Abstract :
To address health IT´s unique security and privacy issues, researchers study validation methods to improve the accuracy of records, encryption techniques to conceal information in transit, anonymization to permit distribution of health data without revealing identities, access control policies to enforce who sees what, and so on. The articles in this special issue touch on many of these topics.