期刊文献+
共找到2,457篇文章
< 1 2 123 >
每页显示 20 50 100
FedNRM:A Federal Personalized News Recommendation Model Achieving User Privacy Protection
1
作者 Shoujian Yu Zhenchi Jie +2 位作者 Guowen Wu Hong Zhang Shigen Shen 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期1729-1751,共23页
In recent years,the type and quantity of news are growing rapidly,and it is not easy for users to find the news they are interested in the massive amount of news.A news recommendation system can score and predict the ... In recent years,the type and quantity of news are growing rapidly,and it is not easy for users to find the news they are interested in the massive amount of news.A news recommendation system can score and predict the candidate news,and finally recommend the news with high scores to users.However,existing user models usually only consider users’long-term interests and ignore users’recent interests,which affects users’usage experience.Therefore,this paper introduces gated recurrent unit(GRU)sequence network to capture users’short-term interests and combines users’short-term interests and long-terminterests to characterize users.While existing models often only use the user’s browsing history and ignore the variability of different users’interest in the same news,we introduce additional user’s ID information and apply the personalized attention mechanism for user representation.Thus,we achieve a more accurate user representation.We also consider the risk of compromising user privacy if the user model training is placed on the server side.To solve this problem,we design the training of the user model locally on the client side by introducing a federated learning framework to keep the user’s browsing history on the client side.We further employ secure multiparty computation to request news representations from the server side,which protects privacy to some extent.Extensive experiments on a real-world news dataset show that our proposed news recommendation model has a better improvement in several performance evaluation metrics.Compared with the current state-of-the-art federated news recommendation models,our model has increased by 0.54%in AUC,1.97%in MRR,2.59%in nDCG@5%,and 1.89%in nDCG@10.At the same time,because we use a federated learning framework,compared with other centralized news recommendation methods,we achieve privacy protection for users. 展开更多
关键词 News recommendation federal learning privacy protection personalized attention
下载PDF
Research on Residents’Willingness to Protect Privacy in the Context of the Personal Information Protection Law:A Survey Based on Foshan Residents’Data
2
作者 Xiying Huang Qizhao Xie +5 位作者 Xunxun Jiang Zhihang Zhou Xiao Zhang Yiyuan Cheng Yu’nan Wang Chien Chi Chu 《Journal of Sustainable Business and Economics》 2023年第3期37-54,共18页
The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremel... The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security. 展开更多
关键词 personal Information Protection Law privacy security privacy protection will
下载PDF
Privacy Protection Based Access Control Scheme in Cloud-Based Services 被引量:3
3
作者 Kai Fan Qiong Tian +2 位作者 Junxiong Wang Hui Li Yintang Yang 《China Communications》 SCIE CSCD 2017年第1期61-71,共11页
With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issu... With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection(PS-ACS). In the PS-ACS scheme, we divide users into private domain(PRD) and public domain(PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption(KAE) and the Improved Attribute-based Signature(IABS) respectively. In PUD, we construct a new multi-authority ciphertext policy attribute-based encryption(CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users' privacy in cloud-based services. 展开更多
关键词 access control data sharing privacy protection cloud-based services
下载PDF
Security and Privacy Frameworks for Access Control Big Data Systems 被引量:1
4
作者 Paolina Centonze 《Computers, Materials & Continua》 SCIE EI 2019年第5期361-374,共14页
In the security and privacy fields,Access Control(AC)systems are viewed as the fundamental aspects of networking security mechanisms.Enforcing AC becomes even more challenging when researchers and data analysts have t... In the security and privacy fields,Access Control(AC)systems are viewed as the fundamental aspects of networking security mechanisms.Enforcing AC becomes even more challenging when researchers and data analysts have to analyze complex and distributed Big Data(BD)processing cluster frameworks,which are adopted to manage yottabyte of unstructured sensitive data.For instance,Big Data systems’privacy and security restrictions are most likely to failure due to the malformed AC policy configurations.Furthermore,BD systems were initially developed toped to take care of some of the DB issues to address BD challenges and many of these dealt with the“three Vs”(Velocity,Volume,and Variety)attributes,without planning security consideration,which are considered to be patch work.Some of the BD“three Vs”characteristics,such as distributed computing,fragment,redundant data and node-to node communication,each with its own security challenges,complicate even more the applicability of AC in BD.This paper gives an overview of the latest security and privacy challenges in BD AC systems.Furthermore,it analyzes and compares some of the latest AC research frameworks to reduce privacy and security issues in distributed BD systems,which very few enforce AC in a cost-effective and in a timely manner.Moreover,this work discusses some of the future research methodologies and improvements for BD AC systems.This study is valuable asset for Artificial Intelligence(AI)researchers,DB developers and DB analysts who need the latest AC security and privacy research perspective before using and/or improving a current BD AC framework. 展开更多
关键词 Big data access control distributed systems SECURITY privacy
下载PDF
Blockchain Data Privacy Access Control Based on Searchable Attribute Encryption 被引量:1
5
作者 Tao Feng Hongmei Pei +2 位作者 Rong Ma Youliang Tian Xiaoqin Feng 《Computers, Materials & Continua》 SCIE EI 2021年第1期871-884,共14页
Data privacy is important to the security of our society,and enabling authorized users to query this data efficiently is facing more challenge.Recently,blockchain has gained extensive attention with its prominent char... Data privacy is important to the security of our society,and enabling authorized users to query this data efficiently is facing more challenge.Recently,blockchain has gained extensive attention with its prominent characteristics as public,distributed,decentration and chronological characteristics.However,the transaction information on the blockchain is open to all nodes,the transaction information update operation is even more transparent.And the leakage of transaction information will cause huge losses to the transaction party.In response to these problems,this paper combines hierarchical attribute encryption with linear secret sharing,and proposes a blockchain data privacy protection control scheme based on searchable attribute encryption,which solves the privacy exposure problem in traditional blockchain transactions.The user’s access control is implemented by the verification nodes,which avoids the security risks of submitting private keys and access structures to the blockchain network.Associating the private key component with the random identity of the user node in the blockchain can solve the collusion problem.In addition,authorized users can quickly search and supervise transaction information through searchable encryption.The improved algorithm ensures the security of keywords.Finally,based on the DBDH hypothesis,the security of the scheme is proved in the random prediction model. 展开更多
关键词 Blockchain privacy protection attribute encryption access control searchable-encryption
下载PDF
Cloud-Based Access Control to Preserve Privacy in Academic Web Application
6
作者 Aljwhrh Almtrf Mohamed Zohdy 《Journal of Computer and Communications》 2019年第12期37-49,共13页
Emerging cloud computing has introduced new platforms for developing enterprise academic web applications, where software, platforms and infrastructures are published to the globe as services. Software developers can ... Emerging cloud computing has introduced new platforms for developing enterprise academic web applications, where software, platforms and infrastructures are published to the globe as services. Software developers can build their systems by multiple invocations of these services. This research is devoted to investigating the management and data flow control over enterprise academic web applications where web services and developed academic web application are constructing infrastructure-networking scheme at the application level. Academic web services are invoked over http port and using REST based protocol;thus traditional access control method is not enough to control the follow of data using host and port information. The new cloud based access control rules proposed here are to be designed and implemented to work at this level. The new proposed access control architecture will be a web service gateway, and it published itself as a service (SaaS). We used three case studies to test our moodle and then we apply JSON parsers to perceive web service description file (WSDL file) and supply policies according to data are to be allowed or denied based on user roll through our parsing. 展开更多
关键词 CLOUD COMPUTING Web Application Access control Data privacy privacy Framework
下载PDF
Personalized Privacy Protecting Model in Mobile Social Network
7
作者 Pingshui Wang Zecheng Wang +1 位作者 Tao Chen Qinjuan Ma 《Computers, Materials & Continua》 SCIE EI 2019年第5期533-546,共14页
With the rapid development of the new generation of information technology,the analysis of mobile social network big data is getting deeper and deeper.At the same time,the risk of privacy disclosure in social network ... With the rapid development of the new generation of information technology,the analysis of mobile social network big data is getting deeper and deeper.At the same time,the risk of privacy disclosure in social network is also very obvious.In this paper,we summarize the main access control model in mobile social network,analyze their contribution and point out their disadvantages.On this basis,a practical privacy policy is defined through authorization model supporting personalized privacy preferences.Experiments have been conducted on synthetic data sets.The result shows that the proposed privacy protecting model could improve the security of the mobile social network while keeping high execution efficiency. 展开更多
关键词 Mobile social network privacy policy personalized privacy preference MODELS
下载PDF
An Optimal Control Approach to Structured Treatment Interruptions for HIV Patients: A Personalized Medicine Perspective
8
作者 Adam Attarian Hien Tran 《Applied Mathematics》 2017年第7期934-955,共22页
Highly Active Antiretroviral Therapy (HAART) has changed the course of human immunodeficiency virus (HIV) treatments since its introduction. However, for many patients, long term continuous HAART is expensive and can ... Highly Active Antiretroviral Therapy (HAART) has changed the course of human immunodeficiency virus (HIV) treatments since its introduction. However, for many patients, long term continuous HAART is expensive and can include problems with drug toxicity and side effects, as well as increased drug resistance. Because of these reasons, some HIV infected patients will voluntarily terminate HAART. Some of these patients will also interrupt the continuous prescribed therapies for short or long periods. After discontinuing HAART, patients will usually experience a rapid increase in viral load coupled with an immediate decline in CD4+ counts. The canonical example of a patient undergoing unsupervised breaks in HAART is that of the “Berlin patient”. In this case, the patient was able to control viral load in the absence of treatment by cycling HAART on and off due to non-related infections. Due to this patient, interest in the use of structured treatment interruptions (STI) as a mechanism to regulate an HIV infection piqued. This paper describes an optimal control approach to determine STI regimen for HIV patients. The optimal STI was implemented in the context of the receding horizon control (RHC) using a mathematical model for the in-vivo dynamics of an HIV type 1 infection. Using available clinical data, we calibrate the model by estimating on a patient specific basis, a best estimable set of parameters using sensitivity analysis and subset selection. We demonstrate how customized STI protocols can be designed through the variation of control parameters on a patient specific basis. 展开更多
关键词 personalIZED Medicine HIV Model Sensitivity Analysis SUBSET Selection Parameter Estimation STRUCTURED Treatment INTERRUPTIONS Receding HORIZON control
下载PDF
Endoscopy during COVID-19 pandemic: An overview of infection control measures and practical application
9
作者 Margaret Teng Si Ying Tang Calvin Jianyi Koh 《World Journal of Gastrointestinal Endoscopy》 CAS 2020年第9期256-265,共10页
The novel severe acute respiratory syndrome coronavirus 2(SARS-CoV-2)has resulted in coronavirus disease 2019(COVID-19)which has affected more than 4.5 million people in 213 countries,and has been declared a pandemic ... The novel severe acute respiratory syndrome coronavirus 2(SARS-CoV-2)has resulted in coronavirus disease 2019(COVID-19)which has affected more than 4.5 million people in 213 countries,and has been declared a pandemic by World Health Organization on March 11,2020.The transmission of SARS-CoV-2 has been reported to occur primarily through direct contact or droplets.There have also been reports that SARS-CoV-2 can be detected in biopsy and stool specimens,and it has been postulated that there is potential for fecal–oral transmission as well.Gastrointestinal symptoms have been reported in 17.6%of COVID-19 patients and transmission can potentially occur through gastrointestinal secretions in this group of patients.Furthermore,transmission can also occur in asymptomatic carriers or patients with viral shedding during the incubation period.Endoscopic procedures hence may pose significant risks of transmission(even for those not directly involving confirmed COVID-19 cases)as endoscopists and endoscopy staff are in close contact with patients during these aerosol generating procedures.This could result in inadvertent transmission of infection at time of endoscopy. 展开更多
关键词 CORONAVIRUS ENDOSCOPY Infection control personal protective equipment GUIDELINES GASTROENTEROLOGY
下载PDF
Optimal Task Recommendation for Spatial Crowdsourcing with Privacy Control
10
作者 Dan Lu Qilong Han +1 位作者 Hongbin Zhao Kejia Zhang 《国际计算机前沿大会会议论文集》 2017年第1期104-106,共3页
Spatial Crowdsourcing(SC)is a transformative platform that engages a crowd of mobile users(i.e.,workers)in collecting and analyzing environmental,social and other spatio-temporal information.However,current solutions ... Spatial Crowdsourcing(SC)is a transformative platform that engages a crowd of mobile users(i.e.,workers)in collecting and analyzing environmental,social and other spatio-temporal information.However,current solutions ignore the preference of each worker’s remuneration and acceptable distance,and the lack of error analysis after privacy control lead to undesirable task recommendation.In this paper,we introduce an optimization framework for task recommendation while protecting participant privacy.We propose a Generalization mechanism based on Bisecting k-means and an efficient algorithm considering the generalization error to maximization the reward of SC server.Both numerical evaluations and performance analysis are conducted to show the effectiveness and efficiency of the propose framework. 展开更多
关键词 SPATIAL crowdsourcing TASK RECOMMENDATION privacy control REWARD
下载PDF
A Privacy-Preserving System Design for Digital Presence Protection
11
作者 Eric Yocam Ahmad Alomari +1 位作者 Amjad Gawanmeh Wathiq Mansoor 《Computers, Materials & Continua》 SCIE EI 2023年第5期3091-3110,共20页
A person’s privacy has become a growing concern,given the nature of an expansive reliance on real-time video activities with video capture,stream,and storage.This paper presents an innovative system design based on a... A person’s privacy has become a growing concern,given the nature of an expansive reliance on real-time video activities with video capture,stream,and storage.This paper presents an innovative system design based on a privacy-preserving model.The proposed system design is implemented by employing an enhanced capability that overcomes today’s single parameterbased access control protection mechanism for digital privacy preservation.The enhanced capability combines multiple access control parameters:facial expression,resource,environment,location,and time.The proposed system design demonstrated that a person’s facial expressions combined with a set of access control rules can achieve a person’s privacy-preserving preferences.The findings resulted in different facial expressions successfully triggering a person’s face to be blurred and a person’s privacy when using a real-time video conferencing service captured from a webcam or virtual webcam.A comparison analysis of capabilities between existing designs and the proposed system design shows enhancement of the capabilities of the proposed system.A series of experiments exercising the enhanced,real-time multi-parameterbased system was shown as a viable path forward for preserving a person’s privacy while using a webcam or virtual webcam to capture,stream,and store videos. 展开更多
关键词 Attribute-based access control authentication AUTHORIZATION BIOMETRICS facial recognition IDENTITY privacy machine learning deep learning
下载PDF
A Method to Improve the Accuracy of Personal Information Detection
12
作者 Chih-Chieh Chiu Chu-Sing Yang Ce-Kuen Shieh 《Journal of Computer and Communications》 2023年第6期131-141,共11页
It is necessary to confirm the personal data factors and the rules of verification before conducting personal data detection. So that the detection method can be written in the subsequent implementation of the automat... It is necessary to confirm the personal data factors and the rules of verification before conducting personal data detection. So that the detection method can be written in the subsequent implementation of the automatic detection tool. This paper will conduct experiments on common personal data factor rules, including domestic personal identity numbers and credit card numbers with checksums. We use ChatGPT to test the accuracy of identifying personal information like ID card identification numbers or credit card numbers. And then use personal data correlation to reduce the time for personal data identification. Although the number of personal information factors found has decreased, it has had a better effect on the actual manual personal data identification. The result shows that it saves about 45% of the calculation time, and the execution efficiency of the accuracy is also improved with the original method by about 22%, which is about 2.2 times higher than the general method. Therefore, the method proposed in this paper can accurately and effectively find out the leftover personal information in the enterprise. . 展开更多
关键词 Data Leakage privacy personal Information Factors
下载PDF
An Apparatus Design for the Vehicle Control Scheme in Personal Rapid Transit System
13
作者 Jun-Ho Lee 《Journal of Mechanics Engineering and Automation》 2013年第5期325-333,共9页
关键词 快速交通系统 运输车辆 装置设计 控制计划 SIMULINK 中央控制系统 LabVIEW Matlab
下载PDF
迈向信任的算法个性化推荐——“一键关闭”的法律反思
14
作者 林嘉 罗寰昕 《编辑之友》 北大核心 2024年第3期79-88,共10页
个性化推荐主要面临威胁人类主体自主性、“信息茧房”与“回音室”效应、大数据“杀熟”方面的质疑。“一键关闭”功能因能够实现隐私个人控制、促进信息自由流通和预防价格歧视而被推崇。然而,用户往往缺少隐私自治能力,个性化推荐造... 个性化推荐主要面临威胁人类主体自主性、“信息茧房”与“回音室”效应、大数据“杀熟”方面的质疑。“一键关闭”功能因能够实现隐私个人控制、促进信息自由流通和预防价格歧视而被推崇。然而,用户往往缺少隐私自治能力,个性化推荐造成群体极化之前首先具有议程凝聚、促进交往的价值,以关闭个性化推荐来解决价格歧视存在目标和手段的错位。“一键关闭”不仅难以符合规制预期,其自身还存在可操作度低和所承载公共价值模糊的弊端。个性化推荐的治理应以算法向善为方向,通过打造以信任为中心的透明可解释、用户交互友好的算法推荐,发挥个性化推荐的公共价值,增进社会福利。 展开更多
关键词 个性化推荐 算法规制 可信算法 隐私个人控制 “信息茧房”
下载PDF
基于个性化时空聚类的差分隐私轨迹保护模型
15
作者 尹春勇 蒋奕阳 《信息网络安全》 CSCD 北大核心 2024年第1期80-92,共13页
随着位置感知设备的普及,轨迹数据已广泛应用于现实生活。然而,轨迹数据通常与敏感标签相关联,不当地分享或发布这些数据可能会泄露用户的隐私,且不同数据的敏感程度互异。针对上述问题,文章提出了基于个性化时空聚类的差分隐私轨迹保... 随着位置感知设备的普及,轨迹数据已广泛应用于现实生活。然而,轨迹数据通常与敏感标签相关联,不当地分享或发布这些数据可能会泄露用户的隐私,且不同数据的敏感程度互异。针对上述问题,文章提出了基于个性化时空聚类的差分隐私轨迹保护模型。首先,针对轨迹中海量时间数据与隐私保护的需要,文章提出模糊均值聚类算法(FCM算法);其次,在空间分割的过程中,通过密度进行聚类,并实现个性化调整隐私预算分配的目的,从而提高数据效用;再次,在轨迹合成阶段,对比真实轨迹数据,选择更具代表性的轨迹;最后,在发布阶段,引入Laplace机制对轨迹数目进行隐私保护。为了验证文章所提出的模型在轨迹效用与隐私保护上的成果,将该模型与另外两种模型在4个阶段上进行了比较。实验结果表明,文章所提出的模型在数据效用方面提升15.45%,在相同隐私预算下,隐私保护强度提升至少35.62%。 展开更多
关键词 个性化预算分配 差分隐私 时空聚类 轨迹隐私 轨迹发布
下载PDF
网络平台隐私政策公开征求意见:性质、正当性与程序构造
16
作者 陈丹 杨永建 张晓宁 《齐齐哈尔大学学报(哲学社会科学版)》 2024年第3期37-42,共6页
《网络数据安全管理条例(征求意见稿)》第43条的出台,明确了网络平台隐私政策制定中公开征求意见的合法性。隐私政策公开征求意见有别于传统法律公开征求意见机制,它实质上是新型元规制工具在网络平台中的应用。在此基础上,隐私政策公... 《网络数据安全管理条例(征求意见稿)》第43条的出台,明确了网络平台隐私政策制定中公开征求意见的合法性。隐私政策公开征求意见有别于传统法律公开征求意见机制,它实质上是新型元规制工具在网络平台中的应用。在此基础上,隐私政策公开征求意见发挥着补救知情同意规则失灵、提供用户参与途径,丰富外部参与渠道和凝聚多方智识的功能和作用。结合《互联网平台及产品服务隐私协议要求(征求意见稿)》的指引,隐私政策公开征求意见的程序构造成为规制改革的主要方向:一是建立隐私政策公开征求意见的起草说明、方式、时间等公开发布机制,二是构筑隐私政策回应方式、用户获得回应确权等回应机制。 展开更多
关键词 隐私政策 个人信息 公开征求意见 程序构造
下载PDF
工作场所隐私缺失会导致工作脱离行为吗?———一项基于情感事件理论的研究
17
作者 王淑红 芦青 张利闪 《技术经济》 北大核心 2024年第2期118-128,共11页
越来越多的企业开始采用开放式和共享式的办公空间设计,而开放式和共享式办公空间设计导致的一个关键问题就是办公场所隐私缺失。本研究基于情感事件理论,通过对210名员工进行时间间隔为两周的两阶段问卷调查,探析了工作场所隐私缺失会... 越来越多的企业开始采用开放式和共享式的办公空间设计,而开放式和共享式办公空间设计导致的一个关键问题就是办公场所隐私缺失。本研究基于情感事件理论,通过对210名员工进行时间间隔为两周的两阶段问卷调查,探析了工作场所隐私缺失会怎样通过消极情绪影响到员工的工作脱离行为。最终得到的研究结果表明:工作场所隐私缺失会对员工的工作脱离行为产生显著的正向影响,消极情绪在两者之间发挥部分中介作用。此外,控制点调节了工作场所隐私缺失与消极情绪之间的关系:相较于内控制点个体,外控制点个体更容易受到工作场所隐私缺失的消极影响,其消极情绪的增加更为明显,对工作脱离行为的影响也更强烈。 展开更多
关键词 工作场所隐私缺失 工作脱离 消极情绪 控制点
下载PDF
公众知情权与个人隐私权:公共卫生治理中的价值两难与伦理抉择
18
作者 朱海林 《社会治理》 2024年第2期47-57,共11页
公众知情权与个人隐私权是公共卫生治理中两种均应保护的重要权利。保障公众知情权与个人隐私权不仅有利于保障公民权利和维护公共健康,而且是维护人的尊严和价值、促进社会文明进步的题中之义。二者既有诸多共同的重要意义和伦理价值,... 公众知情权与个人隐私权是公共卫生治理中两种均应保护的重要权利。保障公众知情权与个人隐私权不仅有利于保障公民权利和维护公共健康,而且是维护人的尊严和价值、促进社会文明进步的题中之义。二者既有诸多共同的重要意义和伦理价值,也有不同的价值取向。价值取向的差异可能导致实践中两种权利之间的冲突。现实地看,公共卫生治理中公众知情权与个人隐私权的冲突主要表现为两种权利主体之间的利益冲突、以权利冲突为内容的法律冲突以及由义务主体的“一身二任”导致的义务冲突,从伦理层面看则是两种权利的不同价值取向导致的价值两难、以“尊重”原则为核心的伦理冲突以及以道德义务为核心的价值冲突和角色伦理困境。公共卫生治理中公众知情权与个人隐私权的冲突看似一种非此即彼的“悲剧性冲突”,但由于二者在尊重和保障公民权利和维护公众健康等方面具有价值统一性,两种权利仍然可以而且应该通过有限度的让渡方式予以平衡。平衡公众知情权与个人隐私权的价值两难,应基于公共利益优先和生命健康至上,坚持必要性、最小化和不伤害等伦理原则,使个人隐私权有限度地让渡于公众知情权。 展开更多
关键词 公共卫生治理 公众知情权 个人隐私权 价值两难 伦理抉择
下载PDF
IMB模型框架下小组个性化干预对PE患者自护能力、血压控制的影响
19
作者 刘佳 王蕊 +2 位作者 王怡 韩峤 刘小玮 《中国计划生育学杂志》 2024年第3期604-608,613,共6页
目的:探究IMB模型框架下小组个性化干预对子痫前期(PE)患者自护能力、血压控制的影响。方法:随机数字表法将2021年3月-2023年2月本院就诊的PE患者200例分为观察组与对照组各100例,两组均予以常规护理干预,观察组同时予以信息-动机-行为... 目的:探究IMB模型框架下小组个性化干预对子痫前期(PE)患者自护能力、血压控制的影响。方法:随机数字表法将2021年3月-2023年2月本院就诊的PE患者200例分为观察组与对照组各100例,两组均予以常规护理干预,观察组同时予以信息-动机-行为技巧(IMB)模型框架下小组个性化护理干预,均干预至妊娠分娩。比较两组自护能力[自我护理能力测定量表(ESCA)评分]、负性心理[焦虑自评量表(SAS)评分、抑郁自评量表(SDS)评分]、治疗依从性、血压控制情况及分娩结局。结果:干预后观察组ESCA各维度评分均高于对照组,SDS(42.55±4.28分)、SAS(43.39±4.21分)评分均低于对照组(48.36±4.33分、47.57±4.36分),治疗依从性(94.0%)高于对照组(83.0%),收缩压及舒张压(127.6±7.5 mmHg、93.5±4.3 mmHg)低于对照组(142.5±8.4mmHg、104.6±5.5 mmHg),不良分娩结局低于对照组(均P<0.05)。结论:对PE患者实施IMB模型框架下小组个性化干预可提高患者的自护能力与治疗依从性,减轻负性心理,有利于血压控制及改善妊娠结局,提高了护理效果。 展开更多
关键词 子痫前期 信息-动机-行为技巧模型 小组个性化干预 自护能力 血压控制 依从性 分娩结局
下载PDF
支持受控共享的医疗数据隐私保护方案
20
作者 郭庆 田有亮 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2024年第1期165-177,共13页
患者医疗健康数据信息的合理利用促进了医学研究机构的发展。针对目前患者与医疗研究机构间共享医疗数据隐私易泄露,以及患者对医疗数据的使用情况不可控的问题,提出一种支持受控共享的医疗数据隐私保护方案。首先,将区块链与代理服务... 患者医疗健康数据信息的合理利用促进了医学研究机构的发展。针对目前患者与医疗研究机构间共享医疗数据隐私易泄露,以及患者对医疗数据的使用情况不可控的问题,提出一种支持受控共享的医疗数据隐私保护方案。首先,将区块链与代理服务器结合设计医疗数据受控共享模型,区块链矿工节点分布式构造代理重加密密钥,使用代理服务器存储和转换医疗数据密文,利用代理重加密技术在保护患者隐私的同时实现医疗数据安全共享。其次,设计用户权限动态调整机制,由患者与区块链授权管理节点交互通过授权列表来更新医疗数据访问权限,实现患者对医疗数据的可控共享。最后,安全性分析表明,所提方案可以在医疗数据隐私保护的同时,实现医疗数据动态共享,并且可以抵抗共谋攻击。性能分析表明,该方案在通信开销、计算开销方面具有优势,适用于患者或医院与研究机构间的数据受控共享。 展开更多
关键词 区块链 医疗数据 受控共享 代理重加密 隐私保护
下载PDF
上一页 1 2 123 下一页 到第
使用帮助 返回顶部