Background: Blockchain has been proposed as a critical technology to facilitate more patient-centric research and health information sharing. For instance, it can be applied to coordinate and document dynamic informed consent, a procedure that allows individuals to continuously review and renew their consent to the collection, use, or sharing of their private health information. Such has been suggested to facilitate ethical, compliant longitudinal research, and patient engagement. However, blockchain-based dynamic consent is a relatively new concept, and it is not yet clear how well the suggested implementations will work in practice. Efforts to critically evaluate implementations in health research contexts are limited.
Objective: The objective of this protocol is to guide the identification and critical appraisal of implementations of blockchain-based dynamic consent in health research contexts, thereby facilitating the development of best practices for future research, innovation, and implementation.
Methods: The protocol describes methods for an integrative review to allow evaluation of a broad range of quantitative and qualitative research designs. The PRISMA-P (Preferred Reporting Items for Systematic Review and Meta-Analysis Protocols) framework guided the review's structure and nature of reporting findings. We developed search strategies and syntax with the help of an academic librarian. Multiple databases were selected to identify pertinent academic literature (CINAHL, Embase, Ovid MEDLINE, PubMed, Scopus, and Web of Science) and gray literature (Electronic Theses Online Service, ProQuest Dissertations and Theses, Open Access Theses and Dissertations, and Google Scholar) for a comprehensive picture of the field's progress. Eligibility criteria were defined based on PROSPERO (International Prospective Register of Systematic Reviews) requirements and a criteria framework for technology readiness. A total of 2 reviewers will independently review and extract data, while a third reviewer will adjudicate discrepancies. Quality appraisal of articles and discussed implementations will proceed based on the validated Mixed Method Appraisal Tool, and themes will be identified through thematic data synthesis.
Results: Literature searches were conducted, and after duplicates were removed, 492 articles were eligible for screening. Title and abstract screening allowed the removal of 312 articles, leaving 180 eligible articles for full-text review against inclusion criteria and confirming a sufficient body of literature for project feasibility. Results will synthesize the quality of evidence on blockchain-based dynamic consent for patient-centric research and health information sharing, covering effectiveness, efficiency, satisfaction, regulatory compliance, and methods of managing identity.
Conclusions: The review will provide a comprehensive picture of the progress of emerging blockchain-based dynamic consent technologies and the rigor with which implementations are approached. Resulting insights are expected to inform best practices for future research, innovation, and implementation to benefit patient-centric research and health information sharing.
Trial Registration: PROSPERO CRD42023396983; http://tinyurl.com/cn8a5x7t.
International Registered Report Identifier (irrid): DERR1-10.2196/50339.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10877491 | PMC |
http://dx.doi.org/10.2196/50339 | DOI Listing |
Sensors (Basel)
November 2024
Department of Computer Science, University of Bristol, Bristol BS8 1QU, UK.
As unmanned aerial vehicle (UAV) technology expands into diverse applications, the demand for enhanced performance intensifies. Blockchain sharding technology offers promising avenues for improving data processing capabilities and security in drone networks. However, the inherent mobility of UAVs and their dynamic operational environment pose significant challenges to conventional sharding techniques, often resulting in communication latencies and data synchronization delays that compromise efficiency.
View Article and Find Full Text PDFSensors (Basel)
October 2024
School of Cyber Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, China.
In the construction of new power systems, the traditional network security protection mainly based on boundary protection belongs to static defense and still relies mainly on manual processing in vulnerability repair, threat response, etc. It is difficult to adapt to the security protection needs in large-scale distributed new energy, third-party aggregation platforms, and flexible interaction scenarios with power grid enterprise systems. It is necessary to conduct research on dynamic security protection models for IoT and other Blockchain-based IoT architectures.
View Article and Find Full Text PDFBMC Med Inform Decis Mak
September 2024
Yunnan Key Laboratory of Service Computing, Kunming, 650021, China.
Graded diagnosis and treatment, referral, and expert consultations between medical institutions all require cross domain access to patient medical information to support doctors' treatment decisions, leading to an increase in cross domain access among various medical institutions within the medical consortium. However, patient medical information is sensitive and private, and it is essential to control doctors' cross domain access to reduce the risk of leakage. Access control is a continuous and long-term process, and it first requires verification of the legitimacy of user identities, while utilizing control policies for selection and management.
View Article and Find Full Text PDFPLoS One
July 2024
Department of Information and Communication Engineering, Yeungnam University, Gyeongsan, South Korea.
The IoT (Internet of Things) has played a promising role in e-healthcare applications during the last decade. Medical sensors record a variety of data and transmit them over the IoT network to facilitate remote patient monitoring. When a patient visits a hospital he may need to connect or disconnect medical devices from the medical healthcare system frequently.
View Article and Find Full Text PDFPLoS One
June 2024
Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology, Tianjin University of Technology, Tianjin, PR China.
Blockchain cross-chaining is about interconnectivity and interoperability between chains and involves both physical to virtual digital aspects and cross-chaining between digital networks. During the process, the liquidity transfer of information or assets can increase the use of items with other chains, so it is worth noting that the enhancement of cross-chain liquidity is of great practical importance to cross-chain technology. In this model, Layerzero is used as the primary secure cross-chain facility to build a full-chain identity by unifying NFT-distributed autonomous cross-chain identity IDs; applying super-contract pairs to enhance cross-chain liquidity; and initiating a dynamic transaction node creditworthiness model to increase the security of the cross-chain model and its risk management.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!