Pervasive eHealth services a security and privacy risk awareness survey

@article{Bellekens2016PervasiveES,
  title={Pervasive eHealth services a security and privacy risk awareness survey},
  author={Xavier J. A. Bellekens and Andrew W. Hamilton and Preetila Seeam and Kamila Nieradzinska and Quentin Franssen and Amar Kumar Seeam},
  journal={2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)},
  year={2016},
  pages={1-4}
}
  • X. Bellekens, Andrew W. Hamilton, A. Seeam
  • Published 13 June 2016
  • Computer Science
  • 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)
The human factor is often recognised as a major aspect of cyber-security research. Risk and situational perception are identified as key factors in the decision making process, often playing a lead role in the adoption of security mechanisms. However, risk awareness and perception have been poorly investigated in the field of eHealth wearables. Whilst end-users often have limited understanding of privacy and security of wearables, assessing the perceived risks and consequences will help shape… 

Figures from this paper

A Study on Situational Awareness Security and Privacy of Wearable Health Monitoring Devices
TLDR
This study assesses the understanding of security and privacy of users in possession of wearable devices, and demonstrates privacy complacency, as the majority of users trust the application and the wearable device manufacturer.
When eHealth meets the internet of things: Pervasive security and privacy challenges
TLDR
Some of the security and privacy challenges eHealth devices currently face are explored, and Legislative implications of data breaches are considered, as well as service provider accountability.
Wearable Devices and Measurement Data: An Empirical Study on eHealth and Data Sharing
  • A. Alaqra, B. Kane
  • Computer Science
    2020 IEEE 33rd International Symposium on Computer-Based Medical Systems (CBMS)
  • 2020
TLDR
This interview study with 29 users of wearable devices reports perspectives on privacy concerns towards sharing of measured data in general, and measured stress data in the workplace, as well as provide assurances from workplace and cloud.
Security and Privacy Awareness in Smart Environments - A Cross-Country Investigation
TLDR
A survey with 575 participants from three different countries considering smart home and health environments finds that among the 275 participants mentioning security and privacy issues, 111 only expressed abstract concerns such as “security issues” and only 34 mentioned concrete harms such as "Burglaries (physical and privacy)”, caused bySecurity and privacy violations.
Informing Privacy and Security Decision Making in an IoT World
TLDR
A usable privacy and security nutrition label is proposed for IoT practices, building on prior projects that have used nutrition labels in other privacy contexts, to establish a thorough understanding of how users make privacy-related decisions when interacting with IoT devices.
Measuring Cyber Security Awareness within Groups of Medical Professionals in Poland
TLDR
The results show a an unsatisfactory level of knowledge regarding information security in Poland and the quality of cyber security training among medical professionals should be improved and frequency of the trainings should be increased.
Educating and Raising Awareness on Cyber Security Social Engineering: A Literature Review
  • Hussain Aldawood, G. Skinner
  • Computer Science
    2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE)
  • 2018
TLDR
How innovative information security education programs can effectively increase user/employee awareness and ultimately reduce cyber security incidents is detailed.
Investigating People’s Privacy Risk Perception
TLDR
People do not seem to be aware of specific privacy risks when confronted with an abstract risk scenario, so privacy researchers or activists should make people aware of what collected and analyzed data can be used for when abused (by the service or even an unauthorized third party).
Threat Modeling and Security Issues for the Internet of Things
TLDR
The primary goal of this study is to addresses challenges regarding privacy and security of Internet of Things, within some of its key application areas, namely Smart Homes, Smart Cities, Wearables, Smart Retail, Connected Cars, and Health-Care.
Optimising technological literacy acquirement to protect privacy and security
TLDR
This research addresses the problem with a qualitative approach, and introduces a methodology named OTLA (Optimising Technological Literacy Acquirement) to achieve optimality between the cost of the teaching process and its benefits.
...
1
2
3
...

References

SHOWING 1-10 OF 20 REFERENCES
A Taxonomy of mHealth Apps -- Security and Privacy Concerns
TLDR
Results of the evaluation suggest that having a unified mechanism to categorize mHealth applications with respect to security and privacy is important and can be beneficial and contributes to literature, as it builds upon prior work and adds knowledge to a still new and relatively unexplored domain such as mobile healthcare.
A threat taxonomy for mHealth privacy
  • D. Kotz
  • Medicine, Computer Science
    2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)
  • 2011
TLDR
A taxonomy of the privacy-related threats to so-called mHealth technologies is developed, and some of the technologies that could support privacy-sensitive mHealth systems are discussed.
Attack visualisation for cyber-security situation awareness
TLDR
The relationship between Situation Awareness, decision-making and the most known measurements of Situation Awareness is being presented and an application of some techniques through an attack-visualisation case study is being provided.
A video game for cyber security training and awareness
Cyber-Physical-Security Model for Safety-Critical IoT Infrastructures
TLDR
The paper proposes the use of a cyclic cyberphysical security model after system commissioning that allows knowledge transfer between regulatory bodies through sharing of best practices to enable system operators to identify exploits encountered from other industries and maintain high security levels and improve the IoT architectures.
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
TLDR
The results show that an employee's intention to comply with the ISP is significantly influenced by attitude, normative beliefs, and self-efficacy to comply, and the role of ISA and compliance-related beliefs in an organization's efforts to encourage compliance is shed.
Folk Models of Home Computer Security
TLDR
Each folk model of home computer security can be devided into models for various kinds of viruses and models related to different types of hackers, and how users think about computer security is described.
Wearable and mobile sensors connected to social media in human well-being applications
Users' conceptions of web security: a comparative study
TLDR
The results show that many users across the three diverse communities mistakently evaluated whether a connection is secure or not secure.
Hacking cars
Researchers have discovered important security flaws in modern automobile systems. Will car thieves learn to pick locks with their laptops?
...
1
2
...