Real-Time Location System-Based Asset Tracking in the Healthcare Field

Total Page:16

File Type:pdf, Size:1020Kb

Real-Time Location System-Based Asset Tracking in the Healthcare Field Yoo et al. BMC Medical Informatics and Decision Making (2018) 18:80 https://doi.org/10.1186/s12911-018-0656-0 RESEARCH ARTICLE Open Access Real-time location system-based asset tracking in the healthcare field: lessons learned from a feasibility study Sooyoung Yoo1†, Seok Kim1†, Eunhye Kim1, Eunja Jung2, Kee-Hyuck Lee1 and Hee Hwang1* Abstract Background: Numerous hospitals and organizations have recently endeavored to study the effects of real-time location systems. However, their experiences of system adoption or pilot testing via implementation were not shared with others or evaluated in a real environment. Therefore, we aimed to share our experiences and insight regarding a real-time location system, obtained via the implementation and operation of a real-time asset tracking system based on Bluetooth Low Energy/WiFi in a tertiary care hospital, which can be used to improve hospital efficiency and nursing workflow. Methods: We developed tags that were attached to relevant assets paired with Bluetooth Low Energy sensor beacons, which served as the basis of the asset tracking system. Problems with the system were identified during implementation and operation, and the feasibility of introducing the system was evaluated via a satisfaction survey completed by end users after 3 months of use. Results: The results showed that 117 nurses who had used the asset tracking system for 3 months were moderately satisfied (2.7 to 3.4 out of 5) with the system, rated it as helpful, and were willing to continue using it. In addition, we identified 4 factors (end users, target assets, tracking area, and type of sensor) that should be considered in the development of asset tracking systems, and 4 issues pertaining to usability (the active tag design, technical limitations, solution functions, and operational support). Conclusions: The successful introduction of asset tracking systems based on real-time location in hospitals requires the selection of clear targets (e.g., users and assets) via analysis of the user environment and implementation of appropriate technical improvements in the system as required (e.g., miniaturization of the tag size and improvement of the sensing accuracy). Keywords: Asset tracking, Efficiency, Healthcare, Real-time locating system, System implementation Background commodities in medical sites, and when their shifts end, The appropriate placement and supply of commodities they transfer responsibility for the equipment in their de- in hospitals not only improves the quality of patient partments and wards to nurses on the next shift. There- treatment but also influences the outcomes of treatment fore, the effective management of commodities and a in emergency situations. Therefore, commodity man- reduction in the time required to transfer them between agement could be considered an exceedingly import- nurses would not only increase the time available to ant task that should not be neglected by hospitals [1–4]. nurses for the provision of patient care but also improve Nurses are generally tasked with the management of care quality [5–9]. One method of improving commodity management * Correspondence: [email protected]; [email protected] involves real-time location systems (RTLSs), which are † Sooyoung Yoo and Seok Kim contributed equally to this work. used to manage assets efficiently in other industries. 1Office of eHealth Research and Businesses, Seoul National University Bundang Hospital, 166, Gumi-ro, Bundang-gu, Seongnam-si 436-707, South Interest in the introduction of these systems to the Korea healthcare field is increasing, [10] albeit gradually [5, 11]. Full list of author information is available at the end of the article © The Author(s). 2018 Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated. Yoo et al. BMC Medical Informatics and Decision Making (2018) 18:80 Page 2 of 10 In healthcare, RTLS solutions are used mainly to track active tags, and web-based asset management application medical staff, patients, and assets. The introduction of during the 13-month period. these solutions has been shown to provide hospitals with The asset tracking system tracked the locations of as- certain benefits [5, 7, 10, 12–16] including cost reduction, sets throughout every ward in the hospital using the improvements in medical care quality and work processes, existing WiFi infrastructure; however, we used separate and increased patient satisfaction. BLE beacons to provide location measurements with Recently, the healthcare sector has adopted the bar- greater accuracy in the emergency room and the storage code, radio-frequency identification (RFID), WiFi, and areas of the wards. The location of each asset and the Bluetooth sensing technology in the development of status of the active tag battery could be checked using tracking systems. Barcode technology, in particular, has the hospital information system, into which the asset been widely adopted by nurses to reduce medication ad- management system was integrated. Figure 1 shows the ministration errors and the related costs and to improve overall architecture of the BLE/WiFi-based asset track- patient safety [17]. Furthermore, previous studies have ing system. shown that these systems are effective in reducing costs, The asset management application consisted of 2 improving the quality of medical services, enhancing applications: 1 for users (i.e., nurses) and 1 for system work processes, and boosting patient satisfaction, by administrators. In the user application, the types and po- tracking medical professionals and patients [6, 8, 10, sitions of the assets on each floor were depicted as a 12–16, 18, 19]. RTLS technology is based mainly on bird’s eye view of the entire hospital, with the detailed the use of WiFi and RFID, although some research locations marked clearly on a floor plan (see Fig. 2). The has examined whether Bluetooth could be used as the user application also provided detailed location informa- basis of RTLSs [5, 6, 20]. Researchers in the healthcare tion according to the asset status (i.e., onsite, offsite, or field have demonstrated strong interest in localization sys- borrowed) for each department. In contrast, the admin- tems; however, these systems are still in their infancy. istrator application provided information regarding the Given the differences between sensors in terms of track- registration and management of target assets, the assets’ able distance, cost, and accuracy, people should consider most recent locations and location histories, whether as- the pros and cons of sensors to ensure selection of the sets were onsite or offsite, and battery power levels for most appropriate product [21]. In addition, the user inter- the tags. In addition, administrators could check the face, security, and effects of interference need to be con- status of specific assets and all assets in a registered de- sidered [22, 23]. Therefore, system users should share partment using the search filter. their experiences of implementation with others to aid medical institutions that are willing to adopt the technol- Active tags and BLE beacons ogy in developing the most suitable systems [6, 11]. The active tags and BLE beacons were designed in con- Therefore, this study aimed to share considerations sideration of the characteristics of the medical environ- and insights and to provide information regarding the ment and RTLS-based tracking system. Because the adoption of an RTLS in a medical environment, obtained active tags were used to track highly mobile assets, they via the implementation and operation of a real-time were battery operated and able to transmit their own Bluetooth Low Energy (BLE)/WiFi-based asset tracking location information based on data received from the system in a tertiary general university hospital. beacon. Battery capacity was prioritized during the pro- duction stage, with the aim of maximizing the conveni- ence of the tags. We ultimately selected tags that were Methods 66 × 40 × 25 mm in size and required 2 AA batteries Development of the BLE/WiFi-based asset tracking system (3000 mAh, 3.0 V). We attached tags to a total of 400 The development of the asset tracking system initially instruments, including 4 iPads and 21 oxygen holders in involved obtaining the definition of the asset manage- the emergency room, 200 infusion pumps in the emer- ment process by various medical professionals including gency room and 3 intensive care units (ICUs), and 160 a medical doctor, 4 nurses, a medical informatics profes- patient monitors and 15 bladder scanners in all depart- sor, and 2 staff members from the asset management de- ments. The tag locations were selected to minimize partment at the tertiary general university hospital to interference with the equipment and prioritized accord- which the authors are affiliated. Thirty developers ultim- ing to improvements in nursing workflow and relocation ately participated in the development process, which frequency. took place over the course of 13 months, from November The beacons relied on BLE, which is a low-power, 2013 to November 2014. For approximately 2 months low-cost solution that has been used widely in recent thereafter, we stabilized the system and performed tests to years. They operated with replaceable batteries to obvi- improve the software used to develop the BLE beacon, ate the need for separate power supplies. The beacons Yoo et al. BMC Medical Informatics and Decision Making (2018) 18:80 Page 3 of 10 Fig. 1 Overall architecture of the asset tracking system Fig. 2 Interface of the asset tracking system for users (Nurses) Yoo et al.
Recommended publications
  • Tied up in Knotts? Gps Technology and the Fourth Amendment
    TIED UP IN KNOTTS? GPS TECHNOLOGY AND THE FOURTH AMENDMENT * Renée McDonald Hutchins Judicial and scholarly assessment of emerging technology seems poised to drive the Fourth Amendment down one of three paths. The first would simply relegate the amendment to a footnote in history books by limiting its reach to harms that the framers specifically envisioned. A modified version of this first approach would dispense with expansive constitutional notions of privacy and replace them with legislative fixes. A third path offers the amendment continued vitality but requires the U.S. Supreme Court to overhaul its Fourth Amendment analysis. Fortunately, a fourth alternative is available to cabin emerging tech- nologies within the existing doctrinal framework. Analysis of satellite-based tracking illustrates this last approach. The Global Positioning System (GPS) allows law enforcement officials to monitor an individual’s precise movements for weeks or months at a time. GPS technology not only is substantially different than anything the Court has previously considered, but also is a substantial threat to fundamental notions of privacy. By illustrating how, with only minor tweaking, existing Fourth Amendment law can effectively rein in intrusive applications of this one emerging technology, this Article begins to construct an analytical framework that can be applied more broadly to future technological enhancements. This Article begins by reviewing the science and capabilities of GPS- enhanced surveillance. It concludes that satellite-based tracking is a powerful investigative tool that enables authorities to monitor the movements (both indoors and out) of an unlimited number of people for weeks or months at a time. This Article then examines the Court’s historical treatment of techno- logically enhanced surveillance, and shows that the intrusiveness of an emerging technology is critical to its constitutional treatment.
    [Show full text]
  • Asset Tracking and Inventory Systems Market Survey Report
    System Assessment and Validation for Emergency Responders (SAVER) Asset Tracking and Inventory Systems Market Survey Report December 2016 Prepared by the National Urban Security Technology Laboratory Approved for public release, distribution is unlimited. The Asset Tracking and Inventory Systems Market Survey Report was prepared by the National Urban Security Technology Laboratory of the U.S. Department of Homeland Security, Science and Technology Directorate. The views and opinions of authors expressed herein do not necessarily reflect those of the U.S. Government. Reference herein to any specific commercial products, processes, or services by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement, recommendation, or favoring by the U.S. Government. The information and statements contained herein shall not be used for the purposes of advertising, nor to imply the endorsement or recommendation of the U.S. Government. With respect to documentation contained herein, neither the U.S. Government nor any of its employees make any warranty, express or implied, including but not limited to the warranties of merchantability and fitness for a particular purpose. Further, neither the U.S. Government nor any of its employees assume any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed; nor do they represent that its use would not infringe privately owned rights. The cover photo and images included herein were provided by the National Urban Security Technology Laboratory, unless otherwise noted. FOREWORD The U.S. Department of Homeland Security (DHS) established the System Assessment and Validation for Emergency Responders (SAVER) Program to assist emergency responders making procurement decisions.
    [Show full text]
  • RTLS Provides Real-Time Data Giving You the Insight Needed to Make Informed Decisions That Helps Deliver Better Outcomes for Your Patients, and Your Bottom Line
    Real-Time Locating Systems RTLS provides real-time data giving you the insight needed to make informed decisions that helps deliver better outcomes for your patients, and your bottom line. Asset Tracking Patient Tracking Capture every step of the patient journey with patient tracker solutions that help track and monitor the location of your patients, helping caregivers provide optimal care and safety. Analyse treatment and location data to optimise workflows and ensure patients with critical heart or stroke risks can get treated as quickly as possible. Lower Operational Costs Our solution improves utilisation rates of existing equipment, reducing the unnecessary purchase Sensors and tags are placed on your critical medical of extra inventory. assets and devices: workstations on wheels, medical tablets, patient blood bags, IV pumps, heart monitors, Improve Inventory beds, wheelchairs and anything that influences patient Management outcomes or has high monetary value. Our readers Ensure your staff has ready access • Reduce time to treatment automatically note the location of the asset or device as it to all of the critical supplies and moves – providing real-time visibility into each and every assets they need, when they need • Improve patient monitoring item. them. • Secure mother-infant tracking Automate Clinical Inventory Free staff to focus on patient Patient tracking and infant security systems ensure proper care by automating inventory mother-to-infant matching, providing optimal safety and management. See real-time security for the newborn. inventory data, monitor trends and order before supplies fall below critical levels. Zebra’s solutions help track cognitively and physically Success Story: impaired patients, allowing staff to monitor patient Click here to see how University Health System location at all times and prevent falls and injury.
    [Show full text]
  • Bill Analysis and Fiscal Impact Statement
    The Florida Senate BILL ANALYSIS AND FISCAL IMPACT STATEMENT (This document is based on the provisions contained in the legislation as of the latest date listed below.) Prepared By: The Professional Staff of the Committee on Judiciary BILL: SB 144 INTRODUCER: Senators Brandes and Rodrigues SUBJECT: Searches of Cellular Phones and Other Electronic Devices DATE: March 1, 2021 REVISED: ANALYST STAFF DIRECTOR REFERENCE ACTION 1. Cellon Jones CJ Favorable 2. Bond Cibula JU Pre-meeting 3. RC I. Summary: SB 144 amends chs. 933 and 934, F.S., relating to search warrants and the security of communications, to address privacy issues related to the use of communication technology and the contents of stored electronic communications. The bill amends ch. 933, F.S., by: Codifying the state constitutional provision that extends the security against unreasonable searches or seizures to the interception of private communications by any means; and Expanding the grounds for issuance of a search warrant to include that the content within certain communication devices constitutes evidence relevant to proving a felony. The bill amends ch. 934, F.S., by: Providing legislative intent; Defining the terms “historical location data,” “microphone-enabled household device,” “mobile tracking device,” “real-time location tracking,” and “portable electronic communication device”; Amending the definition of oral communication to include the use of a microphone-enabled household device; Amending the definition of electronic communication, adding the terms “communication
    [Show full text]
  • A Survey of Indoor Localization Systems and Technologies Faheem Zafari, Student Member, IEEE, Athanasios Gkelias, Senior Member, IEEE, Kin K
    1 A Survey of Indoor Localization Systems and Technologies Faheem Zafari, Student Member, IEEE, Athanasios Gkelias, Senior Member, IEEE, Kin K. Leung, Fellow, IEEE Abstract—Indoor localization has recently witnessed an in- cities [5], smart buildings [6], smart grids [7]) and Machine crease in interest, due to the potential wide range of services it Type Communication (MTC) [8]. can provide by leveraging Internet of Things (IoT), and ubiqui- IoT is an amalgamation of numerous heterogeneous tech- tous connectivity. Different techniques, wireless technologies and mechanisms have been proposed in the literature to provide nologies and communication standards that intend to provide indoor localization services in order to improve the services end-to-end connectivity to billions of devices. Although cur- provided to the users. However, there is a lack of an up- rently the research and commercial spotlight is on emerging to-date survey paper that incorporates some of the recently technologies related to the long-range machine-to-machine proposed accurate and reliable localization systems. In this communications, existing short- and medium-range technolo- paper, we aim to provide a detailed survey of different indoor localization techniques such as Angle of Arrival (AoA), Time of gies, such as Bluetooth, Zigbee, WiFi, UWB, etc., will remain Flight (ToF), Return Time of Flight (RTOF), Received Signal inextricable parts of the IoT network umbrella. While long- Strength (RSS); based on technologies such as WiFi, Radio range IoT technologies aim to provide high coverage and low Frequency Identification Device (RFID), Ultra Wideband (UWB), power communication solution, they are incapable to support Bluetooth and systems that have been proposed in the literature.
    [Show full text]
  • Privacy-Preserving Location Tracking of Lost Or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with Dhts
    Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs Thomas Ristenpart∗ Gabriel Maganis† Arvind Krishnamurthy† Tadayoshi Kohno† ∗University of California, San Diego †University of Washington [email protected] {gym,arvind,yoshi}@cs.washington.edu Abstract recover the device itself. The number of companies of- We tackle the problem of building privacy-preserving fering such services, e.g., [1, 9, 21, 29, 34, 37, 38], attests device-tracking systems — or private methods to assist in to the large and growing market for device tracking. the recovery of lost or stolen Internet-connected mobile Unfortunately, these systems are incompatible with devices. The main goals of such systems are seemingly the oft-cited goal of location privacy [17, 22, 23] since contradictory: to hide the device’s legitimately-visited the device-tracking services can always monitor the lo- locations from third-party services and other parties (lo- cation of an Internet-enabled device — even while the cation privacy) while simultaneously using those same device is in its owner’s possession. This presents a signif- services to help recover the device’s location(s) after it icant barrier to the psychological acceptability of track- goes missing (device-tracking). We propose a system, ing services. To paraphrase one industry representative: named Adeona, that nevertheless meets both goals. It companies will deploy these systems in order to track provides strong guarantees of location privacy while pre- their devices, but they won’t like it. The current situation serving the ability to efficiently track missing devices. leaves users of mobile devices in the awkward position of We build a version of Adeona that uses OpenDHT as the either using tracking services or protecting their location third party service, resulting in an immediately deploy- privacy.
    [Show full text]
  • Evaluation of Real-Time Location Systems in Their Hospital Contexts
    Author's personal copy i n t e r n a t i o n a l j o u r n a l o f m e d i c a l i n f o r m a t i c s 8 1 ( 2 0 1 2 ) 705–712 j ournal homepage: www.ijmijournal.com Evaluation of real-time location systems in their hospital contexts a,∗ b Jill A. Fisher , Torin Monahan a Center for Biomedical Ethics and Society, Vanderbilt University, Nashville, TN, USA b Department of Human and Organizational Development, Vanderbilt University, Nashville, TN, USA a r t i c l e i n f o a b s t r a c t Article history: Objective: The purpose of the research was to assess real-time location systems (RTLS) that Received 9 November 2011 have been implemented in U.S. hospitals. We examined the type of uses to which RTLS Received in revised form have been put, the degree of functionality of the various technologies and software, and the 14 May 2012 organizational effects of implementing RTLS. Accepted 3 July 2012 Methods: The project was a 3-year qualitative study of 23 U.S. hospitals that had imple- mented RTLS for the purpose of tracking assets, personnel, and/or patients. We observed the systems in use and conducted 80 semi-structured interviews with hospital personnel Keywords: and vendors. In order to protect the confidentiality of the hospitals and vendors in our sam- Real-time location systems (RTLS) ple, we conducted an aggregate analysis of our findings rather than providing evaluations RFID of specific technologies or hospital case studies.
    [Show full text]
  • The Limits of Location Tracking in an Epidemic
    The Limits of Location Tracking in an Epidemic By Jay Stanley and Jennifer Stisa Granick April 8, 2020 As Americans struggle to confront the COVID-19 outbreak, some have suggested that cell phone location tracking technology can help in the effort to contain the disease. The tech industry and the White House are reportedly having conversations over how information technology might be deployed, and there is increasing discussion about how foreign countries are using technology. The governor of Florida has even floated the idea of using an app to track visitors from COVID-19 hotspot New York. However, policymakers must have a realistic understanding of what data produced by individuals’ mobile phones can and cannot do. As always, there is a danger that simplistic understandings of how technology works will lead to investments that do little good, or are actually counterproductive, and that invade privacy without producing commensurate benefits. As we write this white paper, public health experts say that the nation has three urgent needs: strong social distancing measures, widespread testing capability, and material support for hospitals being overwhelmed by victims. However, once our hospitals reach a point where they’re able to handle the stream of new patients, experts say that indiscriminate population- wide social distancing measures may give way to a new phase: chronic, lower-level waves of infection in which a combination of widespread testing, individualized quarantine orders, and traditional epidemiological contact tracing once again become a principal means of combatting the disease. It would be in such a period — the window between the end of the initial wave and the development of a vaccine — that using certain forms of data generated by cell phones — such as location histories or records of proximity to other devices — might make sense.
    [Show full text]
  • Reasonable Expectations of Privacy and Novel Search Technologies: an Economic Approach Steven Penney
    Journal of Criminal Law and Criminology Volume 97 Article 3 Issue 2 Winter Winter 2007 Reasonable Expectations of Privacy and Novel Search Technologies: An Economic Approach Steven Penney Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Steven Penney, Reasonable Expectations of Privacy and Novel Search Technologies: An Economic Approach, 97 J. Crim. L. & Criminology 477 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0477 THEJOURNAL OF CRIMINAL LAW & CRIMINOLOGY Vol. 97, No. 2 Copyright © 2007 by NorthwesternUniversity, Schoolof Law Printed in U.S.A. REASONABLE EXPECTATIONS OF PRIVACY AND NOVEL SEARCH TECHNOLOGIES: AN ECONOMIC APPROACH STEVEN PENNEY* The "reasonable expectation of privacy" test, which defines the scope of constitutionalprotection from governmental privacy intrusions in both the United States and Canada, is notoriously indeterminate. This indeterminacy stems in large measure from the tendency ofjudges to think ofprivacy in non-instrumentalistterms. This "moral" approach to privacy is normatively questionable, and it does a poor job of identifying the circumstances in which privacy should prevail over countervailing interests, such as the deterrence of crime. In this Article, I develop an alternative,economically-informed approach to the reasonable expectation of privacy test. In contrast to the moral approach, which treatsprivacy as a fundamental right, the economic approach views it as an (normatively neutral) aspect of self-interest: the desire to conceal and control potentially damagingpersonal information.
    [Show full text]
  • Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children
    Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children on the Technologies of New Information Study on the Effects Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children UNITED NATIONS OFFICE ON DRUGS AND CRIME Vienna Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children UNITED NATIONS New York, 2015 © United Nations, May 2015. All rights reserved, worldwide. This report has not been formally edited and remains subject to editorial changes. The contents of this report do not necessarily reflect the views or policies of UNODC or contributory organizations and neither do they imply any endorsement. The designations employed and the presentation of material in this publication do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries. Information on uniform resource locators and links to Internet sites contained in the present publication are provided for the convenience of the reader and are correct at the time of issue. The United Nations takes no responsibility for the continued accuracy of that information or for the content of any external website. Publishing production: English, Publishing and Library Section, United Nations Office at Vienna. Acknowledgements This report was prepared pursuant to ECOSOC resolution 2011/33 on Prevention, protection and international cooperation against the use of new information technologies to abuse and/or exploit children by Conference Support Section, Organized Crime Branch, Division for Treaty Affairs, UNODC, under the supervision of John Sandage (former Director, Division for Treaty Affairs), Sara Greenblatt and Loide Lungameni (former and current Chief, Organized Crime Branch, respectively), and Gillian Murray (former Chief, Conference Support Section).
    [Show full text]
  • Surveillance and Privacy – Beyond the Panopticon. an Exploration of 720-Degree Observation in Level 3 and 4 Vehicle Automation
    Technology in Society 66 (2021) 101667 Contents lists available at ScienceDirect Technology in Society journal homepage: www.elsevier.com/locate/techsoc Surveillance and privacy – Beyond the panopticon. An exploration of 720-degree observation in level 3 and 4 vehicle automation Tim Jannusch a,b,*, Florian David-Spickermann a, Darren Shannon a, Juliane Ressel a,b, Michaele Voller¨ b, Finbarr Murphy a, Irini Furxhi a, Martin Cunneen a, Martin Mullins a a Emerging Risk Group, Kemmy Business School, University of Limerick, Ireland b Institute for Insurance Studies, TH Koln,¨ Germany ARTICLE INFO ABSTRACT Keywords: On the path to high-level vehicle automation, the degree of surveillance both inside and outside the car increases Vehicle Automation significantly.Consequently, ethical considerations are becoming central to questions around surveillance regimes Surveillance and data privacy implicit in level 3 and 4 vehicle automation. In this paper, we focus on outputs from the EU Privacy Horizon 2020 project Vision Inspired Driver Assistance Systems (VI-DAS). In particular, we assess the VI-DAS Panopticon 720-degree observation technology, critical to ensuring a safe Human Machine Interaction (HMI), from multi­ Contextual Integrity 720-Degree Observation ple theoretical perspectives to contribute to a better understanding of the phenomena of privacy. As a synonym for surveillance, we started our evaluation with Bentham’s ideation of the panopticon. From there, it is a rela­ tively short step to radical Foucauldian critiques that offered more dystopian technologies of power. However, both theorems demonstrate a limited understanding of the issue of data privacy in the context of safe trans­ portation along the evolution of highly automated vehicles.
    [Show full text]
  • Electronic Tracking Devices and Privacy: See No Evil, Hear No Evil, but Beware of Trojan Horses Kara L
    Loyola University Chicago Law Journal Volume 9 Article 8 Issue 1 Fall 1977 1977 Electronic Tracking Devices and Privacy: See No Evil, Hear No Evil, But Beware of Trojan Horses Kara L. Cook Follow this and additional works at: http://lawecommons.luc.edu/luclj Part of the Fourth Amendment Commons Recommended Citation Kara L. Cook, Electronic Tracking Devices and Privacy: See No Evil, Hear No Evil, But Beware of Trojan Horses, 9 Loy. U. Chi. L. J. 227 (2015). Available at: http://lawecommons.luc.edu/luclj/vol9/iss1/8 This Note is brought to you for free and open access by LAW eCommons. It has been accepted for inclusion in Loyola University Chicago Law Journal by an authorized administrator of LAW eCommons. For more information, please contact [email protected]. Electronic Tracking Devices and Privacy: See No Evil, Hear No Evil, But Beware Of Trojan Horses The danger of unbounded liberty and the danger of bounding it have produced a problem in the science of government which human understanding seems hitherto unable to solve. Dr. Samuel Johnson INTRODUCTION In the late 1700's when Dr. Samuel Johnson wrote of the conflict between "bounded and unbounded liberty" he was unduly optimis- tic when he implied that the problem was solvable. Two hundred years later, the attainment of an equilibrium between the needs of law enforcement and the right to individual privacy continues to elude human understanding. Privacy, the right "to be let alone,"' needs to be weighed by the courts against the long-recognized maxim that "the safety of the people is the highest law."'2 However, an imbalance exists because each interest, and the importance attached to each by society, is dynamic.
    [Show full text]