440 research outputs found

    Adopting Modern Fitness Sensors to Improve Patient Care

    Get PDF
    Technology found in modern fitness sensor devices advances at a very fast pace and current smartwatches are on the verge of closing the gap between being an everyday object and a medically reliable monitoring device. In this thesis, the possibility of adopting fitness sensor devices in medical environments is explored and use cases in which sensor devices can be deployed are examined. Their successful transfer from the area of sports to medical analyses and treatments may help patients to deal with their illnesses and to improve the level of patient care found today. Privacy and security issues as well as social concerns associated with such a disruptive evolution are discussed and practical tests of a pulse oximeter in various activities of daily living are conducted. The collected health data depicts a close representation of the performed activities. Furthermore, three types of fitness sensor devices were used in different real-life scenarios and the resulting data is compared. The results show that the recorded vital signs may differ significantly, depending on the scenario. ii

    Trustworthy Wireless Personal Area Networks

    Get PDF
    In the Internet of Things (IoT), everyday objects are equipped with the ability to compute and communicate. These smart things have invaded the lives of everyday people, being constantly carried or worn on our bodies, and entering into our homes, our healthcare, and beyond. This has given rise to wireless networks of smart, connected, always-on, personal things that are constantly around us, and have unfettered access to our most personal data as well as all of the other devices that we own and encounter throughout our day. It should, therefore, come as no surprise that our personal devices and data are frequent targets of ever-present threats. Securing these devices and networks, however, is challenging. In this dissertation, we outline three critical problems in the context of Wireless Personal Area Networks (WPANs) and present our solutions to these problems. First, I present our Trusted I/O solution (BASTION-SGX) for protecting sensitive user data transferred between wirelessly connected (Bluetooth) devices. This work shows how in-transit data can be protected from privileged threats, such as a compromised OS, on commodity systems. I present insights into the Bluetooth architecture, Intel’s Software Guard Extensions (SGX), and how a Trusted I/O solution can be engineered on commodity devices equipped with SGX. Second, I present our work on AMULET and how we successfully built a wearable health hub that can run multiple health applications, provide strong security properties, and operate on a single charge for weeks or even months at a time. I present the design and evaluation of our highly efficient event-driven programming model, the design of our low-power operating system, and developer tools for profiling ultra-low-power applications at compile time. Third, I present a new approach (VIA) that helps devices at the center of WPANs (e.g., smartphones) to verify the authenticity of interactions with other devices. This work builds on past work in anomaly detection techniques and shows how these techniques can be applied to Bluetooth network traffic. Specifically, we show how to create normality models based on fine- and course-grained insights from network traffic, which can be used to verify the authenticity of future interactions

    Backward Sequential Feature Elimination And Joining Algorithms In Machine Learning

    Get PDF
    The NaĂŻve Bayes Model is a special case of Bayesian networks with strong independence assumptions. It is typically used for classification problems. The NaĂŻve Bayes model is trained using the given data to estimate the parameters necessary for classification. This model of classification is very popular since it is simple yet efficient and accurate. While the NaĂŻve Bayes model is considered accurate on most of the problem instances, there is a set of problems for which the NaĂŻve Bayes does not give accurate results when compared to other classifiers such as the decision tree algorithms. One reason for it could be the strong independence assumption of the NaĂŻve Bayes model. This project aims at searching for dependencies between the features and studying the consequences of applying these dependencies in classifying instances. We propose two different algorithms, the Backward Sequential Joining and the Backward Sequential Elimination that can be applied in order to improve the accuracy of the NaĂŻve Bayes model. We then compare the accuracies of the different algorithms and derive conclusion based on the results

    HOW SOY LABELING INFLUENCES PREFERENCE AND TASTE

    Get PDF
    Using a “Phantom Ingredient” taste test, this article demonstrates how the use of soy labels and health claims on a package negatively biased taste perceptions and attitudes toward a food erroneously thought to contain soy. Consumers who ate products which mentioned soy on the package described the taste more grainy, less flavorful, and as having a strong aftertaste compared to those who ate the product but saw no soy label. Yet, while putting “soy” on a package negatively influenced taste-conscious consumers, when combined with a health claim, it improved attitudes among consumers who are health-conscious, natural food lovers, or dieters. Our results and discussion provide better direction for researchers who work with ingredient labeling as well as for marketers who work with soybean products.Food Consumption/Nutrition/Food Safety,

    Tell the Smart House to Mind its Own Business!: Maintaining Privacy and Security in the Era of Smart Devices

    Get PDF
    Consumers want convenience. That convenience often comes in the form of everyday smart devices that connect to the internet and assist with daily tasks. With the advancement of technology and the “Internet of Things” in recent years, convenience is at our fingertips more than ever before. Not only do consumers want convenience, they want to trust that their product is performing the task that they purchased it for and not exposing them to danger or risk. However, due to the increasing capabilities and capacities of smart devices, consumers are less likely to realize the implications of what they are agreeing to when they purchase and begin using these products. This Note will focus on the risks associated with smart devices, using smart home devices as an illustration. These devices have the ability to collect intimate details about the layout of the home and about those who live within it. The mere collection of this personal data opens consumers up to the risk of having their private information shared with unintended recipients whether the information is being sold to a third party or accessible to a hacker. Thus, to adequately protect consumers, it is imperative that they can fully consent to their data being collected, retained, and potentially distributed. This Note examines the law that is currently in place to protect consumers who use smart devices and argues that a void ultimately leaves consumers vulnerable. Current data privacy protection in the United States centers on the self-regulatory regime of “notice and choice.” This Note highlights how the self-regulatory notice-and-choice model fails to ensure sufficient protection for consumers who use smart devices and discusses the need for greater privacy protection in the era of the emerging Internet of Things. Ultimately, this Note proposes a state-level resolution and calls upon an exemplar state to experiment with privacy protection laws to determine the best way to regulate the Internet of Things

    Introducing User-Centred Design: a Longitudinal Study of a Healthcare Informatics Organisation

    Get PDF
    Information System designers report increasing difficulties applying User-Centred Design (UCD) techniques effectively due to the growing complexity of the domains in which they work and the techniques’ prescriptive nature. The rapid growth of “Big Data” and associated analytical tools thus demands closer investigation of UCD activities and processes within the complex and rapidly-changing work domains in which they are designed, developed and used. This thesis reports a longitudinal case study from inside a commercial organisation, through a six-year Action Research collaboration to introduce and embed UCD techniques in the design of health informatics tools in the UK. An assessment of the initial modus operandi is followed by the development of personas with data from interviews, user-generated screen captures and database server log files; these informed the redesign, evaluation and testing of the organisation’s flagship product. Finally, stakeholder interviews explore the wider impact of UCD techniques. In so doing, this thesis shows the value of auto-ethnographic documentation, based on being embedded in a design team and collaborative reflection, for practice-led research; it found the organisation’s culture around UCD was dynamic and design practices can change this culture through, for example, training opportunities and fostering customer relations. Individuals and extrinsic factors played strikingly key roles in reshaping the organisation’s culture; the commitment and resilience of individuals was important for sustaining UCD activities across several reorganisations and changes in business strategy. Finally, this thesis comprehensively presents and evaluates an innovative approach for grounding personas in database server and user-generated content. These findings concern both research and practice by informing the scope of the designer’s role, educational programmes and Action Research collaborations. They call for further attention on the compatibility of design and development processes and suggest that design practice can not only be tailored to organisations, but organisations can be fitted to design practice with the reassessment of the value of some UCD activities. Finally, this thesis can inform approaches to practice-led research, and more effective and efficient strategies for the introduction of UCD techniques to other organisations from the base of their hierarchy
    • 

    corecore