Guide to the De-Identification of Personal Health Information

個数:

Guide to the De-Identification of Personal Health Information

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 414 p.
  • 言語 ENG
  • 商品コード 9780367659189
  • DDC分類 651.504261

Full Description

Offering compelling practical and legal reasons why de-identification should be one of the main approaches to protecting patients' privacy, the Guide to the De-Identification of Personal Health Information outlines a proven, risk-based methodology for the de-identification of sensitive health information. It situates and contextualizes this risk-based methodology and provides a general overview of its steps.

The book supplies a detailed case for why de-identification is important as well as best practices to help you pin point when it is necessary to apply de-identification in the disclosure of personal health information. It also:


Outlines practical methods for de-identification

Describes how to measure re-identification risk

Explains how to reduce the risk of re-identification

Includes proofs and supporting reference material

Focuses only on transformations proven to work on health information—rather than covering all possible approaches, whether they work in practice or not

Rated the top systems and software engineering scholar worldwide by The Journal of Systems and Software, Dr. El Emam is one of only a handful of individuals worldwide qualified to de-identify personal health information for secondary use under the HIPAA Privacy Rule Statistical Standard. In this book Dr. El Emam explains how we can make health data more accessible—while protecting patients' privacy and complying with current regulations.

Contents

The Case for De-Identifying Personal Health Information. Permitted Disclosures, Consent, and De-identification of PHI. Permitted Uses and Disclosures of Health Information. The Impact of Consent. Data Breach Notifications. Peeping and Snooping. Unplanned but Legitimate Uses and Disclosures. Public Perception and Privacy Protective Behaviors. Alternative Methods for Data Access. Understanding Disclosure Risks. Scope, Terminology, and Definitions. Frequently Asked Questions about De-identification. A Methodology for Managing Re-identification Risk. Definitions of Identifiability. Data Masking Methods. Theoretical Re-identification Attacks. Measuring Re-Identification Risk. Measuring the Probability of Re-identification. Measures of Uniqueness. Modeling the Threat. Choosing Metric Thresholds. Practical Methods for De-Identification. De-identification Methods. Practical Tips. End Matter. An Analysis of Historical Breach Notification Trends. Methods of Attack for Maximum Journalist Risk. How Many Friends Do We Have? Cell Size Precedents. The Invasion of Privacy Construct. General Information on Mitigating Controls. Assessing Motives and Capacity. Invasion of Privacy.

最近チェックした商品