skip to main content
10.1145/2381966.2381983acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Understanding sharing preferences and behavior for mHealth devices

Published:15 October 2012Publication History

ABSTRACT

If people are not in control of the collection and sharing of their personal health information collected using mobile health (mHealth) devices and applications, privacy concerns could limit their willingness to use and reduce potential benefits provided via mHealth. We investigated users' willingness to share their personal information, collected using mHealth sensing devices, with their family, friends, third parties, and the public. Previous work employed hypothetical scenarios, surveys and interviews to understand people's information-sharing behavior; to the best of our knowledge, ours is the first privacy study where participants actually have the option to share their own information with real people. We expect our results can guide the development of privacy controls for mobile devices and applications that collect any personal and activity information, not restricted to health or fitness information.

Our study revealed three interesting findings about people's privacy concerns regarding their sensed health information: 1) We found that people share certain health information less with friends and family than with strangers, but more with specific third parties than the public. 2) Information that people were less willing to share could be information that is indirectly collected by the mobile devices. 3) We confirmed that privacy concerns are not static; mHealth device users may change their sharing decisions over time. Based on our findings, we emphasize the need for sensible default settings and flexible privacy controls to allow people to choose different settings for different recipients, and to change their sharing settings at any time.

References

  1. Affectiva. http://www.affectiva.com/, January 2011.Google ScholarGoogle Scholar
  2. D. Anthony, T. Henderson, and D. Kotz. Privacy in location-aware computing environments. IEEE Pervasive Computing, 6:64--72, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. Baumer, J. Earp, and J. Poindexter. Quantifying privacy choices with experimental economics. In Workshop on Economics of Information Security (WEIS), 2005.Google ScholarGoogle Scholar
  4. M. T. Britto, T. L. Tivorsak, and G. B. Slap. Adolescents' Needs for Health Care Privacy. Pediatrics, 126(6):e1469--1476, December 2010.Google ScholarGoogle ScholarCross RefCross Ref
  5. K. Connelly, A. Khalil, and Y. Liu. Do I Do What I Say?: Observed Versus Stated Privacy Preferences. In Proceedings of Human-Computer Interaction (INTERACT), volume 4662 of Lecture Notes in Computer Science, chapter 61, pages 620--623. Springer, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Consolvo, I. E. Smith, T. Matthews, A. LaMarca, J. Tabert, and P. Powledge. Location Disclosure to Social Relations: Why, When, & What People Want to Share. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI), pages 81--90. ACM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. G. Demiris, B. K. Hensel, M. Skubic, and M. Rantz. Senior Residents' Perceived Need of and Preferences for Smart Home Sensor Technologies. International Journal of Technology Assessment in Health Care, 24(01):120--124, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  8. Fitbit. http://www.fitbit.com, January 2011.Google ScholarGoogle Scholar
  9. J. H. Frost and M. P. Massagli. Social uses of personal health information within PatientsLikeMe, an online patient community: what can happen when patients have access to one another's data. Journal of Medical Internet Research, 10(3):e15+, May 2008.Google ScholarGoogle Scholar
  10. Google Health. http://www.google.com/intl/en-US/health/about/, January 2011.Google ScholarGoogle Scholar
  11. Microsoft HealthVault. http://www.healthvault.com/personal/index.aspx, January 2011.Google ScholarGoogle Scholar
  12. C. J. Hoofnagle, J. King, S. Li, and J. Turow. How Different are Young Adults from Older Adults when it comes to Information Privacy Attitudes and Policies? Social Science Research Network Working Paper Series, April 2010.Google ScholarGoogle ScholarCross RefCross Ref
  13. C. Jensen, C. Potts, and C. Jensen. Privacy practices of internet users: self-reports versus observed behavior. International Journal of Human-Computer Studies, 63(1--2):203--227, July 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. C. Julie Maitland. Designing for peer involvement in weight management. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI). ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. P. Klasnja, S. Consolvo, T. Choudhury, and R. Beckwith. Exploring Privacy Concerns about Personal Sensing. In Proceedings of the International Conference on Pervasive Computing (Pervasive). Springer-Verlag, May 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. M. L. Mazurek, P. F. Klemperer, R. Shay, H. Takabi, L. Bauer, and L. F. Cranor. Exploring reactive access control. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI), pages 2085--2094. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Monica Healthcare. http://www.monicahealthcare.com, February 2011.Google ScholarGoogle Scholar
  18. H. Nissenbaum. Privacy in Context. Stanford University Press, 2010.Google ScholarGoogle Scholar
  19. J. S. Olson, J. Grudin, and E. Horvitz. A study of preferences for sharing and privacy. In Extended Abstracts on Human Factors in Computing Systems (CHI EA), pages 1985--1988. ACM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. A. Prasad. Exposing Privacy Concerns in mHealth Sensing. Technical Report TR2012-711, Dartmouth College, February 2012. http://www.cs.dartmouth.edu/reports/TR2012-711.pdf.Google ScholarGoogle Scholar
  21. A. Prasad, J. Sorber, T. Stablein, D. Anthony, and D. Kotz. Exposing Privacy Concerns in mHealth Sensing. In USENIX Workshop on Health Security (HealthSec), August 2011. Position paper. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A. Raij, A. Ghosh, S. Kumar, and M. Srivastava. Privacy Risks Emerging from the Adoption of Innocuous Wearable Sensors in the Mobile Environment. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI), 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. N. Sadeh, J. Hong, L. Cranor, I. Fette, P. Kelley, M. Prabaker, and J. Rao. Understanding and capturing people's privacy policies in a mobile social networking application. Personal Ubiquitous Computing, 13(6):401--412, Aug. 2009. Google ScholarGoogle ScholarCross RefCross Ref
  24. R. H. Thaler and C. R. Sunstein. Nudge: Improving Decisions About Health, Wealth, and Happiness. Yale University Press, 2008.Google ScholarGoogle Scholar
  25. J. Tsai, P. Kelley, L. Cranor, and N. Sadeh. Location-Sharing Technologies: Privacy Risks and Controls. In Proceedings of the Research Conference on Communication, Information and Internet Policy (TPRC), 2009.Google ScholarGoogle Scholar
  26. WakeMate. http://wakemate.com/, January 2011.Google ScholarGoogle Scholar
  27. J. Wiese, P. G. Kelley, L. F. Cranor, L. Dabbish, J. I. Hong, and J. Zimmerman. Are you close with me? Are you nearby? Investigating social groups, closeness, and willingness to share. In Proceedings of the International Conference on Ubiquitous Computing (UBICOMP), pages 197--206, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Withings blood pressure cuff. http://www.withings.com/en/bloodpressuremonitor, November 2011.Google ScholarGoogle Scholar

Index Terms

  1. Understanding sharing preferences and behavior for mHealth devices

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          WPES '12: Proceedings of the 2012 ACM workshop on Privacy in the electronic society
          October 2012
          150 pages
          ISBN:9781450316637
          DOI:10.1145/2381966
          • General Chair:
          • Ting Yu,
          • Program Chair:
          • Nikita Borisov

          Copyright © 2012 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 15 October 2012

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate106of355submissions,30%

          Upcoming Conference

          CCS '24
          ACM SIGSAC Conference on Computer and Communications Security
          October 14 - 18, 2024
          Salt Lake City , UT , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader