-
61por Sichali, Junious Mabo, Dube, Albert, Kachiwanda, Lackson, Wardle, Heather, Crampin, Amelia C, Bunn, Christopher“…Methods Here we present a narrative case report of a 16-year-old boy, ‘Wati’ (pseudonym), who lived in rural Malawi and took his own life after gambling and losing money that did not belong to him. …”
Publicado 2021
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
62por Cranley, Lisa A, Birdsell, Judy M, Norton, Peter G, Morgan, Debra G, Estabrooks, Carole A“…We conducted the study at ‘Restwood’ (pseudonym) nursing home because the Director of Care engaged actively in the study and TREC data showed that this site differed on some areas from other nursing homes in the province. …”
Publicado 2012
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
63“…Her case, detailed under the pseudonym Ana Maria, presents unique challenges related to the fulfillment of sexual and reproductive rights due to the restrictive social norms related to sexual health, ubiquitous violence against women (VAW) and the total ban on abortion in Nicaragua. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
64por Goicolea, Isabel, Hurtig, Anna-Karin, San Sebastian, Miguel, Vives-Cases, Carmen, Marchal, Bruno“…The first author collected data at the primary health care center La Virgen (pseudonym) through the review of documents, observation and interviews with health systems’ managers, team members, women patients, and members of external services. …”
Publicado 2015
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
65por Schwarzkopf, Daniel, Fleischmann-Struzek, Carolin, Schlattmann, Peter, Dorow, Heike, Ouart, Dominique, Edel, Andreas, Gonnert, Falk A, Götz, Jürgen, Gründling, Matthias, Heim, Markus, Jaschinski, Ulrich, Lindau, Simone, Meybohm, Patrick, Putensen, Christian, Sander, Michael, Reinhart, Konrad“…Data from medical records are linked to IAHD on patient level using a pseudonym. Analyses: Proportions of cases with sepsis according to sepsis-1 and sepsis-3 definitions are calculated and compared with estimates from coding of sepsis in IAHD. …”
Publicado 2020
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
66por Zhang, Guo-Qiang, Tao, Shiqiang, Xing, Guangming, Mozes, Jeno, Zonjy, Bilal, Lhatoo, Samden D, Cui, Licong“…NHash has a unique set of properties: (1) it is a pseudonym serving the purpose of linking research data about a study participant for research purposes; (2) it can be generated automatically in a completely distributed fashion with virtually no risk for identifier collision; (3) it incorporates a set of cryptographic hash functions based on N-grams, with a combination of additional encryption techniques such as a shift cipher; (d) it is validatable (error tolerant) in the sense that inadvertent edit errors will mostly result in invalid identifiers. …”
Publicado 2015
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
67por Niederer, Daniel, Keller, Matthias, Achtnich, Andrea, Akoto, Ralph, Ateschrang, Atesch, Banzer, Winfried, Barié, Alexander, Best, Raymond, Ellermann, Andree, Fischer, Andreas, Guenther, Daniel, Herbort, Mirco, Höher, Jürgen, Janko, Maren, Jung, Tobias M., Krause, Matthias, Petersen, Wolf, Stoffels, Thomas, Stöhr, Amelie, Welsch, Frederic, Stein, Thomas“…All questionnaires are completed online using the participants’ pseudonym only. Group allocation is executed randomly. …”
Publicado 2019
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
68por Gött, Robert, Stäubert, Sebastian, Strübing, Alexander, Winter, Alfred, Merzweiler, Angela, Bergh, Björn, Kaulke, Knut, Bahls, Thomas, Hoffmann, Wolfgang, Bialke, Martin“…It includes comprehensive requirements for applications such as patient lists, pseudonymization services, and consent management services. …”
Publicado 2022
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
69“…OBJECTIVE: Our objective was to propose a novel approach to pseudonymization based on public-private key cryptography that allows (1) decentralized patient-driven creation and maintenance of pseudonyms, (2) 1-time pseudonymization of each data record, and (3) grouping of patient data records even without knowing the pseudonymization key. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
70por Mehtälä, Juha, Ali, Mehreen, Miettinen, Timo, Partanen, Liisa, Laapas, Kaisa, Niemelä, Petri T., Khorlo, Igor, Ström, Sanna, Kurki, Samu, Vapalahti, Jarno, Abdelgawwad, Khaled, Leinonen, Jussi V.“…The aim of this study was to conduct initial exploration on how well pseudonymized and anonymized RWD perform in the creation of an ECA for an RCT. …”
Publicado 2023
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
71“…The form of pseudonymisation that is used in this Parkinson project is based on cryptographic techniques and is ‘polymorphic’: it gives each participating research group its own ‘local’ pseudonyms. Still, the system is globally consistent, in the sense that if one research group adds data to PPP under its own local pseudonyms, the data become available for other groups under their pseudonyms. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
72por Bialke, Martin, Rau, Henriette, Thamm, Oliver C., Schuldt, Ronny, Penndorf, Peter, Blumentritt, Arne, Gött, Robert, Piegsa, Jens, Bahls, Thomas, Hoffmann, Wolfgang“…This leads to manual processes to merge, analyze and, if possible, pseudonymize research data of different study sites. …”
Publicado 2018
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
73por Sanger, Gareth J.“…Although widely present among mammals, it is generally accepted that in rodents the genes for motilin and/or its receptor have undergone pseudonymization, so exogenous motilin cannot function. …”
Publicado 2022
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
74“…A growing framework of legal and ethical requirements limit scientific and commercial evaluation of personal data. Typically, pseudonymization, encryption, or methods of distributed computing try to protect individual privacy. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
75por Yang, Bian, Busch, Christoph, de Groot, Koen, Xu, Haiyun, Veldhuis, Raymond N. J.“…In a biometric authentication system using protected templates, a pseudonymous identifier is the part of a protected template that can be directly compared. …”
Publicado 2012
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
76“…This paper demonstrates how blockchain technologies can be used to further all three of the bioethical principles underlying consent requirements: the autonomy of patients, by giving them much greater control over their data; beneficence, by greatly facilitating medical research efficiency and by reducing biases and opportunities for errors; and justice, by enabling patients with rare or under-researched conditions to pseudonymously aggregate their data for analysis. Finally, we coin and describe the novel concept of prosent, by which we mean the blockchain-enabled ability of all stakeholders in the research process to pseudonymously and proactively consent to data release or exchange under specific conditions, such as trial completion.…”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
77por Khan, Muhammad Ayaz, Ullah, Subhan, Ahmad, Tahir, Jawad, Khwaja, Buriro, Attaullah“…Finally, our proposed lightweight RFID protocol ensured strong security against known attacks and protected patient privacy using pseudonyms instead of real IDs.…”
Publicado 2023
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
78por Paterson, Grace“…The account is used to examine two important subclasses of anonymized speech: speech using pseudonyms, and speech anonymized in a specifically communicative manner. …”
Publicado 2020
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
79por Moser, Konstantin, Mikolajczyk, Rafael, Bauer, Alexander, Tiller, Daniel, Christoph, Jan, Purschke, Oliver, Lückmann, Sara Lena, Frese, Thomas“…In principle, anonymized and pseudonymized patient data from all commercially available practice management systems should flow into the databases. …”
Publicado 2023
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
80por Hoffmann, Katja, Pelz, Anne, Karg, Elena, Gottschalk, Andrea, Zerjatke, Thomas, Schuster, Silvio, Böhme, Heiko, Glauche, Ingmar, Roeder, Ingo“…Specifically, our work is based on a recently established generic data management concept, for which we designed and implemented a web-based software framework that integrates data analysis, visualization as well as computer simulation and model prediction with audit trail functionality and a regulation-compliant pseudonymization service. Within the front-end application, we established two tailored views: a clinical (i.e., treatment context) perspective focusing on patient-specific data visualization, analysis and outcome prediction and a research perspective focusing on the exploration of pseudonymized data. …”
Publicado 2023
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto