ArticlePDF Available

Big Data Security and Privacy Issues in Healthcare

Authors:
  • LG Electronics, Mobile Research, United States

Abstract and Figures

With the ever-increasing cost for healthcare and increased health insurance premiums, there is a need for proactive healthcare and wellness. In addition, the new wave of digitizing medical records has seen a paradigm shift in the healthcare industry. As a result, the healthcare industry is witnessing an increase in sheer volume of data in terms of complexity, diversity and timeliness. As healthcare experts look for every possible way to lower costs while improving care process, delivery and management, big data emerges as a plausible solution with the promise to transform the healthcare industry. This paradigm shift from reactive to proactive healthcare can result in an overall decrease in healthcare costs and eventually lead to economic growth. While the healthcare industry harnesses the power of big data, security and privacy issues are at the focal point as emerging threats and vulnerabilities continue to grow. In this paper, we present the state-of-the-art security and privacy issues in big data as applied to healthcare industry.
Content may be subject to copyright.
Big data security and privacy issues in healthcare
Nanthealth
Harsh Kupwade Patil and Ravi Seshadri
Nanthealth
Dallas, US
E-mail: hkupwade@nanthealth.com
Abstract—With the ever-increasing cost for healthcare and
increased health insurance premiums, there is a need for
proactive healthcare and wellness. In addition, the new wave of
digitizing medical records has seen a paradigm shift in the
healthcare industry. As a result, the healthcare industry is
witnessing an increase in sheer volume of data in terms of
complexity, diversity and timeliness. As healthcare experts
look for every possible way to lower costs while improving care
process, delivery and management, big data emerges as a
plausible solution with the promise to transform the healthcare
industry. This paradigm shift from reactive to proactive
healthcare can result in an overall decrease in healthcare costs
and eventually lead to economic growth. While the healthcare
industry harnesses the power of big data, security and privacy
issues are at the focal point as emerging threats and
vulnerabilities continue to grow. In this paper, we present the
state-of-the-art security and privacy issues in big data as
applied to healthcare industry.
Keywords; healthcare; big data security; privacy; security
analytics
I. INTRODUCTION
HE new wave of digitizing medical records has seen a
paradigm shift in the healthcare industry. As a result,
healthcare industry is witnessing an increase in sheer
volume of data in terms of complexity, diversity and
timeliness. The term “big data” refers to the agglomeration
of large and complex data sets, which exceeds existing
computational, storage and communication capabilities of
conventional methods or systems. In healthcare, several
factors provide the necessary impetus to harness the power
of big data. For example, in the last two decades, healthcare
costs have increased at an alarming rate and healthcare
expenses are now estimated at 17.6 percent of GDP. As
healthcare experts look for every possible way to lower
costs while improving care process, delivery and
management, big data emerges as a plausible solution with
the promise to transform the healthcare industry. The
McKinsey Global Institute estimates a $100 billion increase
in profits annually, if big data strategies are leveraged to the
fullest potential [1]. For instance, harnessing the power of
big data analysis and genomic research with real-time
access to patient records could allow doctors to make
informed decisions on treatments. Furthermore, big data will
compel insurers to reassess their predictive models.
With the increasing cost for healthcare services and
increased health insurance premiums, there is a need for
proactive healthcare management and wellness. This shift
from reactive to proactive healthcare can result in improved
quality of care, decrease in healthcare costs, and eventually
lead to economic growth. In recent times, technological
breakthroughs have played a significant role in empowering
proactive healthcare. For instance, real-time remote
monitoring of vital signs through embedded sensors
(attached to patients) allows health care providers to be
alerted in case of an anomaly. Furthermore, healthcare
digitization with integrated analytics is one of the next big
waves in healthcare Information Technology (IT) with
Electronic Health Records (EHRs) being a crucial building
block for this vision. With the introduction of EHR
incentive programs [2], healthcare organizations recognized
EHR’s value proposition to facilitate better access to
complete, accurate and sharable healthcare data, that
eventually lead to improved patient care.
As healthcare industry explores myriad ways of applying
big data analysis from diagnosis, to treatment, to population
health management, and eventually capital and strategic
planning, the opportunities are endless. Furthermore, as
healthcare leaders move from a volume-based to a value-
based business model (value refers to the association
between quality of care and costs), data will play a pivotal
role in the transition [3]. As the healthcare industry
witnesses large volumes of data, the first step will involve
governance and linking accurate and actionable data in real-
time. In this age of connectivity, integrating health systems
with large amounts of clinical, financial, genomic, social
and environmental data will be crucial for real-time
analytics and patient care. The goal is to understand
population health for disease control and predictive analysis.
For instance, predictive analysis can help understand
aggravating health conditions and could prevent adverse
health events from occurring (e.g. chronic diseases such as
diabetes). Hence, collecting, linking and analyzing multi-
dimensional data in real-time becomes imperative. A logical
next step in a patient-centric model would be a new all-
inclusive scale for measuring the health and wellness of a
patient by including, but not limiting to clinical, physical,
social, psychological, environmental and genomic data
pertaining to a patient. Fig. 1 shows a need for a real-time
T
2014 IEEE International Congress on Big Data
978-1-4799-5057-7/14 $31.00 © 2014 IEEE
DOI 10.1109/BigData.Congress.2014.112
775
2014 IEEE International Congress on Big Data
978-1-4799-5057-7/14 $31.00 © 2014 IEEE
DOI 10.1109/BigData.Congress.2014.112
762
2014 IEEE International Congress on Big Data
978-1-4799-5057-7/14 $31.00 © 2014 IEEE
DOI 10.1109/BigData.Congress.2014.112
762
2014 IEEE International Congress on Big Data
978-1-4799-5057-7/14 $31.00 © 2014 IEEE
DOI 10.1109/BigData.Congress.2014.112
762
holistic model for healthcare, with an emphasis on
parameters from different domains affecting the condition of
a patient. For example, a patient’s vital signs can be normal,
but his/her psychological and environmental factors can
have dire consequences, (factors not considered as part of
the prognosis).
Clinical
Genomic
Social
Psychology
Physical
Figure 1. Real-time holistic model for healthcare
The explosion of the Internet of Things (IoT) and its
ability to provide real-time monitoring and expedited access
to care is one of the driving factors for its adoption in
healthcare. Gartner estimates 26 billion IoT devices will be
functional by 2020 and the amount of traffic generated by
such devices will be large enough to place it in the category
of big data [4]. Several definitions for IoT exist but
currently the focus is primarily on low-cost, low-powered
resource constrained (storage, computation and bandwidth)
devices [5]. In addition, with the introduction of Body
Sensor Networks (BSN) and their direct application to
healthcare [6], care providers will be able to monitor vital
parameters, medication effectiveness, and predict an
epidemic. Body sensors generate massive data, and linking
such healthcare data from disparate resource-constrained
networks will be crucial for driving healthcare analytics.
Hence, healthcare providers have enormous opportunities to
revolutionize healthcare by harnessing the power of big
data. Nevertheless, such gains will be realized only if
security and patient privacy are at the core of any product
design and development.
The past decade has seen a steady increase in security
breaches in healthcare IT. In 2013, Kaiser Permanente (one
of the largest non-profit healthcare providers in US) notified
its 49,000 patients that their health information had been
compromised due to theft of an unencrypted USB flash
drive containing patient records [7]. In 2012, Verizon’s data
breach investigation report stated that its forensic
investigation and security division compiled data from
47,000 reported security incidents and found 621 confirmed
data breaches [8]. Furthermore, a study on patient privacy
and data security showed that 94% of hospitals had at least
one security breach in the past two years [9]. In most cases,
the attacks were from an insider rather than external. In
addition, the study stated that the external attacks originated
from China, US and Eastern Europe (Romania recording the
highest number of external attacks).
With the ever-changing risk environment and
introduction of new emerging threats and vulnerabilities,
security violations are expected to grow in the coming
years. Moreover, the Affordable Care Act will lead to more
enrollments for health insurance [10], making it an attractive
focal point for hackers and opening a floodgate of
healthcare breaches in the coming years. Security breaches
of EHR can risk patient privacy and violate the Health
Insurance Portability and Accountability Act (HIPAA) and
the Health Information Technology for Economic and
Clinical Health (HITECH) Act in the United States [11],
[12]. Hence, EHR security must be a high priority to ensure
patient safety.
II. SECURITY AND PRIVACY IN HEALTHCARE
Adoption of big data in healthcare significantly increases
security and patient privacy concerns. At the outset, patient
information is stored in data centers with varying levels of
security. Moreover, most healthcare data centers have
HIPAA certification, but that certification does not
guarantee patient record safety. The reason being, HIPAA is
more focused on ensuring security policies and procedures
than on implementing them. Furthermore, the inflow of
large data sets from diverse sources places an extra burden
on storage, processing and communication. Fig. 2 portrays a
big data healthcare cloud that hosts clinical, financial,
social, genomic, physical and psychological data pertaining
to patients.
776763763763
Big data
healthcare cloud
Clin ical
Financial
Social
Genomic
Psychol ogical
Physical
Figure 2. Big data healthcare cloud.
Traditional security solutions cannot be directly applied
to large and inherently diverse data sets. With the increase
in popularity of healthcare cloud solutions, complexity in
securing massive distributed Software as a Service (SaaS)
solutions increases with varying data sources and formats.
Hence, big data governance is necessary prior to exposing
data to analytics.
A. Data governance
As the healthcare industry moves towards a value-based
business model leveraging healthcare analytics, data
governance will be the first step in regulating and managing
healthcare data. The goal is to have a common data
representation that encompasses industry standards (e.g.
LOINC, ICD, SNOMED, CPT, etc.) and local and regional
standards. Currently, data generated by BSN is diverse in
nature and would require normalization, standardization and
governance prior to analysis.
B. Real-time security analytics
Analyzing security risks and predicting threat sources in
real-time is of utmost need in the burgeoning healthcare
industry. At present, healthcare industry is witnessing a
deluge of sophisticated attacks ranging from Distributed
Denial of Service (DDoS) to stealthy malware. Furthermore,
social engineering attacks are on the rise and the risks
associated with such attacks are difficult to predict without
considering human cognitive behavior. Cognitive bias, for
example, can come into play, especially in the case of
elderly patients. “Cognitive bias is a pattern of deviation in
judgment, whereby influences about other people and
situations may be drawn in an illogical manner” [13]. For
example, a man-in-the-middle attack can be effected
perhaps by coaxing an elderly patient to accept a digital
X.509 certificate. Such scenarios must be taken into account
when designing an end-to-end authentication solution.
In the IoT environment, implementing security in
resource-constrained networks has been a challenge and will
continue to grow more complex with the increase in the
number of IoT devices [14]. For instance, conventional
symmetric and asymmetric key distribution and revocation
schemes cannot be extended to a billion IoT devices. Hence,
new scalable key management solutions leading to seamless
inter-operability between disparate networks (e.g. IoT and
legacy IP networks) is crucial for IoT’s integration of big
data in a cloud environment.
As healthcare industry leverages on emerging big data
technologies to make better-informed decisions, security
analytics will be at the core of any design for the cloud
based SaaS solution hosting Protected Health Information
(PHI). Additionally, real-time security intelligence will steer
new directions in risk management. Consequently,
healthcare IT providers can monitor risks in real-time and
take preemptive measures before affecting the healthcare
business.
C. Privacy-preserving analytics
Invasion of patient privacy is a growing concern in the
domain of big data analytics. An incident reported in the
Forbes magazine raises an alarm over patient privacy [15].
In the report, it mentioned that Target Corporation sent baby
care coupons to a teen-age girl unbeknown to her parents.
This incident impels big data to consider privacy for
analytics. For instance, data anonymization prior to
analytics could protect patient identity. Furthermore,
privacy- preserving encryption schemes that allow running
prediction algorithms on encrypted data while protecting the
identity of a patient is essential for driving healthcare
analytics. As the industry leverages on IoT devices to
transmit vitals to healthcare clouds, there is a need for
processing and analyzing data in an ad-hoc decentralized
manner. However, performing resource-exhausting
operations (required for analytics) while preserving privacy
is a challenge in a resource-constrained environment.
Additionally, as healthcare analytics gains popularity, new
privacy laws need to be drafted to protect patient privacy.
For instance, “informed consent” from patients is required
prior to performing any analytics on patient data, and new
laws need to be drafted to clearly illustrate all processes
involved in performing big data analytics on patient data.
III. CONCLUSION
As big data transforms healthcare, security and patient
privacy is paramount in driving such technologies. As
healthcare clouds with big data become prominent, hosting
companies will be more reluctant to share massive
healthcare data for centralized processing. Hence, we
envision distributed processing across disparate clouds and
leveraging on collective intelligence. Secure patient data
management is inevitable as healthcare clouds aggregate
and link large amounts of data from disparate networks.
Additionally, secure and privacy preserving real-time
analytics will propel proactive healthcare and wellness. In
777764764764
this paper, we review some of the security and privacy
issues in healthcare and foresee a need for technological
breakthroughs in computational, storage and communication
capabilities to meet the growing demand of securing
healthcare data.
IV. REFERENCES
[1] P. Groves, B. Kayyali, D. Knott and S. V. Kuiken, "The
'big data' revolution in healthcare," McKinsey &
Company, 2013.
[2] "EHR incentive programs," 2014. [Online]. Available:
https://www.cms.gov/Regulations-and-
Guidance/Legislation/EHRIncentivePrograms/index.html.
[3] M. M. Brown, G. C. Brown, S. Sharma and J. Landy,
"Health Care Economic Analyses and Value-Based
Medicine," Survey of Ophthalmology, vol. 48, no. 2, pp.
204-223, 2003.
[4] P. Middleton , P. Kjeldsen and J. Tully, "Forecast: The
Internet of Things, Worldwide," Gartner, 2013.
[5] L. Atzori, A. Iera and G. Morabito, "The Internet o
f
Things: A survey," Computer Networks, vol. 54, no. 15,
pp. 2787-2805, 2010.
[6] M. Hanson, H. Powell, A. Barth, K. Ringgenberg, B.
Calhoun, J. Aylor and J. Lach, "Body Area Sensor
Networks: Challenges and Opportunities," Computer,
p
p.
58-65, 2009.
[7] E. McCann, "Kaiser reports second fall data breach,"
Healthcare IT News, 2013.
[8] Verizon, "Data breach investigation report," Verizon,
2013.
[9] P. Institute, "Third Annual Benchmark Study on Patient
Privacy and Data Security," Ponemon Institute LLC,
2012.
[10] "Public Law 111 - 148 - Patient Protection and
Affordable Care Act," U.S. Government Printing Office
(GPO) , 2013.
[11] "Health Insurance Portability and Accountability Act,"
U.S. Government Printing Office, 1996. [Online].
Available: http://www.gpo.gov/fdsys/pkg/PLAW-
104publ191/html/PLAW-104publ191.htm.
[12] "Health Information Technology for Economic and
Clinical Health Act," 2009. [Online]. Available:
http://www.gpo.gov/fdsys/pkg/BILLS-
111hr1enr/pdf/BILLS-111hr1enr.pdf.
[13] M. G. Haselton, D. Nettle and P. W. Andrews, "The
evolution of cognitive bias," in The Handbook o
f
Evolutionary Psychology, John Wiley & Sons Inc, 2005,
pp. 724-746.
[14] H. Kupwade Patil and T. M. Chen, "Wireless Sensor
Network Security," in Computer and Information Security
, Morgan Kaufmann - Imprint of Elsevier, 2013, pp. 301-
322.
[15] K. Hill, "How Target Figured Out A Teen Girl Was
Pregnant Before Her Father Did," Forbes, Inc., 2012.
[Online]. Available:
http://www.forbes.com/sites/kashmirhill/2012/02/16/how-
target-figured-out-a-teen-girl-was-pregnant-before-her-
father-did/.
778765765765
... Advancements in information technology, notably CC, have revolutionized patient care delivery. CC's ability to provide accessible, reliable, and cost-effective patient data storage has been particularly transformative [30]. However, the ubiquity and convenience of cloud-based data storage also introduce significant security challenges, including concerns about data backup, confidentiality, integrity, and reliability [30]. ...
... CC's ability to provide accessible, reliable, and cost-effective patient data storage has been particularly transformative [30]. However, the ubiquity and convenience of cloud-based data storage also introduce significant security challenges, including concerns about data backup, confidentiality, integrity, and reliability [30]. ...
Conference Paper
Cloud computing (CC) represents a significant technological advancement in the United States (U.S.) healthcare. Despite its advantages like reduced costs, scalability, resource sharing, and high availability, CC raises concerns, especially in privacy and security. This study employs Grounded Theory methodology to delve into these concerns within cloudbased Healthcare Information Management Systems (HIMS) in the U.S., which operates under stringent patient privacy and security laws. The research focuses on healthcare organizations' strategies to mitigate these challenges. In-depth interviews and document analysis, conducted using a qualitative research strategy, will gather data from healthcare professionals and Information Technology (I.T.) specialists interacting with cloud-based HIMS. Through thematic analysis and constant comparison, the research will construct a theoretical framework showcasing CC's impact on HIMS privacy and security. This framework will establish a basis for subsequent research to improve U.S. healthcare delivery by directing organizations to adopt and implement cloud-based HIMS compliant with U.S. data privacy regulations.
... The two main purposes for the data are to seamlessly transmit the unique healthcare data from one healthcare actor to another in order to enhance the treatment throughout the treatment period, and anonymously utilize the data for research and study. (Kupwade Patil and Seshadri, 2014;Mireku and Komlan, 2017) The benefits of big data could shift the healthcare industry into a more proactive way. In order to achieve this, the data needs to be analyzed and visualized in a way so that data analytics and healthcare professionals can leverage the full potential of the data. ...
Research
Full-text available
This research examines the current state and problems of the ongoing digitalization of healthcare sector.
... No se pueden ignorar algunos temores reales respecto a la seguridad y privacidad de la información en el caso de la salud (Patil & Seshadri, 2014). Un tema abierto a la investigación es cómo garantizar seguridad y privacidad de los datos de los pacientes. ...
Article
El Big Data (BD) ha tenido un desarrollo vertiginoso, logrando impactar a todos los sectores de la sociedad. En este trabajo analizamos algunas de las aplicaciones más exitosas de esta tecnología. En el ámbito de la salud la generación de datos aumenta cada minuto, el camino a seguir para lograr su procesamiento ha sido el uso de técnicas de BD. La generación del BD en salud viene desde los clásicos sistemas de gestión, hasta la creciente generación de datos captados por los dispositivos de Internet de las cosas. La contribución del BD a la Salud, al convertir todos estos datos en información, es uno de los temas que se tratan en el presente trabajo. Describe cómo tecnologías avanzadas como la Computación en la Nube, la Niebla o de Borde, se han ido incorporando paulatinamente para resolver los problemas que ha enfrentado el BD para responder a soluciones de salud. La gestión de la salud es un problema global sin solución en la actualidad, lograr orquestar todas estas tecnologías, pueden contribuir a una mejor gestión de la salud, este es un tema que aborda este trabajo. Finalmente, se hace un análisis de las principales herramientas de código abierto que se están utilizando para hacer BD en la actualidad.
... For example, in Li R, et al. [126], a federated learning model predicted future oxygen requirements for COVID-19 patients using clinical and radiology data without the need for centralized data sharing. Different federated learning frameworks employ various topologies, such as peer-to-peer or client-server, transforming stochastic gradient descent into federated stochastic gradient descent based on the chosen topology [127,128]. All client terminals in a client-server architecture are linked to a shared server, and updates are sent through the server. ...
Article
In the past decade, a substantial increase in medical data from various sources, including wearable sensors, medical imaging, personal health records, and public health organizations, has propelled advancements in the medical sciences. The evolution of computational hardware, such as cloud computing, GPUs, FPGAs, and TPUs, has enabled the effective utilization of this vast amount of data. Consequently, sophisticated AI techniques have been developed to extract valuable insights from healthcare datasets. This article provides a comprehensive overview of recent developments in AI and biosensors within the medical and life sciences. The review highlights the role of machine learning in key areas such as medical imaging, precision medicine, and biosensors designed for the Internet of Things (IoT). Emphasis is placed on the latest progress in wearable biosensing technologies, where AI plays a pivotal role in monitoring electro-physiological and electro-chemical signals and aiding in disease diagnosis. These advancements underscore the growing trend towards personalized medicine, offering precise and costefficient point-of-care treatment. Additionally, the article delves into the advancements in computing technologies, including accelerated AI, edge computing, and federated learning specifically tailored for medical data. The challenges associated with data-driven AI approaches, potential issues arising from biosensors and IoT-based healthcare, and distribution shifts among different data modalities are thoroughly explored. The discussion concludes with insights into future prospects in the field.
... For example, in Li R, et al. [126], a federated learning model predicted future oxygen requirements for COVID-19 patients using clinical and radiology data without the need for centralized data sharing. Different federated learning frameworks employ various topologies, such as peer-to-peer or client-server, transforming stochastic gradient descent into federated stochastic gradient descent based on the chosen topology [127,128]. All client terminals in a client-server architecture are linked to a shared server, and updates are sent through the server. ...
Article
Full-text available
Middle Eastern social standards promote familial affinity, respect for tradition, and strong family relationships. As a result, while choosing a career path, Lebanese youth are more likely to consider family expectations and responsibilities. This study intends to provide insights into the ways family influences career decisions to minimize delays in the student’s intended career paths. We surveyed 113 students from various majors at a large urban private university to better understand the relationship between family influence and career decisions. Our research employs a mixed-methods approach to obtain a comprehensive understanding of family involvement in college students’ career decisions and its effects on professional awareness and development. Our findings indicated that parents demonstrated their involvement and support for their children in terms of influence, academic engagement, and career choice. Both parents were active in their child’s career choices, making them the key influences. Family influence was also connected to career-related decisions, career satisfaction, and motivation. Parents’ financial situation and expectations also influenced their children’s decisions, either directly or indirectly. Due to the availability or absence of resources, the socioeconomic level of the family influences the child’s occupational choice. According to the data we gathered, males and females were equally impacted by their parents. Females’ first preference was the mother, followed by the father. Males prioritized the father, who was closely followed by the mother.
Article
Big data security involves protecting healthcare data from unauthorised use and access and making any changes, while privacy entails ensuring the confidentiality of individual patient information within the datasets. The two are crucial in ensuring that big data is effectively applied for research and personalised care, compromising the sensitivity of healthcare data and medical information. Consequently, as the amount of data in the healthcare sector grows exponentially, securing sensitive data becomes increasingly crucial while effectively utilising big data analytics. The systematic review explores the issues and challenges associated with big data security and privacy in healthcare. Through reference to resource-based view theory, this paper seeks to examine the present state of research in this area, identify gaps in the existing literature, and propose strategies for future research. The search strategy looked at the data between 2013 and 2022 and yielded 93 studies from four databases: Scopus, PubMed, ScienceDirect and IEEE Xplore. From these studies, 18 papers are reviewed. The findings reveal that while significant progress has been made in securing healthcare data, numerous challenges still need to be considered. Overall, this review highlights the importance of continued research to ascertain that sensitive healthcare data is kept secure while allowing for the enhanced application of big data analytics. It contributes to the security and privacy problems associated with using big data in healthcare, measures for addressing these challenges, the healthcare value of big data, and foci for future research.
Chapter
The current paper analyzes previous studies related to criminal accounting. Many of the previous studies consider criminal accountants as an expert who engaged in the investigation related to different financial crimes including cyber ones. The analysis assumes the vital role played by the forensic accountant in protecting data and in preventing a different kind of fraud which includes technological ones.
Chapter
The paper focuses on the usage of forensic accounting for digital banking. The advancement of technology and the wide usage of digital banking applications, increase the possibility of fraud which need more skills from the forensic accountant to discover and support the companies and the individual in protecting their assets. Depending on the previous literature the paper recommends developing the skills of accountants and auditors and encourages using forensic accountants as part of the internal control systems.
Chapter
Big data becomes essential to each sector because it will provide decision-makers with very important and critical information. Analyzing big data will lead to understanding the patterns of the work and will help the forensic accountant in deducting any expected fraud. The current paper reviewed previous literature related to big data and the challenges that can be faced by a forensic accountant. Depending on the literature, they reviewed the paper and concluded that it is important for a forensic accountant to have knowledge about big data and know how to use different software to analyze it.
Chapter
Full-text available
One of the most dramatic demonstrations of the role of the mind in one's apprehension of the world is the existence of cognitive biases. This chapter presents a three-category framework for understanding cognitive biases from an evolutionary perspective. It describes the implications of this evolutionary psychological perspective on biases. The chapter proposes that analogous logic may be applied to understanding cognitive biases. Cognitive biases can arise for three reasons: Selection may discover useful shortcuts that tend to work in most circumstances, though they fall short of some normative standards (heuristics); biases can arise if biased solutions to adaptive problems resulted in lower error costs than unbiased ones (error management biases); and apparent biases can arise if the task at hand is not one for which the mind is designed (artifacts). The chapter discusses two general categories of artifact effects: evolutionarily invalid problem formats and evolutionarily invalid problem content.
Article
Target has perfected the technique of analyzing consumers' shopping habits to figure out who's pregnant. How can they send customers congratulatory coupons without freaking them out?
Article
Body area sensors can enable novel applications in and beyond healthcare, but research must address obstacles such as size, cost, compatibility, and perceived value before networks that use such sensors can become widespread.
Article
Health care economic analyses are becoming increasingly important in the evaluation of health care interventions, including many within ophthalmology. Encompassed with the realm of health care economic studies are cost-benefit analysis, cost-effectiveness analysis, cost-minimization analysis, and cost-utility analysis. Cost-utility analysis is the most sophisticated form of economic analysis and typically incorporates utility values. Utility values measure the preference for a health state and range from 0.0 (death) to 1.0 (perfect health). When the change in utility measures conferred by a health care intervention is multiplied by the duration of the benefit, the number of quality-adjusted life-years (QALYs) gained from the intervention is ascertained. This methodology incorporates both the improvement in quality of life and/or length of life, or the value, occurring as a result of the intervention. This improvement in value can then be amalgamated with discounted costs to yield expenditures per quality-adjusted life-year ($/QALY) gained. $/QALY gained is a measure that allows a comparison of the patient-perceived value of virtually all health care interventions for the dollars expended. A review of the literature on health care economic analyses, with particular emphasis on cost-utility analysis, is included in the present review. It is anticipated that cost-utility analysis will play a major role in health care within the coming decade.
Forecast: The Internet of Things, Worldwide
  • P Middleton
  • P Kjeldsen
  • J Tully
P. Middleton, P. Kjeldsen and J. Tully, "Forecast: The Internet of Things, Worldwide," Gartner, 2013.
Data breach investigation report
  • Verizon
Verizon, "Data breach investigation report," Verizon, 2013.