Search Articles

View query in Help articles search

Search Results (1 to 10 of 53 Results)

Download search results: CSV END BibTex RIS


Revolutionizing Medical Data Sharing Using Advanced Privacy-Enhancing Technologies: Technical, Legal, and Ethical Synthesis

Revolutionizing Medical Data Sharing Using Advanced Privacy-Enhancing Technologies: Technical, Legal, and Ethical Synthesis

In this paper, we describe how traditional data-sharing approaches relying upon conventional privacy-enhancing technologies are limited by various regulations governing medical use and data sharing. We describe two novel privacy-enhancing technologies, homomorphic encryption and secure multiparty computation, that extend the capacity of researchers to conduct privacy-preserving multisite research.

James Scheibner, Jean Louis Raisaro, Juan Ramón Troncoso-Pastoriza, Marcello Ienca, Jacques Fellay, Effy Vayena, Jean-Pierre Hubaux

J Med Internet Res 2021;23(2):e25120


Adoption of a Contact Tracing App for Containing COVID-19: A Health Belief Model Approach

Adoption of a Contact Tracing App for Containing COVID-19: A Health Belief Model Approach

This construct focused on privacy issues raised by the app and how it could contribute to tensions among citizens with a different COVID-19 status. Cues to action that would stimulate individuals to use the app concentrated on (online) news consumption during the COVID-19 crisis.

Michel Walrave, Cato Waeterloos, Koen Ponnet

JMIR Public Health Surveill 2020;6(3):e20572


The Role of Health Technology and Informatics in a Global Public Health Emergency: Practices and Implications From the COVID-19 Pandemic

The Role of Health Technology and Informatics in a Global Public Health Emergency: Practices and Implications From the COVID-19 Pandemic

User data is a “disaster area,” as privacy can be leaked. Some apps claim that data will be encrypted on the user’s mobile phone for a few days and then permanently deleted if users have not been exposed to patients who are infected. Some apps need to obtain the user’s consent on two aspects: user’s agreement with data being collected while using the app and agreement on releasing relevant personal data once they are found to have contact with patients who are infected.

Jiancheng Ye

JMIR Med Inform 2020;8(7):e19866


The Mediating Role of Organizational Reputation and Trust in the Intention to Use Wearable Health Devices: Cross-Country Study

The Mediating Role of Organizational Reputation and Trust in the Intention to Use Wearable Health Devices: Cross-Country Study

In another study, Sharma et al [61] found that perceived security and perceived privacy have a significant influence on the trust in and subsequent use of social networks. Authors of previous studies have reported on privacy and security concerns related to u Health data [62-64], which is arguably more personal than biographical data such as name, date of birth, or telephone number.

Funmi Adebesin, Revingstone Mwalugha

JMIR Mhealth Uhealth 2020;8(6):e16721


Analysis of Diabetes Apps to Assess Privacy-Related Permissions: Systematic Search of Apps

Analysis of Diabetes Apps to Assess Privacy-Related Permissions: Systematic Search of Apps

It is crucial to note that the treatment of these critical data demands a special approach regarding security and privacy. However, some apps do not even provide information regarding their privacy policies. In some instances, these privacy terms are difficult to understand by nontechnical users, and some privacy policies may even be regarded as abusive.

José Javier Flors-Sidro, Mowafa Househ, Alaa Abd-Alrazaq, Josep Vidal-Alaball, Luis Fernandez-Luque, Carlos Luis Sanchez-Bocanegra

JMIR Diabetes 2021;6(1):e16146


Authors' Response to Peer Reviews of “COVID-19 and Cybersecurity: Finally, an Opportunity to Disrupt?”

Authors' Response to Peer Reviews of “COVID-19 and Cybersecurity: Finally, an Opportunity to Disrupt?”

In the case of contact tracing apps, the main point the authors wanted to make is that there are still many security and privacy issues that are not yet well defined and understood. These need to be addressed first in order to ensure that these apps can be used in the most private, secure, and useful manner.

Ana Ferreira, Ricardo Cruz-Correia

JMIRx Med 2021;2(2):e29517


Peer Review of “COVID-19 and Cybersecurity: Finally, an Opportunity to Disrupt?”

Peer Review of “COVID-19 and Cybersecurity: Finally, an Opportunity to Disrupt?”

This paper [1] provides an overview of cybersecurity and privacy risks arising from COVID-19. Overall, the paper is quite generic, and I did not think that it identified any new issues or presented any new results.

David W Chadwick

JMIRx Med 2021;2(2):e29417


Cybersecurity Risks in a Pandemic

Cybersecurity Risks in a Pandemic

Services like Zoom currently do not offer end-to-end encryption, making it not truly HIPAA-compliant, even though the Department of Health and Human Services Office for Civil Rights has relaxed enforcement of HIPAA’s privacy rule during the COVID-19 pandemic [12].  Although the issue of how to safely administer health care during a pandemic is a complex one, it is clear that increased awareness is needed concerning the potential cyberthreats that pandemics exacerbate.

Christina Meilee Williams, Rahul Chaturvedi, Krishnan Chakravarthy

J Med Internet Res 2020;22(9):e23692


COVID-19 and Cybersecurity: Finally, an Opportunity to Disrupt?

COVID-19 and Cybersecurity: Finally, an Opportunity to Disrupt?

However, COVID-19 has serious consequences related to cybersecurity and the human right to privacy, security, and even physical integrity. Many of these consequences are directly related to the treatment of the disease, such as sharing of personal and sensitive data for research and treatment or contact tracing of patients; meanwhile, other consequences can be indirectly linked with the pandemic but are equally dangerous.

Ana Ferreira, Ricardo Cruz-Correia

JMIRx Med 2021;2(2):e21069