Cargando…

3LGM2IHE: Requirements for Data-Protection-Compliant Research Infrastructures—A Systematic Comparison of Theory and Practice-Oriented Implementation

Objectives  The TMF (Technology, Methods, and Infrastructure for Networked Medical Research) Data Protection Guide (TMF-DP) makes path-breaking recommendations on the subject of data protection in research projects. It includes comprehensive requirements for applications such as patient lists, pseud...

Descripción completa

Detalles Bibliográficos
Autores principales: Gött, Robert, Stäubert, Sebastian, Strübing, Alexander, Winter, Alfred, Merzweiler, Angela, Bergh, Björn, Kaulke, Knut, Bahls, Thomas, Hoffmann, Wolfgang, Bialke, Martin
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Georg Thieme Verlag KG 2022
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9788907/
https://www.ncbi.nlm.nih.gov/pubmed/36150711
http://dx.doi.org/10.1055/a-1950-2791
_version_ 1784858858065231872
author Gött, Robert
Stäubert, Sebastian
Strübing, Alexander
Winter, Alfred
Merzweiler, Angela
Bergh, Björn
Kaulke, Knut
Bahls, Thomas
Hoffmann, Wolfgang
Bialke, Martin
author_facet Gött, Robert
Stäubert, Sebastian
Strübing, Alexander
Winter, Alfred
Merzweiler, Angela
Bergh, Björn
Kaulke, Knut
Bahls, Thomas
Hoffmann, Wolfgang
Bialke, Martin
author_sort Gött, Robert
collection PubMed
description Objectives  The TMF (Technology, Methods, and Infrastructure for Networked Medical Research) Data Protection Guide (TMF-DP) makes path-breaking recommendations on the subject of data protection in research projects. It includes comprehensive requirements for applications such as patient lists, pseudonymization services, and consent management services. Nevertheless, it lacks a structured, categorized list of requirements for simplified application in research projects and systematic evaluation. The 3LGM2IHE (“Three-layer Graphbased meta model – Integrating the Healthcare Enterprise [IHE] ” ) project is funded by the German Research Foundation (DFG). 3LGM2IHE aims to define modeling paradigms and implement modeling tools for planning health care information systems. In addition, one of the goals is to create and publish 3LGM (2) information system architecture design patterns (short “design patterns”) for the community as design models in terms of a framework. A structured list of data protection-related requirements based on the TMF-DP is a precondition to integrate functions (3LGM (2) Domain Layer) and building blocks (3LGM (2) Logical Tool Layer) in 3LGM (2) design patterns. Methods  In order to structure the continuous text of the TMF-DP, requirement types were defined in a first step. In a second step, dependencies and delineations of the definitions were identified. In a third step, the requirements from the TMF-DP were systematically extracted. Based on the identified lists of requirements, a fourth step included the comparison of the identified requirements with exemplary open source tools as provided by the “Independent Trusted Third Party of the University Medicine Greifswald” (TTP tools). Results  As a result, four lists of requirements were created, which contain requirements for the “patient list”, the “pseudonymization service”, and the “consent management”, as well as cross-component requirements from the TMF-DP chapter 6 in a structured form. Further to requirements (1), possible variants (2) of implementations (to fulfill a single requirement) and recommendations (3) were identified. A comparison of the requirements lists with the functional scopes of the open source tools E-PIX (record linkage), gPAS (pseudonym management), and gICS (consent management) has shown that these fulfill more than 80% of the requirements. Conclusions  A structured set of data protection-related requirements facilitates a systematic evaluation of implementations with respect to the fulfillment of the TMF-DP guidelines. These re-usable lists provide a decision aid for the selection of suitable tools for new research projects. As a result, these lists form the basis for the development of data protection-related 3LGM (2) design patterns as part of the 3LGM2IHE project.
format Online
Article
Text
id pubmed-9788907
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Georg Thieme Verlag KG
record_format MEDLINE/PubMed
spelling pubmed-97889072022-12-24 3LGM2IHE: Requirements for Data-Protection-Compliant Research Infrastructures—A Systematic Comparison of Theory and Practice-Oriented Implementation Gött, Robert Stäubert, Sebastian Strübing, Alexander Winter, Alfred Merzweiler, Angela Bergh, Björn Kaulke, Knut Bahls, Thomas Hoffmann, Wolfgang Bialke, Martin Methods Inf Med Objectives  The TMF (Technology, Methods, and Infrastructure for Networked Medical Research) Data Protection Guide (TMF-DP) makes path-breaking recommendations on the subject of data protection in research projects. It includes comprehensive requirements for applications such as patient lists, pseudonymization services, and consent management services. Nevertheless, it lacks a structured, categorized list of requirements for simplified application in research projects and systematic evaluation. The 3LGM2IHE (“Three-layer Graphbased meta model – Integrating the Healthcare Enterprise [IHE] ” ) project is funded by the German Research Foundation (DFG). 3LGM2IHE aims to define modeling paradigms and implement modeling tools for planning health care information systems. In addition, one of the goals is to create and publish 3LGM (2) information system architecture design patterns (short “design patterns”) for the community as design models in terms of a framework. A structured list of data protection-related requirements based on the TMF-DP is a precondition to integrate functions (3LGM (2) Domain Layer) and building blocks (3LGM (2) Logical Tool Layer) in 3LGM (2) design patterns. Methods  In order to structure the continuous text of the TMF-DP, requirement types were defined in a first step. In a second step, dependencies and delineations of the definitions were identified. In a third step, the requirements from the TMF-DP were systematically extracted. Based on the identified lists of requirements, a fourth step included the comparison of the identified requirements with exemplary open source tools as provided by the “Independent Trusted Third Party of the University Medicine Greifswald” (TTP tools). Results  As a result, four lists of requirements were created, which contain requirements for the “patient list”, the “pseudonymization service”, and the “consent management”, as well as cross-component requirements from the TMF-DP chapter 6 in a structured form. Further to requirements (1), possible variants (2) of implementations (to fulfill a single requirement) and recommendations (3) were identified. A comparison of the requirements lists with the functional scopes of the open source tools E-PIX (record linkage), gPAS (pseudonym management), and gICS (consent management) has shown that these fulfill more than 80% of the requirements. Conclusions  A structured set of data protection-related requirements facilitates a systematic evaluation of implementations with respect to the fulfillment of the TMF-DP guidelines. These re-usable lists provide a decision aid for the selection of suitable tools for new research projects. As a result, these lists form the basis for the development of data protection-related 3LGM (2) design patterns as part of the 3LGM2IHE project. Georg Thieme Verlag KG 2022-12-15 /pmc/articles/PMC9788907/ /pubmed/36150711 http://dx.doi.org/10.1055/a-1950-2791 Text en The Author(s). This is an open access article published by Thieme under the terms of the Creative Commons Attribution-NonDerivative-NonCommercial License, permitting copying and reproduction so long as the original work is given appropriate credit. Contents may not be used for commercial purposes, or adapted, remixed, transformed or built upon. ( https://creativecommons.org/licenses/by-nc-nd/4.0/ ) https://creativecommons.org/licenses/by-nc-nd/4.0/This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives License, which permits unrestricted reproduction and distribution, for non-commercial purposes only; and use and reproduction, but not distribution, of adapted material for non-commercial purposes only, provided the original work is properly cited.
spellingShingle Gött, Robert
Stäubert, Sebastian
Strübing, Alexander
Winter, Alfred
Merzweiler, Angela
Bergh, Björn
Kaulke, Knut
Bahls, Thomas
Hoffmann, Wolfgang
Bialke, Martin
3LGM2IHE: Requirements for Data-Protection-Compliant Research Infrastructures—A Systematic Comparison of Theory and Practice-Oriented Implementation
title 3LGM2IHE: Requirements for Data-Protection-Compliant Research Infrastructures—A Systematic Comparison of Theory and Practice-Oriented Implementation
title_full 3LGM2IHE: Requirements for Data-Protection-Compliant Research Infrastructures—A Systematic Comparison of Theory and Practice-Oriented Implementation
title_fullStr 3LGM2IHE: Requirements for Data-Protection-Compliant Research Infrastructures—A Systematic Comparison of Theory and Practice-Oriented Implementation
title_full_unstemmed 3LGM2IHE: Requirements for Data-Protection-Compliant Research Infrastructures—A Systematic Comparison of Theory and Practice-Oriented Implementation
title_short 3LGM2IHE: Requirements for Data-Protection-Compliant Research Infrastructures—A Systematic Comparison of Theory and Practice-Oriented Implementation
title_sort 3lgm2ihe: requirements for data-protection-compliant research infrastructures—a systematic comparison of theory and practice-oriented implementation
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9788907/
https://www.ncbi.nlm.nih.gov/pubmed/36150711
http://dx.doi.org/10.1055/a-1950-2791
work_keys_str_mv AT gottrobert 3lgm2iherequirementsfordataprotectioncompliantresearchinfrastructuresasystematiccomparisonoftheoryandpracticeorientedimplementation
AT staubertsebastian 3lgm2iherequirementsfordataprotectioncompliantresearchinfrastructuresasystematiccomparisonoftheoryandpracticeorientedimplementation
AT strubingalexander 3lgm2iherequirementsfordataprotectioncompliantresearchinfrastructuresasystematiccomparisonoftheoryandpracticeorientedimplementation
AT winteralfred 3lgm2iherequirementsfordataprotectioncompliantresearchinfrastructuresasystematiccomparisonoftheoryandpracticeorientedimplementation
AT merzweilerangela 3lgm2iherequirementsfordataprotectioncompliantresearchinfrastructuresasystematiccomparisonoftheoryandpracticeorientedimplementation
AT berghbjorn 3lgm2iherequirementsfordataprotectioncompliantresearchinfrastructuresasystematiccomparisonoftheoryandpracticeorientedimplementation
AT kaulkeknut 3lgm2iherequirementsfordataprotectioncompliantresearchinfrastructuresasystematiccomparisonoftheoryandpracticeorientedimplementation
AT bahlsthomas 3lgm2iherequirementsfordataprotectioncompliantresearchinfrastructuresasystematiccomparisonoftheoryandpracticeorientedimplementation
AT hoffmannwolfgang 3lgm2iherequirementsfordataprotectioncompliantresearchinfrastructuresasystematiccomparisonoftheoryandpracticeorientedimplementation
AT bialkemartin 3lgm2iherequirementsfordataprotectioncompliantresearchinfrastructuresasystematiccomparisonoftheoryandpracticeorientedimplementation