2008 7th International Conference on Mobile Business 2008
DOI: 10.1109/icmb.2008.31
|View full text |Cite
|
Sign up to set email alerts
|

Security, Privacy and Legal Issues in Pervasive eHealth Monitoring Systems

Abstract: The rapid scientific and technological merging between Internet of Things (IoT), cloud computing and wireless body area networks (WBANs) have significantly contributed to the advent of e-healthcare. Due to this the quality of medicinal care has also been improved. Specifically, patient-centric health care monitoring plays important role in e-healthcare facilities by providing important assistance in different areas, including medical data collection and aggregation, data transmission, data processing, data que… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
19
0
4

Year Published

2011
2011
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 50 publications
(23 citation statements)
references
References 9 publications
0
19
0
4
Order By: Relevance
“…All these steps can be done online very efficiently which means a private monitoring system can be established within a few minutes. Although such a system can be useful for healthcare purposes, as studied in Kargl et al (2008), it can come with some privacy issues. Simply, people may not feel comfortable with having their activities always being monitored.…”
Section: Social Implications Of Activitymonitormentioning
confidence: 99%
“…All these steps can be done online very efficiently which means a private monitoring system can be established within a few minutes. Although such a system can be useful for healthcare purposes, as studied in Kargl et al (2008), it can come with some privacy issues. Simply, people may not feel comfortable with having their activities always being monitored.…”
Section: Social Implications Of Activitymonitormentioning
confidence: 99%
“…Security and privacy implications were analyzed in the study presented by Kargl et al, 2008 on E-health monitoring. The authors discussed the types of threats and attacks that are likely to occur when considering ubiquitous health monitoring system.…”
Section: Discussionmentioning
confidence: 99%
“…The approach follows the Hohfeld legal taxonomy (Hohfeld 1913) and nature language patterns (Breaux and Antón 2008) to model and analyze legal text and Secure Tropos to extract and analyze security requirements (Mouratidis 2004); a smart card-based system was used as a case study to evaluate usefulness of the proposed approach. Kargl et al (2008) analyzed the security and privacy requirements of pervasive eHealth monitoring systems (PEMS) which use wireless sensor networks. Based on their experience developing their eHealth system, ReMoteCare, they devised a model of such systems which they use to discuss threats and attacks, address security requirements, and give guidelines for security mechanisms.…”
Section: Related Workmentioning
confidence: 99%
“…Most attempts have focused on healthcare regulations (Bada and Madon 2006;Breaux et al 2006;May et al 2006;Kargl et al 2008;Massey et al 2010;Wu et al 2012;. For this, there is a need to further validate Breaux and Antón methodology, heuristics, and patterns within the context of financial regulations and aviation standards to determine its applicability beyond healthcare.…”
Section: Related Workmentioning
confidence: 99%