biomedical data: their acquisition, storage & use. - security and privacy
DESCRIPTION
Introduction to some essential Concepts for Biomedical Computing. Focus on Security and Privacy.TRANSCRIPT
![Page 2: Biomedical Data: Their Acquisition, Storage & Use. - Security and Privacy](https://reader035.vdocuments.us/reader035/viewer/2022062319/554b401db4c905b5378b4adb/html5/thumbnails/2.jpg)
Data
Information
KNOWLEDGE
Biomedical Data: Their Acquisition, Storage & Use
The Data-to-Knowledge Spectrum (data, information, knowledge)
CONSTANTLY EVOLVING CYCLE : KNOWLEDGE CHANGES
![Page 3: Biomedical Data: Their Acquisition, Storage & Use. - Security and Privacy](https://reader035.vdocuments.us/reader035/viewer/2022062319/554b401db4c905b5378b4adb/html5/thumbnails/3.jpg)
EXAMPLE:
Data is the raw facts obtained e.g. My blood pressure is 150/90.
Information is outcome of analyzing data e.g.: My blood pressure is high.
Knowledge is obtained from analyzing information e.g. hypertension is diagnosed when blood pressure is higher that 150/90.
![Page 4: Biomedical Data: Their Acquisition, Storage & Use. - Security and Privacy](https://reader035.vdocuments.us/reader035/viewer/2022062319/554b401db4c905b5378b4adb/html5/thumbnails/4.jpg)
Essential Concepts for Biomedical Computing
Hardware
o Servers // Many Users interacting
o Personal Computers // One User
o Workstations // One user – difference with PCs is: higher performance and better processing for specific tasks
![Page 5: Biomedical Data: Their Acquisition, Storage & Use. - Security and Privacy](https://reader035.vdocuments.us/reader035/viewer/2022062319/554b401db4c905b5378b4adb/html5/thumbnails/5.jpg)
SERVERS
![Page 6: Biomedical Data: Their Acquisition, Storage & Use. - Security and Privacy](https://reader035.vdocuments.us/reader035/viewer/2022062319/554b401db4c905b5378b4adb/html5/thumbnails/6.jpg)
WORKSTATION
![Page 7: Biomedical Data: Their Acquisition, Storage & Use. - Security and Privacy](https://reader035.vdocuments.us/reader035/viewer/2022062319/554b401db4c905b5378b4adb/html5/thumbnails/7.jpg)
PC, Tablets
& Mobile
![Page 8: Biomedical Data: Their Acquisition, Storage & Use. - Security and Privacy](https://reader035.vdocuments.us/reader035/viewer/2022062319/554b401db4c905b5378b4adb/html5/thumbnails/8.jpg)
Essential Concepts for Biomedical Computing
Software
o Programming Languages (MUMPS | Java, C, Perl, PSL…)
o Data Management
o Operating Systems
o Database Management Systems
o Software for Network Communication
![Page 9: Biomedical Data: Their Acquisition, Storage & Use. - Security and Privacy](https://reader035.vdocuments.us/reader035/viewer/2022062319/554b401db4c905b5378b4adb/html5/thumbnails/9.jpg)
BiomedicalComputing:Security
![Page 10: Biomedical Data: Their Acquisition, Storage & Use. - Security and Privacy](https://reader035.vdocuments.us/reader035/viewer/2022062319/554b401db4c905b5378b4adb/html5/thumbnails/10.jpg)
Privacy, Confidentiality, and Security
o Privacy: Control of disclosure of personal health and other information
o Confidentiality: Ability of a person to release or not their personal health information to a doctor, a care provider etc.
E.g. Asking to limit further release or use of the given information
o Security: Protection of Privacy and confidentiality through a series of policies, procedures and safeguards. Control access to the systems and informations
![Page 11: Biomedical Data: Their Acquisition, Storage & Use. - Security and Privacy](https://reader035.vdocuments.us/reader035/viewer/2022062319/554b401db4c905b5378b4adb/html5/thumbnails/11.jpg)
Essential Concepts for Biomedical Computing
Maintaining Security: Parameters
o Availability
o Accountability
o Perimeter
o Role-limited access
o Comprehensibility and control
![Page 12: Biomedical Data: Their Acquisition, Storage & Use. - Security and Privacy](https://reader035.vdocuments.us/reader035/viewer/2022062319/554b401db4c905b5378b4adb/html5/thumbnails/12.jpg)
Maintaining Security: Parameters
o Availability: Ensures accurate and up to date information is available when needed.
o Accountability: Users are responsible for their access and usage of the data. Based on a documented “need to know” and “right to know”
o Perimeter definition: Allows the system to set boundaries of trusted access to an information on the system both physically and logically
![Page 13: Biomedical Data: Their Acquisition, Storage & Use. - Security and Privacy](https://reader035.vdocuments.us/reader035/viewer/2022062319/554b401db4c905b5378b4adb/html5/thumbnails/13.jpg)
Maintaining Security: Parameters
o Role-limited access: Enables access for personnel to only access the information they need and limits access beyond their legitimate need.
o Comprehensibility and control: Ensures that record owners, data stewards and patients can understand and have control over aspects of information confidentiality and access.
![Page 14: Biomedical Data: Their Acquisition, Storage & Use. - Security and Privacy](https://reader035.vdocuments.us/reader035/viewer/2022062319/554b401db4c905b5378b4adb/html5/thumbnails/14.jpg)
New Definition:
Data Stewards Vs Data Custodians
Data Stewards are responsible for what is stored in a data field, while Data Custodians are responsible for the technical environment and database structure.
![Page 15: Biomedical Data: Their Acquisition, Storage & Use. - Security and Privacy](https://reader035.vdocuments.us/reader035/viewer/2022062319/554b401db4c905b5378b4adb/html5/thumbnails/15.jpg)
INFORMATION SYSTEM: Simplified Diagram
![Page 16: Biomedical Data: Their Acquisition, Storage & Use. - Security and Privacy](https://reader035.vdocuments.us/reader035/viewer/2022062319/554b401db4c905b5378b4adb/html5/thumbnails/16.jpg)
ISs can be described as organizational and management solutions to challenges posed by the environment.
Organization
Technology
ManagementInformatio
nSystem