Coming to Terms with Telemetry: A Scoping Review

  • Martin Weiss
  • Adele BothaEmail author
  • Marlien Herselman
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 933)


mHealth solutions, in resource constrained public healthcare settings, are often an extension of the reach of the government health system. As such, mHealth is subjected to demands resulting from not only restrictions due to constrained health service offerings, but technically constrained limitations inherent in the provisioning of said services as well. Telemetry may be able to offer a workable strategy in mitigating some of these technical constraints. Telemetry, in various guises, has been in use since 1912. The term is used in Information Systems to refer to a conceptual understanding of remote monitoring and control. The concept morphs from its initial concept of Supervisory, Control, and Data Acquisition (SCADA), to often become synonymous with more evolving trends such as machine-to-machine (M2M) and the Internet of Things (IoT). Where there is a clearer understanding of the domain differences between the latter two, Telemetry, in contrast, is poorly expanded on and is predominantly used to denote the features in and of a system. As such, the agreement of what constitutes the components of a telemetry system, or a telemetry framework, is implicitly referred to from within reports and case studies. It follows that the notion of a telemetry framework or, telemetry perspective, is inferred by its context, and changes as its conceptual application changes. This paper aims to articulate the components for a Telemetry implementation from literature, and to suggest design criteria that could be considered for an mHealth telemetry implementation.


Telemetry SCADA IoT M2M mHealth Resource constrained 


  1. 1.
  2. 2.
  3. 3.
    Otto, K., Shekar, M., Herbst, C.H., Mohammed, R.: Information and communication technologies for health systems strengthening: opportunities, criteria for success, and innovation for Africa and beyond. Discussion Paper. World Bank Group (2015)Google Scholar
  4. 4.
    Botha, A., Booi, T.C.: The current state of mHealth intervention strategies and implementation in South Africa. IST AFrica, Durban, South Africa (2016)Google Scholar
  5. 5.
    Botha, A., Makitla, I., Fogwill, T., Tolmay, J.: Channel agnostic access for providing services to the masses. In: ZA-WWW, 2011 Conference (2011)Google Scholar
  6. 6.
    NDoH: eHealth Strategy for South Africa 2012–2017. South African National Department of Health, Pretoria (2012)Google Scholar
  7. 7.
    Mehl, G., et al.: Harnessing mHealth in low-resource settings to overcome health system constraints and achieve universal access to healthcare. In: Behavioral Healthcare and Technology: Using Science-Based Innovations to Transform Practice, p. 239 (2014)CrossRefGoogle Scholar
  8. 8.
    Fischer, G.: A conceptual framework for computer-supported collaborative learning at work. In: Goggins, S.P., Jahnke, I., Wulf, V. (eds.) Computer-Supported Collaborative Learning at the Workplace, pp. 23–42. Springer, New York (2013). Scholar
  9. 9.
    Chib, A., van Velthoven, M.H., Car, J.: mHealth adoption in low-resource environments: a review of the use of mobile healthcare in developing countries. J. Health Commun. 20, 4–34 (2015)CrossRefGoogle Scholar
  10. 10.
    Chib, A.: The promise and peril of mHealth in developing countries. Mobile Media Commun. 1, 69–75 (2013)CrossRefGoogle Scholar
  11. 11.
    Harrison, R.R., Watkins, P.T., Kier, R.J., Lovejoy, R.O., Black, D.J., Solzbacher, F.: A low-power integrated circuit for a wireless 100-electrode neural recording system. IEEE J. Solid State Circ. 42, 123–133 (2007)CrossRefGoogle Scholar
  12. 12.
    Fonseca, M., English, J., Arx, M.V., Allen, M.G.: Wireless micromachined ceramic pressure sensor for high-temperature applications. J. Microelectromech. Syst. 11, 337–343 (2002)CrossRefGoogle Scholar
  13. 13.
    Shi, E., Chan, H., Rieffel, E., Chow, R., Song, D.: Privacy-preserving aggregation of time-series data. In: Annual Network & Distributed System Security Symposium (NDSS). Internet Societ (2011)Google Scholar
  14. 14.
    Malan, D., Fulford-Jones, T., Welsh, M., Moulton, S.: CodeBlue: an ad hoc sensor network infrastructure for emergency medical care. In: International Workshop on Wearable and Implantable Body Sensor Networks, vol. 5 (2004).
  15. 15.
    Kopp, B.: Industrial telemetry. In: Carden, F., Jedlicka, R.P., Henry, R. (eds.) Telemetry Systems Engineering. Artech House, Norwood (2002)Google Scholar
  16. 16.
    Schueffel, P.: Taming the beast: a scientific definition of fintech. J. Innov. Manag. 4, 32 (2016)Google Scholar
  17. 17.
    Copi, I.M., Cohen, C., McMahon, K.: Introduction to Logic. Routledge, New York (2016)Google Scholar
  18. 18.
    Nickerson, R.C., Varshney, U., Muntermann, J.: A method for taxonomy development and its application in information systems. Eur. J. Inf. Syst. 22, 336–359 (2013)CrossRefGoogle Scholar
  19. 19.
    Nickerson, R., Varshney, U., Muntermann, J., Isaac, H.: Towards a taxonomy of mobile applications. In: AMCIS 2007 Proceedings, p. 338 (2007)Google Scholar
  20. 20.
    Nickerson, R., Muntermann, J., Varshney, U., Isaac, H.: Taxonomy development in information systems: developing a taxonomy of mobile applications. In: European Conference in Information Systems (2009)Google Scholar
  21. 21.
    Bailey, K.D.: Typologies and Taxonomies: An Introduction to Classification Techniques. Sage, Thousand Oaks (1994)CrossRefGoogle Scholar
  22. 22.
    McKinney, J.C.: Constructive Typology and Social Theory. Ardent Media, New York (1966)Google Scholar
  23. 23.
    Aliseda, A.: Abductive Reasoning. Springer, Dordrecht (2006). Scholar
  24. 24.
    Sober, E.: Core Questions in Philosophy: A Text with Readings. Prentice Hall, Upper Saddle River (2001)Google Scholar
  25. 25.
    Brien, S.E., Lorenzetti, D.L., Lewis, S., Kennedy, J., Ghali, W.A.: Overview of a formal scoping review on health system report cards. Implement. Sci. 5, 2 (2010)CrossRefGoogle Scholar
  26. 26.
    Arksey, H., O’Malley, L.: Scoping studies: towards a methodological framework. Int. J. Soc. Res. Methodol. 8, 19–32 (2005)CrossRefGoogle Scholar
  27. 27.
    Sandelowski, M., Docherty, S., Emden, C.: Qualitative metasynthesis: issues and techniques. Res. Nurs. Health 20, 365–371 (1997)CrossRefGoogle Scholar
  28. 28.
    Ellis, T.J., Levy, Y.: A guide for novice researchers: design and development research methods. In: Proceedings of Informing Science & IT Education Conference, InSITE. Citeseer (2010)Google Scholar
  29. 29.
    Okoli, C., Schabram, K.: A guide to conducting a systematic literature review of information systems research. Sprouts: Working Papers on Information Systems, vol. 10 (2010)Google Scholar
  30. 30.
    Liberati, A., et al.: The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate health care interventions: explanation and elaboration. PLoS Med. 6, e1000100 (2009)CrossRefGoogle Scholar
  31. 31.
    Alaya, M.B., Banouar, Y., Monteil, T., Chassot, C., Drira, K.: OM2M: extensible ETSI-compliant M2M service platform with self-configuration capability. Procedia Comput. Sci. 32, 1079–1086 (2014)CrossRefGoogle Scholar
  32. 32.
    Borgia, E.: The Internet of Things vision: key features, applications and open issues. Comput. Commun. 54, 1–31 (2014)CrossRefGoogle Scholar
  33. 33.
    Botta, A., de Donato, W., Persico, V., Pescapé, A.: Integration of Cloud computing and Internet of Things: a survey. Futur. Gener. Comput. Syst. 56, 684–700 (2016)CrossRefGoogle Scholar
  34. 34.
    Castro, M., Jara, A.J., Skarmeta, A.F.: An analysis of M2M platforms: challenges and opportunities for the Internet of Things. In: 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 757–762. IEEE (2012)Google Scholar
  35. 35.
    Chen, M., Wan, J., González-Valenzuela, S., Liao, X., Leung, V.C.: A survey of recent developments in home M2M networks. IEEE Commun. Surv. Tutor. 16, 98–114 (2014)CrossRefGoogle Scholar
  36. 36.
    Davidson, E.M., McArthur, S.D., McDonald, J.R., Cumming, T., Watt, I.: Applying multi-agent system technology in practice: automated management and analysis of SCADA and digital fault recorder data. IEEE Trans. Power Syst. 21, 559–567 (2006)CrossRefGoogle Scholar
  37. 37.
  38. 38.
    Dhande, N.S.: Review On SCADA: Virtual Instrument ManagementGoogle Scholar
  39. 39.
    Fan, Z., Haines, R., Kulkarni, P.: M2M communications for E-health and smart grid: an industry and standard perspective. IEEE Wirel. Commun. 21, 62–69 (2014)CrossRefGoogle Scholar
  40. 40.
    Gabbai, A.: Kevin Ashton Describes “the Internet of Things”. Smithsonian Magazine (2015)Google Scholar
  41. 41.
    King, P.: SCADA systems–looking ahead. Control Microsystems Whitepaper, p. 83 (2005)Google Scholar
  42. 42.
    Kwasnick, R., et al.: Telemetry for reliability. In: 2017 IEEE International Reliability Physics Symposium (IRPS), pp. 6C-2.1–6C-2.6. IEEE (2017)Google Scholar
  43. 43.
    Mineraud, J., Mazhelis, O., Su, X., Tarkoma, S.: A gap analysis of Internet-of-Things platforms. Comput. Commun. 89, 5–16 (2016)CrossRefGoogle Scholar
  44. 44.
    Pereira, C., Aguiar, A.: Towards efficient mobile M2M communications: survey and open challenges. Sensors 14, 19582 (2014)CrossRefGoogle Scholar
  45. 45.
  46. 46.
    Queiroz, C., Mahmood, A., Tari, Z.: An analytical framework for evaluating survivability of SCADA systems. In: 2010 IEEE 10th International Conference on Computer and Information Technology (CIT), pp. 877–881. IEEE (2010)Google Scholar
  47. 47.
    Rezai, A., Keshavarzi, P., Moravej, Z.: Key management issue in SCADA networks: a review. Eng. Sci. Technol. Int. J. 20, 354–363 (2017)CrossRefGoogle Scholar
  48. 48.
    Sajid, A., Abbas, H., Saleem, K.: Cloud-Assisted IoT-Based SCADA systems security: a review of the state of the art and future challenges. IEEE Access 4, 1375–1384 (2016)CrossRefGoogle Scholar
  49. 49.
    Shahzad, A., Musa, S., Aborujilah, A., Irfan, M.: The SCADA review: system components, architecture, protocols and future security trends. Am. J. Appl. Sci. 11, 1418 (2014)CrossRefGoogle Scholar
  50. 50.
    Shahzad, A., Musa, S., Aborujilah, A., Irfan, M.: A review: industrial control system (ICS) and their secuity issues. Am. J. Appl. Sci. 11, 1398–1404 (2014)CrossRefGoogle Scholar
  51. 51.
  52. 52.
    Wan, J., Li, D., Zou, C., Zhou, K.: M2M communications for smart city: an event-based architecture. In: 2012 IEEE 12th International Conference on Computer and Information Technology, pp. 895–900 (2012)Google Scholar
  53. 53.
  54. 54.
    Wireless, S.: Planning a longterm wireless strategy. Sireea Wireless (2018)Google Scholar
  55. 55.
    Wu, G., Talwar, S., Johnsson, K., Himayat, N., Johnson, K.D.: M2M: from mobile to embedded internet. IEEE Commun. Mag. 49, 36–43 (2011)Google Scholar
  56. 56.
    Ahmed, I., Obermeier, S., Naedele, M., Richard III, G.G.: SCADA systems: challenges for forensic investigators. Computer 45, 44–51 (2012)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Jembi Health Systems NPC, and SAMRCCape TownSouth Africa
  2. 2.School of ComputingCSIR Meraka & UNISAPretoriaSouth Africa

Personalised recommendations