Privacy and Security Issues of Wearables in Healthcare
Privacy and Security Issues of Wearables in Healthcare
Keyur Tapan Shah FAN - Shah0211 Student ID ? 2160530 Supervisor: Prof. Trish Williams
June 2019
Submitted to the College of Science and Engineering in partial fulfilment of the requirements for the degree of Master of Science at Flinders University ?
Adelaide Australia.
1
DECLARATION
I certify that this work does not incorporate without acknowledgment any material previously submitted for a degree or diploma in any university; and that to the best of my knowledge and belief it does not contain any material previously published or written by another person except where due reference is made in the text. Signature Date: 14-06-2019
2
ACKNOWLEDGEMENT
The Master thesis is the most important part of the master's study. I also choose to do an 18unit master thesis after consulting with senior students and teachers. I would like to convey my special thanks to my senior friend Amarjot Kaur who advised me to do my thesis under Professor Trish Williams. Professor Trish Williams is the key person for me as supervisor towards successful completion of the Master Thesis. I appreciate her invaluable advice and timely feedback to successfully finish my Master Thesis.
3
ABSTRACT
The wearable industry is booming nowadays. Wearable devices once used as a fashion accessory, are now an important tool used in healthcare industries. Wearable devices like smartwatches, smart bands, fitness tracking, smart textiles and smart accessories are used in healthcare industries. This means a patient can monitor their health from home. With this huge advance in technology, there are privacy and security issues with wearable devices. This document presents the literature review of the wearable devices, and the use of it in healthcare. It examines the problems of wearables and the legislation and regulation of wearable devices in Australia, USA, and Europe. There are standards, guidelines, and regulations for privacy and security of wearable devices. These regulations and standards are not strict and many of the manufacturers do not follow the regulations. The user themselves contribute to the leakage data privacy and device security, as they are not aware of different threats and vulnerability of the devices. There should be strict rules and regulation for the wearable devices to maintain privacy, security and data stored in the device. This document also explains how the data can be attacked. Finally, it examines guidelines for consumers and recommendations for manufacture development, so a device is not attacked and thus protected. So, it follows, that if there are strong regulations and consumer awareness of different threats, the device and data stored in the device will be safe.
4
CONTENTS
Abstract ......................................................................................................................................4 Table of Tables ..........................................................................................................................6 Table of Figures .........................................................................................................................6 Acronyms ................................................................................................................................... 7 INTRODUCTION .....................................................................................................................8
Significance of the study ................................................................................................................. 9 Purpose of the study ....................................................................................................................... 9 Aim of the project ........................................................................................................................... 9 Research questions ......................................................................................................................... 9
Literature Review.....................................................................................................................10
What is a wearable?...................................................................................................................... 10 Types of wearables ....................................................................................................................... 10 Data ............................................................................................................................................... 13 Use of wearable devices ............................................................................................................... 13 Use in healthcare .......................................................................................................................... 14
Data privacy and security.....................................................................................................15
What are the problems? ............................................................................................................... 15
Risk ......................................................................................................................................17
Device Architecture....................................................................................................................... 17 Network Connectivity ................................................................................................................... 18 Collection of Data from Wearable Devices ................................................................................... 18 Cloud Computing .......................................................................................................................... 19 Security Risks in Wireless Sensor Networks (WSN) ...................................................................... 19
Methodology ............................................................................................................................22
Case Study ..................................................................................................................................... 22 Types of Case Study ...................................................................................................................... 22
Methodology Selected .........................................................................................................23
Limitations of case study methodology ........................................................................................ 23
Results ...................................................................................................................................... 25 Current solutions..................................................................................................................25 Legislation/ regulation .........................................................................................................27 USA...................................................................................................................................... 28
HIPAA ? Health Insurance Portability and Accountability Act ...................................................... 28 FDA Food and Drug Administration .............................................................................................. 29
Australia ............................................................................................................................... 31
5
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related download
- check valves pumps more smart products usa inc
- cell phone technology
- sharp operation manual
- tracking depression dynamics in college students using
- longitudinal physiological data from a wearable device
- icp watches and clocks
- samsung galaxy watch3 r84x r85x user manual
- cito an actuated smartwatch for extended interactions
- user manual hisense usa
- 40h4030f1 spec release v08102020 hisense usa
Related searches
- major issues in healthcare today
- current issues in healthcare 2019
- current issues in healthcare today
- top issues in healthcare 2019
- the role of finance in healthcare systems
- legal issues in healthcare articles
- issues of diversity in college
- msn privacy and security settings
- online privacy and security article 2020
- cultural issues in healthcare today
- quality issues in healthcare articles
- issues in healthcare management today