Skip to main content

Assistive Technologies and Issues Relating to Privacy, Ethics and Security

  • Chapter

Part of the book series: Advanced Information and Knowledge Processing ((AI&KP))

Abstract

Emerging technologies provide the opportunity to develop innovative sustainable service models, capable of supporting adults with dementia at home. Devices range from simple stand-alone components that can generate a responsive alarm call to complex interoperable systems that even can be remotely controlled. From these complex systems the paradigm of the ubiquitous or ambient smart home has emerged, integrating technology, environmental design and traditional care provision. The service context is often complex, involving a variety of stakeholders and a range of interested agencies. Against this backdrop, as anecdotal evidence and government policies spawn further innovation it is critical that due consideration is given to the potential ethical ramifications at an individual, organisational and societal level. Well-grounded ethical thinking and proactive ethical responses to this innovation are required. Explicit policy and practice should therefore emerge which engenders confidence in existing supported living option schemes for adults with dementia and informs further innovation.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    By deleting the data, or by one-way encryption where decryption keys are stored in external protected systems.

References

  • Aldrich, F. (2003) Smart homes: Past, present and future. In: Harper R., (eds.) Inside the Smart Home. Springer Verlag, London, England.

    Google Scholar 

  • Allan, K. (2001) Communication and Consultation. Exploring Ways for Staff to Involve People with Dementia in Developing Services. The Policy Press, Bristol, UK.

    Google Scholar 

  • Baldwin, C. (2005) Technology, dementia and ethics: Rethinking the issues. Disability Studies Quarterly, 25:3.

    Google Scholar 

  • Barlow, J., Gann, D. 1998. A changing sense of place: Are integrated IT systems reshaping the home? Technologies Future, Urban Features Conference, Durham, 23–24 April.

    Google Scholar 

  • Bartlett, P. (2005) Blackstone’s Guide to the Mental Capacity Act. Oxford University Press, UK.

    Google Scholar 

  • Bjornrby, S., Topo, P., Holthe, T. (1999) Technology, Ethics and Dementia: A Guidebook on How to Apply Technology in Dementia Care. The Norwegian Centre for Dementia Research, INFO-Bank, Norway.

    Google Scholar 

  • Clarke, C., Keady, J. (2002) Getting down to brass tacks: A discussion of data collection with people with dementia. In: H. Wilkinson (eds.) The Perspectives of People with Dementia: Research Methods and Motivations. Jessica Kingsley Publishers, London, England.

    Google Scholar 

  • Clare, L. (2004) Awareness in early-stage Alzheimer’s disease: A review of methods and evidence. British Journal of Clinical Psychology, 43(Pt 2):177–196.

    Article  Google Scholar 

  • Dard, P. 1996. Dilemmas of Telesurveillance in Housing. ENHR Housing Conference, Helsingor.

    Google Scholar 

  • Day, K., Carreon, D., Stump, C. (2000) The therapeutic design of environments for people with dementia: A review of the empirical research. The Gerontological Society of America, 40: 397–416.

    Google Scholar 

  • Dröes, R.M. (2007) Insight in coping with dementia; listening to the voice of those who suffer from it. Aging and Mental Health, 11(2):115–118.

    Article  Google Scholar 

  • Dubois, B., Miley, K. (1996) Social Work: An Empowering Profession. Allyn and Bacon, Harlow.

    Google Scholar 

  • Dworkin, G. (2005) Paternalism. In: Stanford Encyclopedia of Philosophy. Available at http://plato.stanford.edu/entries/paternalism/, Accessed on April 18 2007.

  • Hughes, J. (2002) Electronic tagging of people with dementia who wander: Ethical issues are possibly more important than practical benefits. British Medical Journal, 325:847–848.

    Article  Google Scholar 

  • Hughes, J., Baldwin, C. (2006) Ethical Issues in Dementia Care. Jessica Kingsley Publishers, London, England.

    Google Scholar 

  • Jacques, A., Jackson, G. (2000) Understanding Dementia, 3rd edn. Churchill Livingstone, Edinburgh.

    Google Scholar 

  • Jedamizik, M. (2001) Smart House: A Usable Dialog System for the Control of Technical Systems by Gesture Recognition in Home Environments. Available at http://is7-www.cs.umi-dortmund.de/research/gesture/argus/intelligent-home.html, accessed on 23.12.08.

  • Kizza, J. (2003) Ethical and Social Issues in the Information Age, 2nd edn. Springer-Verlag, New York.

    Google Scholar 

  • Kurzweill, R. (2005) Nanoscience, nanotechnology and ethics: Promise or peril. In: H. Tavani (ed.) Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology, 2nd edn. John Wiley and Sons, USA, p. 375.

    Google Scholar 

  • Lauriks, S., Osté, J., Hertogh, C.M.P.M., Dröes, R.M. (2008) Meer levenskwaliteit met domotica (More Quality of Life in Smart Homes). VU University Medical Center, Department of Psychiatry, Amsterdam.

    Google Scholar 

  • Martin, S., Cunningham, C., Nugent, C. (2007) Ethical considerations for integrating technology into community based service models for adults with dementia. Alzheimer’s Care Today, 8(3):251–259.

    Google Scholar 

  • Moore, J. (2000) Towards a theory of privacy for the information age. In: H. Tavani (ed.) Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology, 2nd edn. John Wiley and Sons, USA.

    Google Scholar 

  • Reid, D., Ryan, T., Enderby, P. (2001) What does it mean to listen to people with dementia?. Disability and Society, 16(3):377–392.

    Article  Google Scholar 

  • Schneier, B. (2004) Secrets and lies: Digital security in a networked world. In: Tavani, H. (ed.) Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology, 2nd edn. John Wiley and Sons, USA, p. 189.

    Google Scholar 

  • Spinello, R.A., Tavani, H.T. (2004) In: H. Tavani (ed.) Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology, 2nd edn. John Wiley and Sons, USA, p. 171.

    Google Scholar 

  • Tavani, H. (2007) Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology, 2nd edn. John Wiley and Sons, USA.

    Google Scholar 

  • Weiner, D., Peterson, B., Keefe, F. (1999) Chronic pain-associated behaviours in the nursing home: Resident versus caregiver perceptions. Pain – International Association for the Study of Pain, 80:577–588.

    Google Scholar 

  • Weckbert, J., Moore, J. (2004) Using the precautionary principle in nanotechnology. In: H. Tavani (ed.) Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology, 2nd edn. John Wiley and Sons, USA, p. 376.

    Google Scholar 

Download references

Acknowledgements

The authors acknowledge the contribution of Professor Chris Nugent, and Mr Colm Cunningham to an original article, which informed this chapter (Martin et al. 2007).

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Appendix: Checklists to Assist Using Technology with People Who Have Dementia

Appendix: Checklists to Assist Using Technology with People Who Have Dementia

When technology is used checks need to be in place that ensures the following questions are addressed:

  • Has consent been sought from the person with dementia about the use of technology in their care, using skilled personnel and appropriate communication methods?

  • Has a date been set to review the use of this technology intervention? Is it accepted by the user and does it support the care process?

  • On what aspects is the effectiveness of the assistive technology in the care of the person evaluated and by what methods?

1.1 For Professionals and Field Test Personnel

  • Professional carers and system administrators must have knowledge of key principles of healthcare confidentiality: privacy, explicit or implicit consent, and conditions for non-consensual disclosure.

  • Since persons with dementia are vulnerable, they shall be given all necessary support to understand the confidentiality issues and express their wishes. The individual’s ability to understand, retain and weigh up information as well as communicate their decision should be examined.

  • The consent should be given until end-of-service, i.e. until end of user test, death or explicit withdrawal of consent, so that the consent also covers later stages in the disease when the person with dementia might be incapable of giving consent.

  • Personally identifiable data shall be deleted and made non-recoverable on the test equipment as part of uninstallation.

  • Using staff from other agencies requires explicit consent and possibly formal information protection agreements.

  • Necessary secondary uses of information (for example, for payments or management) requires explicit consent.

  • The basis for the configuration of the device should at all times be the subjective needs and wants of the person with mild dementia.

  • The benefits of information sharing with the informal carer should be discussed with the person with dementia.

  • In emergency situations minimum necessary confidential user information may be used or disclosed.

  • Confidential data relating to persons with dementia shall be stored on secure computers, with up-to-date protections against unauthorised access and malware.

1.2 For Developers

  • Security analyses should be performed at unit and system levels. It should be performed at the specification stage, and as part of evaluation. The security analysis should address requirements for confidentiality, data integrity, availability and accountability. It should specifically analyse malware threats and the potential for system abuse by users.

  • An authorisation model should be defined so that any access to identifiable personal data is strictly controlled. Person with dementia access should be made by means of implicit or automatic device authentication. Accesses by all other users (e.g. carers, researchers and administrators) should require user-level authentication.

  • A service model should be defined so that the persons with dementia and their carers can be informed of what kinds of information is being recorded and for what purposes.

  • Build the system so that it minimises the potential to stigmatise the user. This means that devices should preferably be perceived and used as normal technology artefacts, also by people that do not suffer from dementia.

  • There must be a generic way to access stored data, for system administrators (for research, emergency or legal purposes), and for the person with dementia’s access to own stored data (as guaranteed by Data Protection laws).

  • Data should be stored with as little identifying information as possible. If possible, the system should be partitioned into one part where identifiable personal data exist, and other parts where it is impossible to trace to which physical person some data belong.

  • The personal codes that are used in data collection for research purposes, must NOT be reused in the normal operation of the system.

  • Only near-future data should be cached in other nodes than where the original data reside.

  • Data that are not needed anymore for the operation of the system should immediately be made inaccessible.Footnote 1

  • All communication links should be secure. Encrypted files and databases must be used for storing identifiable personal data.

1.3 For Researchers

  • Researchers that execute the evaluation of the prototype with user dyads shall have no business dependencies themselves with commercial organisations within or outside the project consortium.

  • Personally identifiable data must be stored in encoded form.

  • Mapping collected data to individuals must use keys stored separately in locked closets.

  • Only encoded data will be transmitted between sites.

  • Be sensitive to the changing clinical phases of dementia that may influence the subjects’ autonomy and capacity.

  • Under no circumstances permit reporting of details during dissemination that would allow the identification of any subject involved.

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag London

About this chapter

Cite this chapter

Martin, S., Bengtsson, J.E., Dröes, RM. (2010). Assistive Technologies and Issues Relating to Privacy, Ethics and Security. In: Mulvenna, M., Nugent, C. (eds) Supporting People with Dementia Using Pervasive Health Technologies. Advanced Information and Knowledge Processing. Springer, London. https://doi.org/10.1007/978-1-84882-551-2_5

Download citation

  • DOI: https://doi.org/10.1007/978-1-84882-551-2_5

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84882-550-5

  • Online ISBN: 978-1-84882-551-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics