k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Originator Control in Usage Control
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Revisiting the uniqueness of simple demographics in the US population
Proceedings of the 5th ACM workshop on Privacy in electronic society
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Sanitization models and their limitations
NSPW '06 Proceedings of the 2006 workshop on New security paradigms
Privacy aware data sharing: balancing the usability and privacy of datasets
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
The sisterhood of the traveling packets
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
The security and privacy implications of using social networks to deliver healthcare
Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments
Relationships and data sanitization: a study in scarlet
Proceedings of the 2010 workshop on New security paradigms
A security policy model for clinical information systems
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Hi-index | 0.00 |
The use of computer-based social networks for health care changes the privacy paradigm of face-to-face treatment. For example, in an office, a patient can be reasonably sure that the physician or therapist is the only one present, and is who has been providing treatment. On a computer-based social network, communications travel over the World Wide Web, raising the possibility of eavesdropping, delay, and other problems. Further, verification of the party with whom the patient is communicating is more difficult, and to many less credible, than in-person verification. This paper describes the privacy paradigm, presents a set of requirements for effective use of computer-based social networks in health care, discusses what current technology can provide, and what gaps must be closed to meet the rest of the requirements.