2017 IEEE International Conference on Healthcare Informatics (ICHI) 2017
DOI: 10.1109/ichi.2017.29
|View full text |Cite
|
Sign up to set email alerts
|

Wearable Privacy: Skeletons in The Data Closet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
27
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 27 publications
(31 citation statements)
references
References 37 publications
3
27
0
Order By: Relevance
“…On average, barely 50% answered positive on the impact of their intervenability, which was broken down into 55% breaches, 46% consequences, and 45% tips. Scenarios dealing with deviating processes (scenario 2) or nameable affiliates (3,7,11,15) registered high positive counts. Similar to notification, scenarios 10, 12 and 16 registered the fewest positive counts.…”
Section: Notification Preferencesmentioning
confidence: 99%
See 1 more Smart Citation
“…On average, barely 50% answered positive on the impact of their intervenability, which was broken down into 55% breaches, 46% consequences, and 45% tips. Scenarios dealing with deviating processes (scenario 2) or nameable affiliates (3,7,11,15) registered high positive counts. Similar to notification, scenarios 10, 12 and 16 registered the fewest positive counts.…”
Section: Notification Preferencesmentioning
confidence: 99%
“…However, according to [7], the consequences of how mhealth data processed by data services are not fully transparent to the users of such services. Data subjects often lack the information necessary to make informed decisions about managing their personal data and to exercise their right of intervenability, especially in scenarios that involve third parties.…”
Section: Introductionmentioning
confidence: 99%
“…Some researchers have examined security and privacy more broadly, by looking at a range of existing and emerging technologies [61,69], while others have focused on digital apps [67,75] and social media contexts [24]. Less studied are IoT devices [9], wearables [21,33,50,55,59], and fitness trackers [1,3,42,57,58,76,82].…”
Section: Chapter 2 Backgroundmentioning
confidence: 99%
“…Existing research in the area of security and privacy related to fitness trackers includes: investigating users' concerns, use and sharing of data and protection strategies [3,42,76,82]; the perception of risk with various data an assessment of the sensitivity of their data [82]; the valuation of their personal fitness information [76] and knowledge of company data collection policies [3,76]; their perceptions of the benefits and drawbacks of using fitness trackers [3,42,82]; misconceptions associated with the collection of data [42]; willingness to share sensor data versus derived information (for example, accelerometer data versus step information) [64]; sharing preferences and behaviours of fitness and health information [57]; and examining folk theoriesuser beliefs and understandings -of what exactly is collected by sensor data and how these guide users to manage their privacy choices [58]. Others demonstrated to users how their identity can be revealed when fitness tracker and online social network data is merged [1].…”
Section: Fitness Trackersmentioning
confidence: 99%
See 1 more Smart Citation