Page 227 - ITU KALEIDOSCOPE, ATLANTA 2019
P. 227
S6.2 Operationalizing data justice in health informatics*
Mamello Thinyane, United Nations University, Macao SAR, China
There is a growing awareness of the need and increasing demands for technology to embed, be
sensitive to, be informed by, and to be a conduit of societal values and ethical principles. Besides
the normative frameworks, such as the Human Rights principles, being used to inform
technology developments, numerous stakeholders are also developing ethical guidelines and
principles to inform their technology solutions across various domains, particularly around the
use of frontier technologies such as artificial intelligence, machine learning, Internet of things,
robotics and big data. Digital health is one of the domains where the convergence of technology
and health stands to have a significant impact on advancing sustainable development
imperatives, specifically around health and wellbeing (i.e. SDG3). As far as digital health is
concerned, what values and ethical principles should inform solutions in this domain, and more
significantly, how should these be translated and embedded into specific technology solutions?
This paper explores the notion of data justice in the context of health informatics and outlines the
key considerations for data collection, processing, use, sharing and exchange towards health
outcomes and impact. Further, the paper explores the operationalization of Mortier et al.'s
Human-Data Interaction principles of legibility, agency and negotiability through a health
informatics system architecture.
Session 7: Safety and security in healthcare
S7.1 Thought-based authenticated key exchange*
Phillip H. Griffin, Griffin Information Security, United States
Identity authentication techniques based on password-authenticated key exchange (PAKE)
protocols rely on weak secrets shared between users and host systems. In PAKE, a symmetric
key is derived from the shared secret, used to mutually authenticate communicating parties, and
then used to establish a secure channel for subsequent communications. A common source of
PAKE weak secrets are password and passphrase strings. Though easily recalled by a user, these
inputs typically require keyboard entry, limiting their utility in achieving universal access. This
paper describes authentication techniques based on weak secrets derived from knowledge
extracted from biometric sensors and brain-actuated control systems. The derived secrets are
converted into a format suitable for use by a PAKE protocol. When combined with other
authentication factors, PAKE protocols can be extended to provide strong, two-factor identity
authentication that is easy to use by persons living in assistive environments.
S7.2 Cyber-safety in healthcare IoT
Duncan Sparrell, sFractal Consulting, United States
Healthcare is becoming more connected. Risks to patient and public safety are increasing due to
cybersecurity attacks. To best thwart cyberattacks, the Internet of health things (IoHT) must
respond at machine speed. Cybersecurity standards being developed today will enable future
IoHT systems to automatically adapt to cybersecurity threats in real time, based on a quantitative
analysis of reasonable mitigations performing triage to economically optimize the overall
healthcare outcome. This paper will discuss cybersecurity threats, risk, health impact, and how
future IoHT cybersecurity systems will adapt to threats in real time.
– 207 –