Feasibility analysis of the privacy attributes of the personal wellness information model Pirkko Nykänen, Antto Seppälä, Pekka Ruotsalainen, Bernd Blobel.

Slides:



Advertisements
Similar presentations
Curriculum for Excellence Aberdeen City November 2008.
Advertisements

A Plan for a Sustainable Community Behavioral Health Information Network Western States Health-e Connection Summit & Trade Show September 10, 2013.
Supporting National e-Health Roadmaps WHO-ITU-WB joint effort WSIS C7 e-Health Facilitation Meeting 13 th May 2010 Hani Eskandar ICT Applications, ITU.
Training to care for people with dementia Dementia Training Partner logo here Training support Skills development Competency Assessment Scholarships Education.
Bergamo as Health City for a Smart[er] Health Stefano Andreani Smart[er] Citizens Stefano Andreani Bergamo as Health City for a Smart[er] Health Smart[er]
Health Information Security & Privacy February 9, 2014 ONC Policy HIT Policy Committee Privacy and Security Workgroup Denise Anthony Sociology and ISTS.
How does a web-service’s apparent trustworthiness affect people’s intention to adopt? a.k.a. “Seal of Approval and Multidimensionality of Perceived Trustworthiness.
The purpose of this Unit is to enable individuals to develop the key principles, values and attitude which are central to high quality care practice Key.
1 SESSION 3 FORMAL ASSESSMENT TASKS CAT and IT FORMS OF ASSESSMENT.
Security Controls – What Works
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
Facilitating Multi Stakeholder Processes and Social Learning Herman Brouwer/ Karèn Verhoosel Centre for Development Innovation MSP Generic Process.
Technologie dell’informazione e Profili e Curricula le biblioteche Parma Ottobre 2005 IT Competences and Curricula Issues: A University Perspective.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Connect – Mersey Care NHS Trust & SCC Knowledge Driven Health.
The Process of Scope and Standards Development
Cloud Usability Framework
©Ian Sommerville 2006Critical Systems Slide 1 Critical Systems Engineering l Processes and techniques for developing critical systems.
Achieving and Sustaining HIPAA Compliance October 4, 2002 David Swartz George Washington University Melissa Glynn PricewaterhouseCoopers LLP.
Introduction to Standard 2: Partnering with consumers Advice Centre Network Meeting Nicola Dunbar October 2012.
Graduate Programs in Computer Science Design of cyber security awareness game utilizing a social media framework WA Labuschagne.
What is Business Analysis Planning & Monitoring?
Information Literacy in the workplace: implications for trainers By Dr. Mark Hepworth Department of Information Science Loughborough University.
Curriculum for Excellence Aberdeenshire November 2008.
Context Modeling and Reasoning Framework for CARA Pervasive Healthcare
Chapter Three IT Risks and Controls.
Security Policy Evaluation Using Balanced Scorecards Mohamad El Osta MBA 737 April 29, 2008.
Management Information Systems Foundations of Information Systems Ismiarta Aknuranda Informatika UB.
Making IT Meaningful Christine Bechtel Vice President National Partnership for Women & Families Making IT Meaningful: How Consumers Value and Trust Health.
E-Learning in Healthcare Signe Bāliņa a/s Datorzinību centrs Baltic IT&T 2007: eBaltics Presentation in Forum Baltic IT&T 2007: eBaltics Riga, April 2007.
TripCom: Development of a patient summary at European level E. Della Valle, D. Cerizza, D. Foxvog, R. Krummenacher, L. J. B. Nixon, E.
 Dr. Syed Noman Hasany.  Review of known methodologies  Analysis of software requirements  Real-time software  Software cost, quality, testing and.
Chapter 6 – Data Handling and EPR. Electronic Health Record Systems: Government Initiatives and Public/Private Partnerships EHR is systematic collection.
The Ethics of Internet Research Rebecca Eynon, Jenny Fry and Ralph Schroeder Oxford Internet Institute, University of Oxford
Social analysis and collateral impact of pervasive technologies CNIT - TN.
A Pervasive Architectural Framework for Providing Remote Medical Treatment Author:D. Vassis, P. Belsis, C.Skourlas,G.Pantziou 1.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
Towards Delivering Disease Support Processes for Patient Empowerment Using Mobile Virtual Communities Bert-Jan van Beijnum, Pravin Pawar, Lamia Elloumi.
A security framework combining access control and trust management for mobile e-commerce applications Gregor v.Bochmann, Zhen Zhang, Carlisle Adams School.
Building evaluation capacity: success factors and approaches in NSW Health NSW Government Evaluation Conference 2015 Andrew Milat PhD, MPH (Hons), BHMS.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
Master Course /11/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
Workshop 4: Recognition of non-formal and informal learning Espoo Lauri Savisaari.
Shaping a Health Statistics Vision for the 21 st Century 2002 NCHS Data Users Conference 16 July 2002 Daniel J. Friedman, PhD Massachusetts Department.
Service Level Management SLM Concepts Explained Copyright 2002 Easytec Solutions.
SOCIAL RESPONSIBILITY VIEW OF ANKARA UNIVERSITY CENTER ON AGEING STUDIES: A MODEL PROJECT ABOUT “COLOURING THE LIVES OF ELDERLY” Prof. Dr. Emine OZMETE.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Approaching Fine-grain Access Control for Distributed Biomedical Databases within Virtual Environments Onur Kalyoncu, Yi Pan, Matthias Assel High Performance.
Care Certificate Standards. Introduction The Care Certificate Standards are a set of 15 standards that the health and social care work force are required.
Educational Template Chapter 11 Data Privacy and Security Ross Fraser Chapter 11 Data Privacy & Security.
Curriculum for Excellence Health and Wellbeing. Purpose of this session  To present key aspects of Health and Wellbeing in Curriculum for Excellence.
1 Basic counseling HAIVN Havard Medical School AIDS Initiative in Vietnam.
ESCTAIC’s 21st Annual Meeting 2010 Vrije Universiteit medical centre, Amsterdam Netherlands 06 – 09 th October Identifying Ergonomic Requirements.
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
LEFIS ROVANIEMI MEETING 19TH 20TH JANUARY 2007 Privacy In The Web TATYANA STEFANOVA LEX.BG BULGARIA.
Our Client Dr. Mawjood Institute of Indigenous Medicine University Of Colombo.
Privacy and Personal Information. WHAT YOU WILL LEARN: What personal information is. General guidelines for the collection of personal information. Your.
Embedding Employability Attributes into the Nursing (and Midwifery) Portfolio Deborah Isaac Senior Lecturer Family Care & Mental Health.
Week 12. Lecture 2. Health Law & the EU Cross-border healthcare: patients’ rights.
1 Copyright © 2009, 2006, 2003, 2000, 1997, 1994 by Saunders, an imprint of Elsevier Inc. Chapter 23 Nursing Informatics.
Introduction to NCHS Rob Weinzimer, Special Assistant for Outreach Centers for Disease Control and Prevention National Center for Health Statistics.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Pedagogical aspects in assuring quality in virtual education environments University of Gothenburg, Sweden.
CompSci 280 S Introduction to Software Development
InterAction Lab, University of Trento
Impact of internet sources on e-patient knowledge
IS4680 Security Auditing for Compliance
The Scottish Education System
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Presentation transcript:

Feasibility analysis of the privacy attributes of the personal wellness information model Pirkko Nykänen, Antto Seppälä, Pekka Ruotsalainen, Bernd Blobel

- Introduction - Privacy and privacy attributes - User wellness scenario with privacy attributes - Details of component walk-through - Conclusions

Introduction Feasibility study –Outline and clarify things and factors connected to developed models and solutions – Proof-of-concept Wellness information model

Privacy Personal health information – confidential, needs to be protected from un-authorised use, access and disclosure -Person’s ability to control the collection, use and dissemination of one’s personal information –Persons, groups, institutions to determine themselves WHEN, HOW and TO WHAT EXTENT information about them is communicated to others –Privacy is personal and situation dependent concept Privacy metrics - to assess the degree to which a particular application complies with privacy requirements – no control, control over one kind of information, control over two kinds of information or three kinds - Contents, location, identity TRUST- mediating between privacy and willingness to disclose private information

Privacy attributes Context – Type of domain, phenomena that exist, time(when), location (where), occupation (who), culture (with whom), rationale (why) Capability – ability of the information entity to show the attribute values Competence –Level of privacy demonstration Reliability –How reliable information or source is considered by the person Benefit –Privacy benefits Benevolance –Extent to which an individual is perceived to have good intention towards others without profit motive Confidence –How confident the user is with the information Value –How valuable privacy is considered by a person in action/activity.

User wellness scenario with privacy attributes Lifestyle Health care Social networks Emotional and mental wellness Receives treatment, medication and guidance for home care of DM T2 Starts to improve his lifestyle, uses a personal wellness diary system in PC Searches for peer-support in the Internet, and for information on DM T2 Searches for recovery from depressed moods and support for higher spirits Case – A 50-year old healthy, employed male, diagnosed recently on Diabetes Mellitus T2

Privacy attributes:Component - health care ContextRegulated CapabilityCapable to provide privacy and trust CompetenceAssumed to be high ReliabilityOrganisation-based trust BenefitHigh personal benefit BenevolanceGood intention ConfidenceRequired procedures, standards and safeguards have been implemented Health care Receives treatment, medication and guidance for home care of DM T2 Privacy attributeContents

Privacy attributes: Component lifestyle Lifestyle Starts to improve his lifestyle, uses a personal wellness diary system in PC ContextNon-regulated ConfidenceReputation-based ReliabilityPast history-based BenefitHigh personal benefit ValueHigh personal value Privacy attributeContents

Details of lifestyle component walk-through Person searches for information on DM T2, on medication and treatment, on healthy lifestyle, on peer-support in the Internet Privacy attribute – one’s ability to control Context - Internet, non-regulated, Ability to control: only with certified sites which provide trust, other sites: no control Confidence – Certified sites provide some confidence, otherwise confidence does not exist Reliability – Certified sites are considered somewhat reliable, otherwise no reliability Benefit – Considered high, controlled by a person Value – Information value is high, very meaningful for the person, value is determined and controlled by a person

Details of lifestyle component walk-through Person starts a healthy diet and documents his eating and blood sugar levels in his own wellness diary in a PC Privacy attribute – one’s ability to control Context – Non-regulated, control by the person – what to document, where and when to document Confidence – The person may or may not be confident, depending his abilities and on the security status of his PC Reliability – PC diary system reliability is controlled normally by PC security service provider, sometimes by a person. Blood glucose meter reliability is not controlled by a person Benefit – Benefit is considered high, controlled by a person Value – High value for the person’s DM management and healthy lifestyle

Details of lifestyle component walk-through Person stores the data he receives from a doctor in health care into his PC diary system for his Personal use Privacy attribute – one’s ability to control Context – data is coming from a regulated context, stored in a non-regulated context, person controls (where, what) Confidence – the person may, or may not, be confident Reliability – Data is considered reliable, high trust by a person, data is transferred from an organisational trusted source Benefit – Considered high, controlled by a person Value – Information value is high, important for home care, DM management and for healthy lifestyle

How to achieve good privacy status Integration of regulated and non-regulated domains –Person has to be aware and have means to control Need to develop privacy services for non-regulated environments –To monitor and control privacy attributes Trust-building measures –Thirs-party certificates, branding, owner disclosure, self- regulating policies –Pervasive health > Self-regulating policies – For each model concept the privacy attributes are defined, made known, controllable and measurable

Trust building measures and processes Processes for pervasive ubiquitous health –Predictive - reputation-based trust building –Intentionality – trust is developed if we have perceptions on the intensions of the service, provider –Capability – person is able to evaluate the ability of the service, provider –Transference – information is transferred from regulated context to non-regulated pervasive context

Conclusions Privacy management is important – Citizens are reluctant to adopt personal health and wellness systems –Privacy is a driver for non-regulated health service business model –Many existing personal health systems do not cover privacy and security regulations Privacy attributes defined to each model concept help citizens to be aware of and to control the privacy of his/her personal health information – Technical solutions are needed to implement the privacy attributes, to make them known, available and controllable by a person

Thank you! Seppälä A, Nykänen P, Ruotsalainen P (2012), Development of personal wellness information model for pervasive healthcare. Journal of Computer Networks and Communication, article , 10 pages Ruotsalainen P, Blobel B, Seppälä A, Sorvari H, Nykänen P (2012), A Conceptual Framework and Principles for Trusted Pervasive Health. J Med Internet Res 14(2):e52 Nykänen P and Seppälä A (2012), Collaborative approach for sustainable citizen- centered health care. In: N Wickramasinghe, R K Bali, S Kirn and R Suomi (eds.), Critical issues of sustainable E-health solutions. Health care delivery in the information age. Springer Verlag, Seppälä A, Nykänen P (2011), Contextual analysis and modeling of personal wellness. In: Joaquim Filipe and Jan L. G. Dietz (Eds.) KEOD 2011, Proceedings of the International Conference Knowledge Engineering and Ontology Development - Paris, France, October 2011: SciTePress - Science and Technology Publications, P Ruotsalainen, B Blobel, P Nykänen, A Seppälä, H Sorvari (2011), Framework model and principles for trusted information sharing in pervasive health. In: A Moen, SK Andersen, J Aarts and P Hurlen (eds.), User Centred Networked Health Care. Proccedings of MIE2011, Oslo. IOS Press, Amsterdam, Nykänen P, Ruotsalainen P, Blobel B and Seppälä A (2009), Research on trusted personal health and wellness information in ubiquitous health information space. In: O. Dössel and WC Schlegel (Eds.): World Congress 2009, IFMBE Proceedings 25/XII, 432–435