Well File:


How to strike the balance between privacy and personalization in healthcare and beyond - Help Net Security


The trade-off between widespread technology adoption and responsible use often lies on the spectrum of privacy. When it comes to technologies fueled by data, such as artificial intelligence (AI), it's even harder to strike the balance between equitable access and inherent risk. This is felt heavily in the healthcare industry, as regulations around information sharing are generally more stringent than those for other verticals. Because of laws like HIPAA, healthcare has had a head start in changing its approach to handling personally identifiable information (PII) and other sensitive information, while still leveraging technology and working with third parties to streamline processes. And they've figured out how to do this without sharing their valuable data. This is contradictory to the long-held belief that SaaS companies require customer data to improve services and get accurate, unbiased insights--it's simply not the case.

A multiagent based framework secured with layered SVM-based IDS for remote healthcare systems

arXiv.org Artificial Intelligence

Since the number of elderly and patients who are in hospitals and healthcare centers are growing, providing efficient remote healthcare services seems very important. Currently, most such systems benefit from the distribution and autonomy features of multiagent systems and the structure of wireless sensor networks. On the one hand, securing the data of remote healthcare systems is one of the most significant concerns; particularly recent types of research about the security of remote healthcare systems keep them secure from eavesdropping and data modification. On the other hand, existing remote healthcare systems are still vulnerable against other common attacks of healthcare networks such as Denial of Service (DoS) and User to Root (U2R) attacks, because they are managed remotely and based on the Internet. Therefore, in this paper, we propose a secure framework for remote healthcare systems that consists of two phases. First, we design a healthcare system base on multiagent technology to collect data from a sensor network. Then, in the second phase, a layered architecture of intrusion detection systems that uses Support Vector Machine to learn the behavior of network traffic is applied. Based on our framework, we implement a secure remote healthcare system and evaluate this system against the frequent attacks of healthcare networks such as Smurf, Buffer overflow, Neptune, and Pod attacks. In the end, evaluation parameters of the layered architecture of intrusion detection systems prove the efficiency and correctness of our proposed framework.

Why the Future of Healthcare is Federated AI - insideBIGDATA


In this special guest feature, Akshay Sharma, Executive Vice President of Artificial Intelligence (AI) at Sharecare, highlights advancements and impact of federated AI and edge computing for the healthcare sector as it ensures data privacy and expands the breadth of individual, organizational, and clinical knowledge. Sharma joined Sharecare in 2021 as part of its acquisition of doc.ai, the Silicon Valley-based company that accelerated digital transformation in healthcare. Sharma previously held various leadership positions including CTO, and vice president of engineering, a role in which he developed several key technologies that power mobile-based privacy products in healthcare. In addition to his role at Sharecare, Sharma serves as CTO of TEDxSanFrancisco and also is involved in initiatives to decentralize clinical trials. Sharma holds bachelor's degrees in engineering and engineering in information science from Visvesvaraya Technological University.

Hackers breach thousands of security cameras, exposing Tesla, jails and hospitals

The Japan Times

A group of hackers say they breached a massive trove of security-camera data collected by Silicon Valley startup Verkada Inc., gaining access to live feeds of 150,000 surveillance cameras inside hospitals, companies, police departments, prisons and schools. Companies whose footage was exposed include carmaker Tesla Inc. and software provider Cloudflare Inc. In addition, hackers were able to view video from inside women's health clinics, psychiatric hospitals and the offices of Verkada itself. Some of the cameras, including in hospitals, use facial-recognition technology to identify and categorize people captured on the footage. The hackers say they also have access to the full video archive of all Verkada customers.

Fairness for Unobserved Characteristics: Insights from Technological Impacts on Queer Communities

arXiv.org Artificial Intelligence

Advances in algorithmic fairness have largely omitted sexual orientation and gender identity. We explore queer concerns in privacy, censorship, language, online safety, health, and employment to study the positive and negative effects of artificial intelligence on queer communities. These issues underscore the need for new directions in fairness research that take into account a multiplicity of considerations, from privacy preservation, context sensitivity and process fairness, to an awareness of sociotechnical impact and the increasingly important role of inclusive and participatory research processes. Most current approaches for algorithmic fairness assume that the target characteristics for fairness--frequently, race and legal gender--can be observed or recorded. Sexual orientation and gender identity are prototypical instances of unobserved characteristics, which are frequently missing, unknown or fundamentally unmeasurable. This paper highlights the importance of developing new approaches for algorithmic fairness that break away from the prevailing assumption of observed characteristics.

How Might Artificial Intelligence Applications Impact Risk Management?


Artificial intelligence (AI) applications have attracted considerable ethical attention for good reasons. Although AI models might advance human welfare in unprecedented ways, progress will not occur without substantial risks. This article considers 3 such risks: system malfunctions, privacy protections, and consent to data repurposing. To meet these challenges, traditional risk managers will likely need to collaborate intensively with computer scientists, bioinformaticists, information technologists, and data privacy and security experts. This essay will speculate on the degree to which these AI risks might be embraced or dismissed by risk management.

Use of AI in healthcare can solve the inequality of access


MY 85-year-old uncle was hospitalised due to ageing issues at a private hospital in Kolkata, India. In the intensive care unit, he contracted Covid-19 from another patient whose infection the hospital was not even aware of. It took the hospital days to figure out that many of its ICU patients, doctors and other professionals were already infected. The pandemic shows us the inequality of healthcare access. This collective global experience will invariably lead to demands of massive upscaling of healthcare.

AI and machine learning: a gift, and a curse, for cybersecurity


The Universal Health Services attack this past month has brought renewed attention to the threat of ransomware faced by health systems – and what hospitals can do to protect themselves against a similar incident. Security experts say that the attack, beyond being one of the most significant ransomware incidents in healthcare history, may also be emblematic of the ways machine learning and artificial intelligence are being leveraged by bad actors. With some kinds of "early worms," said Greg Foss, senior cybersecurity strategist at VMware Carbon Black, "we saw [cybercriminals] performing these automated actions, and taking information from their environment and using it to spread and pivot automatically; identifying information of value; and using that to exfiltrate." The complexity of performing these actions in a new environment relies on "using AI and ML at its core," said Foss. Once access is gained to a system, he continued, much malware doesn't require much user interference.

How 5G Will Impact - Dramatically Change - Individuals, Industries, nments


But the potential for 5G in business leaves plenty of room for excitement, too, and organizations should also start thinking about how 5G could improve processes and production. The time to dream is now.

AI and IoT Power Self-Serve Health Clinics


Advances in China's standard of living provide more people with access to healthcare. Nonetheless, with life expectancies now averaging 76.5 years, medical costs are on the rise. And while the number of top-tier hospitals throughout the country has more than doubled, the annual number of outpatient visits increased almost fourfold during that same period. Improving patient outcomes now relies on the use of new technologies such as real-time analytics, facial recognition, and the IoT. Innovation enables more people to get better access to healthcare information and advice without going to a hospital or waiting to see a doctor. It can also reduce the strain on overburdened medical personnel and resources by automating collection, transmission, and storage of healthcare data used in patient records.