Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1809085.1809091acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Social networking applications in health care: threats to the privacy and security of health information

Published: 03 May 2010 Publication History

Abstract

The advent of social networking websites for use in health care has prompted concerns about the risks that such systems pose to the security and privacy of personal health information. In this paper, we survey the research literature, in order to provide a current snapshot of privacy and security safeguards for social network websites. We describe some of the unique features of the health care space, and recommend directions for future research in this relatively new area.

References

[1]
Adam, N. R. and Worthmann, J. C. 1989. Security-control methods for statistical databases: a comparative study. ACM Computing Survey. 21, 4 (Dec. 1989), 515--556.
[2]
Abram, S. 2005. Web 2.0 -- huh? Library 2.0, librarian 2.0, Information Outlook, 2005, 9, 44--5.
[3]
Besmer, A., Lipford, H. R., Shehab, M., and Cheek, G. 2009. Social applications: exploring a more secure framework. In Proceedings of the 5th Symposium on Usable Privacy and Security. SOUPS '09. ACM, New York, NY, 1--10.
[4]
Bleicher, P. 2008. Health 2.0: Do it yourself doctoring. Applied Clinical Trials, Oct, 2008, p. 38.
[5]
Carminati, B., Ferrari, E., and Perego, A. 2007. Private Relationships in Social Networks. In Proceedings of the 2007 IEEE 23rd international Conference on Data Engineering Workshop. ICDEW. IEEE Computer Society, Washington, DC, 163--171.
[6]
Carminati, B., and Ferrari, E. 2008. Privacy-aware collaborative access control in web-based social networks. In Proceedings of the 22nd IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC2008).
[7]
Cormode, G. and Krishnamurthy, B. 2008. Key differences between web 1.0 and web 2.0. First Monday, 13(6), June 2008.
[8]
Cormode, G., Srivastava, D., Yu, T., and Zhang, Q. 2008. Anonymizing bipartite graph data using safe groupings. In Proceedings of the 34th international Conference on Very Large Databases (VLDB'08) ACM, 2008.
[9]
Flaherty, D. 1989. Protecting privacy in surveillance societies: The federal republic of Germany, Sweden, France, Canada, and the United States. The University of North Carolina Press, 1989.
[10]
Felt, A., and Evans, D. 2008. Privacy protection for social networking APIs. 2008.
[11]
Gollu, K. K., Saroui, S., and Wolman, A. 2007. A Social Networking-Based Access Control Scheme for Personal Content. In Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP '07), Stevenson, Washington, October 2007.
[12]
Gross, R., Acquisti, A., and Heinz, H. J. 2005. Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society (Alexandria, VA, USA, November 07--07, 2005). WPES '05. ACM, New York, NY, 71--80.
[13]
Guha, S., Tang, K., and Francis, P. 2008. NOYB: privacy in online social networks. In Proceedings of the First Workshop on online Social Network. WOSP '08. ACM, New York, NY.
[14]
Loukides, G. and Gkoulalas-Divanis, A. 2009. Privacy challenges and solutions in the social web. Crossroads 16, 2 (Dec. 2009), 14--18.
[15]
Kacimi, M., Ortolani, S., and Crispo, B. 2009. Anonymous opinion exchange over untrusted social networks. In Proceedings of the Second ACM Eurosys Workshop on Social Network Systems. SNS '09. ACM, NY, NY.
[16]
Kamel Boulos, M. N. and Wheeler, S. 2007. The emerging Web 2.0 social software: an enabling suite of sociable technologies in health and health care education. Health Information and Libraries Journal, 2007, March 24, pp. 2--23.
[17]
Kienle, H. M., Lober, A., and Muller, H. A. Policy and Legal Challenges of Virtual Worlds and Social Network Sites.
[18]
Krishnamurthy, B. and Wills, C. 2009. On the leakage of Personally Identifiable Information Via Online Social Networks, WOSN, 2009.
[19]
Krishnamurthy, B. and Wills, C. 2008.Characterizing Privacy in Online Social Networks. WOSN, Aug. 18, 2008.
[20]
Krishnamurthy, B. and Wills, C. 2009. Privacy diffusion on the web: a longitudinal perspective. In Proceedings of the 18th international Conference on World Wide Web (Madrid, Spain, April 20--24, 2009). WWW '09. ACM, NY, NY.
[21]
Lucas, M. M. and Borisov, N. 2008. FlyByNight: mitigating the privacy risks of social networking. In Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society. WPES '08. ACM, New York, NY, 1--8.
[22]
Moturu, S. T., Liu, H., and Johnson, W. G. 2008. Trust Evaluation in health Information on the World Wide Web, EMBS Conference, IEEE, Vancouver, BC.
[23]
Muntes-Mulero, V., and Nin, J. 2009. Privacy and Anonymization for Very Large Datasets, CIKM'09, Nov 2, 2009.
[24]
Nelson, R. 2007. "The personal health record", Am. J. Nurs, vol. 107, no. 9, pp. 27--28, Sep. 2007.
[25]
Nov, O., and Wattal, 2009. S. Social Computing Privacy Concerns: Antecedents and effects, CHI 2009, p333.
[26]
Popescu, B. C., Crispo, B., and Tanenbaum, A. S. 2004. Safe and private data sharing with turtle: Friends team-up and beat the system. In Proceedings of the 12th Cambridge Intl. Workshop on Security Protocols, 2004.
[27]
Raynes-Goldie, K. 2010. Aliases, creeping and wall cleaning: Understanding privacy in the age of Facebook. First Monday, Volume 15, Number 1--4 January 2010.
[28]
Rosenblum, D. 2007. What Anyone Can Know: The Privacy Risks of Social Networking Sites. IEEE Security and Privacy 5, 3 (May. 2007), 40--49.
[29]
Strater, K. and Lipford, H. R. 2008. Strategies and struggles with privacy in an online social networking community. In Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers Xxii: Culture, Creativity, interaction - Volume 1 (Liverpool, United Kingdom, September 01--05, 2008). British Computer Society Conference on Human-Computer Interaction. British Computer Society, Swinton, UK, 111--119.
[30]
Schrammel, J., Köffel, C., and Tscheligi, M. 2009. How much do you tell?: information disclosure behaviour indifferent types of online communities. C&T '09. ACM.
[31]
Squicciarini, A. C., Shehab, M., and Paci, F. 2009. Collective privacy management in social networks. In WWW 2009 Conference Proceedings, April20--24, Madrid, Spain.
[32]
Staddon, J. 2009. Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy. In Proceedings of the 2nd ACM Workshop on Security and Artificial intelligence (Chicago, Illinois, USA, November 09--09, 2009). AISec '09. ACM, New York, NY, 11--14.
[33]
Warren, S. and Brandeis, L., 1890, "The Right to Privacy," Harvard Law Review 4: 193--220.
[34]
Westin, A. Privacy and Freedom, Atheneum, NY, 1967.
[35]
Young, A. L. and Quan-Haase, A. 2009. Information revelation and internet privacy concerns on social network sites: a case study of facebook. In Proceedings of the Fourth international Conference on Communities and Technologies (University Park, PA, USA, June 25--27, 2009). C&T '09. ACM, New York, NY, 265--274.
[36]
Yu, W. D. 2009. Towards a Wireless Mobile Social Network System Design in healthcare. In Proceedings of the Third International Conference on Multimedia and Ubiquitous Engineering, MUE 2009, Qingdao, China, June 4--6, 2009.
[37]
Zhou, B., Pei, J., and Luk, W. 2008. A brief survey on anonymization techniques for privacy preserving publishing of social network data. ACM SIGKDD Explorations 10, 2. pp. 12--22
[38]
Luo, W., Xie, Q., and Hengartner, U., FaceCloak: An Architecture for User Privacy on Social Networking Sites. In Proc. of 2009 IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09), Vancouver, BC, August 2009, pp. 26--33.

Cited By

View all
  • (2024)A Systematic Mapping Study on Social Network Privacy: Threats and SolutionsACM Computing Surveys10.1145/364508656:7(1-29)Online publication date: 9-Apr-2024
  • (2021)Exploring the Social Networks’ Use in the Health-Care Industry: A Multi-Level AnalysisInternational Journal of Environmental Research and Public Health10.3390/ijerph1814729518:14(7295)Online publication date: 8-Jul-2021
  • (2021)Online Learning Modules in Anatomical Sciences: Effective Sources for Continued Learning for Medical Undergraduates During the Unprecedent COVID-19 PandemicGalician Medical Journal10.21802/gmj.2021.3.628:3(E202136)Online publication date: 1-Sep-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SEHC '10: Proceedings of the 2010 ICSE Workshop on Software Engineering in Health Care
May 2010
126 pages
ISBN:9781605589732
DOI:10.1145/1809085
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 May 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. health information privacy
  2. medicine 2.0
  3. personal health record
  4. social networks

Qualifiers

  • Research-article

Conference

ICSE '10
Sponsor:

Upcoming Conference

ICSE 2025

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A Systematic Mapping Study on Social Network Privacy: Threats and SolutionsACM Computing Surveys10.1145/364508656:7(1-29)Online publication date: 9-Apr-2024
  • (2021)Exploring the Social Networks’ Use in the Health-Care Industry: A Multi-Level AnalysisInternational Journal of Environmental Research and Public Health10.3390/ijerph1814729518:14(7295)Online publication date: 8-Jul-2021
  • (2021)Online Learning Modules in Anatomical Sciences: Effective Sources for Continued Learning for Medical Undergraduates During the Unprecedent COVID-19 PandemicGalician Medical Journal10.21802/gmj.2021.3.628:3(E202136)Online publication date: 1-Sep-2021
  • (2021)Security for Internet-of-Things Enabled E-Health using Blockchain and Artificial Intelligence: A Novel Integration Framework2021 1st International Conference on Multidisciplinary Engineering and Applied Science (ICMEAS)10.1109/ICMEAS52683.2021.9692368(1-4)Online publication date: 15-Jul-2021
  • (2020)A Study of Social Network Applications in University Education2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00036(138-145)Online publication date: Aug-2020
  • (2020)Improving accessibility of the Australian My Health Records while preserving privacy and security of the systemHealth Information Science and Systems10.1007/s13755-020-00126-48:1Online publication date: 8-Oct-2020
  • (2020)Smart Contract-Driven Mechanism Design to Mitigate Information Diffusion in Social NetworksMathematical Research for Blockchain Economy10.1007/978-3-030-37110-4_14(201-216)Online publication date: 14-Feb-2020
  • (2019)Privacy Preservation of Social Media ServicesCensorship, Surveillance, and Privacy10.4018/978-1-5225-7113-1.ch026(473-501)Online publication date: 2019
  • (2018)Security Risk Assessment in Electronic Health Record System2018 IEEE Technology and Engineering Management Conference (TEMSCON)10.1109/TEMSCON.2018.8488449(1-4)Online publication date: Jun-2018
  • (2017)Privacy Preservation of Social Media ServicesExploring Enterprise Service Bus in the Service-Oriented Architecture Paradigm10.4018/978-1-5225-2157-0.ch016(236-263)Online publication date: 2017
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media