Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 8.796
Filtrar
1.
Bioinformatics ; 40(Suppl 2): ii198-ii207, 2024 09 01.
Artigo em Inglês | MEDLINE | ID: mdl-39230698

RESUMO

MOTIVATION: In the realm of precision medicine, effective patient stratification and disease subtyping demand innovative methodologies tailored for multi-omics data. Clustering techniques applied to multi-omics data have become instrumental in identifying distinct subgroups of patients, enabling a finer-grained understanding of disease variability. Meanwhile, clinical datasets are often small and must be aggregated from multiple hospitals. Online data sharing, however, is seen as a significant challenge due to privacy concerns, potentially impeding big data's role in medical advancements using machine learning. This work establishes a powerful framework for advancing precision medicine through unsupervised random forest-based clustering in combination with federated computing. RESULTS: We introduce a novel multi-omics clustering approach utilizing unsupervised random forests. The unsupervised nature of the random forest enables the determination of cluster-specific feature importance, unraveling key molecular contributors to distinct patient groups. Our methodology is designed for federated execution, a crucial aspect in the medical domain where privacy concerns are paramount. We have validated our approach on machine learning benchmark datasets as well as on cancer data from The Cancer Genome Atlas. Our method is competitive with the state-of-the-art in terms of disease subtyping, but at the same time substantially improves the cluster interpretability. Experiments indicate that local clustering performance can be improved through federated computing. AVAILABILITY AND IMPLEMENTATION: The proposed methods are available as an R-package (https://github.com/pievos101/uRF).


Assuntos
Medicina de Precisão , Humanos , Análise por Conglomerados , Medicina de Precisão/métodos , Aprendizado de Máquina não Supervisionado , Aprendizado de Máquina , Neoplasias , Privacidade , Algoritmos , Algoritmo Florestas Aleatórias
2.
BMC Res Notes ; 17(1): 259, 2024 Sep 12.
Artigo em Inglês | MEDLINE | ID: mdl-39267127

RESUMO

BACKGROUND: Respecting the dignity of child labor is one of their most urgent needs. In many cases, the dignity of child labor is not maintained in countries with unfavorable economic conditions. The aim of the present study was understand adolescents' perceptions of their dignity in child labor. METHODS: This study is a qualitative research with conventional content analysis approach. Twenty teenagers who having work experience as child labor were selected from one welfare center and three charity centers in using purposeful sampling method in 2022-2023. Data was generated through individual, deep, and semi-structured interviews. In order to analyze the data was used Granheim and Lundman's method. RESULTS: Three main themes were presented in this study including, "preservation of privacy and security", "honoring individual identity to develop dignity" and "comprehensive support", and 9 categories. CONCLUSION: understand adolescents' perceptions as child labor of their dignity, privacy and security of child labor victims and respect for their identity and all-round support are defined. And in this supportive environment, the dignity of working children is preserved and appropriate behavioral consequences are created. Therefore, it is suggested that a cultural and institutional background be provided in which all components of the child labor's dignity are emphasized.


Assuntos
Trabalho Infantil , Pesquisa Qualitativa , Respeito , Humanos , Adolescente , Feminino , Masculino , Criança , Privacidade , Pessoalidade , Saúde Mental
3.
PLoS One ; 19(9): e0309990, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-39241088

RESUMO

Various methods such as k-anonymity and differential privacy have been proposed to safeguard users' private information in the publication of location service data. However, these typically employ a rigid "all-or-nothing" privacy standard that fails to accommodate users' more nuanced and multi-level privacy-related needs. Data is irrecoverable once anonymized, leading to a permanent reduction in location data quality, in turn significantly diminishing data utility. In the paper, a novel, bidirectional and multi-layered location privacy protection method based on attribute encryption is proposed. This method offers layered, reversible, and fine-grained privacy safeguards. A hierarchical privacy protection scheme incorporates various layers of dummy information, using an access structure tree to encrypt identifiers for these dummies. Multi-level location privacy protection is achieved after adding varying amounts of dummy information at different hierarchical levels N. This allows for precise control over the de-anonymization process, where users may adjust the granularity of anonymized data based on their own trust levels for multi-level location privacy protection. This method includes an access policy which functions via an attribute encryption-based access control system, generating decryption keys for data identifiers according to user attributes, facilitating a reversible transformation between data anonymity and de-anonymity. The complexities associated with key generation, distribution, and management are thus markedly reduced. Experimental comparisons with existing methods demonstrate that the proposed method effectively balances service quality and location privacy, providing users with multi-level and reversible privacy protection services.


Assuntos
Segurança Computacional , Privacidade , Humanos , Confidencialidade , Algoritmos
4.
PLoS One ; 19(9): e0309919, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-39240999

RESUMO

In location-based service (LBS), private information retrieval (PIR) is an efficient strategy used for preserving personal privacy. However, schemes with traditional strategy that constructed by information indexing are usually denounced by its processing time and ineffective in preserving the attribute privacy of the user. Thus, in order to cope with above two weaknesses, in this paper, based on the conception of ciphertext policy attribute-based encryption (CP-ABE), a PIR scheme based on CP-ABE is proposed for preserving the personal privacy in LBS (location privacy preservation scheme with CP-ABE based PIR, short for LPPCAP). In this scheme, query and feedback are encrypted with security two-parties calculation by the user and the LBS server, so as not to violate any personal privacy and decrease the processing time in encrypting the retrieved information. In addition, this scheme can also preserve the attribute privacy of users such as the query frequency as well as the moving manner. At last, we analyzed the availability and the privacy of the proposed scheme, and then several groups of comparison experiment are given, so that the effectiveness and the usability of proposed scheme can be verified theoretically, practically, and the quality of service is also preserved.


Assuntos
Segurança Computacional , Privacidade , Humanos , Armazenamento e Recuperação da Informação/métodos , Algoritmos , Confidencialidade
5.
Conserv Biol ; 38(5): e14341, 2024 Oct.
Artigo em Inglês | MEDLINE | ID: mdl-39248761

RESUMO

The surge in internet accessibility has transformed wildlife trade by facilitating the acquisition of wildlife through online platforms. This scenario presents unique ethical challenges for researchers, as traditional ethical frameworks for in-person research cannot be readily applied to the online realm. Currently, there is a lack of clearly defined guidelines for appropriate ethical procedures when conducting online wildlife trade (OWT) research. In response to this, we consulted the scientific literature on ethical considerations in online research and examined existing guidelines established by professional societies and ethical boards. Based on these documents, we present a set of recommendations that can inform the development of ethically responsible OWT research. Key ethical challenges in designing and executing OWT research include the violation of privacy rights, defining subjects and illegality, and the risk of misinterpretation or posing risks to participants when sharing data. Potential solutions include considering participants' expectations of privacy, defining when participants are authors versus subjects, understanding the legal and cultural context, minimizing data collection, ensuring anonymization, and removing metadata. Best practices also involve being culturally sensitive when analyzing and reporting findings. Adhering to these guidelines can help mitigate potential pitfalls and provides valuable insights to editors, researchers, and ethical review boards, enabling them to conduct scientifically rigorous and ethically responsible OWT research to advance this growing field.


Los retos éticos de la investigación del mercado virtual de fauna Resumen El incremento en el acceso al internet ha transformado el mercado de fauna ya que facilita la adquisición de ejemplares a través de plataformas virtuales. Este escenario representa un reto ético único para los investigadores, pues los marcos éticos tradicionales para la investigación en persona no pueden aplicarse fácilmente en línea. Actualmente no hay lineamientos claros para el procedimiento ético apropiado cuando se investiga el mercado virtual de fauna (MVF). Como respuesta, consultamos la literatura científica sobre las consideraciones éticas en la investigación en línea y analizamos los lineamientos existentes establecidos por las sociedades profesionales y los comités éticos. Con base en estos documentos, presentamos un conjunto de recomendaciones que pueden guiar el desarrollo de la investigación sobre el MVF con responsabilidad ética. Los retos más importantes para el diseño y ejecución de la investigación sobre el MVF incluyen la violación del derecho a la privacidad, la definición de los sujetos y la ilegalidad y el riesgo de malinterpretar o presentar riesgos para los participantes cuando se comparten datos. Las soluciones potenciales incluyen considerar las expectativas de privacidad de los participantes, definir cuándo los participantes son autores y cuándo sujetos, entender el contexto legal y cultural, minimizar la recolección de datos, asegurar el anonimato y eliminar los metadatos. Las mejores prácticas también involucran la sensibilidad cultural cuando se analizan y reportan los resultados. La adhesión a estos lineamientos puede mitigar los posibles retos y proporcionar información valiosa para los editores, investigadores y comités de ética, permitiéndoles realizar una investigación con rigor científico y responsabilidad ética sobre el MVF para avanzar en este campo creciente de investigación.


Assuntos
Animais Selvagens , Comércio , Conservação dos Recursos Naturais , Conservação dos Recursos Naturais/métodos , Comércio/ética , Animais , Internet , Privacidade , Ética em Pesquisa , Comércio de Vida Silvestre
6.
Stud Health Technol Inform ; 317: 270-279, 2024 Aug 30.
Artigo em Inglês | MEDLINE | ID: mdl-39234731

RESUMO

INTRODUCTION: A modern approach to ensuring privacy when sharing datasets is the use of synthetic data generation methods, which often claim to outperform classic anonymization techniques in the trade-off between data utility and privacy. Recently, it was demonstrated that various deep learning-based approaches are able to generate useful synthesized datasets, often based on domain-specific analyses. However, evaluating the privacy implications of releasing synthetic data remains a challenging problem, especially when the goal is to conform with data protection guidelines. METHODS: Therefore, the recent privacy risk quantification framework Anonymeter has been built for evaluating multiple possible vulnerabilities, which are specifically based on privacy risks that are considered by the European Data Protection Board, i.e. singling out, linkability, and attribute inference. This framework was applied to a synthetic data generation study from the epidemiological domain, where the synthesization replicates time and age trends previously found in data collected during the DONALD cohort study (1312 participants, 16 time points). The conducted privacy analyses are presented, which place a focus on the vulnerability of outliers. RESULTS: The resulting privacy scores are discussed, which vary greatly between the different types of attacks. CONCLUSION: Challenges encountered during their implementation and during the interpretation of their results are highlighted, and it is concluded that privacy risk assessment for synthetic data remains an open problem.


Assuntos
Segurança Computacional , Medição de Risco , Humanos , Estudos Longitudinais , Confidencialidade , Privacidade
7.
Stud Health Technol Inform ; 317: 261-269, 2024 Aug 30.
Artigo em Inglês | MEDLINE | ID: mdl-39234730

RESUMO

INTRODUCTION: Retrieving comprehensible rule-based knowledge from medical data by machine learning is a beneficial task, e.g., for automating the process of creating a decision support system. While this has recently been studied by means of exception-tolerant hierarchical knowledge bases (i.e., knowledge bases, where rule-based knowledge is represented on several levels of abstraction), privacy concerns have not been addressed extensively in this context yet. However, privacy plays an important role, especially for medical applications. METHODS: When parts of the original dataset can be restored from a learned knowledge base, there may be a practically and legally relevant risk of re-identification for individuals. In this paper, we study privacy issues of exception-tolerant hierarchical knowledge bases which are learned from data. We propose approaches for determining and eliminating privacy issues of the learned knowledge bases. RESULTS: We present results for synthetic as well as for real world datasets. CONCLUSION: The results show that our approach effectively prevents privacy breaches while only moderately decreasing the inference quality.


Assuntos
Confidencialidade , Bases de Conhecimento , Aprendizado de Máquina , Humanos , Segurança Computacional , Privacidade , Registros Eletrônicos de Saúde
8.
Medicine (Baltimore) ; 103(33): e39370, 2024 Aug 16.
Artigo em Inglês | MEDLINE | ID: mdl-39151500

RESUMO

With the rapid development of emerging information technologies such as artificial intelligence, cloud computing, and the Internet of Things, the world has entered the era of big data. In the face of growing medical big data, research on the privacy protection of personal information has attracted more and more attention, but few studies have analyzed and forecasted the research hotspots and future development trends on the privacy protection. Presently, to systematically and comprehensively summarize the relevant privacy protection literature in the context of big healthcare data, a bibliometric analysis was conducted to clarify the spatial and temporal distribution and research hotspots of privacy protection using the information visualization software CiteSpace. The literature papers related to privacy protection in the Web of Science were collected from 2012 to 2023. Through analysis of the time, author and countries distribution of relevant publications, we found that after 2013, research on the privacy protection has received increasing attention and the core institution of privacy protection research is the university, but the countries show weak cooperation. Additionally, keywords like privacy, big data, internet, challenge, care, and information have high centralities and frequency, indicating the research hotspots and research trends in the field of the privacy protection. All the findings will provide a comprehensive privacy protection research knowledge structure for scholars in the field of privacy protection research under the background of health big data, which can help them quickly grasp the research hotspots and choose future research projects.


Assuntos
Big Data , Segurança Computacional , Confidencialidade , Privacidade , Humanos , Bibliometria
9.
J Biomed Inform ; 157: 104712, 2024 Sep.
Artigo em Inglês | MEDLINE | ID: mdl-39182631

RESUMO

In today's era of rapid development of large models, the traditional drug development process is undergoing a profound transformation. The vast demand for data and consumption of computational resources are making independent drug discovery increasingly difficult. By integrating federated learning technology into the drug discovery field, we have found a solution that both protects privacy and shares computational power. However, the differences in data held by various pharmaceutical institutions and the diversity in drug design objectives have exacerbated the issue of data heterogeneity, making traditional federated learning consensus models unable to meet the personalized needs of all parties. In this study, we introduce and evaluate an innovative drug discovery framework, MolCFL, which utilizes a multi-layer perceptron (MLP) as the generator and a graph convolutional network (GCN) as the discriminator in a generative adversarial network (GAN). By learning the graph structure of molecules, it generates new molecules in a highly personalized manner and then optimizes the learning process by clustering federated learning, grouping compound data with high similarity. MolCFL not only enhances the model's ability to protect privacy but also significantly improves the efficiency and personalization of molecular design. MolCFL exhibits superior performance when handling non-independently and identically distributed data compared to traditional models. Experimental results show that the framework demonstrates outstanding performance on two benchmark datasets, with the generated new molecules achieving over 90% in Uniqueness and close to 100% in Novelty. MolCFL not only improves the quality and efficiency of drug molecule design but also, through its highly customized clustered federated learning environment, promotes collaboration and specialization in the drug discovery process while ensuring data privacy. These features make MolCFL a powerful tool suitable for addressing the various challenges faced in the modern drug research and development field.


Assuntos
Descoberta de Drogas , Descoberta de Drogas/métodos , Humanos , Redes Neurais de Computação , Aprendizado de Máquina , Algoritmos , Análise por Conglomerados , Privacidade , Medicina de Precisão/métodos
10.
Acta Psychol (Amst) ; 249: 104450, 2024 Sep.
Artigo em Inglês | MEDLINE | ID: mdl-39098215

RESUMO

Over the past decade, the rapid development of artificial intelligence has propelled the transition of autonomous vehicles from laboratories to real-world applications. However, autonomous vehicles are a long way from fully integrating into most people's lives. Previous studies indicate that the word-of-mouth effect is often used by consumers to determine the quality of innovative technologies. Word-of-mouth recommendation can not only increase the income of enterprises by attracting new customers, but also greatly reduce the promotion and publicity expenses of enterprises. Through the word-of-mouth effect, the intention to recommend can contribute to the growth of the autonomous driving market. Therefore, current research explores the mechanisms among the perceived risk of privacy safety, perceived defect, perceived behavioral control, intention to use, and intention to recommend through path analysis. Our findings, based on 433 online questionnaires, indicate that the perceived risk of privacy safety, perceived defects, and perceived behavioral control influence the intention to recommend. Notably, perceived risk of privacy safety and perceived defect directly affects the intention to recommend and also correlates with perceived behavioral control. These findings provide some empirical evidence for the recommendation of autonomous vehicles and the expansion of consumer groups.


Assuntos
Condução de Veículo , Intenção , Humanos , Projetos Piloto , Adulto , Masculino , Feminino , Adulto Jovem , Pessoa de Meia-Idade , Comportamento do Consumidor , Inquéritos e Questionários , Inteligência Artificial , Privacidade , Automóveis
11.
J Pediatr Health Care ; 38(5): 643-650, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-39162674

RESUMO

INTRODUCTION: This study explored sharenting's impact on children's privacy and factors influencing parental sharing. Limited knowledge raises concerns about children's rights in this growing phenomenon. METHOD: A quasi-experimental cross-sectional study included 411 parents (372 females, 39 males) with a mean age of 38.5 ± 10.5 years. Chi-square tests analyzed group differences; regression assessed the "sharenting practice" impact. RESULTS: Out of 411 parents, 67.2% (n = 247) shared photographs of their children on social media, whereas 32.8% (n = 164) did not share. Significant associations were found between sharenting and factors such as younger age (B = -0.06, p = .002), lower bachelor's degree level (B = 0.87, p < .001), higher internet addiction (B = 0.05, p < .001), and longer social media use (B = 0.17, p < .001). DISCUSSION: Understanding factors in sharenting's impact on children's rights is crucial. Our findings suggest sociodemographic factors, internet addiction, and social media duration influence sharenting. Health professionals can guide parents on responsible social media usage and digital literacy to protect their children's online privacy.


Assuntos
Transtorno de Adição à Internet , Pais , Mídias Sociais , Humanos , Feminino , Masculino , Estudos Transversais , Adulto , Mídias Sociais/estatística & dados numéricos , Transtorno de Adição à Internet/epidemiologia , Transtorno de Adição à Internet/psicologia , Criança , Pais/psicologia , Relações Pais-Filho , Fatores Sociodemográficos , Pessoa de Meia-Idade , Privacidade , Internet , Adolescente
12.
J Med Internet Res ; 26: e57309, 2024 Aug 29.
Artigo em Inglês | MEDLINE | ID: mdl-39207832

RESUMO

BACKGROUND: The COVID-19 pandemic gave rise to countless user-facing mobile apps to help fight the pandemic ("COVID-19 mitigation apps"). These apps have been at the center of data privacy discussions because they collect, use, and even retain sensitive personal data from their users (eg, medical records and location data). The US government ended its COVID-19 emergency declaration in May 2023, marking a unique time to comprehensively investigate how data privacy impacted people's acceptance of various COVID-19 mitigation apps deployed throughout the pandemic. OBJECTIVE: This research aims to provide insights into health data privacy regarding COVID-19 mitigation apps and policy recommendations for future deployment of public health mobile apps through the lens of data privacy. This research explores people's contextual acceptance of different types of COVID-19 mitigation apps by applying the privacy framework of contextual integrity. Specifically, this research seeks to identify the factors that impact people's acceptance of data sharing and data retention practices in various social contexts. METHODS: A mixed methods web-based survey study was conducted by recruiting a simple US representative sample (N=674) on Prolific in February 2023. The survey includes a total of 60 vignette scenarios representing realistic social contexts that COVID-19 mitigation apps could be used. Each survey respondent answered questions about their acceptance of 10 randomly selected scenarios. Three contextual integrity parameters (attribute, recipient, and transmission principle) and respondents' basic demographics are controlled as independent variables. Regression analysis was performed to determine the factors impacting people's acceptance of initial data sharing and data retention practices via these apps. Qualitative data from the survey were analyzed to support the statistical results. RESULTS: Many contextual integrity parameter values, pairwise combinations of contextual integrity parameter values, and some demographic features of respondents have a significant impact on their acceptance of using COVID-19 mitigation apps in various social contexts. Respondents' acceptance of data retention practices diverged from their acceptance of initial data sharing practices in some scenarios. CONCLUSIONS: This study showed that people's acceptance of using various COVID-19 mitigation apps depends on specific social contexts, including the type of data (attribute), the recipients of the data (recipient), and the purpose of data use (transmission principle). Such acceptance may differ between the initial data sharing and data retention practices, even in the same context. Study findings generated rich implications for future pandemic mitigation apps and the broader public health mobile apps regarding data privacy and deployment considerations.


Assuntos
COVID-19 , Aplicativos Móveis , Pandemias , Privacidade , COVID-19/prevenção & controle , COVID-19/epidemiologia , Humanos , Estados Unidos , Masculino , Inquéritos e Questionários , Adulto , Feminino , Pessoa de Meia-Idade , SARS-CoV-2 , Confidencialidade , Adulto Jovem
13.
Soc Sci Med ; 358: 117247, 2024 Oct.
Artigo em Inglês | MEDLINE | ID: mdl-39173292

RESUMO

Individual-level georeferenced data have been widely used in COVID-19 control measures around the world. Recent research observed that there is a trade-off relationship between people's privacy concerns and their acceptance of these control measures. However, whether this trade-off relationship exists across different cultural contexts is still unaddressed. Using data we collected via an international survey (n = 4260) and network analysis, our study found a substantial trade-off inter-relationship among people's privacy concerns, perceived social benefits, and acceptance across different control measures and study areas. People's privacy concerns in culturally tight societies (e.g., Japan) have the smallest negative impacts on their acceptance of pandemic control measures. The results also identify people's key views of specific control measures that can influence their views of other control measures. The impacts of these key views are heightened among participants with a conservative political view, high levels of perceived social tightness, and vertical individualism. Our results indicate that cultural factors are a key mechanism that mediate people's privacy concerns and their acceptance of pandemic control measures. These close inter-relationships lead to a double-edged sword effect: the increased positive impacts of people's acceptance and perceived social benefits also lead to increased negative impacts of privacy concerns in different combinations of control strategies. The findings highlight the importance of cultural factors as key determinants that affect people's acceptance or rejection of specific pandemic control measures.


Assuntos
COVID-19 , Privacidade , Humanos , COVID-19/prevenção & controle , COVID-19/psicologia , COVID-19/epidemiologia , Feminino , Masculino , Privacidade/psicologia , Adulto , Pessoa de Meia-Idade , Inquéritos e Questionários , SARS-CoV-2 , Pandemias , Comparação Transcultural , Idoso
14.
BMC Med Ethics ; 25(1): 88, 2024 Aug 10.
Artigo em Inglês | MEDLINE | ID: mdl-39127660

RESUMO

BACKGROUND: Personal Health Monitoring (PHM) has the potential to enhance soldier health outcomes. To promote morally responsible development, implementation, and use of PHM in the armed forces, it is important to be aware of the inherent ethical dimension of PHM. In order to improve the understanding of the ethical dimension, a scoping review of the existing academic literature on the ethical dimension of PHM was conducted. METHODS: Four bibliographical databases (Ovid/Medline, Embase.com, Clarivate Analytics/Web of Science Core Collection, and Elsevier/SCOPUS) were searched for relevant literature from their inception to June 1, 2023. Studies were included if they sufficiently addressed the ethical dimension of PHM and were related to or claimed relevance for the military. After selection and extraction, the data was analysed using a qualitative thematic approach. RESULTS: A total of 9,071 references were screened. After eligibility screening, 19 articles were included for this review. The review identifies and describes three categories reflecting the ethical dimension of PHM in the military: (1) utilitarian considerations, (2) value-based considerations, and (3) regulatory responsibilities. The four main values that have been identified as being of concern are those of privacy, security, trust, and autonomy. CONCLUSIONS: This review demonstrates that PHM in the armed forces is primarily approached from a utilitarian perspective, with a focus on its benefits, without explicit critical deliberation on PHM's potential moral downsides. Also, the review highlights a significant research gap with a specific lack of empirical studies focussing specifically on the ethical dimension of PHM. Awareness of the inherent ethical dimension of PHM in the military, including value conflicts and how to balance them, can help to contribute to a morally responsible development, implementation, and use of PHM in the armed forces.


Assuntos
Militares , Humanos , Privacidade , Autonomia Pessoal
15.
J Empir Res Hum Res Ethics ; 19(3): 113-123, 2024 Jul.
Artigo em Inglês | MEDLINE | ID: mdl-39096208

RESUMO

This research identifies the circumstances in which Human Research Ethics Committees (HRECs) are trusted by Australians to approve the use of genomic data - without express consent - and considers the impact of genomic data sharing settings, and respondent attributes, on public trust. Survey results (N = 3013) show some circumstances are more conducive to public trust than others, with waivers endorsed when future research is beneficial and when privacy is protected, but receiving less support in other instances. Still, results imply attitudes are influenced by more than these specific circumstances, with different data sharing settings, and participant attributes, affecting views. Ultimately, this research raises questions and concerns in relation to the criteria HRECs use when authorising waivers of consent in Australia.


Assuntos
Atitude , Comitês de Ética em Pesquisa , Genômica , Disseminação de Informação , Consentimento Livre e Esclarecido , Confiança , Humanos , Austrália , Genômica/ética , Masculino , Feminino , Adulto , Inquéritos e Questionários , Pessoa de Meia-Idade , Ética em Pesquisa , Privacidade , Idoso , Adulto Jovem , Opinião Pública , Adolescente , Confidencialidade
16.
BMC Med Res Methodol ; 24(1): 181, 2024 Aug 14.
Artigo em Inglês | MEDLINE | ID: mdl-39143466

RESUMO

BACKGROUND: Synthetic Electronic Health Records (EHRs) are becoming increasingly popular as a privacy enhancing technology. However, for longitudinal EHRs specifically, little research has been done into how to properly evaluate synthetically generated samples. In this article, we provide a discussion on existing methods and recommendations when evaluating the quality of synthetic longitudinal EHRs. METHODS: We recommend to assess synthetic EHR quality through similarity to real EHRs in low-dimensional projections, accuracy of a classifier discriminating synthetic from real samples, performance of synthetic versus real trained algorithms in clinical tasks, and privacy risk through risk of attribute inference. For each metric we discuss strengths and weaknesses, next to showing how it can be applied on a longitudinal dataset. RESULTS: To support the discussion on evaluation metrics, we apply discussed metrics on a dataset of synthetic EHRs generated from the Medical Information Mart for Intensive Care-IV (MIMIC-IV) repository. CONCLUSIONS: The discussion on evaluation metrics provide guidance for researchers on how to use and interpret different metrics when evaluating the quality of synthetic longitudinal EHRs.


Assuntos
Algoritmos , Registros Eletrônicos de Saúde , Registros Eletrônicos de Saúde/estatística & dados numéricos , Registros Eletrônicos de Saúde/normas , Humanos , Estudos Longitudinais , Privacidade
17.
Health Promot Int ; 39(4)2024 Aug 01.
Artigo em Inglês | MEDLINE | ID: mdl-39166487

RESUMO

Mobile health applications (mHealth apps) have surged in popularity for their role in promoting knowledge exchange and providing emotional support among health consumers. However, this enhanced social connectivity via these apps has led to an escalation in privacy breaches, potentially hindering user engagement. Drawing upon the communication privacy management theory, this study proposes a moderated mediation model to link social privacy concerns to user engagement in mHealth apps. An online survey involving 1149 mHealth app users was conducted in China to empirically validate the proposed model. Results indicated that social privacy concerns were negatively related to user engagement in mHealth apps, and perceived privacy of the app partially mediated this relationship. Moreover, perceived control positively moderated the indirect relationship between social privacy concerns and user engagement via perceived privacy. Specifically, the negative impact of social privacy concerns on perceived privacy was mitigated for users who reported higher levels of perceived control, indicating that when users feel more in control of their personal data, they are less affected by concerns over social privacy. Theoretically, this study has the potential to help scholars understand user engagement in mHealth apps from a privacy management perspective. Practically, the results of this study could assist mobile app providers and health professionals in devising evidence-based strategies to enhance social engagement and promote effective and sustainable use of mHealth apps among health consumers.


Assuntos
Aplicativos Móveis , Privacidade , Telemedicina , Humanos , Masculino , Feminino , Adulto , China , Inquéritos e Questionários , Pessoa de Meia-Idade , Adulto Jovem
18.
BMC Med Res Methodol ; 24(1): 190, 2024 Aug 29.
Artigo em Inglês | MEDLINE | ID: mdl-39210301

RESUMO

BACKGROUND: Distributed statistical analyses provide a promising approach for privacy protection when analyzing data distributed over several databases. Instead of directly operating on data, the analyst receives anonymous summary statistics, which are combined into an aggregated result. Further, in discrimination model (prognosis, diagnosis, etc.) development, it is key to evaluate a trained model w.r.t. to its prognostic or predictive performance on new independent data. For binary classification, quantifying discrimination uses the receiver operating characteristics (ROC) and its area under the curve (AUC) as aggregation measure. We are interested to calculate both as well as basic indicators of calibration-in-the-large for a binary classification task using a distributed and privacy-preserving approach. METHODS: We employ DataSHIELD as the technology to carry out distributed analyses, and we use a newly developed algorithm to validate the prediction score by conducting distributed and privacy-preserving ROC analysis. Calibration curves are constructed from mean values over sites. The determination of ROC and its AUC is based on a generalized linear model (GLM) approximation of the true ROC curve, the ROC-GLM, as well as on ideas of differential privacy (DP). DP adds noise (quantified by the ℓ 2 sensitivity Δ 2 ( f ^ ) ) to the data and enables a global handling of placement numbers. The impact of DP parameters was studied by simulations. RESULTS: In our simulation scenario, the true and distributed AUC measures differ by Δ AUC < 0.01 depending heavily on the choice of the differential privacy parameters. It is recommended to check the accuracy of the distributed AUC estimator in specific simulation scenarios along with a reasonable choice of DP parameters. Here, the accuracy of the distributed AUC estimator may be impaired by too much artificial noise added from DP. CONCLUSIONS: The applicability of our algorithms depends on the ℓ 2 sensitivity Δ 2 ( f ^ ) of the underlying statistical/predictive model. The simulations carried out have shown that the approximation error is acceptable for the majority of simulated cases. For models with high Δ 2 ( f ^ ) , the privacy parameters must be set accordingly higher to ensure sufficient privacy protection, which affects the approximation error. This work shows that complex measures, as the AUC, are applicable for validation in distributed setups while preserving an individual's privacy.


Assuntos
Algoritmos , Área Sob a Curva , Curva ROC , Humanos , Modelos Lineares , Modelos Estatísticos , Privacidade , Bases de Dados Factuais/estatística & dados numéricos
19.
Sci Rep ; 14(1): 20218, 2024 08 30.
Artigo em Inglês | MEDLINE | ID: mdl-39215022

RESUMO

In therapeutic diagnostics, early diagnosis and monitoring of heart disease is dependent on fast time-series MRI data processing. Robust encryption techniques are necessary to guarantee patient confidentiality. While deep learning (DL) algorithm have improved medical imaging, privacy and performance are still hard to balance. In this study, a novel approach for analyzing homomorphivally-encrypted (HE) time-series MRI data is introduced: The Multi-Faceted Long Short-Term Memory (MF-LSTM). This method includes privacy protection. The MF-LSTM architecture protects patient's privacy while accurately categorizing and forecasting cardiac disease, with accuracy (97.5%), precision (96.5%), recall (98.3%), and F1-score (97.4%). While segmentation methods help to improve interpretability by identifying important region in encrypted MRI images, Generalized Histogram Equalization (GHE) improves image quality. Extensive testing on selected dataset if encrypted time-series MRI images proves the method's stability and efficacy, outperforming previous approaches. The finding shows that the suggested technique can decode medical image to expose visual representation as well as sequential movement while protecting privacy and providing accurate medical image evaluation.


Assuntos
Cardiopatias , Imageamento por Ressonância Magnética , Privacidade , Humanos , Imageamento por Ressonância Magnética/métodos , Cardiopatias/diagnóstico por imagem , Segurança Computacional , Algoritmos , Processamento de Imagem Assistida por Computador/métodos , Feminino , Masculino , Aprendizado Profundo , Memória de Curto Prazo , Confidencialidade , Pessoa de Meia-Idade
20.
Sensors (Basel) ; 24(16)2024 Aug 08.
Artigo em Inglês | MEDLINE | ID: mdl-39204839

RESUMO

Federated learning (FL) has emerged as a pivotal paradigm for training machine learning models across decentralized devices while maintaining data privacy. In the healthcare domain, FL enables collaborative training among diverse medical devices and institutions, enhancing model robustness and generalizability without compromising patient privacy. In this paper, we propose DPS-GAT, a novel approach integrating graph attention networks (GATs) with differentially private client selection and resource allocation strategies in FL. Our methodology addresses the challenges of data heterogeneity and limited communication resources inherent in medical applications. By employing graph neural networks (GNNs), we effectively capture the relational structures among clients, optimizing the selection process and ensuring efficient resource distribution. Differential privacy mechanisms are incorporated, to safeguard sensitive information throughout the training process. Our extensive experiments, based on the Regensburg pediatric appendicitis open dataset, demonstrated the superiority of our approach, in terms of model accuracy, privacy preservation, and resource efficiency, compared to traditional FL methods. The ability of DPS-GAT to maintain a high and stable number of client selections across various rounds and differential privacy budgets has significant practical implications, indicating that FL systems can achieve strong privacy guarantees without compromising client engagement and model performance. This balance is essential for real-world applications where both privacy and performance are paramount. This study suggests a promising direction for more secure and efficient FL medical applications, which could improve patient care through enhanced predictive models and collaborative data utilization.


Assuntos
Aprendizado de Máquina , Redes Neurais de Computação , Humanos , Alocação de Recursos , Privacidade , Algoritmos
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA