Explore chapters and articles related to this topic
Future Possibilities
Published in Salvatore Volpe, Health Informatics, 2022
This parable can be viewed in many ways. Some may say that it uses some of the better implementations of informatics to improve one’s quality of life. Others might be concerned about a darker Orwellian or Huxleyan dystopia. To paraphrase Isaac Asimov, “science gathers knowledge faster than society gathers wisdom.” 19 Fortunately, there are advocates working to protect our privacy and freedom. Biometric laws are being written that prevent the sharing and sale of our data, give us the right to opt out and the right to sue as well as the right to specify the length of time the data could be used before its mandatory destruction.
Cybersecurity Roles in a Pandemic
Published in Kenneth Okereafor, Cybersecurity in the COVID-19 Pandemic, 2021
Biometric-based data has the ability to uniquely identify humans [7] and, therefore, it is a necessary expectation that the creation process for every biometric information must conform to global standards [8, 9], while meeting specifications for detecting and preventing unauthorized modification [10], alteration, or outright deletion [11–14].
Surviving and Thriving in Medicine
Published in Clare Gerada, Zaid Al-Najjar, Beneath the White Coat, 2020
Depersonalisation allows us to detach from a disturbing emotional situation, and to get on with the task in hand. For example, the emergency department doctor might only be able to perform well by seeing the patient as a series of biometric values, rather than the critically ill, young mother fighting for her life. Depersonalisation could be considered an adaptive response to intolerable situations and a protection against becoming overly involved with suffering (certainly in the short term when exposed to traumatic situations) as it helps to shut down emotions.
Digital health technology used in emergency large-scale vaccination campaigns in low- and middle-income countries: a narrative review for improved pandemic preparedness
Published in Expert Review of Vaccines, 2023
Paula Mc Kenna, Lindsay A. Broadfield, Annik Willems, Serge Masyn, Theresa Pattery, Ruxandra Draghia-Akli
Many people worldwide, especially those living in LMICs, lack an official proof of identity [63]. For vaccine delivery, it is critical to reliably verify the identity of the individuals to avoid inaccurate vaccine tracking and delivery and to reduce duplicate medical records and record falsification [64,65]. Digital health tools help provide reliable identification in a safe way in a large-scale vaccination campaign in emergency settings. Biometrics are commonly used for identification with various technologies developed and implemented to identify individuals using fingerprints, iris, face, and voice recognition [66]. Based upon the learnings from recent Ebola outbreaks, it is important that biometric tools can be contactless, like iris scanning or facial recognition [27]. In the case of highly transmissible infectious pathogens, fingerprinting can represent a risk of transmission and may require additional hygiene measures to reduce this risk [67]. Numerous biometric-based identification methods exist and could be integrated into a tool for a vaccine campaign.
ECG classification system based on multi-domain features approach coupled with least square support vector machine (LS-SVM)
Published in Computer Methods in Biomechanics and Biomedical Engineering, 2023
Russel R. Majeed, Sarmad K. D. Alkhafaji
Biometric recognition techniques provide a high security system by which individuals can be identified and verified according to their characteristics (González-Manzano et al. 2017; Sharma and Sharma 2017; Hammad et al. 2018, 2019; Peris-Lopez et al. 2018; Wu et al. 2018, 2019; Bai et al. 2019; Hammad and Wang 2019). Mainly, physiological, and behavioural features such as fingerprints, face, speech, have been employed in most of biometrics systems (Peris-Lopez et al. 2018; Bai et al. 2019; Wu et al. 2019). Although those features provide a high rate of security, several studies have proved that those features are not robust enough against falsification and attackers. For example, some attacks in biometric systems involve the use of latex for recreation of some features such as fingerprint, voice, and utilize them as original features (Hammad and Wang 2019; Hamza and Ayed 2020; Rabinezhadsadatmahaleh and Khatibi 2020; Al Alkeem et al. 2021).
Security of implantable medical devices with wireless connections: The dangers of cyber-attacks
Published in Expert Review of Medical Devices, 2018
Our key recommendations: Auditing – IMDs should keep detailed logs of device activity and access events. This facilitates diagnosis of faults, both malicious and unintentional, and can be combined with mechanisms to detect anomalous activity and report it to the patient or clinician.Bug reporting – Postmarket surveillance should include improved mechanisms for identifying security flaws and patching them swiftly. Independent security researchers currently face impediments to responsibly reporting bugs, which manufacturers must work to reduce.Multi-factor authentication – By requiring more than one form of authentication, accessing an IMD becomes more challenging for attackers. Biometric information specific to the patient, or access controls that require close proximity to the patient, are relatively easy to implement as access requirements and would substantially increase security if used well.Education – Current awareness of cybersecurity risk among clinicians appears low, and IMD manufacturers’ efforts in designing secure devices have been lacking in the past. Initiatives to better propagate awareness of this risk, and the means of reducing it, may work to improve security and increase public confidence in IMDs.