scholarly journals Internet of Things in Health Care: The Social, Ethical, Legal and Professional Implications

Author(s):  
Otobong Inieke

Implications of the novel usage adoption of the internet of things in various sectors of works and life are researched and documented at pace. This is related to the overall high rate at which new technologies are adopted in modern society. Healthcare is a vital aspect of everyday activities and as such overlaps with the increasingly important role played by use of the internet and associated technologies. The purpose of this review article is to draw attention to the potential social, ethical, legal and professional limitations to using IoT in the context of healthcare. The social and ethical aspects in particular, focus on IoT usage in care of the elderly with relevant case studies as reference.

2019 ◽  
Vol 21 (6) ◽  
pp. 1344-1361 ◽  
Author(s):  
Alex van der Zeeuw ◽  
Alexander JAM van Deursen ◽  
Giedo Jansen

In this article, we set out to explain different types of social uses of the Internet of Things (IoT) using forms of capital and Internet skills. We argue that the IoT platform entices different manners of social communication that are easily overlooked when focusing on the novelty of smart “things.” How people use the IoT socially is crucial in trying to understand how people create, maintain, or absolve social relations in a networked society. We find inversed effects for social capital, income and education on private use, and on sharing IoT data with a partner. Sharing with acquaintances and strangers is predicted by cultural activities. Sharing IoT data with acquaintances can especially be attributed to social relations that escape the immediate household. We conclude that varying figurations of capital and Internet skills predict how the IoT is used socially.


2017 ◽  
pp. 241-259 ◽  
Author(s):  
Edewede Oriwoh ◽  
Geraint Williams

The Internet of Things (IoT), a metaphor for smart, functional Cyberphysical Environments (CPE), is finding some usefulness in various sectors including healthcare, security, transportation, and the Smart Home (SH). Within the IoT, objects potentially operate autonomously to provide specified services and complete assigned tasks. However, the introduction of new technologies and/or the novel application of existing ones usually herald the discovery of unfamiliar security vulnerabilities, which lead to exploits and sometimes to security breaches. There is existing research that identifies IoT-related security concerns and breaches. This chapter discusses existing Digital Forensics (DF) models and methodologies for their applicability (or not) within the IoT domain using the SH as a case in point. The chapter also makes the argument for smart forensics, the use of a smart autonomous system (tagged the Forensics Edge Management System [FEMS]) to provide forensic services within the self-managed CPE of the SH.


2017 ◽  
pp. 5-17 ◽  
Author(s):  
Thomas J. Farkas

Data has become an asset with a big financial impact. With the extensive use of the Internet which “never forgets”, society has become more transparent than ever. Society also creates more data than ever. The increase of data creation is further catalysed by new technologies and connected devices; it is often referred to as the “internet of things” or “IoT-devices”. But who owns the date created by these new devices? This article aims to give a brief overview of possible rules governing data ownership. Also, it stresses the question whether or not the current legal framework sufficiently protects said data or if a new law should be implemented. 


Author(s):  
Edewede Oriwoh ◽  
Geraint Williams

The Internet of Things (IoT), a metaphor for smart, functional Cyberphysical Environments (CPE), is finding some usefulness in various sectors including healthcare, security, transportation, and the Smart Home (SH). Within the IoT, objects potentially operate autonomously to provide specified services and complete assigned tasks. However, the introduction of new technologies and/or the novel application of existing ones usually herald the discovery of unfamiliar security vulnerabilities, which lead to exploits and sometimes to security breaches. There is existing research that identifies IoT-related security concerns and breaches. This chapter discusses existing Digital Forensics (DF) models and methodologies for their applicability (or not) within the IoT domain using the SH as a case in point. The chapter also makes the argument for smart forensics, the use of a smart autonomous system (tagged the Forensics Edge Management System [FEMS]) to provide forensic services within the self-managed CPE of the SH.


2020 ◽  
Vol 9 (2) ◽  
pp. 136-138 ◽  
Author(s):  
Md. Siddikur Rahman ◽  
Noah C. Peeri ◽  
Nistha Shrestha ◽  
Rafdzah Zaki ◽  
Ubydul Haque ◽  
...  

2017 ◽  
Vol 5 (1) ◽  
pp. 488
Author(s):  
Elena Samoylova

This paper is dedicated to the analysis of the phenomenon of virtual narrative and its connection to the phenomenon of Internet of things. Modern virtual narrative is a complex, syncretic phenomenon, alludes to the different cultural, historical and even mythological subjects and objects. But with the development of new technologies, such as the Internet of Things, virtual narrative became to be some kind of independent phenomenon. Moreover, the Internet of things (which is not clerly identified phenomen itself from the philosophic point of view) uses the virtual narrative as one of the components, for example applaying some methond of virtual narrative in creating advertisments, creating messages in musiams, exposititions etc. So, in our paper we will analyze this both phenomena, their connections and the way of its development.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Jean-Éric Pelet ◽  
Erhard Lick ◽  
Basma Taieb

Purpose This study bridges the gap between sensory marketing and the use of the internet of things (IoT) in upscale hotels. This paper aims to investigate how stimulating guests’ senses through IoT devices influenced their emotions, affective experiences, eudaimonism (well-being), and ultimately, guest behavior. The authors examined the potential moderating effects of gender. Design/methodology/approach Research conducted comprised an exploratory study, which consisted of interviews with hotel managers (Study 1) and an online confirmatory survey (n = 357) among hotel guests (Study 2). Findings The results showed that while the senses of smell, hearing and sight had an impact on guests’ emotions, the senses of touch, hearing and sight impacted guests’ affective experiences. The senses of smell and taste influenced guests’ eudaimonism. The sense of smell had a greater effect on eudaimonism and behavioral intentions among women compared to men. Research limitations/implications This study concentrated on upscale hotels located in Europe. Further research may explore the generalizability of the findings (e.g. in other cultures, comparison between high-end and low-end hotels). Practical implications Managers of upscale hotels should apply congruent sensory stimuli from all five senses. Stimuli may be customized (“SoCoIoT” marketing). IoT in hotels may be useful in the aftermath of the COVID pandemic, as voice commands help guests avoid touching surfaces. Originality/value IoT can be applied in creating customized multi-sensory hotel experiences. For example, hotels may offer unique and diverse ambiances in their rooms and suites to improve guest experiences.


Author(s):  
Zelal Gültekin Kutlu

In this study, the periodical differences of industrial revolutions, which is one of the effects of technological developments in the industrial field, and the last stage of it are mentioned. With the latest industrial revolution called Industry 4.0, machines work in harmony with technology at every stage of industrial areas. This period, known as Industry 4.0 or the fourth industrial revolution, refers to the system in which the latest production technologies, automation systems, and the technologies that make up this system exchange data with each other. In addition to the information technologies and automation systems used in Industry 3.0, industrial production has gained a whole new dimension with the use of the internet. With internet networks, machines, operators, and robots now work in harmony. At this point, the concept of internet of objects becomes important. Therefore, another focus of the study is the concept of internet of objects. There are some assumptions about the uses, benefits, and future status of the internet of things.


Author(s):  
Fausto E. Jacome

Emerging technologies such as machine learning, the cloud, the internet of things (IoT), social web, mobility, robotics, and blockchain, among others, are powering a technological revolution in such a way that are transforming all human activities. These new technologies have generated creative ways of offering goods and services. Today's consumers demand in addition to quality, innovation, a real-time and ubiquitous service. In this context, what is the challenge that academy faces? What is the effect of these new technologies on the universities mission? What are people's expectations about academy in this new era? This chapter tries to get answers to these questions and explain how these emerging technologies are converting universities to lead society transformation to the digital age. Under this new paradigm, there are only two roads: innovate or perish. As might be expected universities are embracing these technologies for innovating themselves.


J ◽  
2019 ◽  
Vol 2 (2) ◽  
pp. 102-115 ◽  
Author(s):  
Christian Montag ◽  
Harald Baumeister ◽  
Christopher Kannen ◽  
Rayna Sariyska ◽  
Eva-Maria Meßner ◽  
...  

With the advent of the World Wide Web, the smartphone and the Internet of Things, not only society but also the sciences are rapidly changing. In particular, the social sciences can profit from these digital developments, because now scientists have the power to study real-life human behavior via smartphones and other devices connected to the Internet of Things on a large-scale level. Although this sounds easy, scientists often face the problem that no practicable solution exists to participate in such a new scientific movement, due to a lack of an interdisciplinary network. If so, the development time of a new product, such as a smartphone application to get insights into human behavior takes an enormous amount of time and resources. Given this problem, the present work presents an easy way to use a smartphone application, which can be applied by social scientists to study a large range of scientific questions. The application provides measurements of variables via tracking smartphone–use patterns, such as call behavior, application use (e.g., social media), GPS and many others. In addition, the presented Android-based smartphone application, called Insights, can also be used to administer self-report questionnaires for conducting experience sampling and to search for co-variations between smartphone usage/smartphone data and self-report data. Of importance, the present work gives a detailed overview on how to conduct a study using an application such as Insights, starting from designing the study, installing the application to analyzing the data. In the present work, server requirements and privacy issues are also discussed. Furthermore, first validation data from personality psychology are presented. Such validation data are important in establishing trust in the applied technology to track behavior. In sum, the aim of the present work is (i) to provide interested scientists a short overview on how to conduct a study with smartphone app tracking technology, (ii) to present the features of the designed smartphone application and (iii) to demonstrate its validity with a proof of concept study, hence correlating smartphone usage with personality measures.


Sign in / Sign up

Export Citation Format

Share Document