管理患者管理授权策略的隐私和有效性

Thomas Trojer, Basel Katt, R. Breu, T. Schabetsberger, Richard Mair
{"title":"管理患者管理授权策略的隐私和有效性","authors":"Thomas Trojer, Basel Katt, R. Breu, T. Schabetsberger, Richard Mair","doi":"10.4018/jcmam.2012040103","DOIUrl":null,"url":null,"abstract":"A central building block of data privacy is the individual right of information self-determination. Following from that when dealing with shared electronic health records (SEHR), citizens, as the identified individuals of such records, have to be enabled to decide what medical data can be used in which way by medical professionals. In this context individual preferences of privacy have to be reflected by authorization policies to control access to personal health data. There are two potential challenges when enabling patient-controlled access control policy authoring: First, an ordinary citizen neither can be considered a security expert, nor does she or he have the expertise to fully understand typical activities and workflows within the health-care domain. Thus, a citizen is not necessarily aware of implications her or his access control settings have with regards to the protection of personal health data. Both privacy of citizen’s health-data and the overall effectiveness of a health-care information system are at risk if inadequate access control settings are in place. This paper refers to scenarios of a case study previously conducted and shows how privacy and information system effectiveness can be defined and evaluated in the context of SEHR. The paper describes an access control policy analysis method which evaluates a patient-administered access control policy by considering the mentioned evaluation criteria. DOI: 10.4018/jcmam.2012040103 44 International Journal of Computational Models and Algorithms in Medicine, 3(2), 43-62, April-June 2012 Copyright © 2012, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. ing block of privacy is the individual right to decide which data about oneself might be collected and stored and how data is supposed to be processed (OECD, 1980). Since 1983 this right, entitled informational self-determination is a fundamental right in German law1 (law of the German federal constitution (BVerfGE) 65, 1) and further is a substantial part of the European Data Protection Directive 95/46/EC (European Commission, 1995) established all over the European Union (EU) through corresponding national laws. Despite the right of individual users to participate in activities to control privacy-sensitive information, its implementation is difficult and poses at least the following challenges: An ordinary user is typically not considered a security expert and the actual definition or selection of appropriate authorization preferences requires the user to translate her/his mental conception of privacy into enforceable security configurations. Another issue comes with the impact userdefined settings of authorization may have to the user’s privacy or the resulting effectiveness of the health-care information system. Users, as the sole authors of access control statements, have to be made aware about the consequences there settings imply. Although issues regarding the authoring of access control settings have been well discussed in literature, e.g., by suggesting usable authoring tools, like the line of work done by Karat, Karat, Brodie, and Feng (2006) and Reeder, Karat, Karat, and Brodie (2007) proposes, little attention has been paid to the analysis of impact of access control policies to a specific type of information system. In this work we discuss the interrelationship between two specific criteria which can be used to evaluate access control settings enforced by a health-care information system. Further we derive resolution strategies which are proposed to a citizen to support her/him with resolving inadequate security. Domain Evaluation Criteria In order to support the management and protection of sensitive health-records, citizens have to be supported by usable policy authoring tools. Such authoring tools should provide means to allow a user to encode her/his privacy concerns into enforceable security configurations. Besides the importance of having such tools being user-friendly, they have to ensure that policies have no negative impact on the system or the user. Depending on the domain, several evaluation criteria may be important to validate the outcomes of access control policy management activities. We see the interrelation between privacy and information system effectiveness factors as especially important when managing shared electronic health-records and therefore define them as evaluation criteria in this context. Evaluation of privacy criteria have to support the user in matching her/his personal conception of privacy with the preferences currently enforced through corresponding policies. If awareness about the promoted privacy of those policies towards the user can be established, she/he is encouraged to reconsider and adapt access control preferences in case it is required. On the other hand, if the evaluation suggests no issues with the user policy, she/he can be assured about the appropriateness of the enforced privacy settings. The use of electronic health-records is originally motivated by lowering the costs of medical treatments or medical research as well as to increase the overall effectiveness of the healthcare enterprises. Effectiveness is increased as healthcare information systems can store and provide a holistic and long-term view of a patient’s health status, which can be used e.g., to support a practitioner during a treatment session. As different stakeholders in the medical domain require access to these 18 more pages are available in the full version of this document, which may be purchased using the \"Add to Cart\" button on the product's webpage: www.igi-global.com/article/managing-privacy-effectivenesspatient-administered/72875?camid=4v1 This title is available in InfoSci-Journals, InfoSci-Journal Disciplines Medicine, Healthcare, and Life Science. Recommend this product to your librarian: www.igi-global.com/e-resources/libraryrecommendation/?id=2","PeriodicalId":162417,"journal":{"name":"Int. J. Comput. Model. Algorithms Medicine","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Managing Privacy and Effectiveness of Patient-Administered Authorization Policies\",\"authors\":\"Thomas Trojer, Basel Katt, R. Breu, T. Schabetsberger, Richard Mair\",\"doi\":\"10.4018/jcmam.2012040103\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A central building block of data privacy is the individual right of information self-determination. Following from that when dealing with shared electronic health records (SEHR), citizens, as the identified individuals of such records, have to be enabled to decide what medical data can be used in which way by medical professionals. In this context individual preferences of privacy have to be reflected by authorization policies to control access to personal health data. There are two potential challenges when enabling patient-controlled access control policy authoring: First, an ordinary citizen neither can be considered a security expert, nor does she or he have the expertise to fully understand typical activities and workflows within the health-care domain. Thus, a citizen is not necessarily aware of implications her or his access control settings have with regards to the protection of personal health data. Both privacy of citizen’s health-data and the overall effectiveness of a health-care information system are at risk if inadequate access control settings are in place. This paper refers to scenarios of a case study previously conducted and shows how privacy and information system effectiveness can be defined and evaluated in the context of SEHR. The paper describes an access control policy analysis method which evaluates a patient-administered access control policy by considering the mentioned evaluation criteria. DOI: 10.4018/jcmam.2012040103 44 International Journal of Computational Models and Algorithms in Medicine, 3(2), 43-62, April-June 2012 Copyright © 2012, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. ing block of privacy is the individual right to decide which data about oneself might be collected and stored and how data is supposed to be processed (OECD, 1980). Since 1983 this right, entitled informational self-determination is a fundamental right in German law1 (law of the German federal constitution (BVerfGE) 65, 1) and further is a substantial part of the European Data Protection Directive 95/46/EC (European Commission, 1995) established all over the European Union (EU) through corresponding national laws. Despite the right of individual users to participate in activities to control privacy-sensitive information, its implementation is difficult and poses at least the following challenges: An ordinary user is typically not considered a security expert and the actual definition or selection of appropriate authorization preferences requires the user to translate her/his mental conception of privacy into enforceable security configurations. Another issue comes with the impact userdefined settings of authorization may have to the user’s privacy or the resulting effectiveness of the health-care information system. Users, as the sole authors of access control statements, have to be made aware about the consequences there settings imply. Although issues regarding the authoring of access control settings have been well discussed in literature, e.g., by suggesting usable authoring tools, like the line of work done by Karat, Karat, Brodie, and Feng (2006) and Reeder, Karat, Karat, and Brodie (2007) proposes, little attention has been paid to the analysis of impact of access control policies to a specific type of information system. In this work we discuss the interrelationship between two specific criteria which can be used to evaluate access control settings enforced by a health-care information system. Further we derive resolution strategies which are proposed to a citizen to support her/him with resolving inadequate security. Domain Evaluation Criteria In order to support the management and protection of sensitive health-records, citizens have to be supported by usable policy authoring tools. Such authoring tools should provide means to allow a user to encode her/his privacy concerns into enforceable security configurations. Besides the importance of having such tools being user-friendly, they have to ensure that policies have no negative impact on the system or the user. Depending on the domain, several evaluation criteria may be important to validate the outcomes of access control policy management activities. We see the interrelation between privacy and information system effectiveness factors as especially important when managing shared electronic health-records and therefore define them as evaluation criteria in this context. Evaluation of privacy criteria have to support the user in matching her/his personal conception of privacy with the preferences currently enforced through corresponding policies. If awareness about the promoted privacy of those policies towards the user can be established, she/he is encouraged to reconsider and adapt access control preferences in case it is required. On the other hand, if the evaluation suggests no issues with the user policy, she/he can be assured about the appropriateness of the enforced privacy settings. The use of electronic health-records is originally motivated by lowering the costs of medical treatments or medical research as well as to increase the overall effectiveness of the healthcare enterprises. Effectiveness is increased as healthcare information systems can store and provide a holistic and long-term view of a patient’s health status, which can be used e.g., to support a practitioner during a treatment session. As different stakeholders in the medical domain require access to these 18 more pages are available in the full version of this document, which may be purchased using the \\\"Add to Cart\\\" button on the product's webpage: www.igi-global.com/article/managing-privacy-effectivenesspatient-administered/72875?camid=4v1 This title is available in InfoSci-Journals, InfoSci-Journal Disciplines Medicine, Healthcare, and Life Science. Recommend this product to your librarian: www.igi-global.com/e-resources/libraryrecommendation/?id=2\",\"PeriodicalId\":162417,\"journal\":{\"name\":\"Int. J. Comput. Model. Algorithms Medicine\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Int. J. Comput. Model. Algorithms Medicine\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/jcmam.2012040103\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Comput. Model. Algorithms Medicine","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/jcmam.2012040103","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

数据隐私的一个核心组成部分是个人信息自决权。据此,在处理共享电子健康记录(SEHR)时,必须使公民作为此类记录的确定个人能够决定医疗专业人员可以以何种方式使用哪些医疗数据。在这方面,个人对隐私的偏好必须反映在授权政策中,以控制对个人健康数据的访问。在启用由患者控制的访问控制策略创作时,存在两个潜在的挑战:首先,普通公民既不能被视为安全专家,也不具备充分了解医疗保健领域内典型活动和工作流的专业知识。因此,公民不一定知道她或他的访问控制设置对保护个人健康数据的影响。如果没有适当的访问控制设置,公民健康数据的隐私和卫生保健信息系统的整体有效性都将面临风险。本文引用了先前进行的案例研究的场景,并展示了如何在SEHR的背景下定义和评估隐私和信息系统的有效性。本文描述了一种访问控制策略分析方法,该方法利用上述评价标准对患者管理的访问控制策略进行评价。DOI: 10.4018 / jcmam。2012040103 44国际医学计算模型与算法学报,3(2),43-62,2012年4月-6月版权所有©2012,IGI Global。未经IGI Global书面许可,禁止以印刷或电子形式复制或分发。隐私权是指个人有权决定收集和存储关于自己的哪些数据以及如何处理数据(经合组织,1980年)。自1983年以来,这项被称为信息自决权的权利是德国法律(德国联邦宪法(BVerfGE) 65, 1)的一项基本权利,并且是欧洲数据保护指令95/46/EC(欧盟委员会,1995年)的重要组成部分,通过相应的国家法律在整个欧盟(EU)建立。尽管个人用户有权参与控制隐私敏感信息的活动,但其实现是困难的,并且至少带来了以下挑战:普通用户通常不被认为是安全专家,并且适当授权首选项的实际定义或选择要求用户将其对隐私的心理概念转换为可执行的安全配置。另一个问题是,用户定义的授权设置可能对用户隐私或医疗保健信息系统的有效性产生影响。用户作为访问控制语句的唯一作者,必须了解这些设置所隐含的后果。虽然关于访问控制设置的创建问题已经在文献中得到了很好的讨论,例如,通过提出可用的创建工具,如Karat, Karat, Brodie, and Feng(2006)和Reeder, Karat, Karat, and Brodie(2007)所做的工作,很少有人关注访问控制策略对特定类型信息系统的影响分析。在这项工作中,我们讨论了两个特定标准之间的相互关系,这两个标准可用于评估卫生保健信息系统强制执行的访问控制设置。此外,我们提出解决策略,以支持公民解决安全不足的问题。领域评估标准为了支持敏感健康记录的管理和保护,公民必须得到可用的政策制定工具的支持。这样的创作工具应该提供方法,允许用户将他/她的隐私问题编码到可执行的安全配置中。除了让这些工具对用户友好的重要性之外,它们还必须确保策略对系统或用户没有负面影响。根据领域的不同,有几个评估标准对于验证访问控制策略管理活动的结果可能很重要。我们认为隐私和信息系统有效性因素之间的相互关系在管理共享电子健康记录时尤为重要,因此将它们定义为这方面的评估标准。隐私标准的评估必须支持用户将其个人隐私概念与当前通过相应政策强制执行的偏好相匹配。如果能够建立用户对这些策略所促进的隐私的认识,则鼓励他/她在需要时重新考虑和调整访问控制首选项。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Managing Privacy and Effectiveness of Patient-Administered Authorization Policies
A central building block of data privacy is the individual right of information self-determination. Following from that when dealing with shared electronic health records (SEHR), citizens, as the identified individuals of such records, have to be enabled to decide what medical data can be used in which way by medical professionals. In this context individual preferences of privacy have to be reflected by authorization policies to control access to personal health data. There are two potential challenges when enabling patient-controlled access control policy authoring: First, an ordinary citizen neither can be considered a security expert, nor does she or he have the expertise to fully understand typical activities and workflows within the health-care domain. Thus, a citizen is not necessarily aware of implications her or his access control settings have with regards to the protection of personal health data. Both privacy of citizen’s health-data and the overall effectiveness of a health-care information system are at risk if inadequate access control settings are in place. This paper refers to scenarios of a case study previously conducted and shows how privacy and information system effectiveness can be defined and evaluated in the context of SEHR. The paper describes an access control policy analysis method which evaluates a patient-administered access control policy by considering the mentioned evaluation criteria. DOI: 10.4018/jcmam.2012040103 44 International Journal of Computational Models and Algorithms in Medicine, 3(2), 43-62, April-June 2012 Copyright © 2012, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. ing block of privacy is the individual right to decide which data about oneself might be collected and stored and how data is supposed to be processed (OECD, 1980). Since 1983 this right, entitled informational self-determination is a fundamental right in German law1 (law of the German federal constitution (BVerfGE) 65, 1) and further is a substantial part of the European Data Protection Directive 95/46/EC (European Commission, 1995) established all over the European Union (EU) through corresponding national laws. Despite the right of individual users to participate in activities to control privacy-sensitive information, its implementation is difficult and poses at least the following challenges: An ordinary user is typically not considered a security expert and the actual definition or selection of appropriate authorization preferences requires the user to translate her/his mental conception of privacy into enforceable security configurations. Another issue comes with the impact userdefined settings of authorization may have to the user’s privacy or the resulting effectiveness of the health-care information system. Users, as the sole authors of access control statements, have to be made aware about the consequences there settings imply. Although issues regarding the authoring of access control settings have been well discussed in literature, e.g., by suggesting usable authoring tools, like the line of work done by Karat, Karat, Brodie, and Feng (2006) and Reeder, Karat, Karat, and Brodie (2007) proposes, little attention has been paid to the analysis of impact of access control policies to a specific type of information system. In this work we discuss the interrelationship between two specific criteria which can be used to evaluate access control settings enforced by a health-care information system. Further we derive resolution strategies which are proposed to a citizen to support her/him with resolving inadequate security. Domain Evaluation Criteria In order to support the management and protection of sensitive health-records, citizens have to be supported by usable policy authoring tools. Such authoring tools should provide means to allow a user to encode her/his privacy concerns into enforceable security configurations. Besides the importance of having such tools being user-friendly, they have to ensure that policies have no negative impact on the system or the user. Depending on the domain, several evaluation criteria may be important to validate the outcomes of access control policy management activities. We see the interrelation between privacy and information system effectiveness factors as especially important when managing shared electronic health-records and therefore define them as evaluation criteria in this context. Evaluation of privacy criteria have to support the user in matching her/his personal conception of privacy with the preferences currently enforced through corresponding policies. If awareness about the promoted privacy of those policies towards the user can be established, she/he is encouraged to reconsider and adapt access control preferences in case it is required. On the other hand, if the evaluation suggests no issues with the user policy, she/he can be assured about the appropriateness of the enforced privacy settings. The use of electronic health-records is originally motivated by lowering the costs of medical treatments or medical research as well as to increase the overall effectiveness of the healthcare enterprises. Effectiveness is increased as healthcare information systems can store and provide a holistic and long-term view of a patient’s health status, which can be used e.g., to support a practitioner during a treatment session. As different stakeholders in the medical domain require access to these 18 more pages are available in the full version of this document, which may be purchased using the "Add to Cart" button on the product's webpage: www.igi-global.com/article/managing-privacy-effectivenesspatient-administered/72875?camid=4v1 This title is available in InfoSci-Journals, InfoSci-Journal Disciplines Medicine, Healthcare, and Life Science. Recommend this product to your librarian: www.igi-global.com/e-resources/libraryrecommendation/?id=2
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信