Data Sharing and Privacy in Pharmaceutical Studies

被引:1
|
作者
Chen, Rufan [1 ,2 ]
Zhang, Yi [3 ]
Dou, Zuochao [1 ]
Chen, Feng [1 ]
Xie, Kang [4 ]
Wang, Shuang [1 ,5 ,6 ,7 ]
机构
[1] Hangzhou Nuowei Informat Technol Co Ltd, Dept Bioinformat, Hangzhou, Peoples R China
[2] Univ Queensland, Sch Med, Brisbane, Qld, Australia
[3] Shanghai Jiao Tong Univ, Xinhua Hosp, Sch Med, Dept Cardiol, Shanghai, Peoples R China
[4] Minist Publ Secur, Key Lab Informat Network Secur, Res Inst 3, Shanghai, Peoples R China
[5] West China Hosp, Inst Syst Genet, Chengdu, Sichuan, Peoples R China
[6] Indiana Univ, Sch Informat Comp & Engn, Bloomington, IN USA
[7] Tongji Univ, Shanghai Putuo Peoples Hosp, Shanghai, Peoples R China
关键词
Drug use; pharmacovigilance; data sharing; data privacy; ethics; policy; social netowork; DRUG-DRUG INTERACTIONS; HEALTH INFORMATION EXCHANGE; SOCIAL MEDIA DATA; BIG DATA; SAFETY SURVEILLANCE; PHARMACOVIGILANCE; PREVALENCE; SIGNALS; TWITTER; SECURE;
D O I
10.2174/1381612827999210112204732
中图分类号
R9 [药学];
学科分类号
1007 ;
摘要
Adverse drug events have been a long-standing concern for the wide-ranging harms to public health, and the substantial disease burden. The key to diminish or eliminate the impacts is to build a comprehensive pharmacovigilance system. Application of the "big data" approach has been proved to assist the detection of adverse drug events by involving previously unavailable data sources and promoting health information exchange. Even though challenges and potential risks still remain. The lack of effective privacy-preserving measures in the flow of medical data is the most important Accepted: one, where urgent actions are required to prevent the threats and facilitate the construction of pharmacovigilance systems. Several privacy protection methods are reviewed in this article, which may be helpful to break the barrier.
引用
收藏
页码:911 / 918
页数:8
相关论文
共 50 条
  • [21] Privacy Challenges and Solutions for Image Data Sharing
    Fan, Liyue
    2022 IEEE 4TH INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS, AND APPLICATIONS, TPS-ISA, 2022, : 55 - 57
  • [22] Techniques for Privacy Preserving Data Sharing: A Survey
    Nivetha, P. R.
    Selvi, Thamarai K.
    2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,
  • [23] Institutional Privacy Risks in Sharing DNS Data
    Imana, Basileal
    Korolova, Aleksandra
    Heidemann, John
    PROCEEDINGS OF THE 2021 APPLIED NETWORKING RESEARCH WORKSHOP, ANRW 2021, 2021, : 69 - 75
  • [24] Sharing data safely while preserving privacy
    Ursin, Giske
    Malila, Nea
    Chang-Claude, Jenny
    Gunter, Marc
    Kaaks, Rudolf
    Kampman, Ellen
    Lambe, Mats
    van Leeuwen, Flora
    Magnusson, Patrik
    Nilbert, Mef C.
    Romundstad, Pal R.
    Roosli, Martin
    Ryel, Anne Lise
    dos-Santos-Silva, Isabel
    Stenbeck, Magnus
    Storm, Hans H.
    Swerdlow, Anthony
    Vineis, Paolo
    Knudsen, Gun Peggy S.
    LANCET, 2019, 394 (10212): : 1902 - 1902
  • [25] Personalized privacy in open data sharing scenarios
    Sanchez, David
    Viejo, Alexandre
    ONLINE INFORMATION REVIEW, 2017, 41 (03) : 298 - 310
  • [26] Privacy, confidentiality, and data sharing: Issues and distinctions
    McMillen, D
    GOVERNMENT INFORMATION QUARTERLY, 2004, 21 (03) : 359 - 382
  • [27] An IoT data sharing privacy preserving scheme
    Sun, Yan
    Yin, Lihua
    Sun, Zhe
    Tian, Zhihong
    Du, Xiaojiang
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 984 - 990
  • [28] Medical data sharing and privacy: a false dichotomy?
    Ienca, Marcello
    SWISS MEDICAL WEEKLY, 2023, 153
  • [29] Assessing the Privacy Risks of Data Sharing in Genomics
    Heeney, C.
    Hawkins, N.
    de Vries, J.
    Boddington, P.
    Kaye, J.
    PUBLIC HEALTH GENOMICS, 2011, 14 (01) : 17 - 25
  • [30] Privacy Principles for Sharing Cyber Security Data
    Fisk, Gina
    Ardi, Calvin
    Pickett, Neale
    Heidemann, John
    Fisk, Mike
    Papadopoulos, Christos
    2015 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW), 2015, : 193 - 197