skip to main content
10.1145/3283458.3283472acmotherconferencesArticle/Chapter ViewAbstractPublication PagesafrichiConference Proceedingsconference-collections
research-article

Cross-cultural perspectives on eHealth privacy in Africa

Published: 03 December 2018 Publication History

Abstract

The African continent is making considerable strides to develop and implement technology-driven health innovations. Policymakers are increasingly acknowledging the rising concerns for online personal privacy and data protection as advances in eHealth results in increased levels of data collection and surveillance. In this paper, we propose a research agenda to investigate the effect of cultural, constitutional, and societal factors on privacy concerns and preferences among the different African countries in the context of healthcare technologies. In addition to helping us understand policy and design implications for members of this region, this research will broaden our understanding of cultural factors influencing privacy worldwide.

References

[1]
Rediet Abebe, Shawndra Hill, Jennifer Wortman Vaughan, Peter M. Small, and H. Andrew Schwartz. 2018. Using Search Queries to Understand Health Information Needs in Africa. In Neural Information Processing Systems 30 (NIPS 2018). Retrieved June 20, 2018 from http://arxiv.org/abs/1806.05740
[2]
African Union. 1990. The African Charter on the Rights and Welfare of the Child. African Commission on Human and People's Rights, Addis Ababa, Ethiopia. Retrieved June 22, 2018 from http://www.achpr.org/files/instruments/child/achpr_instr_charterchild_eng.pdf
[3]
African Union. 2014. African Union Convention on Cyber Security and Personal Data Protection. The twenty-third Ordinary Session of the Assembly, Malabo, Equatorial Guinea. Retrieved June 22, 2018 from https://au.int/en/treaties/african-union-convention-cyber-security-and-personal-data-protection
[4]
African Union. 2014. African Union Convention on Cyber Security and Personal Data Protection. The twenty-third Ordinary Session of the Assembly, Malabo, Equatorial Guinea. Retrieved June 22, 2018 from https://au.int/en/treaties/african-union-convention-cyber-security-and-personal-data-protection
[5]
Jocelyn Olivia Todd Anstey Watkins, Jane Goudge, Francesc Xavier Gómez-Olivé, and Frances Griffiths. 2018. Mobile phone use among patients and health workers to enhance primary healthcare: A qualitative study in rural South Africa. Social Science & Medicine 198: 139--147.
[6]
Shifali Arora, Jennifer Yttri, and Wendy Nilsen. 2014. Privacy and Security in Mobile Health (mHealth) Research. Alcohol Research: Current Reviews 36, 1: 143--151.
[7]
Sean Baird. 2017. GDPR matchup: The Health Insurance Portability and Accountability Act. IAPP: Privacy Tracker. Retrieved July 2, 2018 from https://iapp.org/news/a/gdpr-match-up-the-health-insurance-portability-and-accountability-act/
[8]
Syagnik Banerjee, Thomas Hemphill, and Phil Longstreet. 2018. Wearable devices and healthcare: Data sharing and privacy. The Information Society 34, 1: 49--57.
[9]
Louise Barkhuus. 2012. The Mismeasurement of Privacy: Using Contextual Integrity to Reconsider Privacy in HCI. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '12), 367--376.
[10]
Stephanie Baum. 2017. Startup seeking to offer WhatsApp for healthcare plans expansion to South Africa next year. MedCity News. Retrieved July 2, 2018 from https://medcitynews.com/2017/11/startup-seeking-offer-whatsapp-healthcare-plans-expansion-south-africa-next-year/
[11]
Jean-Francois Le Bihan, Ida Jallow, Sandro Bazzanella, Hiwot Mulugeta, and Brahima Sanou. 2013. Data Protection: Southern African Developement Community (SADC) Model Law. International Telecommunication Union (ITU). Retrieved June 22, 2018 from https://www.itu.int/en/ITU-D/Projects/ITU-EC-ACP/HIPSSA/Documents/FINAL%20DOCUMENTS/FINAL%20DOCS%20ENGLISH/sadc_model_law_data_protection.pdf
[12]
Joaquin A. Blaya, Hamish S.F. Fraser, and Brian Holt. 2010. E-Health Technologies Show Promise In Developing Countries. Health Affairs 29, 2: 244--251.
[13]
Nicolas Boring. 2016. Côte d'Ivoire: New Constitution Adopted. Global Legal Monitor. Retrieved from https://www.loc.gov/law/foreign-news/article/cte-divoire-new-constitution-adopted/
[14]
Patricia Boshe. 2016. Data Privacy Law Reforms in Tanzania. In African Data Privacy Laws. Springer, Cham, 161--187.
[15]
Laura Brandimarte, Alessandro Acquisti, and George Loewenstein. 2013. Misplaced Confidences: Privacy and the Control Paradox. Social Psychological and Personality Science 4, 3: 340--347.
[16]
Lee A. Bygrave. 2010. Privacy and data protection in an international perspective. Scandinavian studies in law, 56: 165--200.
[17]
Kelly Caine and Rima Hanania. 2013. Patients want granular privacy control over health information in electronic medical records. Journal of the American Medical Informatics Association 20, 1: 7--15.
[18]
Jay Chen, Michael Paik, and Kelly McCabe. 2014. Exploring Internet Security Perceptions and Practices in Urban Ghana. In Symposium on Usable Privacy and Security (SOUPS 2014), 136. Retrieved from https://www.usenix.org/sites/default/files/soups14_proceedings.pdf#page=136
[19]
Constitutional Assembly. 1996. The Constitution of the Republic of South Africa, Act 108 of 1996. Minister for Justice and Constitutional Development. Retrieved from http://www.wipo.int/edocs/lexdocs/laws/en/za/za107en.pdf
[20]
Deloitte. 2017. Privacy is Paramount: Personal Data Protection in Africa. Johannesburg, South Africa. Retrieved July 1, 2018 from https://www2.deloitte.com/content/dam/Deloitte/za/Documents/risk/za_Privacy_is_Paramount-Personal_Data_Protection_in_Africa.pdf
[21]
Digital Health. 2018. WhatsApp doc: Legal and practical perspectives of using mobile messaging. Digital Health. Retrieved July 2, 2018 from https://www.digitalhealth.net/2018/02/whatsapp-doc-legal-and-practical-perspectives-of-using-mobile-messaging/
[22]
Tamara Dinev, Massimo Bellotto, Paul Hart, Vincenzo Russo, Ilaria Serra, and Christian Colautti. 2006. Privacy calculus model in e-commerce - a study of Italy and the United States. European Journal of Information Systems 15, 4: 389--402.
[23]
Economic Community of West African States. 2011. Directive fighting cyber crime within ECOWAS. Abuja, Nigeria. Retrieved June 22, 2018 from https://www.ccdcoe.org/sites/default/files/documents/ECOWAS-110819-FightingCybercrime.pdf
[24]
Adebayo Fayoyin. 2016. Engaging Social Media for Health Communication in Africa:Approaches, Results and Lessons. Journal of Mass Communication & Journalism 6, 6: 1--7.
[25]
Tom Ferguson. 2002. From patients to end users: Quality of online patient networks needs more attention than quality of online health information. BMJ 324, 7337: 555--556.
[26]
Anastasia J. Gage. 2007. Barriers to the utilization of maternal health care in rural Mali. Social Science & Medicine 65, 8: 1666--1682.
[27]
Kurubaran Ganasegeran, Pukunan Renganathan, Abdul Rashid, and Sami Abdo Radman Al-Dubai. 2017. The m-Health revolution: Exploring perceived benefits of WhatsApp use in clinical practice. International Journal of Medical Informatics 97: 145--151.
[28]
Graham Greenleaf. 2017. Global Data Privacy Laws 2017: 120 National Data Privacy Laws, Including Indonesia and Turkey. UNSW Law Research Paper No. 17--45, Rochester, NY. Retrieved June 19, 2018 from https://papers.ssrn.com/abstract=2993035
[29]
Graham Greenleaf. 2017. Global Tables of Data Privacy Laws and Bills (5th Ed 2017). Social Science Research Network, Rochester, NY. Retrieved June 19, 2018 from https://papers.ssrn.com/abstract=2992986
[30]
Kate Hampshire, Gina Porter, Samuel Asiedu Owusu, Simon Mariwah, Albert Abane, Elsbeth Robson, Alister Munthali, Ariane DeLannoy, Andisiwe Bango, Nwabisa Gunguluza, and James Milner. 2015. Informal m-health: How are young people using mobile phones to bridge healthcare gaps in Sub-Saharan Africa? Social Science & Medicine 142: 90--99.
[31]
Janine Hiller, Matthew S. McMullen, Wade M. Chumney, and David L. Baumer. 2011. Privacy and Security in the Implementation of Health Information Technology (Electronic Health Records): U.S. and EU Compared. Boston University Journal of Science & Technology Law 17: 1--39
[32]
Gordon Hull, Heather Richter Lipford, and Celine Latulipe. 2011. Contextual gaps: privacy issues on Facebook. Ethics and Information Technology 13, 4: 289--302.
[33]
Ashraf Khalil and Kay Connelly. 2006. Context-aware telephony: privacy preferences and sharing patterns. In Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work, 469--478.
[34]
Brenda Kubheka. 2017. Ethical and legal perspectives on use of social media by health professionals in South Africa. South African Medical Journal 107, 5: 386--389.
[35]
Yao Li, Alfred Kobsa, Bart P Knijnenburg, and MH Carolyn Nguyen. 2017. Cross-Cultural Privacy Prediction. Proceedings on Privacy Enhancing Technologies 2: 93--112.
[36]
B. Lowens, V. G. Motti, and K. Caine. 2017. Wearable Privacy: Skeletons in The Data Closet. In 2017 IEEE International Conference on Healthcare Informatics (ICHI), 295--304.
[37]
Teena Maddox. 2015. The dark side of wearables: How they're secretly jeopardizing your security and privacy. TechRepublic. Retrieved June 28, 2018 from https://www.techrepublic.com/article/the-dark-side-of-wearables-how-theyre-secretly-jeopardizing-your-security-and-privacy/
[38]
Mafika. 2017. The Constitution of South Africa. Brand South Africa. Retrieved June 22, 2018 from https://www.brandsouthafrica.com/governance/constitution-sa-glance/the-constitution-of-south-africa
[39]
Daniel Makina. 2017. Introduction to the financial services in Africa special issue. African Journal of Economic and Management Studies 8, 1: 2--7.
[40]
Alex B. Makulilo. 2012. Privacy and data protection in Africa: a state of the art. International Data Privacy Law 2, 3: 163--178.
[41]
Alex B. Makulilo. 2015. Myth and reality of harmonisation of data privacy policies in Africa. Computer Law & Security Review 31, 1: 78--89.
[42]
Alex B. Makulilo. 2016. The Context of Data Privacy in Africa. In African Data Privacy Laws. Springer, Cham, 3--23.
[43]
Ignacio Mas and Olga Morawczynski. 2009. Designing Mobile Money Services Lessons from M-PESA. Retrieved June 28, 2018 from
[44]
Ministry of Health. 2014. Kenya Health Policy 2014--2030: Towards attaining the highest standard of health. Ministry of Health, Nairobi, Kenya. Retrieved June 22, 2018 from http://publications.universalhealth2030.org/uploads/kenya_health_policy_2014_to_2030.pdf
[45]
Anne Miroux, Cecile Barayre, and Torbjorn Fredriksson. 2013. Harmonizing Cyberlaws and Regulations: The experience of the East African Community. United Nations Conference on Trade and Development, New York and Geneva. Retrieved June 22, 2018 from http://unctad.org/en/PublicationsLibrary/dtlstict2012d4_en.pdf
[46]
MobileODT. 2012. EVA System: A turnkey solution for visual-based medical procedures. MobileODT. Retrieved July 2, 2018 from https://www.mobileodt.com/eva-system/
[47]
Kathryn C Montgomery, Jeff Chester, and Katharina Kopp. 2016. Health Wearable Devices in the Big Data Era: Ensuring Privacy, Security, and Consumer Protection. Center for Digital Democracy, American University. Retrieved from https://www.democraticmedia.org/sites/default/files/field/public/2016/aucdd_wearablesreport_final121516.pdf
[48]
Avuya Mxoli and Nicky Mostert-Phipps. 2016. Risks and Benefits of Social Computing as a Healthcare Tool. Proceeding of International Multi-Conference on Complexity, Informatics and Cybernetics. Retrieved from http://www.iiis.org/CDs2016/CD2016Spring/papers/HB329XQ.pdf
[49]
Nigerian Parliament. 1999. Constitution of the Federal Republic of Nigeria. International Center for Nigerian Law. Retrieved June 22, 2018 from http://www.nigeria-law.org/ConstitutionOfTheFederalRepublicOfNigeria.htm
[50]
Helen Nissenbaum. 2004. Privacy as Contextual Integrity. Washington Law Review 79: 119--157.
[51]
Helen Nissenbaum. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press, Stanford, CA. Retrieved September 24, 2013 from http://books.google.com.sg/books?hl=en&lr=&id=_NN1uGn1Jd8C&oi=fnd&pg=PR7&dq=Privacy+in+Context:+Technology,+Policy,+an+d+the+Integrity+of+Social+Life&ots=_J9lXtm4CQ&sig=uwEmoieGtVJQhegXvrT7TryaTrg
[52]
Melvin Obadha, Andrew Seal, and Tim Colbourn. 2018. Mobile money increasing healthcare access. Mobile money increasing healthcare access. Retrieved June 7, 2018 from https://www.scidev.net/sub-saharan-africa/health/opinion/mobile-money-increasing-healthcare-access.html
[53]
Orange Healthcare. 2014. "My Healthline": Orange's first healthcare hotline in Cameroon. Orange Healthcare. Retrieved July 1, 2018 from http://healthcare.orange.com/en/Press-and-medias/Press-releases/2014-Press-Releases/My-Healthline-Orange-s-first-healthcare-hotline-in-Cameroon
[54]
A. Papageorgiou, M. Strigkos, E. Politou, E. Alepis, A. Solanas, and C. Patsakis. 2018. Security and Privacy Analysis of Mobile Health Applications: The Alarming State of Practice. IEEE Access 6: 9390--9403.
[55]
Lisa Parker, Tanya Karliychuk, Donna Gillies, Barbara Mintzes, Melissa Raven, and Quinn Grundy. 2017. A health app developer's guide to law and policy: a multi-sector policy analysis. BMC Medical Informatics and Decision Making 17, 1.
[56]
Parliamentary Select Committee (PSC) and Committee of Experts. 2010. Constitution of Kenya. Kenya Parliament. Retrieved June 18, 2018 from http://kenyalaw.org/kl/index.php?id=398
[57]
Jacob Poushter and Russ Oates. 2015. CellPhones in Africa: Communication Lifeline. Pew Research Center, Washington, DC. Retrieved from http://www.pewglobal.org/files/2015/04/Pew-Research-Center-Africa-Cell-Phone-Report-FINAL-April-15-2015.pdf
[58]
Matthew Price, Erica K. Yuen, Elizabeth M. Goetter, James D. Herbert, Evan M. Forman, Ron Acierno, and Kenneth J. Ruggiero. 2013. mHealth: A Mechanism to Deliver More Accessible, More Effective Mental Health Care. Clinical Psychology & Psychotherapy 21, 5: 427--436.
[59]
Privacy International and National Coalition of Human Rights Defenders. 2018. State of Privacy Kenya. Privacy International. Retrieved June 21, 2018 from http://www.privacyinternational.org/state-privacy/1005/state-privacy-kenya
[60]
Privacy International and Unwanted Witness. 2018. State of Privacy Uganda. Privacy International. Retrieved June 21, 2018 from http://privacyinternational.org/state-privacy/1013/state-privacy-uganda
[61]
S. Rokadiya, J. A. McCaul, D. A. Mitchell, and P. A. Brennan. 2016. Leading article: Use of smartphones to pass on information about patients - what are the current issues? British Journal of Oral and Maxillofacial Surgery 54, 6: 596--599.
[62]
Jane Sarasohn-Kahn. 2008. The Wisdom of Patients: Health Care Meets Online Social Media. Retrieved May 21, 2018 from https://books.google.com/books/about/The_Wisdom_of_Patients.html?id=tIeqOgAACAAJ
[63]
Sandra Schmitz. 2013. Facebook's Real Name Policy: Bye-Bye, Max Mustermann? 15.
[64]
Araba Sey. 2009. Exploring mobile phone-sharing practices in Ghana. info 11, 2: 66--78.
[65]
N. Craig Smith, Daniel G. Goldstein, and Eric J. Johnson. 2013. Choice Without Awareness: Ethical and Policy Implications of Defaults. Journal of Public Policy & Marketing 32, 2: 159--172.
[66]
StatCounter. 2018. Social Media Stats Africa. StatCounter Global Stats. Retrieved July 2, 2018 from http://gs.statcounter.com/social-media-stats/all/africa
[67]
Ali Sunyaev, Tobias Dehling, Patrick L. Taylor, and Kenneth D. Mandl. 2015. Availability and quality of mobile health app privacy policies. Journal of the American Medical Informatics Association 22, e1: e28--e33.
[68]
Tamara Taggart, Mary Elisabeth Grewe, Donaldson F Conserve, Catherine Gliwa, and Malika Roman Isler. 2015. Social Media and HIV: A Systematic Review of Uses of Social Media in HIV Communication. Journal of Medical Internet Research 17, 11.
[69]
Matti Tedre and Bukaza Chachage. 2008. University Students' Attitudes Towards e-security Issues: A Survey Study in Tumaini University, Tanzania. http://hdl.handle.net/20.500.11810/2378
[70]
The European Parliament. 1995. Directive on the protection of individuals with regard to the processing of personal data and on the free movement of such data. European Parliament, Kirchberg, Luxembourg. Retrieved June 23, 2018 from https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A31995L0046
[71]
Beverley Townsend. 2015. mHealth Regulation Impact Assessment: Africa. GSMA, South AFRICA. Retrieved June 22, 2018 from https://www.gsma.com/mobilefordevelopment/wp-content/uploads/2015/03/003-GSMA-RIA-Africa-27feb15.pdf
[72]
Beverley Alice Townsend. 2017. Privacy and data protection in eHealth in Africa -an assessment of the regulatory frameworks that govern privacy and data protection in the effective implementation of electronic health care in Africa: is there a need for reform and greater regional collaboration in regulatory policymaking? University of Cape Town, Cape Town, South Africa. Retrieved July 2, 2018 from https://open.uct.ac.za/handle/11427/25510
[73]
US Department of Health & Human Services. 2015. Covered Entities and Business Associates. Health Information Privacy. Retrieved July 2, 2018 from https://www.hhs.gov/hipaa/for-professionals/covered-entities/index.html
[74]
U.S. Government Printing Office. 1996. Insurance Portability and Accountability Act of 1996. 104th US Congress, Washington, D.C. Retrieved June 18, 2018 from https://www.gpo.gov/fdsys/pkg/PLAW-104publ191/content-detail.html
[75]
Lavanya Vasudevan, Kelsey Zeller, and Alain Labrique. 2018. Mobile Health. In Digital Health. Springer, USA, 15--25.
[76]
Mojca Volk, Janez Sterle, and Urban Sedlar. 2015. Safety and Privacy Considerations for Mobile Application Design in Digital Healthcare. International Journal of Distributed Sensor Networks 11, 10: 549420.
[77]
Tobias Wacker, Lilian Tse, and Chiara Diana. 2017. mHealth Design ToolKit: Ten principles to launch, develop and scale mobile health services in emerging markets. GSMA mHealth Program, frog, London, U.K. Retrieved June 11, 2018 from https://www.gsma.com/mobilefordevelopment/mhealth/mhealth-design-toolkit/
[78]
Mobile for Development - mHealth. Retrieved June 11, 2018 from https://www.gsma.com/mobilefordevelopment/mhealth/
[79]
State of Privacy South Africa. Privacy International. Retrieved June 21, 2018 from http://privacyinternational.org/state-privacy/1010/state-privacy-south-africa

Cited By

View all
  1. Cross-cultural perspectives on eHealth privacy in Africa

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      AfriCHI '18: Proceedings of the Second African Conference for Human Computer Interaction: Thriving Communities
      December 2018
      373 pages
      ISBN:9781450365581
      DOI:10.1145/3283458
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 03 December 2018

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Africa
      2. cross-cultural privacy
      3. eHealth
      4. privacy

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      AfriCHI '18

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)25
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 01 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Legal mechanisms for digital healthcare transformation in Africa: state and perspectiveCogent Social Sciences10.1080/23311886.2024.241036310:1Online publication date: 9-Oct-2024
      • (2024)History, AI and utilitarianismAI and Ethics10.1007/s43681-024-00581-9Online publication date: 30-Oct-2024
      • (2023)Localised Trust in a Globalised Knot: Designing Information Privacy for Digital-IDACM Journal on Computing and Sustainable Societies10.1145/3616024Online publication date: 16-Aug-2023
      • (2023)Characterizing the Technology Needs of Vulnerable Populations for Participation in Research and Design by Adopting Maslow’s Hierarchy of NeedsProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581221(1-20)Online publication date: 19-Apr-2023
      • (2022)Speculative VulnerabilityProceedings of the ACM on Human-Computer Interaction10.1145/35555866:CSCW2(1-27)Online publication date: 11-Nov-2022
      • (2022)Factors That Influence E-Health Applications From Patients’ Perspective in the Kingdom of Saudi Arabia: An Exploratory StudyIEEE Access10.1109/ACCESS.2022.321420310(109029-109042)Online publication date: 2022
      • (2022)Where There is No CISOFreedom and Social Inclusion in a Connected World10.1007/978-3-031-19429-0_12(187-200)Online publication date: 20-Nov-2022
      • (2021)The Power of the Blue Tick (): Ugandans’ experiences and engagement on Twitter at the onset of the COVID-19 pandemicProceedings of the 3rd African Human-Computer Interaction Conference: Inclusiveness and Empowerment10.1145/3448696.3448746(84-93)Online publication date: 8-Mar-2021
      • (2021)Integrating Privacy-By-Design in e-Health2021 International Conference on Electrical, Computer and Energy Technologies (ICECET)10.1109/ICECET52533.2021.9698489(1-7)Online publication date: 9-Dec-2021
      • (2021)Beyond COVID-19: The State of Telehealth Equity and Best Practices in Underserved PopulationsJournal of Law, Medicine & Ethics10.1017/jme.2021.6149:3(410-414)Online publication date: 19-Oct-2021
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media