Privacy Sensitive Architecture for Psychiatric Behaviour Monitoring Service System Presenter: Rusyaizila Ramli (Ph.D student) Supervisors: Associate Professor.

Slides:



Advertisements
Similar presentations
INTRODUCTION TO HEALTH SCIENCE LAW AND ETHICS. MEDICAL LAW Medical law is the branch of law which concerns the rights and responsibilities of medical.
Advertisements

Trust me, I‘m a researcher: Experiences of archiving data Bogusia Temple, B.A., MPhil., PhD Professor of Health and Social Care Research.
An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong Group for User Interface Research Computer Science Division University of California.
Patient Rights and Confidentiality. Inform Patient of their Rights  Upon admissions  Written information available in English and Spanish  Non-English.
Diversity, Patient Rights and Confidentiality. “You have the Right” The Basic Rights all Patients are entitled to while entrusting their care to us.
INTRODUCTION TO HEALTH SCIENCE LAW AND ETHICS. LEARNING LOG What is the difference between laws and ethics? Who comes up with the laws? Who comes up with.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Multimedia Communications Tejinder Judge Usable Security – CS 6204 – Fall, 2009.
ACCESS TO MENTAL HEALTH CARE IN ROMANIA Adina BITFOI M.D., Psychiatrist Romanian League for Mental Health.
Health Information Security & Privacy February 9, 2014 ONC Policy HIT Policy Committee Privacy and Security Workgroup Denise Anthony Sociology and ISTS.
Blekinge Institute of Technology School of Engineering Sweden School of Computing, BTH Karlskrona Quality of Experience (QoE) and Quality.
ASNA Architecture and Services of Network Applications Research overview and opportunities L. Ferreira Pires.
Company LOGO B2C E-commerce Web Site Quality: an Empirical Examination (Cao, et al) Article overview presented by: Karen Bray Emilie Martin Trung (John)
Evidence-Based Practice and Nursing Research Chapter 6.
EMGO Institute for Health and Care Research Quality of Care Martina Cornel, MD, PhD, professor of Community Genetics & Public Health Genomics PPPC activities.
Citizen’s perception on surveillance, security and privacy: A psychosocial perspective M. Carmen Hidalgo Fernando Casado Antonio Maña University of Malaga.
Contemporary Issues in Canadian Health Care Nola M. Ries, MPA, LLM Adjunct Assistant Professor, University of Victoria Research Associate, Health Law Institute,
A Survey of Mobile Phone Sensing Michael Ruffing CS 495.
The Nuffield Council on Bioethics Report : The collection, linking and use of data in biomedical research and health care: ethical issues. Martin Richards.
Principles of medical ethics Lecture (4) Dr. rawhia Dogham.
RIVERA SÁNCHEZ-1 CSE 5810 User Authentication in Mobile Healthcare Applications Yaira K. Rivera Sánchez Computer Science & Engineering Department University.
Team 2 Andrew Boyd Kaven Williams.  Privacy, Security and Compliance Issues  Current State of Research  Implications  Areas of Research Opportunity.
The Ethical Dimension of Collaboration Professor Simon Rogerson Centre for Computing and Social Responsibility De Montfort University, UK
Developing Cultural Competencies in Spiritual Care Presented by: Beth Lenegan, PhD David Scott, MS.
1 APPEARING BEFORE THE MENTAL HEALTH TRIBUNAL. 2 Index The Provisions of the Act relating to Tribunal hearings3 – 6 What is Evidence 7 Section 24 Continuing.
DISCRIMINATION AND STIGMA IN HEALTHCARE SETTINGS: THE ITALIAN SITUATION Matteo Schwarz Legal Division NPS Italia Onlus.
Morning Briefings and Huddles
The Pan-hellenic Families Association for Mental Health SOPSI Presenter: Eleonora Kanellopoulou.
Experiences in Accessing Health Care for Women in Amsterdam: Personal and Professional Perspectives Emily Sands and Lauren Sterling.
USERS’ INVOLVEMENT IN MENTAL HEALTH WORK. By Sylvester Katontoka
Topic 8 Engaging with patients and carers. Learning objective Understand the ways in which patients and carers can be involved as partners in health care.
Public opinion on sociodemographic data collection in Ontario healthcare settings KETAN SHANKARDASS, PhD, Research Associate Centre for Research on Inner.
Recovery conceptualization and Treatment preferences: Choices for Clients with Psychosis in Northern Malawi By: Charles Masulani Mwale 1, 1 St John of.
Review of the paper: The Ubiquitous Camera: An In-Depth Study of Camera Phone Use Authors: Tim Kindberg, Mirjana Spasojevic, Rowanne Fleck, Abigail Sellen.
Social analysis and collateral impact of pervasive technologies CNIT - TN.
Privacy in Healthcare Challenges Associated with Implementing Privacy in an Electronic Health Records Environment John P. Houston, J.D. Vice President,
History–Social Science: Learning Experience 8
Welcome to Nursing -- and to Health Information Privacy HIPAA and Privacy for Nurses presented by The Privacy Office University of Florida.
Research support for validity and reliability theories
HIPAA BASIC TRAINING MODULE 1C – Overview (For staff who do not generally create Protected Health Information) Anderson Health Information Systems, Inc.
Describing ethical competences - caveats turning ethical principles into competences is a challenge: nonetheless competences have been described for some.
Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing Xiaodong Jiang Jason I. Hong James A. Landay G r o u p f o r.
Your health record How the local NHS uses and protects the information held about you Other ways that your records may be used Your local NHS services.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Collective Information Practice: Exploring Privacy and Security as Social and Cultural.
Principles of Information System Security: Text and Cases Gurpreet Dhillon PowerPoint Prepared by Youlong Zhuang University of Missouri-Columbia.
Educating Professionals Creating and Applying Knowledge Engaging our Communities GIVING VOICE TO HEALTH AND SAFETY: CALD WORKERS’ EXPERIENCES IN AGED CARE.
CH 10. Confidentiality A. Confidentiality about sensitive medical information is necessary to preserve the patient’s dignity. B. In order to receive payment.
Established standards of care given with respect and consideration, regardless of race, age, or payment source. Information about your illness, possible.
WHAT IS CONSIDERED CONFIDENTIAL PATIENT INFORMATION? Information that is not publically available that has been disclosed in confidence between a patient.
Principles of medical ethics Lecture (4) Dr. HANA OMER.
New Hire HIPAA Orientation. HIPAA Overview HIPAA is an acronym that stands for the Health Insurance Portability and Accountability Act of HIPAA.
Universal Patients’ Rights Association UPRA Decreasing Violation of Patients’ Rights (in the northern part of Cyprus) Rome, 4 of March, 2016.
The Context Fabric: An Infrastructure for Context-Aware Computing Jason I. Hong Group for User Interface Research, Computer Science Division University.
RRPP Annual Conference Ohrid, May 27-29, 2015 From Inclusive Identities to Inclusive Societies: Exploring Complex Social Identity in the Western Balkans.
Introduction to Computational Thinking
Providing Foster Families Program
Rights and Genomic Medicine: Risks to Individuals
Introduction to Computational Thinking
Physical restraints vs. seclusion in hospitalized patients
Unity Health Information Exchange
Cultural Diversity.
HMS Academy Fellowship in Medical Education Research June 2, 2016
Healthcare Privacy: The Perspective of a Privacy Advocate
Chapter 13: Ethics and Law
FIG 1 - HEALTH PROVIDERS TRAINED ON CONFIDENTIALITY
Human Participants Research
Evaluate ethical behavior in a health care setting
New Approaches to Governance
Inclusion and Ethics Professor Simon Rogerson
Children and Networks Suha Hajyahia Tareza Haddad.
Megan Masters, MSN Candidate DePaul University School of Nursing
Presentation transcript:

Privacy Sensitive Architecture for Psychiatric Behaviour Monitoring Service System Presenter: Rusyaizila Ramli (Ph.D student) Supervisors: Associate Professor Dr. Putra Sumari Dr. Nasriah Zakaria School of Computer Sciences Universiti Sains Malaysia, Penang, Malaysia

Healthcare, ICT and privacy Privacy is a fundamental human right (UN, 1948) Privacy has received very little attention from Information System Developer (ISD) researchers, with mainstream literature treating privacy as analogous to data security [3] Healthcare and ICT may give impact upon the privacy of individuals Most invasions of privacy are not intentional but due to designers inability to anticipate how this data could be used, by whom and how this might affect users [1]

Literature Review (Privacy Model) Issue: literature on privacy usually concentrates on protecting certain types of data without establishing what people regard as private info. Objective: to provide designers with a better understanding of how users will perceive data generated and the way it is used. [] Figure 1: Privacy Model Factors and Issues [1]

Literature Review (Conceptual Framework) Issue: current ISD approaches are failing to recognize the significant of privacy issues that affect those involved in the development and deployment of information system. Analysing and interpreting privacy issues in ISD Figure 2: A Privacy Framework for Information Systems Development [3]

Healthcare Monitoring System Overview

Privacy in Malaysia Context There are 2 types of psychiatric care in Malaysia: Public Psychiatric Wards Only at public hospital can provide ward and acute care - monitor psychiatric patients Private Mental Institutions ◦ They do not provide ward Most of the patients have stigma, attached to them and their believe system (due to the illness) Their privacy level would be depend on the types of mental illness, duration, ethnic group and education background

An observation in a psychiatric female ward There are 5 cameras (1 with panning) 25 beds Patients are not mentioned about the monitoring system, unless if they ask After 10 days, videos will be automatically deleted During night, patient cannot be monitored Every 15 minutes, nurse will count the numbers of patient HDU (???) – no monitor, based on physical observation

Problem Statement There is no privacy concern from healthcare and system developer for psychiatric behavior monitoring (in Malaysia) Even though they have mental ill, still there is a need to inform consent and patient/family needs to know how the information is being shared, where does go, who will use the information Chose monitoring systems because psychiatric patients would have different privacy perspective concerns and would have different level of disclosure compared to other illnesses There is little support for system developers to design and implement privacy sensitive environment that can help patients in managing their privacy [1]

Objectives To understand the nature and range of privacy concerns among psychiatric patients and family with respect to pervasive healthcare behavior monitoring system To elucidate a privacy framework of privacy in pervasive healthcare behavior monitoring system To use the privacy framework: ◦ To develop user’s privacy management module that provides end-users with appropriate control and feedback mechanism for managing their privacy ◦ As a toolkit for system developer to develop privacy sensitive monitoring system that will cater patient’s privacy concerns

Methodology

References: 1. Adams, A., Martina, M., Sasse, A., &Sasse, M. A. (2001). Privacy in Multimedia Communications: Protecting Users, Not Just Data. 2. Adams, A. (1999). Users' perception of privacy in multimedia communication. Paper presented at the CHI '99 extended abstracts on Human factors in computing systems. 3. Carew, P., & Stapleton, L. (2005). Towards a Privacy Framework for Information Systems Development Information Systems Development (pp ). 4. Carew, P., Stapleton, L., & Byrne, G. (2008). Implications of an ethic of privacy for human-centred systems engineering. AI & Society, 22(3), Carew, P. J., & Stapleton, L. (2005). Privacy, Patients and Healthcare Workers. Paper presented at the Proceedings of the 16th IFAC World Congress, Prague. 6. Hong, J. (2005). An architecture for privacy-sensitive ubiquitous computing. University of California, Berkeley. 7. Hong, J. I., & Landay, J. A. (2004). An architecture for privacy-sensitive ubiquitous computing. Paper presented at the Proceedings of the 2nd international conference on Mobile systems, applications, and services.

Thank You