Security Risks and User Perception towards Adopting Wearable Internet of Medical Things
The Wearable Internet of Medical Things (WIoMT) is a collective term for all wearable medical devices connected to the internet to facilitate the collection and sharing of health data such as blood pressure, heart rate, oxygen level, and more. Standard wearable devices include smartwatches and fitne...
Saved in:
Published in | International journal of environmental research and public health Vol. 20; no. 8; p. 5519 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Switzerland
MDPI AG
14.04.2023
MDPI |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The Wearable Internet of Medical Things (WIoMT) is a collective term for all wearable medical devices connected to the internet to facilitate the collection and sharing of health data such as blood pressure, heart rate, oxygen level, and more. Standard wearable devices include smartwatches and fitness bands. This evolving phenomenon due to the IoT has become prevalent in managing health and poses severe security and privacy risks to personal information. For better implementation, performance, adoption, and secured wearable medical devices, observing users' perception is crucial. This study examined users' perspectives of trust in the WIoMT while also exploring the associated security risks. Data analysed from 189 participants indicated a significant variance (R
= 0.553) on intention to use WIoMT devices, which was determined by the significant predictors (95% Confidence Interval;
< 0.05) perceived usefulness, perceived ease of use, and perceived security and privacy. These were found to have important consequences, with WIoMT users intending to use the devices based on the trust factors of usefulness, easy to use, and security and privacy features. Further outcomes of the study identified how users' security matters while adopting the WIoMT and provided implications for the healthcare industry to ensure regulated devices that secure confidential data. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
ISSN: | 1660-4601 1661-7827 1660-4601 |
DOI: | 10.3390/ijerph20085519 |