Secure Patient Monitoring and Self-management Using Brain Expression Interpreter

  • Suleyman Kondakci
  • Dilek Doruk
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 131)


This article presents a brief description of an experimental system designed for self-managing and monitoring of patients having difficulties in verbal communication. A vital role of the proposed system is to engage individuals to be effective self-managers of their own health. Technology-based interventions to support self-management across the spectrum of chronic diseases have the potential to reach a broader population of patients. We believe that studies featuring extensive research of self-management of patients with different chronic conditions are needed to explore the interaction of technology-based interventions.


  1. 1.
    Korhonen I, Parkka J, Van Gils M (2003) Health monitoring in the home of the future. IEEE Eng Med Biol Mag 22(3):66–73CrossRefGoogle Scholar
  2. 2.
    Komnakos D, Vouyioukas D, Maglogiannis I, Skianis C (2011) Cooperative mobile high-speed and personal area networks for the provision of pervasive e-health services. In: IEEE international conference on communications (ICC), pp 1–5Google Scholar
  3. 3.
    Lee R-G, Chen K-C, Hsiao C-C, Tseng C-L (2007) A mobile care system with alert mechanism. IEEE Tran Inf Technol Biomed 11(5):507–517CrossRefGoogle Scholar
  4. 4.
    Hong Y, Patrick T, Gillis R (2008) Protection of patient’s privacy and data security in e-health services. In: International conference on biomedical engineering and informatics BMEI 2008, vol 1, pp 643–647Google Scholar
  5. 5.
    Sulaiman R, Sharma D (2011) Enhancing security in e-health services using agent. In: International conference on electrical engineering and informatics (ICEEI), pp 1–6Google Scholar
  6. 6.
    Elkhodr M, Shahrestani S, Cheung H (2011) Enhancing the security of mobile health monitoring systems through trust negotiations. In: IEEE 36th conference on local computer networks (LCN), pp 754–757Google Scholar
  7. 7.
    International Organization for Standardization (2009) ISO/TS 25237:2008: Health informatics: pseudonymization. International Organization for Standardization, GenevaGoogle Scholar
  8. 8.
    El Emam K, Jonker E, Arbuckle L, Malin B (2011) A systematic review of re-identification attacks on health data. PLoS One 6(12):e28071Google Scholar
  9. 9.
    El Emam K, Dankar FK, Issa R, Jonker E, Amyot D, Cogo E et al (2009) A globally optimal k-anonymity method for the de-identification of health data. J Am Med Inform Assoc 16(5):670–682CrossRefGoogle Scholar
  10. 10.
    Samarati P (2001) Protecting respondents’ identities in microdata release. IEEE Trans Knowl Data Eng 13(6):1010–1027CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  1. 1.Faculty of Engineering and Computer SciencesIzmir University of Economics Balcova-IzmirTurkey
  2. 2.Asım Arar Vocational Health SchoolTire-zmirTurkey

Personalised recommendations