Skip to main content
Article
Security on IOT and Health Devices Connected to Mobile
Life (2016)
  • Rhee H Al
  • Zhang H
  • Jon Schneider
Abstract
Psychoacoustic communication and systems have garnered tremendous interest from both analysts and systems engineers in the last several years. After years of extensive research into the transistor, we confirm the evaluation of lambda calculus. EvenSilo, our new application for erasure coding, is the solution to all of these challenges.

Keywords
  • Wearable Technology,
  • Wearable Devices,
  • GoogleGlass,
  • Smartwatch,
  • Mhealth,
  • #mobile,
  • Helath,
  • IOT,
  • Internet of things
Disciplines
Publication Date
Winter January 1, 2016
Citation Information
[1] Gareth Mitchell, The Raspberry Pi single-board computer will revolutionize computer science teaching [For & against], vol. 7, no. 3, pp. 26, 2012. [2] C. Edwards, "Not-so-humble raspberry pi gets big ideas", Engineering & Technology, vol. 8, no. 3, pp. 30-33, April 2013. [3] Charles Severence, "Eben Upton: Raspberry Pi", vol. 46, no. 10, pp. 14-16, 2013. [4] "Content", 2015 IEEE international Conference on Electrical Computer and Communication Technologies (ICECCT), 2015. [5] Patchava Vamsikrishna, Sonti Dinesh Kumar, Shaik Riyaz Hussain, K. Rama Naidu, "Raspberry PI controlled SMS-Update-Notification (Sun) system", Electrical Computer and Communication Technologies (ICECCT) 2015 IEEE International Conference on, pp. 1-4, 5–7 March 2015. [6] E. Brian, "HIT Think How to manage risk with cloud vendors," Health Data Management, 2016. [7] M. Maslin and R. Ailar, "Cloud Computing Adoption in Healthcare Sector: A SWOT Analysis," Canadian Center of Science and Education, vol. 11, no. 10, pp. 12-18, 2015 [8] BitGlass, "Healthcare Breach Report 2016," BitGlass Inc., 2016. [9] ClickCare, 2014."Healthcare BYOD and HIPAA Security," San Jose: ClickCare LLC. [10] Edward, H. S., 1999. "The Evolution of Electronic Medical Records". Academic Medicine, 74(4), pp. 414-419. [11] Ronald, B., John, S. & Robert, K., 2015. "New challenges for Electronic Health Records Confidentiality and Access to Sensitive Health Information About Parents and Adolescents," The Journal of the American Medical Association, 313(1), pp. 29-30. [12] Ajit, A. & Eric, M. J., 2010." Information security and privacy in healthcare: Current state of Research," Int. J. Internet and Enterprise Management, 6(4), pp. 279- 313. [13] Experian,"Third Annual Data Breach Industry Forecast," Experian Inc., 2016. [14] S. Safavi and Z. Shukur, “Improving google glass security and privacy by changing the physical and software structure,” Life Science Journal, vol. 11, no. 5, pp. 109–117, 2014. [15] B. Krebs, “Would you have spotted the fraud?” Online at http: //krebsonsecurity.com/2010/01/would-you-havespotted-the-fraud/, Jan 2010, krebs on Security, Indepth security news and investigation. [16] L. Richardson and S. Ruby, RESTful web services. ” O’Reilly Media, Inc.”, 2008. [17] Y. Liu, J. Yang, and M. Liu, “Recognition of qr code with mobile phones,” in Control and Decision Conference, 2008. CCDC 2008. Chinese, July 2008, pp. 203–206. [18] Practical Guidelines for the privacy friendly processing of biometric data for identity verification, 12/07/2011, http://www.turbine-project.eu/dowloads/TURBINE_KUL_ICRID1_4_3_BEST_PRACTICES_R2_3.pdf, accessed May 2013 [19] Weiss, S., “Privacy Threat Model for Data Portability in Social Network Applications”, Proceedings of the 14th Americas Conference on Information Systems (AMCIS), Toronto, Canada, 2008. [20] Deliverable D2.2 of the GINI support action: Technology Gaps for Longer-Term Research, October 17, 2011; http://www.gini-sa.eu/images/stories/D2.2%20- %20Technology%20Gaps%20for%20Longer-Term%20research%20- %202011.10.17.pdf, accessed in May 2013 [21] e-CODEX Delvierable 4.1.1: e-Identity: Inventory and Requirements Documents,16.10.2011 http://www.e-codex.eu/news-andmedia/media/deliverables.html?eID=dam_frontend_push&docID=144, accessed May 2013 [22] Casassa Mont, M.; Pearson, S.; Bramhall, P., Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services. In Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), IEEE Computer Society: 2003; p 377. [23] Liviu A. (12 Sep, 2014). Bitdefender Research Exposes Security Risks of Android Wearable Devices. (cited 24 Oct, 2015).[Online] Available: http://www.darkreading.com/partnerperspectives/bitdefender/bitdefender-research-exposes-security-risks-of-android-wearable-devices- /a/d-id/1318005 [24] Ryan G. (01 Oct, 2013). Accelerometer vs. Gyroscope: What's the Difference? (cited 23 Oct, 2015).[Online] Available: http://www.livescience.com/40103-accelerometer-vs-gyroscope.html [25] Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver. 2013. SENSORS ON ANDROID PHONES. (cited 23 Oct, 2015).[Online] Available: http://m4d.colfinder.org/sites/default/files/Slides/M4D_Week2_sensors.pdf [26] Engineer’s Handbook. 2006. Mechanical Components - Sound Sensors. (cited 2 Oct,2015).[Online]Available:http://www.engineershandbook.com/Components/soundsensors.html [27] Technavio. (21 Jul 2014). Exploring Five Challenges in the Wearable Technology Market. (cited 31 Oct, 2015). [Online] Available: http://www.technavio.com/blog/exploring-five-challenges-in-thewearable-technology-market [28] Julie F. (12 Nov, 2014). ISACA Survey: Most Consumers in Australia Aware of Major Data Breaches, But Fewer Than Half Have Changed Key Shopping Behaviors. (cited 4 Oct, 2015).[Online] Available: http://www.isaca.org/About-ISACA/Press-room/News-Releases/2014/Pages/ISACASurvey-Most-Consumers-in-Australia-Aware-of-Major-Data-Breaches-But-Fewer-Than-Half-HaveChanged-Shopping-Behaviors.aspx
Creative Commons license
Creative Commons License
This work is licensed under a Creative Commons CC_BY-NC International License.