scholarly journals Guardianship and self-sovereign identity: implications for persons living with dementia

2021 ◽  
Vol 5 (Supplement_1) ◽  
pp. 718-718
Author(s):  
Noelannah Neubauer ◽  
Lili Liu

Abstract Self-sovereign identity (SSI), an identity management system where individuals own and manage their digital identity, can improve access and management of one’s personal data. SSI is becoming feasible for the general public to use for their health and other personal data. Like any data system, when persons living with dementia no longer have capacity to provide informed consent, guardianship over their data is required. The purpose of this study was to examine the concept of guardianship within the context of SSI, specifically its application to persons living with dementia. This study followed a qualitative description approach. Seventeen semi-structured virtual interviews were conducted with persons living with dementia and care partners to elicit their perspectives on existing guardianship practices and guardianship within the context of SSI. Interviews were digitally recorded and transcribed verbatim. Conventional content analysis guided the analytic process. Participants had mixed impressions of existing guardianship practices. While some were positive, others thought existing practices failed to consider the complexity of caring for someone with dementia (e.g., presence of multiple guardians). Participants suggested that SSI has the potential to improve the security and safety of persons living with dementia who have had guardianship enacted (e.g., reduced risk of financial abuse.) Recommendations included ensuring that SSI guardianship processes are simple and flexible, building a user-friendly system that also considers the heterogeneity of persons living with dementia and their care partners. Overall, guardianship within the context of SSI was well received. Findings will be used to further inform the SSI guardianship processes.

2019 ◽  
Vol 9 (15) ◽  
pp. 2953 ◽  
Author(s):  
Jamila Alsayed Kassem ◽  
Sarwar Sayeed ◽  
Hector Marco-Gisbert ◽  
Zeeshan Pervez ◽  
Keshav Dahal

Identity management (IdM) is a method used to determine user identities. The centralized aspect of IdM introduces a serious concern with the growing value of personal information, as well as with the General Data Protection Regulation (GDPR). The problem with currently-deployed systems and their dominating approach, with identity providers (IdP) and single-point services, is that a third party is in charge of maintaining and controlling the personal data. The main challenge to manage data securely lies in trusting humans and institutes who are responsible for controlling the entire activity. Identities are not owned by the rightful owners or the user him/herself, but by the mentioned providers. With the rise of blockchain technology, self-sovereign identities are in place utilizing decentralization; unfortunately, the flaws still exist. In this research, we propose DNS-IdM, a smart contract-based identity management system that enables users to maintain their identities associated with certain attributes, accomplishing the self-sovereign concept. DNS-IdM has promising outcomes in terms of security and privacy. Due to the decentralized nature, DNS-IdM is able to avoid not only the conventional security threats, but also the limitations of the current decentralized identity management systems.


Author(s):  
Mardavkumar Gandhi

In the present interconnected world, digital IDs are used to demonstrate identity. These IDs prove to be only tangentially related to the service being accessed and requires us to apply a significant amount of privacy. The current systems possess number of problems such as proxies but blockchain proves to be the solution for this type of Identity related problem.Markers of identity are often required to be very personal pieces of data. Consider a list of personal information collected when someone opens a savings account, such as address and identification (driver’s license or passport). It’s easy to take these pieces of data for granted, as we’ve generally become accustomed to handing them over at the drop of a hat. But let’s take a moment to consider what giving up these pieces of identity really means and whether is it necessary?In handing over a passport to a banker, a person gives the bank full permission to record not only their date and place of birth, but also everywhere he or she has toured.In order to solve above privacy problem and to make Identity sharing process more user friendly I have implemented an Identity Management System with Blockchain technology with the help of hyperledger fabric framework.


Dementia ◽  
2021 ◽  
pp. 147130122110653
Author(s):  
Noelannah Neubauer ◽  
Christa Spenrath ◽  
Serrina Philip ◽  
Christine Daum ◽  
Lili Liu ◽  
...  

A growing number of Canadians live with dementia. Strategies to reduce the risks of getting lost include physical barriers, restraints and medications. However, these strategies can restrict one’s participation in meaningful activities and reduce quality of life. Locator devices can be used to manage safety risks while also supporting engagement and independence among persons living with dementia. As more locator devices become available on the market, adoption rates would be affected by certain factors. There is no clear, standardized approach to identify the factors that have an influence on the acceptance and usability of locator devices for persons with dementia and their care partners. This project aimed to identify factors related to acceptance and usability of locator devices that are important to individuals with dementia, their care partners, service providers and technology developers. Qualitative description and conventional content analysis guided our approach. We conducted 5 focus groups with 21 participants. Trustworthiness strategies included multiple data sources, data verification for accuracy and peer debrief. Five overarching factors emerged as critical aspects in the acceptance and usability of locator devices. These factors were inclusivity, simplicity, features, physical properties and ethics. Participants thought that locator devices do not adequately consider privacy and stigma. Therefore, the acceptance and usability of locator devices could be enhanced if privacy and stigma are addressed. The factors identified will inform the creation of an acceptance and usability scale for locator devices used by persons living with dementia, their care partners and service providers.


2020 ◽  
Author(s):  
Cátia Santos-Pereira

BACKGROUND GDPR was scheduled to be formally adopted in 2016 with EU member states being given two years to implement it (May 2018). Given the sensitive nature of the personal data that healthcare organization process on a 24/7 basis, it is critical that the protection of that data in a hospital environment is given the high priority that data protection legislation (GDPR) requires. OBJECTIVE This study addresses the state of Public Portuguese hospitals regarding GDPR compliance in the moment of GDPR preparation period (2016-2018) before the enforcement in 25 May 2018, and what activities have started since then. The study focuses in three GDPR articles namely 5, 25 and 32, concerning authentication security, identity management processes and audit trail themes. METHODS The study was conducted between 2017 and 2019 in five Portuguese Public Hospitals (each different in complexity). In each hospital, six categories of information systems critical to health institutions were included in the study, trying to cover the main health information systems available and common to hospitals (ADT, EPR, PMS, RIS, LIS and DSS). It was conducted interviews in two phases (before and after GDPR enforcement) with the objective to identify the maturity of information systems of each hospital regarding authentication security, identity management processes and traceability and efforts in progress to avoid security issues. RESULTS A total of 5 hospitals were included in this study and the results of this study highlight the hospitals privacy maturity, in general, the hospitals studied where very far from complying with the security measures selected (before May 2018). Session account lock and password history policy were the poorest issues, and, on the other hand, store encrypted passwords was the best issue. With the enforcement of GDPR these hospitals started a set of initiatives to fill this gap, this is made specifically for means of making the whole process as transparent and trustworthy as possible and trying to avoid the huge fines. CONCLUSIONS We are still very far from having GDPR compliant systems and Institutions efforts are being done. The first step to align an organization with GDPR should be an initial audit of all system. This work collaborates with the initial security audit of the hospitals that belong to this study.


TEM Journal ◽  
2020 ◽  
pp. 1338-1347
Author(s):  
Belkacem Athamena ◽  
Zina Houhamdi

This paper describes the identity management system (IdMS) by defining system and user requirements. Additionally, it introduces the IdMS concept that approaches the things identity management. Moreover, the paper deeply describes the IdMS features using unified modelling language (UML) diagrams such as class, system, and sequence diagrams to show the main system functionalities. Ultimately, the suggested system is evaluated by comparing it with the existing systems and discussing the fulfilment of user and system requirements.


Sign in / Sign up

Export Citation Format

Share Document