2022
DOI: 10.1007/s10207-021-00576-1
|View full text |Cite
|
Sign up to set email alerts
|

A systematic literature review on wearable health data publishing under differential privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 54 publications
0
4
0
Order By: Relevance
“…Similarly, non-obtrusive surveillance, at the societal level, may be used to control crime by collecting data using open-source intelligence platforms (Bayerl & Akhgar, 2015) or by intelligence agencies collecting data using IoTs, tablets, mobile phones, social media etc. (Shores et al, 2022;Cayford & Pieters, 2018), to monitor national security by collecting data provided by 3rd party communication-service-providers (Thompson et al, 2020) or by analyzing behavioral patterns or activities on social media for prediction (Wolfowicz et al, 2021), to monitor health patterns using consumers' wearable devices (Saifuzzaman et al, 2022), to breach humanitarian data about illegal immigrants using their online IT systems (Vannini, 2019) etc.…”
Section: Analysis and Findingsmentioning
confidence: 99%
See 1 more Smart Citation
“…Similarly, non-obtrusive surveillance, at the societal level, may be used to control crime by collecting data using open-source intelligence platforms (Bayerl & Akhgar, 2015) or by intelligence agencies collecting data using IoTs, tablets, mobile phones, social media etc. (Shores et al, 2022;Cayford & Pieters, 2018), to monitor national security by collecting data provided by 3rd party communication-service-providers (Thompson et al, 2020) or by analyzing behavioral patterns or activities on social media for prediction (Wolfowicz et al, 2021), to monitor health patterns using consumers' wearable devices (Saifuzzaman et al, 2022), to breach humanitarian data about illegal immigrants using their online IT systems (Vannini, 2019) etc.…”
Section: Analysis and Findingsmentioning
confidence: 99%
“…) focused on corporate level of private concerns as value (employee productivity, marketing, improved business decision making etc.) associated with collecting or sharing the data, and 15 of the studies (Saifuzzaman et al, 2022;Wolfowicz et al, 2021;Cayford & Pieters, 2018 etc. ); focused on societal level of privacy concerns as value (public health, national security, curbing crime etc.)…”
Section: Privacy As a Valuementioning
confidence: 99%
“…Insufficient security knowledge among medical consumers [84] The concerned paper focuses on the importance of privacy and trust in the context of providing patients' health data and its protection with the implementation of proper legislation.…”
Section: Focusmentioning
confidence: 99%
“…If such information is stolen, it can be used for illegal activities that could result in losses to the owner in the shape of mental disturbance or financial blackmailing. For brevity, a generic set of WBANS attacks, security requirements and measures have been given in Table 7 [ 131 , 132 , 133 , 134 ].…”
Section: Wban Technical Issuesmentioning
confidence: 99%