Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article
Open access

eHealth Data Security and Privacy: Perspectives from Diverse Stakeholders in Malawi

Published: 26 April 2024 Publication History

Abstract

The development and adoption of eHealth in low- and middle-income countries has potential to advance the quality of care in healthcare settings that are challenged by weak infrastructure. Especially in the countries where HIV rates are high, there is need to implement electronic medical record systems to enhance care and improve treatment outcomes. Due to the sensitivity of HIV-related information, eHealth applications in HIV care necessitate the attention and prioritization of data security and privacy. We explored diverse stakeholders' views on data security and privacy in Malawi's public HIV care program to expand the understanding of gaps and opportunities in improving data protections. This work connects data security and privacy goals and practices with previous work on mobile device usage as well as global best practices for security and privacy in healthcare settings. A key finding articulated by stakeholders is the importance of establishing strong data security governance.

References

[1]
Funmi Adebesin, Paula Kotze, Rosemary Foster, and Darelle Van Greunen. 2013. A Review of Interoperability Standards in E-health and Imperatives for their Adoption in Africa. South African Computer Journal, Vol. 50, 1 (2013), 55--72.
[2]
021)]% adovor2021medical, Ehui Adovor, Mathias Czaika, Frédéric Docquier, and Yasser Moullan. 2021. Medical brain drain: how many, where and why? Journal of Health Economics, Vol. 76 (2021), 102409.
[3]
017)]% AHMADI2017161, Hossein Ahmadi, Mehrbakhsh Nilashi, Leila Shahmoradi, and Othman Ibrahim. 2017. Hospital Information System adoption: Expert perspectives on an adoption framework for Malaysian public hospitals. Computers in Human Behavior, Vol. 67 (2017), 161--189. https://doi.org/10.1016/j.chb.2016.10.023
[4]
Syed Ishtiaque Ahmed, Md. Romael Haque, Jay Chen, and Nicola Dell. 2017a. Digital Privacy Challenges with Shared Mobile Phone Use in Bangladesh. Proc. ACM Hum.-Comput. Interact., Vol. 1, CSCW, Article 17 (dec 2017), bibinfonumpages20 pages. https://doi.org/10.1145/3134652
[5]
Syed Ishtiaque Ahmed, Md. Romael Haque, Shion Guha, Md. Rashidujjaman Rifat, and Nicola Dell. 2017b. Privacy, Security, and Surveillance in the Global South: A Study of Biometric Mobile SIM Registration in Bangladesh. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (Denver, Colorado, USA) (CHI '17). Association for Computing Machinery, New York, NY, USA, 906--918. https://doi.org/10.1145/3025453.3025961
[6]
Maxwell O Akanbi, Amaka N Ocheke, Patricia A Agaba, Comfort A Daniyam, Emmanuel I Agaba, Edith N Okeke, and Christiana O Ukoli. 2012. Use of electronic health records in sub-Saharan Africa: progress and challenges. Journal of Medicine in the Tropics, Vol. 14, 1 (2012), 1.
[7]
Mahdi Nasrullah Al-Ameen, Tanjina Tamanna, Swapnil Nandy, M. A. Manazir Ahsan, Priyank Chandra, and Syed Ishtiaque Ahmed. 2020. We Don't Give a Second Thought Before Providing Our Information: Understanding Users' Perceptions of Information Collection by Apps in Urban Bangladesh. In Proceedings of the 3rd ACM SIGCAS Conference on Computing and Sustainable Societies (Ecuador) (COMPASS '20). Association for Computing Machinery, New York, NY, USA, 32--43. https://doi.org/10.1145/3378393.3402244
[8]
Wei Bai, Moses Namara, Yichen Qian, Patrick Gage Kelley, Michelle L Mazurek, and Doowon Kim. 2016. An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for $$Key-Directory$$ Encryption Systems. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). 113--130.
[9]
Catharina Barkman and Lars Weinehall. 2017. Policymakers and mHealth: roles and expectations, with observations from Ethiopia, Ghana and Sweden. Global health action, Vol. 10, sup3 (2017), 1337356.
[10]
Yahel Ben-David, Shaddi Hasan, Joyojeet Pal, Matthias Vallentin, Saurabh Panjwani, Philipp Gutheim, Jay Chen, and Eric A. Brewer. 2011. Computing Security in the Developing World: A Case for Multidisciplinary Research. In Proceedings of the 5th ACM Workshop on Networked Systems for Developing Regions (Bethesda, Maryland, USA) (NSDR '11). Association for Computing Machinery, New York, NY, USA, 39--44. https://doi.org/10.1145/1999927.1999939
[11]
Brandford Bervell and Hosam Al-Samarraie. 2019. A comparative review of mobile health and electronic health utilization in sub-Saharan African countries. Social Science & Medicine, Vol. 232 (2019), 1--16.
[12]
Claus Bossen and Erik Grönvall. 2015. Collaboration In-between: The Care Hotel and Designing for Flexible Use. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (Vancouver, BC, Canada) (CSCW '15). Association for Computing Machinery, New York, NY, USA, 1289--1301. https://doi.org/10.1145/2675133.2675243
[13]
Jørn Braa and Sundeep Sahay. 2017. The DHIS2 Open Source Software Platform: Evolution Over Time and Space. In Global Health Informatics. Principles of eHealth and mHealth to Improve Quality of Care, Leo Anthony, G. Celi, Hamish S. F. Fraser, Vipan Nikore, Juan Sebastian Osorio, and Kenneth Paik (Eds.). The MIT Press.
[14]
Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology, Vol. 3, 2 (2006), 77--101.
[15]
German Daniel Caruso and Lina Marcela Cardona Sosa. 2022. Malawi Poverty Assessment : Poverty Persistence in Malawi - Climate Shocks, Low Agricultural Productivity, and Slow Structural Transformation (English). World Bank Group (2022). http://documents.worldbank.org/curated/en/099920006302215250/P174948072f3880690afb70c20973fe214d
[16]
Barbara Castelnuovo, Agnes Kiragga, Victor Afayo, Malisa Ncube, Richard Orama, Stephen Magero, Peter Okwi, Yukari C Manabe, and Andrew Kambugu. 2012. Implementation of provider-based electronic medical records and improvement of the quality of data in a large HIV program in Sub-Saharan Africa. PloS one, Vol. 7, 12 (2012), e51631.
[17]
Sam Castle, Fahad Pervaiz, Galen Weld, Franziska Roesner, and Richard Anderson. 2016. Let's Talk Money: Evaluating the Security Challenges of Mobile Money in the Developing World. In Proceedings of the 7th Annual Symposium on Computing for Development (Nairobi, Kenya) (ACM DEV '16). Association for Computing Machinery, New York, NY, USA, Article 4, bibinfonumpages10 pages. https://doi.org/10.1145/3001913.3001919
[18]
Jay Chen, Michael Paik, and Kelly McCabe. 2014. Exploring internet security perceptions and practices in urban ghana. In 10th Symposium On Usable Privacy and Security (SOUPS 2014). 129--142.
[19]
Yunan Chen and Heng Xu. 2013. Privacy Management in Dynamic Groups: Understanding Information Privacy in Medical Practices. In Proceedings of the 2013 Conference on Computer Supported Cooperative Work (San Antonio, Texas, USA) (CSCW '13). Association for Computing Machinery, New York, NY, USA, 541--552. https://doi.org/10.1145/2441776.2441837
[20]
Young B Choi, Kathleen E Capitan, Joshua S Krause, and Meredith M Streeper. 2006. Challenges associated with privacy in health care industry: implementation of HIPAA and the security rules. Journal of medical systems, Vol. 30 (2006), 57--64.
[21]
Camille Cobb, Samuel Sudar, Nicholas Reiter, Richard Anderson, Franziska Roesner, and Tadayoshi Kohno. 2016. Computer Security for Data Collection Technologies. In Proceedings of the Eighth International Conference on Information and Communication Technologies and Development (Ann Arbor, MI, USA) (ICTD '16). Association for Computing Machinery, New York, NY, USA, Article 2, bibinfonumpages11 pages. https://doi.org/10.1145/2909609.2909660
[22]
Gerald P. Douglas, Oliver J. Gadabu, Sabine Joukes, Soyapi Mumba, Michael V. McKay, Anne Ben-Smith, Andreas Jahn, Erik J. Schouten, Zach Landis Lewis, Joep J. van Oosterhout, Theresa J. Allain, Rony Zachariah, Selma D. Berger, Anthony D. Harries, and Frank Chimbwandira. 2010. Using Touchscreen Electronic Medical Record Systems to Support and Monitor National Scale-Up of Antiretroviral Therapy in Malawi. PLOS Medicine, Vol. 7, 8 (08 2010), 1--6. https://doi.org/10.1371/journal.pmed.1000319
[23]
Elizabeth Dunbar, Helen Elizabeth Olsen, Erika Salomon, Shreya Bhatt, Regina Mutuku, Beatrice Wasunna, Jacqueline Edwards, Beth Kolko, and Isaac Holeman. 2021. Towards Responsible Data Practices in Digital Health: A Case Study of an Open Source Community's Journey. In Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems (Yokohama, Japan) (CHI EA '21). Association for Computing Machinery, New York, NY, USA, Article 42, bibinfonumpages8 pages. https://doi.org/10.1145/3411763.3443438
[24]
Ryan A. Ebardo and Nelson J. Celis. 2019. Barriers to the Adoption of Electronic Medical Records in Select Philippine Hospitals: A Case Study Approach. In Proceedings of the 2019 5th International Conference on Computing and Artificial Intelligence (Bali, Indonesia) (ICCAI '19). Association for Computing Machinery, New York, NY, USA, 123--128. https://doi.org/10.1145/3330482.3330503
[25]
Adrienne Porter Felt, Alex Ainslie, Robert W. Reeder, Sunny Consolvo, Somas Thyagaraja, Alan Bettes, Helen Harris, and Jeff Grimes. 2015. Improving SSL Warnings: Comprehension and Adherence. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (Seoul, Republic of Korea) (CHI '15). Association for Computing Machinery, New York, NY, USA, 2893--2902. https://doi.org/10.1145/2702123.2702442
[26]
Hamish SF Fraser, Paul Biondich, Deshen Moodley, Sharon Choi, Burke W Mamlin, and Peter Szolovits. 2005. Implementing electronic medical record systems in developing countries. Informatics in primary care, Vol. 13, 2 (2005).
[27]
Hamish S F Fraser, Darius Jazayeri, Patrice Nevil, Yusuf Karacaoglu, Paul E Farmer, Evan Lyon, Mary Kay C Smith Fawzi, Fernet Leandre, Sharon S Choi, and Joia S Mukherjee. 2004. An information system and medical record to support HIV treatment in rural Haiti. BMJ, Vol. 329, 7475 (2004), 1142--1146. https://doi.org/10.1136/bmj.329.7475.1142 https://doi.org/10.1145/257874.257896
[28]
Nithya Sambasivan, Garen Checkley, Amna Batool, Nova Ahmed, David Nemer, Laura Sanely Gaytán-Lugo, Tara Matthews, Sunny Consolvo, and Elizabeth Churchil. 2018. "Privacy is Not for Me, It's for Those Rich Women": Performative Privacy Practices on Mobile Phones by Women in South Asia. In Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security (Baltimore, MD, USA) (SOUPS '18). USENIX Association, USA, 127--142.
[29]
Tanzir Ahmed Shuvo, Rubana Islam, Shahed Hossain, Julie L Evans, Fatema Khatun, Tanvir Ahmed, Rukhsana Gazi, and Alayne M Adams. 2015. eHealth innovations in LMICs of Africa and Asia: a literature review exploring factors affecting implementation, scale-up, and sustainability. health care, Vol. 8, 9 (2015).
[30]
Sanjay P. Sood, Stacie N. Nwabueze, Victor W.A. Mbarika, Nupur Prakash, Samir Chatterjee, Pradeep Ray, and Saroj Mishra. 2008. Electronic Medical Records: A Review Comparing the Challenges in Developed and Developing Countries. In Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008). 248--248. https://doi.org/10.1109/HICSS.2008.141
[31]
Janaki Srinivasan, Savita Bailur, Emrys Schoemaker, and Sarita Seshagiri. 2018. Privacy at the margins| The poverty of privacy: Understanding privacy trade-offs from identity infrastructure users in India. International Journal of Communication, Vol. 12 (2018), 20.
[32]
Susan Leigh Star and Anselm Strauss. 1999. Layers of silence, arenas of voice: The ecology of visible and invisible work. Computer supported cooperative work (CSCW), Vol. 8, 1 (1999), 9--30.
[33]
Allan Stisen, Nervo Verdezoto, Henrik Blunck, Mikkel Baun Kjærgaard, and Kaj Grønbæk. 2016. Accounting for the Invisible Work of Hospital Orderlies: Designing for Local and Global Coordination. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (San Francisco, California, USA) (CSCW '16). Association for Computing Machinery, New York, NY, USA, 980--992. https://doi.org/10.1145/2818048.2820006
[34]
Anselm Strauss. 1985. Work and the division of labor. Sociological quarterly, Vol. 26, 1 (1985), 1--19.
[35]
Charlotte Tang, Yunan Chen, Bryan C. Semaan, and Jahmeilah A. Roberson. 2015. Restructuring Human Infrastructure: The Impact of EHR Deployment in a Volunteer-Dependent Clinic. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (Vancouver, BC, Canada) (CSCW '15). Association for Computing Machinery, New York, NY, USA, 649--661. https://doi.org/10.1145/2675133.2675277
[36]
Maria Dolores C Tongco. 2007. Purposive sampling as a tool for informant selection. (2007).
[37]
Hannock Tweya, Caryl Feldacker, Oliver Jintha Gadabu, Wingston Ng'ambi, Soyapi L Mumba, Dave Phiri, Luke Kamvazina, Shawo Mwakilama, Henry Kanyerere, Olivia Keiser, et al. 2016. Developing a point-of-care electronic medical record system for TB/HIV co-infected patients: experiences from Lighthouse Trust, Lilongwe, Malawi. BMC research notes, Vol. 9, 1 (2016), 1--10.
[38]
UNAIDS/PEPFAR. 2007. Interim guidelines on protecting the confidentiality and security of HIV information: proceedings from a workshop. https://data.unaids.org/pub/manual/2007/confidentiality_security_interim_guidelines_15may2007_en.pdf
[39]
Aditya Vashistha, Richard Anderson, and Shrirang Mare. 2018. Examining Security and Privacy Research in Developing Regions. In Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies (Menlo Park and San Jose, CA, USA) (COMPASS '18). Association for Computing Machinery, New York, NY, USA, Article 25, bibinfonumpages14 pages. https://doi.org/10.1145/3209811.3209818
[40]
Nervo Verdezoto, Naveen Bagalkot, Syeda Zainab Akbar, Swati Sharma, Nicola Mackintosh, Deirdre Harrington, and Paula Griffiths. 2021. The Invisible Work of Maintenance in Community Health: Challenges and Opportunities for Digital Health to Support Frontline Health Workers in Karnataka, South India. Proc. ACM Hum.-Comput. Interact., Vol. 5, CSCW1, Article 91 (apr 2021), bibinfonumpages31 pages. https://doi.org/10.1145/3449165
[41]
Noel Warford, Tara Matthews, Kaitlyn Yang, Omer Akgul, Sunny Consolvo, Patrick Gage Kelley, Nathan Malkin, Michelle L. Mazurek, Manya Sleeper, and Kurt Thomas. 2021. SoK: A Framework for Unifying At-Risk User Research. CoRR, Vol. abs/2112.07047 (2021). showeprint[arXiv]2112.07047 https://arxiv.org/abs/2112.07047
[42]
Evan Waters, Jeff Rafter, Gerald P Douglas, Mwatha Bwanali, Darius Jazayeri, and Hamish SF Fraser. 2010. Experience implementing a point-of-care electronic medical record system for primary care in Malawi. In MEDINFO 2010. IOS Press, 96--100.
[43]
Dominik Wermke, Noah Wöhler, Jan H Klemmer, Marcel Fourné, Yasemin Acar, and Sascha Fahl. 2022. Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects. In Proceedings of the 43rd IEEE Symposium on Security and Privacy. IEEE Computer Society.
[44]
Xanthe Wessels, Nicoli Nattrass, and Ulrike Rivett 1. 2007. Improving the efficiency of monitoring adherence to antiretroviral therapy at primary health care level: a case study of the introduction of electronic technologies in Guguletu, South Africa. Development Southern Africa, Vol. 24, 4 (2007), 607--621.
[45]
Wen Zhang, Carl A Gunter, David Liebovitz, Jian Tian, and Bradley Malin. 2011. Role prediction using electronic medical record system audits. In AMIA Annual Symposium Proceedings, Vol. 2011. American Medical Informatics Association, 858. io

Cited By

View all
  • (2024)Multimodal data integration for oncology in the era of deep neural networks: a reviewFrontiers in Artificial Intelligence10.3389/frai.2024.14088437Online publication date: 25-Jul-2024

Index Terms

  1. eHealth Data Security and Privacy: Perspectives from Diverse Stakeholders in Malawi

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Proceedings of the ACM on Human-Computer Interaction
    Proceedings of the ACM on Human-Computer Interaction  Volume 8, Issue CSCW1
    CSCW
    April 2024
    6294 pages
    EISSN:2573-0142
    DOI:10.1145/3661497
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 April 2024
    Published in PACMHCI Volume 8, Issue CSCW1

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. medical and health support
    2. mobile devices
    3. security and privacy

    Qualifiers

    • Research-article

    Funding Sources

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)285
    • Downloads (Last 6 weeks)103
    Reflects downloads up to 16 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Multimodal data integration for oncology in the era of deep neural networks: a reviewFrontiers in Artificial Intelligence10.3389/frai.2024.14088437Online publication date: 25-Jul-2024

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media