3,366 research outputs found

    Rising stars in information and communication technology

    Get PDF
    The quest for more efficiency and security is reflected in the economy as a whole, but especially in the product and process innovations in information and communication technology (ICT). We examine the ten concepts considered to have the brightest prospects in the business segment in terms of their potential to gain widespread use during this decade. Out of these, the three most promising ICT approaches are biometrics, open-source software and radio tagging (RFID).internet telephony (VoIP), advanced mobile radio technology (WLAN, UMTS, WiMax), biometrics, quantum cryptography, Model information and communication technology (ICT), Driven Archi-tecture (MDA), decentralised storage (ILM), decentralised data process-ing (grid computing), open-source software, outsourcing, and radio tag-ging (RFID)

    Emerging privacy challenges and approaches in CAV systems

    Get PDF
    The growth of Internet-connected devices, Internet-enabled services and Internet of Things systems continues at a rapid pace, and their application to transport systems is heralded as game-changing. Numerous developing CAV (Connected and Autonomous Vehicle) functions, such as traffic planning, optimisation, management, safety-critical and cooperative autonomous driving applications, rely on data from various sources. The efficacy of these functions is highly dependent on the dimensionality, amount and accuracy of the data being shared. It holds, in general, that the greater the amount of data available, the greater the efficacy of the function. However, much of this data is privacy-sensitive, including personal, commercial and research data. Location data and its correlation with identity and temporal data can help infer other personal information, such as home/work locations, age, job, behavioural features, habits, social relationships. This work categorises the emerging privacy challenges and solutions for CAV systems and identifies the knowledge gap for future research, which will minimise and mitigate privacy concerns without hampering the efficacy of the functions

    First experiences in the implementation of biometric technology to link data from Health and Demographic Surveillance Systems with health facility data

    Get PDF
    BACKGROUND: In developing countries, Health and Demographic Surveillance Systems (HDSSs) provide a framework for tracking demographic and health dynamics over time in a defined geographical area. Many HDSSs co-exist with facility-based data sources in the form of Health Management Information Systems (HMIS). Integrating both data sources through reliable record linkage could provide both numerator and denominator populations to estimate disease prevalence and incidence rates in the population and enable determination of accurate health service coverage. OBJECTIVE: To measure the acceptability and performance of fingerprint biometrics to identify individuals in demographic surveillance populations and those attending health care facilities serving the surveillance populations. METHODOLOGY: Two HDSS sites used fingerprint biometrics for patient and/or surveillance population participant identification. The proportion of individuals for whom a fingerprint could be successfully enrolled were characterised in terms of age and sex. RESULTS: Adult (18-65 years) fingerprint enrolment rates varied between 94.1% (95% CI 93.6-94.5) for facility-based fingerprint data collection at the Africa Centre site to 96.7% (95% CI 95.9-97.6) for population-based fingerprint data collection at the Agincourt site. Fingerprint enrolment rates in children under 1 year old (Africa Centre site) were only 55.1% (95% CI 52.7-57.4). By age 5, child fingerprint enrolment rates were comparable to those of adults. CONCLUSION: This work demonstrates the feasibility of fingerprint-based individual identification for population-based research in developing countries. Record linkage between demographic surveillance population databases and health care facility data based on biometric identification systems would allow for a more comprehensive evaluation of population health, including the ability to study health service utilisation from a population perspective, rather than the more restrictive health service perspective

    What matters to older people with assisted living needs? A phenomenological analysis of the use and non-use of telehealth and telecare

    Get PDF
    Telehealth and telecare research has been dominated by efficacy trials. The field lacks a sophisticated theorisation of [a] what matters to older people with assisted living needs; [b] how illness affects people's capacity to use technologies; and [c] the materiality of assistive technologies. We sought to develop a phenomenologically and socio-materially informed theoretical model of assistive technology use. Forty people aged 60ā€“98 (recruited via NHS, social care and third sector) were visited at home several times in 2011ā€“13. Using ethnographic methods, we built a detailed picture of participants' lives, illness experiences and use (or non-use) of technologies. Data were analysed phenomenologically, drawing on the work of Heidegger, and contextualised using a structuration approach with reference to Bourdieu's notions of habitus and field. We found that participants' needs were diverse and unique. Each had multiple, mutually reinforcing impairments (e.g. tremor and visual loss and stiff hands) that were steadily worsening, culturally framed and bound up with the prospect of decline and death. They managed these conditions subjectively and experientially, appropriating or adapting technologies so as to enhance their capacity to sense and act on their world. Installed assistive technologies met few participants' needs; some devices had been abandoned and a few deliberately disabled. Successful technology arrangements were often characterised by ā€˜bricolageā€™ (pragmatic customisation, combining new with legacy devices) by the participant or someone who knew and cared about them. With few exceptions, the current generation of so-called ā€˜assisted living technologiesā€™ does not assist people to live with illness. To overcome this irony, technology providers need to move beyond the goal of representing technology users informationally (e.g. as biometric data) to providing flexible components from which individuals and their carers can ā€˜think with thingsā€™ to improve the situated, lived experience of multi-morbidity. A radical revision of assistive technology design policy may be needed

    Large-scale Biometrics Deployment in Europe: Identifying Challenges and Threats

    Get PDF
    With large-scale biometrics deployment in the EU still in its infancy and with stakeholders racing to position themselves in view of the lucrative market that is forecasted, a study to identify challenges and threats that need to be dealt with was launched. This is the result: a report on Biometrics large-scale Deployment in Europe. The report tackles three main issues namely, the status, security / privacy and testing / certification processes. A survey was launched so as to help reveal the actual status of Biometrics large-scale Deployment initiatives in EU. The main outcome of the survey was that an open dissemination of implementation results policy is needed mainly on deployment plans, strategies, barriers and best practices. The security/ privacy challenges study identified a number of issues, the most important of which were related to proportionality and compliance to the existing regulatory framework while at the same time it revealed an important number of related actions aiming at ensuring both data security and privacy. The aim of the Bio Testing Europe study was double: to identify and collect comparable and certified results under different technologies, vendors and environments situations and to feed in this information to animate discussion among the members of a European network which would enhance the European testing and certification capacity. The study presents an integrated picture of the identified issues as well as a number of recommendations. With some of the systems that are being implemented involving millions of individuals as target users it is important for policy makers to adopt some of the options presented so as to address the identified through the study challengesJRC.J.4-Information Societ

    Ensuring patients privacy in a cryptographic-based-electronic health records using bio-cryptography

    Get PDF
    Several recent works have proposed and implemented cryptography as a means to preserve privacy and security of patients health data. Nevertheless, the weakest point of electronic health record (EHR) systems that relied on these cryptographic schemes is key management. Thus, this paper presents the development of privacy and security system for cryptography-based-EHR by taking advantage of the uniqueness of fingerprint and iris characteristic features to secure cryptographic keys in a bio-cryptography framework. The results of the system evaluation showed significant improvements in terms of time efficiency of this approach to cryptographic-based-EHR. Both the fuzzy vault and fuzzy commitment demonstrated false acceptance rate (FAR) of 0%, which reduces the likelihood of imposters gaining successful access to the keys protecting patients protected health information. This result also justifies the feasibility of implementing fuzzy key binding scheme in real applications, especially fuzzy vault which demonstrated a better performance during key reconstruction

    EU Privacy seals project: Challenges and Possible Scope of an EU Privacy Seal Scheme. Final Report Study Deliverable 3.4

    Get PDF
    The objective of this report is focus on the challenges of implementing an effective EU privacy seal and its possible scope. It returns the focus to privacy and data protection, and presents further groundwork to feed into Task 4 of the Study (Proposals and evaluation of options for an EU-wide privacy seals scheme). Where relevant, research results and analyses of Tasks 1 and 2 are used. First, the report assesses the gaps in current privacy seal sector. Next, it highlights the advantages of, priorities for and possible scope of an EU privacy seal scheme. Eventually, four case studies (CCTV systems, cloud services, smart metering systems and biometric systems) illustrate the possible scope of an EU privacy seal scheme and demonstrate whether an EU privacy seals scheme would bring any added value to privacy and data protection.JRC.G.6-Digital Citizen Securit

    Centre-Commissioned External Review of ILRIā€™s biometrics, data management and research support capacity

    Get PDF

    Understanding institutional AI: sectoral case studies from India

    Get PDF
    • ā€¦
    corecore