Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Confidentiality

Handbook of Research on ICTs for Human-Centered Healthcare and Social Care Services
Corresponds to the information that should be preserved, being made available just for who is authorized to use it.
Published in Chapter:
Security of ICTs Supporting Healthcare Activities
José Manuel Gaivéo (School of Business and Administration of Polytechnic Institute of Setubal, Portugal)
DOI: 10.4018/978-1-4666-3986-7.ch011
Abstract
Healthcare activities and all that are related with it are conducted by people. This single fact has brought up many precautions about patients and about information related with their health. Using information and communication technologies to support this kind of information requires particular attention about what happens, namely about who can use it and for what it can be used. This chapter intends to identify the vulnerabilities that could be explored, using an international security standard to support a proactive attitude in face of potential threats that explore the identified vulnerabilities, damaging organizational information assets. Another intention is the establishment of a basis of references in information security to define a level of risk classification to build a referential to the potential that a given threat has to exploit the vulnerabilities of an asset, preventing damages to personal and organizational property, including information, and also activity continuity.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
CSAP: Cyber Security Asynchronous Programming With C++20 and C# 8 for Internet of Things and Embedded Software Systems
Is the process to assure that nobody is able to get into the possession of the data and read it without the legitimate user.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security and Risk Management
The protection of information against theft and eavesdropping.
Full Text Chapter Download: US $37.50 Add to Cart
National Security Policy and Strategy and Cyber Security Risks
A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information.
Full Text Chapter Download: US $37.50 Add to Cart
Security and Privacy on Personalized Multi-Agent System
Preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information.
Full Text Chapter Download: US $37.50 Add to Cart
Healthcare Ethics in the Information Age
The protection of private information, once it has been disclosed by a patient to a healthcare professional (e.g., during a medical examination or taking of a medical history). Confidentiality requires patients to give up their informational privacy.
Full Text Chapter Download: US $37.50 Add to Cart
Evaluation of Security Architectures for Mobile Broadband Access
A cryptographic security service which allows only authorized users or network nodes to access information content.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Policy in Large Public Organizations: A Case Study Through ISO 27002
Data or information prevented from the exposure to unauthorized individuals is labeled as confidential.
Full Text Chapter Download: US $37.50 Add to Cart
Pastoral Care and Counseling in Early Childhood Years: Implication for Intervention
A promise or assurance guaranteed by a pastoral carer that they will not to divulge the information to anyone. Confidentiality and anonymity are the codes of ethics that bind one to ensure that the other person’s issues are not repeated to anyone.
Full Text Chapter Download: US $37.50 Add to Cart
Cloud Cryptography
This is protecting information from unauthorised access.
Full Text Chapter Download: US $37.50 Add to Cart
Access Control Framework for Cloud Computing
A set of rules or a promise that limits access or places restrictions on certain types of information.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Policies
The protection of data and information from disclosure to unauthorized persons.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Within an E-Learning Environment
Ensures that information and data are not disclosed to any unauthorized person or entity (International Federation of Accountants, 2000).
Full Text Chapter Download: US $37.50 Add to Cart
Security Challenges in Cloud Computing
A property by which the data enclosed in a message is secret, if acquired however, the data is non-intelligent to be read.
Full Text Chapter Download: US $37.50 Add to Cart
Impact of Information Technology on Patient Confidentiality Rights: A Perspective
Literally, it is the state of keeping or being kept secret or private. In medical practice, confidentiality is the duty to keep and/or maintain (not to unlawfully disclose to third person) the patient’s private information (secrets) revealed during a professional relationship.
Full Text Chapter Download: US $37.50 Add to Cart
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Assurance that information is not disclosed to unauthorized individuals, processes, or devices.
Full Text Chapter Download: US $37.50 Add to Cart
Computer Forensics and Cyber Attacks
Private content in data communication between users.
Full Text Chapter Download: US $37.50 Add to Cart
Which Rights for Which Subjects? Genetic Confidentiality and Privacy in the Post-Genomic Era
A duty held by professionals towards their clients and patients whereby they are committed to keep secret anything they learn in the course of the context of their professional relation with their client or patient.
Full Text Chapter Download: US $37.50 Add to Cart
Social Research Methods in Cybersecurity: From Criminology to Industrial Cybersecurity
The quality that a document or file must have so that it is only accessible in an understandable way or is read by the authorized person or system.
Full Text Chapter Download: US $37.50 Add to Cart
Social and Ethical Aspects of Biomedical Research
(in relation to biomedical research): Prevention of disclosure, to other than authorized individuals, of a research unit proprietary information or of a subject´s identity.
Full Text Chapter Download: US $37.50 Add to Cart
Implementing Information Security Using Multimodal Biometrics
It is the practice of keeping private information as secret.
Full Text Chapter Download: US $37.50 Add to Cart
Certification and Medico-Legal Aspects of Neurodevelopmental Disorders in India
A legally protected right that prohibits the health care provider from disclosing information communicated during the consultation to a third party about the patient.
Full Text Chapter Download: US $37.50 Add to Cart
Importance of Ethics and Education to Understand the Audit Mission
Full Text Chapter Download: US $37.50 Add to Cart
Security Policy Issues in Internet Banking in Malaysia
The ability to prevent unauthorized parties from interpreting or understanding data.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Threats to Network Based Information Systems
Refers to the ability to ensure that messages and data are available only to those who are authorised to view them.
Full Text Chapter Download: US $37.50 Add to Cart
Understanding the Methods behind Cyber Terrorism
Assurance that information is not disclosed to unauthorized individuals, processes, or devices (Harris, 2002 AU30: The in-text citation "Harris, 2002" is not in the reference list. Please correct the citation, add the reference to the list, or delete the citation. ).
Full Text Chapter Download: US $37.50 Add to Cart
Disruptive Technology Impacts on Security
Managing and maintaining information such that it is known no more widely than necessary.
Full Text Chapter Download: US $37.50 Add to Cart
Secure Techniques for Remote Reconfiguration of Wireless Embedded Systems
Confidentiality is the property that ensures the accessibility of information only for authorized persons.
Full Text Chapter Download: US $37.50 Add to Cart
Cloud Computing Security Issues of Sensitive Data
Full Text Chapter Download: US $37.50 Add to Cart
Agents and Payment Systems in E-Commerce
The nonoccurrence of the unauthorized disclosure of information (Barbacci, 1995 AU20: The in-text citation "Barbacci, 1995" is not in the reference list. Please correct the citation, add the reference to the list, or delete the citation. ).
Full Text Chapter Download: US $37.50 Add to Cart
My Health Record and Emerging Cybersecurity Challenges in the Australian Digital Environment
Personal health records of the patients, must be protected from being misused by those who are not concerned with it. The information of the patient must be released only with patient’s formal consent and authorized medical persons have access to the information for clinical treatment or research purposes.
Full Text Chapter Download: US $37.50 Add to Cart
Argument for Improved Security in Local Governments Within the Economic Community of West African States
Assurance that information is not disclosed to unauthorized individuals, processes, or devices (Harris, 2002 AU13: The in-text citation "Harris, 2002" is not in the reference list. Please correct the citation, add the reference to the list, or delete the citation. ).
Full Text Chapter Download: US $37.50 Add to Cart
Compliance With Information Systems Security Controls in Higher Education in South Africa
Assurance that information is not disclosed to unauthorized individuals, processes, or devices.
Full Text Chapter Download: US $37.50 Add to Cart
The Different Aspects of Information Security Education
The ability to ensure secrecy and prevent unauthorized disclosure of information.
Full Text Chapter Download: US $37.50 Add to Cart
Emerging Security Issues in VANETS for E-Business
Is the prevention of unauthorized disclosure of information concerns the content of a message. Only the sender and the receiver are supposed to know the content. Attacks include message interception (man-in-the-middle attacks), content release to other parties, etc.
Full Text Chapter Download: US $37.50 Add to Cart
Designing an Effective Information Security Policy for Public Organizations: ISO 27001 as a Success Framework
Data or information prevented from the exposure to unauthorized individuals is labeled as confidential.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Perspectives of Blockchain in Cybersecurity: Applications and Future Developments
A principle of cybersecurity which dictates that only those who should be able to have access to certain data, should be able to access it.
Full Text Chapter Download: US $37.50 Add to Cart
E-Commerce: The Benefits, Security Risks, and Countermeasures
One of the primary security properties that protects information from unauthorized disclosure.
Full Text Chapter Download: US $37.50 Add to Cart
Knowledge Management and Information Technology Security Services
Protects the privacy of information and reveals data only to authorized parties who have the legitimate need to access the system.
Full Text Chapter Download: US $37.50 Add to Cart
A Comparative Study on DNA-Based Cryptosystem
The key feature of security to ensure the data or the information is accessed only by the authorized users.
Full Text Chapter Download: US $37.50 Add to Cart
Security in Swarm Robotics
The assurance that no one other than the intended recipient(s) can read the data; in other words, the data is kept secret between the sender and recipient.
Full Text Chapter Download: US $37.50 Add to Cart
External Auditors Discover Management Breach of Trust: Evidence From Mexico
Avoid dissemination of information from the company with any other individual, company or organization. It is the strict need not to divulge information about the company with no one.
Full Text Chapter Download: US $37.50 Add to Cart
The Problem with People and Information Security
Corresponds to the information that should be preserved, being made available just for who is authorized to use it.
Full Text Chapter Download: US $37.50 Add to Cart
Secure Data Deduplication of Encrypted Data in Cloud
Protecting the information from disclosure to unauthorized parties.
Full Text Chapter Download: US $37.50 Add to Cart
Information Assurance and Security Curriculum Meeting the SIGITE Guidelines
Keeping information restricted to only those who should have access to it. Information should be controlled from outside interception. Confidentiality suggests control of information on the outbound communication channel as a security service.
Full Text Chapter Download: US $37.50 Add to Cart
Teletranslation
Assurance that information is not disclosed to unauthorized persons, processes, or devices.
Full Text Chapter Download: US $37.50 Add to Cart
A Guide to Non-Disclosure Agreements for Researchers
Restrictions on the dissemination of information (Garner, 2004, p. 318).
Full Text Chapter Download: US $37.50 Add to Cart
Research Ethics Among Undergraduates of the Social Sciences
‘A research project guarantees confidentiality when the researcher can identify a given person’s responses but promises not to do so publicly’ ( Babbie, 2020 ).
Full Text Chapter Download: US $37.50 Add to Cart
Ethical Issues in Couple and Family Research and Therapy
A set of rules that limits the access to some information. In the cases of therapy or research, the actions undertook by the psychologist in order to protect the personal information of their clients.
Full Text Chapter Download: US $37.50 Add to Cart
Practical Measures for Securing Government Networks
Confidentiality is the concept of ensuring that data are disclosed only to authorized subjects (e.g., individuals, processes). Confidentiality protects data from unauthorized disclosure. It could involve ensuring all user data is protected or fields are selectively protected. Traffic flow confidentiality may also be provided, protecting the information that may be derived from a traffic analysis. Confidentiality is one of the three goals of a security program
Full Text Chapter Download: US $37.50 Add to Cart
A Formal Verification Centred Development Process for Security Protocols
The protection of information, so that someone not authorized to access the information cannot read the information, even though the unauthorized person might see the information’s container.
Full Text Chapter Download: US $37.50 Add to Cart
Reviewing the Security Features in Contemporary Security Policies and Models for Multiple Platforms
Confidentiality is the most important characteristic of the information security which means that only authorized person is able to access the resource. It imposed some constraints over the sharing of resources with users.
Full Text Chapter Download: US $37.50 Add to Cart
Security Issues of Smartphones Regarding M-Commerce
Ensuring that only authorized people can access information and data.
Full Text Chapter Download: US $37.50 Add to Cart
Security of Mobile Code
Confidentiality is any private data stored on a platform or carried by an agent that must remain confidential. Mobile agents also need to keep their present location and the whole route confidential
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain-Based Health Information Systems to Improve Data Security
An act of preserving authorized access and disclosure of data and information with the main goal of protecting subjects’ privacy and proprietary information.
Full Text Chapter Download: US $37.50 Add to Cart
Big Data Security: Challenges, Recommendations and Solutions
Confidentiality is a property that ensures that data is not made disclosed to unauthorized persons. It enforces predefined rules while accessing the protected data.
Full Text Chapter Download: US $37.50 Add to Cart
Data Speaks: Use of Poems and Photography in Qualitative Research
To respect the confidential nature of the information gathered during the research and preserve the anonymity of participants.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy-Preserving Estimation
The status accorded to specific attributes (such as salary) in datasets, whose original values should not be revealed. Generally, some type of protection such as masking must be provided before these confidential attributes are disseminated.
Full Text Chapter Download: US $37.50 Add to Cart
An Analysis of Privacy Language in the Scholarly Literature on Mental Health Apps
The condition of information held in private, outside of the public view. A central value in medicine and law in regard to patient medical information and in information technology regarding control over one’s data.
Full Text Chapter Download: US $37.50 Add to Cart
PolyOrBAC: An Access Control Model for Inter-Organizational Web Services
is the absence of unauthorized disclosure of information or functions. It implies that information is readable only to authorized users.
Full Text Chapter Download: US $37.50 Add to Cart
Internet of Things: Architecture, Challenges, and Future Directions
It ensures that only authorized person or object can have access to the data.
Full Text Chapter Download: US $37.50 Add to Cart
Reflections of Challenges and Resolutions in Fieldwork Research on Quality of Life of Cancer Patients: Counseling and Psychology
It is defined as one of the key aspect of ethical consideration of keeping the participant’s information, such as name, socio-demographic details, identity, medical history and records as a secret and not disclosing it to anyone except for research and publication purposes.
Full Text Chapter Download: US $37.50 Add to Cart
Data Protection and Data Security Regarding Grid Computing in Biomedical Research
Full Text Chapter Download: US $37.50 Add to Cart
A Case Study in the Role of Trust in Web Service Securities
Refers to the protection of transactions sent and received via Web services against unauthorized reading, copying, or disclosure using encryption mechanisms.
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity of Industrial Internet of Things
A set of principles and metrics that control information access.
Full Text Chapter Download: US $37.50 Add to Cart
Security Measures for Mobile Ad-Hoc Networks (MANETs)
This is a basic security requirement in which the address, location, and/or the data transferring between two communicating parties are to be kept as secrets.
Full Text Chapter Download: US $37.50 Add to Cart
Secure Routing and Mobility in Future IP Networks
A cryptographic security service, which allows only authorized users or network nodes to access information content.
Full Text Chapter Download: US $37.50 Add to Cart
Security of Internet-, Intranet-, and Computer-Based Examinations in Terms of Technical, Authentication, and Environmental, Where Are We?
A security service equivalent to privacy which can be achieved by encrypting the message using a cryptographic algorithm.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR