Advertisement

Secure Visualization When Using Mobile Applications for Dementia Scenarios

  • Joana MuchagataEmail author
  • Pedro Vieira-Marques
  • Soraia Teles
  • Diogo Abrantes
  • Ana Ferreira
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1026)

Abstract

Wandering is a common behavior during all stages of Alzheimer’s Disease (AD), but it can be distressing to both people with dementia and their caregivers. Ambient Assisted Living (AAL) solutions have been increasingly relevant to promote ageing in place, targeting both autonomous and dependent older adults. Despite the potentials of AAL solutions, their pervasiveness can raise several security and privacy challenges. With mobile mockups, this work presents a use-case with SoTRAACE - Socio-Technical Risk-Adaptable Access Control model, applied to the prevention of getting lost in AD. SoTRAACE functionalities are illustrated as embedded in an alarm navigation system aimed at monitoring the person’s geolocation and alerting when a predefined safety perimeter is crossed. The model, applied to a healthcare scenario, assesses security and privacy risks at each moment of interaction and provides an innovative way for improved adaptable security visualization in AAL environments.

Keywords

Ambient Assisted Living Alzheimer’s Disease Privacy Security and visualization Access Control SoTRAACE Adaptable risk assessment 

Notes

Acknowledgments

This article was supported by FCT through the Project TagUBig - Taming Your Big Data (IF/00693/2015) from Researcher FCT Program funded by National Funds through FCT - Fundação para a Ciência e a Tecnologia. The author Soraia Teles holds a grant from the Portuguese Foundation for Science and Technology (FCT) (D/BD/135496/2018; PhD Program in Clinical and Health Services Research).

References

  1. 1.
    Alzheimer’s Disease International: The Global Impact of Dementia: An analysis of prevalence, incidence, cost and trends. World Alzheimer Report 2015 (2015)Google Scholar
  2. 2.
    Alzheimer’s Association: Alzheimer’s & Dementia - What Is Dementia? (2018)Google Scholar
  3. 3.
    Alzheimer’s Disease Education and Referral Center: Alzheimer’s Disease Fact Sheet. NIH Publication (2016)Google Scholar
  4. 4.
    Oderud, T., Landmark, B., Eriksen, S., Fossberg, A.B., Aketun, S., Omland, M., Hem, K.G., Ostensen, E., Ausen, D.: Persons with dementia and their caregivers using GPS. Stud. Health Technol. Inform. 217, 212–221 (2015)Google Scholar
  5. 5.
    Robinson, L., Hutchings, D., Dickinson, H., Corner, L., Beyer, F., Finch, T., Hughes, J., Vanoli, A., Ballard, C., Bond, J.: Effectiveness and acceptability of non-pharmacological interventions to reduce wandering in dementia: a systematic review. Int. J. Geriatr. Psychiatry: J. Psychiatry Late Life Allied Sci. 22(1), 9–22 (2007)CrossRefGoogle Scholar
  6. 6.
    Oderud, T., Landmark, B., Eriksen, S., Fossberg, A.B., Fossland Brørs, K., Mandal, T.B., Ausen, D.: Exploring the use of GPS for locating persons with dementia. Assistive Technol. Res. Ser. 33, 776–783 (2013)Google Scholar
  7. 7.
    Moura, P., Fazendeiro, P., Vieira-Marques, P., Ferreira, A.: SoTRAACE - socio-technical risk-adaptable access control model. In: 2017 International Carnahan Conference on Security Technology (ICCST), Madrid (2017)Google Scholar
  8. 8.
    What Is GPS SmartSole? A GPS Tracker, Hidden In An Insole, Tracked. http://gpssmartsole.com/gpssmartsole
  9. 9.
    What Are the Top 10 Products to Best Track My Elderly Loved One’s Location? https://www.caringvillage.com/product-review/top-10-products-track-elderly-location
  10. 10.
    Sposaro, F., Danielson, J., Tyson, G.: iWander: an Android application for dementia patients. In: 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology, pp. 3875–3878 (2010)Google Scholar
  11. 11.
    Sandhu, R., Ferraiolo, D., Kuhn, D.: NIST model for role-based access control: towards a unified standard (2000)Google Scholar
  12. 12.
    Muchagata, J., Ferreira, A.: How can visualization affect security? In: ICEIS 2018 - 20th International Conference on Enterprise Information Systems. SCITEPRESS Digital Library, Poster Presentation in Funchal, Madeira - Portugal (2018)Google Scholar
  13. 13.
    Ferreira, A., Chadwick, D., Farinha, P., Correia, R., Zao, G., Chilro, R., Antunes, L.: How to securely break into RBAC: the BTG-RBAC model. In: 2009 Annual Computer Security Applications Conference, pp. 23–31 (2009)Google Scholar
  14. 14.
    Ferreira, A., Teles, S., Vieira-Marques, P.: SoTRAAce for smart security in ambient assisted living. J. Ambient Intell. Smart Environ. (2019)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Joana Muchagata
    • 1
    Email author
  • Pedro Vieira-Marques
    • 1
  • Soraia Teles
    • 2
  • Diogo Abrantes
    • 1
  • Ana Ferreira
    • 1
  1. 1.CINTESIS - Center for Health Technology and Services Research, Faculty of MedicineUniversity of PortoPortoPortugal
  2. 2.CINTESIS - Center for Health Technologies and Services Research, ICBASUniversity of PortoPortoPortugal

Personalised recommendations