Explore chapters and articles related to this topic
Enhancing OSH Management Processes through the Use of Smart Personal Protective Equipment, Wearables and Internet of Things Technologies
Published in Daniel Podgórski, New Opportunities and Challenges in Occupational Safety and Health Management, 2020
The concepts of privacy and personal data protection and cyber-security are inter-related, but not synonymous. Privacy protection is basically a legal and ethical concept and consists in building awareness of the risks to privacy, ensuring individual control over the collection and processing of personal data and controlling the use and dissemination of personal information to any entity outside the sphere of personal control of a given data subject (see section 6.5.1). In turn, cyber-security, defined as “measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack” (Merriam-Webster 2020b) belongs to the sphere of technology and management and concerns activities aimed at preventing attacks on various types of data, including data needed for the efficient functioning of the system, data affecting the safety of users, and other personal sensitive data related to users’ privacy.
Pharmacogenomics: Ethical, Social, and Public Policy Issues
Published in Shaker A. Mousa, Raj Bawa, Gerald F. Audette, The Road from Nanomedicine to Precision Medicine, 2020
Usually, pharmacogenomic researchers require access to a large number of samples from various geographical locations to validate new biomarkers and translate interesting preliminary findings into concrete clinical applications [96]. This entails sharing of samples and data between research projects, making it that much harder to adequately protect personal information. Sharing can be done by depositing the samples and data in a public or controlled access repository (e.g., the National Institutes of Health dbGaP and the Wellcome Trust Case Control Consortium) or through bilateral or multilateral agreements between researchers. Samples are usually anonymized or coded to protect the identity of research participants. However, studies by Lin et al. [58], Malin and Sweeney [61], Homer [76], and Elrich et al. [14], have shown the limits of sample anonymization to fully protect the identity of research participants and the possibility of reidentifying individuals participating in genetic research. Adding additional means of privacy protection, such as firewalls, access codes, confidentiality agreements, and oversight committees, will become increasingly important.
Pharmacogenomics: Ethical, Social, and Public Policy Issues
Published in Shaker A. Mousa, Raj Bawa, Gerald F. Audette, The Road from Nanomedicine to Precision Medicine, 2019
Usually, pharmacogenomic researchers require access to a large number of samples from various geographical locations to validate new biomarkers and translate interesting preliminary findings into concrete clinical applications [96]. This entails sharing of samples and data between research projects, making it that much harder to adequately protect personal information. Sharing can be done by depositing the samples and data in a public or controlled access repository (e.g., the National Institutes of Health dbGaP and the Wellcome Trust Case Control Consortium) or through bilateral or multilateral agreements between researchers. Samples are usually anonymized or coded to protect the identity of research participants. However, studies by Lin et al. [58], Malin and Sweeney [61], Homer [76], and Elrich et al. [14], have shown the limits of sample anonymization to fully protect the identity of research participants and the possibility of reidentifying individuals participating in genetic research. Adding additional means of privacy protection, such as firewalls, access codes, confidentiality agreements, and oversight committees, will become increasingly important.
The Impact of Heterogeneity in Consumers’ Socio-Demographic Characteristics on the Acceptance of Ambient Assisted Living Technology for Older Adults Monitoring in the Home Context
Published in International Journal of Human–Computer Interaction, 2023
Ying Zhou, Ting Pan, Lingling Wang, Rao Li
Technicality—a custom variable composed of unique characteristics of AAL technology—had a significant impact on INT, and a gender difference was observed. To our knowledge, this is the first empirical study to consider technology features specific to AAL technology in the consumer behavior modeling of AAL technology acceptance. Men paid more attention to technicality than women, which may be attributed to the fact that men are more sensitive than women to privacy and technology vulnerabilities when deciding to adopt technologies embedded in the home environment (Karahoca et al., 2018). Owing to the continuous scandals about data breaches of technology giants (e.g., Facebook, Yahoo, Twitter, etc.), consumers’ concerns about privacy leakage have intensified. Naturally, they are worried that their physiological and behavioral data continuously collected by the AAL technology is stolen or abused (Goad et al., 2021). Greater efforts should be made to develop privacy-protection technologies and establish data-protection rules. In addition, the automation level, feedback efficiency, and system reliability of AAL technology also play important roles in promoting willingness to use.
Blockchain based Sensor System Design For Embedded IoT
Published in Journal of Computer Information Systems, 2023
B. J. Praveena, Arivazhagan N, P. Vijaya Pal Reddy
The application of IoT technology in agriculture is improving the industry. One of the most notable examples is the use of RFID in the agriculture food supply chain system. Processing real-time reporting, storage, and sales of agricultural and distribution products like vegetables were part of an IoT-based supply chain. When BC technology is used in an agricultural and farming IoT system, this tracking and tracing system is used widely. Using BC in agricultural IoT systems will decrease delays and misplacement and eliminate intermediary dependencies. Even though this openness and traceability increase the product’s freshness and quality, it has also prompted several privacy issues. Similarly, a combining method will work well with IoT BC farming, but extracting useful information from mixed data while keeping computing complexity to a minimum can be difficult. In order to prevent intruder behavior, such systems must provide effective privacy protection to a particular degree. As a result, future research should focus on preserving privacy approaches with a particular focus on smart contracts and mixing strategies.
Finding, getting and understanding: the user journey for the GDPR’S right to access
Published in Behaviour & Information Technology, 2022
Dominik Pins, Timo Jakobi, Gunnar Stevens, Fatemeh Alizadeh, Jana Krüger
Data awareness and control over personal data and its use are cornerstones for usable privacy protection. Likewise, the right to access as per the GDPR is one of the key mechanisms for consumers to be able to control data collection and use by organisations. For implementing this right, Article 12 of the GDPR provides general guidelines, such as adequate levels of authentication, which information to provide, and more generally the provision is to be made in ‘concise, transparent, intelligible and easily accessible form, using clear and plain language’ (European Parliament and the Council 2016). However, there is no clear guidance about how a SAR process should be designed in terms of a user journey.