2010 Eighth International Conference on Privacy, Security and Trust 2010
DOI: 10.1109/pst.2010.5593252
|View full text |Cite
|
Sign up to set email alerts
|

Social networks for health care: Addressing regulatory gaps with privacy-by-design

Abstract: Social computing is a relatively new approach to systems design that emphasizes the importance of facilitating collaboration and communication between users. Although social networking is now part of mainstream culture, the use of these applications in the health care space is still in its infancy in Canada. As major vendors are preparing to enter the marketplace, it is important for a wide variety of stakeholders to discern the ramifications of this next wave of technological innovation. This paper discusses … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(13 citation statements)
references
References 15 publications
0
13
0
Order By: Relevance
“…The concern is not just about data mining and marketing that could influence patients to seek drugs they do not need or to spend more money on branded drugs rather than generics. More broadly, employers, health insurers, and/or identity thieves could gain access to users’ profiles, leading to negative consequences, including privacy compromise, social embarrassment, discriminations from employers and insurance companies, identity theft, and so forth [5,20]. Because health-related SNS are not HIPAA-covered entities, these concerns are very real and must be addressed seriously.…”
Section: Privacy Concerns Related To Social Networking Sitesmentioning
confidence: 99%
See 1 more Smart Citation
“…The concern is not just about data mining and marketing that could influence patients to seek drugs they do not need or to spend more money on branded drugs rather than generics. More broadly, employers, health insurers, and/or identity thieves could gain access to users’ profiles, leading to negative consequences, including privacy compromise, social embarrassment, discriminations from employers and insurance companies, identity theft, and so forth [5,20]. Because health-related SNS are not HIPAA-covered entities, these concerns are very real and must be addressed seriously.…”
Section: Privacy Concerns Related To Social Networking Sitesmentioning
confidence: 99%
“…Visibility and transparency has not been a strong point of health-related SNS. Information mash-ups and the combination of apps and multiple different types of SNS [24] create unexpected information flow through “back channels”, impeding users’ ability to get a clear view of the way their data are propagating [5]. Different actors (eg, users and apps), linkages, and roles are having dynamic interactions with each other through different ways across multiple social networks or websites.…”
Section: Privacy Threatsmentioning
confidence: 99%
“…6 Information can be generalising after a period of time (Williams and Weber-Jahnke, 2010) by automatically generalising the accessible information to an inactive connection (for example, the connection between a user and health care provider can be degraded over many years in a healthcare SN).…”
Section: Privacy By Designmentioning
confidence: 99%
“…SN service providers should take the necessary steps to decrease the user burden and to respect user privacy (Williams and Weber-Jahnke, 2010). They should provide an interactive user interface for controlling privacy settings; in this way, the user can edit, hide, or delete their personal information.…”
Section: Pbd Principle Analysis and Examplesmentioning
confidence: 99%
“…For example, Facebook allows an individual to decide who can view the information in his or her network, whereas in Twitter the information can be viewed by followers. In work [17], researchers categorize the dissemination approaches into deterministic communication technique, including distribution hierarchies such as in [29], [30], [31] and probabilistic communication techniques, including epidemic based dissemination techniques, such as probabilistic broadcast and flooding [26], [27]. Each technique reflects how information flows from place to place.…”
Section: B Desiminationmentioning
confidence: 99%