{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,3]],"date-time":"2026-05-03T23:45:54Z","timestamp":1777851954396,"version":"3.51.4"},"reference-count":54,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100014438","name":"Business Finland","doi-asserted-by":"publisher","award":["2710\/31\/2016"],"award-info":[{"award-number":["2710\/31\/2016"]}],"id":[{"id":"10.13039\/501100014438","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Health Informatics J"],"published-print":{"date-parts":[[2023,1]]},"abstract":"<jats:p>Boosted by the COVID-19 pandemic, as well as the tightened General Data Protection Regulation (GDPR) legislation within the European Union (EU), individuals have become increasingly concerned about privacy. This is also reflected in how willing individuals are to consent to sharing personal data, including their health data. To understand this behaviour better, this study focuses on willingness to consent in relation to genomic data. The study explores how the provision of educational information relates to willingness to consent, as well as differences in privacy concerns, information sensitivity and the perceived trade-off value between individuals willing versus unwilling to consent to sharing their genomic data. Of the respondents, 65% were initially willing to consent, but after educational information 89% were willing to consent and only 11% remained unwilling to consent. Educating individuals about potential health benefits can thus help to correct the beliefs that originally led to the unwillingness to share genomic data.<\/jats:p>","DOI":"10.1177\/14604582231152185","type":"journal-article","created":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T05:42:06Z","timestamp":1674020526000},"update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":17,"title":["Exploring the challenges of and solutions to sharing personal genomic data for use in healthcare"],"prefix":"10.1177","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0549-5239","authenticated-orcid":false,"given":"Lasse","family":"Parvinen","sequence":"first","affiliation":[{"name":"\u00c5bo Akademi University"}]},{"given":"Ari","family":"Alam\u00e4ki","sequence":"additional","affiliation":[{"name":"Haaga-Helia University of Applied Sciences"}]},{"given":"Heli","family":"Hallikainen","sequence":"additional","affiliation":[{"name":"University of Eastern Finland"}]},{"given":"Marko","family":"M\u00e4ki","sequence":"additional","affiliation":[{"name":"Haaga-Helia University of Applied Sciences"}]}],"member":"179","published-online":{"date-parts":[[2023,1,18]]},"reference":[{"key":"e_1_3_3_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-6736(10)61267-6"},{"key":"e_1_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-6736(14)61730-X"},{"key":"e_1_3_3_4_2","doi-asserted-by":"publisher","DOI":"10.1177\/1460458218796665"},{"key":"e_1_3_3_5_2","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-018-06956-3"},{"key":"e_1_3_3_6_2","doi-asserted-by":"publisher","DOI":"10.1177\/1460458217751015"},{"key":"e_1_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.1177\/1460458219901232"},{"key":"e_1_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1177\/1460458217706184"},{"key":"e_1_3_3_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00439-019-02062-0"},{"key":"e_1_3_3_10_2","doi-asserted-by":"publisher","DOI":"10.1177\/1460458219894479"},{"key":"e_1_3_3_11_2","doi-asserted-by":"publisher","DOI":"10.1177\/1460458217733121"},{"key":"e_1_3_3_12_2","doi-asserted-by":"publisher","DOI":"10.1093\/jamiaopen\/ooz043"},{"issue":"1","key":"e_1_3_3_13_2","first-page":"13","article-title":"Integrating genomics into healthcare: a global responsibility","volume":"104","author":"Stark Z","year":"2019","unstructured":"Stark Z, Dolman L, Manolio TA, et al. Integrating genomics into healthcare: a global responsibility. Am J Med Genet 2019; 104(1): 13\u201320.","journal-title":"Am J Med Genet"},{"key":"e_1_3_3_14_2","doi-asserted-by":"publisher","DOI":"10.1108\/14777260610701759"},{"key":"e_1_3_3_15_2","doi-asserted-by":"publisher","DOI":"10.2478\/orga-2020-0020"},{"key":"e_1_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1108\/JHOM-11-2018-0332"},{"key":"e_1_3_3_17_2","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-021-01552-4"},{"key":"e_1_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-016-0495-4"},{"key":"e_1_3_3_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/336992.336995"},{"key":"e_1_3_3_20_2","doi-asserted-by":"crossref","unstructured":"M\u00e4ki M Alam\u00e4ki A. Data privacy concerns throughout the customer journey and different service industries. Proceedings of the 20th IFIP WG 5.5 Working Conference on Virtual Enterprises PRO-VE 2019 Turin Italy 2019 pp. 516\u2013526.","DOI":"10.1007\/978-3-030-28464-0_45"},{"key":"e_1_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1177\/1460458212442933"},{"key":"e_1_3_3_23_2","doi-asserted-by":"crossref","unstructured":"Acquisti A Gross R. Imagined communities: awareness information sharing and privacy on the facebook. In: Proceedings of the Privacy Enhancing Technologies Symposium. Cambridge United Kingdom 2006 pp. 36\u201358.","DOI":"10.1007\/11957454_3"},{"key":"e_1_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2012.23"},{"key":"e_1_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.1177\/1460458219864730"},{"key":"e_1_3_3_26_2","doi-asserted-by":"publisher","DOI":"10.1177\/1460458219833117"},{"key":"e_1_3_3_27_2","doi-asserted-by":"crossref","unstructured":"Alam\u00e4ki A Aunimo L Ketamo H et al. Interactive machine learning: managing information richness in highly anonymized conversation data. Proceedings of the 20th IFIP WG 5.5 Working Conference on Virtual Enterprises PRO-VE 2019. Turin Italy 2019 pp. 173\u2013183.","DOI":"10.1007\/978-3-030-28464-0_16"},{"key":"e_1_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.3109\/10408363.2013.865700"},{"key":"e_1_3_3_29_2","doi-asserted-by":"publisher","DOI":"10.3233\/JAD-181121"},{"issue":"2","key":"e_1_3_3_30_2","first-page":"87","article-title":"How can hospitals better protect the privacy of electronic medical records? Perspectives from staff members of health information management departments","volume":"46","author":"Sher ML","year":"2017","unstructured":"Sher ML, Talley PC, Cheng T, et al. How can hospitals better protect the privacy of electronic medical records? Perspectives from staff members of health information management departments. Health Inf Manag J 2017; 46(2): 87\u201395.","journal-title":"Health Inf Manag J"},{"key":"e_1_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41525-017-0036-1"},{"key":"e_1_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.1186\/s40246-018-0139-5"},{"key":"e_1_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0159113"},{"key":"e_1_3_3_34_2","doi-asserted-by":"publisher","DOI":"10.1038\/gim.2016.157"},{"key":"e_1_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1509\/jmkg.2005.69.4.133"},{"key":"e_1_3_3_36_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-005-5879-y"},{"key":"e_1_3_3_37_2","doi-asserted-by":"publisher","DOI":"10.1177\/1460458211399403"},{"key":"e_1_3_3_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretai.2015.04.001"},{"key":"e_1_3_3_39_2","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.7.16951"},{"key":"e_1_3_3_40_2","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.10.1.104"},{"key":"e_1_3_3_41_2","doi-asserted-by":"publisher","DOI":"10.1108\/JSM-05-2013-0111"},{"key":"e_1_3_3_42_2","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.27.16941"},{"key":"e_1_3_3_43_2","doi-asserted-by":"publisher","DOI":"10.1177\/1460458220983398"},{"key":"e_1_3_3_44_2","doi-asserted-by":"publisher","DOI":"10.1016\/S2589-7500(20)30273-9"},{"key":"e_1_3_3_45_2","doi-asserted-by":"publisher","DOI":"10.1186\/s12874-021-01304-y"},{"key":"e_1_3_3_46_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-06406-8"},{"key":"e_1_3_3_47_2","article-title":"Balancing Privacy with Technology Use: Lessons from Covid-19. Digital Pathways at","volume":"8","author":"Agrawal H.","year":"2020","unstructured":"Agrawal H., Misra P, Padmanabhan A. Balancing Privacy with Technology Use: Lessons from Covid-19. Digital Pathways at. Oxford Paper Series no 2020; 8.","journal-title":"Oxford Paper Series no"},{"key":"e_1_3_3_48_2","doi-asserted-by":"publisher","DOI":"10.1177\/20552076211002953"},{"key":"e_1_3_3_49_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-021-86265-4"},{"key":"e_1_3_3_50_2","first-page":"1","article-title":"Analysis of SARS-CoV-2 genomic epidemiology reveals disease transmission coupled to variant emergence and allelic variation","volume":"111","author":"Bandoy DJDR","year":"2021","unstructured":"Bandoy DJDR, Weimer BC. Analysis of SARS-CoV-2 genomic epidemiology reveals disease transmission coupled to variant emergence and allelic variation. Sci Rep 2021; 111: 1\u201312.","journal-title":"Sci Rep"},{"key":"e_1_3_3_51_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cub.2021.05.067"},{"issue":"1","key":"e_1_3_3_52_2","first-page":"199","article-title":"The opportunity and challenge of trust and decision-making uncertainty: managing co-production in value co-creation","volume":"38","author":"Li-Wei W","year":"2020","unstructured":"Li-Wei W, Chung-Yu W, Rouyer E. The opportunity and challenge of trust and decision-making uncertainty: managing co-production in value co-creation. Int J Bank Mark 2020; 38(1): 199\u2013218.","journal-title":"Int J Bank Mark"},{"key":"e_1_3_3_53_2","doi-asserted-by":"publisher","DOI":"10.1108\/08876041311296392"},{"key":"e_1_3_3_54_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102494"},{"key":"e_1_3_3_55_2","first-page":"649","article-title":"Comprehensive review of honey encryption scheme. TELKOMNIKA","volume":"13","author":"Omolara O","year":"2019","unstructured":"Omolara O, Jantan A, Abiodun OA, et al. Comprehensive review of honey encryption scheme. TELKOMNIKA. Indones J Electr Eng 2019; 13: 649\u2013656.","journal-title":"Indones J Electr Eng"}],"container-title":["Health Informatics Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14604582231152185","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/14604582231152185","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14604582231152185","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T22:28:09Z","timestamp":1777501689000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/14604582231152185"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1]]},"references-count":54,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["10.1177\/14604582231152185"],"URL":"https:\/\/doi.org\/10.1177\/14604582231152185","relation":{},"ISSN":["1460-4582","1741-2811"],"issn-type":[{"value":"1460-4582","type":"print"},{"value":"1741-2811","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1]]},"article-number":"14604582231152185"}}