Abstract
Emerging technologies provide the opportunity to develop innovative sustainable service models, capable of supporting adults with dementia at home. Devices range from simple stand-alone components that can generate a responsive alarm call to complex interoperable systems that even can be remotely controlled. From these complex systems the paradigm of the ubiquitous or ambient smart home has emerged, integrating technology, environmental design and traditional care provision. The service context is often complex, involving a variety of stakeholders and a range of interested agencies. Against this backdrop, as anecdotal evidence and government policies spawn further innovation it is critical that due consideration is given to the potential ethical ramifications at an individual, organisational and societal level. Well-grounded ethical thinking and proactive ethical responses to this innovation are required. Explicit policy and practice should therefore emerge which engenders confidence in existing supported living option schemes for adults with dementia and informs further innovation.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
By deleting the data, or by one-way encryption where decryption keys are stored in external protected systems.
References
Aldrich, F. (2003) Smart homes: Past, present and future. In: Harper R., (eds.) Inside the Smart Home. Springer Verlag, London, England.
Allan, K. (2001) Communication and Consultation. Exploring Ways for Staff to Involve People with Dementia in Developing Services. The Policy Press, Bristol, UK.
Baldwin, C. (2005) Technology, dementia and ethics: Rethinking the issues. Disability Studies Quarterly, 25:3.
Barlow, J., Gann, D. 1998. A changing sense of place: Are integrated IT systems reshaping the home? Technologies Future, Urban Features Conference, Durham, 23–24 April.
Bartlett, P. (2005) Blackstone’s Guide to the Mental Capacity Act. Oxford University Press, UK.
Bjornrby, S., Topo, P., Holthe, T. (1999) Technology, Ethics and Dementia: A Guidebook on How to Apply Technology in Dementia Care. The Norwegian Centre for Dementia Research, INFO-Bank, Norway.
Clarke, C., Keady, J. (2002) Getting down to brass tacks: A discussion of data collection with people with dementia. In: H. Wilkinson (eds.) The Perspectives of People with Dementia: Research Methods and Motivations. Jessica Kingsley Publishers, London, England.
Clare, L. (2004) Awareness in early-stage Alzheimer’s disease: A review of methods and evidence. British Journal of Clinical Psychology, 43(Pt 2):177–196.
Dard, P. 1996. Dilemmas of Telesurveillance in Housing. ENHR Housing Conference, Helsingor.
Day, K., Carreon, D., Stump, C. (2000) The therapeutic design of environments for people with dementia: A review of the empirical research. The Gerontological Society of America, 40: 397–416.
Dröes, R.M. (2007) Insight in coping with dementia; listening to the voice of those who suffer from it. Aging and Mental Health, 11(2):115–118.
Dubois, B., Miley, K. (1996) Social Work: An Empowering Profession. Allyn and Bacon, Harlow.
Dworkin, G. (2005) Paternalism. In: Stanford Encyclopedia of Philosophy. Available at http://plato.stanford.edu/entries/paternalism/, Accessed on April 18 2007.
Hughes, J. (2002) Electronic tagging of people with dementia who wander: Ethical issues are possibly more important than practical benefits. British Medical Journal, 325:847–848.
Hughes, J., Baldwin, C. (2006) Ethical Issues in Dementia Care. Jessica Kingsley Publishers, London, England.
Jacques, A., Jackson, G. (2000) Understanding Dementia, 3rd edn. Churchill Livingstone, Edinburgh.
Jedamizik, M. (2001) Smart House: A Usable Dialog System for the Control of Technical Systems by Gesture Recognition in Home Environments. Available at http://is7-www.cs.umi-dortmund.de/research/gesture/argus/intelligent-home.html, accessed on 23.12.08.
Kizza, J. (2003) Ethical and Social Issues in the Information Age, 2nd edn. Springer-Verlag, New York.
Kurzweill, R. (2005) Nanoscience, nanotechnology and ethics: Promise or peril. In: H. Tavani (ed.) Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology, 2nd edn. John Wiley and Sons, USA, p. 375.
Lauriks, S., Osté, J., Hertogh, C.M.P.M., Dröes, R.M. (2008) Meer levenskwaliteit met domotica (More Quality of Life in Smart Homes). VU University Medical Center, Department of Psychiatry, Amsterdam.
Martin, S., Cunningham, C., Nugent, C. (2007) Ethical considerations for integrating technology into community based service models for adults with dementia. Alzheimer’s Care Today, 8(3):251–259.
Moore, J. (2000) Towards a theory of privacy for the information age. In: H. Tavani (ed.) Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology, 2nd edn. John Wiley and Sons, USA.
Reid, D., Ryan, T., Enderby, P. (2001) What does it mean to listen to people with dementia?. Disability and Society, 16(3):377–392.
Schneier, B. (2004) Secrets and lies: Digital security in a networked world. In: Tavani, H. (ed.) Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology, 2nd edn. John Wiley and Sons, USA, p. 189.
Spinello, R.A., Tavani, H.T. (2004) In: H. Tavani (ed.) Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology, 2nd edn. John Wiley and Sons, USA, p. 171.
Tavani, H. (2007) Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology, 2nd edn. John Wiley and Sons, USA.
Weiner, D., Peterson, B., Keefe, F. (1999) Chronic pain-associated behaviours in the nursing home: Resident versus caregiver perceptions. Pain – International Association for the Study of Pain, 80:577–588.
Weckbert, J., Moore, J. (2004) Using the precautionary principle in nanotechnology. In: H. Tavani (ed.) Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology, 2nd edn. John Wiley and Sons, USA, p. 376.
Acknowledgements
The authors acknowledge the contribution of Professor Chris Nugent, and Mr Colm Cunningham to an original article, which informed this chapter (Martin et al. 2007).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Appendix: Checklists to Assist Using Technology with People Who Have Dementia
Appendix: Checklists to Assist Using Technology with People Who Have Dementia
When technology is used checks need to be in place that ensures the following questions are addressed:
-
Has consent been sought from the person with dementia about the use of technology in their care, using skilled personnel and appropriate communication methods?
-
Has a date been set to review the use of this technology intervention? Is it accepted by the user and does it support the care process?
-
On what aspects is the effectiveness of the assistive technology in the care of the person evaluated and by what methods?
1.1 For Professionals and Field Test Personnel
-
Professional carers and system administrators must have knowledge of key principles of healthcare confidentiality: privacy, explicit or implicit consent, and conditions for non-consensual disclosure.
-
Since persons with dementia are vulnerable, they shall be given all necessary support to understand the confidentiality issues and express their wishes. The individual’s ability to understand, retain and weigh up information as well as communicate their decision should be examined.
-
The consent should be given until end-of-service, i.e. until end of user test, death or explicit withdrawal of consent, so that the consent also covers later stages in the disease when the person with dementia might be incapable of giving consent.
-
Personally identifiable data shall be deleted and made non-recoverable on the test equipment as part of uninstallation.
-
Using staff from other agencies requires explicit consent and possibly formal information protection agreements.
-
Necessary secondary uses of information (for example, for payments or management) requires explicit consent.
-
The basis for the configuration of the device should at all times be the subjective needs and wants of the person with mild dementia.
-
The benefits of information sharing with the informal carer should be discussed with the person with dementia.
-
In emergency situations minimum necessary confidential user information may be used or disclosed.
-
Confidential data relating to persons with dementia shall be stored on secure computers, with up-to-date protections against unauthorised access and malware.
1.2 For Developers
-
Security analyses should be performed at unit and system levels. It should be performed at the specification stage, and as part of evaluation. The security analysis should address requirements for confidentiality, data integrity, availability and accountability. It should specifically analyse malware threats and the potential for system abuse by users.
-
An authorisation model should be defined so that any access to identifiable personal data is strictly controlled. Person with dementia access should be made by means of implicit or automatic device authentication. Accesses by all other users (e.g. carers, researchers and administrators) should require user-level authentication.
-
A service model should be defined so that the persons with dementia and their carers can be informed of what kinds of information is being recorded and for what purposes.
-
Build the system so that it minimises the potential to stigmatise the user. This means that devices should preferably be perceived and used as normal technology artefacts, also by people that do not suffer from dementia.
-
There must be a generic way to access stored data, for system administrators (for research, emergency or legal purposes), and for the person with dementia’s access to own stored data (as guaranteed by Data Protection laws).
-
Data should be stored with as little identifying information as possible. If possible, the system should be partitioned into one part where identifiable personal data exist, and other parts where it is impossible to trace to which physical person some data belong.
-
The personal codes that are used in data collection for research purposes, must NOT be reused in the normal operation of the system.
-
Only near-future data should be cached in other nodes than where the original data reside.
-
Data that are not needed anymore for the operation of the system should immediately be made inaccessible.Footnote 1
-
All communication links should be secure. Encrypted files and databases must be used for storing identifiable personal data.
1.3 For Researchers
-
Researchers that execute the evaluation of the prototype with user dyads shall have no business dependencies themselves with commercial organisations within or outside the project consortium.
-
Personally identifiable data must be stored in encoded form.
-
Mapping collected data to individuals must use keys stored separately in locked closets.
-
Only encoded data will be transmitted between sites.
-
Be sensitive to the changing clinical phases of dementia that may influence the subjects’ autonomy and capacity.
-
Under no circumstances permit reporting of details during dissemination that would allow the identification of any subject involved.
Rights and permissions
Copyright information
© 2010 Springer-Verlag London
About this chapter
Cite this chapter
Martin, S., Bengtsson, J.E., Dröes, RM. (2010). Assistive Technologies and Issues Relating to Privacy, Ethics and Security. In: Mulvenna, M., Nugent, C. (eds) Supporting People with Dementia Using Pervasive Health Technologies. Advanced Information and Knowledge Processing. Springer, London. https://doi.org/10.1007/978-1-84882-551-2_5
Download citation
DOI: https://doi.org/10.1007/978-1-84882-551-2_5
Publisher Name: Springer, London
Print ISBN: 978-1-84882-550-5
Online ISBN: 978-1-84882-551-2
eBook Packages: Computer ScienceComputer Science (R0)