Today's digital information systems and applications collect every day a huge amount of personal health information (PHI) from sensor and surveillance systems, and every time we use personal computers or mobile phones. Collected data is processed in clouds, platforms and ecosystems by digital algorithms and machine learning. Pervasive technology, insufficient and ineffective privacy legislation, strong ICT industry and low political will to protect data subject's privacy have together made it almost impossible for a user to know what PHI is collected, how it is used and to whom it is disclosed. Service providers' and organizations' privacy policy documents are cumbersome and they do not guarantee that PHI is not misused. Instead, service us...
The developments and convergence of technology have generated a complex digital eco-systems that cre...
The rapid deployment of privacy-destroying technologies by governments and businesses threatens to m...
With the convergence of mobile communication, sensors and online social networks technologies, we ar...
Today’s digital information systems and applications collect every day a huge amount of personal hea...
People value their privacy. According to a survey conducted in the U.S., 90% of respondents viewed i...
Collections of computerised personal health data present a very real threat to privacy. Access contr...
\u3cp\u3eWearable self-tracking devices capture multidimensional health data and offer several advan...
From beginning to today, pHealth has been a data driven service that collects and uses personal heal...
In this paper we explore the extent to which privacy enhancing technologies (PETs) could be effectiv...
E-Health Systems today has its own challenges in terms of data security and data protection. The ove...
Wearable self-tracking devices capture multidimensional health data and offer several advantages inc...
More than ever before, the capability for individuals to track and improve their own health is widel...
Health data uses are on the rise. Increasingly more often, data are used for a variety of operationa...
The disparities inherent in various national privacy laws have come into sharper contrast as access ...
Abstract Public trust is paramount for the well functioning of data driven healthcare activities suc...
The developments and convergence of technology have generated a complex digital eco-systems that cre...
The rapid deployment of privacy-destroying technologies by governments and businesses threatens to m...
With the convergence of mobile communication, sensors and online social networks technologies, we ar...
Today’s digital information systems and applications collect every day a huge amount of personal hea...
People value their privacy. According to a survey conducted in the U.S., 90% of respondents viewed i...
Collections of computerised personal health data present a very real threat to privacy. Access contr...
\u3cp\u3eWearable self-tracking devices capture multidimensional health data and offer several advan...
From beginning to today, pHealth has been a data driven service that collects and uses personal heal...
In this paper we explore the extent to which privacy enhancing technologies (PETs) could be effectiv...
E-Health Systems today has its own challenges in terms of data security and data protection. The ove...
Wearable self-tracking devices capture multidimensional health data and offer several advantages inc...
More than ever before, the capability for individuals to track and improve their own health is widel...
Health data uses are on the rise. Increasingly more often, data are used for a variety of operationa...
The disparities inherent in various national privacy laws have come into sharper contrast as access ...
Abstract Public trust is paramount for the well functioning of data driven healthcare activities suc...
The developments and convergence of technology have generated a complex digital eco-systems that cre...
The rapid deployment of privacy-destroying technologies by governments and businesses threatens to m...
With the convergence of mobile communication, sensors and online social networks technologies, we ar...