policies and employee training, can significantly reduce the likelihood of data breaches and bolster the trust between patients and health care providers.</p><table-wrap id="t1" position="float"><label>Table 1.</label><caption><p>Summary of privacy-enhancing technologies.</p></caption><table id="table1" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Technologies</td><td align="left" valign="bottom">Core principle</td><td align="left" valign="bottom">Advantages</td><td align="left" valign="bottom">Challenges and trade-offs</td></tr></thead><tbody><tr><td align="left" valign="top">Differential privacy</td><td align="left" valign="top">Adds calibrated statistical noise to query results to make it impossible to determine if an individual&#x2019;s data were included.</td><td align="left" valign="top">Provides strong and mathematically provable privacy guarantees.</td><td align="left" valign="top">Inherent trade-off between privacy and data use; high privacy can reduce analytical accuracy.</td></tr><tr><td align="left" valign="top">Synthetic data</td><td align="left" valign="top">Creates an artificial dataset that mimics the statistical properties of the original data without containing real patient information.</td><td align="left" valign="top">High use for model training; no real patient data are shared, eliminating reidentification risk.</td><td align="left" valign="top">Can be difficult to generate high-fidelity data that captures all complex correlations; potential for model bias.</td></tr><tr><td align="left" valign="top">Homomorphic encryption</td><td align="left" valign="top">Allows computations to be performed directly on encrypted data without decrypting it first.</td><td align="left" valign="top">Offers extremely strong security, as the raw data are never exposed.</td><td align="left" valign="top">High computational overhead; currently too slow for many complex ML<sup><xref ref-type="table-fn" rid="table1fn1">a</xref></sup> tasks.</td></tr><tr><td align="left" valign="top">Secure multiparty computation</td><td align="left" valign="top">Enables multiple parties to jointly compute a function over their inputs while keeping those inputs private.</td><td align="left" valign="top">Allows for collaborative analysis without a central data repository; no single party sees another&#x2019;s data.</td><td align="left" valign="top">High communication overhead between parties; can be complex to set up and scale.</td></tr><tr><td align="left" valign="top">Federated learning</td><td align="left" valign="top">Trains a central AI<sup><xref ref-type="table-fn" rid="table1fn2">b</xref></sup> model across decentralized devices or servers holding local data samples, without exchanging the data itself.</td><td align="left" valign="top">Keeps raw data local, enhancing privacy and data sovereignty.</td><td align="left" valign="top">Vulnerable to model poisoning/inversion attacks; performance can degrade with heterogeneous data.</td></tr></tbody></table><table-wrap-foot><fn id="table1fn1"><p><sup>a</sup>ML: machine learning.</p></fn><fn id="table1fn2"><p><sup>b</sup>AI: artificial intelligence.</p></fn></table-wrap-foot></table-wrap></sec><sec id="s4-2"><title>Differential Privacy</title><p>Differential privacy, a method for protecting individual privacy in data analysis, has been increasingly applied in the health care sector. It involves adding noise to the data to prevent reidentification of individuals. This approach has been used in various areas of health research, including genomics, neuroimaging, and health surveillance [<xref ref-type="bibr" rid="ref55">55</xref>]. However, there are challenges in its practical application, such as the theoretical nature of the privacy parameter epsilon [<xref ref-type="bibr" rid="ref56">56</xref>]. To address these challenges, researchers have proposed differentially private data release strategies and noise mechanisms, such as the Laplace and exponential mechanisms [<xref ref-type="bibr" rid="ref57">57</xref>]. However, a key challenge is the inherent trade-off between privacy and data use; increasing the amount of statistical noise to protect privacy can reduce the accuracy of analytical outcomes.</p><p>The application of differential privacy in medical questionnaires has also been explored, with the randomized response mechanism showing promise in improving privacy while retaining data use [<xref ref-type="bibr" rid="ref58">58</xref>]. Furthermore, the use of differential privacy in geospatial analyses of standardized health care data has been demonstrated, with the development of geodatabase functions for privacy-aware analysis [<xref ref-type="bibr" rid="ref59">59</xref>]. Finally, the combination of differential privacy and decision tree approach has been proposed for data publishing, and the differentially private mini-batch gradient descent algorithm for model publishing of medical data [<xref ref-type="bibr" rid="ref60">60</xref>].</p></sec><sec id="s4-3"><title>Synthetic Data</title><p>Synthetic data, generated through simulators, is increasingly used in health care to address the challenges of data availability and privacy [<xref ref-type="bibr" rid="ref61">61</xref>]. PETs, such as differential privacy, are combined with synthetic data generators to create private synthetic data, preserving statistical properties while ensuring privacy [<xref ref-type="bibr" rid="ref62">62</xref>]. These technologies have been applied in various use cases, including clinical risk prediction [<xref ref-type="bibr" rid="ref63">63</xref>] and medical research [<xref ref-type="bibr" rid="ref64">64</xref>]. However, the evaluation of synthetic data&#x2019;s privacy and use metrics remains a challenge, with a lack of consensus on standard approaches [<xref ref-type="bibr" rid="ref65">65</xref>]. Despite these challenges, the potential of synthetic data in preserving data use and patient privacy in electronic health care data is being explored [<xref ref-type="bibr" rid="ref66">66</xref>].</p></sec><sec id="s4-4"><title>Homomorphic Encryption</title><p>Homomorphic encryption, a powerful tool for preserving privacy in medical data, allows for computations to be performed on encrypted data without the need for decryption. It has been successfully applied in various medical data scenarios, including ML models for classification and training, secure genomic algorithms, and predictive analysis tasks [<xref ref-type="bibr" rid="ref67">67</xref>-<xref ref-type="bibr" rid="ref69">69</xref>]. For example, it has been used to securely manage personal health metrics data, process medical images [<xref ref-type="bibr" rid="ref70">70</xref>,<xref ref-type="bibr" rid="ref71">71</xref>], and enable secure medical computation [<xref ref-type="bibr" rid="ref72">72</xref>]. The use of homomorphic encryption in these applications ensures that sensitive medical data remains private and secure. Despite its power, the primary limitation of homomorphic encryption is its significant computational overhead, which can make it slow and resource-intensive for complex computations on large datasets.</p></sec><sec id="s4-5"><title>Secure Multiparty Computation</title><p>Secure multiparty computation is a cryptographic technique that enables data analytics without sharing the underlying data, making it a valuable tool for preserving privacy in medical data analysis [<xref ref-type="bibr" rid="ref73">73</xref>]. It has been applied in various health care scenarios, including collaborative systems [<xref ref-type="bibr" rid="ref74">74</xref>], statistical analysis of health data [<xref ref-type="bibr" rid="ref75">75</xref>], and electronic medical record (EMR) data [<xref ref-type="bibr" rid="ref75">75</xref>]. Secure multiparty computation has also been used in health care internet of things systems to handle privacy issues [<xref ref-type="bibr" rid="ref76">76</xref>], prevent data disclosure in sensor networks [<xref ref-type="bibr" rid="ref77">77</xref>], and enable the reuse of distributed electronic health data [<xref ref-type="bibr" rid="ref75">75</xref>]. Furthermore, it has been applied to enable privacy-preserving query processing on EMRs [<xref ref-type="bibr" rid="ref78">78</xref>]. Notably, secure multiparty computation has enabled research on highly sensitive data (such as HIV, rare diseases, and population genomics) that would otherwise be inaccessible due to privacy concerns.</p></sec><sec id="s4-6"><title>Federated Learning</title><p>Federated learning (FL), a decentralized ML approach, is increasingly being applied in the medical field due to the sensitive and fragmented nature of health care data [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref79">79</xref>]. It allows for the collaborative development of ML models without sharing raw data, thus preserving privacy [<xref ref-type="bibr" rid="ref80">80</xref>,<xref ref-type="bibr" rid="ref81">81</xref>]. This approach has been used in various medical domains, including oncology and radiology, for tasks such as image analysis and disease prediction [<xref ref-type="bibr" rid="ref81">81</xref>,<xref ref-type="bibr" rid="ref82">82</xref>]. However, there are challenges to be addressed, such as data homogeneity and transparency [<xref ref-type="bibr" rid="ref81">81</xref>]. Furthermore, FL can be vulnerable to security risks, such as model inversion attacks that attempt to reconstruct training data from the shared model updates, and require careful design to ensure robustness. Despite these challenges, FL shows promise in improving the efficiency and privacy of medical data processing [<xref ref-type="bibr" rid="ref83">83</xref>-<xref ref-type="bibr" rid="ref85">85</xref>].</p><p>To address the challenge of data heterogeneity in FL, we have proposed the Dynamically Synthetic Images for Federated Learning method, significantly improving the conventional FL framework by integrating local information from local multiple institutions with heterogeneous data types [<xref ref-type="bibr" rid="ref86">86</xref>]. The core principle of its implementation involves a dynamic process where, at the start of each training round, a client&#x2019;s local data are evaluated by the current global model to identify misclassified images. Using a synthetic minority oversampling technique, the system generates new, synthetic images based on these misclassified cases, which are then added to the local training set to compel the model to focus on features it previously failed to learn. In terms of effectiveness, experimental results demonstrated that Dynamically Synthetic Images for Federated Learning-based models achieve higher accuracy than conventional FL approaches and that their performance can be comparable to that of traditional centralized learning, proving especially beneficial for institutions with smaller or more heterogeneous datasets [<xref ref-type="bibr" rid="ref86">86</xref>].</p></sec></sec><sec id="s5"><title>Taiwan Medical AI and Data Portal and Dynamic Consents System</title><p>Taiwan has made significant strides in medical data sharing, particularly in the areas of privacy protection and electronic health records exchange. The country&#x2019;s comprehensive embedded integrated circuit-based health insurance card system, implemented by the Bureau of National Health Insurance, Taiwan, allows for the secure sharing of health information [<xref ref-type="bibr" rid="ref87">87</xref>]. The use of blockchain technology has been proposed as a means to further enhance the security and privacy of medical data sharing [<xref ref-type="bibr" rid="ref88">88</xref>,<xref ref-type="bibr" rid="ref89">89</xref>]. The Taiwan Electronic Medical Record Template and the National Electronic Medical Record Exchange System have been developed to facilitate the exchange of EMRs [<xref ref-type="bibr" rid="ref90">90</xref>,<xref ref-type="bibr" rid="ref91">91</xref>]. However, concerns about unauthorized access and secondary use of EMRs persist, particularly among highly educated individuals [<xref ref-type="bibr" rid="ref92">92</xref>]. The country has also established guidelines for the security and privacy protection of health information, drawing on international best practices [<xref ref-type="bibr" rid="ref93">93</xref>].</p><p>In the past 4 years, funded by the National Science and Technology Council of Taiwan, we have assembled teams from National Yang Ming Chiao Tung University, Taipei Veterans General Hospital, Academia Sinica, and National Taipei University of Nursing and Health Sciences to form a data repository task force known as the Smart Medical AI and Repository Taskforce Center. We launched a medical AI and data-sharing platform aimed at advancing the field of medical AI research in October 2023 [<xref ref-type="bibr" rid="ref94">94</xref>]. This platform not only provides the public and researchers with access to a multitude of shared datasets but also ensures a meticulous evaluation process (<xref ref-type="fig" rid="figure2">Figure 2</xref>). Researchers can apply for access to the data by providing an abstract of their research proposal. Dataset managers assess applications based on their intended use, specific needs, and detailed research plans.</p><fig position="float" id="figure2"><label>Figure 2.</label><caption><p>Taiwan medical artificial intelligence and data portal. AI: artificial intelligence.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="jmir_v28i1e58954_fig02.png"/></fig><p>Currently, seventeen datasets have been released on the platform, covering neuropsychiatric disorders, brain tumors, ophthalmic diseases, musculoskeletal disorders, and cardiopulmonary diseases. All datasets have undergone deidentification and delinking processes and include annotated information to facilitate AI training and validation. Specifically, our data-sharing platform includes: MRI images of vestibular schwannoma; computed tomography (CT) images of intracerebral hemorrhage; brain Fluorodeoxyglucose-Positron Emission Tomography/Magnetic Resonance Imaging images for dementia diagnosis; primary brain tumor MRI datasets, including meningioma, glioma, and pituitary adenoma; MRI data of brain metastases, which represent the largest collection nationwide; hand and foot X-rays of rheumatoid arthritis; X-rays of compression fractures; spinal X-rays of ankylosing spondylitis; chest CT images and clinical data of atrial fibrillation patients; chest X-rays for lung cancer screening; annotated preoperative liver CT images; neck lymph node CT images with postoperative pathology results; the Taiwan Aging and Mental Illness Cohort brain imaging database; the dementia molecular imaging database; fundus image datasets for glaucoma; and fundus image datasets of polypoidal choroidal vasculopathy.</p><p>The data sharing platform is built on a comprehensive architecture designed to support AI research by integrating 3 core systems: a CKAN-based sharing platform for dataset management, a data application system, and a dynamic authorization consent platform for patient privacy. Specific features include a robust user authentication and authorization mechanism, allowing dataset managers to grant access to specific users or collaborators. The platform ensures data integrity and ethical compliance through a multistep deidentification process for all medical images and by linking to the dynamic consent system (for sensitive clinical data), which allows patients to manage their data sharing preferences in real-time. To use the database, researchers first search for datasets on the platform, then apply for access through a formal registration and review process. Once approved and authorized by the dataset manager, users can obtain a login key to programmatically access the data through standardized protocols, such as DICOMweb, ensuring a secure, convenient, and interoperable environment for third-party AI applications.</p><p>This effort aims to advance research across 7 crucial clinical areas that greatly benefit from AI technology, including heart disease, neurological disorders, mental illness, diabetes, cancer, genetic predispositions to complex diseases, and medical imaging. Moreover, the platform underpins collaboration between distinct teams specializing in AI methodology, science and law, and data governance, jointly fostering a robust data governance framework that emphasizes FL, cloud-based AI solutions, and trusted AI practices. Importantly, the system is designed to streamline the research process while maintaining a focus on ethical standards and participant privacy. In line with this, the platform incorporates a dynamic informed consent mechanism, especially for datasets that are anonymized but cannot be completely separated from their sources. This approach ensures that participants&#x2019; privacy is safeguarded while also enabling their informed and ongoing consent, reflecting our commitment to ethical research practices and the dynamic nature of consent in medical studies.</p><p>Dynamic informed consent, a concept that has been explored in various contexts, is a personalized, digital communication interface that allows participants to manage their consent preferences [<xref ref-type="bibr" rid="ref95">95</xref>]. It has been proposed as a solution to improve patient confidence and trust in the use of electronic patient records in medical research [<xref ref-type="bibr" rid="ref96">96</xref>]. In the context of privacy-aware pervasive health and well-being, dynamic consent enables granular data consent and management [<xref ref-type="bibr" rid="ref97">97</xref>]. It has also been suggested as a potential solution to challenges in modern biomedical research, including participant recruitment, informed consent, and consent management [<xref ref-type="bibr" rid="ref98">98</xref>]. The use of blockchain technology has been proposed to enhance the privacy-preserving aspects of dynamic consent in genomic data sharing [<xref ref-type="bibr" rid="ref99">99</xref>]. The concept of dynamic informed consent has been further explored in the context of personalized medicine, emphasizing the need for a more dynamic and enriched consent model [<xref ref-type="bibr" rid="ref100">100</xref>].</p><p>To enhance the privacy of participants contributing to the data in our platform and increase participants&#x2019; engagement, we have developed a dynamic informed consent system, named the Health Data Authorization Service Platform (<xref ref-type="fig" rid="figure3">Figure 3</xref>). This collaborative effort involves our data governance, humanities, science and law, and clinical teams, aiming to facilitate scalable, dynamic consent operations suitable for complex data environments. The platform supports flexible data governance, allowing data owners to dynamically express their consent preferences, thereby making dynamic consent practical and sustainable.</p><fig position="float" id="figure3"><label>Figure 3.</label><caption><p>Health data authorization service platform. This diagram depicts the architecture of a medical data-sharing platform that integrates dynamic consent for secure and transparent data sharing. The system centers on 4 key roles: the resource owner (RO), who owns the data; the resource server (RS), where medical data are stored and managed; the requesting party (RP), typically researchers seeking data access; and the authorization server (AS), the core component facilitating connections among the roles. This framework ensures data access is based on explicit consent from the data owner, allowing real-time adjustments to consent settings for different data types and uses, such as academic research. The platform&#x2019;s primary tasks are to establish individual preferences, maintain consent history, and ensure trust and transparency between data owners and users, thereby advancing responsible data science development.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="jmir_v28i1e58954_fig03.png"/></fig><p>The platform&#x2019;s architecture encompasses 4 key roles: the resource owner, usually the participants, who owns the data; the resource server, which stores and manages medical data; the requesting party, typically researchers seeking data access; and the authorization server, the backbone of our dynamic consent system, connecting the 3 roles. This system ensures that data are accessed only with the owner&#x2019;s express consent, respecting their preferences and enhancing data use transparency. Resource owners can modify their consent settings at any time, reflecting changes in their willingness to share different data types, like EMRs or medical imaging, for specific purposes such as academic research. This flexibility ensures that data use aligns with the owners&#x2019; current preferences. The platform seamlessly integrates with our shared data framework, maintaining each citizen&#x2019;s consent history and enabling swift updates to consent forms as needed. By streamlining the consent process and ensuring data are shared according to owner permissions, our platform respects individual preferences while promoting responsible data science development. It exemplifies a forward-thinking approach to data governance, enabling real-time adjustments in consent and fostering a culture of trust and transparency between data owners and users.</p><p>These initiatives in Taiwan can be understood within the global context of evolving data privacy regulations. Unlike the &#x201C;one-time, broad consent&#x201D; model often used in US-based research under the Common Rule, Taiwan&#x2019;s move toward dynamic consent aligns more closely with the principles of the European Union&#x2019;s General Data Protection Regulation [<xref ref-type="bibr" rid="ref101">101</xref>]. The General Data Protection Regulation mandates that consent must be specific, informed, and easily revocable. The dynamic consent system builds on this by providing a technological interface for participants to manage their preferences granularly and continuously, representing a best-practice approach to balancing research needs with individual autonomy and privacy rights.</p></sec><sec id="s6"><title>Acceleration of Medical AI Research Through Open Databases</title><p>The advent of medical open databases has significantly accelerated the field of medical AI research, fostering an environment of innovation and rapid development [<xref ref-type="bibr" rid="ref102">102</xref>]. By providing researchers with access to vast amounts of health-related data, these databases have become a cornerstone for advancements in predictive analytics, diagnostic algorithms, and personalized medicine.</p><p>One of the most notable contributions of open medical databases to AI research is the democratization of data [<xref ref-type="bibr" rid="ref103">103</xref>]. Historically, the scarcity and inaccessibility of medical data posed substantial hurdles to AI development. However, platforms like PhysioNet, established in 1999, have bridged this gap by offering a plethora of datasets ranging from physiological signals to clinical outcomes [<xref ref-type="bibr" rid="ref104">104</xref>]. However, challenges remain, including the need for large datasets and the lack of external validation in perioperative medicine [<xref ref-type="bibr" rid="ref105">105</xref>]. The use of open science approaches, including data liberation and crowdsourcing, can help address these challenges [<xref ref-type="bibr" rid="ref106">106</xref>]. The integration of networked medical devices and clinical repositories based on open standards can further enhance AI research in high-acuity medical environments [<xref ref-type="bibr" rid="ref107">107</xref>]. This enhanced availability allows researchers from diverse backgrounds and institutions to engage in health care innovation, leveling the playing field and stimulating a surge in AI-based solutions.</p><p>The availability of open databases has catalyzed the application of diverse AI methodologies to complex medical problems. Deep learning, particularly convolutional neural networks, has achieved state-of-the-art performance by leveraging large-scale imaging datasets; for example, researchers have trained convolutional neural networks on millions of images from The Cancer Imaging Archive to develop algorithms capable of detecting and classifying tumors in radiological scans with accuracy comparable to human experts [<xref ref-type="bibr" rid="ref108">108</xref>]. For structured data such as the genetic and clinical information in the UK Biobank, traditional ML models like random forests and gradient boosting have been widely used, excelling at identifying complex patterns to predict disease risk, including the calculation of polygenic risk scores for coronary artery disease based on thousands of genetic variants [<xref ref-type="bibr" rid="ref109">109</xref>]. In addition, natural language processing techniques have been applied to large repositories of unstructured clinical notes, such as those in the Medical Information Mart for Intensive Care version IV (MIMIC-IV) database (part of PhysioNet), to extract critical information on symptoms, treatments, and outcomes, thereby enabling large-scale retrospective studies that were previously infeasible [<xref ref-type="bibr" rid="ref110">110</xref>].</p><p>Open medical databases encompass a wide variety of data types, including EMRs, imaging, genomic sequences, and more. This diversity enables AI researchers to explore multifaceted health care questions, from predicting disease trajectories to optimizing treatment plans. Moreover, the rich, varied datasets facilitate the training of more robust and generalizable AI models, capable of addressing complex medical scenarios across different populations and settings. The shared nature of open databases fosters collaboration across the global research community [<xref ref-type="bibr" rid="ref111">111</xref>]. Through platforms that offer shared data, researchers can combine their expertise to tackle larger and more complex problems than they could individually. This collaborative approach has led to significant breakthroughs in AI, such as algorithms that can detect diseases from images with accuracy rivaling that of trained professionals [<xref ref-type="bibr" rid="ref112">112</xref>,<xref ref-type="bibr" rid="ref113">113</xref>].</p><p>Open databases also streamline the validation and implementation phases of AI development [<xref ref-type="bibr" rid="ref114">114</xref>]. Access to diverse datasets enables researchers to rigorously test their algorithms under various conditions and patient demographics, ensuring their reliability and effectiveness. The expansion of these databases has significantly propelled medical AI research forward, marking a new phase of health care innovation with faster discoveries, collaborative efforts, and a commitment to ethical data use. As the field evolves, the role of open databases in shaping the future of medicine remains pivotal.</p></sec><sec id="s7" sec-type="conclusions"><title>Conclusions</title><p>In conclusion, the evolution toward medical open databases, exemplified by the inception of platforms like PhysioNet in 1999 and their progression over the past 25 years, alongside the integration of PETs, marks a significant milestone in the domain of biomedical research and health care innovation. This journey not only fosters an unprecedented level of collaboration and accessibility but also emphasizes the crucial need to address privacy concerns and ethical considerations diligently. The ongoing efforts to balance data sharing with individual privacy protection are underscored by the adaptation of legal frameworks and the implementation of cryptographic and data management solutions. The introduction and growth of medical open databases have been pivotal, providing a wealth of data that has propelled research and innovation while highlighting the challenges and responsibilities of managing sensitive information. Specifically, the availability of open medical databases has significantly accelerated AI research, leading to breakthroughs in disease prediction, diagnostics, and personalized medicine. As we continue to explore the vast potential of open science and FL, the landscape of health care research is on the brink of remarkable transformations. These advancements promise enhanced patient outcomes, faster medical discoveries, and a more inclusive global research community, all achieved by adhering to the highest standards of privacy and ethical integrity.</p></sec></body><back><ack><p>The authors thank Dr Watson Lin for supporting the infrastructure of the data-sharing platform and for providing valuable perspectives on the guidelines for medical data sharing. The authors also thank the National Science and Technology Council for offering legal insights on privacy policies related to medical data sharing.</p></ack><notes><sec><title>Funding</title><p>This work was supported by grants from the National Science and Technology Council, Taiwan (grant number NSCT 114-2634-F-A49-006 and 113-2634-F-A49-003). ACY was also supported by the Mt. Jade Young Scholarship Award from the Ministry of Education, Taiwan, as well as Brain Research Center, National Yang Ming Chiao Tung University, and the Ministry of Education (Aim for the Top University Plan), Taipei, Taiwan.</p></sec></notes><fn-group><fn fn-type="con"><p>Conceptualization; writing &#x2013; original draft: AY;</p><p>Writing &#x2013; review and editing: All Authors;</p><p>Funding acquisition: CHL</p></fn><fn fn-type="conflict"><p>None declared.</p></fn></fn-group><glossary><title>Abbreviations</title><def-list><def-item><term id="abb1">AI</term><def><p>artificial intelligence</p></def></def-item><def-item><term id="abb2">CT</term><def><p>computed tomography</p></def></def-item><def-item><term id="abb3">EMR</term><def><p>electronic medical record</p></def></def-item><def-item><term id="abb4">FL</term><def><p>federated learning</p></def></def-item><def-item><term id="abb5">HIPAA</term><def><p>Health Insurance Portability and Accountability Act</p></def></def-item><def-item><term id="abb6">ML</term><def><p>machine learning</p></def></def-item><def-item><term id="abb7">MRI</term><def><p>magnetic resonance imaging</p></def></def-item><def-item><term id="abb8">PET</term><def><p>privacy-enhancing technology</p></def></def-item><def-item><term id="abb9">PHI</term><def><p>protected health information</p></def></def-item></def-list></glossary><ref-list><title>References</title><ref id="ref1"><label>1</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Merelli</surname><given-names>I</given-names> </name><name name-style="western"><surname>P&#x00E9;rez-S&#x00E1;nchez</surname><given-names>H</given-names> </name><name name-style="western"><surname>Gesing</surname><given-names>S</given-names> </name><name name-style="western"><surname>D&#x2019;Agostino</surname><given-names>D</given-names> </name></person-group><article-title>Managing, analysing, and integrating big data in medical bioinformatics: open problems and future perspectives</article-title><source>Biomed Res Int</source><year>2014</year><volume>2014</volume><fpage>134023</fpage><pub-id pub-id-type="doi">10.1155/2014/134023</pub-id><pub-id pub-id-type="medline">25254202</pub-id></nlm-citation></ref><ref id="ref2"><label>2</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Roski</surname><given-names>J</given-names> </name><name name-style="western"><surname>Bo-Linn</surname><given-names>GW</given-names> </name><name name-style="western"><surname>Andrews</surname><given-names>TA</given-names> </name></person-group><article-title>Creating value in health care through big data: opportunities and policy implications</article-title><source>Health Aff (Millwood)</source><year>2014</year><month>07</month><volume>33</volume><issue>7</issue><fpage>1115</fpage><lpage>1122</lpage><pub-id pub-id-type="doi">10.1377/hlthaff.2014.0147</pub-id><pub-id pub-id-type="medline">25006136</pub-id></nlm-citation></ref><ref id="ref3"><label>3</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Wang</surname><given-names>Y</given-names> </name><name name-style="western"><surname>Kung</surname><given-names>L</given-names> </name><name name-style="western"><surname>Byrd</surname><given-names>TA</given-names> </name></person-group><article-title>Big data analytics: understanding its capabilities and potential benefits for healthcare organizations</article-title><source>Technol Forecast Soc Change</source><year>2018</year><month>01</month><volume>126</volume><fpage>3</fpage><lpage>13</lpage><pub-id pub-id-type="doi">10.1016/j.techfore.2015.12.019</pub-id></nlm-citation></ref><ref id="ref4"><label>4</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Goldberger</surname><given-names>AL</given-names> </name><name name-style="western"><surname>Amaral</surname><given-names>LA</given-names> </name><name name-style="western"><surname>Glass</surname><given-names>L</given-names> </name><etal/></person-group><article-title>PhysioBank, PhysioToolkit, and PhysioNet: components of a new research resource for complex physiologic signals</article-title><source>Circulation</source><year>2000</year><month>06</month><day>13</day><volume>101</volume><issue>23</issue><fpage>E215</fpage><lpage>20</lpage><pub-id pub-id-type="doi">10.1161/01.cir.101.23.e215</pub-id><pub-id pub-id-type="medline">10851218</pub-id></nlm-citation></ref><ref id="ref5"><label>5</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Dean</surname><given-names>DA</given-names>  <suffix>2nd</suffix></name><name name-style="western"><surname>Goldberger</surname><given-names>AL</given-names> </name><name name-style="western"><surname>Mueller</surname><given-names>R</given-names> </name><etal/></person-group><article-title>Scaling up scientific discovery in sleep medicine: the national sleep research resource</article-title><source>Sleep</source><year>2016</year><month>05</month><day>1</day><volume>39</volume><issue>5</issue><fpage>1151</fpage><lpage>1164</lpage><pub-id pub-id-type="doi">10.5665/sleep.5774</pub-id><pub-id pub-id-type="medline">27070134</pub-id></nlm-citation></ref><ref id="ref6"><label>6</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Wylie</surname><given-names>JE</given-names> </name><name name-style="western"><surname>Mineau</surname><given-names>GP</given-names> </name></person-group><article-title>Biomedical databases: protecting privacy and promoting research</article-title><source>Trends Biotechnol</source><year>2003</year><month>03</month><volume>21</volume><issue>3</issue><fpage>113</fpage><lpage>116</lpage><pub-id pub-id-type="doi">10.1016/S0167-7799(02)00039-2</pub-id><pub-id pub-id-type="medline">12628367</pub-id></nlm-citation></ref><ref id="ref7"><label>7</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Murphy</surname><given-names>SN</given-names> </name><name name-style="western"><surname>Weber</surname><given-names>G</given-names> </name><name name-style="western"><surname>Mendis</surname><given-names>M</given-names> </name><etal/></person-group><article-title>Serving the enterprise and beyond with informatics for integrating biology and the bedside (i2b2)</article-title><source>J Am Med Inform Assoc</source><year>2010</year><volume>17</volume><issue>2</issue><fpage>124</fpage><lpage>130</lpage><pub-id pub-id-type="doi">10.1136/jamia.2009.000893</pub-id><pub-id pub-id-type="medline">20190053</pub-id></nlm-citation></ref><ref id="ref8"><label>8</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Shahin</surname><given-names>MH</given-names> </name><name name-style="western"><surname>Bhattacharya</surname><given-names>S</given-names> </name><name name-style="western"><surname>Silva</surname><given-names>D</given-names> </name><etal/></person-group><article-title>Open data revolution in clinical research: opportunities and challenges</article-title><source>Clin Transl Sci</source><year>2020</year><month>07</month><volume>13</volume><issue>4</issue><fpage>665</fpage><lpage>674</lpage><pub-id pub-id-type="doi">10.1111/cts.12756</pub-id><pub-id pub-id-type="medline">32004409</pub-id></nlm-citation></ref><ref id="ref9"><label>9</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Ness</surname><given-names>RB</given-names> </name><collab>Joint Policy Committee, Societies of Epidemiology</collab></person-group><article-title>Influence of the HIPAA privacy rule on health research</article-title><source>JAMA</source><year>2007</year><month>11</month><day>14</day><volume>298</volume><issue>18</issue><fpage>2164</fpage><lpage>2170</lpage><pub-id pub-id-type="doi">10.1001/jama.298.18.2164</pub-id><pub-id pub-id-type="medline">18000200</pub-id></nlm-citation></ref><ref id="ref10"><label>10</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Dwork</surname><given-names>C</given-names> </name><name name-style="western"><surname>Roth</surname><given-names>A</given-names> </name></person-group><article-title>The algorithmic foundations of differential privacy</article-title><source>FNT in Theoretical Computer Science</source><year>2014</year><volume>9</volume><issue>3-4</issue><fpage>211</fpage><lpage>407</lpage><pub-id pub-id-type="doi">10.1561/0400000042</pub-id></nlm-citation></ref><ref id="ref11"><label>11</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Rubin</surname><given-names>DB</given-names> </name></person-group><article-title>Discussion: statistical disclosure limitation</article-title><source>J Off Stat</source><year>1993</year><access-date>2025-12-19</access-date><volume>9</volume><fpage>461</fpage><lpage>468</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://www.scb.se/contentassets/ca21efb41fee47d293bbee5bf7be7fb3/discussion-statistical-disclosure-limitation2.pdf">https://www.scb.se/contentassets/ca21efb41fee47d293bbee5bf7be7fb3/discussion-statistical-disclosure-limitation2.pdf</ext-link></comment></nlm-citation></ref><ref id="ref12"><label>12</label><nlm-citation citation-type="book"><person-group person-group-type="author"><name name-style="western"><surname>Yi</surname><given-names>X</given-names> </name><name name-style="western"><surname>Paulet</surname><given-names>R</given-names> </name><name name-style="western"><surname>Bertino</surname><given-names>E</given-names> </name></person-group><article-title>Homomorphic encryption</article-title><source>Homomorphic Encryption and Applications</source><year>2014</year><publisher-name>Springer</publisher-name><fpage>27</fpage><lpage>46</lpage><pub-id pub-id-type="doi">10.1007/978-3-319-12229-8_2</pub-id><pub-id pub-id-type="other">978-3-319-12228-1</pub-id></nlm-citation></ref><ref id="ref13"><label>13</label><nlm-citation citation-type="book"><person-group person-group-type="author"><name name-style="western"><surname>Cramer</surname><given-names>RJF</given-names> </name><name name-style="western"><surname>Damg&#x00E5;rd</surname><given-names>IB</given-names> </name><name name-style="western"><surname>Nielsen</surname><given-names>JB</given-names> </name></person-group><source>Secure Multiparty Computation and Secret Sharing</source><year>2015</year><publisher-name>Cambridge University Press</publisher-name><pub-id pub-id-type="doi">10.1017/CBO9781107337756</pub-id><pub-id pub-id-type="other">978-1-107-04305-3</pub-id></nlm-citation></ref><ref id="ref14"><label>14</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Xu</surname><given-names>J</given-names> </name><name name-style="western"><surname>Glicksberg</surname><given-names>BS</given-names> </name><name name-style="western"><surname>Su</surname><given-names>C</given-names> </name><name name-style="western"><surname>Walker</surname><given-names>P</given-names> </name><name name-style="western"><surname>Bian</surname><given-names>J</given-names> </name><name name-style="western"><surname>Wang</surname><given-names>F</given-names> </name></person-group><article-title>Federated learning for healthcare informatics</article-title><source>J Healthc Inform Res</source><year>2021</year><month>03</month><volume>5</volume><issue>1</issue><fpage>1</fpage><lpage>19</lpage><pub-id pub-id-type="doi">10.1007/s41666-020-00082-4</pub-id><pub-id pub-id-type="medline">33204939</pub-id></nlm-citation></ref><ref id="ref15"><label>15</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Packer</surname><given-names>M</given-names> </name></person-group><article-title>Data sharing in medical research</article-title><source>BMJ</source><year>2018</year><month>02</month><day>14</day><volume>360</volume><fpage>k510</fpage><pub-id pub-id-type="doi">10.1136/bmj.k510</pub-id><pub-id pub-id-type="medline">29444885</pub-id></nlm-citation></ref><ref id="ref16"><label>16</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Moody</surname><given-names>GB</given-names> </name><name name-style="western"><surname>Mark</surname><given-names>RG</given-names> </name><name name-style="western"><surname>Goldberger</surname><given-names>AL</given-names> </name></person-group><article-title>PhysioNet: physiologic signals, time series and related open source software for basic, clinical, and applied research</article-title><source>Annu Int Conf IEEE Eng Med Biol Soc</source><year>2011</year><volume>2011</volume><fpage>8327</fpage><lpage>8330</lpage><pub-id pub-id-type="doi">10.1109/IEMBS.2011.6092053</pub-id><pub-id pub-id-type="medline">22256277</pub-id></nlm-citation></ref><ref id="ref17"><label>17</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Moody</surname><given-names>GB</given-names> </name><name name-style="western"><surname>Mark</surname><given-names>RG</given-names> </name><name name-style="western"><surname>Goldberger</surname><given-names>AL</given-names> </name></person-group><article-title>PhysioNet: a research resource for studies of complex physiologic and biomedical signals</article-title><conf-name>Computers in Cardiology 2000</conf-name><conf-date>Sep 24-27, 2000</conf-date><pub-id pub-id-type="doi">10.1109/CIC.2000.898485</pub-id></nlm-citation></ref><ref id="ref18"><label>18</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Henry</surname><given-names>IC</given-names> </name><name name-style="western"><surname>Goldberger</surname><given-names>AL</given-names> </name><name name-style="western"><surname>Moody</surname><given-names>GB</given-names> </name><name name-style="western"><surname>Mark</surname><given-names>RG</given-names> </name></person-group><article-title>PhysioNet: an NIH research resource for physiologic datasets and open-source software</article-title><conf-name>14th IEEE Symposium on Computer-Based Medical Systems CBMS 2001</conf-name><conf-date>Jul 26-27, 2001</conf-date><conf-loc>Bethesda, MD</conf-loc><publisher-name>IEEE Comput Soc</publisher-name><fpage>245</fpage><lpage>250</lpage><pub-id pub-id-type="doi">10.1109/CBMS.2001.941728</pub-id></nlm-citation></ref><ref id="ref19"><label>19</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Thomas</surname><given-names>RJ</given-names> </name><name name-style="western"><surname>Mietus</surname><given-names>JE</given-names> </name><name name-style="western"><surname>Peng</surname><given-names>CK</given-names> </name><name name-style="western"><surname>Goldberger</surname><given-names>AL</given-names> </name></person-group><article-title>An electrocardiogram-based technique to assess cardiopulmonary coupling during sleep</article-title><source>Sleep</source><year>2005</year><month>09</month><volume>28</volume><issue>9</issue><fpage>1151</fpage><lpage>1161</lpage><pub-id pub-id-type="doi">10.1093/sleep/28.9.1151</pub-id><pub-id pub-id-type="medline">16268385</pub-id></nlm-citation></ref><ref id="ref20"><label>20</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Thomas</surname><given-names>RJ</given-names> </name><name name-style="western"><surname>Mietus</surname><given-names>JE</given-names> </name><name name-style="western"><surname>Peng</surname><given-names>CK</given-names> </name><etal/></person-group><article-title>Differentiating obstructive from central and complex sleep apnea using an automated electrocardiogram-based method</article-title><source>Sleep</source><year>2007</year><month>12</month><volume>30</volume><issue>12</issue><fpage>1756</fpage><lpage>1769</lpage><pub-id pub-id-type="doi">10.1093/sleep/30.12.1756</pub-id><pub-id pub-id-type="medline">18246985</pub-id></nlm-citation></ref><ref id="ref21"><label>21</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Collins</surname><given-names>R</given-names> </name></person-group><article-title>What makes UK Biobank special?</article-title><source>Lancet</source><year>2012</year><month>03</month><day>31</day><volume>379</volume><issue>9822</issue><fpage>1173</fpage><lpage>1174</lpage><pub-id pub-id-type="doi">10.1016/S0140-6736(12)60404-8</pub-id><pub-id pub-id-type="medline">22463865</pub-id></nlm-citation></ref><ref id="ref22"><label>22</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Bycroft</surname><given-names>C</given-names> </name><name name-style="western"><surname>Freeman</surname><given-names>C</given-names> </name><name name-style="western"><surname>Petkova</surname><given-names>D</given-names> </name><etal/></person-group><article-title>The UK Biobank resource with deep phenotyping and genomic data</article-title><source>Nature New Biol</source><year>2018</year><month>10</month><volume>562</volume><issue>7726</issue><fpage>203</fpage><lpage>209</lpage><pub-id pub-id-type="doi">10.1038/s41586-018-0579-z</pub-id><pub-id pub-id-type="medline">30305743</pub-id></nlm-citation></ref><ref id="ref23"><label>23</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Allen</surname><given-names>N</given-names> </name><name name-style="western"><surname>Sudlow</surname><given-names>C</given-names> </name><name name-style="western"><surname>Downey</surname><given-names>P</given-names> </name><etal/></person-group><article-title>UK Biobank: current status and what it means for epidemiology</article-title><source>Health Policy Technol</source><year>2012</year><month>09</month><volume>1</volume><issue>3</issue><fpage>123</fpage><lpage>126</lpage><pub-id pub-id-type="doi">10.1016/j.hlpt.2012.07.003</pub-id></nlm-citation></ref><ref id="ref24"><label>24</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Littlejohns</surname><given-names>TJ</given-names> </name><name name-style="western"><surname>Holliday</surname><given-names>J</given-names> </name><name name-style="western"><surname>Gibson</surname><given-names>LM</given-names> </name><etal/></person-group><article-title>The UK Biobank imaging enhancement of 100,000 participants:&#x2009;rationale, data collection, management and future directions</article-title><source>Nat Commun</source><year>2020</year><month>05</month><day>26</day><volume>11</volume><issue>1</issue><fpage>2624</fpage><pub-id pub-id-type="doi">10.1038/s41467-020-15948-9</pub-id><pub-id pub-id-type="medline">32457287</pub-id></nlm-citation></ref><ref id="ref25"><label>25</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Littlejohns</surname><given-names>TJ</given-names> </name><name name-style="western"><surname>Sudlow</surname><given-names>C</given-names> </name><name name-style="western"><surname>Allen</surname><given-names>NE</given-names> </name><name name-style="western"><surname>Collins</surname><given-names>R</given-names> </name></person-group><article-title>UK Biobank: opportunities for cardiovascular research</article-title><source>Eur Heart J</source><year>2019</year><month>04</month><day>7</day><volume>40</volume><issue>14</issue><fpage>1158</fpage><lpage>1166</lpage><pub-id pub-id-type="doi">10.1093/eurheartj/ehx254</pub-id><pub-id pub-id-type="medline">28531320</pub-id></nlm-citation></ref><ref id="ref26"><label>26</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Azevedo</surname><given-names>T</given-names> </name><name name-style="western"><surname>Bethlehem</surname><given-names>RAI</given-names> </name><name name-style="western"><surname>Whiteside</surname><given-names>DJ</given-names> </name><etal/></person-group><article-title>Identifying healthy individuals with Alzheimer&#x2019;s disease neuroimaging phenotypes in the UK Biobank</article-title><source>Commun Med (Lond)</source><year>2023</year><month>07</month><day>20</day><volume>3</volume><issue>1</issue><fpage>100</fpage><pub-id pub-id-type="doi">10.1038/s43856-023-00313-w</pub-id><pub-id pub-id-type="medline">37474615</pub-id></nlm-citation></ref><ref id="ref27"><label>27</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Steinfeldt</surname><given-names>J</given-names> </name><name name-style="western"><surname>Buergel</surname><given-names>T</given-names> </name><name name-style="western"><surname>Loock</surname><given-names>L</given-names> </name><etal/></person-group><article-title>Neural network-based integration of polygenic and clinical information: development and validation of a prediction model for 10-year risk of major adverse cardiac events in the UK Biobank cohort</article-title><source>Lancet Digit Health</source><year>2022</year><month>02</month><volume>4</volume><issue>2</issue><fpage>e84</fpage><lpage>e94</lpage><pub-id pub-id-type="doi">10.1016/S2589-7500(21)00249-1</pub-id><pub-id pub-id-type="medline">35090679</pub-id></nlm-citation></ref><ref id="ref28"><label>28</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Clark</surname><given-names>K</given-names> </name><name name-style="western"><surname>Vendt</surname><given-names>B</given-names> </name><name name-style="western"><surname>Smith</surname><given-names>K</given-names> </name><etal/></person-group><article-title>The cancer imaging archive (TCIA): maintaining and operating a public information repository</article-title><source>J Digit Imaging</source><year>2013</year><month>12</month><volume>26</volume><issue>6</issue><fpage>1045</fpage><lpage>1057</lpage><pub-id pub-id-type="doi">10.1007/s10278-013-9622-7</pub-id><pub-id pub-id-type="medline">23884657</pub-id></nlm-citation></ref><ref id="ref29"><label>29</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Markiewicz</surname><given-names>CJ</given-names> </name><name name-style="western"><surname>Gorgolewski</surname><given-names>KJ</given-names> </name><name name-style="western"><surname>Feingold</surname><given-names>F</given-names> </name><etal/></person-group><article-title>The OpenNeuro resource for sharing of neuroscience data</article-title><source>Elife</source><year>2021</year><month>10</month><day>18</day><volume>10</volume><fpage>e71774</fpage><pub-id pub-id-type="doi">10.7554/eLife.71774</pub-id><pub-id pub-id-type="medline">34658334</pub-id></nlm-citation></ref><ref id="ref30"><label>30</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Buccigrossi</surname><given-names>R</given-names> </name><name name-style="western"><surname>Ellisman</surname><given-names>M</given-names> </name><name name-style="western"><surname>Grethe</surname><given-names>J</given-names> </name><etal/></person-group><article-title>The neuroimaging informatics tools and resources clearinghouse (NITRC)</article-title><source>AMIA Annu Symp Proc</source><year>2008</year><month>11</month><day>6</day><volume>1000</volume><fpage>1000</fpage><pub-id pub-id-type="medline">18999128</pub-id></nlm-citation></ref><ref id="ref31"><label>31</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hall</surname><given-names>D</given-names> </name><name name-style="western"><surname>Huerta</surname><given-names>MF</given-names> </name><name name-style="western"><surname>McAuliffe</surname><given-names>MJ</given-names> </name><name name-style="western"><surname>Farber</surname><given-names>GK</given-names> </name></person-group><article-title>Sharing heterogeneous data: the national database for autism research</article-title><source>Neuroinformatics</source><year>2012</year><month>10</month><volume>10</volume><issue>4</issue><fpage>331</fpage><lpage>339</lpage><pub-id pub-id-type="doi">10.1007/s12021-012-9151-4</pub-id><pub-id pub-id-type="medline">22622767</pub-id></nlm-citation></ref><ref id="ref32"><label>32</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Thompson</surname><given-names>HJ</given-names> </name><name name-style="western"><surname>Vavilala</surname><given-names>MS</given-names> </name><name name-style="western"><surname>Rivara</surname><given-names>FP</given-names> </name></person-group><article-title>Chapter 1 common data elements and federal interagency traumatic brain injury research informatics system for TBI research</article-title><source>Annu Rev Nurs Res</source><year>2015</year><volume>33</volume><issue>1</issue><fpage>1</fpage><lpage>11</lpage><pub-id pub-id-type="doi">10.1891/0739-6686.33.1</pub-id><pub-id pub-id-type="medline">25946381</pub-id></nlm-citation></ref><ref id="ref33"><label>33</label><nlm-citation citation-type="web"><source>Kaggle</source><access-date>2025-12-22</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.kaggle.com/">https://www.kaggle.com/</ext-link></comment></nlm-citation></ref><ref id="ref34"><label>34</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Yang</surname><given-names>X</given-names> </name><name name-style="western"><surname>Zeng</surname><given-names>Z</given-names> </name><name name-style="western"><surname>Teo</surname><given-names>SG</given-names> </name><name name-style="western"><surname>Wang</surname><given-names>L</given-names> </name><name name-style="western"><surname>Chandrasekhar</surname><given-names>V</given-names> </name><name name-style="western"><surname>Hoi</surname><given-names>S</given-names> </name></person-group><article-title>Deep learning for practical image recognition: case study on kaggle competitions</article-title><conf-name>KDD &#x2019;18: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery &#x0026; Data Mining</conf-name><conf-date>Aug 19-23, 2018</conf-date><conf-loc>London, United Kingdom</conf-loc><fpage>923</fpage><lpage>931</lpage><pub-id pub-id-type="doi">10.1145/3219819.3219907</pub-id></nlm-citation></ref><ref id="ref35"><label>35</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Krishna</surname><given-names>R</given-names> </name><name name-style="western"><surname>Kelleher</surname><given-names>K</given-names> </name><name name-style="western"><surname>Stahlberg</surname><given-names>E</given-names> </name></person-group><article-title>Patient confidentiality in the research use of clinical medical databases</article-title><source>Am J Public Health</source><year>2007</year><month>04</month><volume>97</volume><issue>4</issue><fpage>654</fpage><lpage>658</lpage><pub-id pub-id-type="doi">10.2105/AJPH.2006.090902</pub-id><pub-id pub-id-type="medline">17329644</pub-id></nlm-citation></ref><ref id="ref36"><label>36</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Kobayashi</surname><given-names>S</given-names> </name><name name-style="western"><surname>Kane</surname><given-names>TB</given-names> </name><name name-style="western"><surname>Paton</surname><given-names>C</given-names> </name></person-group><article-title>The privacy and security implications of open data in healthcare</article-title><source>Yearb Med Inform</source><year>2018</year><month>08</month><volume>27</volume><issue>1</issue><fpage>41</fpage><lpage>47</lpage><pub-id pub-id-type="doi">10.1055/s-0038-1641201</pub-id><pub-id pub-id-type="medline">29681042</pub-id></nlm-citation></ref><ref id="ref37"><label>37</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Eze</surname><given-names>B</given-names> </name><name name-style="western"><surname>Peyton</surname><given-names>L</given-names> </name></person-group><article-title>Systematic literature review on the anonymization of high dimensional streaming datasets for health data sharing</article-title><source>Procedia Comput Sci</source><year>2015</year><volume>63</volume><fpage>348</fpage><lpage>355</lpage><pub-id pub-id-type="doi">10.1016/j.procs.2015.08.353</pub-id></nlm-citation></ref><ref id="ref38"><label>38</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><collab>Centers for Disease Control and Prevention (CDC)</collab></person-group><article-title>HIPAA privacy rule and public health. Guidance from CDC and the U.S. Department of Health and Human Services</article-title><source>MMWR Suppl</source><year>2003</year><month>05</month><day>2</day><volume>52</volume><fpage>1</fpage><lpage>17</lpage><pub-id pub-id-type="medline">12741579</pub-id></nlm-citation></ref><ref id="ref39"><label>39</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Prasser</surname><given-names>F</given-names> </name><name name-style="western"><surname>Kohlmayer</surname><given-names>F</given-names> </name><name name-style="western"><surname>Spengler</surname><given-names>H</given-names> </name><name name-style="western"><surname>Kuhn</surname><given-names>KA</given-names> </name></person-group><article-title>A scalable and pragmatic method for the safe sharing of high-quality health data</article-title><source>IEEE J Biomed Health Inform</source><year>2018</year><month>03</month><volume>22</volume><issue>2</issue><fpage>611</fpage><lpage>622</lpage><pub-id pub-id-type="doi">10.1109/JBHI.2017.2676880</pub-id><pub-id pub-id-type="medline">28358693</pub-id></nlm-citation></ref><ref id="ref40"><label>40</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Sarpatwari</surname><given-names>A</given-names> </name><name name-style="western"><surname>Gagne</surname><given-names>JJ</given-names> </name></person-group><article-title>Balancing benefits and harms: privacy protection policies</article-title><source>Pharmacoepidemiol Drug Saf</source><year>2016</year><month>08</month><volume>25</volume><issue>8</issue><fpage>969</fpage><lpage>971</lpage><pub-id pub-id-type="doi">10.1002/pds.4048</pub-id><pub-id pub-id-type="medline">27278106</pub-id></nlm-citation></ref><ref id="ref41"><label>41</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Kulynych</surname><given-names>J</given-names> </name><name name-style="western"><surname>Korn</surname><given-names>D</given-names> </name></person-group><article-title>The new HIPAA (Health Insurance Portability and Accountability Act of 1996) medical privacy rule: help or hindrance for clinical research?</article-title><source>Circulation</source><year>2003</year><month>08</month><day>26</day><volume>108</volume><issue>8</issue><fpage>912</fpage><lpage>914</lpage><pub-id pub-id-type="doi">10.1161/01.CIR.0000080642.35380.50</pub-id><pub-id pub-id-type="medline">12939240</pub-id></nlm-citation></ref><ref id="ref42"><label>42</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Nosowsky</surname><given-names>R</given-names> </name><name name-style="western"><surname>Giordano</surname><given-names>TJ</given-names> </name></person-group><article-title>The Health Insurance Portability and Accountability Act of 1996 (HIPAA) privacy rule: implications for clinical research</article-title><source>Annu Rev Med</source><year>2006</year><volume>57</volume><issue>1</issue><fpage>575</fpage><lpage>590</lpage><pub-id pub-id-type="doi">10.1146/annurev.med.57.121304.131257</pub-id><pub-id pub-id-type="medline">16409167</pub-id></nlm-citation></ref><ref id="ref43"><label>43</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Gostin</surname><given-names>LO</given-names> </name><name name-style="western"><surname>Nass</surname><given-names>S</given-names> </name></person-group><article-title>Reforming the HIPAA privacy rule: safeguarding privacy and promoting research</article-title><source>JAMA</source><year>2009</year><month>04</month><day>1</day><volume>301</volume><issue>13</issue><fpage>1373</fpage><lpage>1375</lpage><pub-id pub-id-type="doi">10.1001/jama.2009.424</pub-id><pub-id pub-id-type="medline">19336713</pub-id></nlm-citation></ref><ref id="ref44"><label>44</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Wartenberg</surname><given-names>D</given-names> </name><name name-style="western"><surname>Thompson</surname><given-names>WD</given-names> </name></person-group><article-title>Privacy versus public health: the impact of current confidentiality rules</article-title><source>Am J Public Health</source><year>2010</year><month>03</month><volume>100</volume><issue>3</issue><fpage>407</fpage><lpage>412</lpage><pub-id pub-id-type="doi">10.2105/AJPH.2009.166249</pub-id><pub-id pub-id-type="medline">20075316</pub-id></nlm-citation></ref><ref id="ref45"><label>45</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Green</surname><given-names>AK</given-names> </name><name name-style="western"><surname>Reeder-Hayes</surname><given-names>KE</given-names> </name><name name-style="western"><surname>Corty</surname><given-names>RW</given-names> </name><etal/></person-group><article-title>The project data sphere initiative: accelerating cancer research by sharing data</article-title><source>Oncologist</source><year>2015</year><month>05</month><volume>20</volume><issue>5</issue><fpage>464</fpage><lpage>e20</lpage><pub-id pub-id-type="doi">10.1634/theoncologist.2014-0431</pub-id><pub-id pub-id-type="medline">25876994</pub-id></nlm-citation></ref><ref id="ref46"><label>46</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Conroy</surname><given-names>M</given-names> </name><name name-style="western"><surname>Sellors</surname><given-names>J</given-names> </name><name name-style="western"><surname>Effingham</surname><given-names>M</given-names> </name><etal/></person-group><article-title>The advantages of UK Biobank&#x2019;s open-access strategy for health research</article-title><source>J Intern Med</source><year>2019</year><month>10</month><volume>286</volume><issue>4</issue><fpage>389</fpage><lpage>397</lpage><pub-id pub-id-type="doi">10.1111/joim.12955</pub-id><pub-id pub-id-type="medline">31283063</pub-id></nlm-citation></ref><ref id="ref47"><label>47</label><nlm-citation citation-type="report"><person-group person-group-type="author"><name name-style="western"><surname>Anderson</surname><given-names>R</given-names> </name></person-group><article-title>The collection, linking and use of data in biomedical research and health care: ethical issues</article-title><year>2015</year><publisher-name>The Nuffield Council on Bioethics</publisher-name><pub-id pub-id-type="doi">10.17863/CAM.31760</pub-id></nlm-citation></ref><ref id="ref48"><label>48</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Kostkova</surname><given-names>P</given-names> </name><name name-style="western"><surname>Brewer</surname><given-names>H</given-names> </name><name name-style="western"><surname>de Lusignan</surname><given-names>S</given-names> </name><etal/></person-group><article-title>Who owns the data? Open data for healthcare</article-title><source>Front Public Health</source><year>2016</year><volume>4</volume><fpage>7</fpage><pub-id pub-id-type="doi">10.3389/fpubh.2016.00007</pub-id><pub-id pub-id-type="medline">26925395</pub-id></nlm-citation></ref><ref id="ref49"><label>49</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Bhattacharjee</surname><given-names>Y</given-names> </name></person-group><article-title>Biomedicine. Pharma firms push for sharing of cancer trial data</article-title><source>Science</source><year>2012</year><month>10</month><day>5</day><volume>338</volume><issue>6103</issue><fpage>29</fpage><pub-id pub-id-type="doi">10.1126/science.338.6103.29</pub-id><pub-id pub-id-type="medline">23042862</pub-id></nlm-citation></ref><ref id="ref50"><label>50</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Kamoun</surname><given-names>F</given-names> </name><name name-style="western"><surname>Nicho</surname><given-names>M</given-names> </name></person-group><article-title>Human and organizational factors of healthcare data breaches: the swiss cheese model of data breach causation and prevention</article-title><source>Int J Healthc Inf Syst Inform</source><year>2014</year><month>01</month><day>1</day><volume>9</volume><fpage>42</fpage><lpage>60</lpage><pub-id pub-id-type="doi">10.4018/ijhisi.2014010103</pub-id></nlm-citation></ref><ref id="ref51"><label>51</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Nifakos</surname><given-names>S</given-names> </name><name name-style="western"><surname>Chandramouli</surname><given-names>K</given-names> </name><name name-style="western"><surname>Nikolaou</surname><given-names>CK</given-names> </name><etal/></person-group><article-title>Influence of human factors on cyber security within healthcare organisations: a systematic review</article-title><source>Sensors (Basel)</source><year>2021</year><month>07</month><day>28</day><volume>21</volume><issue>15</issue><fpage>5119</fpage><pub-id pub-id-type="doi">10.3390/s21155119</pub-id><pub-id pub-id-type="medline">34372354</pub-id></nlm-citation></ref><ref id="ref52"><label>52</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>McLeod</surname><given-names>A</given-names> </name><name name-style="western"><surname>Dolezel</surname><given-names>D</given-names> </name></person-group><article-title>Cyber-analytics: modeling factors associated with healthcare data breaches</article-title><source>Decis Support Syst</source><year>2018</year><month>04</month><volume>108</volume><fpage>57</fpage><lpage>68</lpage><pub-id pub-id-type="doi">10.1016/j.dss.2018.02.007</pub-id></nlm-citation></ref><ref id="ref53"><label>53</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Seh</surname><given-names>AH</given-names> </name><name name-style="western"><surname>Zarour</surname><given-names>M</given-names> </name><name name-style="western"><surname>Alenezi</surname><given-names>M</given-names> </name><etal/></person-group><article-title>Healthcare data breaches: insights and implications</article-title><source>Healthcare (Basel)</source><year>2020</year><month>05</month><day>13</day><volume>8</volume><issue>2</issue><fpage>133</fpage><pub-id pub-id-type="doi">10.3390/healthcare8020133</pub-id><pub-id pub-id-type="medline">32414183</pub-id></nlm-citation></ref><ref id="ref54"><label>54</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Chernyshev</surname><given-names>M</given-names> </name><name name-style="western"><surname>Zeadally</surname><given-names>S</given-names> </name><name name-style="western"><surname>Baig</surname><given-names>Z</given-names> </name></person-group><article-title>Healthcare data breaches: implications for digital forensic readiness</article-title><source>J Med Syst</source><year>2018</year><month>11</month><day>28</day><volume>43</volume><issue>1</issue><fpage>7</fpage><pub-id pub-id-type="doi">10.1007/s10916-018-1123-2</pub-id><pub-id pub-id-type="medline">30488291</pub-id></nlm-citation></ref><ref id="ref55"><label>55</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Ficek</surname><given-names>J</given-names> </name><name name-style="western"><surname>Wang</surname><given-names>W</given-names> </name><name name-style="western"><surname>Chen</surname><given-names>H</given-names> </name><name name-style="western"><surname>Dagne</surname><given-names>G</given-names> </name><name name-style="western"><surname>Daley</surname><given-names>E</given-names> </name></person-group><article-title>Differential privacy in health research: a scoping review</article-title><source>J Am Med Inform Assoc</source><year>2021</year><month>09</month><day>18</day><volume>28</volume><issue>10</issue><fpage>2269</fpage><lpage>2276</lpage><pub-id pub-id-type="doi">10.1093/jamia/ocab135</pub-id><pub-id pub-id-type="medline">34333623</pub-id></nlm-citation></ref><ref id="ref56"><label>56</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Dankar</surname><given-names>F</given-names> </name><name name-style="western"><surname>Emam</surname><given-names>K</given-names> </name></person-group><article-title>Practicing differential privacy in health care: a review</article-title><source>Trans Data Priv</source><year>2013</year><volume>6</volume><issue>1</issue><fpage>35</fpage><lpage>67</lpage><pub-id pub-id-type="doi">10.5555/2612156.2612159</pub-id></nlm-citation></ref><ref id="ref57"><label>57</label><nlm-citation citation-type="book"><person-group person-group-type="author"><name name-style="western"><surname>Tamane</surname><given-names>S</given-names> </name><name name-style="western"><surname>Solanki</surname><given-names>VK</given-names> </name></person-group><person-group person-group-type="editor"><name name-style="western"><surname>Dey</surname><given-names>N</given-names> </name></person-group><source>Privacy and Security Policies in Big Data</source><year>2017</year><publisher-name>IGI Global</publisher-name><pub-id pub-id-type="doi">10.4018/978-1-5225-2486-1</pub-id><pub-id pub-id-type="other">978-1-5225-2486-1</pub-id></nlm-citation></ref><ref id="ref58"><label>58</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Appenzeller</surname><given-names>A</given-names> </name><name name-style="western"><surname>Terzer</surname><given-names>N</given-names> </name><name name-style="western"><surname>Philipp</surname><given-names>P</given-names> </name><name name-style="western"><surname>Beyerer</surname><given-names>J</given-names> </name></person-group><article-title>Applying differential privacy to medical questionnaires</article-title><conf-name>2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)</conf-name><conf-date>Mar 13-17, 2023</conf-date><conf-loc>Atlanta, GA</conf-loc><fpage>608</fpage><lpage>613</lpage><pub-id pub-id-type="doi">10.1109/PerComWorkshops56833.2023.10150373</pub-id></nlm-citation></ref><ref id="ref59"><label>59</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Harris</surname><given-names>DR</given-names> </name></person-group><article-title>Leveraging differential privacy in geospatial analyses of standardized healthcare data</article-title><source>Proc IEEE Int Conf Big Data</source><year>2020</year><month>12</month><volume>2020</volume><fpage>3119</fpage><lpage>3122</lpage><pub-id pub-id-type="doi">10.1109/bigdata50022.2020.9378390</pub-id><pub-id pub-id-type="medline">35253022</pub-id></nlm-citation></ref><ref id="ref60"><label>60</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Sun</surname><given-names>Z</given-names> </name><name name-style="western"><surname>Wang</surname><given-names>Y</given-names> </name><name name-style="western"><surname>Shu</surname><given-names>M</given-names> </name><name name-style="western"><surname>Liu</surname><given-names>R</given-names> </name><name name-style="western"><surname>Zhao</surname><given-names>H</given-names> </name></person-group><article-title>Differential privacy for data and model publishing of medical data</article-title><source>IEEE Access</source><year>2019</year><volume>7</volume><fpage>152103</fpage><lpage>152114</lpage><pub-id pub-id-type="doi">10.1109/ACCESS.2019.2947295</pub-id><pub-id pub-id-type="medline">31328077</pub-id></nlm-citation></ref><ref id="ref61"><label>61</label><nlm-citation citation-type="other"><person-group person-group-type="author"><name name-style="western"><surname>McDuff</surname><given-names>D</given-names> </name><name name-style="western"><surname>Curran</surname><given-names>T</given-names> </name><name name-style="western"><surname>Kadambi</surname><given-names>A</given-names> </name></person-group><article-title>Synthetic data in healthcare</article-title><source>arXiv</source><comment>Preprint posted online on  Apr 6, 2023</comment><pub-id pub-id-type="doi">10.48550/ARXIV.2304.03243</pub-id></nlm-citation></ref><ref id="ref62"><label>62</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Appenzeller</surname><given-names>A</given-names> </name><name name-style="western"><surname>Leitner</surname><given-names>M</given-names> </name><name name-style="western"><surname>Philipp</surname><given-names>P</given-names> </name><name name-style="western"><surname>Krempel</surname><given-names>E</given-names> </name><name name-style="western"><surname>Beyerer</surname><given-names>J</given-names> </name></person-group><article-title>Privacy and utility of private synthetic data for medical data analyses</article-title><source>Appl Sci (Basel)</source><year>2022</year><month>12</month><day>1</day><volume>12</volume><issue>23</issue><fpage>12320</fpage><pub-id pub-id-type="doi">10.3390/app122312320</pub-id></nlm-citation></ref><ref id="ref63"><label>63</label><nlm-citation citation-type="other"><person-group person-group-type="author"><name name-style="western"><surname>Qian</surname><given-names>Z</given-names> </name><name name-style="western"><surname>Callender</surname><given-names>T</given-names> </name><name name-style="western"><surname>Cebere</surname><given-names>B</given-names> </name><name name-style="western"><surname>Janes</surname><given-names>SM</given-names> </name><name name-style="western"><surname>Navani</surname><given-names>N</given-names> </name><name name-style="western"><surname>van der Schaar</surname><given-names>M</given-names> </name></person-group><article-title>Synthetic data for privacy-preserving clinical risk prediction</article-title><source>medRxiv</source><comment>Preprint posted online on  May 24, 2023</comment><pub-id pub-id-type="doi">10.1101/2023.05.18.23290114</pub-id></nlm-citation></ref><ref id="ref64"><label>64</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Kokosi</surname><given-names>T</given-names> </name><name name-style="western"><surname>Harron</surname><given-names>K</given-names> </name></person-group><article-title>Synthetic data in medical research</article-title><source>BMJ Med</source><year>2022</year><volume>1</volume><issue>1</issue><fpage>e000167</fpage><pub-id pub-id-type="doi">10.1136/bmjmed-2022-000167</pub-id><pub-id pub-id-type="medline">36936569</pub-id></nlm-citation></ref><ref id="ref65"><label>65</label><nlm-citation citation-type="other"><person-group person-group-type="author"><name name-style="western"><surname>Kaabachi</surname><given-names>B</given-names> </name><name name-style="western"><surname>Despraz</surname><given-names>J</given-names> </name><name name-style="western"><surname>Meurers</surname><given-names>T</given-names> </name><etal/></person-group><article-title>A scoping review of privacy and utility metrics in medical synthetic data</article-title><source>medRxiv</source><comment>Preprint posted online on  Oct 21, 2024</comment><pub-id pub-id-type="doi">10.1101/2023.11.28.23299124</pub-id></nlm-citation></ref><ref id="ref66"><label>66</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Wang</surname><given-names>Z</given-names> </name><name name-style="western"><surname>Myles</surname><given-names>P</given-names> </name><name name-style="western"><surname>Tucker</surname><given-names>A</given-names> </name></person-group><article-title>Generating and evaluating cross&#x2010;sectional synthetic electronic healthcare data: preserving data utility and patient privacy</article-title><source>Comput Intell</source><year>2021</year><month>05</month><volume>37</volume><issue>2</issue><fpage>819</fpage><lpage>851</lpage><pub-id pub-id-type="doi">10.1111/coin.12427</pub-id></nlm-citation></ref><ref id="ref67"><label>67</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Wood</surname><given-names>A</given-names> </name><name name-style="western"><surname>Najarian</surname><given-names>K</given-names> </name><name name-style="western"><surname>Kahrobaei</surname><given-names>D</given-names> </name></person-group><article-title>Homomorphic encryption for machine learning in medicine and bioinformatics</article-title><source>ACM Comput Surv</source><year>2021</year><month>07</month><day>31</day><volume>53</volume><issue>4</issue><fpage>1</fpage><lpage>35</lpage><pub-id pub-id-type="doi">10.1145/3394658</pub-id></nlm-citation></ref><ref id="ref68"><label>68</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Bos</surname><given-names>JW</given-names> </name><name name-style="western"><surname>Lauter</surname><given-names>K</given-names> </name><name name-style="western"><surname>Naehrig</surname><given-names>M</given-names> </name></person-group><article-title>Private predictive analysis on encrypted medical data</article-title><source>J Biomed Inform</source><year>2014</year><month>08</month><volume>50</volume><fpage>234</fpage><lpage>243</lpage><pub-id pub-id-type="doi">10.1016/j.jbi.2014.04.003</pub-id><pub-id pub-id-type="medline">24835616</pub-id></nlm-citation></ref><ref id="ref69"><label>69</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Bocu</surname><given-names>R</given-names> </name><name name-style="western"><surname>Costache</surname><given-names>C</given-names> </name></person-group><article-title>A homomorphic encryption-based system for securely managing personal health metrics data</article-title><source>IBM J Res &#x0026; Dev</source><year>2018</year><month>01</month><day>1</day><volume>62</volume><issue>1</issue><fpage>1</fpage><pub-id pub-id-type="doi">10.1147/JRD.2017.2755524</pub-id></nlm-citation></ref><ref id="ref70"><label>70</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Krishnegowda</surname><given-names>P</given-names> </name><name name-style="western"><surname>M. Boregowda</surname><given-names>A</given-names> </name></person-group><article-title>Efficient matrix key homomorphic encryption of medical images</article-title><source>IJEECS</source><year>2023</year><month>07</month><day>1</day><volume>31</volume><issue>1</issue><fpage>406</fpage><pub-id pub-id-type="doi">10.11591/ijeecs.v31.i1.pp406-416</pub-id></nlm-citation></ref><ref id="ref71"><label>71</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Kartit</surname><given-names>A</given-names> </name></person-group><article-title>New approach based on homomorphic encryption to secure medical images in cloud computing</article-title><source>Trends Sci</source><year>2022</year><volume>19</volume><issue>9</issue><fpage>3970</fpage><pub-id pub-id-type="doi">10.48048/tis.2022.3970</pub-id></nlm-citation></ref><ref id="ref72"><label>72</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Khedr</surname><given-names>A</given-names> </name><name name-style="western"><surname>Gulak</surname><given-names>G</given-names> </name></person-group><article-title>SecureMed: secure medical computation using GPU-accelerated homomorphic encryption scheme</article-title><source>IEEE J Biomed Health Inform</source><year>2018</year><month>03</month><volume>22</volume><issue>2</issue><fpage>597</fpage><lpage>606</lpage><pub-id pub-id-type="doi">10.1109/JBHI.2017.2657458</pub-id><pub-id pub-id-type="medline">28129194</pub-id></nlm-citation></ref><ref id="ref73"><label>73</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Veeningen</surname><given-names>M</given-names> </name><name name-style="western"><surname>Chatterjea</surname><given-names>S</given-names> </name><name name-style="western"><surname>Horv&#x00E1;th</surname><given-names>AZ</given-names> </name><etal/></person-group><article-title>Enabling analytics on sensitive medical data with secure multi-party computation</article-title><source>Stud Health Technol Inform</source><year>2018</year><volume>247</volume><fpage>76</fpage><lpage>80</lpage><pub-id pub-id-type="medline">29677926</pub-id></nlm-citation></ref><ref id="ref74"><label>74</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Marwan</surname><given-names>M</given-names> </name><name name-style="western"><surname>Kartit</surname><given-names>A</given-names> </name><name name-style="western"><surname>Ouahmane</surname><given-names>H</given-names> </name></person-group><article-title>Applying secure multi-party computation to improve collaboration in healthcare cloud</article-title><conf-name>2016 Third International Conference on Systems of Collaboration (SysCo)</conf-name><conf-date>Nov 28-29, 2016</conf-date><conf-loc>Casablanca, Morocco</conf-loc><fpage>1</fpage><lpage>6</lpage><pub-id pub-id-type="doi">10.1109/SYSCO.2016.7831325</pub-id></nlm-citation></ref><ref id="ref75"><label>75</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Yigzaw</surname><given-names>KY</given-names> </name><name name-style="western"><surname>Bellika</surname><given-names>JG</given-names> </name></person-group><article-title>Evaluation of secure multi-party computation for reuse of distributed electronic health data</article-title><conf-name>2014 IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI)</conf-name><conf-date>Jun 1-4, 2014</conf-date><conf-loc>Valencia, Spain</conf-loc><fpage>219</fpage><lpage>222</lpage><pub-id pub-id-type="doi">10.1109/BHI.2014.6864343</pub-id></nlm-citation></ref><ref id="ref76"><label>76</label><nlm-citation citation-type="book"><person-group person-group-type="author"><name name-style="western"><surname>&#x015E;ahinba&#x015F;</surname><given-names>K</given-names> </name><name name-style="western"><surname>Catak</surname><given-names>FO</given-names> </name></person-group><person-group person-group-type="editor"><name name-style="western"><surname>Kose</surname><given-names>U</given-names> </name><name name-style="western"><surname>Gupta</surname><given-names>D</given-names> </name><name name-style="western"><surname>Khanna</surname><given-names>A</given-names> </name><name name-style="western"><surname>Rodrigues</surname><given-names>J</given-names> </name></person-group><article-title>Secure multi-party computation-based privacy-preserving data analysis in healthcare IoT systems</article-title><source>Interpretable Cognitive Internet of Things for Healthcare</source><year>2023</year><publisher-name>Springer</publisher-name><fpage>57</fpage><lpage>72</lpage><pub-id pub-id-type="doi">10.1007/978-3-031-08637-3_3</pub-id><pub-id pub-id-type="other">978-3-031-08636-6</pub-id></nlm-citation></ref><ref id="ref77"><label>77</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Tso</surname><given-names>R</given-names> </name><name name-style="western"><surname>Alelaiwi</surname><given-names>A</given-names> </name><name name-style="western"><surname>Mizanur Rahman</surname><given-names>SM</given-names> </name><name name-style="western"><surname>Wu</surname><given-names>ME</given-names> </name><name name-style="western"><surname>Hossain</surname><given-names>MS</given-names> </name></person-group><article-title>Privacy-preserving data communication through secure multi-party computation in healthcare sensor cloud</article-title><source>J Sign Process Syst</source><year>2017</year><month>10</month><volume>89</volume><issue>1</issue><fpage>51</fpage><lpage>59</lpage><pub-id pub-id-type="doi">10.1007/s11265-016-1198-2</pub-id></nlm-citation></ref><ref id="ref78"><label>78</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Tawfik</surname><given-names>AM</given-names> </name><name name-style="western"><surname>Sabbeh</surname><given-names>SF</given-names> </name><name name-style="western"><surname>EL-Shishtawy</surname><given-names>T</given-names> </name></person-group><article-title>Privacy-preserving secure multiparty computation on electronic medical records for star exchange topology</article-title><source>Arab J Sci Eng</source><year>2018</year><month>12</month><volume>43</volume><issue>12</issue><fpage>7747</fpage><lpage>7756</lpage><pub-id pub-id-type="doi">10.1007/s13369-018-3122-5</pub-id></nlm-citation></ref><ref id="ref79"><label>79</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Li</surname><given-names>T</given-names> </name><name name-style="western"><surname>Sahu</surname><given-names>AK</given-names> </name><name name-style="western"><surname>Talwalkar</surname><given-names>A</given-names> </name><name name-style="western"><surname>Smith</surname><given-names>V</given-names> </name></person-group><article-title>Federated learning: challenges, methods, and future directions</article-title><source>IEEE Signal Process Mag</source><year>2020</year><month>05</month><volume>37</volume><issue>3</issue><fpage>50</fpage><lpage>60</lpage><pub-id pub-id-type="doi">10.1109/MSP.2020.2975749</pub-id></nlm-citation></ref><ref id="ref80"><label>80</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Nguyen</surname><given-names>DC</given-names> </name><name name-style="western"><surname>Pham</surname><given-names>QV</given-names> </name><name name-style="western"><surname>Pathirana</surname><given-names>PN</given-names> </name><etal/></person-group><article-title>Federated learning for smart healthcare: a survey</article-title><source>ACM Comput Surv</source><year>2023</year><month>03</month><day>31</day><volume>55</volume><issue>3</issue><fpage>1</fpage><lpage>37</lpage><pub-id pub-id-type="doi">10.1145/3501296</pub-id></nlm-citation></ref><ref id="ref81"><label>81</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Crowson</surname><given-names>MG</given-names> </name><name name-style="western"><surname>Moukheiber</surname><given-names>D</given-names> </name><name name-style="western"><surname>Ar&#x00E9;valo</surname><given-names>AR</given-names> </name><etal/></person-group><article-title>A systematic review of federated learning applications for biomedical data</article-title><source>PLOS Digit Health</source><year>2022</year><month>05</month><volume>1</volume><issue>5</issue><fpage>e0000033</fpage><pub-id pub-id-type="doi">10.1371/journal.pdig.0000033</pub-id><pub-id pub-id-type="medline">36812504</pub-id></nlm-citation></ref><ref id="ref82"><label>82</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Brisimi</surname><given-names>TS</given-names> </name><name name-style="western"><surname>Chen</surname><given-names>R</given-names> </name><name name-style="western"><surname>Mela</surname><given-names>T</given-names> </name><name name-style="western"><surname>Olshevsky</surname><given-names>A</given-names> </name><name name-style="western"><surname>Paschalidis</surname><given-names>IC</given-names> </name><name name-style="western"><surname>Shi</surname><given-names>W</given-names> </name></person-group><article-title>Federated learning of predictive models from federated electronic health records</article-title><source>Int J Med Inform</source><year>2018</year><month>04</month><volume>112</volume><fpage>59</fpage><lpage>67</lpage><pub-id pub-id-type="doi">10.1016/j.ijmedinf.2018.01.007</pub-id><pub-id pub-id-type="medline">29500022</pub-id></nlm-citation></ref><ref id="ref83"><label>83</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Antunes</surname><given-names>RS</given-names> </name><name name-style="western"><surname>Andr&#x00E9; da Costa</surname><given-names>C</given-names> </name><name name-style="western"><surname>K&#x00FC;derle</surname><given-names>A</given-names> </name><name name-style="western"><surname>Yari</surname><given-names>IA</given-names> </name><name name-style="western"><surname>Eskofier</surname><given-names>B</given-names> </name></person-group><article-title>Federated learning for healthcare: systematic review and architecture proposal</article-title><source>ACM Trans Intell Syst Technol</source><year>2022</year><month>08</month><day>31</day><volume>13</volume><issue>4</issue><fpage>1</fpage><lpage>23</lpage><pub-id pub-id-type="doi">10.1145/3501813</pub-id></nlm-citation></ref><ref id="ref84"><label>84</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Guo</surname><given-names>K</given-names> </name><name name-style="western"><surname>Chen</surname><given-names>T</given-names> </name><name name-style="western"><surname>Ren</surname><given-names>S</given-names> </name><name name-style="western"><surname>Li</surname><given-names>N</given-names> </name><name name-style="western"><surname>Hu</surname><given-names>M</given-names> </name><name name-style="western"><surname>Kang</surname><given-names>J</given-names> </name></person-group><article-title>Federated learning empowered real-time medical data processing method for smart healthcare</article-title><source>IEEE/ACM Trans Comput Biol Bioinform</source><year>2024</year><volume>21</volume><issue>4</issue><fpage>869</fpage><lpage>879</lpage><pub-id pub-id-type="doi">10.1109/TCBB.2022.3185395</pub-id><pub-id pub-id-type="medline">35737631</pub-id></nlm-citation></ref><ref id="ref85"><label>85</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Pfitzner</surname><given-names>B</given-names> </name><name name-style="western"><surname>Steckhan</surname><given-names>N</given-names> </name><name name-style="western"><surname>Arnrich</surname><given-names>B</given-names> </name></person-group><article-title>Federated learning in a medical context: a systematic literature review</article-title><source>ACM Trans Internet Technol</source><year>2021</year><month>06</month><day>23</day><volume>21</volume><issue>2</issue><fpage>1</fpage><lpage>31</lpage><pub-id pub-id-type="doi">10.1145/3412357</pub-id></nlm-citation></ref><ref id="ref86"><label>86</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Wu</surname><given-names>JCH</given-names> </name><name name-style="western"><surname>Yu</surname><given-names>HW</given-names> </name><name name-style="western"><surname>Tsai</surname><given-names>TH</given-names> </name><name name-style="western"><surname>Lu</surname><given-names>HHS</given-names> </name></person-group><article-title>Dynamically synthetic images for federated learning of medical images</article-title><source>Comput Methods Programs Biomed</source><year>2023</year><month>12</month><volume>242</volume><fpage>107845</fpage><pub-id pub-id-type="doi">10.1016/j.cmpb.2023.107845</pub-id><pub-id pub-id-type="medline">37852147</pub-id></nlm-citation></ref><ref id="ref87"><label>87</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Liu</surname><given-names>HH</given-names> </name></person-group><article-title>Use and disclosure of health information and protection of patient privacy in Taiwan</article-title><source>Med Law</source><year>2010</year><month>03</month><volume>29</volume><issue>1</issue><fpage>87</fpage><lpage>101</lpage><pub-id pub-id-type="medline">22458000</pub-id></nlm-citation></ref><ref id="ref88"><label>88</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Jin</surname><given-names>H</given-names> </name><name name-style="western"><surname>Luo</surname><given-names>Y</given-names> </name><name name-style="western"><surname>Li</surname><given-names>P</given-names> </name><name name-style="western"><surname>Mathew</surname><given-names>J</given-names> </name></person-group><article-title>A review of secure and privacy-preserving medical data sharing</article-title><source>IEEE Access</source><year>2019</year><volume>7</volume><fpage>61656</fpage><lpage>61669</lpage><pub-id pub-id-type="doi">10.1109/ACCESS.2019.2916503</pub-id></nlm-citation></ref><ref id="ref89"><label>89</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Liang</surname><given-names>X</given-names> </name><name name-style="western"><surname>Zhao</surname><given-names>J</given-names> </name><name name-style="western"><surname>Shetty</surname><given-names>S</given-names> </name><name name-style="western"><surname>Liu</surname><given-names>J</given-names> </name><name name-style="western"><surname>Li</surname><given-names>D</given-names> </name></person-group><article-title>Integrating blockchain for data sharing and collaboration in mobile healthcare applications</article-title><conf-name>2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)</conf-name><conf-date>Oct 8-13, 2017</conf-date><conf-loc>Montreal, QC</conf-loc><fpage>1</fpage><lpage>5</lpage><pub-id pub-id-type="doi">10.1109/PIMRC.2017.8292361</pub-id></nlm-citation></ref><ref id="ref90"><label>90</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Rau</surname><given-names>HH</given-names> </name><name name-style="western"><surname>Hsu</surname><given-names>CY</given-names> </name><name name-style="western"><surname>Lee</surname><given-names>YL</given-names> </name><name name-style="western"><surname>Chen</surname><given-names>W</given-names> </name><name name-style="western"><surname>Jian</surname><given-names>WS</given-names> </name></person-group><article-title>Developing electronic health records in Taiwan</article-title><source>IT Prof</source><year>2010</year><month>03</month><volume>12</volume><issue>2</issue><fpage>17</fpage><lpage>25</lpage><pub-id pub-id-type="doi">10.1109/MITP.2010.53</pub-id></nlm-citation></ref><ref id="ref91"><label>91</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Li</surname><given-names>YCJ</given-names> </name><name name-style="western"><surname>Yen</surname><given-names>JC</given-names> </name><name name-style="western"><surname>Chiu</surname><given-names>WT</given-names> </name><name name-style="western"><surname>Jian</surname><given-names>WS</given-names> </name><name name-style="western"><surname>Syed-Abdul</surname><given-names>S</given-names> </name><name name-style="western"><surname>Hsu</surname><given-names>MH</given-names> </name></person-group><article-title>Building a national electronic medical record exchange system - experiences in Taiwan</article-title><source>Comput Methods Programs Biomed</source><year>2015</year><month>08</month><volume>121</volume><issue>1</issue><fpage>14</fpage><lpage>20</lpage><pub-id pub-id-type="doi">10.1016/j.cmpb.2015.04.013</pub-id><pub-id pub-id-type="medline">26001420</pub-id></nlm-citation></ref><ref id="ref92"><label>92</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hwang</surname><given-names>HG</given-names> </name><name name-style="western"><surname>Han</surname><given-names>HE</given-names> </name><name name-style="western"><surname>Kuo</surname><given-names>KM</given-names> </name><name name-style="western"><surname>Liu</surname><given-names>CF</given-names> </name></person-group><article-title>The differing privacy concerns regarding exchanging electronic medical records of internet users in Taiwan</article-title><source>J Med Syst</source><year>2012</year><month>12</month><volume>36</volume><issue>6</issue><fpage>3783</fpage><lpage>3793</lpage><pub-id pub-id-type="doi">10.1007/s10916-012-9851-1</pub-id><pub-id pub-id-type="medline">22527781</pub-id></nlm-citation></ref><ref id="ref93"><label>93</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Yang</surname><given-names>CM</given-names> </name><name name-style="western"><surname>Lin</surname><given-names>HC</given-names> </name><name name-style="western"><surname>Chang</surname><given-names>P</given-names> </name><name name-style="western"><surname>Jian</surname><given-names>WS</given-names> </name></person-group><article-title>Taiwan&#x2019;s perspective on electronic medical records&#x2019; security and privacy protection: lessons learned from HIPAA</article-title><source>Comput Methods Programs Biomed</source><year>2006</year><month>06</month><volume>82</volume><issue>3</issue><fpage>277</fpage><lpage>282</lpage><pub-id pub-id-type="doi">10.1016/j.cmpb.2006.04.002</pub-id><pub-id pub-id-type="medline">16730852</pub-id></nlm-citation></ref><ref id="ref94"><label>94</label><nlm-citation citation-type="web"><article-title>Taiwan medical AI and data portal</article-title><source>NYCU Data Management Center</source><year>2023</year><access-date>2025-12-22</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://data.dmc.nycu.edu.tw/">https://data.dmc.nycu.edu.tw/</ext-link></comment></nlm-citation></ref><ref id="ref95"><label>95</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Kaye</surname><given-names>J</given-names> </name><name name-style="western"><surname>Whitley</surname><given-names>EA</given-names> </name><name name-style="western"><surname>Lund</surname><given-names>D</given-names> </name><name name-style="western"><surname>Morrison</surname><given-names>M</given-names> </name><name name-style="western"><surname>Teare</surname><given-names>H</given-names> </name><name name-style="western"><surname>Melham</surname><given-names>K</given-names> </name></person-group><article-title>Dynamic consent: a patient interface for twenty-first century research networks</article-title><source>Eur J Hum Genet</source><year>2015</year><month>02</month><volume>23</volume><issue>2</issue><fpage>141</fpage><lpage>146</lpage><pub-id pub-id-type="doi">10.1038/ejhg.2014.71</pub-id><pub-id pub-id-type="medline">24801761</pub-id></nlm-citation></ref><ref id="ref96"><label>96</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Williams</surname><given-names>H</given-names> </name><name name-style="western"><surname>Spencer</surname><given-names>K</given-names> </name><name name-style="western"><surname>Sanders</surname><given-names>C</given-names> </name><etal/></person-group><article-title>Dynamic consent: a possible solution to improve patient confidence and trust in how electronic patient records are used in medical research</article-title><source>JMIR Med Inform</source><year>2015</year><month>01</month><day>13</day><volume>3</volume><issue>1</issue><fpage>e3</fpage><pub-id pub-id-type="doi">10.2196/medinform.3525</pub-id><pub-id pub-id-type="medline">25586934</pub-id></nlm-citation></ref><ref id="ref97"><label>97</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Lee</surname><given-names>H</given-names> </name><name name-style="western"><surname>Lee</surname><given-names>U</given-names> </name></person-group><article-title>Toward dynamic consent for privacy-aware pervasive health and well-being: a scoping review and research directions</article-title><source>IEEE Pervasive Comput</source><year>2022</year><month>10</month><day>1</day><volume>21</volume><issue>4</issue><fpage>25</fpage><lpage>32</lpage><pub-id pub-id-type="doi">10.1109/MPRV.2022.3210747</pub-id></nlm-citation></ref><ref id="ref98"><label>98</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Budin-Lj&#x00F8;sne</surname><given-names>I</given-names> </name><name name-style="western"><surname>Teare</surname><given-names>HJA</given-names> </name><name name-style="western"><surname>Kaye</surname><given-names>J</given-names> </name><etal/></person-group><article-title>Dynamic consent: a potential solution to some of the challenges of modern biomedical research</article-title><source>BMC Med Ethics</source><year>2017</year><month>01</month><day>25</day><volume>18</volume><issue>1</issue><fpage>4</fpage><pub-id pub-id-type="doi">10.1186/s12910-016-0162-9</pub-id><pub-id pub-id-type="medline">28122615</pub-id></nlm-citation></ref><ref id="ref99"><label>99</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Albalwy</surname><given-names>F</given-names> </name><name name-style="western"><surname>Brass</surname><given-names>A</given-names> </name><name name-style="western"><surname>Davies</surname><given-names>A</given-names> </name></person-group><article-title>A blockchain-based dynamic consent architecture to support clinical genomic data sharing (consentchain): proof-of-concept study</article-title><source>JMIR Med Inform</source><year>2021</year><month>11</month><day>3</day><volume>9</volume><issue>11</issue><fpage>e27816</fpage><pub-id pub-id-type="doi">10.2196/27816</pub-id><pub-id pub-id-type="medline">34730538</pub-id></nlm-citation></ref><ref id="ref100"><label>100</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Goncharov</surname><given-names>L</given-names> </name><name name-style="western"><surname>Suominen</surname><given-names>H</given-names> </name><name name-style="western"><surname>Cook</surname><given-names>M</given-names> </name></person-group><article-title>Dynamic consent and personalised medicine</article-title><source>Med J Aust</source><year>2022</year><month>06</month><day>20</day><volume>216</volume><issue>11</issue><fpage>547</fpage><lpage>549</lpage><pub-id pub-id-type="doi">10.5694/mja2.51555</pub-id><pub-id pub-id-type="medline">35611469</pub-id></nlm-citation></ref><ref id="ref101"><label>101</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Vlahou</surname><given-names>A</given-names> </name><name name-style="western"><surname>Hallinan</surname><given-names>D</given-names> </name><name name-style="western"><surname>Apweiler</surname><given-names>R</given-names> </name><etal/></person-group><article-title>Data sharing under the general data protection regulation: time to harmonize law and research ethics?</article-title><source>Hypertension</source><year>2021</year><month>04</month><volume>77</volume><issue>4</issue><fpage>1029</fpage><lpage>1035</lpage><pub-id pub-id-type="doi">10.1161/HYPERTENSIONAHA.120.16340</pub-id><pub-id pub-id-type="medline">33583200</pub-id></nlm-citation></ref><ref id="ref102"><label>102</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Dilsizian</surname><given-names>SE</given-names> </name><name name-style="western"><surname>Siegel</surname><given-names>EL</given-names> </name></person-group><article-title>Artificial intelligence in medicine and cardiac imaging: harnessing big data and advanced computing to provide personalized medical diagnosis and treatment</article-title><source>Curr Cardiol Rep</source><year>2014</year><month>01</month><volume>16</volume><issue>1</issue><fpage>441</fpage><pub-id pub-id-type="doi">10.1007/s11886-013-0441-8</pub-id><pub-id pub-id-type="medline">24338557</pub-id></nlm-citation></ref><ref id="ref103"><label>103</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Pereira</surname><given-names>T</given-names> </name><name name-style="western"><surname>Morgado</surname><given-names>J</given-names> </name><name name-style="western"><surname>Silva</surname><given-names>F</given-names> </name><etal/></person-group><article-title>Sharing biomedical data: strengthening AI development in healthcare</article-title><source>Healthcare (Basel)</source><year>2021</year><month>06</month><day>30</day><volume>9</volume><issue>7</issue><fpage>827</fpage><pub-id pub-id-type="doi">10.3390/healthcare9070827</pub-id><pub-id pub-id-type="medline">34208830</pub-id></nlm-citation></ref><ref id="ref104"><label>104</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Paton</surname><given-names>C</given-names> </name><name name-style="western"><surname>Kobayashi</surname><given-names>S</given-names> </name></person-group><article-title>An open science approach to artificial intelligence in healthcare</article-title><source>Yearb Med Inform</source><year>2019</year><month>08</month><volume>28</volume><issue>1</issue><fpage>47</fpage><lpage>51</lpage><pub-id pub-id-type="doi">10.1055/s-0039-1677898</pub-id><pub-id pub-id-type="medline">31022753</pub-id></nlm-citation></ref><ref id="ref105"><label>105</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Lim</surname><given-names>L</given-names> </name><name name-style="western"><surname>Lee</surname><given-names>HC</given-names> </name></person-group><article-title>Open datasets in perioperative medicine: a narrative review</article-title><source>Anesth Pain Med (Seoul)</source><year>2023</year><month>07</month><volume>18</volume><issue>3</issue><fpage>213</fpage><lpage>219</lpage><pub-id pub-id-type="doi">10.17085/apm.23076</pub-id><pub-id pub-id-type="medline">37691592</pub-id></nlm-citation></ref><ref id="ref106"><label>106</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Wilson</surname><given-names>JR</given-names> </name><name name-style="western"><surname>Prevedello</surname><given-names>LM</given-names> </name><name name-style="western"><surname>Witiw</surname><given-names>CD</given-names> </name><name name-style="western"><surname>Flanders</surname><given-names>AE</given-names> </name><name name-style="western"><surname>Colak</surname><given-names>E</given-names> </name></person-group><article-title>Data liberation and crowdsourcing in medical research: the intersection of collective and artificial intelligence</article-title><source>Radiol Artif Intell</source><year>2024</year><month>01</month><volume>6</volume><issue>1</issue><fpage>e230006</fpage><pub-id pub-id-type="doi">10.1148/ryai.230006</pub-id><pub-id pub-id-type="medline">38231037</pub-id></nlm-citation></ref><ref id="ref107"><label>107</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Kasparick</surname><given-names>M</given-names> </name><name name-style="western"><surname>Andersen</surname><given-names>B</given-names> </name><name name-style="western"><surname>Franke</surname><given-names>S</given-names> </name><etal/></person-group><article-title>Enabling artificial intelligence in high acuity medical environments</article-title><source>Minim Invasive Ther Allied Technol</source><year>2019</year><month>04</month><volume>28</volume><issue>2</issue><fpage>120</fpage><lpage>126</lpage><pub-id pub-id-type="doi">10.1080/13645706.2019.1599957</pub-id><pub-id pub-id-type="medline">30950665</pub-id></nlm-citation></ref><ref id="ref108"><label>108</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Koh</surname><given-names>DM</given-names> </name><name name-style="western"><surname>Papanikolaou</surname><given-names>N</given-names> </name><name name-style="western"><surname>Bick</surname><given-names>U</given-names> </name><etal/></person-group><article-title>Artificial intelligence and machine learning in cancer imaging</article-title><source>Commun Med (Lond)</source><year>2022</year><volume>2</volume><issue>1</issue><fpage>133</fpage><pub-id pub-id-type="doi">10.1038/s43856-022-00199-0</pub-id><pub-id pub-id-type="medline">36310650</pub-id></nlm-citation></ref><ref id="ref109"><label>109</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Levin</surname><given-names>MG</given-names> </name><name name-style="western"><surname>Rader</surname><given-names>DJ</given-names> </name></person-group><article-title>Polygenic risk scores and coronary artery disease: ready for prime time?</article-title><source>Circulation</source><year>2020</year><month>02</month><day>25</day><volume>141</volume><issue>8</issue><fpage>637</fpage><lpage>640</lpage><pub-id pub-id-type="doi">10.1161/CIRCULATIONAHA.119.044770</pub-id><pub-id pub-id-type="medline">32091922</pub-id></nlm-citation></ref><ref id="ref110"><label>110</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Johnson</surname><given-names>AEW</given-names> </name><name name-style="western"><surname>Bulgarelli</surname><given-names>L</given-names> </name><name name-style="western"><surname>Shen</surname><given-names>L</given-names> </name><etal/></person-group><article-title>MIMIC-IV, a freely accessible electronic health record dataset</article-title><source>Sci Data</source><year>2023</year><month>01</month><day>3</day><volume>10</volume><issue>1</issue><fpage>1</fpage><pub-id pub-id-type="doi">10.1038/s41597-022-01899-x</pub-id><pub-id pub-id-type="medline">36596836</pub-id></nlm-citation></ref><ref id="ref111"><label>111</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Milham</surname><given-names>MP</given-names> </name><name name-style="western"><surname>Craddock</surname><given-names>RC</given-names> </name><name name-style="western"><surname>Son</surname><given-names>JJ</given-names> </name><etal/></person-group><article-title>Assessment of the impact of shared brain imaging data on the scientific literature</article-title><source>Nat Commun</source><year>2018</year><month>07</month><day>19</day><volume>9</volume><issue>1</issue><fpage>2818</fpage><pub-id pub-id-type="doi">10.1038/s41467-018-04976-1</pub-id><pub-id pub-id-type="medline">30026557</pub-id></nlm-citation></ref><ref id="ref112"><label>112</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Patterson</surname><given-names>E</given-names> </name><name name-style="western"><surname>McBurney</surname><given-names>R</given-names> </name><name name-style="western"><surname>Schmidt</surname><given-names>H</given-names> </name><name name-style="western"><surname>Baldini</surname><given-names>I</given-names> </name><name name-style="western"><surname>Mojsilovic</surname><given-names>A</given-names> </name><name name-style="western"><surname>Varshney</surname><given-names>KR</given-names> </name></person-group><article-title>Dataflow representation of data analyses: toward a platform for collaborative data science</article-title><source>IBM J Res &#x0026; Dev</source><year>2017</year><month>11</month><day>1</day><volume>61</volume><issue>6</issue><fpage>9</fpage><pub-id pub-id-type="doi">10.1147/JRD.2017.2736278</pub-id></nlm-citation></ref><ref id="ref113"><label>113</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>El Naqa</surname><given-names>I</given-names> </name><name name-style="western"><surname>Haider</surname><given-names>MA</given-names> </name><name name-style="western"><surname>Giger</surname><given-names>ML</given-names> </name><name name-style="western"><surname>Ten Haken</surname><given-names>RK</given-names> </name></person-group><article-title>Artificial intelligence: reshaping the practice of radiological sciences in the 21st century</article-title><source>Br J Radiol</source><year>2020</year><month>02</month><day>1</day><volume>93</volume><issue>1106</issue><fpage>20190855</fpage><pub-id pub-id-type="doi">10.1259/bjr.20190855</pub-id><pub-id pub-id-type="medline">31965813</pub-id></nlm-citation></ref><ref id="ref114"><label>114</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Kras</surname><given-names>A</given-names> </name><name name-style="western"><surname>Celi</surname><given-names>LA</given-names> </name><name name-style="western"><surname>Miller</surname><given-names>JB</given-names> </name></person-group><article-title>Accelerating ophthalmic artificial intelligence research: the role of an open access data repository</article-title><source>Curr Opin Ophthalmol</source><year>2020</year><month>09</month><volume>31</volume><issue>5</issue><fpage>337</fpage><lpage>350</lpage><pub-id pub-id-type="doi">10.1097/ICU.0000000000000678</pub-id><pub-id pub-id-type="medline">32740059</pub-id></nlm-citation></ref></ref-list></back></article>