{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,28]],"date-time":"2024-07-28T04:32:15Z","timestamp":1722141135728},"reference-count":30,"publisher":"Georg Thieme Verlag KG","issue":"02","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Appl Clin Inform"],"published-print":{"date-parts":[[2021,3]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>\n          Background\u2003The pace of technological change dwarfs the pace of social and policy change. This mismatch allows for individual harm from lack of recognition of changes in societal context. The value of privacy has not kept pace with changes in technology over time; individuals seem to discount how loss of privacy can lead to directed personal harm.<\/jats:p><jats:p>\n          Objective\u2003The authors examined individuals sharing personal data with mobile health applications (mHealth apps) and compared the current digital context to the historical context of harm. The authors make recommendations to informatics professionals to support consumers who wish to use mHealth apps in a manner that balances convenience with personal privacy to reduce the risk of harm.<\/jats:p><jats:p>\n          Methods\u2003A literature search focused by a historical perspective of risk of harm was performed throughout the development of this paper. Two case studies highlight questions a consumer might ask to assess the risk of harm posed by mobile health applications.<\/jats:p><jats:p>\n          Results\u2003A historical review provides the context for the collective human experience of harm. We then encapsulate current perceptions and views of privacy and list potential risks created by insufficient attention to privacy management.<\/jats:p><jats:p>\n          Discussion\u2003The results provide a historical context for individuals to view the risk of harm and shed light on potential emotional, reputational, economic, and physical harms that can result from na\u00efve use of mHealth apps. We formulate implications for clinical informaticists.<\/jats:p><jats:p>\n          Conclusion\u2003Concepts of both harm and privacy have changed substantially over the past 20 years. Technology provides methods to invade privacy and cause harm unimaginable a few decades ago. Only recently have the consequences become clearer. The current regulatory framework is extremely limited. Given the risks of harm and limited awareness, we call upon informatics professionals to support more privacy education and protections and increase mHealth transparency about data usage.<\/jats:p>","DOI":"10.1055\/s-0041-1727197","type":"journal-article","created":{"date-parts":[[2021,5,5]],"date-time":"2021-05-05T23:54:23Z","timestamp":1620258863000},"page":"274-284","source":"Crossref","is-referenced-by-count":5,"title":["Privacy versus Convenience: A Historical Perspective, Analysis of Risks, and an Informatics Call to Action"],"prefix":"10.1055","volume":"12","author":[{"given":"Larry","family":"Ozeran","sequence":"additional","affiliation":[{"name":"Clinical Informatics, Inc., Woodland, California, United States"}]},{"given":"Anthony","family":"Solomonides","sequence":"additional","affiliation":[{"name":"Outcomes Research Network, Research Institute, NorthShore University HealthSystem, Evanston, Illinois, United States"}]},{"given":"Richard","family":"Schreiber","sequence":"additional","affiliation":[{"name":"Penn State Health Holy Spirit Medical Center, Information Services, Geisinger Commonwealth School of Medicine, Camp Hill, Pennsylvania, United States"}]}],"member":"194","published-online":{"date-parts":[[2021,5,5]]},"reference":[{"key":"ref1","volume-title":"Men, Machines and Modern Times","author":"E E Morison","year":"1977"},{"key":"ref2","volume-title":"From Know-How to Nowhere: The Development of American Technology","author":"E E Morison","year":"1974"},{"key":"ref3","volume-title":"Ubiquitous digital devices and health: reflections on Foucault's notion of the clinic","author":"S Adams","year":"2017"},{"issue":"01","key":"ref6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2307\/3101118","article-title":"Authoritarian and democratic technics","volume":"5","author":"L Mumford","year":"1964","journal-title":"Technol Cult"},{"issue":"03","key":"ref7","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1080\/01972243.2019.1582569","article-title":"Fitness for sale: the value of self-tracking in secondhand exchange","volume":"35","author":"B Lyall","year":"2019","journal-title":"Inf Soc"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.3998\/mpub.9739","volume-title":"Rules, Games, and Common-Pool Resources","author":"E Ostrom","year":"1994"},{"key":"ref10","volume-title":"Understanding Knowledge As Commons","author":"C Hess","year":"2011"},{"key":"ref11","volume-title":"The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power","author":"S Zuboff","year":"2019"},{"key":"ref12","volume-title":"The Big Nine: How the Tech Titans and Their Thinking Machines Could Warp Humanity","author":"A Webb","year":"2019"},{"issue":"02","key":"ref13","doi-asserted-by":"crossref","first-page":"E31","DOI":"10.3390\/jpm9020031","article-title":"A scientific overview of smartphone applications and electronic devices for weight management in adults","volume":"9","author":"S L Holzmann","year":"2019","journal-title":"J Pers Med"},{"issue":"08","key":"ref14","doi-asserted-by":"crossref","first-page":"e198","DOI":"10.2196\/jmir.4581","article-title":"Mobile apps for bipolar disorder: a systematic review of features and content quality","volume":"17","author":"J Nicholas","year":"2015","journal-title":"J Med Internet Res"},{"issue":"04","key":"ref15","doi-asserted-by":"crossref","first-page":"e47","DOI":"10.2196\/mhealth.3745","article-title":"Preferences for a mobile HIV prevention app for men who have sex with men","volume":"2","author":"T Goldenberg","year":"2014","journal-title":"JMIR Mhealth Uhealth"},{"issue":"03","key":"ref16","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1177\/2168479017725556","article-title":"Mobile health applications for caring of older people: review and comparison","volume":"52","author":"V L Anthony Berauk","year":"2018","journal-title":"Ther Innov Regul Sci"},{"issue":"12","key":"ref17","doi-asserted-by":"crossref","first-page":"2833","DOI":"10.1007\/s11606-019-05214-0","article-title":"Commercialization of user data by developers of medicines-related apps: a content analysis","volume":"34","author":"Q Grundy","year":"2019","journal-title":"J Gen Intern Med"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"e28","DOI":"10.1136\/amiajnl-2013-002605","article-title":"Availability and quality of mobile health app privacy policies","volume":"22","author":"A Sunyaev","year":"2015","journal-title":"J Am Med Inform Assoc"},{"issue":"01","key":"ref19","doi-asserted-by":"crossref","first-page":"e8","DOI":"10.2196\/mhealth.3672","article-title":"Exploring the far side of mobile health: information security and privacy of mobile health apps on iOS and Android","volume":"3","author":"T Dehling","year":"2015","journal-title":"JMIR Mhealth Uhealth"},{"issue":"12","key":"ref20","doi-asserted-by":"crossref","first-page":"e11210","DOI":"10.2196\/11210","article-title":"A mobile app for assisting users to make informed selections in security settings for protecting personal health data: development and feasibility study","volume":"6","author":"L Zhou","year":"2018","journal-title":"JMIR Mhealth Uhealth"},{"issue":"11","key":"ref21","doi-asserted-by":"crossref","first-page":"1695","DOI":"10.1177\/1461444816636090","article-title":"From data fetishism to quantifying selves: self-tracking practices and the other values of data","volume":"19","author":"T Sharon","year":"2017","journal-title":"New Media Soc"},{"issue":"05","key":"ref22","doi-asserted-by":"crossref","first-page":"e123","DOI":"10.2196\/mhealth.9686","article-title":"Health care professionals' attitudes toward, and experiences of using, a culture-sensitive smartphone app for women with gestational diabetes mellitus: qualitative study","volume":"6","author":"L Garnweidner-Holme","year":"2018","journal-title":"JMIR Mhealth Uhealth"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/13390.001.0001","volume-title":"Right\/Wrong: How Technology Transforms Our Ethics","author":"J Enriquez","year":"2020"},{"issue":"02","key":"ref29","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1111\/jems.12192","article-title":"Privacy is precious: on the attempt to lift anonymity on the internet to increase revenue","volume":"26","author":"T Regner","year":"2017","journal-title":"J Econ Manage Strategy"},{"issue":"09","key":"ref34","doi-asserted-by":"crossref","first-page":"1492","DOI":"10.1001\/jamainternmed.2015.2903","article-title":"Information sharing preferences of older patients and their families","volume":"175","author":"B H Crotty","year":"2015","journal-title":"JAMA Intern Med"},{"key":"ref35","first-page":"1699","article-title":"Sharing my health data: a survey of data sharing preferences of healthy individuals","volume":"2014","author":"E A Bell","year":"2014","journal-title":"AMIA Annu Symp Proc"},{"issue":"03","key":"ref39","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1017\/S0963180114000589","article-title":"Selling health data: de-identification, privacy, and speech","volume":"24","author":"B Kaplan","year":"2015","journal-title":"Camb Q Healthc Ethics"},{"issue":"03","key":"ref40","doi-asserted-by":"crossref","first-page":"e82","DOI":"10.2196\/jmir.7270","article-title":"Enlight: a comprehensive quality and therapeutic potential evaluation tool for mobile and web-based ehealth interventions","volume":"19","author":"A Baumel","year":"2017","journal-title":"J Med Internet Res"},{"issue":"10","key":"ref41","doi-asserted-by":"crossref","first-page":"E2196","DOI":"10.3390\/ijerph15102196","article-title":"An evolutionary game-theoretic approach for assessing privacy protection in mHealth systems","volume":"15","author":"G Zhu","year":"2018","journal-title":"Int J Environ Res Public Health"},{"issue":"11","key":"ref42","doi-asserted-by":"crossref","first-page":"1825","DOI":"10.1016\/j.jand.2016.09.003","article-title":"Practice paper of the academy of nutrition and dietetics: social media and the dietetics practitioner: opportunities, challenges, and best practices","volume":"116","author":"J Helm","year":"2016","journal-title":"J Acad Nutr Diet"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09652-5","article-title":"Steganography-assisted secure localization of smart devices in internet of multimedia things (IoMT)","author":"S Khan","year":"2020","journal-title":"Multimed Tools Appl"},{"key":"ref46","first-page":"661","volume-title":"Alexander Hamilton","author":"R Chernow","year":"2004"},{"issue":"05","key":"ref50","doi-asserted-by":"crossref","first-page":"193","DOI":"10.2307\/1321160","article-title":"The right to privacy","volume":"4","author":"S D Warren","year":"1890","journal-title":"Harv Law Rev"}],"container-title":["Applied Clinical Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.thieme-connect.de\/products\/ejournals\/pdf\/10.1055\/s-0041-1727197.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,5]],"date-time":"2021-05-05T23:55:07Z","timestamp":1620258907000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.thieme-connect.de\/DOI\/DOI?10.1055\/s-0041-1727197"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3]]},"references-count":30,"journal-issue":{"issue":"02","published-online":{"date-parts":[[2021,3,17]]},"published-print":{"date-parts":[[2021,3]]}},"URL":"https:\/\/doi.org\/10.1055\/s-0041-1727197","relation":{},"ISSN":["1869-0327"],"issn-type":[{"value":"1869-0327","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3]]}}}