Ethical Considerations for the Use of Consumer Wearables in Health Research (Preprint)

2021 ◽  
Author(s):  
Anna Sui ◽  
Wuyou Sui ◽  
Ryan E. Rhodes ◽  
Sam Liu

UNSTRUCTURED Following the UN’s High Commissioner’s request for a moratorium on the use and adoption of specific Artificial Intelligence (AI) systems that pose serious risk to human rights, this commentary explores the current environment and future implications of using third-party wearable technologies in research for participants’ data privacy and data security. While wearables have been identified as tools in improving users’ physical and mental health and wellbeing by providing users with more personalized data and tailored interventions, the use of this technology does not come without concern. Primarily, as researchers we are concerned with enmeshment of corporate and research interests and what this can mean for participant data. By drawing on specific sections of the UN Report “The right to privacy in the digital age” we discuss the conflicts between corporate and research agendas and point out the current and future implications of the involvement of third-party companies for participant data privacy, data security, and data usage. Finally, we offer suggestions for researchers and third-party wearable developers for conducting ethical and transparent research with wearable tech. We propose that this commentary be used as a foothold for further discussions about the ethical implications of using third-party wearable tech in research.

Author(s):  
Araz Poladov

Purpose of research: define the general characteristics of the protection of personal data; analysis of legislation and case law.Methods of research: analysis and study of regulatory documents containing provisions on protection of personal data.Results: normative and practical importance of personal data protection provisions in various legal acts has been underscored.The right to privacy strengthened its position in the United States in the late 19th century and is now recognized by most States.Although the right to privacy in the United States was originally a British political legacy, judicial decisions in England were more conservativeand cautious than those of U.S. courts. One of the important features of this law in the Anglo-Saxon legal system is that itwas previously formed by judicial precedents and legal doctrine. Also, the right to privacy was not among the rights provided for in theBill of Rights. In general, there is an industry-wide approach to data privacy in the United States. There is no specific federal law thatwould guarantee the confidentiality and protection of personal data. Instead, legislation at the federal level is dispersed and aims to protectdata in certain sectors. Judicial practice and court decisions taken at different times play an important role in regulating personaldata protection in the United States. It is also worth mentioning that until the 1970s, decisions of the U.S. courts did not provide thenecessary privacy protection safeguards.Discussion: offering a comprehensive and detailed study and use of this practice in other states.


Author(s):  
M. Jalasri ◽  
L. Lakshmanan

AbstractFog computing and the Internet of Things (IoT) played a crucial role in storing data in the third-party server. Fog computing provides various resources to collect data by managing data security. However, intermediate attacks and data sharing create enormous security challenges like data privacy, confidentiality, authentication, and integrity issues. Various researchers introduce several cryptographic techniques; security is still significant while sharing data in the distributed environment. Therefore, in this paper, Code-Based Encryption with the Energy Consumption Routing Protocol (CBE-ECR) has been proposed for managing data security and data transmission protocols using keyed-hash message authentication. Initially, the data have been analyzed, and the distributed cluster head is selected, and the stochastically distributed energy clustering protocol is utilized for making the data transmission. Code-driven cryptography relies on the severity of code theory issues such as disorder demodulation and vibration required to learn equivalence. These crypto-systems are based on error codes to build a single-way function. The encryption technique minimizes intermediate attacks, and the data have protected all means of transmission. In addition to data security management, the introduced CBE-ECR reduces unauthorized access and manages the network lifetime successfully, leading to the effective data management of 96.17% and less energy consumption of 21.11% than other popular methods.The effectiveness of the system is compared to the traditional clustering techniques.


Author(s):  
Shanthi Ameratunga ◽  
Monique Jonas ◽  
Danilo Blank

Injury, which originates from the Latin word for injustice, is a global health problem that imposes a disproportionately high burden on people in fragile economies. This chapter examines the ethical implications of public health actions to prevent unintentional injuries. The concepts of social justice and autonomy are at the core of common debates about the roles of the state, communities, and individuals in controlling injury. Distinguishing unintentional injuries from violence can undermine an integrated preventive approach. Viewing unintended injuries as resulting from accidents fosters a reluctance to apply principles of justice to them and supports risk acceptance and nonintervention. This chapter first critiques arguments relating to concepts such as responsibility, risk compensation, equity in access to the social determinants of health and the so-called normal opportunity range, personal freedom, health-promoting choices, collective health interests, and the avoidance of third-party harm. This is followed by an exploration of how an ethics framework for public health could assist injury prevention.


Author(s):  
Sue Milton

The proliferation of data exposure via social media implies privacy and security are a lost cause. Regulation counters this through personal data usage compliance. Organizations must also keep non-personal data safe from competitors, criminals, and nation states. The chapter introduces leaders to the two data governance fundamentals: data privacy and data security. The chapter argues that data security cannot be achieved until data privacy issues have been addressed. Simply put, data privacy is fundamental to any data usage policy and data security to the data access policy. The fundamentals are then discussed more broadly, covering data and information management, cyber security, governance, and innovations in IT service provisioning. The chapter clarifies the complementary fundamentals and how they reduce data abuse. The link between privacy and security also demystifies the high resource costs in implementing and maintaining security practices and explains why leaders must provide strong IT leadership to ensure IT investment is defined and implemented wisely.


Author(s):  
Sue Milton

This chapter assumes data is a key asset that, if lost or damaged, severely disrupts business capability and reputation. The chapter has one core purpose, to provide leaders with sufficient understanding of two data management fundamentals, data privacy and data security. Without that understanding, Information Technology (IT) security will always be seen as a cost on, not an investment towards, quality and performance. The chapter reviews the relationship between data privacy and data security. It argues that data security cannot be achieved until data privacy issues have been addressed. Simply put, data privacy is fundamental to any data usage policy and data security to the data access policy. The topic is then discussed in broader terms, in the context of data and information management, covering various themes such as cyber-crime, governance, and innovations in identity management. The chapter's intended outcome is to clarify the relationship between data privacy and security and how this understanding helps reduce data abuse. The link between privacy and security will also demystify the reason for high costs in implementing and maintaining security policies and explain why leaders need to provide stronger IT strategic leadership to ensure IT investment is defined and implemented wisely.


Author(s):  
Satheesh .M ◽  
Deepika .M

In this work, two participants fairly send or receive things through the aid of intermediate who is only engaged if required. An up-to-date accepted necessity is with the aim of involving third party in the trade should be transparent, to save from privacy and evade terrible publicity. Together, a dishonest intermediate will negotiate the fairness of the trade and so the intermediate should be liable in case of any behavioural changes. Optimistic fair exchange (OFE) is one of the classical protocols to assure fairness of indulgence for a party. This exchange can be done by means of an arbitrator. The most important aspect of OFE is to describe security models so as to capture real-time attacks and design schemes secure in practical models. Signaller is confirmed with the data to send the correct person to address that to make sure it is. Since then the SMS has gone through to achieve that can hold the path to the right to see which if any is the fact that to ensure there is. After the signature is created by creating it to be able to well take care of it and then to the right of the person to pay off that is sure to make it. In this project, to avoid the third party attack (hacking) and unauthorized person access the particular important data. The data should be transmitted in sender to receiver that receiver only have a correct data without any data losses, protect a data security in cyber-attacks. A signature may be digitally and OFE design for the exchanged item have trade-off between transparency and accountability.


2020 ◽  
pp. 1-7
Author(s):  
Chithra Adams ◽  
Anthony Lobianco ◽  
Emily Moseley ◽  
Calisa Fitzpatrick

BACKGROUND: Obtaining and retaining employment for persons with spinal cord injury (SCI) is frequently a greater challenge than it is for the non-SCI population. It is particularly difficult during COVID-19 because all the barriers to employment are compounded for people with SCI as they have to take extra precaution to protect their health and wellbeing. OBJECTIVE: The objective of the study was to understand how isolation related to COVID-19 has had an effect on the employment experiences for persons living with SCI. METHODS: Three virtual focus groups were conducted with Kentuckians who had SCI. RESULTS: The major themes were: the impact of disruption in routine on physical and mental health, importance of having the right accommodations, working from home as an accommodation, and the uncertainty of work. CONCLUSIONS: Accommodations are a critical component for people with SCI to be retained in the workforce. Employers should be proactive in offering various inclusive and accessible accommodations to employees so that people do not have to bear the additional burden of asking for accommodations. Rehabilitation professionals would serve the SCI population well by finding ways to help clients better advocate for themselves, provide adaptive home therapeutic equipment, and help identify diverse employment skill sets.


CONVERTER ◽  
2021 ◽  
pp. 659-668
Author(s):  
Li Shuanbao

The modernization of industrial industry cannot be separated from the development of big data.In order to meet this challenge, cloud data integrity audit has been proposed in recent years and received extensive attention. Based on the in-depth study of the impact of different cloud storage data types on the audit scheme, this paper proposes an audit scheme based on Dynamic Hash table.Based on this, this paper explores a variety of cloud storage audit algorithms for different data types to deal with different security challenges.Facing a series of data security problems brought by cloud computing, this paper analyzes the concept, working principle and characteristics of cloud computing, and discusses the data security risks brought by cloud computing from four aspects. At the same time, this paper elaborates the data security strategy from five aspects: data transmission, data privacy, data isolation, data residue and data audit. In this paper, we propose to adopt end-to-end data encryption technology, build private cloud or hybrid cloud, share table architecture, destroy encrypted data related media, and introduce third-party certification authority for data audit.


AJIL Unbound ◽  
2020 ◽  
Vol 114 ◽  
pp. 26-30
Author(s):  
Vivek Krishnamurthy

The European Union's General Data Protection Regulation (GDPR) is widely viewed as setting a new global standard for the protection of data privacy that is worthy of emulation, even though the relationship between the GDPR and existing international legal protections for the right to privacy remain unexplored. Correspondingly, this essay examines the relationship between these two bodies of law, and finds that the GDPR's provisions are neither necessary nor sufficient to protect the right to privacy as enshrined in Article 17 of the International Covenant on Civil and Political Rights (ICCPR). It argues that there are other equally valid and effective approaches that states can pursue to protect the right to privacy in an increasingly digital world, including the much-maligned American approach of regulating data privacy on a sectoral basis.


Author(s):  
Robert A. Schultz

Privacy and security are the first topics involving the interface of the individual with information technology. The two topics of privacy and security are connected, because security is required to make privacy possible in an online world and privacy needs drive security requirements. I will first discuss ethical issues connected with privacy and then with security. The questions raised concerning privacy are these: First, what is the ethical basis for the right to privacy? Second, in what way does IT impact or change the right to privacy? Some concerns about security are these: First, what are the ethical implications for security of the answers to these questions about privacy? At a minimum, we are surely ethically required to maintain security to meet the individual’s right to privacy. Additionally, there are ethical requirements involving security that have bases other than privacy, for example, protection of underage children against exploitation on the Internet.1


Sign in / Sign up

Export Citation Format

Share Document