Proceedings of the 4th Nordic Conference on Human-Computer Interaction: Changing Roles 2006
DOI: 10.1145/1182475.1182516
|View full text |Cite
|
Sign up to set email alerts
|

On the relative importance of privacy guidelines for ambient health care

Abstract: We present an empirical study regarding the relative importance of complying with privacy related guidelines in the context of a Health Monitoring System. Participants were confronted with text scenarios describing privacy related aspects of a health monitoring service for daily use at home. Participants assessed the relative importance to them of simplified variants of the OECD (Organization of Economic Cooperation and Development) guidelines for the protection of personal data. The guidelines that relate to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2007
2007
2020
2020

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…Cavoukian and Jonas [42] have extended these principles by proposing seven more specific guidelines to build PbD systems to manage big data, namely, (1) full attribution, (2) data tethering, (3) analytics on anonymized data, (4) tamper-resistant audit logs, (5) false negative favouring methods, (6) self-correcting false positives and (7) information transfer accounting. The ISO Descriptions of Evaluation the approach Garde-Perik [39] This work explores the relative importance of complying with privacy related guidelines in the context of a Health Monitoring System. A total of 50 participants were given a text scenario describing a health care system.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Cavoukian and Jonas [42] have extended these principles by proposing seven more specific guidelines to build PbD systems to manage big data, namely, (1) full attribution, (2) data tethering, (3) analytics on anonymized data, (4) tamper-resistant audit logs, (5) false negative favouring methods, (6) self-correcting false positives and (7) information transfer accounting. The ISO Descriptions of Evaluation the approach Garde-Perik [39] This work explores the relative importance of complying with privacy related guidelines in the context of a Health Monitoring System. A total of 50 participants were given a text scenario describing a health care system.…”
Section: Related Workmentioning
confidence: 99%
“…Descriptions of Evaluation the approach Garde-Perik [39] This work explores the relative importance of complying with privacy related guidelines in the context of a Health Monitoring System. A total of 50 participants were given a text scenario describing a health care system.…”
Section: Areamentioning
confidence: 99%
“…Chan et al 2009;Demiris 2009;Jea et al 2008;Mitseva et al 2008;Mittelstadt et al 2011;Tentori et al 2006;Tiwari et al 2010;Garde-Perik et al 2006;van Hoof et al 2007). At its narrowest, informational privacy can be equated with hiding personally identifiable data from unauthorised parties (Garcia-Morchon et al 2011;Ahamed et al 2007), and can be quantifiable (Srinivasan et al 2008).…”
Section: Informational Privacymentioning
confidence: 99%
“…medical sciences and human-computer interaction) and adapted for pervasive health systems. Examples of this include evaluation of perceived privacy and security in pervasive health systems [46], evaluation of user acceptance and technology adoption [47], and multidisciplinary clinical evaluation methods [48] among others. An open question remains whether those adaptations would continue to be valid for the coming generations of pervasive health systems or if the notion of health management itself will be fundamentally altered by the new pervasive technologies implying a complete re-thinking of healthcare provisioning and the evaluation of its effectiveness.…”
Section: First Steps Towards Evaluating Pervasive Health Technologymentioning
confidence: 99%