ABSTRACT
A sportsman's watch no longer marks the time, but it also provides information on the geographical location, on the number of steps, on the heart rate, on the blood oxygenation, on the blood pressure, etc. The bracelet of an elderly person can measure different physiological signals and can transmit them in real time to her doctor, allowing him to monitor the state of health even if the two are not in the same place. Thanks to the implementation and use of sensors, watches and bracelets have become smart objects. It is the world of the Internet of things that enters the health sector and fills the shelves of electronic stores with objects that can monitor our bodies. A market sector that is worth billions of dollars, but that has several implications along with its benefits. What happens to our data? Who has access to our data? Is it possible to cyber-attack these devices? Is our behavior influenced by reading this data? These are some of the questions that arise from the use of IoT devices in the health sector and in this paper we will address them by analyzing this scenario in detail, by highlighting threats and vulnerabilities and by proposing approaches that might mitigate issues related to the use of IoT in the health scenario.
- Regulatory Agency. 2018. Medical devices: software applications (apps). Medicines and Healthcare products. Regulatory Agency. Available at: https://www.gov.uk/government/publications/medical-devices-software-applications-apps (2018).Google Scholar
- Shifali Arora, Jennifer Yttri, and Wendy Nilsen. 2014. Privacy and Security in Mobile Health (mHealth) Research. Alcohol Res 36, 1 (2014).Google Scholar
- Nicolai Bodemer, Stephanie M. Müller, Yasmina Okan, Rocio Garcia-Retamero, and Angela Neumeyer-Gromen. 2012. Do the media provide transparent health information? A cross-cultural comparison of public information about the HPV vaccine. Vaccine 30, 25 (2012), 3747--3756. Special Issue: The Role of Internet Use in Vaccination Decisions.Google ScholarCross Ref
- Luciano Bononi, Lorenzo Donatiello, and Marco Furini. 2009. Real-Time Traffic in Ad-Hoc Sensor Networks. In Proceedings of IEEE International Conference on Communications (ICC)). 1--5. Google ScholarDigital Library
- Maged Kamel Boulos, Ann Brewer, Chante Karimkhani, David Buller, and Robert Dellavalle. 2014. Mobile medical and health apps: state of the art, concerns, regulatory control and certification. Online Journal of Public Health Informatics 5, 3 (2014).Google Scholar
- Armir Bujari, Marco Furini, Federica Mandreoli, Riccardo Martoglia, Manuela Montangero, and Daniele Ronzani.2018. Standards, Security and Business Models: Key Challenges for the IoT Scenario. Mobile Networks and Applications 23, 1 (01 Feb 2018), 147--154. Google ScholarDigital Library
- Marco Conti, Lorenzo Donatiello, and Marco Furini. 2002. Design and Analysis of RT-Ring: a protocol for supporting real-time communications. IEEE Transaction on Industrial Electronics 49, 6 (December 2002), 1214--1226.Google ScholarCross Ref
- Xiaohui Cui, Nanhai Yang, Zhibo Wang, Cheng Hu, Weiping Zhu, Hanjie Li, Yujie Ji, and Cheng Liu. 2015. Chinese social media analysis for disease surveillance. Personal and Ubiquitous Computing 19, 7 (01 Oct 2015), 1125--1132. Google ScholarDigital Library
- Munmun De Choudhury. 2014. Opportunities of Social Media in Health and Well-being. XRDS 21, 2 (Dec. 2014), 23--27. Google ScholarDigital Library
- Giovanni Delnevo, Silvia Mirri, Lorenzo Monti, Catia Prandi, Manesha Putra, Marco Roccetti, Paola Salomoni, and Robert J. Sokol. 2018. Patients Reactions to Non-Invasive and Invasive Prenatal Tests: A Machine-Based Analysis from Reddit Posts. In IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining. 980--987.Google Scholar
- G. Delnevo, M. Roccetti, and S. Mirri. 2018. Modeling Patients' Online Medical Conversations: A Granger Causality Approach. In International Conference on Connected Health: Applications, Systems and Engineering Technologies. 40--44.Google Scholar
- Deloitte. 2019. Global Health Care Outlook. In Research Report. Available at: https://www2.deloitte.com/global/en/pages/life-sciences-and-healthcare/articles/global-health-care-sector-outlook.html.Google Scholar
- Lorenzo Donatiello and Marco Furini. 2003. Ad Hoc Networks: A Protocol for Supporting QoS Applications. In Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003). IEEE, New York. Google ScholarDigital Library
- Mark Dredze, Zachary Wood-Doughty, Sandra Crouse Quinn, and David A. Broniatowski. 2017. Vaccine opponents' use of Twitter during the 2016 US presidential election: Implications for practice and policy. Vaccine 35, (2017),Google Scholar
- Stefano Ferretti, Marco Furini, and Manuela Montangero. 2019. Diabetes: what are Italian Twitter users talking about?. In Proceedings of the IEEE International Conference on Computer Communications and Networks.Google ScholarCross Ref
- Jim Finkle and Caroline Humer. 2014. Community Health says data stolen in cyber attack from China. Reuters. Available at: https://www.reuters.com/article/us-community-health-cybersecurity/community-health-says-data-stolen-in-cyber-attack-from-china-idUSKBN0GI16N20140818 (2014).Google Scholar
- Susannah Fox. 2014. The social life of health information. Pew Research (Jan. 2014).Google Scholar
- Marco Furini. 2014. Users Behavior in Location-aware Services: Digital Natives vs Digital Immigrants. Advances in Human-Computer Interaction 2014 (2014).Google Scholar
- Marco Furini, Federica Mandreoli, Riccardo Martoglia, and Manuela Montangero. 2017. IoT: Science Fiction or Real Revolution? Springer International Publishing, Cham, 96--105.Google Scholar
- Marco Furini and Gabriele Menegoni. 2018. Public Health and Social Media: Language Analysis of Vaccine Conversations. In Proceedings of the ACM/IEEE International Conference on Internet of Things Design and Implementation.Google ScholarCross Ref
- Marco Furini and Valentina Tamanini. 2015. Location privacy and public metadata in social media platforms: attitudes, behaviors and opinions. Multimedia Tools and Applications 74, 21 (2015), 9795--9825. Google ScholarDigital Library
- Andrea L. Hartzler, Bridget Weis, Carly Cahill, Wanda Pratt, Albert Park, Uba Backonja, and David W. McDonald. Design and Usability of Interactive User Profiles for Online Health Communities. ACM Trans. Comput.-Hum. Interact. 23, 3 (2016). Google ScholarDigital Library
- X. Hei, X. Du, S. Lin, I. Lee, and O. Sokolsky. 2015. Patient Infusion Pattern based Access Control Schemes for Wireless Insulin Pump System. IEEE Transactions on Parallel and Distributed Systems 26, 11 (Nov 2015), 3108--3121. Google ScholarDigital Library
- Philip Henson, Gary David, Karen Albright, and John Torous. 2019. Deriving a practical framework for the evaluation of health apps. The Lancet Digital Health 1 (2019).Google Scholar
- S. M. R. Islam, D. Kwak, M. H. Kabir, M. Hossain, and K. Kwak. 2015. The Internet of Things for Health Care: A Comprehensive Survey. IEEE Access 3 (2015), 678--708.Google ScholarCross Ref
- C. Kotronis, G. Minou, G. Dimitrakopoulos, M. Nikolaidou, D. Anagnostopoulos, A. Amira, F. Bensaali, H. Baali, and H. Djelouat. 2017. Managing Criticalities of e-Health IoT systems. In 2017 IEEE 17th International Conference on Ubiquitous Wireless Broadband (ICUWB). 1--5.Google Scholar
- D. Kotz. 2011. A threat taxonomy for mHealth privacy. In 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011). 1--6.Google ScholarCross Ref
- J. Sathish Kumar and Dhiren R. Patel. 2014. Article: A Survey on Internet of Things: Security and Privacy Issues. International Journal of Computer Applications 90, 11 (March 2014), 20--26. Full text available.Google Scholar
- H. Lin, J. Jia, J. Qiu, Y. Zhang, G. Shen, L. Xie, J. Tang, L. Feng, and T. Chua. 2017. Detecting Stress Based on Social Interactions in Social Networks. IEEE Transactions on Knowledge and Data Engineering 29, 9 (Sept 2017), 1820--1833.Google ScholarDigital Library
- Jian Mou, Dong-Hee Shin, and Jason F. Cohen. 2017. Tracing College Students' Acceptance of Online Health Services. International Journal of Human-Computer Interaction 33, 5 (2017), 371--384.Google ScholarCross Ref
- Yvonne O'Connor, Wendy Rowan, Laura Lynch, and Ciara Heavin. 2017. Privacy by Design: Informed Consent and Internet of Things for Smart Health. Procedia Computer Science (2017). International Conference on Emerging Ubiquitous Systems and Pervasive Networks.Google Scholar
- A. B. Pawar and S. Ghumbre. 2016. A survey on IoT applications, security challenges and counter measures. In International Conference on Computing, Analytics and Security Trends.Google Scholar
- Koustuv Saha and De Choudhury Munmun. 2017. Modeling Stress with Social Media Around Incidents of Gun Violence on College Campuses. Proc. ACM Hum.-Comput. Interact. 1 (2017). Google ScholarDigital Library
- Reijo M. Savola, Habtamu Abie, and Markus Sihvonen. 2012. Towards Metrics-driven Adaptive Security Management in e-Health IoT Applications. In Proceedings of the 7th International Conference on Body Area Networks. 276--281. Google ScholarDigital Library
- Michael Schukat, D McCaldin, Kai Wang, Günter Schreier, Nigel H. Lovell, Michael Marschollek, and Stephen James Redmond. 2016. Unintended Consequences of Wearable Sensor Use in Healthcare. Yearbook of medical informatics 1 (2016), 73--86.Google Scholar
- Eliza Strickland. 2012. The FDA Takes On Mobile Health Apps. IEEE Spectrum (2012).Google Scholar
- Aatif Sulleyman. 2017. NHS Cyber Attack: why stolen medical information is so much more valuable than financial data. Indepented.Google Scholar
- A.Tanner. 2017. Our Bodies, Our Data: How Companies Make Billions Selling Our Medical Records. Beacon Press.Google Scholar
Index Terms
- IoT Healthcare: Benefits, Issues and Challenges
Recommendations
IoT-Enabled Healthcare: Benefits, Issues and Challenges
ICFNDS '20: Proceedings of the 4th International Conference on Future Networks and Distributed SystemsThe Internet of Things (IoT) technology found many applications in the healthcare sector. Through the collection of vital data, IoT plays a crucial role are automating manual tasks and improving patient outcomes. This paper provides an overview of the ...
Internet of Things (IoT): From awareness to continued use
AbstractThis paper proposes a research model with five constructs, i.e., IoT awareness, users’ IoT privacy knowledge, users’ IoT security knowledge, users’ IoT Trust, and continued intention to use IoT to bring clarity to the growing yet ...
Highlights- Clarifying how variables linked from IoT awareness to IoT continued use.
- IoT ...
Comments