7,052 research outputs found

    Pervasive eHealth services a security and privacy risk awareness survey

    Get PDF
    The human factor is often recognised as a major aspect of cyber-security research. Risk and situational perception are identified as key factors in the decision making process, often playing a lead role in the adoption of security mechanisms. However, risk awareness and perception have been poorly investigated in the field of eHealth wearables. Whilst end-users often have limited understanding of privacy and security of wearables, assessing the perceived risks and consequences will help shape the usability of future security mechanisms. This paper present a survey of the the risks and situational awareness in eHealth services. An analysis of the lack of security and privacy measures in connected health devices is described with recommendations to circumvent critical situations

    Security and Privacy Analysis of Medical Wearables

    Get PDF
    The release of Google glass and the Apple and Samsung smart watches in the past two years pushed wearables to the forefront of technology. The realm of medical wearables will specifically see a huge growth as wearables become more common place. There are documented cases of security and privacy breaches in the five main potential breaching areas: wearable device itself, Bluetooth communication, smartphone or personal computer app, Wi-Fi data exchange, cloud storage. Privacy policies for individual wearables are not always in the best interest of the individual and government regulations on wearables security does not always fully vet wearables. Interviews with industry professionals, both clinical and research, concluded that doctors are not very knowledgeable about wearables and are not very worried about security, the public does not understand security of these devices, and the security concerns should not stop the progress that is being made in this field

    The Role of the Privacy Calculus and the Privacy Paradox in the Acceptance of Wearables for Health and Wellbeing

    Get PDF
    The Internet along with innovations in technology have inspired an industry focused on designing portable devices, known as wearables that can track users’ personal activities and wellbeing. While such technologies have many benefits, they also have risks (especially regarding information privacy and security). These concerns become even more pronounced with healthcare-related wearables. Consequently, users must consider the benefits given the risks (privacy calculus); however, users often opt for wearables despite their disclosure concerns (privacy paradox). In this study, we investigate the multidimensional role that privacy (and, in particular, the privacy calculus and the privacy paradox) plays in consumers’ intention to disclose their personal information, whether health status has a moderating effect on the relationship, and the influence of privacy on acceptance. To do so, we evaluated a research model that explicitly focused on the privacy calculus and the privacy paradox in the healthcare wearables acceptance domain. We used a survey-oriented approach to collect data from 225 users and examined relationships among privacy, health, and acceptance constructs. In that regard, our research confirmed significant evidence of the influence of the privacy calculus on disclosure and acceptance as well as evidence of the privacy paradox when considering health status. We found that consumers felt less inclined to disclose their personal information when the risks to privacy outweighed benefits; however, health status moderated this behavior such that people with worse health tipped the scale towards disclosure. This study expands our previous knowledge about healthcare wearables’ privacy/acceptance paradigm and, thus, the influences that affect healthcare wearables’ acceptance in the privacy context

    Securing Wearables through the Creation of a Personal Fog

    Get PDF
    Increased reliance on wearables using Bluetooth requires additional security and privacy measures to protect these devices and personal data, regardless of device vendor. Most wearables lack the ability to monitor their communication connections and protect personal data without assistance. Attackers can force wearables to disconnect from base stations. When a wearable loses its connection to its base station, an attacker can connect to the wearable to steal stored personal data or await reconnection to the base station to eavesdrop on communications. If the base station inadvertently disconnects from the cloud serving a security-aware app, it would be unable to respond to a rapid change in the security of its current environment. We design a personal fog incorporating wearables, a base station, and the cloud that allows the wearable to be situationally aware and manage inter- and intra-fog communications, given local personal fogs with the same app

    Conclusions: Where next for wearables?

    Get PDF
    ©2017, IGI Global. This chapter provides a contemporary example of how data from wearable devices can be used for big data type research. It then asked the question of data policies for the use of data generated by wearable devices. This is followed by an overview of the chapters in the book and how they fit within the general theme of the book. In addition, each chapter is categorised into whether it is social research or more technical type research. The chapter also includes concluding suggestions on the possible future research agenda for privacy and security within the subject domain of the use of wearables. In addition, insights into the future of wearables in relation to ethical considerations, privacy, security and data ownership is also given

    Conclusions: Where next for wearables?

    Get PDF
    © 2018 by IGI Global. All rights reserved. This chapter provides a contemporary example of how data from wearable devices can be used for big data type research. It then asked the question of data policies for the use of data generated by wearable devices. This is followed by an overview of the chapters in the book and how they fit within the general theme of the book. In addition, each chapter is categorised into whether it is social research or more technical type research. The chapter also includes concluding suggestions on the possible future research agenda for privacy and security within the subject domain of the use of wearables. In addition, insights into the future of wearables in relation to ethical considerations, privacy, security and data ownership is also given

    Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities

    Get PDF
    Authentication and authorization are critical security layers to protect a wide range of online systems, services and content. However, the increased prevalence of wearable and mobile devices, the expectations of a frictionless experience and the diverse user environments will challenge the way users are authenticated. Consumers demand secure and privacy-aware access from any device, whenever and wherever they are, without any obstacles. This paper reviews emerging trends and challenges with frictionless authentication systems and identifies opportunities for further research related to the enrollment of users, the usability of authentication schemes, as well as security and privacy trade-offs of mobile and wearable continuous authentication systems.Comment: published at the 11th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2017

    Challenges of Multi-Factor Authentication for Securing Advanced IoT (A-IoT) Applications

    Full text link
    The unprecedented proliferation of smart devices together with novel communication, computing, and control technologies have paved the way for the Advanced Internet of Things~(A-IoT). This development involves new categories of capable devices, such as high-end wearables, smart vehicles, and consumer drones aiming to enable efficient and collaborative utilization within the Smart City paradigm. While massive deployments of these objects may enrich people's lives, unauthorized access to the said equipment is potentially dangerous. Hence, highly-secure human authentication mechanisms have to be designed. At the same time, human beings desire comfortable interaction with their owned devices on a daily basis, thus demanding the authentication procedures to be seamless and user-friendly, mindful of the contemporary urban dynamics. In response to these unique challenges, this work advocates for the adoption of multi-factor authentication for A-IoT, such that multiple heterogeneous methods - both well-established and emerging - are combined intelligently to grant or deny access reliably. We thus discuss the pros and cons of various solutions as well as introduce tools to combine the authentication factors, with an emphasis on challenging Smart City environments. We finally outline the open questions to shape future research efforts in this emerging field.Comment: 7 pages, 4 figures, 2 tables. The work has been accepted for publication in IEEE Network, 2019. Copyright may be transferred without notice, after which this version may no longer be accessibl
    • 

    corecore