Subscribe to RSS
DOI: 10.1055/s-0041-1727197
Privacy versus Convenience: A Historical Perspective, Analysis of Risks, and an Informatics Call to Action
Funding None.Abstract
Background The pace of technological change dwarfs the pace of social and policy change. This mismatch allows for individual harm from lack of recognition of changes in societal context. The value of privacy has not kept pace with changes in technology over time; individuals seem to discount how loss of privacy can lead to directed personal harm.
Objective The authors examined individuals sharing personal data with mobile health applications (mHealth apps) and compared the current digital context to the historical context of harm. The authors make recommendations to informatics professionals to support consumers who wish to use mHealth apps in a manner that balances convenience with personal privacy to reduce the risk of harm.
Methods A literature search focused by a historical perspective of risk of harm was performed throughout the development of this paper. Two case studies highlight questions a consumer might ask to assess the risk of harm posed by mobile health applications.
Results A historical review provides the context for the collective human experience of harm. We then encapsulate current perceptions and views of privacy and list potential risks created by insufficient attention to privacy management.
Discussion The results provide a historical context for individuals to view the risk of harm and shed light on potential emotional, reputational, economic, and physical harms that can result from naïve use of mHealth apps. We formulate implications for clinical informaticists.
Conclusion Concepts of both harm and privacy have changed substantially over the past 20 years. Technology provides methods to invade privacy and cause harm unimaginable a few decades ago. Only recently have the consequences become clearer. The current regulatory framework is extremely limited. Given the risks of harm and limited awareness, we call upon informatics professionals to support more privacy education and protections and increase mHealth transparency about data usage.
Author Contributions
L.O. conceptualized this paper and initiated the project. All three authors contributed equally to the research, wrote and edited the paper, and approved it for final submission.
Protection of Human and Animal Subjects
No research was performed on human subjects, and no personal health information was obtained, thus institutional review board review was not required.
Supplementary Material
Readers may find details of the search queries in Appendix A.
Publication History
Received: 16 October 2020
Accepted: 24 February 2021
Article published online:
05 May 2021
© 2021. Thieme. All rights reserved.
Georg Thieme Verlag KG
Rüdigerstraße 14, 70469 Stuttgart, Germany
-
References
- 1 Morison EE. Men, Machines and Modern Times. New York: New American Library; A Mentor Book; 1977
- 2 Morison EE. From Know-How to Nowhere: The Development of American Technology. New York: Basic Books, Inc.; 1974
- 3 Adams S. Ubiquitous digital devices and health: reflections on Foucault's notion of the clinic. In: Adams S, Purtova N, Leenes R. eds. Under Observation: The Interplay Between eHealth and Surveillance. Law, Governance, and Technology Series. Vol 35. Cham: Springer; 2017
- 4 Kennedy M. Equifax says 2.4 million more people were impacted by huge 2017 breach. March 1, 2018. Accessed February 23, 2021 at: https://www.npr.org/sections/thetwo-way/2018/03/01/589854759/equifax-says-2-4-million-more-people-were-impacted-by-huge-2017-breach
- 5 Murphy M. A new data breach may have exposed personal information of almost every American adult. MarketWatch. June 28, 2018. Accessed February 23, 2021 at: https://www.marketwatch.com/story/a-new-data-breach-may-have-exposed-personal-information-of-almost-every-american-adult-2018-06-27
- 6 Mumford L. Authoritarian and democratic technics. Technol Cult 1964; 5 (01) 1-8
- 7 Lyall B. Fitness for sale: the value of self-tracking in secondhand exchange. Inf Soc 2019; 35 (03) 109-121
- 8 Geist M. Canada Research Chair in Internet and E-commerce Law, University of Ottawa. The Internet: Do We Really Have No Privacy and Should We Just Get Over It?. November 4, 2014. Accessed February 23, 2021 at: https://www.youtube.com/watch?v=DauecZ6Ja_Q
- 9 Ostrom E, Gardner R, Walker J. Rules, Games, and Common-Pool Resources. Ann Arbor, MI: University of Michigan Press; 1994
- 10 Hess C, Ostrom E. eds. Understanding Knowledge As Commons. From Theory to Practice. Cambridge, MA: MIT Press; 2011
- 11 Zuboff S. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. New York: Public Affairs; 2019
- 12 Webb A. The Big Nine: How the Tech Titans and Their Thinking Machines Could Warp Humanity. New York, NY: Public Affairs; 2019
- 13 Holzmann SL, Holzapfel C. A scientific overview of smartphone applications and electronic devices for weight management in adults. J Pers Med 2019; 9 (02) E31
- 14 Nicholas J, Larsen ME, Proudfoot J, Christensen H. Mobile apps for bipolar disorder: a systematic review of features and content quality. J Med Internet Res 2015; 17 (08) e198
- 15 Goldenberg T, McDougal SJ, Sullivan PS, Stekler JD, Stephenson R. Preferences for a mobile HIV prevention app for men who have sex with men. JMIR Mhealth Uhealth 2014; 2 (04) e47
- 16 Anthony Berauk VL, Murugiah MK, Soh YC, Chuan Sheng Y, Wong TW, Ming LC. Mobile health applications for caring of older people: review and comparison. Ther Innov Regul Sci 2018; 52 (03) 374-382
- 17 Grundy Q, Chiu K, Bero L. Commercialization of user data by developers of medicines-related apps: a content analysis. J Gen Intern Med 2019; 34 (12) 2833-2841
- 18 Sunyaev A, Dehling T, Taylor PL, Mandl KD. Availability and quality of mobile health app privacy policies. J Am Med Inform Assoc 2015; 22 (e1): e28-e33
- 19 Dehling T, Gao F, Schneider S, Sunyaev A. Exploring the far side of mobile health: information security and privacy of mobile health apps on iOS and Android. JMIR Mhealth Uhealth 2015; 3 (01) e8
- 20 Zhou L, Parmanto B, Alfikri Z, Bao J. A mobile app for assisting users to make informed selections in security settings for protecting personal health data: development and feasibility study. JMIR Mhealth Uhealth 2018; 6 (12) e11210
- 21 Sharon T, Zandbergen D. From data fetishism to quantifying selves: self-tracking practices and the other values of data. New Media Soc 2017; 19 (11) 1695-1709
- 22 Garnweidner-Holme L, Hoel Andersen T, Sando MW, Noll J, Lukasse M. Health care professionals' attitudes toward, and experiences of using, a culture-sensitive smartphone app for women with gestational diabetes mellitus: qualitative study. JMIR Mhealth Uhealth 2018; 6 (05) e123
- 23 Weill K. This fertility app is a jackpot for stalkers. Updated April 13, 2017. Accessed February 23, 2021 at: https://www.thedailybeast.com/this-fertility-app-is-a-jackpot-for-stalkers
- 24 Glow Privacy Policy. Updated March 31, 2020. Accessed February 23, 2021 at: https://glowing.com/privacy
- 25 Privacy Policy. California Department of Public Health. Accessed February 23, 2021 at: https://www.cdph.ca.gov/Pages/privacy-policy.aspx
- 26 Covid Alert Data and Privacy. Pennsylvania Department of Health. Accessed February 23, 2021 at: https://www.health.pa.gov/topics/disease/coronavirus/Pages/COVID-Alert-Data.aspx
- 27 Enriquez J. Right/Wrong: How Technology Transforms Our Ethics. Cambridge, MA: MIT Press; 2020
- 28 Catalog of Problematic Data Actions and Problems. NIST Privacy Risk Assessment Methodology (PRAM) package. Accessed February 23, 2021 at: https://www.nist.gov/itl/applied-cybersecurity/privacy-engineering/resources
- 29 Regner T, Riener G. Privacy is precious: on the attempt to lift anonymity on the internet to increase revenue. J Econ Manage Strategy 2017; 26 (02) 318-336
- 30 Stack L, Holson LM. Katie Hill gives farewell speech to congress, denouncing ‘gutter politics. ’ Accessed February 23, 2021 at: https://www.nytimes.com/2019/10/31/us/politics/katie-hill-speech.html
- 31 Sample I. What are deepfakes—and how can you spot them? The Guardian. January 13, 2020. Accessed February 23, 2021 at: https://www.theguardian.com/technology/2020/jan/13/what-are-deepfakes-and-how-can-you-spot-them
- 32 Madden M. Public perceptions of privacy and security in the post-Snowden era. November 12, 2014. Accessed February 23, 2021 at: https://www.pewresearch.org/internet/2014/11/12/public-privacy-perceptions/
- 33 Rainie L, Duggan M. Privacy and information sharing. January 14, 2016. Accessed February 23, 2021 at: http://www.pewinternet.org/2016/01/14/privacy-and-information-sharing/
- 34 Crotty BH, Walker J, Dierks M. et al. Information sharing preferences of older patients and their families. JAMA Intern Med 2015; 175 (09) 1492-1497
- 35 Bell EA, Ohno-Machado L, Grando MA. Sharing my health data: a survey of data sharing preferences of healthy individuals. AMIA Annu Symp Proc 2014; 2014: 1699-1708
- 36 Anon. Trust framework and code of conduct. The CARIN alliance code of conduct. Accessed February 23, 2021 at: https://www.carinalliance.com/our-work/trust-framework-and-code-of-conduct/
- 37 General Data Protection Regulations. . Accessed February 23, 2021 at: https://gdpr-info.eu/
- 38 Fitzherbert J. The Book of Husbandry. 1523 . Reported first use of phrase, as “[The horse] is no chapmans ware yf he be wylde: but and he be tame and haue ben rydden vpon, than caueat emptor, be ware thou byer.” Accessed February 23, 2021 at: https://people.howstuffworks.com/caveat-emptor.htm
- 39 Kaplan B. Selling health data: de-identification, privacy, and speech. Camb Q Healthc Ethics 2015; 24 (03) 256-271
- 40 Baumel A, Faber K, Mathur N, Kane JM, Muench F. Enlight: a comprehensive quality and therapeutic potential evaluation tool for mobile and web-based ehealth interventions. J Med Internet Res 2017; 19 (03) e82
- 41 Zhu G, Liu H, Feng M. An evolutionary game-theoretic approach for assessing privacy protection in mHealth systems. Int J Environ Res Public Health 2018; 15 (10) E2196
- 42 Helm J, Jones RM, Jones RM. Practice paper of the academy of nutrition and dietetics: social media and the dietetics practitioner: opportunities, challenges, and best practices. J Acad Nutr Diet 2016; 116 (11) 1825-1835
- 43 Zhu S, Chen T, Wang Y, Xiao L, Alterovitz G. A FHIR-based PPS system can keep your genes private. Accessed February 23, 2021 at: http://cseweb.ucsd.edu/~shz338/images/PPS_Privacy.pdf
- 44 Khan S, Abbas N, Nasir M. et al. Steganography-assisted secure localization of smart devices in internet of multimedia things (IoMT). Multimed Tools Appl 2020;
- 45 Wikipedia. Timeline of historic inventions. Accessed February 23, 2021 at: https://en.wikipedia.org/wiki/Timeline_of_historic_inventions
- 46 Chernow R. Alexander Hamilton. New York: Penguin Press; 2004: 661-664
- 47 Anon, Automobile history, A&E Television Networks. History Channel. Accessed February 23, 2021 at: https://www.history.com/topics/inventions/automobiles
- 48 Geare J. Which was the first paved road in America? Quora. Accessed February 23, 2021 at: https://www.quora.com/Which-was-the-first-paved-road-in-America
- 49 Anon. History of aviation—first flights. Accessed February 23, 2021 at: https://www.avjobs.com/history/
- 50 Warren SD, Brandeis LD. The right to privacy. Harv Law Rev 1890; 4 (05) 193-220
- 51 White MG. Car ownership statistics. Accessed February 23, 2021 at: https://cars.lovetoknow.com/Car_Ownership_Statistics
- 52 Goodwin R. The history of mobile phones from 1973 to 2008: The handsets that made it all happen. Accessed February 23, 2021 at: https://www.knowyourmobile.com/nokia/nokia-3310/19848/history-mobile-phones-1973-2008-handsets-made-it-all-happen
- 53 Wikipedia. Windows 3.1x. Accessed February 23, 2021 at: https://en.wikipedia.org/wiki/Windows_3.1x
- 54 Smith A. Overview of smartphone adoption. Accessed February 23, 2021 at: http://www.pewinternet.org/2011/07/11/overview-of-smartphone-adoption/
- 55 BBC News. Qasem Soleimani: US kills top Iranian general in Baghdad air strike. January 3, 2020. Accessed February 23, 2021 at: https://www.bbc.com/news/world-middle-east-50979463