{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T12:05:47Z","timestamp":1777896347898,"version":"3.51.4"},"reference-count":77,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T00:00:00Z","timestamp":1722211200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100014193","name":"National Funds through the FCT\u2014Foundation for Science and Technology, I.P.","doi-asserted-by":"publisher","award":["UIDB\/05583\/2020"],"award-info":[{"award-number":["UIDB\/05583\/2020"]}],"id":[{"id":"10.13039\/501100014193","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100014193","name":"National Funds through the FCT\u2014Foundation for Science and Technology, I.P.","doi-asserted-by":"publisher","award":["CEECINST\/00077\/2021"],"award-info":[{"award-number":["CEECINST\/00077\/2021"]}],"id":[{"id":"10.13039\/501100014193","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Center in Digital Services (CISeD)","award":["UIDB\/05583\/2020"],"award-info":[{"award-number":["UIDB\/05583\/2020"]}]},{"name":"Research Center in Digital Services (CISeD)","award":["CEECINST\/00077\/2021"],"award-info":[{"award-number":["CEECINST\/00077\/2021"]}]},{"name":"Instituto Polit\u00e9cnico de Viseu","award":["UIDB\/05583\/2020"],"award-info":[{"award-number":["UIDB\/05583\/2020"]}]},{"name":"Instituto Polit\u00e9cnico de Viseu","award":["CEECINST\/00077\/2021"],"award-info":[{"award-number":["CEECINST\/00077\/2021"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"abstract":"<jats:p>Data privacy and ethical considerations ensure the security of databases by respecting individual rights while upholding ethical considerations when collecting, managing, and using information. Nowadays, despite having regulations that help to protect citizens and organizations, we have been presented with thousands of instances of data breaches, unauthorized access, and misuse of data related to such individuals and organizations. In this paper, we propose ethical considerations and best practices associated with critical data and the role of the database administrator who helps protect data. First, we suggest best practices for database administrators regarding data minimization, anonymization, pseudonymization and encryption, access controls, data retention guidelines, and stakeholder communication. Then, we present a case study that illustrates the application of these ethical implementations and best practices in a real-world scenario, showing the approach in action and the benefits of privacy. Finally, the study highlights the importance of a comprehensive approach to deal with data protection challenges and provides valuable insights for future research and developments in this field.<\/jats:p>","DOI":"10.3390\/jcp4030024","type":"journal-article","created":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T18:04:59Z","timestamp":1722535499000},"page":"494-517","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Data Privacy and Ethical Considerations in Database Management"],"prefix":"10.3390","volume":"4","author":[{"given":"Eduardo","family":"Pina","sequence":"first","affiliation":[{"name":"Department of Informatics, Polytechnic of Viseu, 3504-510 Viseu, Portugal"}]},{"given":"Jos\u00e9","family":"Ramos","sequence":"additional","affiliation":[{"name":"Department of Informatics, Polytechnic of Viseu, 3504-510 Viseu, Portugal"}]},{"given":"Henrique","family":"Jorge","sequence":"additional","affiliation":[{"name":"Department of Informatics, Polytechnic of Viseu, 3504-510 Viseu, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1745-8937","authenticated-orcid":false,"given":"Paulo","family":"V\u00e1z","sequence":"additional","affiliation":[{"name":"Research Center in Digital Services, Polytechnic of Viseu, 3504-510 Viseu, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7285-8282","authenticated-orcid":false,"given":"Jos\u00e9","family":"Silva","sequence":"additional","affiliation":[{"name":"Research Center in Digital Services, Polytechnic of Viseu, 3504-510 Viseu, Portugal"}]},{"given":"Cristina","family":"Wanzeller","sequence":"additional","affiliation":[{"name":"Research Center in Digital Services, Polytechnic of Viseu, 3504-510 Viseu, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9011-0734","authenticated-orcid":false,"given":"Maryam","family":"Abbasi","sequence":"additional","affiliation":[{"name":"Applied Research Institute, Polytechnic of Coimbra, 3045-093 Coimbra, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2118-1440","authenticated-orcid":false,"given":"Pedro","family":"Martins","sequence":"additional","affiliation":[{"name":"Research Center in Digital Services, Polytechnic of Viseu, 3504-510 Viseu, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2024,7,29]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1299","DOI":"10.1007\/s11747-022-00845-y","article-title":"Digital technologies: Tensions in privacy and data","volume":"50","author":"Quach","year":"2022","journal-title":"J. Acad. Mark. Sci."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Janic, M., Wijbenga, J.P., and Veugen, T. (2013, January 29). Transparency enhancing tools (TETs): An overview. Proceedings of the 2013 Third Workshop on Socio-Technical Aspects in Security and Trust, New Orleans, LA, USA.","DOI":"10.1109\/STAST.2013.11"},{"key":"ref_3","unstructured":"IT Governance Privacy Team (2020). Eu General Data Protection Regulation (Gdpr)\u2014An Implementation and Compliance Guide, IT Governance Ltd."},{"key":"ref_4","unstructured":"European Parliament and Council of the European Union (2016). General Data Protection Regulation. Off. J. Eur. Union, 59, L119\/1\u2013L119\/88."},{"key":"ref_5","first-page":"191","article-title":"Health Insurance Portability and Accountability Act","volume":"104","author":"Act","year":"2023","journal-title":"Public Law"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Thapa, C., and Camtepe, S. (2021). Precision health data: Requirements, challenges and existing techniques for data security and privacy. Comput. Biol. Med., 129.","DOI":"10.1016\/j.compbiomed.2020.104130"},{"key":"ref_7","first-page":"1","article-title":"Consent through the lens of semantics: State of the art survey and best practices","volume":"15","author":"Kurteva","year":"2021","journal-title":"Semant. Web"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"115","DOI":"10.58496\/MJCSC\/2023\/016","article-title":"A Comprehensive Review of Security Measures in Database Systems: Assessing Authentication, Access Control, and Beyond","volume":"2023","author":"Omotunde","year":"2023","journal-title":"Mesopotamian J. Cybersecur."},{"key":"ref_9","unstructured":"Stair, R.M., and Reynolds, G.W. (2018). Fundamentals of Information Systems, Cengage Learning."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Hulkower, R., Penn, M., and Schmit, C. (2020). Privacy and confidentiality of public health information. Public Health Informatics and Information Systems, Springer.","DOI":"10.1007\/978-3-030-41215-9_9"},{"key":"ref_11","unstructured":"Patil, P. (2024, July 15). Healthcare Dataset, 2023. Available online: https:\/\/www.kaggle.com\/datasets\/prasad22\/healthcare-dataset."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Ranganathan, R., Kumar, G.S., and Angel, T.S. (2023, January 21\u201323). A Tool for Database Masking and Anonymization of PostgreSQL. Proceedings of the 2023 International Conference on Data Science, Agents & Artificial Intelligence (ICDSAAI), Chennai, India.","DOI":"10.1109\/ICDSAAI59313.2023.10452571"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"de Souza Rosa, A., and Lazarin, N.M. (2023, January 18\u201321). Uma an\u00e1lise de desempenho de fun\u00e7\u00f5es de encripta\u00e7\u00e3o nativas de SGDBs Open Source. Proceedings of the Anais Estendidos do XXIII Simp\u00f3sio Brasileiro em Seguran\u00e7a da Informa\u00e7\u00e3o e de Sistemas Computacionais, Juiz de Fora, Brazil.","DOI":"10.5753\/sbseg_estendido.2023.233641"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"84","DOI":"10.32628\/IJSRSET19629","article-title":"A Study on Models and Techniques of Anonymization in Data Publishing","volume":"6","author":"Sharma","year":"2019","journal-title":"Int. J. Sci. Res. Sci. Eng. Technol. IJSRSET"},{"key":"ref_15","first-page":"59","article-title":"Data Anonymization Process Challenges and Context","volume":"15","author":"Tahir","year":"2023","journal-title":"Int. J. Database Manag. Syst. (IJDMS)"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Galdon Clavell, G., Mart\u00edn Zamorano, M., Castillo, C., Smith, O., and Matic, A. (2020, January 7\u20139). Auditing Algorithms: On Lessons Learned and the Risks of Data Minimization. Proceedings of the AAAI\/ACM Conference on AI, Ethics, and Society, New York, NY, USA.","DOI":"10.1145\/3375627.3375852"},{"key":"ref_17","unstructured":"Heuer, H., and Breiter, A. (2018). Student Success Prediction and the Trade-Off between Big Data and Data Minimization. DeLFI 2018\u2014Die 16. E-Learning Fachtagung Informatik, Gesellschaft f\u00fcr Informatik e.V."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.ijmedinf.2010.10.016","article-title":"A methodology for the pseudonymization of medical data","volume":"80","author":"Neubauer","year":"2011","journal-title":"Int. J. Med. Inform."},{"key":"ref_19","unstructured":"Nadeem, A., and Javed, M. (2005, January 27\u201328). A Performance Comparison of Data Encryption Algorithms. Proceedings of the 2005 International Conference on Information and Communication Technologies, Karachi, Pakistan."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1023\/A:1025001627419","article-title":"Strategic and Ethical Considerations in Managing Digital Privacy","volume":"46","author":"Sarathy","year":"2003","journal-title":"J. Bus. Ethics"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Shabani, M. (2021). The Data Governance Act and the EU\u2019s move towards facilitating data sharing. Mol. Syst. Biol., 17.","DOI":"10.15252\/msb.202110229"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Schreiber, K., Pommerening, P., and Schoel, P. (2024, July 20). New Data Governance Act. A Practitioner\u2019s Guide. Available online: https:\/\/www.nomos-elibrary.de\/10.5771\/9783748937050\/new-data-governance-act?page=1.","DOI":"10.5771\/9783748937050"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"758","DOI":"10.1017\/err.2021.8","article-title":"A New Order: The Digital Services Act and Consumer Protection","volume":"12","author":"Cauffman","year":"2021","journal-title":"Eur. J. Risk Regul."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Veale, M., and Borgesius, F.Z. (2021). Demystifying the Draft EU Artificial Intelligence Act. arXiv.","DOI":"10.31235\/osf.io\/38p5f"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1504\/IJBDM.2020.106886","article-title":"A review on ethical concerns in big data management","volume":"81","author":"Nair","year":"2020","journal-title":"Int. J. Big Data Manag."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"de Carvalho Ramos, A. (2017). The Right to Be Forgotten and the Indirect Control of Consumer Databases. Consumer Law and Socioeconomic Development: National and International Dimensions, Springer.","DOI":"10.1007\/978-3-319-55624-6_25"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"55551","DOI":"10.22214\/ijraset.2023.55551","article-title":"Preserving Privacy and Security: A Comparative Study of Health Data Regulations\u2014GDPR vs. HIPAA","volume":"11","author":"Shah","year":"2023","journal-title":"Int. J. Res. Appl. Sci. Eng. Technol."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1927495:1","DOI":"10.1155\/2019\/1927495","article-title":"Healthcare Data Security Technology: HIPAA Compliance","volume":"2019","author":"Mbonihankuye","year":"2019","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Chiou, L., and Tucker, C. (2017). Search Engines and Data Retention: Implications for Privacy and Antitrust, National Bureau of Economic Research. Working Paper 23815.","DOI":"10.3386\/w23815"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1080\/01972240252818216","article-title":"Data Retention and the Panoptic Society: The Social Benefits of Forgetfulness","volume":"18","author":"Blanchette","year":"2002","journal-title":"Inf. Soc."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Ausloos, J. (2020). Conditions of the Right to Erasure. The Right to Erasure in EU Data Protection Law, Oxford University Press.","DOI":"10.1093\/oso\/9780198847977.001.0001"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1080\/10811680.2023.2180266","article-title":"Applying the Purpose Limitation Principle in Smart-City Data-Processing Practices: A European Data Protection Law Perspective","volume":"28","author":"Faisal","year":"2023","journal-title":"Commun. Law Policy"},{"key":"ref_33","unstructured":"Shanmugam, D., Shabanian, S., D\u00edaz, F., Finck, M., and Biega, A.J. (2021). Learning to Limit Data Collection via Scaling Laws: Data Minimization Compliance in Practice. arXiv."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"416","DOI":"10.21552\/edpl\/2019\/3\/17","article-title":"Practitioner\u2019s Corner Data Erasure under the GDPR\u2014Steps towards Compliance","volume":"5","author":"Enzmann","year":"2019","journal-title":"Eur. Data Prot. Law Rev."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Naguib, A., and Fouad, K.M. (2024, January 6\u20137). Database Security: Current Challenges and Effective Protection Strategies. Proceedings of the 2024 6th International Conference on Computing and Informatics (ICCI), New Cairo, Egypt.","DOI":"10.1109\/ICCI61671.2024.10485182"},{"key":"ref_36","unstructured":"Tyagi, A.K. (2023). Privacy Preservation and Secured Data Storage in Cloud Computing, IGI Global."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"e210290","DOI":"10.1148\/ryai.210290","article-title":"Mitigating Bias in Radiology Machine Learning: 1. Data Handling","volume":"45","author":"Rouzrokh","year":"2022","journal-title":"Radiol. Artif. Intell."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1080\/03081079.2023.2173749","article-title":"Methods and tools for healthcare data anonymization: A literature review","volume":"52","author":"Vovk","year":"2023","journal-title":"Int. J. Gen. Syst."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Marques, J.F., and Bernardino, J. (2020, January 2\u20134). Analysis of Data Anonymization Techniques. Proceedings of the 12th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management (IC3K 2020)\u2014Volume 2: KEOD, Virtual.","DOI":"10.5220\/0010142302350241"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Al-Zubaidie, M., Zhang, Z., and Zhang, J. (2019). PAX: Using Pseudonymization and Anonymization to Protect Patients\u2019 Identities and Data in the Healthcare System. Int. J. Environ. Res. Public Health, 16.","DOI":"10.3390\/ijerph16091490"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"1256","DOI":"10.1109\/JSTSP.2015.2425798","article-title":"Privacy or Utility in Data Collection? A Contract Theoretic Approach","volume":"9","author":"Xu","year":"2015","journal-title":"IEEE J. Sel. Top. Signal Process."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"2172","DOI":"10.1109\/JBHI.2020.3028454","article-title":"A Pseudonymisation Protocol With Implicit and Explicit Consent Routes for Health Records in Federated Ledgers","volume":"25","author":"Pedrosa","year":"2020","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Domingo-Ferrer, J., and Muralidhar, K. (2015). New directions in anonymization: Permutation paradigm, verifiability by subjects and intruders, transparency to users. arXiv.","DOI":"10.1016\/j.ins.2015.12.014"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1049\/ecej:19930052","article-title":"Modern data encryption","volume":"5","author":"Boyd","year":"1993","journal-title":"Electron. Commun. Eng. J."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"148","DOI":"10.30865\/jurikom.v7i1.1943","article-title":"Implementasi Algoritma AES Untuk Pengamanan Login Dan Data Customer Pada E-Commerce Berbasis Web","volume":"7","author":"Mustika","year":"2020","journal-title":"J. Ris. Komput."},{"key":"ref_46","first-page":"29","article-title":"Design and Implementation a new Security Hash Algorithm based on MD5 and SHA-256","volume":"6","author":"Roshdy","year":"2013","journal-title":"Int. J. Eng. Sci. Emerg. Technol."},{"key":"ref_47","unstructured":"MD5 LLC (2024, July 22). MD5 Hashing, 2009. Available online: https:\/\/www.md5online.org\/."},{"key":"ref_48","first-page":"287","article-title":"A comprehensive review of the security flaws of hashing algorithms","volume":"19","author":"Rafe","year":"2023","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"ref_49","unstructured":"Turner, S., and Chen, L. (2024, July 25). Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms. Available online: https:\/\/www.rfc-editor.org\/rfc\/rfc6151.html."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Prasanna, S.R., and Premananda, B. (2021, January 27\u201328). Performance Analysis of MD5 and SHA-256 Algorithms to Maintain Data Integrity. Proceedings of the 2021 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT), Bangalore, India.","DOI":"10.1109\/RTEICT52294.2021.9573660"},{"key":"ref_51","first-page":"175","article-title":"Combination of AES (Advanced Encryption Standard) and SHA256 Algorithms for Data Security in Bill Payment Applications","volume":"2","author":"Rabtsani","year":"2024","journal-title":"SAGA J. Technol. Inf. Syst."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"1060","DOI":"10.1109\/TC.2004.45","article-title":"Information security tools and practices: What works?","volume":"53","author":"Ryan","year":"2004","journal-title":"IEEE Trans. Comput."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/1057977.1057979","article-title":"Access control in collaborative systems","volume":"37","author":"Tolone","year":"2005","journal-title":"ACM Comput. Surv."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"1456","DOI":"10.1111\/j.1475-6773.2010.01141.x","article-title":"Balancing access to health data and privacy: A review of the issues and approaches for the future","volume":"45","author":"Lane","year":"2010","journal-title":"Health Serv. Res."},{"key":"ref_55","first-page":"1784","article-title":"Organizational Transparency","volume":"42","author":"Schnackenberg","year":"2016","journal-title":"J. Manag."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"1143","DOI":"10.54648\/COLA2018095","article-title":"Teaching fairness to artificial intelligence: Existing and novel strategies against algorithmic discrimination under EU law","volume":"55","author":"Hacker","year":"2018","journal-title":"Common Mark. Law Rev."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1109\/TDSC.2012.26","article-title":"Ensuring Distributed Accountability for Data Sharing in the Cloud","volume":"9","author":"Sundareswaran","year":"2012","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_58","unstructured":"International Agency for Research on Cancer (2023). Effective and transparent communication with target populations and other stakeholders. Best Practices in Cervical Screening Programmes: Audit of Cancers, Legal and Ethical Frameworks, Communication, and Workforce Competencies, International Agency for Research on Cancer. Chapter 3."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/j.is.2014.12.004","article-title":"The usage of best practices and procedures in the database community","volume":"49","author":"Holt","year":"2015","journal-title":"Inf. Syst."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Semantha, F.H., Azam, S., Shanmugam, B., and Yeo, K.C. (2023). PbDinEHR: A Novel Privacy by Design Developed Framework Using Distributed Data Storage and Sharing for Secure and Scalable Electronic Health Records Management. J. Sens. Actuator Netw., 12.","DOI":"10.3390\/jsan12020036"},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Rantung, V.P., and Kainde, Q.C. (2015, January 17\u201318). Database design for agile stakeholder communication. Proceedings of the 2015 1st International Conference on Wireless and Telematics (ICWT), Manado, Indonesia.","DOI":"10.1109\/ICWT.2015.7449210"},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1080\/1062726X.2014.908722","article-title":"Trust Me, Trust Me Not: An Experimental Analysis of the Effect of Transparency on Organizations","volume":"26","author":"Auger","year":"2014","journal-title":"J. Public Relat. Res."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"2172","DOI":"10.1056\/NEJMra1411250","article-title":"Enduring and emerging challenges of informed consent","volume":"372","author":"Grady","year":"2015","journal-title":"N. Engl. J. Med."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Ortega-Rodr\u00edguez, C., Licer\u00e1n-Guti\u00e9rrez, A., and Moreno-Albarrac\u00edn, A.L. (2020). Transparency as a Key Element in Accountability in Non-Profit Organizations: A Systematic Literature Review. Sustainability, 12.","DOI":"10.3390\/su12145834"},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1177\/026839620001500304","article-title":"An exploratory study of information systems in support of employee empowerment","volume":"15","author":"Psoinos","year":"2000","journal-title":"J. Inf. Technol."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Micheletti, N., Marchesi, R., Kuo, N.I.H., Barbieri, S., Jurman, G., and Osmani, V. (2023). Generative AI Mitigates Representation Bias Using Synthetic Health Data. medRxiv.","DOI":"10.1101\/2023.09.26.23296163"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"e043497","DOI":"10.1136\/bmjopen-2020-043497","article-title":"Can synthetic data be a proxy for real clinical trial data? A validation study","volume":"11","author":"Azizi","year":"2021","journal-title":"BMJ Open"},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Iqbal, S., Wallach, J., Khoury, M., Schully, S., and Ioannidis, J. (2016). Reproducible Research Practices and Transparency across the Biomedical Literature. PLoS Biol., 14.","DOI":"10.1371\/journal.pbio.1002333"},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Chauhan, P., Bongo, L.A., and Pedersen, E. (2023). Ethical Challenges of Using Synthetic Data. Proc. Aaai Symp. Ser.","DOI":"10.1609\/aaaiss.v1i1.27490"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"1008","DOI":"10.1007\/s12559-021-09881-2","article-title":"Investigating Gender Bias in BERT","volume":"13","author":"Bhardwaj","year":"2020","journal-title":"Cogn. Comput."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1038\/ejhg.2014.71","article-title":"Dynamic consent: A patient interface for twenty-first century research networks","volume":"23","author":"Kaye","year":"2014","journal-title":"Eur. J. Hum. Genet."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.neucom.2019.12.136","article-title":"Generation and evaluation of privacy preserving synthetic health data","volume":"416","author":"Yale","year":"2020","journal-title":"Neurocomputing"},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Esteves, B., Asgarinia, H., Penedo, A.C., Mutiro, B., and Lewis, D. (2022, January 9). Fostering trust with transparency in the data economy era: An integrated ethical, legal, and knowledge engineering approach. Proceedings of the 1st International Workshop on Data Economy, Rome, Italy.","DOI":"10.1145\/3565011.3569061"},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Zhan, W.D., Jin, B., Xu, H., and Dong, C. (2022, January 2\u20133). Data Security Management Based on Transparent Encryption Policy. Proceedings of the 2022 IEEE 2nd International Conference on Mobile Networks and Wireless Communications (ICMNWC), Tumkur, Karnataka, India.","DOI":"10.1109\/ICMNWC56175.2022.10032001"},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"1","DOI":"10.14445\/22312803\/IJCTT-V71I6P101","article-title":"Industry best practices on implementing oracle cloud ERP security","volume":"71","author":"Kunduru","year":"2023","journal-title":"Int. J. Comput. Trends Technol."},{"key":"ref_76","unstructured":"Kaigai (2024, July 25). SEPostgreSQL Introduction. Available online: https:\/\/github.com\/kaigai\/sepostgresql."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3312750","article-title":"Data Transparency with Blockchain and AI Ethics","volume":"11","author":"Bertino","year":"2019","journal-title":"J. Data Inf. Qual. (JDIQ)"}],"container-title":["Journal of Cybersecurity and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2624-800X\/4\/3\/24\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T15:25:51Z","timestamp":1760109951000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2624-800X\/4\/3\/24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,29]]},"references-count":77,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["jcp4030024"],"URL":"https:\/\/doi.org\/10.3390\/jcp4030024","relation":{},"ISSN":["2624-800X"],"issn-type":[{"value":"2624-800X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,29]]}}}