0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
Status
Brand

Showing 1 - 9 of 9 matches in All Departments

Risky Business - Sharing Health Data While Protecting Privacy (Hardcover): Khaled El Emam Risky Business - Sharing Health Data While Protecting Privacy (Hardcover)
Khaled El Emam
R606 Discovery Miles 6 060 Ships in 12 - 17 working days

Due to the digitization of medical records, more and more health data is readily available. This dynamic has created many opportunities to unlock this information and use it to improve medical practice, and through research and surveillance understand the effectiveness and side effects of drugs and medical devices to ultimately improve the public's health. This data can also be used for commercial purposes such as sales and marketing. However, this newfound utility raises some profound questions about how this data ought to be used and how it will impact personal privacy. Unless we are able to address these privacy issues in a convincing and defensible way, there will be increased breaches of personal privacy. This will provoke regulators to impose new rules limiting the use and disclosure of health data for secondary purposes, patients increasingly to adopt privacy protective behaviours because they no longer trust how their health information is being managed, or healthcare providers to be reluctant to share their patients' data. By adopting responsible data sharing practices, researchers, companies and the general public can gain the benefits and the promise of big data analytics without sacrificing personal privacy or infringing upon law or regulation. Risky Business - Sharing Health Data While Protecting Privacy illustrates how this goal can be achieved. Bringing articles from a diverse collection of health data experts to inform the reader on contemporary policy, legal and technical issues surrounding health information privacy and data sharing. It is a uniquely practical work to inform the reader on how best - and how not to - share health data in the US and Canada.

Guide to the De-Identification of Personal Health Information (Paperback): Khaled El Emam Guide to the De-Identification of Personal Health Information (Paperback)
Khaled El Emam
R1,355 Discovery Miles 13 550 Ships in 12 - 17 working days

Offering compelling practical and legal reasons why de-identification should be one of the main approaches to protecting patients' privacy, the Guide to the De-Identification of Personal Health Information outlines a proven, risk-based methodology for the de-identification of sensitive health information. It situates and contextualizes this risk-based methodology and provides a general overview of its steps. The book supplies a detailed case for why de-identification is important as well as best practices to help you pin point when it is necessary to apply de-identification in the disclosure of personal health information. It also: Outlines practical methods for de-identification Describes how to measure re-identification risk Explains how to reduce the risk of re-identification Includes proofs and supporting reference material Focuses only on transformations proven to work on health information-rather than covering all possible approaches, whether they work in practice or not Rated the top systems and software engineering scholar worldwide by The Journal of Systems and Software, Dr. El Emam is one of only a handful of individuals worldwide qualified to de-identify personal health information for secondary use under the HIPAA Privacy Rule Statistical Standard. In this book Dr. El Emam explains how we can make health data more accessible-while protecting patients' privacy and complying with current regulations.

Guide to the De-Identification of Personal Health Information (Hardcover, New): Khaled El Emam Guide to the De-Identification of Personal Health Information (Hardcover, New)
Khaled El Emam
R3,580 Discovery Miles 35 800 Ships in 12 - 17 working days

Offering compelling practical and legal reasons why de-identification should be one of the main approaches to protecting patients' privacy, the Guide to the De-Identification of Personal Health Information outlines a proven, risk-based methodology for the de-identification of sensitive health information. It situates and contextualizes this risk-based methodology and provides a general overview of its steps. The book supplies a detailed case for why de-identification is important as well as best practices to help you pin point when it is necessary to apply de-identification in the disclosure of personal health information. It also: Outlines practical methods for de-identification Describes how to measure re-identification risk Explains how to reduce the risk of re-identification Includes proofs and supporting reference material Focuses only on transformations proven to work on health information-rather than covering all possible approaches, whether they work in practice or not Rated the top systems and software engineering scholar worldwide by The Journal of Systems and Software, Dr. El Emam is one of only a handful of individuals worldwide qualified to de-identify personal health information for secondary use under the HIPAA Privacy Rule Statistical Standard. In this book Dr. El Emam explains how we can make health data more accessible-while protecting patients' privacy and complying with current regulations.

Building an Anonymization Pipeline - Creating Safe Data (Paperback): Luk Arbuckle, Khaled El Emam Building an Anonymization Pipeline - Creating Safe Data (Paperback)
Luk Arbuckle, Khaled El Emam
R1,285 R1,017 Discovery Miles 10 170 Save R268 (21%) Ships in 10 - 15 working days

How can you use data in a way that protects individual privacy, but still ensures that data analytics will be useful and meaningful? With this practical book, data architects and engineers will learn how to implement and deploy anonymization solutions within a data collection pipeline. You'll establish and integrate secure, repeatable anonymization processes into your data flows and analytics in a sustainable manner. Luk Arbuckle and Khaled El Emam from Privacy Analytics explore end-to-end solutions for anonymizing data, based on data collection models and use cases enabled by real business needs. These examples come from some of the most demanding data environments, using approaches that have stood the test of time.

Practical Synthetic Data Generation - Balancing Privacy and the Broad Availability of Data (Paperback): Khaled El Emam, Lucy... Practical Synthetic Data Generation - Balancing Privacy and the Broad Availability of Data (Paperback)
Khaled El Emam, Lucy Mosquera, Richard Hoptroff
R1,214 R1,063 Discovery Miles 10 630 Save R151 (12%) Ships in 12 - 17 working days

Building and testing machine learning models requires access to large and diverse data. But where can you find usable datasets without running into privacy issues? This practical book introduces techniques for generating synthetic data-fake data generated from real data-so you can perform secondary analysis to do research, understand customer behaviors, develop new products, or generate new revenue Data scientists will learn how synthetic data generation provides a way to make such data broadly available for secondary purposes while addressing many privacy concerns. Analysts will learn the principles and steps for generating synthetic data from real datasets. And business leaders will see how synthetic data can help accelerate time to a product or solution. This book describes: Steps for generating synthetic data using multivariate normal distributions Methods for distribution fitting covering different goodness-of-fit metrics How to replicate the simple structure of original data An approach for modeling data structure to consider complex relationships Multiple approaches and metrics you can use to assess data utility How analysis performed on real data can be replicated with synthetic data Privacy implications of synthetic data and methods to assess identity disclosure

Anonymizing Health Data (Paperback): Khaled El Emam Anonymizing Health Data (Paperback)
Khaled El Emam; Contributions by Luk Arbuckle
R931 Discovery Miles 9 310 Ships in 10 - 15 working days

With this practical book, you will learn proven methods for anonymizing health data to help your organization share meaningful datasets, without exposing patient identity. Leading experts Khaled El Emam and Luk Arbuckle walk you through a risk-based methodology, using case studies from their efforts to de-identify hundreds of datasets.

Clinical data is valuable for research and other types of analytics, but making it anonymous without compromising data quality is tricky. This book demonstrates techniques for handling different data types, based on the authors' experiences with a maternal-child registry, inpatient discharge abstracts, health insurance claims, electronic medical record databases, and the World Trade Center disaster registry, among others.Understand different methods for working with cross-sectional and longitudinal datasetsAssess the risk of adversaries who attempt to re-identify patients in anonymized datasetsReduce the size and complexity of massive datasets without losing key information or jeopardizing privacyUse methods to anonymize unstructured free-form text dataMinimize the risks inherent in geospatial data, without omitting critical location-based health informationLook at ways to anonymize coding information in health dataLearn the challenge of anonymously linking related datasets

Information Resources Security and Risk Management (Hardcover, New edition): Key Hamacher, Khaled El Emam Information Resources Security and Risk Management (Hardcover, New edition)
Key Hamacher, Khaled El Emam
R3,426 R2,007 Discovery Miles 20 070 Save R1,419 (41%) Ships in 9 - 15 working days
Risky Business - Sharing Health Data While Protecting Privacy (Paperback): Khaled El Emam Risky Business - Sharing Health Data While Protecting Privacy (Paperback)
Khaled El Emam
R414 Discovery Miles 4 140 Ships in 10 - 15 working days

Due to the digitization of medical records, more and more health data is readily available. This dynamic has created many opportunities to unlock this information and use it to improve medical practice, and through research and surveillance understand the effectiveness and side effects of drugs and medical devices to ultimately improve the public's health. This data can also be used for commercial purposes such as sales and marketing. However, this newfound utility raises some profound questions about how this data ought to be used and how it will impact personal privacy. Unless we are able to address these privacy issues in a convincing and defensible way, there will be increased breaches of personal privacy. This will provoke regulators to impose new rules limiting the use and disclosure of health data for secondary purposes, patients increasingly to adopt privacy protective behaviours because they no longer trust how their health information is being managed, or healthcare providers to be reluctant to share their patients' data. By adopting responsible data sharing practices, researchers, companies and the general public can gain the benefits and the promise of big data analytics without sacrificing personal privacy or infringing upon law or regulation. Risky Business - Sharing Health Data While Protecting Privacy illustrates how this goal can be achieved. Bringing articles from a diverse collection of health data experts to inform the reader on contemporary policy, legal and technical issues surrounding health information privacy and data sharing. It is a uniquely practical work to inform the reader on how best - and how not to - share health data in the US and Canada.

The ROI from Software Quality (Hardcover): Khaled El Emam The ROI from Software Quality (Hardcover)
Khaled El Emam
R2,976 Discovery Miles 29 760 Ships in 12 - 17 working days

The ROI from Software Quality provides the tools needed for software engineers and project managers to calculate how much they should invest in quality, what benefits the investment will reap, and just how quickly those benefits will be realized. This text provides the quantitative models necessary for making real and reasonable calculations and it shows how to perform ROI analysis before and after implementing a quality program. The book demonstrates how to collect the appropriate data and easily perform the appropriate ROI analysis. Taking an evidence-based approach, this book supports its methodology with large amounts of data and backs up its positioning with numerous case studies and straightforward return-on-investment calculations. By carefully substantiating arguments, this volume separates itself from other works on ROI.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Bestway Inflatable Donut Ring
R120 R105 Discovery Miles 1 050
Leisure Quip Melamine Look Dinner Plate…
R39 R35 Discovery Miles 350
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Womens 2-Piece Fitness Gym Gloves…
R129 Discovery Miles 1 290
Gold Fresh Couture by Moschino EDP 100ml…
R845 Discovery Miles 8 450
Harry Potter Wizard Wand - In…
 (3)
R800 Discovery Miles 8 000
Multi Colour Animal Print Neckerchief
R119 Discovery Miles 1 190
Loot
Nadine Gordimer Paperback  (2)
R383 R318 Discovery Miles 3 180
Loot
Nadine Gordimer Paperback  (2)
R383 R318 Discovery Miles 3 180
Cool Kids Oxford Analogue Watch (Black)
R176 Discovery Miles 1 760

 

Partners