2002
DOI: 10.24908/ss.v5i3.3423
|View full text |Cite
|
Sign up to set email alerts
|

Securing the Elderly Body: Dementia, Surveillance, and the Politics of "Aging in Place"

Abstract: Aging in place, the option to grow old in one's home instead of institutional healthcare facilities, is predicated on the development of technologies and resources that network patients, caregivers, medical personnel, and third party interlocutors. Monitoring systems and other information technologies are broadly considered to be the most promising means to establish these connections, and home care technologies for elderly people with dementia comprise one of the fastest growing areas of commercial developmen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
73
0
1

Year Published

2012
2012
2019
2019

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 57 publications
(74 citation statements)
references
References 12 publications
0
73
0
1
Order By: Relevance
“…Rather than consent being a one-off event, occasional renewals of consent may be necessary to ensure monitoring has not merely been forgotten. This is particularly important for cognitively impaired users unable to grant consent (Kenner 2008;Bowes et al 2012). These concerns can extend to guests of a monitored individual, which suggests the possibility of inadvertent monitoring (Neild et al 2004).…”
Section: Obtrusiveness Stigma and Autonomymentioning
confidence: 99%
See 1 more Smart Citation
“…Rather than consent being a one-off event, occasional renewals of consent may be necessary to ensure monitoring has not merely been forgotten. This is particularly important for cognitively impaired users unable to grant consent (Kenner 2008;Bowes et al 2012). These concerns can extend to guests of a monitored individual, which suggests the possibility of inadvertent monitoring (Neild et al 2004).…”
Section: Obtrusiveness Stigma and Autonomymentioning
confidence: 99%
“…Dependent users may also experience changes to their relationships with carers (Palm et al 2012). In this context, Kenner (2008) suggests, for example, that carers should assess when interventions based on H-IoT data could potentially infringe upon the user's rights to privacy and autonomy.…”
Section: Data Sharing and Autonomymentioning
confidence: 99%
“…The architecture of the IIE is illustrated in Figure 1, where the data collected from the sensor network are wirelessly communicated with a base station and eventually stored in a central database. The IIE relies solely on non-intrusive sensors as research has proven that the use of intrusive technology such as surveillance cameras for patient monitoring is generally not accepted [8]. Hence a combination of door/window entry point sensors, passive infrared motion sensors, and bed/sofa pressure sensors are utilised.…”
Section: Motivationmentioning
confidence: 99%
“…However, a balance must be struck; the inclusion of such a feature on devices designed for cognitively impaired users will pose a significant risk to patient safety. H-IoT should also remain visible to some degree to prevent covert monitoring that would raise questions about the validity of consent over time [5,111], particularly among cognitively impaired users in institutional care environments. H-IoT embedded in a home or institutional care environment can be forgotten following extended use [112,113].…”
Section: Design Devices To Be Unobtrusive According To the Needs Of Smentioning
confidence: 99%