10 1108 - PRR 08 2019 0027
10 1108 - PRR 08 2019 0027
https://www.emerald.com/insight/2399-1747.htm
Potential
Smart healthcare solutions using
Challenges and potential solutions using internet of
things
internet of things (IoT) and big data analytics
Sherali Zeadally 93
College of Communication and Information, University of Kentucky,
Lexington, Kentucky, USA Received 11 August 2019
Revised 20 August 2019
Farhan Siddiqui Accepted 21 August 2019
Department of Mathematics and Computer Science, Dickinson College,
Carlisle, Pennsylvania, USA
Zubair Baig
School of Information Technology, Deakin University, Melbourne, Australia, and
Ahmed Ibrahim
Department of Computer Science, University of Virginia, Charlottesville, Virginia, USA
Abstract
Purpose – The aim of this paper is to identify some of the challenges that need to be addressed to accelerate
the deployment and adoption of smart health technologies for ubiquitous healthcare access. The paper also
explores how internet of things (IoT) and big data technologies can be combined with smart health to provide
better healthcare solutions.
Design/methodology/approach – The authors reviewed the literature to identify the challenges which
have slowed down the deployment and adoption of smart health.
Findings – The authors discussed how IoT and big data technologies can be integrated with smart health to
address some of the challenges to improve health-care availability, access and costs.
Originality/value – The results of this paper will help health-care designers, professionals and researchers
design better health-care information systems.
Keywords Healthcare, Internet of things, Connected health, Smart health, Big data, Digital health, IoT
Paper type Research paper
1. Introduction
Enhancing the quality of health care and improving ease of access to health records while
maintaining reasonable costs is challenging for health-care organizations globally (iScoop,
2018). The problem is further exacerbated by the rapidly increasing world population,
© Sherali Zeadally, Farhan Siddiqui, Zubair Baig and Ahmed Ibrahim. Published in PSU Research
Review. Published by Emerald Publishing Limited. This article is published under the Creative
Commons Attribution (CC BY 4.0) licence. Anyone may reproduce, distribute, translate and create
derivative works of this article (for both commercial and non-commercial purposes), subject to full
attribution to the original publication and authors. The full terms of this licence may be seen at http:// PSU Research Review
Vol. 4 No. 2, 2020
creativecommons.org/licences/by/4.0/legalcode pp. 93-109
The authors thank the anonymous reviewers for their valuable comments which helped improve Emerald Publishing Limited
2399-1747
the content and presentation of this paper. DOI 10.1108/PRR-08-2019-0027
PRR especially the rate of increase of senior people (65 years old and higher). According to the
4,2 World Health Organization (WHO, 2018), the number of senior people will increase to about
1.5 billion by 2050. An aging population implies increase in chronic diseases that require
frequent visits to health-care providers, as well as increased hospitalization needs. The rise
in the number of patients requiring constant care significantly increases medical treatment
costs. For example, in the USA, the cost of health care was about 17.9 per cent of the gross
94 domestic product in 2017 (CMS, 2019) and is expected to hit 19.4 per cent in 2027
(HealthAffairs, 2019). Figure 1 shows the national health-care costs in the USA over a period
of about 45 years.
Over the past few decades, Information and Communication Technologies (ICT) have
been widely adopted in the health-care environment to make health-care access and delivery
easier and most cost-effective. The use of ICT has led to the development of electronic health
record (EHR) systems. EHRs contain complete patient health history (current medications,
immunizations, laboratory results, current diagnosis, and so on) and can be easily shared
among various providers. They have shown to enhance patient-provider interaction (Haluza
and Jungwirth, 2014). The adoption of ICT in the health sector is generally referred to as
digital health care (BroadbandCommission, 2017).
Over the years, digital health care has extended from primarily maintaining electronic
patient data and providing patient Web portals, to allowing further flexibility and
convenience in health-care management, and is commonly referred to as connected health
(Loiselle and Ahmed, 2017; IHS, 2015; Cisco, 2019). Connected health uses smart phones and
mobile applications, together with wireless technologies (such as Bluetooth, Wi-Fi and long-
term evolution) to allow patients to connect readily with their providers without visiting
them frequently. For example, a typical hypertensive patient would see his/her doctor once
in six months to report daily blood pressure readings. With a monitoring application, the
patient can transmit daily or weekly blood pressure readings thereby enabling his/her
doctor to detect a problem and intervene earlier.
Connected health has evolved into smart health wherein conventional mobile devices
(such as smart phones) are used together with wearable medical devices (such as blood
pressure monitors, glucometers, smart watches, smart contact lenses, and others) and
internet of things (IoT) gadgets (such as implantable or ingestible sensors) to enable
continuous patient monitoring and treatment even when patients are at their homes (Uddin
et al., 2017; Zilani et al., 2018). Smart health is expected to keep hospitalization expenses low
and provide timely treatment for various medical conditions (Sharma et al., 2017) by placing
Figure 1.
National Health
Expenditure
(percentage of GDP)
IoT sensors on health monitoring equipment. The information collected by these microchips Potential
can then be sent to any remote destination (Chaudhury et al., 2017). For example, wearable solutions using
sensors (such as a temperature sensor and the heartbeat sensor) can act as data collecting
units, collecting the physiological signals from the patient’s body. The collected data are
internet of
then forwarded to a local gateway server via a Wi-Fi network such that end-systems (such things
as a physician’s laptop) can retrieve the collected data from the gateway server. Regular
server updates allow physicians access to real-time patient data. These devices work
together to create a unified medical report that can be accessed by various providers. This 95
data is not only useful for the patient, but can be pooled together to study and predict health-
care trends across cultures and countries. Figure 2 illustrates an example of a smart health-
care system.
The amount of data that may be generated as a result of combining smart health devices
with IoT sensors is massive. Such data are often referred to as “big data.” Application of
effective analytic technologies to Big Data can help provide meaningful information to
physicians which would help them make more timely, informed decisions as well as take
proactive measures for better health management (Johri et al., 2017).
96
Figure 2.
A smart health-care
system
Denial of service (DoS) attacks can affect health-care systems and affect patient safety. Potential
While a common defense to DoS is redundancy (the use of multiple devices on the network), solutions using
in a health-care environment the duplication of resources may not always be possible
because some of the gadgets are implanted life-critical systems. The fast detection of
internet of
potential security threats remains a challenge because of the number and complexity of things
emerging software and hardware vulnerabilities. This issue is getting worse as increasing
number of devices are being connected to the Internet. Today, default authentication
remains prevalent, and insecure Web-based interface access further increases the attack
97
surface. Additionally, we have also seen a surge in the proliferation of wearable devices
(including different types of embedded sensors and implanted medical devices) in recent
years. The lack of security standards of these devices along with the availability of powerful
search engines such as Shodan (2019) which enables locating Internet-connected devices
(Williams and McCauley, 2016), make these wearable devices vulnerable to all kinds of
attacks (Das et al., 2018).
Recently, many wireless networking technologies have also been deployed in the health-
care environment and these include Wi-Fi, BLE and ZigBee that are being used to provide
connectivity to different types of medical devices and sensors (Zeadally and Bello, 2019).
Security protection of these wireless and sensor technologies against eavesdropping, Sybil
attacks, sinkhole attacks, and sleep deprivation attacks must be enforced. Centralized data
sets of personal information, family history, electronic medical records and genomic data,
should also be protected from hackers and malicious software to enforce security and
privacy (Nambiar et al., 2017).
Confidentiality and privacy are important concerns for physicians as well. Patients may
not want to share their medical records because of the sensitive nature of the health data (for
example, cancer or HIV test results). Concerns exist that the integration of connected
technology into current medical information systems may compromise the confidentiality of
health data (Sonune et al., 2017). These privacy concerns stem from the fear that digital and
connected technology may attract hackers. Furthermore, researchers sometimes argue that
connected health technology would be implemented imperfectly, allowing for security
vulnerabilities to be exploited (Poyner and Sherratt, 2018). Privacy concerns increase when
the patient’s information is shared among several applications. Low security and
misconfigured device and network settings could affect the privacy of patients and their
Figure 3.
US adult wearable
users and market
penetration, 2016-
2021 (millions and
percentage of
population)
PRR data. Additional risks arise because of linking geographical location with purchases from
4,2 pharmacies which may provide a profile of an individual’s health status. Another concern is
the use of various providers which are mandated to submit confidential data to law
enforcement agencies. This can affect the adoption and use of the technology where patients
are concerned about privacy. The networks which transmit data are often highly
heterogeneous and are frequently managed by third parties which makes the protection of
98 security and privacy as well as governance of this data even more challenging (Williams
and McCauley, 2016).
The presence of a centralized Certification Authority (CA) for the issuance of X.509 digital
certificates enables both encryption as well as digital signing of patient prescriptions. In
addition, the presence of a SAML backend system facilitates the sharing of authentication
data between federated digital health systems. The SAML architecture (Oasis, 2005) allows
making statements on user attributes and authorizations for authenticated entities.
Examples of such attributes include medical or financial data. It provides context to the
operation being carried out, details on how an authentication transaction is conducted, the
type of transaction being carried out and details on the user, including mechanisms used for
his or her authentication. However, some of the shortcomings of SAML are:
The level of confidentiality of digital health attribute assertions is entirely
dependent on the strength of the cipher being used.
Targeted confidential messages cannot be crafted unless a holistic certification
mechanism is in place to issue and maintain public-private key pairs to facilitate
data encryption and decryption.
Anonymity of subjects is not the same as pseudonymity. Consequently, the ability
of the SAML-based digital health authentication system to ensure that users remain
anonymous, is restricted, because of the limitation of the SAML standard.
The original SAML specification is vulnerable to collusion-based attacks, wherein
two or more malicious system entities cooperate to share information exchanged
from previous transactions, and consequently compromise the confidentiality of
messages exchanged.
Figure 4.
Number of breaches
between 2010 and
2015 according to the
DHHS
by cyberattacks, which amounted to 45 per cent of the American population (iSheriff, 2015) Potential
as shown in Figure 5. solutions using
A cyber security assessment by the Healthcare Information and Management Systems
Society in 2015 showed that in the previous 12 months, 64 per cent of health-care
internet of
organizations had been exposed to external cyberattacks (Mohammed et al., 2015). Bloomer things
News claimed that in the previous 2 years, of all health-care organizations, 90 per cent have
been attacked (Pettypiece, 2015). Furthermore, most data breaches occur in health-care and
medical industries as compared to financial, governmental, or educational sectors (Gleeson 101
and Friel, 2013).
Figure 5.
Total number of
patient records
breached between
2009 and 2015 by
cyberattacks
according to DHHS
PRR environments, it is important for devices to be compatible with many transmission formats
4,2 and protocols for authentication and encryption. Device management will require directories
of devices’ functionality, protocols, terminologies and standards compliance. The level of
“plug and play” interoperability now commonplace in non-health areas remains a challenge
for medical devices (Williams and McCauley, 2016).
3.3 Standardization
Various organizations (such as IEEE, IETF, ITU-T) have contributed to the deployment and
104 standardization of IoT technologies. The standardization of IoT (Stuurman and Kamara,
2016) (Singh et al., 2017) was mostly influenced by the recommendations provided by the
Machine-to-Machine European Telecommunications Standards Institute (ETSI) and Internet
Engineering Task Force (IETF) Working Groups. All new and emerging ideas should be
integrated to form a global solution that helps build standardizations for the future Internet.
Based on the results provided by the CERP-IoT project (IERC, 2016), future Internet is an
extension of the existing one by integrating general things into wider networks. The
standardization will enable the development of IoT-based health-care systems. Table I lists
various standardization bodies and some of their recent IoT standards related work.
need to derive valuable insights from a bulk of data and only mention specific highlights
(intelliPaat, 2019). It is also necessary to train algorithms to generate precise insights based
on available data without which the credibility of the report comes into question. Reports
can be made appealing and useful by including graphs and statistical information.
Applications should also focus on developing visualizations that would make it easy to
derive insights from a report and allow easy identification of trends and challenges in a
health-care segment.
As discussed above, there are several challenges that still need to be addressed before
digital health care can be widely adopted. Table II summarizes some of these challenges
together with possible solutions.
4. Conclusion
We are currently witnessing rapid advances in information communication technologies. It
is a well-known fact that the implementation and deployment of these technologies in the
health-care sector bring about significant benefits (affordable health care, cost-efficient
health services, and many others) to all health-care stakeholders. In this work, we discussed
some of the major impediments that are slowing down digital health-care adoption
nationally and internationally along with some possible solutions to enable faster digital
health-care deployment. While the health-care sector is increasingly interested in leveraging
IoT and big data technologies to become more efficient, there are several challenges that
need to be addressed before digital health care can become a widespread reality.
Note
1. *In this paper we will use the terms digital health, connected health and smart health
interchangeably.
References
Agha, L. (2015), “The effects of health information technology on the costs and quality of medical care”,
Journal of Health Economics, Vol. 34, pp. 19-30, available at: www.sciencedirect.com/science/
article/pii/S0167629613001720
PRR Anagnostopoulos, I., Zeadally, S. and Exposito, E. (2016), “Handling big data: research challenges and
future directions”, Journal of Supercomputing, Vol. 72 No. 4, pp. 1494-1516.
4,2
BroadbandCommission (2017), “Digital health: a call for government leadership and cooperation
between ICT and health”, available at: www.broadbandcommission.org/Documents/
publications/WorkingGroupHealthReport-2017.pdf (accessed August 2019).
Broda (2007), Managing Trust in e-Health with Federated Identity Management, eHealth Workshop,
Konolfingen.
106
Burke, J. (2015), “Is that data valid? Getting accurate financial data in healthcare”, Health Catalyst,
available at: www.healthcatalyst.com/financial-data-in-healthcare-edw (accessed August 2019).
catCert (2017), “Identity and capability management in eHealth: the CATCert approach”, available at:
www.projectliberty.org/liberty/content/download/3691/24338/file/071011%20I%20Alamillo%
20CATCert%20v1r0%20case%20study.pdf (accessed August 2019).
Chaudhury, S., Paul, D., Mukherjee, R. and Haldar, S. (2017), “Internet of thing based HealthCare
monitoring system”, The 8th IEEE Annual Conference on Industrial Automation and
Electromechanical Engineering, Bangkok.
Cisco (2019), “Making connected health a reality”, Cisco Systems, available at: www.cisco.com/c/dam/en_us/
solutions/industries/docs/healthcare/connected_health_brochure.pdf (accessed August 2019).
Claunch, D. and McMillan, M. (2013), “Determining the right level for your IT security investment”,
Healthcare Financial Management, Vol. 67 No. 5, pp. 100-104.
CMS (2019), “National health expenditure data”, Centers for Medicare and Medicaid Services, available
at: www.cms.gov/ (accessed August 2019).
Das, A.K., Zeadally, S. and He, D. (2018), “Taxonomy and analysis of security protocols for internet of
things”, Future Generation Computer Systems, Vol. 89, pp. 110-125.
Dimitrov, D.V. (2016), “Medical internet of things and big data in healthcare”, Healthcare Informatics
Research, Vol. 22 No. 3, pp. 156-163, available at: www. ncbi.nlm.nih.gov/pmc/articles/PMC4981575/
Dwivedi, S., Kasliwal, P. and Soni, S. (2016), “Comprehensive study of data analytics tools (RapidMiner,
Weka, R tool, Knime)”, IEEE Symposium on Colossal Data Analysis and Networking (CDAN), Indore.
eHealth (2019), “Cookbook identity and authorization management”, available at: www.ehealth.fgov.be/
ehealthplatform/nl/search?q=i.am%20overview&filter=&doctype%5BCookbook%5D=on&
page=1&filter%5Bbase_services%5D=on
eMarketer (2017), “Wearables still far from mass adoption”, available at: www.emarketer.com/content/
wearables-still-far-from-mass-adoption (accessed August 2019).
ETSI TR 103 394 (2018), “Smart body area networks (SmartBAN); system description”, available at:
www.etsi.org/committee/1413-smartban (accessed August 2019).
ETSI (2019), “European telecommunications standards institute”, available at: www.etsi.org/ (accessed
August 2019).
Firouzi, F., Farahani, B., Ibrahim, M. and Chakrabarty, K. (2018), “From EDA to IoT eHealth: promise,
challenges, and solutions”, IEEE Transactions on Computer-Aided Design of Integrated Circuits
and Systems, Vol. 37 No. 12, pp. 2965-2978.
Garg, V. (2015), “Optimization of multiple queries for big data with Apache Hadoop/Hive”, IEEE
International Conference on Computational Intelligence and Communication Networks, Jabalpur.
Gawanmeh, A. (2016), “Open issues in reliability, safety, and efficiency of connected health”, First IEEE
Conference on Connected Health: Applications, Systems and Engineering Technologies, Washington, DC.
Gleeson, D. and Friel, S. (2013), “Emerging threats to public health from regional trade agreements”,
The Lancet, Vol. 381 No. 9876, pp. 1507-1509.
Gomez, C., Tian, H., Cao, Z. and Kovatsch, M. (2018), “Energy-efficient features of internet of things
protocols”, IETF draft, available at: https://tools.ietf.org/id/draft-ietf-lwig-energy-efficient-08.
html (accessed August 2019).
Gopi, P. and Hwang, T. (2016), “BSN-care: a secure IoT-based modern healthcare system using body Potential
sensor network”, IEEE Sensors Journal, Vol. 16 No. 5, pp. 1368-1376.
solutions using
Grood, C., Raissi, A., Kwon, Y. and Santana, M.J. (2016), “Adoption of e-health technology by
physicians: a scoping review”, Journal of Multi-Disciplinary Health, Vol. 9, p. 335, available at:
internet of
www.ncbi.nlm.nih.gov/pmc/articles/PMC4975159/ things
Haluza, D. and Jungwirth, D. (2014), “ICT and the future of healthcare: aspects of doctor-patient
communication”, International Journal of Technology Assessment in Health Care, Vol. 30 No. 3.
107
HealthAffairs (2019), “National health expenditure projections, 2018–27: economic and demographic
trends drive spending and enrollment growth”, available at: www.healthaffairs.org/doi/full/
10.1377/hlthaff.2018.05499 (accessed August 2019).
Hipaa (2019), “Health information privacy”, available at: www.hhs.gov/hipaa/index.html (accessed
August 2019).
IEEE 2030.5 (2013), “Adoption of smart energy profile 2.0 application protocol standard”, available at:
https://standards.ieee.org/standard/2030_5-2013.html (accessed August 2019).
IEEE (2019), “The world’s largest technical professional organization for the advancement of
technology”, available at: www.ieee.org/ (accessed August 2019).
IEEE-1073-10103 (2012), “Health informatics–point-of-care medical device communication”, available
at: https://standards.ieee.org/standard/11073-10103-2012.html (accessed August 2019).
IEEE-802.15.4 (2013), “IEEE standard for local and metropolitan area networks – part 15.4: Low-Rate
wireless personal area networks (LR-WPANs)”, https://standards.ieee.org/standard/802_15_4j-
2013.html (accessed August 2019).
IERC (2016), “IoT European Research Center”, available at: www.internet-of-things-research.eu/
(accessed August 2019).
IETF (2019), “Internet engineering task force”, available at: www.ietf.org/ (accessed August 2019).
IHS (2015), “The connected patient”, available at: https://cdn.ihs.com/www/pdf/Technology-White-
Paper-The-Connected-Patient.pdf (accessed August 2019).
intelliPaat (2019), “What is data analytics”, available at: https://intellipaat.com/blog/what-is-data-
analytics/ (accessed August 2019).
iScoop (2018), “Healthcare in digital transformation: digital and connected healthcare”, available at:
www.i-scoop.eu/digital-transformation/healthcare-industry/ (accessed August 2019).
iSheriff (2015), “The new heathcare crisis: cybercrime, patient records and information security”, White Paper.
ITU (2019), “ITU telecommunication standardization sector”, available at: www.itu.int/en/ITU-T/
Pages/default.aspx (accessed August 2019).
ITU-T (2018), “Series Y: global information infrastructure, internet protocol, aspects, next-generation
networks, internet of things and smart cities”, available at: www.itu.int (accessed August 2019).
Jain, P. and Mayrya, J.P. (2017), “Comparative analysis using hive and pig on consumers data”,
International Journal of Computer Science and Information Technologies, Vol. 8, No. 2, pp. 285-291.
Johri, P., Singh, T., Das, S. and Anand, S. (2017), “Vitality of big data analytics in healthcare
department”, IEEE International Conference on Infocom Technologies and Unmanned Systems
(Trends and Future Directions), Dubai.
Khan, M. and Iqbal, N. (2017), “Computational performance analysis of cluster-based technologies for
big data analytics”, The IEEE International Conference on Internet of Things (iThings), IEEE,
Exeter, pp. 280-286.
Loiselle, C.G. and Ahmed, S. (2017), “Is connected health contributing to a healthier population?”,
Journal of Medical Internet Research, Vol. 19 No. 11, p. e386.
Merla, P. and Liang, Y. (2017), “Data analysis using Hadoop MapReduce environment”, IEEE
International Conference on Big Data, Boston, MA.
PRR Mohammed, D., Mriani, R. and Mohammed, S. (2015), “Cybersecurity challenges and compliance issues within
the US healthcare sector”, International Journal of Business and Social Research, Vol. 5 No. 2, pp. 55-66.
4,2
Moorthy, M., Baby, R. and Senthamaraiselvi, S. (2014), “An analysis for big data and its technologies”,
International Journal of Computer Science Engineering and Technology, Vol. 4 No. 12.
Nambiar, A.R., Reddy, N. and Dutta, D. (2017), “Connected health: opportunities and challenges”, IEEE
International Conference on Big Data, IEEE, Boston, MA, pp. 1658-1662.
108 Oasis (2005), “Security and privacy considerations for the OASIS security assertion markup language
(SAML) V2.0”, OASIS Standard.
OCF (2019), “Open connectivity foundation”, available at: https://openconnectivity.org/ (accessed
August 2019).
OCF-Security (2019), “Cloud security specification”, available at: https://openconnectivity.org/draftspecs/
Essen/CR%202871%20-%20OCF_Cloud_Security_Specification.pdf (accessed August 2019).
Olaronke, I. and Oluwaseun, O. (2016), “Big data in healthcare: prospects, challenges and resolutions”,
Future Technologies Conference, IEEE, San Francisco, CA, pp. 1152-1157.
Peterson, P.G. (2019), “Growing healthcare costs in the US”, Peter G. Peterson Foundation, available at:
www.pgpf.org/chart-archive/0056_health-care-costs-proj (accessed August 2019).
Pettypiece, S. (2015), “Rising cyber attacks costing health system $6 billion annually”, available at:
www.bloomberg.com/news/articles/2015-05-07/rising-cyberattacks-costing-health-system-6-
billion-annually (accessed August 2019).
Poyner, I.K. and Sherratt, R.S. (2018), “Privacy and security of consumer IoT devices for the pervasive
monitoring of vulnerable people”, IET Living in the Internet of Things: Cybersecurity of the IoT, London.
Praveena, M.A. and Bharathi, B. (2017), “A survey paper on big data analytics”, IEEE International
Conference on Information, Communication, and Embedded Systems, Chennai.
Saiz, C.P., Markina, I.C., Yarza, A.A., Lopez, M.R. and Eizaguirre, L.E. (2014), “Disclosure of health
information: a challenge of trust between the various sectors involved”, Revista Latina de
Comunicacíon Social, Vol. 69, p. 125.
SAML (2019), “SAML”, available at: http://saml.xml.org (accessed August 2019).
Sethi, M., Arkko, J. and Back, H.M. (2018), “Practical considerations and implementation experiences in
securing smart object networks”, IETF RFC, available at: https://tools.ietf.org/html/rfc8387
(accessed August 2019).
Sharma, S., Tripathi, M.M. and Mishra, V.M. (2017), “Survey paper on sensors for body area network in
health care”, The IEEE International Conference in Emerging Trends in Computing and
Communication Technologies (ICETCCT).
Shibboleth (2019), available at. www.internet2.edu/products-services/trust-identity/shibboleth/
Accessed: August 2019.
Shodan (2019), available at: www.shodan.io/ (accessed August 2019).
Singh, V.P., Dwarakanath, V.T., Haribabu, P. and Babu, N.S.C. (2017), “IoT standardization efforts —
an analysis”, IEEE International Conference On Smart Technologies For Smart Nation
(SmartTechCon), Bangalore.
Sonune, S., Kalbande, D., Yeole, A. and Oak, S. (2017), “Issues in IoT healthcare platforms: a critical study and
review”, IEEE International Conference on Intelligent Computing and Control (I2C2), Coimbatore.
Strauss, A.T., Martinez, D.A., Garcia-Arce, A., Taylor, S., Mateja, C., Fabri, P.J. and Zayas-Castro, J.L.
(2015), “A user needs assessment to inform health information exchange design and
implementation”, BMC Medical Informatics and Decision Making, Vol. 15 No. 1, pp. 1-11,
available at: http://dx.doi.org/10.1186/s12911-015-0207-x
Stuurman, K. and Kamara, I. (2016), “IoT standardization – the approach in the field of data protection
as a model for ensuring compliance of IoT applications?”, 4th IEEE International Conference on
Future Internet of Things and Cloud Workshops, Vienna.
Suyts, V.P., Shadrin, A.S. and Leonov, P.Y. (2017), “The analysis of big data and the accuracy of Potential
financial reports”, 5th International Conference on Future Internet of Things and Cloud
Workshops, Prague. solutions using
Szerejko, J.D. (2015), “Reading between the lines of electronic health records: the health information internet of
technology for economic and clinical health act and its implications for health care fraud and things
information security”, Connecticut Law Review, Vol. 47 No. 4.
Tse, D., Chow, C.K., Ly, T.P., Tong, C.Y. and Tam, K.W. (2018), “The challenges of big data governance
in healthcare”, 17th IEEE International Conference on Trust, Security and Privacy in Computing 109
and Communications, New York, NY.
Uddin, M.S., Alam, J.B. and Banu, S. (2017), “Real time patient monitoring system based on internet of
things”, 4th IEEE International Conference on Advances in Electrical Engineering, Dhaka.
US DHHS (2019), “US department of health and human services, breach portal: notice to the secretary of
HHS breach of unsecured protected health information”, available at: https://ocrportal.hhs.gov/
ocr/breach/breach_report.jsf (accessed August 2019).
WHO (2018), “Global health and aging”, World Health Organization, 2011, available at: www.who.int/
(accessed August 2018).
Williams, C., Mostashari, F., Mertz, K., Hogin, E. and Atwal, P. (2012), “From the office of the national
coordinator: the strategy for advancing the exchange of health information”, Health Affairs,
Vol. 31 No. 3, pp. 527-536, available at: http://content.healthaffairs.org/content/31/3/527.abstract
Williams, P.A. and McCauley, V. (2016), “Always connected: the security challenges of the healthcare
internet of things”, 3rd IEEE World Forum on the Internet of Things, Reston, VA.
Yang, Z., Zhou, Q., Lei, L., Zheng, K. and Xiang, W. (2016), “An IoT-cloud based wearable ECG
monitoring system for smart healthcare”, Journal of Medical Systems, Vol. 40 No. 12, p. 286.
Yuehong, Y.I.N., Zeng, Y., Chen, X. and Fan, Y. (2016), “The internet of things in healthcare: an
overview”, Journal of Industrial Information Integration, Vol. 1, pp. 3-13.
Zagan, I., Gaitan, V.G., Petrariu, A.I. and Brezulianu, A. (2017), “Healthcare IoT m-green CARDIO
remote cardiac monitoring system – concept, theory of operation and implementation”,
Advances in Electrical and Computer Engineering Journal, Vol. 17 No. 2, pp. 23-31.
Zeadally, S. and Bello, O. (2019), “Harnessing the power of internet of things based connectivity to improve
healthcare”, Internet of Things, p. 100074, available at: https://doi.org/10.1016/j.iot.2019.100074
Zeadally, S., Isaac, J.T. and Baig, Z. (2016), “Security attacks and solutions in electronic health (E-health)
systems”, Journal of Medical Systems, Vol. 40 No. 12, p. 263.
Zilani, K.A., Yeasmin, R., Zubair, K.A., Sammir, M.R. and Sabrin, S. (2018), “R3HMS, an IoT based
approach for patient health monitoring”, IEEE International Conference on Computer,
Communication, Chemical, Material and Electronic Engineering, Rajshahi.
Further reading
Cloudera (2019), “Platfora”, available at: www.cloudera.com/partners/solutions/platfora.html (accessed
August 2019).
Corresponding author
Sherali Zeadally can be contacted at: szeadally@uky.edu
For instructions on how to order reprints of this article, please visit our website:
www.emeraldgrouppublishing.com/licensing/reprints.htm
Or contact us for further details: permissions@emeraldinsight.com