Search Articles

View query in Help articles search

Search Results (1 to 10 of 244 Results)

Download search results: CSV END BibTex RIS


Determinants of Continuous Smartwatch Use and Data-Sharing Preferences With Physicians, Public Health Authorities, and Private Companies: Cross-Sectional Survey of Smartwatch Users

Determinants of Continuous Smartwatch Use and Data-Sharing Preferences With Physicians, Public Health Authorities, and Private Companies: Cross-Sectional Survey of Smartwatch Users

Concerns regarding privacy, data breaches, and trust in data-handling entities play crucial roles for end users in shaping their comfort levels [14,15]. Data sharing in health care has been investigated through several studies [16-19]. However, as technology continues to evolve and play a more dominant role in society, it is reasonable to expect attitudes to change.

Anthony James Goodings, Kayode Philip Fadahunsi, Derjung M Tarn, Jennifer Lutomski, Allison Chhor, Frances Shiely, Patrick Henn, John O'Donoghue

J Med Internet Res 2025;27:e67414

A Sociotechnical Approach to Bring-Your-Own-Device Security in Hospitals: Development and Pilot Testing of a Maturity Model Using Mixed Methods Action Research

A Sociotechnical Approach to Bring-Your-Own-Device Security in Hospitals: Development and Pilot Testing of a Maturity Model Using Mixed Methods Action Research

The selection process was facilitated through nominations from the hospital’s chief privacy officer to ensure the inclusion of individuals with relevant expertise and diverse perspectives. The criteria for participant selection included the following. IT professionals, cybersecurity managers, and policy makers responsible for BYOD decision-making, such as developing or implementing BYOD security strategies.

Tafheem Ahmad Wani, Antonette Mendoza, Kathleen Gray

JMIR Hum Factors 2025;12:e71912

Federated Analysis With Differential Privacy in Oncology Research: Longitudinal Observational Study Across Hospital Data Warehouses

Federated Analysis With Differential Privacy in Oncology Research: Longitudinal Observational Study Across Hospital Data Warehouses

Indeed, several privacy attacks [6,7] have been proposed to exploit common statistical analysis results and disclose private information. To mitigate these attacks, differential privacy (DP) can be used in combination with FA to provide stronger privacy guarantees. DP [8,9] is a method for computing statistical analyses on a sensitive dataset in such a way that the results do not compromise the privacy of the initial raw data.

Théo Ryffel, Perrine Créquit, Maëlle Baillet, Jason Paumier, Yasmine Marfoq, Olivier Girardot, Thierry Chanet, Ronan Sy, Louise Bayssat, Julien Mazières, Vincent Vuiblet, Julien Ancel, Maxime Dewolf, François Margraff, Camille Bachot, Jacek Chmiel

JMIR Med Inform 2025;13:e59685

Exploring the Barriers and Facilitators to Implementing a Smartphone App for Physicians to Improve the Management of Acute Myocardial Infarctions: Multicenter, Mixed Methods, Observational Study

Exploring the Barriers and Facilitators to Implementing a Smartphone App for Physicians to Improve the Management of Acute Myocardial Infarctions: Multicenter, Mixed Methods, Observational Study

App needs to work well App not working App requires redownloading Biometric authentication Log-in and password issues App data security App not working App registration process Backup option needed in case app fails Cell signal issues Concerns over alignment of app with privacy standards Patient data privacy Reliability of app technology Speed of ECGc transmission Technology failure User log-in and password issues Wi-Fi signal issues App data security App not working Backup option needed in case app fails Cell

Katelyn J Cullen, Hassan Mir, Madhu K Natarajan, Marija Corovic, Karen Mosleh, Jacob Crawshaw, Mathew Mercuri, Hassan Masoom, JD Schwalm

JMIR Mhealth Uhealth 2025;13:e60173

School-Based Online Surveillance of Youth: Systematic Search and Content Analysis of Surveillance Company Websites

School-Based Online Surveillance of Youth: Systematic Search and Content Analysis of Surveillance Company Websites

Under the Family Educational Rights and Privacy Act, schools can legally provide identifiable student information to contractors to perform school personnel functions [18]. Large language models can analyze a large amount of student online activity (ie, emails, web searches, direct messages, or private social media browsing and posting) if school administrators give that level of access to student data to online surveillance companies.

Alison O'Daffer, Wendy Liu, Cinnamon S Bloss

J Med Internet Res 2025;27:e71998

Responsible Governance of Tribal Public Health Data: Data Sharing Ethics and Common Challenges in the US Public Health System

Responsible Governance of Tribal Public Health Data: Data Sharing Ethics and Common Challenges in the US Public Health System

Even with limited access to local, state, and federal public health data systems, tribal public health authorities were able to carry out significant actions to protect the health of their communities during the COVID-19 pandemic and protect individuals most at risk of infection while respecting their privacy rights, pursuant to the Health Information Portability and Accountability Act (HIPAA) [6].

Alec J Calac, Luis R Gasca, William H Swain

J Med Internet Res 2025;27:e77249

Managerial Challenges in Digital Health: Bibliometric and Network Analysis

Managerial Challenges in Digital Health: Bibliometric and Network Analysis

Cluster 1 included many papers that used the technology acceptance model (TAM), along with papers addressing information privacy (Table 5). Top 3 papers from cluster 1 according to their degree centrality. a Last updated on February 26, 2024. This content analysis was strengthened by an independent keyword analysis (Table 6).

Quentin Garçon, Benjamin Cabanes, Cédric Denis-Rémis

J Med Internet Res 2025;27:e57980

Rectifying Genocidal Data Stewardship: A Commentary on Ethical and Legal Obligations for Sharing Data With Tribal Entities

Rectifying Genocidal Data Stewardship: A Commentary on Ethical and Legal Obligations for Sharing Data With Tribal Entities

We use the phrase data science broadly as encompassing interdisciplinary quantitative and qualitative approaches for managing data (eg, storage, access, and knowledge generation) that requires consideration for ethics, privacy, security, and downstream effects [4].

Oliver Bear Don't Walk IV, Lauren W Yowelunh McLester-Davis, Susan Brown Trinidad

J Med Internet Res 2025;27:e77946

A System Model and Requirements for Transformation to Human-Centric Digital Health

A System Model and Requirements for Transformation to Human-Centric Digital Health

Privacy is a vague, emotional, and contextual concept with social and technical dimensions [44]. It is dynamic because people’s privacy expectations and needs vary situationally. Privacy is also one of the human rights. The UNDHR expresses that “No one shall be subject to arbitrary interference with his privacy” [35]. Autonomy and privacy are closely interconnected. According to Citron [45], without personal autonomy, there is hardly personal privacy, and privacy ensures dignity.

Pekka Ruotsalainen, Bernd Blobel

J Med Internet Res 2025;27:e68661

Ensuring General Data Protection Regulation Compliance and Security in a Clinical Data Warehouse From a University Hospital: Implementation Study

Ensuring General Data Protection Regulation Compliance and Security in a Clinical Data Warehouse From a University Hospital: Implementation Study

The aim of the GDPR is to protect citizens’ privacy in the context of widespread digitization while facilitating the circulation of data. It emphasizes transparency in processing health data and enhances patients’ control over their use, which are widely regarded as positive steps. However, the recent literature underscores several challenges in applying GDPR to the reuse of health data for research.

Christine Riou, Mohamed El Azzouzi, Anne Hespel, Emeric Guillou, Gouenou Coatrieux, Marc Cuggia

JMIR Med Inform 2025;13:e63754