A standardised graphic method for describing data privacy frameworks in primary care research using a flexible zone model
نویسندگان
چکیده
PURPOSE To develop a model describing core concepts and principles of data flow, data privacy and confidentiality, in a simple and flexible way, using concise process descriptions and a diagrammatic notation applied to research workflow processes. The model should help to generate robust data privacy frameworks for research done with patient data. METHODS Based on an exploration of EU legal requirements for data protection and privacy, data access policies, and existing privacy frameworks of research projects, basic concepts and common processes were extracted, described and incorporated into a model with a formal graphical representation and a standardised notation. The Unified Modelling Language (UML) notation was enriched by workflow and own symbols to enable the representation of extended data flow requirements, data privacy and data security requirements, privacy enhancing techniques (PET) and to allow privacy threat analysis for research scenarios. RESULTS Our model is built upon the concept of three privacy zones (Care Zone, Non-care Zone and Research Zone) containing databases, data transformation operators, such as data linkers and privacy filters. Using these model components, a risk gradient for moving data from a zone of high risk for patient identification to a zone of low risk can be described. The model was applied to the analysis of data flows in several general clinical research use cases and two research scenarios from the TRANSFoRm project (e.g., finding patients for clinical research and linkage of databases). The model was validated by representing research done with the NIVEL Primary Care Database in the Netherlands. CONCLUSIONS The model allows analysis of data privacy and confidentiality issues for research with patient data in a structured way and provides a framework to specify a privacy compliant data flow, to communicate privacy requirements and to identify weak points for an adequate implementation of data privacy.
منابع مشابه
Presenting a Social Capital Management Model in the General Directorate of Education of Kermanshah Province with the Data Theory Approach (Case Study: Primary School Principals)
Purpose: The aim of this study is to present a model of social capital management in the General Department of Education of Kermanshah province with the approach of data foundation theory (Case study: primary school principals). Method: The method of the present study is applied in terms of purpose and in terms of implementation method, with a combined (quantitative-qualitative) approach. The ...
متن کاملPrimary Health Care Quality Improvement Patterns: A Systematic Review Study
Background and Aim: Along with the expansion of health systems, the importance of primary health care as the basis of an efficient health system is more evident and the quality of the provided services at this level becomes more important. In this way, the present study attempts to collect patterns used to improve the quality of primary health care. Materials and Methods: The present study is ...
متن کاملA fixed and flexible maintenance operations planning optimization in a parallel batch machines manufacturing system
Scheduling has become an attractive area for artificial intelligence researchers. On other hand, in today's real-world manufacturing systems, the importance of an efficient maintenance schedule program cannot be ignored because it plays an important role in the success of manufacturing facilities. A maintenance program may be considered as the heath care of manufacturing machines and equipments...
متن کاملThe Factors Affecting on Banking Crisis Loss with Emphasis on Policy Frameworks
The main purpose of this study is to identify the determinants of banking crisis loss, the variables of policy framework especially, for 12 sample countries over the period 1980-2019. Accordingly, we extracted pre-crisis and post-crisis trends from countries' real GDPs and then calculated output loss for the crisis year and three years afterwards. In the following, we used the Poisson quasi-max...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- International journal of medical informatics
دوره 83 12 شماره
صفحات -
تاریخ انتشار 2014