{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T12:16:33Z","timestamp":1771330593954,"version":"3.50.1"},"reference-count":42,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T00:00:00Z","timestamp":1764115200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,26]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>The increasing reliance on digital technologies in health care brings unique privacy risks to individual users. Guided by the framework of contextual integrity (CI), this study examined how privacy norms compare across four mobile health technological contexts: telehealth, online patient portals, mobile health applications, and wearable devices. Analysis of 34 semi-structured interviews revealed context-specific actors, information types, and transmission principles, and identified instances that represent points of departure from entrenched privacy norms. In addition, we found that people use privacy heuristics\u2014evoked by CI parameters\u2014to guide their privacy evaluations. Findings theoretically contribute to CI by identifying parameters in the novel context of mobile health and by proposing privacy heuristics as the explanatory mechanism underlying the evaluation of privacy norms. Practically, findings can inform more user-centered mobile health design and communication practices.<\/jats:p>","DOI":"10.1093\/jcmc\/zmaf022","type":"journal-article","created":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T11:59:45Z","timestamp":1760097585000},"source":"Crossref","is-referenced-by-count":0,"title":["From screens to sensors: a contextual integrity approach to understanding privacy norms across mobile health contexts"],"prefix":"10.1093","volume":"31","author":[{"given":"Leheng","family":"Lin","sequence":"first","affiliation":[{"name":"Department of Communication Studies, Moody College of Communication, The University of Texas at Austin , Austin, TX,","place":["United States"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6795-3039","authenticated-orcid":false,"given":"Laurent H","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Communication, University of California , Santa Barbara, CA,","place":["United States"]}]}],"member":"286","published-online":{"date-parts":[[2025,11,26]]},"reference":[{"key":"2026021706262554600_zmaf022-B1","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-3-030-79753-9_10","article-title":"EHealth, mHealth, and telemedicine for COVID-19 pandemic","author":"Adetunji","year":"2022","journal-title":"Assessing COVID-19 and Other Pandemics and Epidemics Using Computational Modelling and Data Analysis"},{"key":"2026021706262554600_zmaf022-B2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3214262","article-title":"Discovering smart home internet of things privacy norms using contextual integrity","volume":"2","author":"Apthorpe","year":"2018","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"2026021706262554600_zmaf022-B3","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1080\/10810730.2015.1018560","article-title":"Consumer attitudes and perceptions on mHealth Privacy and security: Findings from a mixed-methods study","volume":"20","author":"Atienza","year":"2015","journal-title":"Journal of Health Communication"},{"key":"2026021706262554600_zmaf022-B4","author":"Auxier","year":"2020"},{"key":"2026021706262554600_zmaf022-B5","doi-asserted-by":"publisher","first-page":"102780","DOI":"10.1016\/j.telpol.2024.102780","article-title":"Contextual integrity of loyalty programs, compromised? Interrogating Consumer Health Data Practices and networked actors in the U.S. retail Sector","volume":"48","author":"Baik","year":"2024","journal-title":"Telecommunications Policy"},{"key":"2026021706262554600_zmaf022-B6","author":"Ball","year":"2021"},{"key":"2026021706262554600_zmaf022-B7","doi-asserted-by":"crossref","first-page":"246","DOI":"10.4324\/9781003244677-28","volume-title":"The Routledge handbook of privacy and social media","author":"B\u00f6rsting","year":"2023"},{"key":"2026021706262554600_zmaf022-B8","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.4564","article-title":"Utilizing remote real-time videoconferencing to expand access to cancer genetic services in community practices: A multicenter feasibility study","volume":"18","author":"Bradbury","year":"2016","journal-title":"Journal of Medical Internet Research"},{"key":"2026021706262554600_zmaf022-B9","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.ijmedinf.2017.01.007","article-title":"An ontology of and roadmap for mHealth Research","volume":"100","author":"Cameron","year":"2017","journal-title":"International Journal of Medical Informatics"},{"key":"2026021706262554600_zmaf022-B10","doi-asserted-by":"publisher","first-page":"1824","DOI":"10.1177\/1461444819833331","article-title":"The corporate cultivation of digital resignation","volume":"21","author":"Draper","year":"2019","journal-title":"New Media & Society"},{"key":"2026021706262554600_zmaf022-B11","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1007\/s41649-024-00296-3","article-title":"Mapping the apps: Ethical and legal issues with crowdsourced smartphone data using mHealth Applications","volume":"16","author":"Farag","year":"2024","journal-title":"Asian Bioethics Review"},{"key":"2026021706262554600_zmaf022-B12","volume-title":"Social cognition","author":"Fiske","year":"1984"},{"key":"2026021706262554600_zmaf022-B13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3359260","article-title":"Becoming part of something bigger","volume":"3","author":"King","year":"2019","journal-title":"Proceedings of the ACM on Human-Computer Interaction"},{"key":"2026021706262554600_zmaf022-B14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3422158","article-title":"Mobile and wearable sensing frameworks for mHealth Studies and Applications","volume":"2","author":"Kumar","year":"2020","journal-title":"ACM Transactions on Computing for Healthcare"},{"key":"2026021706262554600_zmaf022-B15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3653710","article-title":"A roadmap for applying the Contextual Integrity Framework in Qualitative Privacy Research","volume":"8","author":"Kumar","year":"2024","journal-title":"Proceedings of the ACM on Human-Computer Interaction"},{"key":"2026021706262554600_zmaf022-B16","author":"Lucas","year":"2022"},{"key":"2026021706262554600_zmaf022-B17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78884-5","volume-title":"Situational privacy and self-disclosure: Communication processes in online environments","author":"Masur","year":"2018"},{"key":"2026021706262554600_zmaf022-B18","doi-asserted-by":"publisher","first-page":"69","DOI":"10.31235\/osf.io\/fjqhs","article-title":"Comparative privacy research: Literature review, framework, and research agenda","volume":"41","author":"Masur","year":"2025","journal-title":"The Information Society"},{"key":"2026021706262554600_zmaf022-B19","author":"McClain","year":"2023"},{"key":"2026021706262554600_zmaf022-B20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3313831.3376167","article-title":"The politics of privacy theories: Moving from norms to vulnerabilities","author":"McDonald","year":"2020","journal-title":"Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems"},{"key":"2026021706262554600_zmaf022-B21","volume-title":"Privacy in context: Technology, policy, and the integrity of Social Life","author":"Nissenbaum","year":"2010"},{"key":"2026021706262554600_zmaf022-B22","volume-title":"Qualitative Research & Evaluation Methods","author":"Patton","year":"2014"},{"key":"2026021706262554600_zmaf022-B23","doi-asserted-by":"publisher","first-page":"381","DOI":"10.4324\/9781003043379-32","article-title":"The role of technology in health communication","author":"Rice","year":"2021","journal-title":"The Routledge handbook of health communication"},{"key":"2026021706262554600_zmaf022-B24","first-page":"153","volume-title":"Social psychophysiology: A sourcebook","author":"Rogers","year":"1983"},{"key":"2026021706262554600_zmaf022-B25","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1080\/1369118x.2024.2423345","article-title":"Expectations vs reality: Teenager views of institutional privacy","volume":"28","author":"Ruppert","year":"2024","journal-title":"Information, Communication & Society"},{"key":"2026021706262554600_zmaf022-B26","doi-asserted-by":"publisher","first-page":"e49394","DOI":"10.2196\/49394","article-title":"Patient portals fail to collect structured information about who else is involved in a person\u2019s care","volume":"26","author":"Salmi","year":"2024","journal-title":"Journal of medical Internet research"},{"key":"2026021706262554600_zmaf022-B27","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/s10676-020-09576-6","article-title":"Optimization of what? For-profit health apps as manipulative digital environments","volume":"23","author":"Sax","year":"2021","journal-title":"Ethics and Information Technology"},{"key":"2026021706262554600_zmaf022-B28","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1097\/ncn.0b013e318224b597","article-title":"Patient-provider internet portals\u2014patient outcomes and use","volume":"29","author":"Shaw","year":"2011","journal-title":"CIN: Computers, Informatics, Nursing"},{"key":"2026021706262554600_zmaf022-B29","author":"Stewart","year":"2024"},{"key":"2026021706262554600_zmaf022-B30","author":"Strawley","year":"2023"},{"key":"2026021706262554600_zmaf022-B31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3313831.3376854","article-title":"Online privacy heuristics that predict information disclosure","author":"Sundar","year":"2020","journal-title":"Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems"},{"key":"2026021706262554600_zmaf022-B32","volume-title":"Qualitative research methods: Collecting evidence, crafting analysis, communicating impact","author":"Tracy","year":"2024"},{"key":"2026021706262554600_zmaf022-B33","author":"U.S. Department of Health and Human Services","year":"2025"},{"key":"2026021706262554600_zmaf022-B34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/2056305120948250","article-title":"More than just privacy: Using contextual integrity to evaluate the long-term risks from COVID-19 surveillance Technologies","volume":"6","author":"Vitak","year":"2020","journal-title":"Social Media + Society"},{"key":"2026021706262554600_zmaf022-B35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/jcmc\/zmad007","article-title":"Surveillance and the future of work: Exploring employees\u2019 attitudes toward monitoring in a post-COVID Workplace","volume":"28","author":"Vitak","year":"2023","journal-title":"Journal of Computer-Mediated Communication"},{"key":"2026021706262554600_zmaf022-B36","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2025.2539293","article-title":"Beyond the individual level: A social-ecological perspective to understanding technology maintenance barriers and strategies among low-income U.S. adults","author":"Wang","year":"2025","journal-title":"Information, Communication & Society"},{"key":"2026021706262554600_zmaf022-B37","doi-asserted-by":"publisher","DOI":"10.1177\/00936502241273157","article-title":"The Online Privacy Divide: Testing Resource and identity explanations for racial\/ethnic differences in privacy concerns and privacy management behaviors on social media","author":"Wang","year":"2024","journal-title":"Communication Research"},{"key":"2026021706262554600_zmaf022-B38","doi-asserted-by":"publisher","first-page":"3750","DOI":"10.1080\/0144929X.2024.2448706","article-title":"Mastering boundaries: Differences in online privacy boundary phenomena across digital devices and years","volume":"44","author":"Wang","year":"2025","journal-title":"Behaviour & Information Technology"},{"key":"2026021706262554600_zmaf022-B39","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1080\/01972243.2018.1542648","article-title":"Big Data Governance of personal health information and challenges to Contextual Integrity","volume":"35","author":"Winter","year":"2019","journal-title":"The Information Society"},{"key":"2026021706262554600_zmaf022-B40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3359161","article-title":"Privacy perceptions and designs of bystanders in smart homes","volume":"3","author":"Yao","year":"2019","journal-title":"Proceedings of the ACM on Human-Computer Interaction"},{"key":"2026021706262554600_zmaf022-B41","doi-asserted-by":"publisher","DOI":"10.2196\/11223","article-title":"Barriers to and facilitators of the use of mobile health apps from a security perspective: Mixed-methods study","volume":"7","author":"Zhou","year":"2019","journal-title":"JMIR mHealth and uHealth"},{"key":"2026021706262554600_zmaf022-B42","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.1080\/1369118x.2018.1543442","article-title":"\u2018there\u2019s nothing really they can do with this information\u2019: Unpacking how users manage privacy boundaries for personal fitness information","volume":"23","author":"Zimmer","year":"2020","journal-title":"Information, Communication & Society"}],"container-title":["Journal of Computer-Mediated Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/jcmc\/article-pdf\/31\/1\/zmaf022\/65502497\/zmaf022.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/jcmc\/article-pdf\/31\/1\/zmaf022\/65502497\/zmaf022.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T11:26:34Z","timestamp":1771327594000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/jcmc\/article\/doi\/10.1093\/jcmc\/zmaf022\/8342750"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,26]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,11,26]]}},"URL":"https:\/\/doi.org\/10.1093\/jcmc\/zmaf022","relation":{},"ISSN":["1083-6101"],"issn-type":[{"value":"1083-6101","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2026,1]]},"published":{"date-parts":[[2025,11,26]]},"article-number":"zmaf022"}}