Research on Data Security and Privacy Protection of Wearable Equipment in Healthcare. 2021

Dawei Jiang, and Guoquan Shi
School of Mechatronical Engineering, Changchun University of Science and Technology, Changchun 130000, Jilin, China.

With the close integration of science and technology and health, the broad application prospects of healthy interconnection bring revolutionary changes to health services. Health and medical wearable devices can collect real-time data related to user health, such as user behavior, mood, and sleep, which have great commercial and social value. Healthcare wearable devices, as important network nodes for health interconnection, connect patients and hospitals with the Internet of Things and sensing technology to form a huge medical network. As wearable devices can also collect user data regardless of time and place, uploading data to the cloud can easily make the wearable device's system vulnerable to attacks and data leakage. Defects in technology can sometimes cause problems such as lack of control over data flow links in wearable devices, and data and privacy leaks are more likely to occur. In this regard, how to ensure the data security and user privacy while using healthcare wearable devices to collect data is a problem worth studying. This article investigates data from healthcare wearable devices, from technical, management, and legal aspects, and studies data security and privacy protection issues for healthcare wearable devices to protect data security and user privacy and promote the sustainable development of the healthcare wearable device industry and the scientific use of data collection.

UI MeSH Term Description Entries
D003695 Delivery of Health Care The concept concerned with all aspects of providing and distributing health services to a patient population. Delivery of Dental Care,Health Care,Health Care Delivery,Health Care Systems,Community-Based Distribution,Contraceptive Distribution,Delivery of Healthcare,Dental Care Delivery,Distribution, Non-Clinical,Distribution, Nonclinical,Distributional Activities,Healthcare,Healthcare Delivery,Healthcare Systems,Non-Clinical Distribution,Nonclinical Distribution,Activities, Distributional,Activity, Distributional,Care, Health,Community Based Distribution,Community-Based Distributions,Contraceptive Distributions,Deliveries, Healthcare,Delivery, Dental Care,Delivery, Health Care,Delivery, Healthcare,Distribution, Community-Based,Distribution, Contraceptive,Distribution, Non Clinical,Distributional Activity,Distributions, Community-Based,Distributions, Contraceptive,Distributions, Non-Clinical,Distributions, Nonclinical,Health Care System,Healthcare Deliveries,Healthcare System,Non Clinical Distribution,Non-Clinical Distributions,Nonclinical Distributions,System, Health Care,System, Healthcare,Systems, Health Care,Systems, Healthcare
D006268 Health Facilities Institutions which provide medical or health-related services. Facilities, Health,Facility, Health,Health Facility
D006801 Humans Members of the species Homo sapiens. Homo sapiens,Man (Taxonomy),Human,Man, Modern,Modern Man
D000076251 Wearable Electronic Devices Electronic implements worn on the body as an implant or as an accessory. Examples include wearable diagnostic devices, wearable ACTIVITY TRACKERS, wearable INFUSION PUMPS, wearable computing devices, SENSORY AIDS, and electronic pest repellents. Wearable Computer,Electronic Skin,Wearable Devices,Wearable Technology,Computer, Wearable,Device, Wearable,Device, Wearable Electronic,Electronic Device, Wearable,Skin, Electronic,Technology, Wearable,Wearable Computers,Wearable Device,Wearable Electronic Device,Wearable Technologies
D016494 Computer Security Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data. Computer Viruses,Data Protection,Data Security,Compromising of Data,Computer Hackers,Computer Worms,Cyber Security,Cybersecurity,Data Encryption,Information Protection,Computer Hacker,Computer Virus,Computer Worm,Data Compromising,Data Encryptions,Encryption, Data,Encryptions, Data,Hacker, Computer,Hackers, Computer,Protection, Data,Protection, Information,Security, Computer,Security, Cyber,Security, Data,Virus, Computer,Viruses, Computer,Worm, Computer,Worms, Computer
D018907 Privacy The state of being free from intrusion or disturbance in one's private life or affairs. (Random House Unabridged Dictionary, 2d ed, 1993) Privacy Act,Public Law 93-579,PL 93-579,PL93-579,Act, Privacy,Law 93-579, Public,PL 93 579,PL93 579,Public Law 93 579

Related Publications

Dawei Jiang, and Guoquan Shi
January 2023, Journal of healthcare engineering,
Dawei Jiang, and Guoquan Shi
January 2020, Health information management : journal of the Health Information Management Association of Australia,
Dawei Jiang, and Guoquan Shi
August 2011, Pharmacoepidemiology and drug safety,
Dawei Jiang, and Guoquan Shi
January 2022, PloS one,
Dawei Jiang, and Guoquan Shi
May 2025, South African medical journal = Suid-Afrikaanse tydskrif vir geneeskunde,
Dawei Jiang, and Guoquan Shi
August 2018, Yearbook of medical informatics,
Dawei Jiang, and Guoquan Shi
January 2020, Blockchain in healthcare today,
Dawei Jiang, and Guoquan Shi
October 2000, South African medical journal = Suid-Afrikaanse tydskrif vir geneeskunde,
Dawei Jiang, and Guoquan Shi
April 2023, The Lancet. Digital health,
Copied contents to your clipboard!