Gotowa bibliografia na temat „Protection de l'information (informatique) – Aspect médical”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Protection de l'information (informatique) – Aspect médical”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Rozprawy doktorskie na temat "Protection de l'information (informatique) – Aspect médical"
Azzi, Rita. "Blockchain Adoption in Healthcare : Toward a Patient Centric Ecosystem". Electronic Thesis or Diss., Institut polytechnique de Paris, 2023. http://www.theses.fr/2023IPPAT053.
Pełny tekst źródłaThe healthcare sector evolves constantly, driven by technological advancement and innovative solutions. From remote patient monitoring to the Internet of Things (IoT), Artificial Intelligence (AI), personalized medicine, mobile health, and electronic records systems, technology has improved patient outcomes and enhanced care delivery. These technologies have shifted the healthcare ecosystem to be more patient-centered, focusing on meeting the patient's needs rather than the needs of the individual organizations within it. However, this transformative shift experienced by the healthcare industry is associated with multiple challenges due to the inherent complexity and fragmentation of the healthcare ecosystem. This dissertation addresses three healthcare ecosystem challenges that significantly impact patients. The first challenge addressed is the problem of counterfeit or falsified drugs that represent a threat to public health, resulting from the vulnerabilities in the pharmaceutical supply chain, notably centralized data management and the lack of transparency. The second challenge addressed is the problem of healthcare data fragmentation that thwarts care coordination and impacts clinical efficiency. This problem results from the dynamic and complex patients' journey in the healthcare system, shaped by their unique health needs and preferences. Patient data are scattered across multiple healthcare organizations within centralized databases and are ruled by policies that hinder data sharing and patients' empowerment over their data. The third challenge addressed is the confidentiality and privacy of healthcare data that, if compromised, shatter the trust relationship between patients and healthcare stakeholders. This challenge results from the healthcare organizations' poor data governance that increases the risk of data breaches and unauthorized access to patient information.The blockchain has emerged as a promising solution to address these critical challenges. It was introduced into the healthcare ecosystem with the promise of enforcing transparency, authentication, security, and trustworthiness. Through comprehensive analysis and case studies, this dissertation assesses the opportunities and addresses the challenges of adopting the blockchain in the healthcare industry. We start with a thorough review of the state of the art covering the blockchain's role in improving supply chain management and enhancing the healthcare delivery chain. Second, we combine theoretical and real-world application studies to develop a guideline that outlines the requirements for building a blockchain-based supply chain. Third, we propose a patient-centric framework that combines blockchain technology with Semantic technologies to help patients manage their health data. Our fourth contribution presents a novel approach to data governance by developing a blockchain-based framework that improves data security and empowers patients to participate actively in their healthcare decisions. In this final contribution, we widen the scope of the proposed framework to include a roadmap for its adoption across diverse domains (banking, education, transportation, and logistics, etc.)
Kassem, Hala. "La protection de la personnalité dans son aspect informationnel au Liban : Enjeux et perspectives". Montpellier 1, 2007. http://www.theses.fr/2007MON10060.
Pełny tekst źródłaSerme, Gabriel. "Modularisation de la sécurité informatique dans les systèmes distribués". Electronic Thesis or Diss., Paris, ENST, 2013. http://www.theses.fr/2013ENST0063.
Pełny tekst źródłaAddressing security in the software development lifecycle still is an open issue today, especially in distributed software. Addressing security concerns requires a specific know-how, which means that security experts must collaborate with application programmers to develop secure software. Object-oriented and component-based development is commonly used to support collaborative development and to improve scalability and maintenance in software engineering. Unfortunately, those programming styles do not lend well to support collaborative development activities in this context, as security is a cross-cutting problem that breaks object or component modules. We investigated in this thesis several modularization techniques that address these issues. We first introduce the use of aspect-oriented programming in order to support secure programming in a more automated fashion and to minimize the number of vulnerabilities in applications introduced at the development phase. Our approach especially focuses on the injection of security checks to protect from vulnerabilities like input manipulation. We then discuss how to automate the enforcement of security policies programmatically and modularly. We first focus on access control policies in web services, whose enforcement is achieved through the instrumentation of the orchestration mechanism. We then address the enforcement of privacy protection policies through the expert-assisted weaving of privacy filters into software. We finally propose a new type of aspect-oriented pointcut capturing the information flow in distributed software to unify the implementation of our different security modularization techniques
Serme, Gabriel. "Modularisation de la sécurité informatique dans les systèmes distribués". Thesis, Paris, ENST, 2013. http://www.theses.fr/2013ENST0063/document.
Pełny tekst źródłaAddressing security in the software development lifecycle still is an open issue today, especially in distributed software. Addressing security concerns requires a specific know-how, which means that security experts must collaborate with application programmers to develop secure software. Object-oriented and component-based development is commonly used to support collaborative development and to improve scalability and maintenance in software engineering. Unfortunately, those programming styles do not lend well to support collaborative development activities in this context, as security is a cross-cutting problem that breaks object or component modules. We investigated in this thesis several modularization techniques that address these issues. We first introduce the use of aspect-oriented programming in order to support secure programming in a more automated fashion and to minimize the number of vulnerabilities in applications introduced at the development phase. Our approach especially focuses on the injection of security checks to protect from vulnerabilities like input manipulation. We then discuss how to automate the enforcement of security policies programmatically and modularly. We first focus on access control policies in web services, whose enforcement is achieved through the instrumentation of the orchestration mechanism. We then address the enforcement of privacy protection policies through the expert-assisted weaving of privacy filters into software. We finally propose a new type of aspect-oriented pointcut capturing the information flow in distributed software to unify the implementation of our different security modularization techniques
Marliac-Négrier, Claire. "La protection des données nominatives informatiques en matière de recherche médicale". Clermont-Ferrand 1, 1999. http://www.theses.fr/1999CLF10211.
Pełny tekst źródłaThe protection of named personal information, direct or indirect, was the object of a passionate debate in France during the 70’s, as information technology advanced, and in so doing exposed devious and aberrant practices. This led to the adoption of the law 6th January 1978 called “Informatique et libertés”. If information technology has allowed uncontestable progress in the treatment and stockage of personal information. The health services, in particular have invested heavily in this technology, especially in research and development, and here the information is particularly sensitive. What are the protections and are they sufficient? There is the problem. The law of 1978 was amended by the law 1st July 1994 so as so legally allow the communication of specific medical information, normally covered by the medical secret, to researchers. It appears that the legislation is insufficient and that this will become even more apparent with the application of the European directive n° 95/46 relative to the protection of the individual with regards to personal information and its free circulation. We propose the solutions reconciling the necessity of medical research and the protection of the individual, by valorizing an active role for the individual concerned
Philippe, Cécile. "The economics of cryptography : an essay on information". Paris 9, 2003. https://portail.bu.dauphine.fr/fileviewer/index.php?doc=2003PA090035.
Pełny tekst źródłaFaria, Maria Paula Marçal Grilo Lobato de. "Données génétiques informatisées : un nouveau défi à la protection du droit à la confidentialité des données personnelles de santé". Bordeaux 4, 1996. http://www.theses.fr/1996BOR40030.
Pełny tekst źródłaAfter a description of the dangers posed to human privacy by "new genetics" and informatics, this thesis leads to the conclusion, by means of an analysis of the portuguese juridical framework, in a compared law perspective, of the right to confidentiality, medical secrecy and personal data protection laws, that contemporary law needs a special legal statute to rule the confidentiality of personal health genetic data without which fundamental human rights will be in threat
Olech, Valérie. "Le secret médical et les technologies de l’information et de la communication". Thesis, Université de Lorraine, 2019. http://docnum.univ-lorraine.fr/ulprive/DDOC_T_2019_0343_OLECH.pdf.
Pełny tekst źródłaIs there something to add about “medical secrecy”? Scholar disputes over the professional secrecy foundations are supposed to be dried up, since it is now limited to the patient’s interest alone, which would explain the generalization of medical secrecy to all persons of the care system. Yet, when it comes to the matter of the relationship between information and communications technologies and medical secrecy, the scholar discourse suffer from a lake of clarity. What is the impact of the information and communications technologies on the “medical secrecy”? It is a question worth asking by exploring different analytical frameworks from those traditionally employed. The latter is about studying the structural movement according to which the medical secrecy is at the same time “protected” by Law in face of information and communications technologies and “affected” in Law and by the technologies
Lacoste-Vaysse, Guillaume. "La protection des données de santé à caractère personnel : pour la reconnaissance des droits du patient". Thesis, Toulouse 1, 2016. http://www.theses.fr/2016TOU10047/document.
Pełny tekst źródłaPersonal data is omnipresent on the internet and their economic importance is growing. For the information society services such as search engines, social networks, or online shopping sites, they have become indispensable. These services appear as essentially free for users, but actually have a particular economic model: the monetization of personal data of users in exchange for free access. The new data processing necessity an original governance by law
Huynh, Nghi. "Vérification et validation de politiques de contrôle d'accès dans le domaine médical". Thesis, Paris Est, 2016. http://www.theses.fr/2016PESC1042/document.
Pełny tekst źródłaIn healthcare, data digitization and the use of the Electronic Health Records (EHR) offer several benefits, such as reduction of the space occupied by data, or the ease of data search or data exchanges. IT systems must gradually act as the archivists who manage the access over sensitive data. Those have to be checked to be consistent with patient privacy wishes, hospital rules, and laws and regulations.SGAC, or Solution de Gestion Automatisée du Consentement, aims to offer a solution in which access to patient data would be based on patient rules, hospital rules and laws. However, the freedom granted to the patient can cause several problems: conflicts, hiding of the needed data to heal the patient or simply data-capture error. Therefore, verification and validation of policies are crucial: to conduct this verification, formal methods provide reliable ways to verify properties like proofs or model checking.This thesis provides verification methods applied on SGAC for the patient: it introduces the formal model of SGAC, verification methods of properties such as data reachability or hidden data detection. To conduct those verification in an automated way, SGAC is modelled in B and Alloy; these different models provide access to the tools Alloy and ProB, and thus, automated property verification with model checking
Książki na temat "Protection de l'information (informatique) – Aspect médical"
Internet and surveillance: The challenges of Web 2.0 and social media. New York: Routledge, 2011.
Znajdź pełny tekst źródłaÉveillard, Philippe. Éthique de l'Internet santé. Paris: Ellipses, 2002.
Znajdź pełny tekst źródłaVenne, Michel. Vie privée & démocratie à l'ère de l'informatique. Québec: Institut québécois de recherche sur la culture, 1994.
Znajdź pełny tekst źródłaVenne, Michel. Vie privée & démocratie à l'ère de l'informatique. Québec, Qué: Institut québécois de recherche sur la culture, 1994.
Znajdź pełny tekst źródłaJussawalla, Meheroo. The economics of intellectual property in a world without frontiers: A study of computer software. New York: Greenwood Press, 1992.
Znajdź pełny tekst źródłaHollifield, C. Ann, Joshua Cooper, Azza Karam, Colette Mazzucelli i James Felton Keith. Ethics of Personal Data Collection in International Relations Inclusionism in the Time of COVID-19. Anthem Press, 2022.
Znajdź pełny tekst źródłaSevignani, Sebastian. Privacy and Capitalism in the Age of Social Media. Taylor & Francis Group, 2015.
Znajdź pełny tekst źródłaSevignani, Sebastian. Privacy and Capitalism in the Age of Social Media. Taylor & Francis Group, 2015.
Znajdź pełny tekst źródłaSevignani, Sebastian. Privacy and Capitalism in the Age of Social Media. Taylor & Francis Group, 2016.
Znajdź pełny tekst źródłaSevignani, Sebastian. Privacy and Capitalism in the Age of Social Media. Taylor & Francis Group, 2015.
Znajdź pełny tekst źródła