Listing 1 - 10 of 14 | << page >> |
Sort by
|
Choose an application
This handbook covers Electronic Medical Record (EMR) systems, which enable the storage, management, and sharing of massive amounts of demographic, diagnosis, medication, and genomic information. It presents privacy-preserving methods for medical data, ranging from laboratory test results to doctors’ comments. The reuse of EMR data can greatly benefit medical science and practice, but must be performed in a privacy-preserving way according to data sharing policies and regulations. Written by world-renowned leaders in this field, each chapter offers a survey of a research direction or a solution to problems in established and emerging research areas. The authors explore scenarios and techniques for facilitating the anonymization of different types of medical data, as well as various data mining tasks. Other chapters present methods for emerging data privacy applications and medical text de-identification, including detailed surveys of deployed systems. A part of the book is devoted to legislative and policy issues, reporting on the US and EU privacy legislation and the cost of privacy breaches in the healthcare domain. This reference is intended for professionals, researchers and advanced-level students interested in safeguarding medical data.
Confidentiality --- Medical Informatics Applications --- Computer Security --- Medical Records --- Electronic Health Records --- Records as Topic --- Information Science --- Medical Informatics --- Patient Rights --- Jurisprudence --- Medical Records Systems, Computerized --- Security Measures --- Forensic Psychiatry --- Organization and Administration --- Social Control, Formal --- Data Collection --- Psychiatry --- Human Rights --- Epidemiologic Methods --- Health Services Administration --- Behavioral Sciences --- Health Care Economics and Organizations --- Health Care Evaluation Mechanisms --- Sociology --- Health Care --- Public Health --- Quality of Health Care --- Behavioral Disciplines and Activities --- Social Sciences --- Investigative Techniques --- Environment and Public Health --- Health Care Quality, Access, and Evaluation --- Psychiatry and Psychology --- Analytical, Diagnostic and Therapeutic Techniques and Equipment --- Anthropology, Education, Sociology and Social Phenomena --- Computer Science --- Engineering & Applied Sciences --- Medical records --- Patients --- Privacy, Right of. --- Law and legislation. --- Legal status, laws, etc. --- Invasion of privacy --- Privacy, Right of --- Right of privacy --- Patients' rights --- Law and legislation --- Computer science. --- Health informatics. --- Computer security. --- Data structures (Computer science). --- Database management. --- Computer Science. --- Database Management. --- Systems and Data Security. --- Data Structures, Cryptology and Information Theory. --- Health Informatics. --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Medical laws and legislation --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Data processing. --- EHR systems --- EHR technology --- EHRs (Electronic health records) --- Electronic health records --- Electronic medical records --- EMR systems --- EMRs (Electronic medical records) --- Information storage and retrieval systems --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Medical care --- Protection --- Security measures --- Data structures (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Clinical informatics --- Health informatics --- Medical information science --- Information science --- Medicine --- Data processing --- Medical informatics.
Choose an application
This edited book collects state-of-the-art research related to large-scale data analytics that has been accomplished over the last few years. This is among the first books devoted to this important area based on contributions from diverse scientific areas such as databases, data mining, supercomputing, hardware architecture, data visualization, statistics, and privacy. There is increasing need for new approaches and technologies that can analyze and synthesize very large amounts of data, in the order of petabytes, that are generated by massively distributed data sources. This requires new distributed architectures for data analysis. Additionally, the heterogeneity of such sources imposes significant challenges for the efficient analysis of the data under numerous constraints, including consistent data integration, data homogenization and scaling, privacy and security preservation. The authors also broaden reader understanding of emerging real-world applications in domains such as customer behavior modeling, graph mining, telecommunications, cyber-security, and social network analysis, all of which impose extra requirements for large-scale data analysis. Large-Scale Data Analytics is organized in 8 chapters, each providing a survey of an important direction of large-scale data analytics or individual results of the emerging research in the field. The book presents key recent research that will help shape the future of large-scale data analytics, leading the way to the design of new approaches and technologies that can analyze and synthesize very large amounts of heterogeneous data. Students, researchers, professionals and practitioners will find this book an authoritative and comprehensive resource.
Big data -- Congresses. --- Computer science. --- Data mining. --- Data mining -- Congresses. --- Data protection. --- Database management. --- Information systems. --- Engineering & Applied Sciences --- Computer Science --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Information technology. --- Business --- Computer security. --- Computers. --- Computer Science. --- Database Management. --- Information Systems and Communication Service. --- IT in Business. --- Data Mining and Knowledge Discovery. --- Systems and Data Security. --- Data processing. --- Database searching --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Protection --- Security measures --- Business—Data processing. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace
Choose an application
Anonymization of Electronic Medical Records to Support Clinical Analysis closely examines the privacy threats that may arise from medical data sharing, and surveys the state-of-the-art methods developed to safeguard data against these threats. To motivate the need for computational methods, the book first explores the main challenges facing the privacy-protection of medical data using the existing policies, practices and regulations. Then, it takes an in-depth look at the popular computational privacy-preserving methods that have been developed for demographic, clinical and genomic data sharing, and closely analyzes the privacy principles behind these methods, as well as the optimization and algorithmic strategies that they employ. Finally, through a series of in-depth case studies that highlight data from the US Census as well as the Vanderbilt University Medical Center, the book outlines a new, innovative class of privacy-preserving methods designed to ensure the integrity of transferred medical data for subsequent analysis, such as discovering or validating associations between clinical and genomic information. Anonymization of Electronic Medical Records to Support Clinical Analysis is intended for professionals as a reference guide for safeguarding the privacy and data integrity of sensitive medical records. Academics and other research scientists will also find the book invaluable.
Data mining. --- Medical records -- Data processing. --- Medical Records Systems, Computerized. --- Medical informatics --- Medical records --- Information storage and retrieval systems --- Security Measures --- Forensic Psychiatry --- Health Care Evaluation Mechanisms --- Patient Rights --- Information Science --- Medical Records Systems, Computerized --- Jurisprudence --- Mathematics --- Epidemiologic Methods --- Social Control, Formal --- Organization and Administration --- Medical Records --- Quality of Health Care --- Human Rights --- Psychiatry --- Investigative Techniques --- Natural Science Disciplines --- Public Health --- Sociology --- Health Care Economics and Organizations --- Behavioral Sciences --- Health Care Quality, Access, and Evaluation --- Health Services Administration --- Analytical, Diagnostic and Therapeutic Techniques and Equipment --- Environment and Public Health --- Disciplines and Occupations --- Records as Topic --- Behavioral Disciplines and Activities --- Health Care --- Data Collection --- Social Sciences --- Psychiatry and Psychology --- Anthropology, Education, Sociology and Social Phenomena --- Confidentiality --- Computer Security --- Statistics as Topic --- Electronic Health Records --- Medicine --- Health & Biological Sciences --- Medical & Biomedical Informatics --- Security measures --- Data processing --- Data processing. --- EHR systems --- EHR technology --- EHRs (Electronic health records) --- Electronic health records --- Electronic medical records --- EMR systems --- EMRs (Electronic medical records) --- Computer science. --- Health informatics. --- Information storage and retrieval. --- Computer Science. --- Health Informatics. --- Data Mining and Knowledge Discovery. --- Information Storage and Retrieval. --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Clinical informatics --- Health informatics --- Medical information science --- Information science --- Informatics --- Science --- Medical care --- Information storage and retrieva. --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval
Choose an application
This handbook covers the fundamental principles and theory, and the state-of-the-art research, systems and applications, in the area of mobility data privacy. It is primarily addressed to computer science and statistics researchers and educators, who are interested in topics related to mobility privacy. This handbook will also be valuable to industry developers, as it explains the state-of-the-art algorithms for offering privacy. By discussing a wide range of privacy techniques, providing in-depth coverage of the most important ones, and highlighting promising avenues for future research, this handbook also aims at attracting computer science and statistics students to this interesting field of research. The advances in mobile devices and positioning technologies, together with the progress in spatiotemporal database research, have made possible the tracking of mobile devices (and their human companions) at very high accuracy, while supporting the efficient storage of mobility data in data warehouses, which this handbook illustrates. This has provided the means to collect, store and process mobility data of an unprecedented quantity, quality and timeliness. As ubiquitous computing pervades our society, user mobility data represents a very useful but also extremely sensitive source of information. On one hand, the movement traces that are left behind by the mobile devices of the users can be very useful in a wide spectrum of applications such as urban planning, traffic engineering, and environmental pollution management. On the other hand, the disclosure of mobility data to third parties may severely jeopardize the privacy of the users whose movement is recorded, leading to abuse scenarios such as user tailing and profiling. A significant amount of research work has been conducted in the last 15 years in the area of mobility data privacy and important research directions, such as privacy-preserving mobility data management, privacy in location sensing technologies and location-based services, privacy in vehicular communication networks, privacy in location-based social networks, privacy in participatory sensing systems which this handbook addresses.. This handbook also identifies important privacy gaps in the use of mobility data and has resulted to the adoption of international laws for location privacy protection (e.g., in EU, US, Canada, Australia, New Zealand, Japan, Singapore), as well as to a large number of interesting technologies for privacy-protecting mobility data, some of which have been made available through open-source systems and featured in real-world applications.
Computer security. --- Information Systems. --- Computers --- Wireless communication systems. --- Mobile communication systems. --- Computer Communication Networks. --- Computer science. --- Privacy. --- Management of Computing and Information Systems. --- Legal Aspects of Computing. --- Wireless and Mobile Communication. --- Computers and Society. --- Law and legislation. --- Informatics --- Science --- Vehicles --- Vehicular communication systems --- Radio --- Wireless communication systems --- Communication systems, Wireless --- Wireless data communication systems --- Wireless information networks --- Wireless telecommunication systems --- Telecommunication systems --- Cyberspace --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems --- Law and legislation --- Protection --- Security measures --- Management information systems. --- Computers. --- Computer communication systems. --- Computers and civilization. --- Civilization and computers --- Civilization --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Distributed processing
Choose an application
Anonymization of Electronic Medical Records to Support Clinical Analysis closely examines the privacy threats that may arise from medical data sharing, and surveys the state-of-the-art methods developed to safeguard data against these threats. To motivate the need for computational methods, the book first explores the main challenges facing the privacy-protection of medical data using the existing policies, practices and regulations. Then, it takes an in-depth look at the popular computational privacy-preserving methods that have been developed for demographic, clinical and genomic data sharing, and closely analyzes the privacy principles behind these methods, as well as the optimization and algorithmic strategies that they employ. Finally, through a series of in-depth case studies that highlight data from the US Census as well as the Vanderbilt University Medical Center, the book outlines a new, innovative class of privacy-preserving methods designed to ensure the integrity of transferred medical data for subsequent analysis, such as discovering or validating associations between clinical and genomic information. Anonymization of Electronic Medical Records to Support Clinical Analysis is intended for professionals as a reference guide for safeguarding the privacy and data integrity of sensitive medical records. Academics and other research scientists will also find the book invaluable.
Information retrieval --- Human medicine --- Computer science --- Information systems --- Computer. Automation --- IR (information retrieval) --- computers --- informatiesystemen --- medische informatica --- database management --- computerkunde --- data acquisition
Choose an application
This edited book collects state-of-the-art research related to large-scale data analytics that has been accomplished over the last few years. This is among the first books devoted to this important area based on contributions from diverse scientific areas such as databases, data mining, supercomputing, hardware architecture, data visualization, statistics, and privacy. There is increasing need for new approaches and technologies that can analyze and synthesize very large amounts of data, in the order of petabytes, that are generated by massively distributed data sources. This requires new distributed architectures for data analysis. Additionally, the heterogeneity of such sources imposes significant challenges for the efficient analysis of the data under numerous constraints, including consistent data integration, data homogenization and scaling, privacy and security preservation. The authors also broaden reader understanding of emerging real-world applications in domains such as customer behavior modeling, graph mining, telecommunications, cyber-security, and social network analysis, all of which impose extra requirements for large-scale data analysis. Large-Scale Data Analytics is organized in 8 chapters, each providing a survey of an important direction of large-scale data analytics or individual results of the emerging research in the field. The book presents key recent research that will help shape the future of large-scale data analytics, leading the way to the design of new approaches and technologies that can analyze and synthesize very large amounts of heterogeneous data. Students, researchers, professionals and practitioners will find this book an authoritative and comprehensive resource.
Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- bedrijfseconomie --- computers --- informatica --- informatiesystemen --- database management --- computerbeveiliging --- informatica management --- computerkunde --- data acquisition --- Data mining. --- Database management.
Choose an application
This handbook covers the fundamental principles and theory, and the state-of-the-art research, systems and applications, in the area of mobility data privacy. It is primarily addressed to computer science and statistics researchers and educators, who are interested in topics related to mobility privacy. This handbook will also be valuable to industry developers, as it explains the state-of-the-art algorithms for offering privacy. By discussing a wide range of privacy techniques, providing in-depth coverage of the most important ones, and highlighting promising avenues for future research, this handbook also aims at attracting computer science and statistics students to this interesting field of research. The advances in mobile devices and positioning technologies, together with the progress in spatiotemporal database research, have made possible the tracking of mobile devices (and their human companions) at very high accuracy, while supporting the efficient storage of mobility data in data warehouses, which this handbook illustrates. This has provided the means to collect, store and process mobility data of an unprecedented quantity, quality and timeliness. As ubiquitous computing pervades our society, user mobility data represents a very useful but also extremely sensitive source of information. On one hand, the movement traces that are left behind by the mobile devices of the users can be very useful in a wide spectrum of applications such as urban planning, traffic engineering, and environmental pollution management. On the other hand, the disclosure of mobility data to third parties may severely jeopardize the privacy of the users whose movement is recorded, leading to abuse scenarios such as user tailing and profiling. A significant amount of research work has been conducted in the last 15 years in the area of mobility data privacy and important research directions, such as privacy-preserving mobility data management, privacy in location sensing technologies and location-based services, privacy in vehicular communication networks, privacy in location-based social networks, privacy in participatory sensing systems which this handbook addresses.. This handbook also identifies important privacy gaps in the use of mobility data and has resulted to the adoption of international laws for location privacy protection (e.g., in EU, US, Canada, Australia, New Zealand, Japan, Singapore), as well as to a large number of interesting technologies for privacy-protecting mobility data, some of which have been made available through open-source systems and featured in real-world applications.
Human rights --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- mobiele netwerken --- computers --- informatica --- maatschappij --- privacy --- informatiesystemen --- computerbeveiliging --- informatica management --- computercriminaliteit --- computernetwerken --- computerkunde --- mobiele communicatie
Choose an application
This handbook covers Electronic Medical Record (EMR) systems, which enable the storage, management, and sharing of massive amounts of demographic, diagnosis, medication, and genomic information. It presents privacy-preserving methods for medical data, ranging from laboratory test results to doctors’ comments. The reuse of EMR data can greatly benefit medical science and practice, but must be performed in a privacy-preserving way according to data sharing policies and regulations. Written by world-renowned leaders in this field, each chapter offers a survey of a research direction or a solution to problems in established and emerging research areas. The authors explore scenarios and techniques for facilitating the anonymization of different types of medical data, as well as various data mining tasks. Other chapters present methods for emerging data privacy applications and medical text de-identification, including detailed surveys of deployed systems. A part of the book is devoted to legislative and policy issues, reporting on the US and EU privacy legislation and the cost of privacy breaches in the healthcare domain. This reference is intended for professionals, researchers and advanced-level students interested in safeguarding medical data.
Computer architecture. Operating systems --- Information systems --- Computer. Automation --- informatica --- medische informatica --- database management --- informatietechnologie --- computerbeveiliging
Choose an application
Privacy and security risks arising from the application of different data mining techniques to large institutional data repositories have been solely investigated by a new research domain, the so-called privacy preserving data mining. Association rule hiding is a new technique on data mining, which studies the problem of hiding sensitive association rules from within the data. Association Rule Hiding for Data Mining addresses the optimization problem of “hiding” sensitive association rules which due to its combinatorial nature admits a number of heuristic solutions that will be proposed and presented in this book. Exact solutions of increased time complexity that have been proposed recently are also presented as well as a number of computationally efficient (parallel) approaches that alleviate time complexity problems, along with a discussion regarding unsolved problems and future directions. Specific examples are provided throughout this book to help the reader study, assimilate and appreciate the important aspects of this challenging problem. Association Rule Hiding for Data Mining is designed for researchers, professors and advanced-level students in computer science studying privacy preserving data mining, association rule mining, and data mining. This book is also suitable for practitioners working in this industry.
Association rule mining. --- Data mining. --- Association rule mining --- Data mining --- Computer Science --- Engineering & Applied Sciences --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Computer science. --- Computer software --- Data structures (Computer science). --- Algorithms. --- Database management. --- Artificial intelligence. --- Computer Science. --- Database Management. --- Information Systems Applications (incl. Internet). --- Artificial Intelligence (incl. Robotics). --- Data Structures, Cryptology and Information Theory. --- Algorithm Analysis and Problem Complexity. --- Performance and Reliability. --- Reusability. --- Database searching --- Data structures (Computer scienc. --- Computer software. --- Operating systems (Computers). --- Artificial Intelligence. --- Data Structures and Information Theory. --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Software, Computer --- Computer systems --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Operating systems --- Application software. --- Computer software—Reusability. --- Algorism --- Algebra --- Arithmetic --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Foundations
Choose an application
Privacy and security risks arising from the application of different data mining techniques to large institutional data repositories have been solely investigated by a new research domain, the so-called privacy preserving data mining. Association rule hiding is a new technique on data mining, which studies the problem of hiding sensitive association rules from within the data. Association Rule Hiding for Data Mining addresses the optimization problem of hiding sensitive association rules which due to its combinatorial nature admits a number of heuristic solutions that will be proposed and presented in this book. Exact solutions of increased time complexity that have been proposed recently are also presented as well as a number of computationally efficient (parallel) approaches that alleviate time complexity problems, along with a discussion regarding unsolved problems and future directions. Specific examples are provided throughout this book to help the reader study, assimilate and appreciate the important aspects of this challenging problem. Association Rule Hiding for Data Mining is designed for researchers, professors and advanced-level students in computer science studying privacy preserving data mining, association rule mining, and data mining. This book is also suitable for practitioners working in this industry.
Complex analysis --- Production management --- Computer science --- Programming --- Computer architecture. Operating systems --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- betrouwbaarheid --- complexe analyse (wiskunde) --- applicatiebeheer --- apps --- informatica --- informatiesystemen --- database management --- informatietechnologie --- algoritmen --- KI (kunstmatige intelligentie) --- architectuur (informatica) --- AI (artificiële intelligentie)
Listing 1 - 10 of 14 | << page >> |
Sort by
|