{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T11:45:00Z","timestamp":1765453500781,"version":"3.46.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","funder":[{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e Tecnologia (FCT) - INESC-ID","award":["UIDB\/50021\/2020"],"award-info":[{"award-number":["UIDB\/50021\/2020"]}]},{"name":"EU Horizon 2020 - BIG (Enhancing the research and innovation potential of T\u00e9cnico through Blockchain technologies and design Innovation for social Good)","award":["952226"],"award-info":[{"award-number":["952226"]}]},{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e Tecnologia (FCT) - WELL","award":["2024.07494.IACDC"],"award-info":[{"award-number":["2024.07494.IACDC"]}]},{"name":"Project Blockchain.PT - Decentralize Portugal with Blockchain Agenda, (Project no 51), WP1: Agriculture and Agri-food","award":["2\/C05-i01.01\/2022"],"award-info":[{"award-number":["2\/C05-i01.01\/2022"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,9,3]]},"DOI":"10.1145\/3748699.3749771","type":"proceedings-article","created":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T07:01:29Z","timestamp":1765350089000},"page":"33-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Trust Through Transparency: Blockchain for Consent and Accountability in Femtech Applications"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-7010-6399","authenticated-orcid":false,"given":"Larissa","family":"Tomaz","sequence":"first","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa, Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6229-2588","authenticated-orcid":false,"given":"David R.","family":"Matos","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa, Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7393-3379","authenticated-orcid":false,"given":"Teresa","family":"Almeida","sequence":"additional","affiliation":[{"name":"ITI\/LARSyS, Instituto Superior T\u00e9cnico, Universidade de Lisboa, Lisbon, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2025,12,9]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"Arizton\u00a0Advisory &\u00a0Intelligence. 2021. Femtech market size to reach revenues of around USD 75.74 billion by 2026 - Arizton. https:\/\/www.prnewswire.com\/news-releases\/femtech-market-size-to-reach-revenues-of-around-usd-75-74-billion-by-2026\u2013arizton-301303872.html"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC48266.2020.9169432"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"crossref","unstructured":"Najd Alfawzan Markus Christen Giovanni Spitale Nikola Biller-Andorno et\u00a0al. 2022. Privacy data sharing and data security policies of women\u2019s mhealth apps: scoping review and content analysis. JMIR mHealth and uHealth 10 5 (2022) e33735.","DOI":"10.2196\/33735"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"crossref","unstructured":"May Alhajri Carsten Rudolph and Ahmad\u00a0Salehi Shahraki. 2022. A blockchain-based consent mechanism for access to fitness data in the healthcare context. IEEE Access 10 (2022) 22960\u201322979.","DOI":"10.1109\/ACCESS.2022.3154106"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C55045.2021.00159"},{"key":"e_1_3_3_2_7_2","unstructured":"Jerry Beilinson. 2020. Glow pregnancy app exposed women to privacy threats Consumer Reports finds. https:\/\/www.consumerreports.org\/electronics-computers\/mobile-security-software\/glow-pregnancy-app-exposed-women-to-privacy-threats-a1100919965\/"},{"key":"e_1_3_3_2_8_2","unstructured":"Elizabeth\u00a0A Brown. 2021. The femtech paradox: How workplace monitoring threatens women\u2019s equity. Jurimetrics 61 3 (2021) 289\u2013329."},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"crossref","unstructured":"Alexandra Cernian Bogdan Tiganoaia Ioan Sacala Adrian Pavel and Alin Iftemi. 2020. Patientdatachain: A blockchain-based approach to integrate personal health records. Sensors 20 22 (2020) 6538.","DOI":"10.3390\/s20226538"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"Jacob Erickson Jewel\u00a0Y Yuzon and Tamara Bonaci. 2022. What You Do Not Expect When You Are Expecting: Privacy Analysis of Femtech. IEEE Transactions on Technology and Society 3 2 (2022) 121\u2013131.","DOI":"10.1109\/TTS.2022.3160928"},{"key":"e_1_3_3_2_11_2","unstructured":"European Parliament and Council of the European Union. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj. Accessed: date-of-access."},{"key":"e_1_3_3_2_12_2","unstructured":"European Parliament and Council of the European Union. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj. Article 7 Conditions for consent."},{"key":"e_1_3_3_2_13_2","unstructured":"N Felizi and J Varon. 2017. MENSTRUAPPS \u2013 how to turn your period into money (for others). https:\/\/chupadados.codingrights.org\/en\/menstruapps-como-transformar-sua-menstruacao-em-dinheiro-para-os-outros-2\/"},{"key":"e_1_3_3_2_14_2","unstructured":"Philippe Genestier Sajida Zouarhi Pascal Limeux David Excoffier Alain Prola Stephane Sandon and Jean-Marc Temerson. 2017. Blockchain for consent management in the ehealth environment: A nugget for privacy and security challenges. Journal of the International Society for Telemedicine and eHealth 5 (2017) GKR\u2013e24."},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"crossref","unstructured":"Michele\u00a0Estrin Gilman. 2021. Periods for profit and the rise of menstrual surveillance. Colum. J. Gender & L. 41 (2021) 100.","DOI":"10.52214\/cjgl.v41i1.8824"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"crossref","unstructured":"Liza Goncharov Hanna Suominen and Matthew Cook. 2022. Dynamic consent and personalised medicine. The Medical Journal of Australia 216 11 (2022) 547.","DOI":"10.5694\/mja2.51555"},{"key":"e_1_3_3_2_17_2","unstructured":"Information Commissioner\u2019s Office. 2023. How Should We Obtain Record and Manage Consent. https:\/\/ico.org.uk\/for-organisations\/uk-gdpr-guidance-and-resources\/lawful-basis\/consent\/how-should-we-obtain-record-and-manage-consent\/how4. Accessed on: 2024-07-12."},{"key":"e_1_3_3_2_18_2","unstructured":"Kantara Initiative. 2018. Consent Receipt Specification. https:\/\/kantara.atlassian.net\/wiki\/spaces\/archive\/pages\/3508790\/Consent+Receipt+Specification. Accessed on: 2024-06-12."},{"key":"e_1_3_3_2_19_2","unstructured":"International Organization for Standardization (ISO). 2023. ISO\/IEC TS 27560:2023 - Privacy and data protection \u2013 Framework for managing and communicating privacy consent. https:\/\/www.iso.org\/obp\/ui\/en\/iso:std:iso-iec:ts:27560:ed-1:v1:en. Accessed on: 2024-07-12."},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"crossref","unstructured":"Vitor Jesus. 2020. Towards an accountable web of personal information: The web-of-receipts. IEEE Access 8 (2020) 25383\u201325394.","DOI":"10.1109\/ACCESS.2020.2970270"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"crossref","unstructured":"Vitor Jesus and Harshvardhan\u00a0J Pandit. 2022. Consent receipts for a usable and auditable web of personal data. IEEE Access 10 (2022) 28545\u201328563.","DOI":"10.1109\/ACCESS.2022.3157850"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"crossref","unstructured":"Jane Kaye Edgar\u00a0A Whitley David Lund Michael Morrison Harriet Teare and Karen Melham. 2015. Dynamic consent: a patient interface for twenty-first century research networks. European journal of human genetics 23 2 (2015) 141\u2013146.","DOI":"10.1038\/ejhg.2014.71"},{"key":"e_1_3_3_2_23_2","unstructured":"Emma Kemble Lucy P\u00e9rez Valentina Sartori Gila Tolub and Alice Zheng. 2022. Unlocking opportunities in women\u2019s healthcare. McKinsey & Company (Feb 2022). https:\/\/www.mckinsey.com\/industries\/healthcare\/our-insights\/unlocking-opportunities-in-womens-healthcare"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"crossref","unstructured":"Gary Leeming James Cunningham and John Ainsworth. 2019. A ledger of me: personalizing healthcare using blockchain technology. Frontiers in medicine 6 (2019) 171.","DOI":"10.3389\/fmed.2019.00171"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.5555\/3052450"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"crossref","unstructured":"Nicholas Mamo Gillian\u00a0M Martin Maria Desira Bridget Ellul and Jean-Paul Ebejer. 2020. Dwarna: a blockchain solution for dynamic consent in biobanking. European Journal of Human Genetics 28 5 (2020) 609\u2013626.","DOI":"10.1038\/s41431-019-0560-9"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"crossref","unstructured":"Catriona McMillan. 2022. Monitoring Female Fertility Through \u2018Femtech\u2019: The Need for a Whole-System Approach to Regulation. Medical Law Review 30 3 (2022) 410\u2013433.","DOI":"10.1093\/medlaw\/fwac006"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445132"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3549015.3554204"},{"key":"e_1_3_3_2_30_2","unstructured":"Michele Nati. 2018. Personal Data Receipts: How transparency increases consumer trust. Catapult Digital London UK Tech. Rep (2018)."},{"key":"e_1_3_3_2_31_2","unstructured":"Harshvardhan\u00a0J Pandit Jan Lindquist and Georg\u00a0P Krog. 2024. Implementing ISO\/IEC TS 27560: 2023 Consent Records and Receipts for GDPR and DGA. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2405.04528 (2024)."},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"crossref","unstructured":"Pravin Pawar Neeraj Parolia Sameer Shinde Thierry\u00a0Oscar Edoh and Madhusudan Singh. 2022. eHealthChain\u2014a blockchain-based personal health information management system. Annals of Telecommunications (2022) 1\u201313.","DOI":"10.1007\/s12243-021-00868-6"},{"key":"e_1_3_3_2_33_2","volume-title":"INVISIBLE WOMEN: Data bias in a world designed for men","author":"Perez Caroline\u00a0Criado","year":"2019","unstructured":"Caroline\u00a0Criado Perez. 2019. INVISIBLE WOMEN: Data bias in a world designed for men. Abrams Press."},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12942-2_23"},{"key":"e_1_3_3_2_35_2","unstructured":"Celia Rosas. 2019. The future is femtech: Privacy and data security issues surrounding femtech applications. Hastings Bus. LJ 15 (2019) 319."},{"key":"e_1_3_3_2_36_2","unstructured":"Allysan Scatterday. 2021. This is no ovary-action: Femtech apps need stronger regulations to protect data and advance public health goals. NCJL & Tech. 23 (2021) 636."},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"crossref","unstructured":"Laura Shipp and Jorge Blasco. 2020. How private is your period?: A systematic analysis of menstrual app privacy policies. Proc. Priv. Enhancing Technol. 2020 4 (2020) 491\u2013510.","DOI":"10.2478\/popets-2020-0083"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"crossref","unstructured":"Kristin\u00a0Solum Steinsbekk Bj\u00f8rn K\u00e5re\u00a0Myskja and Berge Solberg. 2013. Broad consent versus dynamic consent in biobank research: is passive participation an ethical problem? European Journal of Human Genetics 21 9 (2013) 897\u2013902.","DOI":"10.1038\/ejhg.2012.282"},{"key":"e_1_3_3_2_39_2","unstructured":"Tatiana\u00a0C Styliari and Michele Nati. 2016. Researching the Transparency of Personal Data Sharing: Designing a Consent Receipt. Digital Catapult (2016)."},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"crossref","unstructured":"Paul\u00a0C Tang Joan\u00a0S Ash David\u00a0W Bates J\u00a0Marc Overhage and Daniel\u00a0Z Sands. 2006. Personal health records: definitions benefits and strategies for overcoming barriers to adoption. Journal of the American Medical Informatics Association 13 2 (2006) 121\u2013126.","DOI":"10.1197\/jamia.M2025"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"crossref","unstructured":"Thein\u00a0Than Thwin and Sangsuree Vasupongayya. 2019. Blockchain-based access control model to preserve privacy for personal health record systems. Security and Communication Networks 2019 (2019).","DOI":"10.1155\/2019\/8315614"},{"key":"e_1_3_3_2_42_2","unstructured":"Ida Tin. 2016. The rise of a new category: Femtech. https:\/\/helloclue.com\/articles\/culture\/rise-new-category-femtech"},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"crossref","unstructured":"Nancy Tuana. 2006. The speculum of ignorance: The women\u2019s health movement and epistemologies of ignorance. Hypatia 21 3 (2006) 1\u201319.","DOI":"10.1353\/hyp.2006.0037"},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"crossref","unstructured":"Paul Voigt and Axel Von\u00a0dem Bussche. 2017. The eu general data protection regulation (gdpr). A Practical Guide 1st Ed. Cham: Springer International Publishing 10 3152676 (2017) 10\u20135555.","DOI":"10.1007\/978-3-319-57959-7_1"},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"crossref","unstructured":"Samuel\u00a0J Wang Blackford Middleton Lisa\u00a0A Prosser Christiana\u00a0G Bardon Cynthia\u00a0D Spurr Patricia\u00a0J Carchidi Anne\u00a0F Kittler Robert\u00a0C Goldszer David\u00a0G Fairchild Andrew\u00a0J Sussman et\u00a0al. 2003. A cost-benefit analysis of electronic medical records in primary care. The American journal of medicine 114 5 (2003) 397\u2013403.","DOI":"10.1016\/S0002-9343(03)00057-3"}],"event":{"name":"GoodIT '25: International Conference on Information Technology for Social Good","sponsor":["SIGCAS ACM Special Interest Group on Computers and Society"],"location":"Antwerp Belgium","acronym":"GoodIT '25"},"container-title":["Proceedings of the 2025 International Conference on Information Technology for Social Good"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3748699.3749771","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T10:59:29Z","timestamp":1765450769000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3748699.3749771"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,3]]},"references-count":44,"alternative-id":["10.1145\/3748699.3749771","10.1145\/3748699"],"URL":"https:\/\/doi.org\/10.1145\/3748699.3749771","relation":{},"subject":[],"published":{"date-parts":[[2025,9,3]]},"assertion":[{"value":"2025-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}