| Literature DB >> 22481297 |
Pekka Sakari Ruotsalainen1, Bernd Gerhard Blobel, Antto Veikko Seppälä, Hannu Olavi Sorvari, Pirkko Anneli Nykänen.
Abstract
BACKGROUND: Ubiquitous computing technology, sensor networks, wireless communication and the latest developments of the Internet have enabled the rise of a new concept-pervasive health-which takes place in an open, unsecure, and highly dynamic environment (ie, in the information space). To be successful, pervasive health requires implementable principles for privacy and trustworthiness.Entities:
Mesh:
Year: 2012 PMID: 22481297 PMCID: PMC3376512 DOI: 10.2196/jmir.1972
Source DB: PubMed Journal: J Med Internet Res ISSN: 1438-8871 Impact factor: 5.428
Figure 1Pervasive health in the information space.
Figure 2Conceptual framework for pervasive health.
Typical primary and secondary uses of health data.
| Primary use | Secondary use |
| Direct care and treatment | Surveillance and continuous monitoring |
| Disease management | Research and statistics |
| Medication management | Drug development |
| Management of physical and social functionality for delaying of their weakening | Public health management |
| Proactive prediction of patient’s health problems and prevention of diseases | Business application development |
| Management of patient’s health status | Hindering behaviors not accepted by controllers (or authorities) or by society in general |
Principles of trust verification.
| Privacy and trust risksa | THEWS principle | High-level privacy principle |
| Unknown stakeholders’ business needs, interest, purposes, and policies | Right to use trust verification | |
| No predefined trust to any system | Mandatory to publish systems’ trust parameters and policies | Trusted use of data |
| Unknown secondary users | Trust level calculation | |
| Invisible ubiquitous infrastructure | Untrusted systems and users cannot participate in the DS’s health network |
a in the information space and in pervasive health
Principles of personal policies.
| Privacy and trust risksa | THEWS principle | High-level privacy principle |
| The DS cannot control what health data is collected and by whom | Personal dynamic context-aware policies rule the collection, processing, storing, sharing, and destroying of data | Right to control the use of data |
| The DS cannot control the use of the LPWR and its metadata | Possibility to control any secondary use of the LPWR and its metadata | |
| No control over data linking, unknown secondary use of data, and the information space has unlimited memory | Policy defines rules for data linking and destroying as well as situations where the LPWR can be processed | Withholding |
a in the information space and in pervasive health
Principles of awareness.
| Privacy and trust risksa | THEWS principle | High-level privacy principle |
| Invisible data collection, processing, preservation, and sharing | Awareness and transparency is defined by the DS’s policy | |
| No need to inform the DS the level of trust and of relations between systems | Stakeholders and systems shall publish their trust parameters and relations to other systems | Transparency |
| No need to notify the DS of policy conflicts | Notification of conflicting interest and policies |
a in the information space and in pervasive health