{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:36:00Z","timestamp":1761647760282},"reference-count":26,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,4,1]]},"abstract":"<p>Privacy is a major issue in information management for public health needs. For example, the surveillance of infectious diseases, such as HIV, is an important function of public health and it presents major privacy concerns for affected people. While their privacy must be protected, privacy concerns should not come in the way of effective data collection and surveillance. In this paper, the authors present a survey of published work covering privacy challenges in the use of eHealth systems, especially in the context of public health management. The authors identify and present the major privacy challenges, their effects on personal patient privacy and public health management based on the review of research in electronic data privacy and eHealth privacy. The authors also present a survey of privacy-preserving technologies and solutions that address these challenges.<\/p>","DOI":"10.4018\/jehmc.2010040102","type":"journal-article","created":{"date-parts":[[2010,7,1]],"date-time":"2010-07-01T00:08:25Z","timestamp":1277942905000},"page":"12-23","source":"Crossref","is-referenced-by-count":19,"title":["Privacy Challenges in the Use of eHealth Systems for Public Health Management"],"prefix":"10.4018","volume":"1","author":[{"given":"Karpurika","family":"Raychaudhuri","sequence":"first","affiliation":[{"name":"University of New South Wales, Australia"}]},{"given":"Pradeep","family":"Ray","sequence":"additional","affiliation":[{"name":"University of New South Wales, Australia"}]}],"member":"2432","reference":[{"key":"jehmc.2010040102-0","doi-asserted-by":"crossref","unstructured":"Ackerman, M. S., Cranor, L. F., & Reagle, J. (1999). Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences. In Proceedings of the 1st ACM conference on Electronic commerce, Denver, CO. New York: ACM Press.","DOI":"10.1145\/336992.336995"},{"key":"jehmc.2010040102-1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2006.09.016"},{"key":"jehmc.2010040102-2","doi-asserted-by":"crossref","unstructured":"Baker, D. B. (2006). Privacy and Security in Public Health: Maintaining the Delicate Balance between Personal Privacy and Population Safety. In Proceedings of the 22nd Annual Computer Security Applications Conference (Vol. 12, No. 1, pp. 3-22). Washington, DC: IEEE.","DOI":"10.1109\/ACSAC.2006.41"},{"key":"jehmc.2010040102-3","doi-asserted-by":"crossref","unstructured":"Chowdhury, A., & Ray, P. (2007). Privacy Management in Consumer e-health. Paper presented at HEALTHCOM 2007: Ubiquitous Health in Aging.","DOI":"10.1109\/HEALTH.2007.381598"},{"key":"jehmc.2010040102-4","unstructured":"Colliver, V. (2004). Software glitch reveals stranger's health history Kaiser applicant sees woman's information\u201d, San Francisco chronicle. Retrieved from www.sfgate.com\/cgiin\/article.cgi?file=\/chronicle\/archive\/2004\/03\/12\/BUGND5J3PR1.DTL"},{"key":"jehmc.2010040102-5","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.10.1.104"},{"key":"jehmc.2010040102-6","doi-asserted-by":"crossref","first-page":"33","DOI":"10.4018\/irmj.2001100104","article-title":"Internet Privacy: Interpreting Key Issues.","volume":"14","author":"G. S.Dhillon","year":"2001","journal-title":"Information Resources Management Journal"},{"key":"jehmc.2010040102-7","article-title":"Privacy: A Rational Context","author":"C.Fried","year":"1990","journal-title":"Computers, Ethics & Society"},{"key":"jehmc.2010040102-8","year":"2002","journal-title":"Privacy On and Off the Internet: What Consumers Want"},{"key":"jehmc.2010040102-9","author":"H.Henderson","year":"2006","journal-title":"Privacy in the Information Age"},{"key":"jehmc.2010040102-10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2006.09.005"},{"key":"jehmc.2010040102-11","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.14"},{"key":"jehmc.2010040102-12","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2007.906101"},{"key":"jehmc.2010040102-13","doi-asserted-by":"publisher","DOI":"10.1016\/j.artmed.2007.04.002"},{"key":"jehmc.2010040102-14","doi-asserted-by":"publisher","DOI":"10.3201\/eid0104.950403"},{"key":"jehmc.2010040102-15","doi-asserted-by":"crossref","unstructured":"Meingast, M., Roosta, T., & Sastry, S. (2006). Security and Privacy Issues with Health Care Information Technology. In Proceedings of the 28th Engineering in Medicine and Biology Society, Annual International Conference (pp. 5453-5458). Washington, DC: IEEE.","DOI":"10.1109\/IEMBS.2006.260060"},{"key":"jehmc.2010040102-16","doi-asserted-by":"publisher","DOI":"10.1145\/219663.219683"},{"key":"jehmc.2010040102-17","first-page":"21","article-title":"Online Privacy: Measuring Individuals\u2019 Concerns (","volume":"5183","author":"M.Moloney","year":"2008","journal-title":"LNCS"},{"key":"jehmc.2010040102-18","doi-asserted-by":"publisher","DOI":"10.1145\/270858.270866"},{"key":"jehmc.2010040102-19","author":"M.Petkovic","year":"2006","journal-title":"Security, Privacy and Trust in Modern Data Management"},{"key":"jehmc.2010040102-20","article-title":"Anonymity, unobservability and pseudonymity: A Proposal for Terminology","author":"A.Pfitzmann","year":"2000","journal-title":"Designing Privacy enhancing technologies"},{"key":"jehmc.2010040102-21","first-page":"4686","article-title":"The Need for Technical Solutions for Maintaining the Privacy of EHR. In","volume":"1","author":"P.Ray","year":"2006","journal-title":"Proceedings of Annual International Conference of the IEEE Engineering in Medicine and Biology Society"},{"key":"jehmc.2010040102-22","doi-asserted-by":"crossref","unstructured":"Riedl, B., Grascher, V., & Neubauer, T. (2007). Applying a Threshold Scheme to the Pseudonymization of Health Data. In Proceedings of the IEEE Dependable Computing, PRDC 13th Pacific Rim International Symposium (pp. 397-400).","DOI":"10.1109\/PRDC.2007.24"},{"key":"jehmc.2010040102-23","doi-asserted-by":"publisher","DOI":"10.1097\/GIM.0b013e3181a53331"},{"key":"jehmc.2010040102-24","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9973.2006.00474.x"},{"key":"jehmc.2010040102-25","unstructured":"Wexler, N. (1994, March). Quoted in L. Picker, All in the Family (p. 24). American Health."}],"container-title":["International Journal of E-Health and Medical Communications"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=43913","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T17:25:48Z","timestamp":1654104348000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jehmc.2010040102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2010,4,1]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2010,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jehmc.2010040102","relation":{},"ISSN":["1947-315X","1947-3168"],"issn-type":[{"value":"1947-315X","type":"print"},{"value":"1947-3168","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,4,1]]}}}