Automated Transformation of Semi-Structured Text Elements
aisel.aisnet.org/amcis2012/proceedings/ISHealthcare/17 Interconnected systems, such as electronic health records (EHR), considerably improved the handling and processing of health information while keeping the costs at a controlled level. Since the EHR virtually stores all data in digitized form, personal medical documents are easily and swiftly available when…
SIEM-Based Framework for Security Controls Automation
www.emeraldinsight.com/journals.htm The purpose of this paper is to propose a framework for security controls automation, in order to achieve greater efficiency and reduce the complexity of information security management. This research reviewed the controls recommended by well known standards such as ISO/IEC 27001 and NIST…
PERiMETER – Pseudonymization and Personal Metadata Encryption for Privacy-Preserving Searchable Documents
[:en] The average costs of data leakage are steadily on the rise. Especially in healthcare, the disclosure of sensitive information may have unfavorable consequences for the patient. As a consequence, several data security and access control mechanisms have been introduced, ranging from data encryption to…
Recognition and Privacy Preservation of Paper-Based Health Records
ebooks.iospress.nl/publication/21844 While the digitization of medical data within electronic health records has been introduced in some areas, massive amounts of paper-based health records are still produced on a daily basis. This data has to be stored for decades due to legal reasons but is of…
Ontological Mapping of Information Security Best-Practice Guidelines
[:en] Due to a rapid growth in the use of electronic data processing and networking, an information security management system with a holistic and widespread view becomes more and more important for any kind of organization. The fundamental challenge for such systems is the representation…
Recognition and Pseudonymization of Personal Data in Paper-Based Health Records
Recognition and Pseudonymization of Personal Data in Paper-Based Health Records: E-health requires the sharing of patient-related data when and where necessary. Electronic health records (EHR) allow the structured and expandable collection of medical data needed for clinical research studies and thereby not only enable the…
An Ontology-Based Approach for Constructing Bayesian Networks
Bayesian networks are commonly used for determining the probability of events that are influenced by various variables. Bayesian probabilities encode degrees of belief about certain events, and a dynamic knowledge body is used to strengthen, update, or weaken these assumptions. The creation of Bayesian networks…
Pseudonymization with Metadata Encryption for Privacy-Preserving Searchable Documents
[:en] The average costs of data leakage are steadily on the rise. As a consequence, several data security and access control mechanisms have been introduced, ranging from data encryption to intrusion detection or role-based access control, doing a great work in protecting sensitive information. However,…
Increasing Knowledge Capturing Efficiency by Enterprise Portals
www.emeraldinsight.com/journals.htm Collaborative ontology editing tools enable distributed user groups to build and maintain ontologies. Enterprises that use these tools to simply capture knowledge for a given ontological structure face the following problems: isolated software solution requiring its own user management; the user interface often does…
A Methodology for the Pseudonymization of Medical Data
[:en] A Methodology for the Pseudonymization of Medical Data: E-health enables the sharing of patient-related data whenever and wherever necessary. Electronic health records (EHRs) promise to improve communication between health care providers, thus leading to better quality of patients’ treatment and reduced costs. However, as…