61,453 research outputs found

    Using a Hybrid Technology Acceptance Model to Explore How Security Measures Affect the Adoption of Electronic Health Record Systems

    Get PDF
    While the adoption of computer systems is pervasive in most industries, few healthcare organizations have implemented electronic health record systems. Security is a major issue for these healthcare organizations. Security concerns include breaches of privacy and medical identity theft. This article uses a hybrid technology acceptance model (TAM) to explore why healthcare organizations are slow to adopt an EHR and slower to adopt biometric technology and single sign-on functionality despite the benefits of these systems. This paper advocates that healthcare organizations should adopt biometrics for authentication purposes, allow for multiple connections by each healthcare provider, and use single sign-on systems when implementing EHR systems. This research will also determine how costs, compliance issues, and security issues impact an individual’s attitude when asked to use EHR systems

    Security And Privacy Issues in Healthcare Monitoring Systems: A Case Study

    Get PDF
    Security and privacy issues are rarely taken into account in automated systems for monitoring elderly people in their home, exposing inhabitants to a number of threats they are usually not aware of. As a case study to expose the major vulnerabilities these systems are exposed to, this paper reviews a generic example of automated healthcare monitoring system. The security and privacy issues identified in this case study can be easily generalised and regarded as alarm bells for all the pervasive healthcare professionals. Copyright © 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved

    Towards privacy protection in pervasive healthcare

    Full text link
    Proliferation of small handheld devices and wireless technologies has kindled the phenomenon of pervasive computing. Healthcare, being a prime concern for every society, has been considered as an ideal setting for deployment of this technology. Pervasive healthcare aims to improve patient independent living and quality of life and pay special attention to issues of security, privacy, transparency and ease of use. From its very nature of being open and dynamic, the pervasive environment has been challenged with security and privacy related issues with regards to collaborative information sharing. In this paper, we present some of the privacy challenges that arise when designing pervasive healthcare environments and discuss addressing some of these issues in a home based patient monitoring system. Specifically, we cover privacy violation through individual healthcare information availability and information leakage through context-aware services. Keywords-Privacy violation; Information leakage; Healthcare; Pervasive Computing

    Architecture and Implementation of a Trust Model for Pervasive Applications

    Get PDF
    Collaborative effort to share resources is a significant feature of pervasive computing environments. To achieve secure service discovery and sharing, and to distinguish between malevolent and benevolent entities, trust models must be defined. It is critical to estimate a device\u27s initial trust value because of the transient nature of pervasive smart space; however, most of the prior research work on trust models for pervasive applications used the notion of constant initial trust assignment. In this paper, we design and implement a trust model called DIRT. We categorize services in different security levels and depending on the service requester\u27s context information, we calculate the initial trust value. Our trust value is assigned for each device and for each service. Our overall trust estimation for a service depends on the recommendations of the neighbouring devices, inference from other service-trust values for that device, and direct trust experience. We provide an extensive survey of related work, and we demonstrate the distinguishing features of our proposed model with respect to the existing models. We implement a healthcare-monitoring application and a location-based service prototype over DIRT. We also provide a performance analysis of the model with respect to some of its important characteristics tested in various scenarios

    Security Framework for Pervasive Healthcare Architectures Utilizing MPEG-21 IPMP Components

    Get PDF
    Nowadays in modern and ubiquitous computing environments, it is imperative more than ever the necessity for deployment of pervasive healthcare architectures into which the patient is the central point surrounded by different types of embedded and small computing devices, which measure sensitive physical indications, interacting with hospitals databases, allowing thus urgent medical response in occurrences of critical situations. Such environments must be developed satisfying the basic security requirements for real-time secure data communication, and protection of sensitive medical data and measurements, data integrity and confidentiality, and protection of the monitored patient's privacy. In this work, we argue that the MPEG-21 Intellectual Property Management and Protection (IPMP) components can be used in order to achieve protection of transmitted medical information and enhance patient's privacy, since there is selective and controlled access to medical data that sent toward the hospital's servers

    Security in Distributed, Grid, Mobile, and Pervasive Computing

    Get PDF
    This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security

    Benefits and Challenges of Pervasive and Mobile Computing in Healthcare”

    Get PDF
    This letter has been written to express my views on the increasing use of pervasive and mobile computing in health information systems. Pervasive and mobile computing has become increasingly important in the field of healthcare over the past decade. The use of mobile devices, wireless communication, and cloud computing has revolutionized the way healthcare is delivered, making it more efficient and accessible to patients as well as healthcare providers.Pervasive computing refers to the integration of computing technology into daily life. This includes the use of smart devices, such as smartphones, tablets, and wearable technology, to connect individuals to the Internet and to other devices. Mobile computing, on the other hand, refers specifically to the use of mobile devices to access information and communication. Both pervasive and mobile computing have the potential to transform the way healthcare is delivered, making it more patient-centered, personalized, and accessible.One of the most significant applications of pervasive and mobile computing in healthcare is the use of mobile health apps like MHealth. These apps can be used by patients to monitor their health, track their medication, and communicate with healthcare providers. For example, a patient with diabetes can use an app to track their blood sugar levels and send the data to their doctor in real time, allowing for quick adjustments to treatment plans. These apps could also be used to provide patients with education and support, helping them to manage their condition more effectively Another important application of pervasive and mobile computing in healthcare is the use of telemedicine. Telemedicine allows healthcare providers to communicate with patients remotely, using video conferencing and other technology tools. This can be particularly beneficial for patients who live in rural areas or who have mobility issues, as it allows them to access healthcare services without having to travel long distances. Telemedicine can also be used to provide patients with access to specialists who may not be available locally.In addition to healthcare apps and telemedicine, pervasive and mobile computing can be used to improve the efficiency of healthcare delivery. For example, electronic health records (EHRs) can be accessed from mobile devices, allowing healthcare providers to access patient information anywhere. This can be particularly useful in emergency situations, where quick access to patient data can be critical.Despite the benefits of pervasive and mobile computing in healthcare, there are challenges to their implementation. One of the biggest challenges is ensuring the security and privacy of patient data. Healthcare data is highly sensitive, and the use of mobile devices and cloud computing can increase the risk of data breaches. It seems indispensable that healthcare providers take steps to ensure the security of patient data, including the use of encryption and other security measures.Another challenge is ensuring that patients have access to the technology they need to benefit from pervasive and mobile computing. While smartphones and other mobile devices are becoming increasingly widespread, not all patients may have access to these technologies. Healthcare providers may need to provide patients with devices or other support to ensure that they are able to use related apps and other technology tools.In conclusion, the use of pervasive and mobile computing in healthcare has the potential to revolutionize the way healthcare is delivered, making it more patient-centered, personalized, and accessible. From healthcare apps to telemedicine, these technologies can improve the efficiency of healthcare delivery while providing patients with better access to care. However, there are also challenges to their implementation, including the need to ensure the security and privacy of patient data and to provide patients with access to the necessary technology. By addressing these challenges, healthcare providers can harness the power of pervasive and mobile computing to improve the health and well-being of their patients

    Impact of Mobile and Wireless Technology on Healthcare Delivery services

    Get PDF
    Modern healthcare delivery services embrace the use of leading edge technologies and new scientific discoveries to enable better cures for diseases and better means to enable early detection of most life-threatening diseases. The healthcare industry is finding itself in a state of turbulence and flux. The major innovations lie with the use of information technologies and particularly, the adoption of mobile and wireless applications in healthcare delivery [1]. Wireless devices are becoming increasingly popular across the healthcare field, enabling caregivers to review patient records and test results, enter diagnosis information during patient visits and consult drug formularies, all without the need for a wired network connection [2]. A pioneering medical-grade, wireless infrastructure supports complete mobility throughout the full continuum of healthcare delivery. It facilitates the accurate collection and the immediate dissemination of patient information to physicians and other healthcare care professionals at the time of clinical decision-making, thereby ensuring timely, safe, and effective patient care. This paper investigates the wireless technologies that can be used for medical applications, and the effectiveness of such wireless solutions in a healthcare environment. It discusses challenges encountered; and concludes by providing recommendations on policies and standards for the use of such technologies within hospitals

    The Internet of Hackable Things

    Get PDF
    The Internet of Things makes possible to connect each everyday object to the Internet, making computing pervasive like never before. From a security and privacy perspective, this tsunami of connectivity represents a disaster, which makes each object remotely hackable. We claim that, in order to tackle this issue, we need to address a new challenge in security: education

    An authorization policy management framework for dynamic medical data sharing

    Full text link
    In this paper, we propose a novel feature reduction approach to group words hierarchically into clusters which can then be used as new features for document classification. Initially, each word constitutes a cluster. We calculate the mutual confidence between any two different words. The pair of clusters containing the two words with the highest mutual confidence are combined into a new cluster. This process of merging is iterated until all the mutual confidences between the un-processed pair of words are smaller than a predefined threshold or only one cluster exists. In this way, a hierarchy of word clusters is obtained. The user can decide the clusters, from a certain level, to be used as new features for document classification. Experimental results have shown that our method can perform better than other methods.<br /
    corecore