ITC571 Emerging Technologies and Innovation
Despite the risk in the healthcare systems IoT is going deep into the health care systems primary focus is to ensure the safety of patient. The first thing is to focus on securing the healthcare data.
A question arises by considering the above factors who is responsible for IoT security? To get started with hospitals should take steps to ensure that their environment is secure. On the other hand, hospital management should take necessary actions to secure the information of equipment’s which they are purchasing for hospital need. To be more specific any equipment that hospital adopts need to
- Securely store and transmit data
- Should accept software security updates
- Feature API’s that ensure secure connections
The above steps are very important, but hospitals should also fallow this hospital alone can’t stand to solve the problems of IoT, Device manufactures also plays a key role to solve the IoT security issue. They should develop a solution to fallow security standards and offer certified devices.
Using horizontal management platform enhanced device security management can be accomplished, this could help manufactures to achieve security of their equipment on a regular basis this platform makes end to end security possible so that manufactures could send security updates quickly. This will make sure that the data is secured that from its starting point to its destination.
Even though connected health care is combined with considerable IoT security risks, it can be reduced if hospitals device manufactures could take appropriate precautions by making a security as the first point the health sector can’t use the benefits of IoT with equivalent to patient safety.
3.Ethical Issues
In Internet of Thins field morals and ethics refers to social behaviour. Property rights, private use of information and accessibility are shown in most of the ethics data bases. Ethical behaviour consists of the following
ØInformation privacy
ØAccess to information
ØIntegration of information
Following ethical issues have been raised in IoT field
ØAuthor identification:
To typically identify of the author collected data is typically hard to determine in the IoT system. there is also an obligation were patient data should no be used with out his or her concerns.
Risk is the problem which can happen in feature or not Risk management is a technique to identify, monitoring and controlling the risk can be done by some technique.
Risks can be classified into three types
1.Operational risk
2.Technical risk
3.Financial risk
Answer:
The journal article in question focuses on the latest implementation of Internet of Things or IoT in the industry of healthcare informatics. The connected set of information is regarded as the Internet of Things, which proves to be essentially helpful when applied to the industry of healthcare. It helps in detecting patterns within the generated data in healthcare industry every day. However, there are issues regarding the technology of IoT as well, given the security issues related to threat models, security structures, and attack taxonomies regarding the healthcare data generated. The paper suggests a collaborative model that is intelligent enough all by itself to minimize the risks in IoT regarding security. The paper also describes how the different innovations in IoT has had also addressed to various issues that healthcare industry had faced in the recent times including big data, wearable data collection technologies and ambient intelligence.
The journal article focuses on the ways by which end to end integration of the IoT system in healthcare industry is possible. This paper suggests a specific platform called Fog Computing which should be used to support the framework. The process collects the health data from the sensors and transfer them to the secured near edge devices. The collected data is then transferred to the clouds for seamless access by the professionals in healthcare industry. The paper suggests that this is a feasible way by which the data collection and storage method can be secured so that the security issues regarding the healthcare data can be mitigated. As per an individual discretion, this certainly is a feasible process but the transfer of the data into cloud may cause problems since cloud storage has issues regarding the mishandling and loss of data.
This journal paper suggests the latest technology of Body Sensor Networks or BSN, which has been used for the purpose of collecting real-time data from a patient’s body itself. This process is performed with the data being collected with the help of lightweight and tiny-powered wireless sensor nodes. This paper is focused more on the process by which data is collected in healthcare industry. However, the journal also points out that without proper security the collected data would be vulnerable and this would be problematic since the data collected in healthcare industry has intricate and confidential information about the patients. Thus, according to individual discretion, it can be said that the paper suggest an advanced technology for the data collection procedures but fails to acknowledge how the technology falls short of handling the data security issues and the vulnerability of data that may form due to the mishandling of data.
This entire journal focuses on the security issues faced by healthcare industry with the latest implementation of Internet of Things or IoT. The Big Data security has been a major challenge in the healthcare industry given the latest scenario of the technological advancements in the 5th generation of IoT and the abundance of data generated every day including the confidential health and personal data of different patients. The paper suggests a new and improved strategic framework and intelligent computational models that support the measurement of the security vulnerabilities in healthcare technology. The article evidently puts the fact forward that it is just not about the implementation of the new technology in the industry, but also security issues that comes along with it creating a ruckus. The framework that the journal provides is thus justified in all terms since it suggests a methodology that would evidently acknowledge the vulnerability levels of the issues identified in the IoT implementation of healthcare data.
This journal article also sheds light on the wearable technology architecture for the IoT data collection method in healthcare technology that can be regarded as big data mixed with structured and unstructured data. In healthcare industry, the data generated are complex in character and humongous in amount as well, thus handling the vulnerability of these data is essentially difficult. Nevertheless, it is necessary that these data be secured and handled in a proper way as healthcare data implies to the intricate information about a patient’s health and their personal information. The journal article proposes two sub-architectures called the Meta Fog-Redirection or MF-R and Grouping and Choosing or GC architecture. Analyzing these sub-architectures, it can be said that the collection and storage of the Big Data generated everyday can be easily handled with the application of these sub-architectures and these are also beneficial in securing integration of data generated and collected.
This paper focuses more on the security issues of IoT in healthcare industry and the reasons behind these data security issues. The paper points out that the immense and accelerated use of IoT-based networks and IoT devices have raised the amount of data generated in the healthcare industry. In addition to that, it is a known fact that the data generated in healthcare industry is humongous in amount since these are generated every day at an exponential level and the data consists of intricate patient data including their personal information, health data and other confidential information. The journal also states that the implementation of IoT works as a boon for the healthcare industry, but it also bring a curse of data being compromised if handled carelessly. However, critically analyzing the journal article, it can be stated that the journal falls short of implying or proposing any mitigating ideas about the security issues in IoT for healthcare industry, although it poses effective amount of information for the reasons behind the vulnerability of the health data.
This journal article focuses on the end to end security provision to the Internet of Things or IoT implementation in healthcare industry generated via mobile devices. It is mentioned in the journal article that the IoT generation in healthcare have enhanced the ways by which data is collected in the healthcare industry. It has been utilizing revolutionary technologies such as the mobile devices and the body mapping methods to collect data and sorting them, but there is still an impending risk of security issues about the health data collected since the number of data generated everyday is immense in number. Thus the authors of the journal article suggests three proposed scheme to mitigate the security issues about the collected health data which are, DTLS handshake, session resumption and interconnected smart gateways for robust mobility. Analyzing the three schemes, it can be said that the utility of the schemes would be effective to eradicate the security issues for healthcare data both in fog and cloud layers including energy-performance evaluator without the need of reconfiguration of the device layer.
This journal article states that the latest implementation of IoT in healthcare industry has spread widely amongst different health organizations equally as it has been found that the introduction of Big Data has only benefitted the ways by which health data of different patients were collected, stored and analyzed before. The paper suggests that the amalgamation of cloud and IoT would offer better prospective of data collection, storing and analysis but it would also bring about several challenges along with it. This would be the security issues regarding the collection of the generated data since the entire healthcare industry produces pile loads of data every day consisting of the health information of innumerable patients. However, it has been found that the otherwise informative paper has been on the side of success for the author, it also fails to put forward any mitigation plans for the identified challenges in the entire journal about the security issues of IoT implementation in healthcare industry.
In this journal report under review, it has been found that the article puts forward the IoT data collection methodologies in healthcare industry along with the latest technologies that have been found to effectively collect the health data for the patients in different healthcare organizations. It states the latest technology of wearable data collecting medical devices that has the ability to generate a huge amount of medical data from the patients suffering physical and mental health obligations. The journal points out several security related issues in the data collection, storing and analysis process of the IoT implementation in healthcare. Thus, it proposes a secured architecture for the IoT to aid with the Industry 4.0 called the Meta Cloud-Redirection (MC-R) architecture that sends alerts to a doctor via wireless network whenever a patient health data seems to exceed the normal level collected by a wearable sensor device. This framework is somewhat effective since every time a patient’s normal health data exceeds the levels it gets notified. Thus, the paper is effective in suggesting an architecture for somewhat mitigating the security issues regarding the security issues in IoT Healthcare.
The journal article under review focuses on the reason due to which IoT was implemented in healthcare industry. It had been pointed out by the journal article that the first implementation of Big Data generating from the IoT technology had been due to the huge cost that had been implied upon the entire industry since it had been generating pile loads of data but there was no technology to sort out the generated data and produce it in a way that would be easy to analyze. Thus, the paper puts forward the fact that the IoT implementation in the healthcare industry would reduce efforts and cost wasted over these data and describes the effective ways by which these issues are solved. However, this paper states that there are challenges in handling the new technology regarding its security issues but contributes very little in proposing an idea to mitigate them.
This journal article is mostly dependable on the perils that IoT in healthcare experience with data collection methods using wearable technology. Thus, the paper suggests an architecture for the data collection process with MetaFog-Redirection (MF-R) and Grouping & Choosing (GC) architecture, which requires scalable algorithms to process the enormous amount of data produced via wearable technology. The article also states that the architecture suggested by the authors would deploy Apache Mahout with Hadoop Distributed File System for the processing of the sensor data generated via wearable technology. Thus, it can be stated that the architecture that the article suggests are feasible and would definitely help in somewhat mitigating the security issues that are seen in the healthcare industry with IoT implementation for data collection methods via wearable technology.
This journal article focuses on the different technologies that strengthen the healthcare services in different ways. The article suggests that amongst all the IT implementations in the healthcare services, the adaptation of the IoT technologies in the data analysis process after the generating of a huge amount of data is the most feasible and cost-effective methodologies in the data analysis process. The article also states that there are indeed security issues regarding the IoT technology in healthcare since the data generated in the process via numerous technologically advanced devices, but analyzing the entire article it has been found that the authors fall short of devising any mitigation methodology or architecture for the issues. Thus, it can be stated that the article provides valuable information regarding the security issues in IoT for healthcare services but could have done better with providing mitigation procedures for the same.
Task 2: Self Reflection on Originality Report
Sample from the Annotation
The journal article in question focuses on the latest implementation of Internet of Things or IoT in the industry of healthcare informatics. The connected set of information is regarded as the Internet of Things, which proves to be essentially helpful when applied to the industry of healthcare. It helps in detecting patterns within the generated data in healthcare industry every day. However, there are issues regarding the technology of IoT as well, given the security issues related to threat models, security structures, and attack taxonomies regarding the healthcare data generated. The paper suggests a collaborative model that is intelligent enough all by itself to minimize the risks in IoT regarding security. The paper also describes how the different innovations in IoT has had also addressed to various issues that healthcare industry had faced in the recent times including big data, wearable data collection technologies and ambient intelligence.
The journal article focuses on the ways by which end to end integration of the IoT system in healthcare industry is possible. This paper suggests a specific platform called Fog Computing which should be used to support the framework. The process collects the health data from the sensors and transfer them to the secured near edge devices. The collected data is then transferred to the clouds for seamless access by the professionals in healthcare industry. The paper suggests that this is a feasible way by which the data collection and storage method can be secured so that the security issues regarding the healthcare data can be mitigated. As per an individual discretion, this certainly is a feasible process but the transfer of the data into cloud may cause problems since cloud storage has issues regarding the mishandling and loss of data.
This journal paper suggests the latest technology of Body Sensor Networks or BSN, which has been used for the purpose of collecting real-time data from a patient’s body itself. This process is performed with the data being collected with the help of lightweight and tiny-powered wireless sensor nodes. This paper is focused more on the process by which data is collected in healthcare industry. However, the journal also points out that without proper security the collected data would be vulnerable and this would be problematic since the data collected in healthcare industry has intricate and confidential information about the patients. Thus, according to individual discretion, it can be said that the paper suggest an advanced technology for the data collection procedures but fails to acknowledge how the technology falls short of handling the data security issues and the vulnerability of data that may form due to the mishandling of data.
This entire journal focuses on the security issues faced by healthcare industry with the latest implementation of Internet of Things or IoT. The Big Data security has been a major challenge in the healthcare industry given the latest scenario of the technological advancements in the 5th generation of IoT and the abundance of data generated every day including the confidential health and personal data of different patients. The paper suggests a new and improved strategic framework and intelligent computational models that support the measurement of the security vulnerabilities in healthcare technology. The article evidently puts the fact forward that it is just not about the implementation of the new technology in the industry, but also security issues that comes along with it creating a ruckus. The framework that the journal provides is thus justified in all terms since it suggests a methodology that would evidently acknowledge the vulnerability levels of the issues identified in the IoT implementation of healthcare data.
This journal article also sheds light on the wearable technology architecture for the IoT data collection method in healthcare technology that can be regarded as big data mixed with structured and unstructured data. In healthcare industry, the data generated are complex in character and humongous in amount as well, thus handling the vulnerability of these data is essentially difficult. Nevertheless, it is necessary that these data be secured and handled in a proper way as healthcare data implies to the intricate information about a patient’s health and their personal information. The journal article proposes two sub-architectures called the Meta Fog-Redirection or MF-R and Grouping and Choosing or GC architecture. Analyzing these sub-architectures, it can be said that the collection and storage of the Big Data generated everyday can be easily handled with the application of these sub-architectures and these are also beneficial in securing integration of data generated and collected.
This paper focuses more on the security issues of IoT in healthcare industry and the reasons behind these data security issues. The paper points out that the immense and accelerated use of IoT-based networks and IoT devices have raised the amount of data generated in the healthcare industry. In addition to that, it is a known fact that the data generated in healthcare industry is humongous in amount since these are generated every day at an exponential level and the data consists of intricate patient data including their personal information, health data and other confidential information. The journal also states that the implementation of IoT works as a boon for the healthcare industry, but it also bring a curse of data being compromised if handled carelessly. However, critically analyzing the journal article, it can be stated that the journal falls short of implying or proposing any mitigating ideas about the security issues in IoT for healthcare industry, although it poses effective amount of information for the reasons behind the vulnerability of the health data.
Originality Report
Figure 1: Originality Report
Critical Evaluation and self-reflection on the originality report
Critically evaluating the originality report of the sample taken from the annotated bibliography, it had been found that out of the 33 sentences evaluated there has been no plagiarism found. Thus, the entire sampled writing is original. Therefore, I have been successfully created an original review that is not influenced by any other writing but my own evaluation of the articles under review. I feel that on the basis of originality, I have been able to effectively put forward my own thoughts into the annotated bibliography, and thus it has been a successful effort from my part. I believe that creating an original review of a journal article is necessary to put forward, otherwise there would be no credibility to the annotated bibliography created.
References
Bhatt, C., Dey, N., & Ashour, A. S. (Eds.). (2017). Internet of things and big data technologies for next generation healthcare.
Darwish, A., Hassanien, A. E., Elhoseny, M., Sangaiah, A. K., & Muhammad, K. (2017). The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: Opportunities, challenges, and open problems. Journal of Ambient Intelligence and Humanized Computing, 1-16.
Gope, P., & Hwang, T. (2016). BSN-Care: A secure IoT-based modern healthcare system using body sensor network. IEEE Sensors Journal, 16(5), 1368-1376.
Islam, S. R., Kwak, D., Kabir, M. H., Hossain, M., & Kwak, K. S. (2015). The internet of things for health care: a comprehensive survey. IEEE Access, 3, 678-708.
Jabbar, S., Ullah, F., Khalid, S., Khan, M., & Han, K. (2017). Semantic interoperability in heterogeneous IoT infrastructure for healthcare. Wireless Communications and Mobile Computing, 2017.
Maksimovi?, M., Vujovi?, V., & Peri?i?, B. (2015, June). A custom Internet of Things healthcare system. In Information Systems and Technologies (CISTI), 2015 10th Iberian Conference on (pp. 1-6). IEEE.
Manogaran, G., Lopez, D., Thota, C., Abbas, K. M., Pyne, S., & Sundarasekar, R. (2017). Big data analytics in healthcare Internet of Things. In Innovative healthcare systems for the 21st century (pp. 263-284). Springer, Cham.
Manogaran, G., Thota, C., Lopez, D., & Sundarasekar, R. (2017). Big data security intelligence for healthcare industry 4.0. In Cybersecurity for Industry 4.0 (pp. 103-126). Springer, Cham.
Manogaran, G., Varatharajan, R., Lopez, D., Kumar, P. M., Sundarasekar, R., & Thota, C. (2018). A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system. Future Generation Computer Systems, 82, 375-387.
Moosavi, S. R., Gia, T. N., Nigussie, E., Rahmani, A. M., Virtanen, S., Tenhunen, H., & Isoaho, J. (2016). End-to-end security scheme for mobility enabled healthcare Internet of Things. Future Generation Computer Systems, 64, 108-124.
Natarajan, K., Prasath, B., & Kokila, P. (2016). Smart health care system using internet of things. Journal of Network Communications and Emerging Technologies (JNCET), 6(3).
Patil, H. K., & Seshadri, R. (2014, June). Big data security and privacy issues in healthcare. In Big Data (BigData Congress), 2014 IEEE International Congress on (pp. 762-765). IEEE.
Saha, G. K., & Kumar, S. (2017). Security Issues in IoT-Based Healthcare. International Journal of Applied Research on Information Technology and Computing, 8(3), 385-389.
Thota, C., Sundarasekar, R., Manogaran, G., Varatharajan, R., & Priyan, M. K. (2018). Centralized fog computing security platform for IoT and cloud in healthcare system. In Exploring the convergence of big data and the internet of things (pp. 141-154). IGI Global.
Buy ITC571 Emerging Technologies and Innovation Answers Online
Talk to our expert to get the help with ITC571 Emerging Technologies and Innovation Answers to complete your assessment on time and boost your grades now
The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.