Abstract
The current trend in offering universal health care based on open distributed health care network which will provide health care to elderly, socially and economically weak population, and physically challenged patients has lead to rapid digitization of health care data, and wireless medium for data communication. Although it has many advantages and has immense potential to improve health care availability, it has created many challenges in maintaining health care services, in particular in offering security and privacy of the most vulnerable members of society who are the elderly. In this paper we identify the current status of elderly care, their vulnerabilities, and challenges faced to offer them health care in total privacy and dignity.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Alagar, V., Mohammad, M., Wan, K., Hnaide, S.A.: A framework for developing context-aware systems. Trans. Context-aware Syst. Appl.: ICST 1, 1–26 (2014). Springer
Austin, J., Dodge, H.H., Riley, T., Jacobs, P.C., Thielke, S., Kaye, J.: A smart-home system to unobtrusively and continuously assess lonliness in older adults. IEEE J. Transl. Eng. Health Med. 4, 1–11 (2016)
Bari, F., Mark, F.: Security and privacy in mobile health. CIO J. (2013)
Benton, L.: Dissecting the mhealth storage dilemma: Cloud or on-site? October 2014. http://www.mhealthnews.com/blog/dissecting-mhealth-storage-dilemma-cloud-or-site. Accessed 29 Jan 2015
Bitglass: The 2014 bitglass healthcare breach report (2014)
Boritz, J.E.: IS practitioners’ views on core concepts of information integrity. Int. J. Acc. Inf. Syst. 6(4), 260–279 (2005)
Braithwaite, W.R.B.: Why two-factor authentication in healthcare? (2009). https://www-304.ibm.com/partnerworld/gsd/showimage.do?id=25727. Accessed 29 Jan 2015
Brinkerhoff, D.: Accountability and health systems: Overview, framework and strategies, January 2003. http://www.who.int/accountability/AccountabilityHealthSystemsOverview.pdf. Accessed 29 Jan 2015
Chakravorty, R.: A programmable service architecture for mobile medical care, pp. 532–536. IEEE (2006)
Cherdantseva, Y., Hilton, J.: A reference model of information assurance and security. In: 2013 Eighth International Conference Availability, Reliability and Security (ARES), September 2013
Claudette, D.: Aboriginal Elder Abuse in Canada. Aboriginal Healing Foundation, Ottawa (2002)
Curtis, D.W., Pino, E.J., Bailey, J.M., Shih, E.I., Waterman, J., Vinterbo, S.A., Stair, T.O., Guttag, J.V., Greenes, R.A., Ohno-Machado, L.: SMART—an integrated wireless system for monitoring unattended patients. J. Am. Med. Inform. Assoc. 15(1), 44–53 (2008)
David, B., Alistair, T.: Community care of vulnerable older people: cause for concern. Br. J. Gen. Prac. 63(615), 549–550 (2013)
Debbie, T.: Overview of the personal health information protection act. Law and Governance, LegalFocus on Healthcare and Insurance, vol. 8, no. 4, June 2014. http://www.weirfoulds.com/overview-of-the-personal-health-information-protection-act
Elizabeth, C., Barbara, B., Lawson, W.: Reporting elder mistreatment. J. Gerontological Nurs. 23(7), 24–32 (1997)
Elizabeth, P.: National survey on abuse of the elderly in Canada. J. Elder Abuse Negl. 4(1–2), 5–58 (1993)
Fallon, L.F.: Patient confidentiality (2008). http://www.surgeryencyclopedia.com/Pa-St/Patient-Confidentiality.html. Accessed 29 Jan 2015
Goel, P., Garg, S., Singh, J., Bhatnagar, M., Chopra, H., Bajpai, S., et al.: Unmet needs of the elderly in a rural population of Meerut. Indian J. Commun. Med. 28, 165–166 (2003)
Greene, A.: When hipaa applies to mobile applications. Mobile Health News, June 2011. http://mobihealthnews.com/11261/when-hipaa-applies-tomobile-applications
Group, C: Empowering independent living for seniors. Technical report, Carepredict (2015). Accessed 29 Jan 2015
Group, V: Evaluating mhealth adoption barriers: Privacy and regulation. Technical report, Vodafone Global Enterprise (2013). Accessed 29 Jan 2015
HealthCareBusinessTech: Mobile health apps create privacy risk, study says. Technical report, Healthcare Business Technologies (2014). Accessed 29 Jan 2015
Hope, P., Bamford, S., Beales, S., Brett, K., Kneale, D., Macdonnell, M., McKeon, A.: Creating sustainable health and care systems in ageing societies. Technical report, Ageing Societies Working Group (2012). Accessed 29 Jan 2015
Horn, P.: Autonomic computing: IBM’s perspective on the state of information technology (2001). http://www.research.ibm.com/autonomic/manifesto/autonomiccomputing.pdf
Kambourakis, G., Klaoudatou, E., Gritzalis, S.: Securing medical sensor environments: the codeblue framework case. In: The Second International Conference on Availability, Reliability and Security, ARES 2007, pp. 637–643. IEEE (2007)
Kharrazi, H., Chisholm, R., VanNasdale, D., Thompson, B.: Mobile personal health records: an evaluation of features and functionality. Int. J. Med. Inform. 81(9), 579–593 (2012). Accessed 29 Jan 2015
Kim, E., Geistfeld, L.: What makes older adults vulnerable to exploitation or abuse? (2008)
Ko, J., Lim, J.H., Chen, Y., Musvaloiu-E, R., Terzis, A., Masson, G.M., Gao, T., Destler, W., Selavo, L., Dutton, R.P.: Medisn: medical emergency detection in sensor networks. ACM Trans. Embed. Comput. Syst. (TECS) 10(1), 11 (2010)
Kumar, P., Lee, H.J.: Security issues in healthcare applications using wireless medical sensor networks: a survey. Sensors 12(1), 55–91 (2011)
Lauren, F., Deana, B., Chien-Chih, L., Samuel, B., Joseph, B.: Frail elderly as disaster victims: emergency management strategies. Prehosp. Disaster Med. 17, 67–74 (2002)
Madhukar, A., Zachary, I., Insup, L.: Quantifying eavesdropping vulnerability in sensor networks. In: Proceedings of the 2nd International Workshop on Data Management for Sensor Networks, DMSN 2005, pp. 3–9. ACM, New York (2005). http://doi.acm.org/10.1145/1080885.1080887
Malan, D., Fulford-Jones, T., Welsh, M., Moulton, S.: Codeblue: an ad hoc sensor network infrastructure for emergency medical care. In: International Workshop on Wearable and Implantable Body Sensor Networks, vol. 5 (2004)
McCarthy, M.: Experts warn on data security in health and fitness apps. BMJ 347, 1 (2013)
McDaniel, S.A.: The conundrum of demographic aging and policy challenges: a comparative case study of Canada, Japan and Korea. Can. Stud. Popul. 36(1–2), 37–62 (2009)
Mohammad, M., Alagar, V.: A formal approach for the specification and verification of trustworthy component-based systems. J. Syst. Softw. 84(1), 77–104 (2011)
Ng, J.W., Lo, B.P., Wells, O., Sloman, M., Peters, N., Darzi, A., Toumazou, C., Yang, G.Z.: Ubiquitous monitoring environment for wearable and implantable sensors (ubimon). In: International Conference on Ubiquitous Computing (Ubicomp). Citeseer (2004)
Oyekanmi, T.P.: A context-aware healthcare architecture for the elderly. Master of Computer Science thesis, Concordia University, Canada (2015)
Payne, J.: The state of standards and interoperability for mhealth among low- and middle-income countries. mHealth Alliance, March 2013
Periyasamy, K., Wan, K., Alagar, V.: Health care design patterns: an internet of things approach. In: Proceedings of the International Conference on Computers and their Applications, CATA 2017. IEEE (2017)
Province of Alberta: Alberta health information protection act. Technical report, The Government of Alberta (2010). http://www.qp.alberta.ca/documents/Regs/2010_118.pdf
Province of Saskatchewan: Health information protection act. Technical report, The Government of Saskatchewan (2003). http://www.health.gov.sk.ca/hipa
Renehan, E., Dow, B., Lin, X., Blackberry, I., Haapala, I., Gaffy, E., Cyarto, E., Brashe, K.: Healthy ageing literature review 2012. Technical report, State of Victoria, Department of Health (2012). Accessed 29 Jan 2015
Robert, B., Daniel, K.: Response of the elderly to disaster: an age-stratified analysis. Int. J. Aging Hum. Dev. 16(4), 283–296 (1982)
Ronet, B., Heather, D., Mark, L.: Violence against the elderly a comparative analysis of robbery and assault across age and gender groups. Res. Aging 20(2), 183–198 (1998)
SecureWorks: Healthcare security breaches: secure patient information and avoid financial penalties. Technical report, Secure Works (2015). Accessed 29 Jan 2015
Sterrit, R.M., Parashar, H., Tianfield, R., Unland, A.: A concise introduction to autonomic computing. Adv. Eng. Inform. 19, 181–187 (2005)
Symantec: Security and privacy for healthcare providers. Best Practices Series For Healthcare (2009)
Symantec: Internet security threat report 2014. Technical report, Symantec (2014). Accessed 29 Jan 2015
The Council of Physicians and Surgeons: Confidentiality of personal health information. Technical report, College of Physicians and Surgeons of Ontario, April 2006. https://www.cpso.on.ca/uploadedFiles/policyitems/Confidentiality.pdf
The Economist Intelligence Unit Limited: Healthcare strategies for an ageing society. Technical report, Economist Intelligence Unit (2009)
Tueth, M.: Exposing financial exploitation of impaired elderly persons. Am. J. Geriatr. Psychiatry 8(2), 104–111 (2000)
Way, U.: Seniors vulnerability report (2011). http://www.theprovince.com/pdf. Accessed 29 Jan 2015
WHO: mhealth: new horizons for health through mobile technologies. Technical report, World Health Organization, June 2011. Accessed 29 Jan 2015
Yang, G.: Body sensor networks - research challenges and applications (power point presentation) (2014)
Zhang, R., Liu, L.: Security models and requirements for healthcare application clouds. In: 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD), pp. 268–275, July 2010
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Wan, K., Alagar, V., Oyikanmi, P. (2017). Elderly Health Care - Security and Privacy Issue. In: Zou, B., Li, M., Wang, H., Song, X., Xie, W., Lu, Z. (eds) Data Science. ICPCSEE 2017. Communications in Computer and Information Science, vol 727. Springer, Singapore. https://doi.org/10.1007/978-981-10-6385-5_24
Download citation
DOI: https://doi.org/10.1007/978-981-10-6385-5_24
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6384-8
Online ISBN: 978-981-10-6385-5
eBook Packages: Computer ScienceComputer Science (R0)