scholarly journals Assessing Users’ Privacy and Security Concerns of Smart Home Technologies

i-com ◽  
2019 ◽  
Vol 18 (3) ◽  
pp. 197-216 ◽  
Author(s):  
Verena Zimmermann ◽  
Paul Gerber ◽  
Karola Marky ◽  
Leon Böck ◽  
Florian Kirchbuchner

AbstractSmart Home technologies have the potential to increase the quality of life, home security and facilitate elderly care. Therefore, they require access to a plethora of data about the users’ homes and private lives. Resulting security and privacy concerns form a relevant barrier to adopting this promising technology. Aiming to support end users’ informed decision-making through addressing the concerns we first conducted semi-structured interviews with 42 potential and little-experienced Smart Home users. Their diverse concerns were clustered into four themes that center around attacks on Smart Home data and devices, the perceived loss of control, the trade-off between functionality and security, and user-centric concerns as compared to concerns on a societal level. Second, we discuss measures to address the four themes from an interdisciplinary perspective. The paper concludes with recommendations for addressing user concerns and for supporting developers in designing user-centered Smart Home technologies.

Author(s):  
V. Jeevika Tharini ◽  
S. Vijayarani

One of the best-known features of IoT is automation. Because of this, IoT is a much-needed field for many applications, namely emergency and healthcare domains. IoT has made many revolutionary changes in the healthcare industry. IoT paves the way to numerous advancements for healthcare. The possibilities of IoT have reached their peak in the commercial industry and health sector. In recent years, serious concerns have been raised over the control and access of one's individual information. Privacy and security of the IoT devices can be compromised by intruders. Apart from the numerous benefits of IoTs, there are several security and privacy concerns to consider. A brief overview of different kinds of security attacks, solution for the attacks, privacy and security issues are discussed in this chapter.


2019 ◽  
Author(s):  
Özlem Özkan ◽  
Yeşim Aydin Son ◽  
Arsev Umur Aydinoğlu

AbstractWith the increasing use of genetic testing and applications of bioinformatics in healthcare, genetic and genomic data needs to be integrated into electronic health systems. We administered a descriptive survey to 174 participants to elicit their views on the privacy and security of mobile health record systems and inclusion of their genetic data in these systems. A survey was implemented online and on site in two genetic diagnostic centres. Nearly half of the participants or their close family members had undergone genetic testing. Doctors constituted the only profession group that people trusted for the privacy of their health and genetic data; however, people chose to limit even their doctor’s access to their genetic/health records. The majority of the respondents preferred to keep full access for themselves. Several participants had negative experience or preconceptions about electronic health records: the medical reports of 9.7% of the respondents had been used or released without their consent, 15.1% stated that they avoided being tested due to violation risks, and 3.5% asked their doctors to enter a less embarrassing health status in their records. The participants wanted to see some regulations and security measurements before using any system for their health/genetic data. In addition, significantly more participants stating that storing genetic data in a mobile system was riskier compared to other health data. Furthermore, the comparative analysis revealed that being young, being a woman and having higher education were associated with having greater privacy concerns.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Yawei Yue ◽  
Shancang Li ◽  
Phil Legg ◽  
Fuzhong Li

Internet of Things (IoT) applications have been used in a wide variety of domains ranging from smart home, healthcare, smart energy, and Industrial 4.0. While IoT brings a number of benefits including convenience and efficiency, it also introduces a number of emerging threats. The number of IoT devices that may be connected, along with the ad hoc nature of such systems, often exacerbates the situation. Security and privacy have emerged as significant challenges for managing IoT. Recent work has demonstrated that deep learning algorithms are very efficient for conducting security analysis of IoT systems and have many advantages compared with the other methods. This paper aims to provide a thorough survey related to deep learning applications in IoT for security and privacy concerns. Our primary focus is on deep learning enhanced IoT security. First, from the view of system architecture and the methodologies used, we investigate applications of deep learning in IoT security. Second, from the security perspective of IoT systems, we analyse the suitability of deep learning to improve security. Finally, we evaluate the performance of deep learning in IoT system security.


Author(s):  
Hitesh Bhatt ◽  
Robert Jagodzinski ◽  
Allison N Scott ◽  
Leslie Twilley ◽  
Xinjie Cui

IntroductionLinked datasets are important resources for research, but linkage errors can lead to incorrect results. For data security and privacy concerns, when linkage of personal identifiers is performed anonymously, it is difficult to assess the quality of the linked dataset. We describe the method used to perform linkage quality. Objectives and ApproachWe explored how to check the quality of linkages while preserving the privacy of individuals. We also adopted an approach that minimized time and burden on data providers involved in physical verification using randomly-generated appropriate sample sizes. To validate these linkages, data providers were given random samples of 50 unique records from both linked and unlinked individuals across two other Government programs. Data providers were asked to look at the records associated with those individuals in their original datasets. Three types of linkage results were validated: cross-program linkages, cross-program non-linkages, and within-program linkages. Proportions of false-matches and missed-matches were estimated. ResultsTwenty data providers checked their samples with two other programs which gave us a sample of 2000 individuals. The linkage process, based on anonymized personal identifiers, resulted in high true positive and high true negative rates. Agreement between human judges and the linkage software was strong. Results of this exercise and other linkage validation examinations provided confidence in the accuracy of the linkage process. With false matches occurring approximately only 3% of the time and virtually no missed-matches occurring, no adjustments were deemed necessary. Although linkage rates were reassuring, the sample sizes used for comparison were small, so it is expected that there would be significant variation associated with this 3% estimate; caution is advised in its use. Conclusion/ImplicationsProportions of false-matches and missed-matches determine linkage quality which is the base for research when linkages are performed anonymously. A low proportion of false-matches and an absence of missed-matches was an indication of robust linkages.


Mobile payment systems are rapidly surpassing traditional payment options due to their ease of use and efficiency. Their convenience, however, raises the question – how secure are these systems? There is a great deal of insecurity and risk for consumers as mobile payments involve a lot of financial information. Past research indicates that when involved in online activities and e-payments, consumers are specifically concerned about privacy and security. This study aims to understand influence of demographic variables on security and privacy concerns of consumers by conducting a survey of 1087 respondents in 4 major cities of the state of Gujarat, India. The results indicate that demographic variables age, occupation, annual income and city have significant relationship with security and privacy concerns of consumers towards mobile payments. The findings of this study can benefit mobile service providers, system developers and m-payment vendors to have an actionable segmentation of different target groups based on demographic variables. Practitioners can formulate relevant strategies to address security and privacy concerns which will ultimately facilitate adoption of mobile payment systems.


PLoS ONE ◽  
2021 ◽  
Vol 16 (1) ◽  
pp. e0245451
Author(s):  
Confidence Alorse Atakro ◽  
Abigail Atakro ◽  
Janet Sintim Aboagye ◽  
Alice Aluwah Blay ◽  
Stella Boatemaa Addo ◽  
...  

Background The increase in the number of elderly persons in developing countries has not had a corresponding increase in social and health care support systems for the elderly. There is a substantial difference in the quality of healthcare received by older people in developing and developed countries. Elderly persons in developing countries including Ghana are increasingly becoming marginalised and isolated. There is, however, limited evidence of healthcare challenges and expectations by elderly persons in Ghana. This study explored healthcare challenges and expectations of elderly persons to inform policy that could lead to improved quality of life for elderly persons in Ghana. Materials and methods Qualitative exploratory descriptive study design was used in conducting this study. Semi-structured interviews were used in collecting data from 30 participants from three regions in Ghana (10 from each region). Data analysis was carried out through content analysis. Results Four themes were extracted from data. These themes were: 1. Inadequate information from health workers regarding care of the older person. 2. Queuing frustrations. 3. Financial burden. 4. Focused elderly care demand. Conclusion The elderly in Ghana experience challenges of healthcare which include inadequate information, queuing frustrations and financial burdens. Elderly persons also have expectations of healthcare which include having dedicated professionals and units that will attend to them during their hospital visits. Academic and clinical gerontology experts could collaborate and help improve gerontology knowledge of health workers through workshops and conferences. Improving knowledge of health workers in gerontology may be a positive step towards meeting healthcare expectations of older Ghanaians.


2020 ◽  
Vol 14 ◽  

Development and growth of Internet of Things (IoT) technology has exponentially increased over the course of the last 10 years since its inception, and as a result has directly influenced the popularity and size of smart homes. In this article we present the main technologies and applications that constitute a smart home, we identify the main security and privacy challenges that smart home face and we provide good practices to mitigate those threats.


Healthcare ◽  
2020 ◽  
Vol 8 (2) ◽  
pp. 131
Author(s):  
Fan Wu ◽  
Eva Drevenhorn ◽  
Gunilla Carlsson

The purpose of this study was to describe nurses’ experiences of promoting healthy aging in municipalities. A descriptive qualitative research design based on semi-structured interviews with 13 nurses was employed. The nurses described the importance of giving older adults the possibility to live as individuals, but also that the organization matters as too does the nurses’ own desire to work professionally and with passion. Nurses in the municipality noticed that in today’s world, there is a changing perspective of older adults. They more often want to continue their previous life and care greatly about quality of life and because of this, they also expect more service from their health care. Our study suggests that nurses should be supported to specialize in elderly care and measures should be taken to reduce the gap between vision and reality when it comes to team work.


Author(s):  
Sushruta Mishra ◽  
Soumya Sahoo ◽  
Brojo Kishore Mishra

In the IoTs era, the short-range mobile transceivers will be implanted in a variety of daily requirements. In this chapter, a detail survey in several security and privacy concerns related to internet of things (IoTs) by defining some open challenges are discussed. The privacy and security implications of such an evolution should be carefully considered to the promising technology. The protection of data and privacy of users has been identified as one of the key challenges in the IoT. In this chapter, the authors present internet of things with architecture and design goals. They survey security and privacy concerns at different layers in IoTs. In addition, they identify several open issues related to the security and privacy that need to be addressed by research community to make a secure and trusted platform for the delivery of future internet of things. The authors also discuss applications of IoTs in real life. A novel approach based on cognitive IoT is presented, and a detailed study is undertaken. In the future, research on the IoTs will remain a hot issue.


2020 ◽  
Author(s):  
Ala Sarah Alaqra ◽  
Bridget Kane ◽  
Simone Fischer-Hübner

BACKGROUND Third-party cloud-based data analysis applications are proliferating in eHealth because of the expertise offered and their monetary advantage. However, privacy and security are critical when handling sensitive medical data in the cloud. Technical advances, based on “crypto magic” in privacy-enhancing machine learning, enable data analysis in encrypted form for maintaining confidentiality. The adoption of such technologies could be counter-intuitive to relevant stakeholders in eHealth; more attention is needed on human factors for establishing trust and transparency. OBJECTIVE To analyze eHealth stakeholders' mental models and the perceived trade-offs in regard to data analysis on encrypted medical data in the cloud. METHODS In this study, we used semi-structured interviews and report on 14 interviews with medical, technical, or research expertise in eHealth. RESULTS Results show differences in understanding of, and in trusting, the technology; caution is advised by technical-experts, whereas safety-assurances are required by medical-expert. Concerns regarding the technology relate to the type of encryption applied and achieved confidentiality, quality of analysis results, data integrity and availability, transparency, and trust. CONCLUSIONS Understanding risks and benefits is crucial, thus collaboration among relevant stakeholders is needed. In addition, informing clinicians and patients accordingly is important for transparency and establishing trust. CLINICALTRIAL none


Sign in / Sign up

Export Citation Format

Share Document