Robert Gött, Sebastian Stäubert, Alexander Strübing, Alfred Winter, Angela Merzweiler, Björn Bergh, Knut Kaulke, Thomas Bahls, Wolfgang Hoffmann, Martin Bialke
{"title":"[3] lgm2ihe:符合数据保护要求的研究基础设施——理论与面向实践的系统比较。","authors":"Robert Gött, Sebastian Stäubert, Alexander Strübing, Alfred Winter, Angela Merzweiler, Björn Bergh, Knut Kaulke, Thomas Bahls, Wolfgang Hoffmann, Martin Bialke","doi":"10.1055/a-1950-2791","DOIUrl":null,"url":null,"abstract":"<p><strong>Objectives: </strong>The TMF (Technology, Methods, and Infrastructure for Networked Medical Research) Data Protection Guide (TMF-DP) makes path-breaking recommendations on the subject of data protection in research projects. It includes comprehensive requirements for applications such as patient lists, pseudonymization services, and consent management services. Nevertheless, it lacks a structured, categorized list of requirements for simplified application in research projects and systematic evaluation. The 3LGM2IHE (\"Three-layer Graphbased meta model - Integrating the Healthcare Enterprise [IHE] \" ) project is funded by the German Research Foundation (DFG). 3LGM2IHE aims to define modeling paradigms and implement modeling tools for planning health care information systems. In addition, one of the goals is to create and publish 3LGM<sup>2</sup> information system architecture design patterns (short \"design patterns\") for the community as design models in terms of a framework. A structured list of data protection-related requirements based on the TMF-DP is a precondition to integrate functions (3LGM<sup>2</sup> Domain Layer) and building blocks (3LGM<sup>2</sup> Logical Tool Layer) in 3LGM<sup>2</sup> design patterns.</p><p><strong>Methods: </strong>In order to structure the continuous text of the TMF-DP, requirement types were defined in a first step. In a second step, dependencies and delineations of the definitions were identified. In a third step, the requirements from the TMF-DP were systematically extracted. Based on the identified lists of requirements, a fourth step included the comparison of the identified requirements with exemplary open source tools as provided by the \"Independent Trusted Third Party of the University Medicine Greifswald\" (TTP tools).</p><p><strong>Results: </strong>As a result, four lists of requirements were created, which contain requirements for the \"patient list\", the \"pseudonymization service\", and the \"consent management\", as well as cross-component requirements from the TMF-DP chapter 6 in a structured form. Further to requirements (1), possible variants (2) of implementations (to fulfill a single requirement) and recommendations (3) were identified. A comparison of the requirements lists with the functional scopes of the open source tools E-PIX (record linkage), gPAS (pseudonym management), and gICS (consent management) has shown that these fulfill more than 80% of the requirements.</p><p><strong>Conclusions: </strong>A structured set of data protection-related requirements facilitates a systematic evaluation of implementations with respect to the fulfillment of the TMF-DP guidelines. These re-usable lists provide a decision aid for the selection of suitable tools for new research projects. As a result, these lists form the basis for the development of data protection-related 3LGM<sup>2</sup> design patterns as part of the 3LGM2IHE project.</p>","PeriodicalId":49822,"journal":{"name":"Methods of Information in Medicine","volume":"61 S 02","pages":"e134-e148"},"PeriodicalIF":1.3000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ftp.ncbi.nlm.nih.gov/pub/pmc/oa_pdf/d1/2e/10-1055-a-1950-2791.PMC9788907.pdf","citationCount":"0","resultStr":"{\"title\":\"3LGM2IHE: Requirements for Data-Protection-Compliant Research Infrastructures-A Systematic Comparison of Theory and Practice-Oriented Implementation.\",\"authors\":\"Robert Gött, Sebastian Stäubert, Alexander Strübing, Alfred Winter, Angela Merzweiler, Björn Bergh, Knut Kaulke, Thomas Bahls, Wolfgang Hoffmann, Martin Bialke\",\"doi\":\"10.1055/a-1950-2791\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p><strong>Objectives: </strong>The TMF (Technology, Methods, and Infrastructure for Networked Medical Research) Data Protection Guide (TMF-DP) makes path-breaking recommendations on the subject of data protection in research projects. It includes comprehensive requirements for applications such as patient lists, pseudonymization services, and consent management services. Nevertheless, it lacks a structured, categorized list of requirements for simplified application in research projects and systematic evaluation. The 3LGM2IHE (\\\"Three-layer Graphbased meta model - Integrating the Healthcare Enterprise [IHE] \\\" ) project is funded by the German Research Foundation (DFG). 3LGM2IHE aims to define modeling paradigms and implement modeling tools for planning health care information systems. In addition, one of the goals is to create and publish 3LGM<sup>2</sup> information system architecture design patterns (short \\\"design patterns\\\") for the community as design models in terms of a framework. A structured list of data protection-related requirements based on the TMF-DP is a precondition to integrate functions (3LGM<sup>2</sup> Domain Layer) and building blocks (3LGM<sup>2</sup> Logical Tool Layer) in 3LGM<sup>2</sup> design patterns.</p><p><strong>Methods: </strong>In order to structure the continuous text of the TMF-DP, requirement types were defined in a first step. In a second step, dependencies and delineations of the definitions were identified. In a third step, the requirements from the TMF-DP were systematically extracted. Based on the identified lists of requirements, a fourth step included the comparison of the identified requirements with exemplary open source tools as provided by the \\\"Independent Trusted Third Party of the University Medicine Greifswald\\\" (TTP tools).</p><p><strong>Results: </strong>As a result, four lists of requirements were created, which contain requirements for the \\\"patient list\\\", the \\\"pseudonymization service\\\", and the \\\"consent management\\\", as well as cross-component requirements from the TMF-DP chapter 6 in a structured form. Further to requirements (1), possible variants (2) of implementations (to fulfill a single requirement) and recommendations (3) were identified. A comparison of the requirements lists with the functional scopes of the open source tools E-PIX (record linkage), gPAS (pseudonym management), and gICS (consent management) has shown that these fulfill more than 80% of the requirements.</p><p><strong>Conclusions: </strong>A structured set of data protection-related requirements facilitates a systematic evaluation of implementations with respect to the fulfillment of the TMF-DP guidelines. These re-usable lists provide a decision aid for the selection of suitable tools for new research projects. As a result, these lists form the basis for the development of data protection-related 3LGM<sup>2</sup> design patterns as part of the 3LGM2IHE project.</p>\",\"PeriodicalId\":49822,\"journal\":{\"name\":\"Methods of Information in Medicine\",\"volume\":\"61 S 02\",\"pages\":\"e134-e148\"},\"PeriodicalIF\":1.3000,\"publicationDate\":\"2022-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://ftp.ncbi.nlm.nih.gov/pub/pmc/oa_pdf/d1/2e/10-1055-a-1950-2791.PMC9788907.pdf\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Methods of Information in Medicine\",\"FirstCategoryId\":\"3\",\"ListUrlMain\":\"https://doi.org/10.1055/a-1950-2791\",\"RegionNum\":4,\"RegionCategory\":\"医学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Methods of Information in Medicine","FirstCategoryId":"3","ListUrlMain":"https://doi.org/10.1055/a-1950-2791","RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
摘要
目标:TMF(网络医学研究的技术、方法和基础设施)数据保护指南(TMF- dp)就研究项目中的数据保护主题提出了开创性的建议。它包括对患者名单、假名服务和同意管理服务等应用程序的全面需求。然而,它缺乏一个结构化的、分类的需求清单,以简化研究项目的应用和系统的评估。3LGM2IHE(“基于三层图的元模型-集成医疗保健企业[IHE]”)项目由德国研究基金会(DFG)资助。3LGM2IHE旨在定义建模范例并实现规划医疗保健信息系统的建模工具。此外,目标之一是为社区创建和发布3LGM2信息系统体系结构设计模式(简称“设计模式”),作为框架方面的设计模型。基于TMF-DP的数据保护相关需求的结构化列表是在3LGM2设计模式中集成功能(3LGM2域层)和构建块(3LGM2逻辑工具层)的先决条件。方法:为了构造TMF-DP的连续文本,首先定义需求类型。在第二步中,确定了定义的依赖关系和描述。在第三步中,系统地提取来自TMF-DP的需求。基于已确定的需求列表,第四步包括将已确定的需求与“University Medicine Greifswald的独立可信第三方”(TTP工具)提供的示范性开源工具进行比较。结果:创建了四个需求列表,其中包含“患者列表”,“假名服务”和“同意管理”的需求,以及TMF-DP第6章中以结构化形式的跨组件需求。除了需求(1)之外,还确定了实现的可能变体(2)(以满足单个需求)和建议(3)。将需求列表与开源工具E-PIX(记录链接)、gPAS(假名管理)和gICS(同意管理)的功能范围进行比较表明,这些工具满足了80%以上的需求。结论:一组结构化的数据保护相关需求有助于对TMF-DP指南的实现进行系统评估。这些可重复使用的列表为新研究项目选择合适的工具提供了决策辅助。因此,作为3LGM2IHE项目的一部分,这些列表构成了开发与数据保护相关的3LGM2设计模式的基础。
3LGM2IHE: Requirements for Data-Protection-Compliant Research Infrastructures-A Systematic Comparison of Theory and Practice-Oriented Implementation.
Objectives: The TMF (Technology, Methods, and Infrastructure for Networked Medical Research) Data Protection Guide (TMF-DP) makes path-breaking recommendations on the subject of data protection in research projects. It includes comprehensive requirements for applications such as patient lists, pseudonymization services, and consent management services. Nevertheless, it lacks a structured, categorized list of requirements for simplified application in research projects and systematic evaluation. The 3LGM2IHE ("Three-layer Graphbased meta model - Integrating the Healthcare Enterprise [IHE] " ) project is funded by the German Research Foundation (DFG). 3LGM2IHE aims to define modeling paradigms and implement modeling tools for planning health care information systems. In addition, one of the goals is to create and publish 3LGM2 information system architecture design patterns (short "design patterns") for the community as design models in terms of a framework. A structured list of data protection-related requirements based on the TMF-DP is a precondition to integrate functions (3LGM2 Domain Layer) and building blocks (3LGM2 Logical Tool Layer) in 3LGM2 design patterns.
Methods: In order to structure the continuous text of the TMF-DP, requirement types were defined in a first step. In a second step, dependencies and delineations of the definitions were identified. In a third step, the requirements from the TMF-DP were systematically extracted. Based on the identified lists of requirements, a fourth step included the comparison of the identified requirements with exemplary open source tools as provided by the "Independent Trusted Third Party of the University Medicine Greifswald" (TTP tools).
Results: As a result, four lists of requirements were created, which contain requirements for the "patient list", the "pseudonymization service", and the "consent management", as well as cross-component requirements from the TMF-DP chapter 6 in a structured form. Further to requirements (1), possible variants (2) of implementations (to fulfill a single requirement) and recommendations (3) were identified. A comparison of the requirements lists with the functional scopes of the open source tools E-PIX (record linkage), gPAS (pseudonym management), and gICS (consent management) has shown that these fulfill more than 80% of the requirements.
Conclusions: A structured set of data protection-related requirements facilitates a systematic evaluation of implementations with respect to the fulfillment of the TMF-DP guidelines. These re-usable lists provide a decision aid for the selection of suitable tools for new research projects. As a result, these lists form the basis for the development of data protection-related 3LGM2 design patterns as part of the 3LGM2IHE project.
期刊介绍:
Good medicine and good healthcare demand good information. Since the journal''s founding in 1962, Methods of Information in Medicine has stressed the methodology and scientific fundamentals of organizing, representing and analyzing data, information and knowledge in biomedicine and health care. Covering publications in the fields of biomedical and health informatics, medical biometry, and epidemiology, the journal publishes original papers, reviews, reports, opinion papers, editorials, and letters to the editor. From time to time, the journal publishes articles on particular focus themes as part of a journal''s issue.