{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T21:10:01Z","timestamp":1772399401797,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,4,18]],"date-time":"2023-04-18T00:00:00Z","timestamp":1681776000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,4,18]],"date-time":"2023-04-18T00:00:00Z","timestamp":1681776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["AI &amp; Soc"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s00146-023-01655-8","type":"journal-article","created":{"date-parts":[[2023,4,18]],"date-time":"2023-04-18T12:02:54Z","timestamp":1681819374000},"page":"1969-1973","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Privacy and surveillance concerns in machine learning fall prediction models: implications for geriatric care and the internet of medical things"],"prefix":"10.1007","volume":"39","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7559-3347","authenticated-orcid":false,"given":"Russell","family":"Yang","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,18]]},"reference":[{"issue":"12","key":"1655_CR1","doi-asserted-by":"publisher","first-page":"2037","DOI":"10.1109\/TPAMI.2006.244","volume":"28","author":"T Ahonen","year":"2006","unstructured":"Ahonen T, Hadid A, Pietikainen M (2006) Face description with local binary patterns: application to face recognition. IEEE Trans Pattern Anal Mach Intell 28(12):2037\u20132041","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"1655_CR2","doi-asserted-by":"crossref","unstructured":"Alazrai R, Mowafi Y, Hamad E, 2015 editors. A fall prediction methodology for elderly based on a depth camera. 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). Pp. 25\u201329","DOI":"10.1109\/EMBC.2015.7319512"},{"key":"1655_CR3","doi-asserted-by":"crossref","unstructured":"Chen Z, Hu W, Wang J, Zhao S, Amos B, Wu G, et al. An empirical study of latency in an emerging class of edge computing applications for wearable cognitive assistance. Proceedings of the Second ACM\/IEEE Symposium on Edge Computing. 2017.","DOI":"10.1145\/3132211.3134458"},{"key":"1655_CR4","unstructured":"Dele. Fall Prevention [cited 2022 Jan 18, 2022]. Available from: https:\/\/delehealth.com\/solutions\/prevention\/."},{"key":"1655_CR5","first-page":"65","volume":"28","author":"F Fabbrini","year":"2015","unstructured":"Fabbrini F (2015) Human rights in the digital age: The European Court of Justice ruling in the data retention case and its lessons for privacy and surveillance in the United States. Harv Hum Rights J 28:65\u201395","journal-title":"Harv Hum Rights J"},{"issue":"3","key":"1655_CR6","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3710","volume":"33","author":"M Hartmann","year":"2022","unstructured":"Hartmann M, Hashmi US, Imran A (2022) Edge computing in smart health care systems: review, challenges, and research directions. Trans Emerg Telecommun Technol 33(3):e3710","journal-title":"Trans Emerg Telecommun Technol"},{"key":"1655_CR7","doi-asserted-by":"crossref","unstructured":"Korshunov P, Ebrahimi T, editors. Using warping for privacy protection in video surveillance. 2013 18th International Conference on Digital Signal Processing (DSP); 2013 1\u20133 July 2013.","DOI":"10.1109\/ICDSP.2013.6622791"},{"issue":"8","key":"1655_CR8","doi-asserted-by":"publisher","first-page":"1537","DOI":"10.1109\/JPROC.2019.2920341","volume":"107","author":"F Liu","year":"2019","unstructured":"Liu F, Tang G, Li Y, Cai Z, Zhang X, Zhou T (2019) A Survey on edge computing systems and tools. Proc IEEE 107(8):1537\u20131562","journal-title":"Proc IEEE"},{"issue":"4","key":"1655_CR9","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1016\/j.clsr.2008.03.001","volume":"24","author":"TJ McIntyre","year":"2008","unstructured":"McIntyre TJ (2008) Data retention in Ireland: privacy, policy and proportionality. Comput Law Secur Rev 24(4):326\u2013334","journal-title":"Comput Law Secur Rev"},{"key":"1655_CR10","doi-asserted-by":"crossref","unstructured":"Nakashima Y, Koyama T, Yokoya N, Babaguchi N, editors. Facial expression preserving privacy protection using image melding. 2015 IEEE International Conference on Multimedia and Expo (ICME); 2015 29 June-3 July 2015.","DOI":"10.1109\/ICME.2015.7177394"},{"issue":"2","key":"1655_CR11","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1109\/TKDE.2005.32","volume":"17","author":"EM Newton","year":"2005","unstructured":"Newton EM, Sweeney L, Malin B (2005) Preserving privacy by de-identifying face images. IEEE Trans Knowl Data Eng 17(2):232\u2013243","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1655_CR12","unstructured":"Ocuvera. AI technology that empowers nurses to prevent patient falls. [cited 2022 Jan 18, 2022]. Available from: https:\/\/ocuvera.com\/."},{"issue":"7","key":"1655_CR13","doi-asserted-by":"publisher","first-page":"12900","DOI":"10.3390\/s140712900","volume":"14","author":"N Pannurat","year":"2014","unstructured":"Pannurat N, Thiemjarus S, Nantajeewarawat E (2014) Automatic fall monitoring: a review. Sensors 14(7):12900","journal-title":"Sensors"},{"key":"1655_CR14","doi-asserted-by":"crossref","unstructured":"Patton M, Gross E, Chinn R, Forbis S, Walker L, Chen H, 2014 editors. Uninvited Connections: A Study of Vulnerable Devices on the Internet of Things (IoT). 2014 IEEE Joint Intelligence and Security Informatics Conference; 2014 24\u201326","DOI":"10.1109\/JISIC.2014.43"},{"key":"1655_CR15","unstructured":"Peterson A. Yes, terrorists could have hacked Dick Cheney's heart: The Washington Post; 2013 [cited 2022 Jan 18, 2022]. Available from: https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2013\/10\/21\/yes-terrorists-could-have-hacked-dick-cheneys-heart\/."},{"key":"1655_CR16","unstructured":"Qventus. The Leader in AI-Powered Healthcare Operations [cited 2022 Jan 18, 2022]. Available from: https:\/\/qventus.com\/."},{"key":"1655_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2021.105572","volume":"41","author":"M Rojszczak","year":"2021","unstructured":"Rojszczak M (2021) The uncertain future of data retention laws in the EU: Is a legislative reset possible? Comput Law Secur Rev 41:105572","journal-title":"Comput Law Secur Rev"},{"issue":"10","key":"1655_CR18","doi-asserted-by":"publisher","first-page":"3481","DOI":"10.3390\/s21103481","volume":"21","author":"V Roshdibenam","year":"2021","unstructured":"Roshdibenam V, Jogerst GJ, Butler NR, Baek S (2021) Machine learning prediction of fall risk in older adults using timed up and go test kinematics. Sensors 21(10):3481","journal-title":"Sensors"},{"key":"1655_CR19","unstructured":"Scott J. Preventing Seniors From Falling is Going to Be a Huge Market: KQED; 2017 [cited 2022 Jan 18, 2022]. Available from: https:\/\/www.kqed.org\/futureofyou\/435417\/dying-from-a-fall-is-top-danger-for-seniors-tech-devices-may-help."},{"issue":"2","key":"1655_CR20","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MPRV.2004.1316817","volume":"3","author":"A Sixsmith","year":"2004","unstructured":"Sixsmith A, Johnson N (2004) A smart sensor to detect the falls of the elderly. IEEE Pervasive Comput 3(2):42\u201347","journal-title":"IEEE Pervasive Comput"},{"key":"1655_CR21","doi-asserted-by":"crossref","unstructured":"Song KS, Nho YH, Kwon DS, 2017 editors. Histogram based fall prediction of patients using a thermal imagery camera. 2017 14th International Conference on Ubiquitous Robots and Ambient Intelligence (URAI); 2017 28 June-1.","DOI":"10.1109\/URAI.2017.7992700"},{"issue":"2","key":"1655_CR22","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/S0736-5853(01)00013-2","volume":"19","author":"G Steinke","year":"2002","unstructured":"Steinke G (2002) Data privacy approaches from US and EU perspectives. Telemat Inform 19(2):193\u2013200","journal-title":"Telemat Inform"},{"issue":"1","key":"1655_CR23","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1162\/jocn.1991.3.1.71","volume":"3","author":"M Turk","year":"1991","unstructured":"Turk M, Pentland A (1991) Eigenfaces for recognition. J Cogn Neurosci 3(1):71\u201386","journal-title":"J Cogn Neurosci"},{"key":"1655_CR24","unstructured":"Viola P, Jones M, editors. Rapid object detection using a boosted cascade of simple features. Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition CVPR 2001; 2001 8\u201314 Dec. 2001."},{"issue":"2","key":"1655_CR25","doi-asserted-by":"publisher","first-page":"162","DOI":"10.31887\/DCNS.2000.2.2\/pwhitehouse","volume":"2","author":"PJ Whitehouse","year":"2000","unstructured":"Whitehouse PJ (2000) Ethical issues in dementia. Dialogues Clin Neurosci 2(2):162\u2013167","journal-title":"Dialogues Clin Neurosci"},{"key":"1655_CR26","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1016\/j.future.2019.12.028","volume":"105","author":"JPA Yaacoub","year":"2020","unstructured":"Yaacoub JPA, Noura M, Noura HN, Salman O, Yaacoub E, Couturier R et al (2020) Securing internet of medical things systems: Limitations, issues and recommendations. Future Gener Comput Syst 105:581\u2013606","journal-title":"Future Gener Comput Syst"},{"issue":"1","key":"1655_CR27","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1038\/s43587-020-00020-4","volume":"1","author":"A Zhavoronkov","year":"2021","unstructured":"Zhavoronkov A, Bischof E, Lee K-F (2021) Artificial intelligence in longevity medicine. Nature Aging 1(1):5\u20137","journal-title":"Nature Aging"}],"container-title":["AI &amp; SOCIETY"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-023-01655-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00146-023-01655-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-023-01655-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T06:13:42Z","timestamp":1723529622000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00146-023-01655-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,18]]},"references-count":27,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["1655"],"URL":"https:\/\/doi.org\/10.1007\/s00146-023-01655-8","relation":{},"ISSN":["0951-5666","1435-5655"],"issn-type":[{"value":"0951-5666","type":"print"},{"value":"1435-5655","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,18]]},"assertion":[{"value":"15 February 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 March 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 April 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author declares that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}