2004
DOI: 10.1023/b:bttj.0000047127.01462.49
|View full text |Cite
|
Sign up to set email alerts
|

Sensor Networks for Continuous Health Monitoring

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0
1

Year Published

2006
2006
2017
2017

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 24 publications
(11 citation statements)
references
References 3 publications
0
7
0
1
Order By: Relevance
“…This type of 'tradeoff' highlights the potential for H-IoT to simultaneously violate and enhance privacy. A tradeoff has been observed between personal privacy and safety, particularly among the mentally impaired patients (Ojasalo et al 2010;Stowe and Harding 2010;Landau et al 2010), as well as frail elderly (Melenhorst et al 2004;Courtney 2008;Courtney et al 2008;Steele et al 2009), and chronically ill persons (Salih et al 2011;Neild et al 2004). In these contexts, it has been stressed that personal privacy can be both protected by eliminating the need for in-person care (Ojasalo et al 2010;Essén 2008) and violated by the presence of a monitoring device (Melenhorst et al 2004;Steele et al 2009;Salih et al 2011).…”
Section: Personal Privacymentioning
confidence: 99%
See 1 more Smart Citation
“…This type of 'tradeoff' highlights the potential for H-IoT to simultaneously violate and enhance privacy. A tradeoff has been observed between personal privacy and safety, particularly among the mentally impaired patients (Ojasalo et al 2010;Stowe and Harding 2010;Landau et al 2010), as well as frail elderly (Melenhorst et al 2004;Courtney 2008;Courtney et al 2008;Steele et al 2009), and chronically ill persons (Salih et al 2011;Neild et al 2004). In these contexts, it has been stressed that personal privacy can be both protected by eliminating the need for in-person care (Ojasalo et al 2010;Essén 2008) and violated by the presence of a monitoring device (Melenhorst et al 2004;Steele et al 2009;Salih et al 2011).…”
Section: Personal Privacymentioning
confidence: 99%
“…This is particularly important for cognitively impaired users unable to grant consent (Kenner 2008;Bowes et al 2012). These concerns can extend to guests of a monitored individual, which suggests the possibility of inadvertent monitoring (Neild et al 2004). …”
Section: Obtrusiveness Stigma and Autonomymentioning
confidence: 99%
“…16 and IEEE802.20 that can cover much greater distances with better quality-of-service (QoS) support than Wi-Fi. IEEE802.16, more commonly known as WiMAX, is a wireless metropolitan area network (WirelessMAN) technology that can provide backhaul connection to WLAN hotspots.…”
Section: Pervasive Communicationsmentioning
confidence: 99%
“…The sensor network employed in this project included [9] • passive infrared (PIR) sensors to pick up occurrences of movement in various rooms, • toggle switch sensors to detect when windows, entrances, and cupboard / kitchen appliance doors are opened • vibration and temperature sensors to detect use of water • pressure sensors to indicate occupation of chairs and bed Although this provided a very restricted dataset consisting of few specific details about household events, plenty of information could still be inferred as to the general level of activity within the home, and the changing location of the client. This made it possible to determine the state of a number of activities of daily living.…”
Section: Sensor Networkmentioning
confidence: 99%