-
The American Journal of Bioethics : AJOB Jul 2022
Topics: Genetic Privacy; Humans; Privacy
PubMed: 35737492
DOI: 10.1080/15265161.2022.2075972 -
The Lancet. Digital Health Apr 2023
Topics: Privacy; Confidentiality; Wearable Electronic Devices
PubMed: 36963905
DOI: 10.1016/S2589-7500(23)00055-9 -
Sensors (Basel, Switzerland) May 2022Under the Internet of Things paradigm, the emergence and use of a wide variety of connected devices and personalized telematics services have proliferated recently. As a... (Review)
Review
Under the Internet of Things paradigm, the emergence and use of a wide variety of connected devices and personalized telematics services have proliferated recently. As a result, along with the penetration of these devices in our daily lives, the users' security and privacy have been compromised due to some weaknesses in connected devices and underlying applications. This article focuses on analyzing the security and privacy of such devices to promote safe Internet use, especially by young people. First, the connected devices most used by the target group are classified, and an exhaustive analysis of the vulnerabilities that concern the user is performed. As a result, a set of differentiated security and privacy issues existing in the devices is identified. The study reveals that many of these vulnerabilities are related to the fact that device manufacturers often prioritize functionalities and services, leaving security aspects in the background. These companies even exploit the data linked to the use of these devices for various purposes, ignoring users' privacy rights. This research aims to raise awareness of severe vulnerabilities in devices and to encourage users to use them correctly. Our results help other researchers address these issues with a more global perspective.
Topics: Adolescent; Computer Security; Humans; Privacy
PubMed: 35684588
DOI: 10.3390/s22113967 -
Sensors (Basel, Switzerland) Nov 2022Modern vehicles are more complex and interconnected than ever before, which also means that attack surfaces for vehicles have increased significantly. Malicious... (Review)
Review
Modern vehicles are more complex and interconnected than ever before, which also means that attack surfaces for vehicles have increased significantly. Malicious cyberattacks will not only exploit personal privacy and property, but also affect the functional safety of electrical/electronic (E/E) safety-critical systems by controlling the driving functionality, which is life-threatening. Therefore, it is necessary to conduct cybersecurity testing on vehicles to reveal and address relevant security threats and vulnerabilities. Cybersecurity standards and regulations issued in recent years, such as ISO/SAE 21434 and UNECE WP.29 regulations (R155 and R156), also emphasize the indispensability of cybersecurity verification and validation in the development lifecycle but lack specific technical details. Thus, this paper conducts a systematic and comprehensive review of the research and practice in the field of automotive cybersecurity testing, which can provide reference and advice for automotive security researchers and testers. We classify and discuss the security testing methods and testbeds in automotive engineering. Furthermore, we identify gaps and limitations in existing research and point out future challenges.
Topics: Computer Security; Privacy
PubMed: 36501913
DOI: 10.3390/s22239211 -
The Journal of the Royal College of... Sep 2023
Topics: Humans; Biomedical Research; Privacy; Information Dissemination
PubMed: 37293886
DOI: 10.1177/14782715231175001 -
Value in Health : the Journal of the... Sep 2023
Topics: Humans; Privacy; Confidentiality
PubMed: 37406963
DOI: 10.1016/j.jval.2023.06.013 -
Journal of Medical Internet Research May 2023The aging society posits new socioeconomic challenges to which a potential solution is active and assisted living (AAL) technologies. Visual-based sensing systems are... (Review)
Review
BACKGROUND
The aging society posits new socioeconomic challenges to which a potential solution is active and assisted living (AAL) technologies. Visual-based sensing systems are technologically among the most advantageous forms of AAL technologies in providing health and social care; however, they come at the risk of violating rights to privacy. With the immersion of video-based technologies, privacy-preserving smart solutions are being developed; however, the user acceptance research about these developments is not yet being systematized.
OBJECTIVE
With this scoping review, we aimed to gain an overview of existing studies examining the viewpoints of older adults and/or their caregivers on technology acceptance and privacy perceptions, specifically toward video-based AAL technology.
METHODS
A total of 22 studies were identified with a primary focus on user acceptance and privacy attitudes during a literature search of major databases. Methodological quality assessment and thematic analysis of the selected studies were executed and principal findings are summarized. The PRISMA-ScR (Preferred Reporting Items for Systematic Reviews and Meta-Analyses Extension for Scoping Reviews) guidelines were followed at every step of this scoping review.
RESULTS
Acceptance attitudes toward video-based AAL technologies are rather conditional, and are summarized into five main themes seen from the two end-user perspectives: caregiver and care receiver. With privacy being a major barrier to video-based AAL technologies, security and medical safety were identified as the major benefits across the studies.
CONCLUSIONS
This review reveals a very low methodological quality of the empirical studies assessing user acceptance of video-based AAL technologies. We propose that more specific and more end user- and real life-targeting research is needed to assess the acceptance of proposed solutions.
Topics: Aged; Humans; Aging; Attitude; Privacy; Technology
PubMed: 37126390
DOI: 10.2196/45297 -
Science (New York, N.Y.) Jan 2015This Review summarizes and draws connections between diverse streams of empirical research on privacy behavior. We use three themes to connect insights from social and... (Review)
Review
This Review summarizes and draws connections between diverse streams of empirical research on privacy behavior. We use three themes to connect insights from social and behavioral sciences: people's uncertainty about the consequences of privacy-related behaviors and their own preferences over those consequences; the context-dependence of people's concern, or lack thereof, about privacy; and the degree to which privacy concerns are malleable—manipulable by commercial and governmental interests. Organizing our discussion by these themes, we offer observations concerning the role of public policy in the protection of privacy in the information age.
Topics: Access to Information; Behavior; Humans; Information Dissemination; Internet; Privacy; Public Policy; Social Media; Uncertainty
PubMed: 25635091
DOI: 10.1126/science.aaa1465 -
Sensors (Basel, Switzerland) Oct 2022Intelligent transportation systems will play a key role in the smart cities of the future. In particular, railway transportation is gaining attention as a promising... (Review)
Review
Intelligent transportation systems will play a key role in the smart cities of the future. In particular, railway transportation is gaining attention as a promising solution to cope with the mobility challenges in large urban areas. Thanks to the miniaturisation of sensors and the deployment of fast data networks, the railway industry is being augmented with contextual, real-time information that opens the door to novel and personalised services. Despite the benefits of this digitalisation, the high complexity of railway transportation entails a number of challenges, particularly from security and privacy perspectives. Since railway assets are attractive targets for terrorism, coping with strong security and privacy requirements such as cryptography and privacy-preserving methods is of utmost importance. This article provides a thorough systematic literature review on information security and privacy within railway transportation systems, following the well-known methodology proposed by vom Brocke et al. We sketch out the most relevant studies and outline the main focuses, challenges and solutions described in the literature, considering technical, societal, regulatory and ethical approaches. Additionally, we discuss the remaining open issues and suggest several research lines that will gain relevance in the years to come.
Topics: Privacy; Computer Security; Transportation
PubMed: 36298049
DOI: 10.3390/s22207698 -
Academic Radiology Jun 2017Academic radiologists commonly hold multiple simultaneous roles within the landscape of physician training. This paper analyzes theoretical scenarios describing... (Review)
Review
RATIONALE AND OBJECTIVES
Academic radiologists commonly hold multiple simultaneous roles within the landscape of physician training. This paper analyzes theoretical scenarios describing relationships between medical students, residents, and physician educators in radiology.
MATERIALS AND METHODS
The scenarios presented involve medical student supervision, radiology resident recruitment, and resident termination with respect to relevant ethical, regulatory, and legal considerations. Legal precedents and the medical social contract are addressed.
RESULTS
The Family Educational Rights and Privacy Act defines a framework for the privacy practices of medical schools, but it does not confer individual rights. Resident physicians rarely win wrongful termination lawsuits. Physician educators are ethically bound to act in the best interest of society.
CONCLUSIONS
Courts have ruled that medicine is intended to be a self-regulatory profession. Such a power requires that physicians remain accountable to the public while providing a fair learning environment for medical trainees.
Topics: Clinical Competence; Employee Discipline; Employment; Humans; Internship and Residency; Privacy; Radiology; Students, Medical; United States
PubMed: 28526512
DOI: 10.1016/j.acra.2016.09.028