Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps

Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps PDF Author: Sen, Devjani
Publisher: IGI Global
ISBN: 1799834891
Category : Computers
Languages : en
Pages : 335

Get Book Here

Book Description
Health and fitness apps collect various personal information including name, email address, age, height, weight, and in some cases, detailed health information. When using these apps, many users trustfully log everything from diet to sleep patterns. However, by sharing such personal information, end-users may make themselves targets to misuse of this information by unknown third parties, such as insurance companies. Despite the important role of informed consent in the creation of health and fitness applications, the intersection of ethics and information sharing is understudied and is an often-ignored topic during the creation of mobile applications. Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps is a key reference source that provides research on the dangers of sharing personal information on health and wellness apps, as well as how such information can be used by employers, insurance companies, advertisers, and other third parties. While highlighting topics such as data ethics, privacy management, and information sharing, this publication explores the intersection of ethics and privacy using various quantitative, qualitative, and critical analytic approaches. It is ideally designed for policymakers, software developers, mobile app designers, legal specialists, privacy analysts, data scientists, researchers, academicians, and upper-level students.

Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps

Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps PDF Author: Sen, Devjani
Publisher: IGI Global
ISBN: 1799834891
Category : Computers
Languages : en
Pages : 335

Get Book Here

Book Description
Health and fitness apps collect various personal information including name, email address, age, height, weight, and in some cases, detailed health information. When using these apps, many users trustfully log everything from diet to sleep patterns. However, by sharing such personal information, end-users may make themselves targets to misuse of this information by unknown third parties, such as insurance companies. Despite the important role of informed consent in the creation of health and fitness applications, the intersection of ethics and information sharing is understudied and is an often-ignored topic during the creation of mobile applications. Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps is a key reference source that provides research on the dangers of sharing personal information on health and wellness apps, as well as how such information can be used by employers, insurance companies, advertisers, and other third parties. While highlighting topics such as data ethics, privacy management, and information sharing, this publication explores the intersection of ethics and privacy using various quantitative, qualitative, and critical analytic approaches. It is ideally designed for policymakers, software developers, mobile app designers, legal specialists, privacy analysts, data scientists, researchers, academicians, and upper-level students.

Research Anthology on Securing Mobile Technologies and Applications

Research Anthology on Securing Mobile Technologies and Applications PDF Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1799886018
Category : Technology & Engineering
Languages : en
Pages : 837

Get Book Here

Book Description
Mobile technologies have become a staple in society for their accessibility and diverse range of applications that are continually growing and advancing. Users are increasingly using these devices for activities beyond simple communication including gaming and e-commerce and to access confidential information including banking accounts and medical records. While mobile devices are being so widely used and accepted in daily life, and subsequently housing more and more personal data, it is evident that the security of these devices is paramount. As mobile applications now create easy access to personal information, they can incorporate location tracking services, and data collection can happen discreetly behind the scenes. Hence, there needs to be more security and privacy measures enacted to ensure that mobile technologies can be used safely. Advancements in trust and privacy, defensive strategies, and steps for securing the device are important foci as mobile technologies are highly popular and rapidly developing. The Research Anthology on Securing Mobile Technologies and Applications discusses the strategies, methods, and technologies being employed for security amongst mobile devices and applications. This comprehensive book explores the security support that needs to be required on mobile devices to avoid application damage, hacking, security breaches and attacks, or unauthorized accesses to personal data. The chapters cover the latest technologies that are being used such as cryptography, verification systems, security policies and contracts, and general network security procedures along with a look into cybercrime and forensics. This book is essential for software engineers, app developers, computer scientists, security and IT professionals, practitioners, stakeholders, researchers, academicians, and students interested in how mobile technologies and applications are implementing security protocols and tactics amongst devices.

Legal Regulations, Implications, and Issues Surrounding Digital Data

Legal Regulations, Implications, and Issues Surrounding Digital Data PDF Author: Jackson, Margaret
Publisher: IGI Global
ISBN: 1799831329
Category : Computers
Languages : en
Pages : 240

Get Book Here

Book Description
Every year, there are advances in the way that we deal with information as individuals, governments, and organizations. We live and work predominantly online resulting in an enormous amount of digital data. The way that information is used is constantly changing with individuals, governments, and corporations all involved in collecting, storing, using, disclosing, and transferring information online. The growth in artificial intelligence and its effects on data will impact all individuals. It is imperative that a greater understanding of these new advances is gained, in particular, the legal implications they have for society. Legal Regulations, Implications, and Issues Surrounding Digital Data is an essential research publication that assists readers in understanding the current technology they are using, how digital data is being used by governments and organizations, and the current legal issues surrounding these areas that set out challenges in everyday life. Highlighting topics such as data protection, cybercrime, and privacy, this book is ideal for lawyers, academicians, IT specialists, policymakers, cybersecurity professionals, law professionals, researchers, academicians, and students.

Modern Socio-Technical Perspectives on Privacy

Modern Socio-Technical Perspectives on Privacy PDF Author: Xinru Page
Publisher: Springer Nature
ISBN: 3030827860
Category : Application software
Languages : en
Pages : 459

Get Book Here

Book Description
This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book's primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teachers can assign (parts of) the book for a “professional issues” course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academics who are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects.

Encyclopedia of Information Science and Technology, Fourth Edition

Encyclopedia of Information Science and Technology, Fourth Edition PDF Author: Khosrow-Pour, D.B.A., Mehdi
Publisher: IGI Global
ISBN: 1522522565
Category : Computers
Languages : en
Pages : 8356

Get Book Here

Book Description
In recent years, our world has experienced a profound shift and progression in available computing and knowledge sharing innovations. These emerging advancements have developed at a rapid pace, disseminating into and affecting numerous aspects of contemporary society. This has created a pivotal need for an innovative compendium encompassing the latest trends, concepts, and issues surrounding this relevant discipline area. During the past 15 years, the Encyclopedia of Information Science and Technology has become recognized as one of the landmark sources of the latest knowledge and discoveries in this discipline. The Encyclopedia of Information Science and Technology, Fourth Edition is a 10-volume set which includes 705 original and previously unpublished research articles covering a full range of perspectives, applications, and techniques contributed by thousands of experts and researchers from around the globe. This authoritative encyclopedia is an all-encompassing, well-established reference source that is ideally designed to disseminate the most forward-thinking and diverse research findings. With critical perspectives on the impact of information science management and new technologies in modern settings, including but not limited to computer science, education, healthcare, government, engineering, business, and natural and physical sciences, it is a pivotal and relevant source of knowledge that will benefit every professional within the field of information science and technology and is an invaluable addition to every academic and corporate library.

Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics

Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics PDF Author: Khosrow-Pour, D.B.A., Mehdi
Publisher: IGI Global
ISBN: 1522575995
Category : Computers
Languages : en
Pages : 1946

Get Book Here

Book Description
From cloud computing to data analytics, society stores vast supplies of information through wireless networks and mobile computing. As organizations are becoming increasingly more wireless, ensuring the security and seamless function of electronic gadgets while creating a strong network is imperative. Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics highlights the challenges associated with creating a strong network architecture in a perpetually online society. Readers will learn various methods in building a seamless mobile computing option and the most effective means of analyzing big data. This book is an important resource for information technology professionals, software developers, data analysts, graduate-level students, researchers, computer engineers, and IT specialists seeking modern information on emerging methods in data mining, information technology, and wireless networks.

Research Anthology on Securing Medical Systems and Records

Research Anthology on Securing Medical Systems and Records PDF Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1668463121
Category : Computers
Languages : en
Pages : 1060

Get Book Here

Book Description
With the influx of internet and mobile technology usage, many medical institutions—from doctor’s offices to hospitals—have implemented new online technologies for the storage and access of health data as well as the monitoring of patient health. Telehealth was particularly useful during the COVID-19 pandemic, which monumentally increased its everyday usage. However, this transition of health data has increased privacy risks, and cyber criminals and hackers may have increased access to patient personal data. Medical staff and administrations must remain up to date on the new technologies and methods in securing these medical systems and records. The Research Anthology on Securing Medical Systems and Records discusses the emerging challenges in healthcare privacy as well as the technologies, methodologies, and emerging research in securing medical systems and enhancing patient privacy. It provides information on the implementation of these technologies as well as new avenues of medical security research. Covering topics such as biomedical imaging, internet of things, and watermarking, this major reference work is a comprehensive resource for security analysts, data scientists, hospital administrators, leaders in healthcare, medical professionals, health information managers, medical professionals, mobile application developers, security professionals, technicians, students, libraries, researchers, and academicians.

Research Anthology on Privatizing and Securing Data

Research Anthology on Privatizing and Securing Data PDF Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1799889556
Category : Computers
Languages : en
Pages : 2188

Get Book Here

Book Description
With the immense amount of data that is now available online, security concerns have been an issue from the start, and have grown as new technologies are increasingly integrated in data collection, storage, and transmission. Online cyber threats, cyber terrorism, hacking, and other cybercrimes have begun to take advantage of this information that can be easily accessed if not properly handled. New privacy and security measures have been developed to address this cause for concern and have become an essential area of research within the past few years and into the foreseeable future. The ways in which data is secured and privatized should be discussed in terms of the technologies being used, the methods and models for security that have been developed, and the ways in which risks can be detected, analyzed, and mitigated. The Research Anthology on Privatizing and Securing Data reveals the latest tools and technologies for privatizing and securing data across different technologies and industries. It takes a deeper dive into both risk detection and mitigation, including an analysis of cybercrimes and cyber threats, along with a sharper focus on the technologies and methods being actively implemented and utilized to secure data online. Highlighted topics include information governance and privacy, cybersecurity, data protection, challenges in big data, security threats, and more. This book is essential for data analysts, cybersecurity professionals, data scientists, security analysts, IT specialists, practitioners, researchers, academicians, and students interested in the latest trends and technologies for privatizing and securing data.

Artificial Intelligence Transformations for Healthcare Applications: Medical Diagnosis, Treatment, and Patient Care

Artificial Intelligence Transformations for Healthcare Applications: Medical Diagnosis, Treatment, and Patient Care PDF Author: Murugan, Thangavel
Publisher: IGI Global
ISBN:
Category : Medical
Languages : en
Pages : 418

Get Book Here

Book Description
Artificial intelligence (AI) has emerged as a transformative force across various domains, revolutionizing the way we perceive and address challenges in healthcare. The convergence of AI and healthcare holds immense promise, offering unprecedented opportunities to enhance medical diagnosis, treatment, and patient care. In today’s world, the intersection of AI and healthcare stands as one of the most promising frontiers for innovation and progress. Artificial Intelligence Transformations for Healthcare Applications: Medical Diagnosis, Treatment, and Patient Care embodies this convergence, offering a comprehensive exploration of how AI is revolutionizing various aspects of healthcare delivery. At its core, this book addresses the urgent need for more effective and efficient healthcare solutions in an increasingly complex and data-rich environment. Covering topics such as chronic disease, image classification, and precision medicine, this book is an essential resource for healthcare professionals, medical researchers, AI and machine learning specialists, healthcare administrators and executives, medical educators and students, biomedical engineers, healthcare IT professionals, policy makers and regulators, academicians, and more.

Handbook of Research on Cyber Crime and Information Privacy

Handbook of Research on Cyber Crime and Information Privacy PDF Author: Cruz-Cunha, Maria Manuela
Publisher: IGI Global
ISBN: 1799857298
Category : Computers
Languages : en
Pages : 753

Get Book Here

Book Description
In recent years, industries have transitioned into the digital realm, as companies and organizations are adopting certain forms of technology to assist in information storage and efficient methods of production. This dependence has significantly increased the risk of cyber crime and breaches in data security. Fortunately, research in the area of cyber security and information protection is flourishing; however, it is the responsibility of industry professionals to keep pace with the current trends within this field. The Handbook of Research on Cyber Crime and Information Privacy is a collection of innovative research on the modern methods of crime and misconduct within cyber space. It presents novel solutions to securing and preserving digital information through practical examples and case studies. While highlighting topics including virus detection, surveillance technology, and social networks, this book is ideally designed for cybersecurity professionals, researchers, developers, practitioners, programmers, computer scientists, academicians, security analysts, educators, and students seeking up-to-date research on advanced approaches and developments in cyber security and information protection.