Skip to main content

Elderly Health Care - Security and Privacy Issue

  • Conference paper
  • First Online:
  • 2615 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 727))

Abstract

The current trend in offering universal health care based on open distributed health care network which will provide health care to elderly, socially and economically weak population, and physically challenged patients has lead to rapid digitization of health care data, and wireless medium for data communication. Although it has many advantages and has immense potential to improve health care availability, it has created many challenges in maintaining health care services, in particular in offering security and privacy of the most vulnerable members of society who are the elderly. In this paper we identify the current status of elderly care, their vulnerabilities, and challenges faced to offer them health care in total privacy and dignity.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Alagar, V., Mohammad, M., Wan, K., Hnaide, S.A.: A framework for developing context-aware systems. Trans. Context-aware Syst. Appl.: ICST 1, 1–26 (2014). Springer

    Google Scholar 

  2. Austin, J., Dodge, H.H., Riley, T., Jacobs, P.C., Thielke, S., Kaye, J.: A smart-home system to unobtrusively and continuously assess lonliness in older adults. IEEE J. Transl. Eng. Health Med. 4, 1–11 (2016)

    Article  Google Scholar 

  3. Bari, F., Mark, F.: Security and privacy in mobile health. CIO J. (2013)

    Google Scholar 

  4. Benton, L.: Dissecting the mhealth storage dilemma: Cloud or on-site? October 2014. http://www.mhealthnews.com/blog/dissecting-mhealth-storage-dilemma-cloud-or-site. Accessed 29 Jan 2015

  5. Bitglass: The 2014 bitglass healthcare breach report (2014)

    Google Scholar 

  6. Boritz, J.E.: IS practitioners’ views on core concepts of information integrity. Int. J. Acc. Inf. Syst. 6(4), 260–279 (2005)

    Article  Google Scholar 

  7. Braithwaite, W.R.B.: Why two-factor authentication in healthcare? (2009). https://www-304.ibm.com/partnerworld/gsd/showimage.do?id=25727. Accessed 29 Jan 2015

  8. Brinkerhoff, D.: Accountability and health systems: Overview, framework and strategies, January 2003. http://www.who.int/accountability/AccountabilityHealthSystemsOverview.pdf. Accessed 29 Jan 2015

  9. Chakravorty, R.: A programmable service architecture for mobile medical care, pp. 532–536. IEEE (2006)

    Google Scholar 

  10. Cherdantseva, Y., Hilton, J.: A reference model of information assurance and security. In: 2013 Eighth International Conference Availability, Reliability and Security (ARES), September 2013

    Google Scholar 

  11. Claudette, D.: Aboriginal Elder Abuse in Canada. Aboriginal Healing Foundation, Ottawa (2002)

    Google Scholar 

  12. Curtis, D.W., Pino, E.J., Bailey, J.M., Shih, E.I., Waterman, J., Vinterbo, S.A., Stair, T.O., Guttag, J.V., Greenes, R.A., Ohno-Machado, L.: SMART—an integrated wireless system for monitoring unattended patients. J. Am. Med. Inform. Assoc. 15(1), 44–53 (2008)

    Article  Google Scholar 

  13. David, B., Alistair, T.: Community care of vulnerable older people: cause for concern. Br. J. Gen. Prac. 63(615), 549–550 (2013)

    Article  Google Scholar 

  14. Debbie, T.: Overview of the personal health information protection act. Law and Governance, LegalFocus on Healthcare and Insurance, vol. 8, no. 4, June 2014. http://www.weirfoulds.com/overview-of-the-personal-health-information-protection-act

  15. Elizabeth, C., Barbara, B., Lawson, W.: Reporting elder mistreatment. J. Gerontological Nurs. 23(7), 24–32 (1997)

    Article  Google Scholar 

  16. Elizabeth, P.: National survey on abuse of the elderly in Canada. J. Elder Abuse Negl. 4(1–2), 5–58 (1993)

    Google Scholar 

  17. Fallon, L.F.: Patient confidentiality (2008). http://www.surgeryencyclopedia.com/Pa-St/Patient-Confidentiality.html. Accessed 29 Jan 2015

  18. Goel, P., Garg, S., Singh, J., Bhatnagar, M., Chopra, H., Bajpai, S., et al.: Unmet needs of the elderly in a rural population of Meerut. Indian J. Commun. Med. 28, 165–166 (2003)

    Google Scholar 

  19. Greene, A.: When hipaa applies to mobile applications. Mobile Health News, June 2011. http://mobihealthnews.com/11261/when-hipaa-applies-tomobile-applications

  20. Group, C: Empowering independent living for seniors. Technical report, Carepredict (2015). Accessed 29 Jan 2015

    Google Scholar 

  21. Group, V: Evaluating mhealth adoption barriers: Privacy and regulation. Technical report, Vodafone Global Enterprise (2013). Accessed 29 Jan 2015

    Google Scholar 

  22. HealthCareBusinessTech: Mobile health apps create privacy risk, study says. Technical report, Healthcare Business Technologies (2014). Accessed 29 Jan 2015

    Google Scholar 

  23. Hope, P., Bamford, S., Beales, S., Brett, K., Kneale, D., Macdonnell, M., McKeon, A.: Creating sustainable health and care systems in ageing societies. Technical report, Ageing Societies Working Group (2012). Accessed 29 Jan 2015

    Google Scholar 

  24. Horn, P.: Autonomic computing: IBM’s perspective on the state of information technology (2001). http://www.research.ibm.com/autonomic/manifesto/autonomiccomputing.pdf

  25. Kambourakis, G., Klaoudatou, E., Gritzalis, S.: Securing medical sensor environments: the codeblue framework case. In: The Second International Conference on Availability, Reliability and Security, ARES 2007, pp. 637–643. IEEE (2007)

    Google Scholar 

  26. Kharrazi, H., Chisholm, R., VanNasdale, D., Thompson, B.: Mobile personal health records: an evaluation of features and functionality. Int. J. Med. Inform. 81(9), 579–593 (2012). Accessed 29 Jan 2015

    Article  Google Scholar 

  27. Kim, E., Geistfeld, L.: What makes older adults vulnerable to exploitation or abuse? (2008)

    Google Scholar 

  28. Ko, J., Lim, J.H., Chen, Y., Musvaloiu-E, R., Terzis, A., Masson, G.M., Gao, T., Destler, W., Selavo, L., Dutton, R.P.: Medisn: medical emergency detection in sensor networks. ACM Trans. Embed. Comput. Syst. (TECS) 10(1), 11 (2010)

    Google Scholar 

  29. Kumar, P., Lee, H.J.: Security issues in healthcare applications using wireless medical sensor networks: a survey. Sensors 12(1), 55–91 (2011)

    Article  Google Scholar 

  30. Lauren, F., Deana, B., Chien-Chih, L., Samuel, B., Joseph, B.: Frail elderly as disaster victims: emergency management strategies. Prehosp. Disaster Med. 17, 67–74 (2002)

    Article  Google Scholar 

  31. Madhukar, A., Zachary, I., Insup, L.: Quantifying eavesdropping vulnerability in sensor networks. In: Proceedings of the 2nd International Workshop on Data Management for Sensor Networks, DMSN 2005, pp. 3–9. ACM, New York (2005). http://doi.acm.org/10.1145/1080885.1080887

  32. Malan, D., Fulford-Jones, T., Welsh, M., Moulton, S.: Codeblue: an ad hoc sensor network infrastructure for emergency medical care. In: International Workshop on Wearable and Implantable Body Sensor Networks, vol. 5 (2004)

    Google Scholar 

  33. McCarthy, M.: Experts warn on data security in health and fitness apps. BMJ 347, 1 (2013)

    Google Scholar 

  34. McDaniel, S.A.: The conundrum of demographic aging and policy challenges: a comparative case study of Canada, Japan and Korea. Can. Stud. Popul. 36(1–2), 37–62 (2009)

    Article  Google Scholar 

  35. Mohammad, M., Alagar, V.: A formal approach for the specification and verification of trustworthy component-based systems. J. Syst. Softw. 84(1), 77–104 (2011)

    Article  Google Scholar 

  36. Ng, J.W., Lo, B.P., Wells, O., Sloman, M., Peters, N., Darzi, A., Toumazou, C., Yang, G.Z.: Ubiquitous monitoring environment for wearable and implantable sensors (ubimon). In: International Conference on Ubiquitous Computing (Ubicomp). Citeseer (2004)

    Google Scholar 

  37. Oyekanmi, T.P.: A context-aware healthcare architecture for the elderly. Master of Computer Science thesis, Concordia University, Canada (2015)

    Google Scholar 

  38. Payne, J.: The state of standards and interoperability for mhealth among low- and middle-income countries. mHealth Alliance, March 2013

    Google Scholar 

  39. Periyasamy, K., Wan, K., Alagar, V.: Health care design patterns: an internet of things approach. In: Proceedings of the International Conference on Computers and their Applications, CATA 2017. IEEE (2017)

    Google Scholar 

  40. Province of Alberta: Alberta health information protection act. Technical report, The Government of Alberta (2010). http://www.qp.alberta.ca/documents/Regs/2010_118.pdf

  41. Province of Saskatchewan: Health information protection act. Technical report, The Government of Saskatchewan (2003). http://www.health.gov.sk.ca/hipa

  42. Renehan, E., Dow, B., Lin, X., Blackberry, I., Haapala, I., Gaffy, E., Cyarto, E., Brashe, K.: Healthy ageing literature review 2012. Technical report, State of Victoria, Department of Health (2012). Accessed 29 Jan 2015

    Google Scholar 

  43. Robert, B., Daniel, K.: Response of the elderly to disaster: an age-stratified analysis. Int. J. Aging Hum. Dev. 16(4), 283–296 (1982)

    Google Scholar 

  44. Ronet, B., Heather, D., Mark, L.: Violence against the elderly a comparative analysis of robbery and assault across age and gender groups. Res. Aging 20(2), 183–198 (1998)

    Article  Google Scholar 

  45. SecureWorks: Healthcare security breaches: secure patient information and avoid financial penalties. Technical report, Secure Works (2015). Accessed 29 Jan 2015

    Google Scholar 

  46. Sterrit, R.M., Parashar, H., Tianfield, R., Unland, A.: A concise introduction to autonomic computing. Adv. Eng. Inform. 19, 181–187 (2005)

    Article  Google Scholar 

  47. Symantec: Security and privacy for healthcare providers. Best Practices Series For Healthcare (2009)

    Google Scholar 

  48. Symantec: Internet security threat report 2014. Technical report, Symantec (2014). Accessed 29 Jan 2015

    Google Scholar 

  49. The Council of Physicians and Surgeons: Confidentiality of personal health information. Technical report, College of Physicians and Surgeons of Ontario, April 2006. https://www.cpso.on.ca/uploadedFiles/policyitems/Confidentiality.pdf

  50. The Economist Intelligence Unit Limited: Healthcare strategies for an ageing society. Technical report, Economist Intelligence Unit (2009)

    Google Scholar 

  51. Tueth, M.: Exposing financial exploitation of impaired elderly persons. Am. J. Geriatr. Psychiatry 8(2), 104–111 (2000)

    Article  Google Scholar 

  52. Way, U.: Seniors vulnerability report (2011). http://www.theprovince.com/pdf. Accessed 29 Jan 2015

  53. WHO: mhealth: new horizons for health through mobile technologies. Technical report, World Health Organization, June 2011. Accessed 29 Jan 2015

    Google Scholar 

  54. Yang, G.: Body sensor networks - research challenges and applications (power point presentation) (2014)

    Google Scholar 

  55. Zhang, R., Liu, L.: Security models and requirements for healthcare application clouds. In: 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD), pp. 268–275, July 2010

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vangalur Alagar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Wan, K., Alagar, V., Oyikanmi, P. (2017). Elderly Health Care - Security and Privacy Issue. In: Zou, B., Li, M., Wang, H., Song, X., Xie, W., Lu, Z. (eds) Data Science. ICPCSEE 2017. Communications in Computer and Information Science, vol 727. Springer, Singapore. https://doi.org/10.1007/978-981-10-6385-5_24

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6385-5_24

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6384-8

  • Online ISBN: 978-981-10-6385-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics