Page 227 - ITU KALEIDOSCOPE, ATLANTA 2019
P. 227

S6.2      Operationalizing data justice in health informatics*
                       Mamello Thinyane, United Nations University, Macao SAR, China
                       There is a growing awareness of the need and increasing demands for technology to embed, be

                       sensitive to, be informed by, and to be a conduit of societal values and ethical principles. Besides
                       the normative frameworks, such as the Human Rights principles, being used to inform
                       technology developments, numerous stakeholders are also developing ethical guidelines and
                       principles to inform their technology solutions across various domains, particularly around the
                       use of frontier technologies such as artificial intelligence, machine learning, Internet of things,
                       robotics and big data. Digital health is one of the domains where the convergence of technology
                       and health stands to have a significant impact on advancing sustainable development
                       imperatives, specifically around health and wellbeing (i.e. SDG3). As far as digital health is
                       concerned, what values and ethical principles should inform solutions in this domain, and more
                       significantly, how should these be translated and embedded into specific technology solutions?
                       This paper explores the notion of data justice in the context of health informatics and outlines the
                       key considerations for data collection, processing, use, sharing and exchange towards health
                       outcomes and impact. Further, the paper explores the operationalization of Mortier et al.'s
                       Human-Data Interaction principles of legibility, agency and negotiability through a health
                       informatics system architecture.




             Session 7: Safety and security in healthcare

             S7.1      Thought-based authenticated key exchange*
                       Phillip H. Griffin, Griffin Information Security, United States

                       Identity authentication techniques based on password-authenticated key exchange (PAKE)
                       protocols rely on weak secrets shared between users and host systems. In PAKE, a symmetric
                       key is derived from the shared secret, used to mutually authenticate communicating parties, and
                       then used to establish a secure channel for subsequent communications. A common source of
                       PAKE weak secrets are password and passphrase strings. Though easily recalled by a user, these
                       inputs typically require keyboard entry, limiting their utility in achieving universal access. This
                       paper describes authentication techniques based on weak secrets derived from knowledge
                       extracted from biometric sensors and brain-actuated control systems. The derived secrets are
                       converted into a format suitable for use by a PAKE protocol. When combined with other
                       authentication factors, PAKE protocols can be extended to provide strong, two-factor identity
                       authentication that is easy to use by persons living in assistive environments.

             S7.2      Cyber-safety in healthcare IoT
                       Duncan Sparrell, sFractal Consulting, United States

                       Healthcare is becoming more connected. Risks to patient and public safety are increasing due to
                       cybersecurity attacks. To best thwart cyberattacks, the Internet of health things (IoHT) must
                       respond at machine speed. Cybersecurity standards being developed today will enable future
                       IoHT systems to automatically adapt to cybersecurity threats in real time, based on a quantitative
                       analysis of reasonable mitigations performing triage to economically optimize the overall
                       healthcare outcome. This paper will discuss cybersecurity threats, risk, health impact, and how
                       future IoHT cybersecurity systems will adapt to threats in real time.











                                                          – 207 –
   222   223   224   225   226   227   228   229   230   231   232