Security and Privacy Requirements for Electronic Consent

نویسندگان

چکیده

Electronic consent (e-consent) has the potential to solve many paper-based approaches. Existing approaches, however, face challenges regarding privacy and security. This literature review aims provide an overview of security requirements proposed by papers discussing e-consent implementations, as well manner in which state-of-the-art solutions address them. We conducted a systematic search using ACM Digital Library, IEEE Xplore, PubMed Central. included providing comprehensive discussions one or more technical aspects systems. Thirty-one met our inclusion criteria. Two distinct topics were identified, first being representations second implementations data sharing The main challenge for is gathering “valid” consent. For implementation papers, provided some but none overview. Blockchain identified solution transparency trust issues traditional client-server systems, several hinder it from applied practice. E-consent grant subjects control over their data. However, there no agreed-upon set that must be addressed platform. Therefore, security- privacy-by-design techniques should essential part development lifecycle such

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information Security Requirements for Implementing Electronic Health Records in Iran

Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...

متن کامل

Information Security Requirements for Implementing Electronic Health Records in Iran

Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...

متن کامل

Security and Privacy Requirements Engineering

Security requirements engineering identifies security risks in software in the early stages of the development cycle. In this chapter, the authors present the SQUARE security requirements method. They integrate privacy requirements into SQUARE to identify privacy risks in addition to security risks. They then present a privacy elicitation technique and subsequently combine security risk assessm...

متن کامل

information security requirements for implementing electronic health records in iran

background and goal: ict development in recent years has created excellent developments in human social and economic life. one of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (ehr).the purpose of this research is to investigate the effects information security requirements in electronic health records a...

متن کامل

USign - A security enhanced electronic consent model

Electronic consent becomes increasingly popular in the healthcare sector given the many benefits it provides. However, security concerns, e.g., how to verify the identity of a person who is remotely accessing the electronic consent system in a secure and user-friendly manner, also arise along with the popularity of electronic consent. Unfortunately, existing electronic consent systems do not pa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM transactions on computing for healthcare

سال: 2021

ISSN: ['2637-8051', '2691-1957']

DOI: https://doi.org/10.1145/3433995