Skip to main content

Health information privacy and security

Guest Editors:
Tony Sahama: University of Victoria, Canada
Kassaye Yitbarek Yigzaw: University Hospital of North Norway, Norway 

Submission Status: Open   |   Submission Deadline: 30 June 2023


This collection welcomes articles presenting original research studies about the development, usability, or use of specific methodologies, novel software, or interesting scale applications of known methods for data privacy and security. This includes privacy-preserving data processing techniques such as federated machine learning, privacy-preserving record linkage, and data anonymization. The collection also welcomes studies that discuss practical issues when managing the data integrity of health information and ethical issues arising from potential breaches due to its insufficient privacy and security.

Meet the Guest Editors

Back to top

Tony Sahama: University of Victoria, Canada

Dr. Tony R. Sahama is currently Adjunct Professor at the School of Health Information Science, University of Victoria, BC, Canada. He has also been an Editorial Board Member of BMC Medical Informatics and Decision Making for more than a decade Tony is an expert in Healthcare Information Technology, an open minded transdisciplinary researcher, a team player with 30 years of academic and research experiences with multiple stakeholders of diverse project scopes and requirements, who engages in research, teaching, and consultancy activities to facilitate collaborative practice-based inquiry of learning and to improve ‘Quality of Life’ through data-driven real-time quality decision making processes. Tony’s digital space is www.tonysahama.com.

Kassaye Yitbarek Yigzaw: University Hospital of North Norway, Norway

Kassaye Yitbarek Yigzaw, PhD, is a Senior Researcher at the Norwegian Centre for E-health Research, University Hospital of North Norway. He graduated from the UiT - The Arctic University of Norway with a PhD in Computer Science (2017). He holds an MSc in Telemedicine and E-health from the same university and BSc. in Electrical Engineering from Hawassa University in Ethiopia. He has been actively involved in various e-health research projects with a research focus on the security and privacy aspects of health information.


About the collection

The widespread adoption of electronic health records (EHRs) and the ultra-cheap data collection and processing technologies has led to the collection and processing of large amounts of health-related data. These data have a huge importance in the direct care of patients and purposes which are different from their primary use. However, the ready availability of such large volumes of detailed data has also been accompanied by privacy invasions that raise privacy concerns of patients, providers, and regulators, and there is today an urgent need to address them.

This collection welcomes articles presenting original research studies about the development, usability, or use of specific methodologies, novel software, or interesting scale applications of known methods for data privacy and security. This includes privacy-preserving data processing techniques such as federated machine learning, privacy-preserving record linkage, and data anonymization. The collection also welcomes studies that discuss practical issues when managing the data integrity of health information and ethical issues arising from potential breaches due to its insufficient privacy and security.

Image credit: rawpixel

There are currently no articles in this collection.

Submission Guidelines

Back to top

This Collection welcomes submission of Research Articles. Before submitting your manuscript, please ensure you have read our submission guidelines. Articles for this Collection should be submitted via our submission system, Snapp. During the submission process you will be asked whether you are submitting to a Collection, please select "Health Information privacy and security" from the dropdown menu.

Articles will undergo the journal’s standard peer-review process and are subject to all of the journal’s standard policies. Articles will be added to the Collection as they are published.

The Guest Editors have no competing interests with the submissions which they handle through the peer review process. The peer review of any submissions for which the Guest Editors have competing interests is handled by another Editorial Board Member who has no competing interests.