{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T16:05:55Z","timestamp":1762272355289,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":79,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,3]],"date-time":"2018-12-03T00:00:00Z","timestamp":1543795200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100005801","name":"Facebook","doi-asserted-by":"publisher","award":["Emerging Scholar Award"],"award-info":[{"award-number":["Emerging Scholar Award"]}],"id":[{"id":"10.13039\/100005801","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,3]]},"DOI":"10.1145\/3283458.3283472","type":"proceedings-article","created":{"date-parts":[[2019,1,23]],"date-time":"2019-01-23T13:10:20Z","timestamp":1548249020000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Cross-cultural perspectives on eHealth privacy in Africa"],"prefix":"10.1145","author":[{"given":"Moses","family":"Namara","sequence":"first","affiliation":[{"name":"Clemson University"}]},{"given":"Daricia","family":"Wilkinson","sequence":"additional","affiliation":[{"name":"Clemson University"}]},{"given":"Byron M.","family":"Lowens","sequence":"additional","affiliation":[{"name":"Clemson University"}]},{"given":"Bart P.","family":"Knijnenburg","sequence":"additional","affiliation":[{"name":"Clemson University"}]},{"given":"Rita","family":"Orji","sequence":"additional","affiliation":[{"name":"Dalhousie University, Canada"}]},{"given":"Remy L.","family":"Sekou","sequence":"additional","affiliation":[{"name":"IBM Research, Nairobi, Kenya"}]}],"member":"320","published-online":{"date-parts":[[2018,12,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Retrieved","author":"Abebe Rediet","year":"2018","unstructured":"Rediet Abebe , Shawndra Hill , Jennifer Wortman Vaughan , Peter M. Small , and H. Andrew Schwartz . 2018. Using Search Queries to Understand Health Information Needs in Africa. In Neural Information Processing Systems 30 (NIPS 2018) . Retrieved June 20, 2018 from http:\/\/arxiv.org\/abs\/1806.05740 Rediet Abebe, Shawndra Hill, Jennifer Wortman Vaughan, Peter M. Small, and H. Andrew Schwartz. 2018. Using Search Queries to Understand Health Information Needs in Africa. In Neural Information Processing Systems 30 (NIPS 2018). Retrieved June 20, 2018 from http:\/\/arxiv.org\/abs\/1806.05740"},{"key":"e_1_3_2_1_2_1","volume-title":"Ethiopia. Retrieved","author":"Union African","year":"1990","unstructured":"African Union . 1990 . The African Charter on the Rights and Welfare of the Child. African Commission on Human and People's Rights, Addis Ababa , Ethiopia. Retrieved June 22, 2018 from http:\/\/www.achpr.org\/files\/instruments\/child\/achpr_instr_charterchild_eng.pdf African Union. 1990. The African Charter on the Rights and Welfare of the Child. African Commission on Human and People's Rights, Addis Ababa, Ethiopia. Retrieved June 22, 2018 from http:\/\/www.achpr.org\/files\/instruments\/child\/achpr_instr_charterchild_eng.pdf"},{"key":"e_1_3_2_1_3_1","volume-title":"African Union Convention on Cyber Security and Personal Data Protection. The twenty-third Ordinary Session of the Assembly, Malabo, Equatorial Guinea. Retrieved","author":"Union African","year":"2014","unstructured":"African Union . 2014 . African Union Convention on Cyber Security and Personal Data Protection. The twenty-third Ordinary Session of the Assembly, Malabo, Equatorial Guinea. Retrieved June 22, 2018 from https:\/\/au.int\/en\/treaties\/african-union-convention-cyber-security-and-personal-data-protection African Union. 2014. African Union Convention on Cyber Security and Personal Data Protection. The twenty-third Ordinary Session of the Assembly, Malabo, Equatorial Guinea. Retrieved June 22, 2018 from https:\/\/au.int\/en\/treaties\/african-union-convention-cyber-security-and-personal-data-protection"},{"key":"e_1_3_2_1_4_1","volume-title":"African Union Convention on Cyber Security and Personal Data Protection. The twenty-third Ordinary Session of the Assembly, Malabo, Equatorial Guinea. Retrieved","author":"Union African","year":"2014","unstructured":"African Union . 2014 . African Union Convention on Cyber Security and Personal Data Protection. The twenty-third Ordinary Session of the Assembly, Malabo, Equatorial Guinea. Retrieved June 22, 2018 from https:\/\/au.int\/en\/treaties\/african-union-convention-cyber-security-and-personal-data-protection African Union. 2014. African Union Convention on Cyber Security and Personal Data Protection. The twenty-third Ordinary Session of the Assembly, Malabo, Equatorial Guinea. Retrieved June 22, 2018 from https:\/\/au.int\/en\/treaties\/african-union-convention-cyber-security-and-personal-data-protection"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socscimed.2018.01.011"},{"key":"e_1_3_2_1_6_1","first-page":"143","article-title":"Privacy and Security in Mobile Health (mHealth) Research","volume":"36","author":"Arora Shifali","year":"2014","unstructured":"Shifali Arora , Jennifer Yttri , and Wendy Nilsen . 2014 . Privacy and Security in Mobile Health (mHealth) Research . Alcohol Research: Current Reviews 36 , 1: 143 -- 151 . Shifali Arora, Jennifer Yttri, and Wendy Nilsen. 2014. Privacy and Security in Mobile Health (mHealth) Research. Alcohol Research: Current Reviews 36, 1: 143--151.","journal-title":"Alcohol Research: Current Reviews"},{"key":"e_1_3_2_1_7_1","volume-title":"GDPR matchup: The Health Insurance Portability and Accountability Act. IAPP: Privacy Tracker. Retrieved","author":"Baird Sean","year":"2018","unstructured":"Sean Baird . 2017. GDPR matchup: The Health Insurance Portability and Accountability Act. IAPP: Privacy Tracker. Retrieved July 2, 2018 from https:\/\/iapp.org\/news\/a\/gdpr-match-up-the-health-insurance-portability-and-accountability-act\/ Sean Baird. 2017. GDPR matchup: The Health Insurance Portability and Accountability Act. IAPP: Privacy Tracker. Retrieved July 2, 2018 from https:\/\/iapp.org\/news\/a\/gdpr-match-up-the-health-insurance-portability-and-accountability-act\/"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2017.1391912"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207727"},{"key":"e_1_3_2_1_10_1","article-title":"Startup seeking to offer WhatsApp for healthcare plans expansion to South Africa next year","author":"Baum Stephanie","year":"2017","unstructured":"Stephanie Baum . 2017 . Startup seeking to offer WhatsApp for healthcare plans expansion to South Africa next year . MedCity News. Retrieved July 2, 2018 from https:\/\/medcitynews.com\/2017\/11\/startup-seeking-offer-whatsapp-healthcare-plans-expansion-south-africa-next-year\/ Stephanie Baum. 2017. Startup seeking to offer WhatsApp for healthcare plans expansion to South Africa next year. MedCity News. Retrieved July 2, 2018 from https:\/\/medcitynews.com\/2017\/11\/startup-seeking-offer-whatsapp-healthcare-plans-expansion-south-africa-next-year\/","journal-title":"MedCity News. Retrieved"},{"key":"e_1_3_2_1_11_1","volume-title":"Data Protection: Southern African Developement Community (SADC) Model Law","author":"Le Bihan Jean-Francois","year":"2013","unstructured":"Jean-Francois Le Bihan , Ida Jallow , Sandro Bazzanella , Hiwot Mulugeta , and Brahima Sanou . 2013 . Data Protection: Southern African Developement Community (SADC) Model Law . International Telecommunication Union (ITU) . Retrieved June 22, 2018 from https:\/\/www.itu.int\/en\/ITU-D\/Projects\/ITU-EC-ACP\/HIPSSA\/Documents\/FINAL%20DOCUMENTS\/FINAL%20DOCS%20ENGLISH\/sadc_model_law_data_protection.pdf Jean-Francois Le Bihan, Ida Jallow, Sandro Bazzanella, Hiwot Mulugeta, and Brahima Sanou. 2013. Data Protection: Southern African Developement Community (SADC) Model Law. International Telecommunication Union (ITU). Retrieved June 22, 2018 from https:\/\/www.itu.int\/en\/ITU-D\/Projects\/ITU-EC-ACP\/HIPSSA\/Documents\/FINAL%20DOCUMENTS\/FINAL%20DOCS%20ENGLISH\/sadc_model_law_data_protection.pdf"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1377\/hlthaff.2009.0894"},{"key":"e_1_3_2_1_13_1","unstructured":"Nicolas Boring. 2016. C\u00f4te d'Ivoire: New Constitution Adopted. Global Legal Monitor. Retrieved from https:\/\/www.loc.gov\/law\/foreign-news\/article\/cte-divoire-new-constitution-adopted\/  Nicolas Boring. 2016. C\u00f4te d'Ivoire: New Constitution Adopted. Global Legal Monitor. Retrieved from https:\/\/www.loc.gov\/law\/foreign-news\/article\/cte-divoire-new-constitution-adopted\/"},{"volume-title":"African Data Privacy Laws","author":"Boshe Patricia","key":"e_1_3_2_1_14_1","unstructured":"Patricia Boshe . 2016. Data Privacy Law Reforms in Tanzania . In African Data Privacy Laws . Springer , Cham , 161--187. Patricia Boshe. 2016. Data Privacy Law Reforms in Tanzania. In African Data Privacy Laws. Springer, Cham, 161--187."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1177\/1948550612455931"},{"key":"e_1_3_2_1_16_1","unstructured":"Lee A. Bygrave. 2010. Privacy and data protection in an international perspective. Scandinavian studies in law 56: 165--200.  Lee A. Bygrave. 2010. Privacy and data protection in an international perspective. Scandinavian studies in law 56: 165--200."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1136\/amiajnl-2012-001023"},{"key":"e_1_3_2_1_18_1","volume-title":"Exploring Internet Security Perceptions and Practices in Urban Ghana. In Symposium on Usable Privacy and Security (SOUPS","author":"Chen Jay","year":"2014","unstructured":"Jay Chen , Michael Paik , and Kelly McCabe . 2014 . Exploring Internet Security Perceptions and Practices in Urban Ghana. In Symposium on Usable Privacy and Security (SOUPS 2014), 136. Retrieved from https:\/\/www.usenix.org\/sites\/default\/files\/soups14_proceedings.pdf#page=136 Jay Chen, Michael Paik, and Kelly McCabe. 2014. Exploring Internet Security Perceptions and Practices in Urban Ghana. In Symposium on Usable Privacy and Security (SOUPS 2014), 136. Retrieved from https:\/\/www.usenix.org\/sites\/default\/files\/soups14_proceedings.pdf#page=136"},{"key":"e_1_3_2_1_19_1","volume-title":"Act 108 of","author":"Assembly Constitutional","year":"1996","unstructured":"Constitutional Assembly . 1996. The Constitution of the Republic of South Africa , Act 108 of 1996 . Minister for Justice and Constitutional Development. Retrieved from http:\/\/www.wipo.int\/edocs\/lexdocs\/laws\/en\/za\/za107en.pdf Constitutional Assembly. 1996. The Constitution of the Republic of South Africa, Act 108 of 1996. Minister for Justice and Constitutional Development. Retrieved from http:\/\/www.wipo.int\/edocs\/lexdocs\/laws\/en\/za\/za107en.pdf"},{"volume-title":"South Africa. Retrieved","year":"2018","key":"e_1_3_2_1_20_1","unstructured":"Deloitte. 2017. Privacy is Paramount: Personal Data Protection in Africa. Johannesburg , South Africa. Retrieved July 1, 2018 from https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/za\/Documents\/risk\/za_Privacy_is_Paramount-Personal_Data_Protection_in_Africa.pdf Deloitte. 2017. Privacy is Paramount: Personal Data Protection in Africa. Johannesburg, South Africa. Retrieved July 1, 2018 from https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/za\/Documents\/risk\/za_Privacy_is_Paramount-Personal_Data_Protection_in_Africa.pdf"},{"key":"e_1_3_2_1_21_1","volume-title":"WhatsApp doc: Legal and practical perspectives of using mobile messaging. Digital Health. Retrieved","author":"Health Digital","year":"2018","unstructured":"Digital Health . 2018. WhatsApp doc: Legal and practical perspectives of using mobile messaging. Digital Health. Retrieved July 2, 2018 from https:\/\/www.digitalhealth.net\/2018\/02\/whatsapp-doc-legal-and-practical-perspectives-of-using-mobile-messaging\/ Digital Health. 2018. WhatsApp doc: Legal and practical perspectives of using mobile messaging. Digital Health. Retrieved July 2, 2018 from https:\/\/www.digitalhealth.net\/2018\/02\/whatsapp-doc-legal-and-practical-perspectives-of-using-mobile-messaging\/"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000590"},{"key":"e_1_3_2_1_23_1","volume-title":"Nigeria. Retrieved","author":"West African States Economic Community","year":"2011","unstructured":"Economic Community of West African States . 2011 . Directive fighting cyber crime within ECOWAS. Abuja , Nigeria. Retrieved June 22, 2018 from https:\/\/www.ccdcoe.org\/sites\/default\/files\/documents\/ECOWAS-110819-FightingCybercrime.pdf Economic Community of West African States. 2011. Directive fighting cyber crime within ECOWAS. Abuja, Nigeria. Retrieved June 22, 2018 from https:\/\/www.ccdcoe.org\/sites\/default\/files\/documents\/ECOWAS-110819-FightingCybercrime.pdf"},{"key":"e_1_3_2_1_24_1","first-page":"1","article-title":"Engaging Social Media for Health Communication in Africa:Approaches, Results and Lessons","volume":"6","author":"Fayoyin Adebayo","year":"2016","unstructured":"Adebayo Fayoyin . 2016 . Engaging Social Media for Health Communication in Africa:Approaches, Results and Lessons . Journal of Mass Communication & Journalism 6 , 6: 1 -- 7 . Adebayo Fayoyin. 2016. Engaging Social Media for Health Communication in Africa:Approaches, Results and Lessons. Journal of Mass Communication & Journalism 6, 6: 1--7.","journal-title":"Journal of Mass Communication & Journalism"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Tom Ferguson. 2002. From patients to end users: Quality of online patient networks needs more attention than quality of online health information. BMJ 324 7337: 555--556.  Tom Ferguson. 2002. From patients to end users: Quality of online patient networks needs more attention than quality of online health information. BMJ 324 7337: 555--556.","DOI":"10.1136\/bmj.324.7337.555"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socscimed.2007.06.001"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2016.10.013"},{"key":"e_1_3_2_1_28_1","volume-title":"Global Data Privacy Laws 2017: 120 National Data Privacy Laws, Including Indonesia and Turkey. UNSW Law Research Paper No. 17--45","author":"Greenleaf Graham","year":"2018","unstructured":"Graham Greenleaf . 2017. Global Data Privacy Laws 2017: 120 National Data Privacy Laws, Including Indonesia and Turkey. UNSW Law Research Paper No. 17--45 , Rochester, NY . Retrieved June 19, 2018 from https:\/\/papers.ssrn.com\/abstract=2993035 Graham Greenleaf. 2017. Global Data Privacy Laws 2017: 120 National Data Privacy Laws, Including Indonesia and Turkey. UNSW Law Research Paper No. 17--45, Rochester, NY. Retrieved June 19, 2018 from https:\/\/papers.ssrn.com\/abstract=2993035"},{"key":"e_1_3_2_1_29_1","volume-title":"Global Tables of Data Privacy Laws and Bills","author":"Greenleaf Graham","year":"2017","unstructured":"Graham Greenleaf . 2017. Global Tables of Data Privacy Laws and Bills ( 5 th Ed 2017 ). Social Science Research Network, Rochester, NY . Retrieved June 19, 2018 from https:\/\/papers.ssrn.com\/abstract=2992986 Graham Greenleaf. 2017. Global Tables of Data Privacy Laws and Bills (5th Ed 2017). Social Science Research Network, Rochester, NY. Retrieved June 19, 2018 from https:\/\/papers.ssrn.com\/abstract=2992986","edition":"5"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socscimed.2015.07.033"},{"key":"e_1_3_2_1_31_1","first-page":"1","article-title":"Privacy and Security in the Implementation of Health Information Technology (Electronic Health Records)","volume":"17","author":"Hiller Janine","year":"2011","unstructured":"Janine Hiller , Matthew S. McMullen , Wade M. Chumney , and David L. Baumer . 2011 . Privacy and Security in the Implementation of Health Information Technology (Electronic Health Records) : U.S. and EU Compared. Boston University Journal of Science & Technology Law 17 : 1 -- 39 Janine Hiller, Matthew S. McMullen, Wade M. Chumney, and David L. Baumer. 2011. Privacy and Security in the Implementation of Health Information Technology (Electronic Health Records): U.S. and EU Compared. Boston University Journal of Science & Technology Law 17: 1--39","journal-title":"U.S. and EU Compared. Boston University Journal of Science & Technology Law"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-010-9224-8"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180875.1180947"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.7196\/SAMJ.2017.v107i5.12047"},{"key":"e_1_3_2_1_35_1","first-page":"93","article-title":"Cross-Cultural Privacy Prediction","volume":"2","author":"Li Yao","year":"2017","unstructured":"Yao Li , Alfred Kobsa , Bart P Knijnenburg , and MH Carolyn Nguyen . 2017 . Cross-Cultural Privacy Prediction . Proceedings on Privacy Enhancing Technologies 2 : 93 -- 112 . Yao Li, Alfred Kobsa, Bart P Knijnenburg, and MH Carolyn Nguyen. 2017. Cross-Cultural Privacy Prediction. Proceedings on Privacy Enhancing Technologies 2: 93--112.","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"volume-title":"Wearable Privacy: Skeletons in The Data Closet. In 2017 IEEE International Conference on Healthcare Informatics (ICHI), 295--304","author":"Lowens B.","key":"e_1_3_2_1_36_1","unstructured":"B. Lowens , V. G. Motti , and K. Caine . 2017 . Wearable Privacy: Skeletons in The Data Closet. In 2017 IEEE International Conference on Healthcare Informatics (ICHI), 295--304 . B. Lowens, V. G. Motti, and K. Caine. 2017. Wearable Privacy: Skeletons in The Data Closet. In 2017 IEEE International Conference on Healthcare Informatics (ICHI), 295--304."},{"key":"e_1_3_2_1_37_1","volume-title":"TechRepublic. Retrieved","author":"Maddox Teena","year":"2015","unstructured":"Teena Maddox . 2015 . The dark side of wearables: How they're secretly jeopardizing your security and privacy . TechRepublic. Retrieved June 28, 2018 from https:\/\/www.techrepublic.com\/article\/the-dark-side-of-wearables-how-theyre-secretly-jeopardizing-your-security-and-privacy\/ Teena Maddox. 2015. The dark side of wearables: How they're secretly jeopardizing your security and privacy. TechRepublic. Retrieved June 28, 2018 from https:\/\/www.techrepublic.com\/article\/the-dark-side-of-wearables-how-theyre-secretly-jeopardizing-your-security-and-privacy\/"},{"volume-title":"Brand South Africa. Retrieved","year":"2017","key":"e_1_3_2_1_38_1","unstructured":"Mafika. 2017 . The Constitution of South Africa . Brand South Africa. Retrieved June 22, 2018 from https:\/\/www.brandsouthafrica.com\/governance\/constitution-sa-glance\/the-constitution-of-south-africa Mafika. 2017. The Constitution of South Africa. Brand South Africa. Retrieved June 22, 2018 from https:\/\/www.brandsouthafrica.com\/governance\/constitution-sa-glance\/the-constitution-of-south-africa"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1108\/AJEMS-03-2017-149"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ips014"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2014.11.005"},{"volume-title":"African Data Privacy Laws","author":"Makulilo Alex B.","key":"e_1_3_2_1_42_1","unstructured":"Alex B. Makulilo . 2016. The Context of Data Privacy in Africa . In African Data Privacy Laws . Springer , Cham , 3--23. Alex B. Makulilo. 2016. The Context of Data Privacy in Africa. In African Data Privacy Laws. Springer, Cham, 3--23."},{"key":"e_1_3_2_1_43_1","volume-title":"Retrieved","author":"Mas Ignacio","year":"2009","unstructured":"Ignacio Mas and Olga Morawczynski . 2009 . Designing Mobile Money Services Lessons from M-PESA . Retrieved June 28, 2018 from Ignacio Mas and Olga Morawczynski. 2009. Designing Mobile Money Services Lessons from M-PESA. Retrieved June 28, 2018 from"},{"key":"e_1_3_2_1_44_1","volume-title":"Kenya Health Policy 2014--2030: Towards attaining the highest standard of health. Ministry of Health","author":"Health Ministry","year":"2018","unstructured":"Ministry of Health . 2014. Kenya Health Policy 2014--2030: Towards attaining the highest standard of health. Ministry of Health , Nairobi, Kenya . Retrieved June 22, 2018 from http:\/\/publications.universalhealth2030.org\/uploads\/kenya_health_policy_2014_to_2030.pdf Ministry of Health. 2014. Kenya Health Policy 2014--2030: Towards attaining the highest standard of health. Ministry of Health, Nairobi, Kenya. Retrieved June 22, 2018 from http:\/\/publications.universalhealth2030.org\/uploads\/kenya_health_policy_2014_to_2030.pdf"},{"key":"e_1_3_2_1_45_1","volume-title":"United Nations Conference on Trade and Development, New York and Geneva. Retrieved","author":"Miroux Anne","year":"2013","unstructured":"Anne Miroux , Cecile Barayre , and Torbjorn Fredriksson . 2013 . Harmonizing Cyberlaws and Regulations: The experience of the East African Community . United Nations Conference on Trade and Development, New York and Geneva. Retrieved June 22, 2018 from http:\/\/unctad.org\/en\/PublicationsLibrary\/dtlstict2012d4_en.pdf Anne Miroux, Cecile Barayre, and Torbjorn Fredriksson. 2013. Harmonizing Cyberlaws and Regulations: The experience of the East African Community. United Nations Conference on Trade and Development, New York and Geneva. Retrieved June 22, 2018 from http:\/\/unctad.org\/en\/PublicationsLibrary\/dtlstict2012d4_en.pdf"},{"key":"e_1_3_2_1_46_1","volume-title":"EVA System: A turnkey solution for visual-based medical procedures. MobileODT. Retrieved","author":"ODT.","year":"2018","unstructured":"Mobile ODT. 2012. EVA System: A turnkey solution for visual-based medical procedures. MobileODT. Retrieved July 2, 2018 from https:\/\/www.mobileodt.com\/eva-system\/ MobileODT. 2012. EVA System: A turnkey solution for visual-based medical procedures. MobileODT. Retrieved July 2, 2018 from https:\/\/www.mobileodt.com\/eva-system\/"},{"key":"e_1_3_2_1_47_1","volume-title":"Health Wearable Devices in the Big Data Era: Ensuring Privacy, Security, and Consumer Protection","author":"Montgomery Kathryn C","year":"2016","unstructured":"Kathryn C Montgomery , Jeff Chester , and Katharina Kopp . 2016. Health Wearable Devices in the Big Data Era: Ensuring Privacy, Security, and Consumer Protection . Center for Digital Democracy, American University. Retrieved from https:\/\/www.democraticmedia.org\/sites\/default\/files\/field\/public\/ 2016 \/aucdd_wearablesreport_final121516.pdf Kathryn C Montgomery, Jeff Chester, and Katharina Kopp. 2016. Health Wearable Devices in the Big Data Era: Ensuring Privacy, Security, and Consumer Protection. Center for Digital Democracy, American University. Retrieved from https:\/\/www.democraticmedia.org\/sites\/default\/files\/field\/public\/2016\/aucdd_wearablesreport_final121516.pdf"},{"key":"e_1_3_2_1_48_1","unstructured":"Avuya Mxoli and Nicky Mostert-Phipps. 2016. Risks and Benefits of Social Computing as a Healthcare Tool. Proceeding of International Multi-Conference on Complexity Informatics and Cybernetics. Retrieved from http:\/\/www.iiis.org\/CDs2016\/CD2016Spring\/papers\/HB329XQ.pdf  Avuya Mxoli and Nicky Mostert-Phipps. 2016. Risks and Benefits of Social Computing as a Healthcare Tool. Proceeding of International Multi-Conference on Complexity Informatics and Cybernetics. Retrieved from http:\/\/www.iiis.org\/CDs2016\/CD2016Spring\/papers\/HB329XQ.pdf"},{"key":"e_1_3_2_1_49_1","volume-title":"Constitution of the Federal Republic of Nigeria","author":"Parliament Nigerian","year":"2018","unstructured":"Nigerian Parliament . 1999. Constitution of the Federal Republic of Nigeria . International Center for Nigerian Law . Retrieved June 22, 2018 from http:\/\/www.nigeria-law.org\/ConstitutionOfTheFederalRepublicOfNigeria.htm Nigerian Parliament. 1999. Constitution of the Federal Republic of Nigeria. International Center for Nigerian Law. Retrieved June 22, 2018 from http:\/\/www.nigeria-law.org\/ConstitutionOfTheFederalRepublicOfNigeria.htm"},{"key":"e_1_3_2_1_50_1","first-page":"119","article-title":"Privacy as Contextual Integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum . 2004 . Privacy as Contextual Integrity . Washington Law Review 79 : 119 -- 157 . Helen Nissenbaum. 2004. Privacy as Contextual Integrity. Washington Law Review 79: 119--157.","journal-title":"Washington Law Review"},{"key":"e_1_3_2_1_51_1","volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"Nissenbaum Helen","year":"2013","unstructured":"Helen Nissenbaum . 2009. Privacy in context: Technology, policy, and the integrity of social life . Stanford University Press , Stanford, CA . Retrieved September 24, 2013 from http:\/\/books.google.com.sg\/books?hl=en&lr=&id=_NN1uGn1Jd8C&oi=fnd&pg=PR7&dq=Privacy+in+Context:+Technology,+Policy,+an+d+the+Integrity+of+Social+Life&ots=_J9lXtm4CQ&sig=uwEmoieGtVJQhegXvrT7TryaTrg Helen Nissenbaum. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press, Stanford, CA. Retrieved September 24, 2013 from http:\/\/books.google.com.sg\/books?hl=en&lr=&id=_NN1uGn1Jd8C&oi=fnd&pg=PR7&dq=Privacy+in+Context:+Technology,+Policy,+an+d+the+Integrity+of+Social+Life&ots=_J9lXtm4CQ&sig=uwEmoieGtVJQhegXvrT7TryaTrg"},{"key":"e_1_3_2_1_52_1","volume-title":"Mobile money increasing healthcare access. Mobile money increasing healthcare access. Retrieved","author":"Obadha Melvin","year":"2018","unstructured":"Melvin Obadha , Andrew Seal , and Tim Colbourn . 2018. Mobile money increasing healthcare access. Mobile money increasing healthcare access. Retrieved June 7, 2018 from https:\/\/www.scidev.net\/sub-saharan-africa\/health\/opinion\/mobile-money-increasing-healthcare-access.html Melvin Obadha, Andrew Seal, and Tim Colbourn. 2018. Mobile money increasing healthcare access. Mobile money increasing healthcare access. Retrieved June 7, 2018 from https:\/\/www.scidev.net\/sub-saharan-africa\/health\/opinion\/mobile-money-increasing-healthcare-access.html"},{"key":"e_1_3_2_1_53_1","volume-title":"Orange's first healthcare hotline in Cameroon. Orange Healthcare. Retrieved","author":"Healthcare Orange","year":"2018","unstructured":"Orange Healthcare . 2014. \" My Healthline\" : Orange's first healthcare hotline in Cameroon. Orange Healthcare. Retrieved July 1, 2018 from http:\/\/healthcare.orange.com\/en\/Press-and-medias\/Press-releases\/2014-Press-Releases\/My-Healthline-Orange-s-first-healthcare-hotline-in-Cameroon Orange Healthcare. 2014. \"My Healthline\": Orange's first healthcare hotline in Cameroon. Orange Healthcare. Retrieved July 1, 2018 from http:\/\/healthcare.orange.com\/en\/Press-and-medias\/Press-releases\/2014-Press-Releases\/My-Healthline-Orange-s-first-healthcare-hotline-in-Cameroon"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2799522"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-017-0535-0"},{"key":"e_1_3_2_1_56_1","volume-title":"Kenya Parliament. Retrieved","author":"Parliamentary Select Committee (PSC) and Committee of Experts.","year":"2010","unstructured":"Parliamentary Select Committee (PSC) and Committee of Experts. 2010 . Constitution of Kenya . Kenya Parliament. Retrieved June 18, 2018 from http:\/\/kenyalaw.org\/kl\/index.php?id=398 Parliamentary Select Committee (PSC) and Committee of Experts. 2010. Constitution of Kenya. Kenya Parliament. Retrieved June 18, 2018 from http:\/\/kenyalaw.org\/kl\/index.php?id=398"},{"key":"e_1_3_2_1_57_1","volume-title":"CellPhones in Africa: Communication Lifeline","author":"Poushter Jacob","year":"2015","unstructured":"Jacob Poushter and Russ Oates . 2015. CellPhones in Africa: Communication Lifeline . Pew Research Center , Washington, DC. Retrieved from http:\/\/www.pewglobal.org\/files\/ 2015 \/04\/Pew-Research-Center-Africa-Cell-Phone-Report-FINAL-April-15-2015.pdf Jacob Poushter and Russ Oates. 2015. CellPhones in Africa: Communication Lifeline. Pew Research Center, Washington, DC. Retrieved from http:\/\/www.pewglobal.org\/files\/2015\/04\/Pew-Research-Center-Africa-Cell-Phone-Report-FINAL-April-15-2015.pdf"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpp.1855"},{"key":"e_1_3_2_1_59_1","volume-title":"Privacy International. Retrieved","author":"Privacy International and National Coalition of Human Rights Defenders.","year":"2018","unstructured":"Privacy International and National Coalition of Human Rights Defenders. 2018 . State of Privacy Kenya . Privacy International. Retrieved June 21, 2018 from http:\/\/www.privacyinternational.org\/state-privacy\/1005\/state-privacy-kenya Privacy International and National Coalition of Human Rights Defenders. 2018. State of Privacy Kenya. Privacy International. Retrieved June 21, 2018 from http:\/\/www.privacyinternational.org\/state-privacy\/1005\/state-privacy-kenya"},{"key":"e_1_3_2_1_60_1","volume-title":"Privacy International. Retrieved","author":"International Privacy","year":"2018","unstructured":"Privacy International and Unwanted Witness . 2018 . State of Privacy Uganda . Privacy International. Retrieved June 21, 2018 from http:\/\/privacyinternational.org\/state-privacy\/1013\/state-privacy-uganda Privacy International and Unwanted Witness. 2018. State of Privacy Uganda. Privacy International. Retrieved June 21, 2018 from http:\/\/privacyinternational.org\/state-privacy\/1013\/state-privacy-uganda"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bjoms.2016.04.020"},{"key":"e_1_3_2_1_62_1","volume-title":"Retrieved","author":"Sarasohn-Kahn Jane","year":"2008","unstructured":"Jane Sarasohn-Kahn . 2008 . The Wisdom of Patients: Health Care Meets Online Social Media . Retrieved May 21, 2018 from https:\/\/books.google.com\/books\/about\/The_Wisdom_of_Patients.html?id=tIeqOgAACAAJ Jane Sarasohn-Kahn. 2008. The Wisdom of Patients: Health Care Meets Online Social Media. Retrieved May 21, 2018 from https:\/\/books.google.com\/books\/about\/The_Wisdom_of_Patients.html?id=tIeqOgAACAAJ"},{"key":"e_1_3_2_1_63_1","unstructured":"Sandra Schmitz. 2013. Facebook's Real Name Policy: Bye-Bye Max Mustermann? 15.  Sandra Schmitz. 2013. Facebook's Real Name Policy: Bye-Bye Max Mustermann? 15."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"crossref","unstructured":"Araba Sey. 2009. Exploring mobile phone-sharing practices in Ghana. info 11 2: 66--78.  Araba Sey. 2009. Exploring mobile phone-sharing practices in Ghana. info 11 2: 66--78.","DOI":"10.1108\/14636690910941894"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.10.114"},{"volume-title":"Social Media Stats Africa. StatCounter Global Stats. Retrieved","year":"2018","key":"e_1_3_2_1_66_1","unstructured":"StatCounter. 2018. Social Media Stats Africa. StatCounter Global Stats. Retrieved July 2, 2018 from http:\/\/gs.statcounter.com\/social-media-stats\/all\/africa StatCounter. 2018. Social Media Stats Africa. StatCounter Global Stats. Retrieved July 2, 2018 from http:\/\/gs.statcounter.com\/social-media-stats\/all\/africa"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1136\/amiajnl-2013-002605"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.4387"},{"key":"e_1_3_2_1_69_1","unstructured":"Matti Tedre and Bukaza Chachage. 2008. University Students' Attitudes Towards e-security Issues: A Survey Study in Tumaini University Tanzania. http:\/\/hdl.handle.net\/20.500.11810\/2378  Matti Tedre and Bukaza Chachage. 2008. University Students' Attitudes Towards e-security Issues: A Survey Study in Tumaini University Tanzania. http:\/\/hdl.handle.net\/20.500.11810\/2378"},{"key":"e_1_3_2_1_70_1","volume-title":"Directive on the protection of individuals with regard to the processing of personal data and on the free movement of such data. European Parliament","author":"Parliament The European","year":"2018","unstructured":"The European Parliament . 1995. Directive on the protection of individuals with regard to the processing of personal data and on the free movement of such data. European Parliament , Kirchberg, Luxembourg . Retrieved June 23, 2018 from https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=celex%3A31995L0046 The European Parliament. 1995. Directive on the protection of individuals with regard to the processing of personal data and on the free movement of such data. European Parliament, Kirchberg, Luxembourg. Retrieved June 23, 2018 from https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=celex%3A31995L0046"},{"key":"e_1_3_2_1_71_1","volume-title":"South AFRICA. Retrieved","author":"Townsend Beverley","year":"2015","unstructured":"Beverley Townsend . 2015 . mHealth Regulation Impact Assessment: Africa. GSMA , South AFRICA. Retrieved June 22, 2018 from https:\/\/www.gsma.com\/mobilefordevelopment\/wp-content\/uploads\/2015\/03\/003-GSMA-RIA-Africa-27feb15.pdf Beverley Townsend. 2015. mHealth Regulation Impact Assessment: Africa. GSMA, South AFRICA. Retrieved June 22, 2018 from https:\/\/www.gsma.com\/mobilefordevelopment\/wp-content\/uploads\/2015\/03\/003-GSMA-RIA-Africa-27feb15.pdf"},{"key":"e_1_3_2_1_72_1","volume-title":"Cape Town, South Africa. Retrieved","author":"Townsend Beverley Alice","year":"2018","unstructured":"Beverley Alice Townsend . 2017. Privacy and data protection in eHealth in Africa -an assessment of the regulatory frameworks that govern privacy and data protection in the effective implementation of electronic health care in Africa: is there a need for reform and greater regional collaboration in regulatory policymaking? University of Cape Town , Cape Town, South Africa. Retrieved July 2, 2018 from https:\/\/open.uct.ac.za\/handle\/11427\/25510 Beverley Alice Townsend. 2017. Privacy and data protection in eHealth in Africa -an assessment of the regulatory frameworks that govern privacy and data protection in the effective implementation of electronic health care in Africa: is there a need for reform and greater regional collaboration in regulatory policymaking? University of Cape Town, Cape Town, South Africa. Retrieved July 2, 2018 from https:\/\/open.uct.ac.za\/handle\/11427\/25510"},{"key":"e_1_3_2_1_73_1","volume-title":"Covered Entities and Business Associates. Health Information Privacy. Retrieved","author":"US Department of Health & Human Services. 2015.","year":"2018","unstructured":"US Department of Health & Human Services. 2015. Covered Entities and Business Associates. Health Information Privacy. Retrieved July 2, 2018 from https:\/\/www.hhs.gov\/hipaa\/for-professionals\/covered-entities\/index.html US Department of Health & Human Services. 2015. Covered Entities and Business Associates. Health Information Privacy. Retrieved July 2, 2018 from https:\/\/www.hhs.gov\/hipaa\/for-professionals\/covered-entities\/index.html"},{"key":"e_1_3_2_1_74_1","volume-title":"104th US Congress, Washington, D.C. Retrieved","author":"Government Printing Office U.S.","year":"1996","unstructured":"U.S. Government Printing Office . 1996 . Insurance Portability and Accountability Act of 1996 . 104th US Congress, Washington, D.C. Retrieved June 18, 2018 from https:\/\/www.gpo.gov\/fdsys\/pkg\/PLAW-104publ191\/content-detail.html U.S. Government Printing Office. 1996. Insurance Portability and Accountability Act of 1996. 104th US Congress, Washington, D.C. Retrieved June 18, 2018 from https:\/\/www.gpo.gov\/fdsys\/pkg\/PLAW-104publ191\/content-detail.html"},{"volume-title":"Digital Health","author":"Vasudevan Lavanya","key":"e_1_3_2_1_75_1","unstructured":"Lavanya Vasudevan , Kelsey Zeller , and Alain Labrique . 2018. Mobile Health . In Digital Health . Springer , USA , 15--25. Lavanya Vasudevan, Kelsey Zeller, and Alain Labrique. 2018. Mobile Health. In Digital Health. Springer, USA, 15--25."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/549420"},{"key":"e_1_3_2_1_77_1","volume-title":"mHealth Design ToolKit: Ten principles to launch, develop and scale mobile health services in emerging markets. GSMA mHealth Program, frog","author":"Wacker Tobias","year":"2018","unstructured":"Tobias Wacker , Lilian Tse , and Chiara Diana . 2017. mHealth Design ToolKit: Ten principles to launch, develop and scale mobile health services in emerging markets. GSMA mHealth Program, frog , London, U.K. Retrieved June 11, 2018 from https:\/\/www.gsma.com\/mobilefordevelopment\/mhealth\/mhealth-design-toolkit\/ Tobias Wacker, Lilian Tse, and Chiara Diana. 2017. mHealth Design ToolKit: Ten principles to launch, develop and scale mobile health services in emerging markets. GSMA mHealth Program, frog, London, U.K. Retrieved June 11, 2018 from https:\/\/www.gsma.com\/mobilefordevelopment\/mhealth\/mhealth-design-toolkit\/"},{"key":"e_1_3_2_1_78_1","unstructured":"Mobile for Development - mHealth. Retrieved June 11 2018 from https:\/\/www.gsma.com\/mobilefordevelopment\/mhealth\/  Mobile for Development - mHealth. Retrieved June 11 2018 from https:\/\/www.gsma.com\/mobilefordevelopment\/mhealth\/"},{"key":"e_1_3_2_1_79_1","unstructured":"State of Privacy South Africa. Privacy International. Retrieved June 21 2018 from http:\/\/privacyinternational.org\/state-privacy\/1010\/state-privacy-south-africa  State of Privacy South Africa. Privacy International. Retrieved June 21 2018 from http:\/\/privacyinternational.org\/state-privacy\/1010\/state-privacy-south-africa"}],"event":{"name":"AfriCHI '18: 2nd African Conference for Human Computer Interaction","acronym":"AfriCHI '18","location":"Windhoek Namibia"},"container-title":["Proceedings of the Second African Conference for Human Computer Interaction: Thriving Communities"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3283458.3283472","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3283458.3283472","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:44:09Z","timestamp":1750207449000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3283458.3283472"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,3]]},"references-count":79,"alternative-id":["10.1145\/3283458.3283472","10.1145\/3283458"],"URL":"https:\/\/doi.org\/10.1145\/3283458.3283472","relation":{},"subject":[],"published":{"date-parts":[[2018,12,3]]},"assertion":[{"value":"2018-12-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}