Published on in Vol 15, No 12 (2013): December

Outsourcing Medical Data Analyses: Can Technology Overcome Legal, Privacy, and Confidentiality Issues?

Outsourcing Medical Data Analyses: Can Technology Overcome Legal, Privacy, and Confidentiality Issues?

Outsourcing Medical Data Analyses: Can Technology Overcome Legal, Privacy, and Confidentiality Issues?

Journals

  1. Feretzakis G, Kalles D, Verykios V. Using Minimum Local Distortion to Hide Decision Tree Rules. Entropy 2019;21(4):334 View
  2. Arellano A, Dai W, Wang S, Jiang X, Ohno-Machado L. Privacy Policy and Technology in Biomedical Data Science. Annual Review of Biomedical Data Science 2018;1(1):115 View
  3. Uwizeyemungu S, Poba-Nzaou P, Cantinotti M. European Hospitals’ Transition Toward Fully Electronic-Based Systems: Do Information Technology Security and Privacy Practices Follow?. JMIR Medical Informatics 2019;7(1):e11211 View
  4. Thompson M. Everything changes to stay the same: persistent global health inequalities amidst new therapeutic opportunities and mobilities for Filipino nurses. Mobilities 2019;14(1):38 View
  5. Alaqra A, Fischer-Hübner S, Framner E. Enhancing Privacy Controls for Patients via a Selective Authentic Electronic Health Record Exchange Service: Qualitative Study of Perspectives by Medical Professionals and Patients. Journal of Medical Internet Research 2018;20(12):e10954 View
  6. Mathivanan P, Balaji Ganesh A. QR code based color image cryptography for the secured transmission of ECG signal. Multimedia Tools and Applications 2019;78(6):6763 View
  7. Keshta I, Odeh A. Security and privacy of electronic health records: Concerns and challenges. Egyptian Informatics Journal 2021;22(2):177 View
  8. Kahouei M, Farrokhi M, Abadi Z, Karimi A. Concerns and hopes about outsourcing decisions regarding health information management services at two teaching hospitals in Semnan, Iran. Health Information Management Journal 2016;45(1):36 View
  9. Mathivanan P, Edward Jero S, Ramu P, Balaji Ganesh A. QR code based patient data protection in ECG steganography. Australasian Physical & Engineering Sciences in Medicine 2018;41(4):1057 View
  10. Esther Omolara A, Jantan A, Abiodun O, Arshad H, Dada K, Emmanuel E. HoneyDetails: A prototype for ensuring patient’s information privacy and thwarting electronic health record threats based on decoys. Health Informatics Journal 2020;26(3):2083 View
  11. Paelet L, Raskin J, ZuWallack R. Potential downside issues with telemedicine for individuals with chronic respiratory diseases. Monaldi Archives for Chest Disease 2022 View
  12. Meng X, Du Y, Wang C. ECMO: An Efficient and Confidential Outsourcing Protocol for Medical Data. IEEE Open Journal of the Computer Society 2025;6:37 View

Books/Policy Documents

  1. Evans K, Wang E. Intelligent Systems for Healthcare Management and Delivery. View

Conference Proceedings

  1. Jaakkola H, Makinen T, Henno J, Makela J. 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). Open<sup>n</sup> View
  2. Brumen B, Cernezel A. 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). Brute force analysis of PsychoPass-generated Passwords View
  3. Feretzakis G, Kalles D, Verykios V. 2019 10th International Conference on Information, Intelligence, Systems and Applications (IISA). Local Distortion Hiding in Financial Technology application: a case study with a benchmark data set View
  4. Brumen B, Taneski V. 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). Moore's curse on textual passwords View
  5. Feretzakis G, Mitropoulos K, Kalles D, S. Verykios V. 11th Hellenic Conference on Artificial Intelligence. Local Distortion Hiding (LDH) Algorithm: a Java-based prototype View
  6. Ray B, Saha K, Biswas M, Rahman M. 2020 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE). User Perspective on Usages and Privacy of eHealth Systems in Bangladesh: A Dhaka based Survey View
  7. Ragad K, Daronde S. 2025 3rd International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS). Next-Gen Blockchain Solutions for Secure and Interoperable Healthcare Data Management View