| Literature DB >> 28385682 |
Jacqueline Lorene Bender1,2, Alaina B Cyr3, Luk Arbuckle4, Lorraine E Ferris2.
Abstract
BACKGROUND: The Internet and social media offer promising ways to improve the reach, efficiency, and effectiveness of recruitment efforts at a reasonable cost, but raise unique ethical dilemmas. We describe how we used social media to recruit cancer patients and family caregivers for a research study, the ethical issues we encountered, and the strategies we developed to address them.Entities:
Keywords: Internet; cancer; ethics; privacy; recruitment; social media
Mesh:
Year: 2017 PMID: 28385682 PMCID: PMC5399223 DOI: 10.2196/jmir.7029
Source DB: PubMed Journal: J Med Internet Res ISSN: 1438-8871 Impact factor: 5.428
Figure 1Initial social media recruitment strategy.
Applying the principles of Privacy by Design [24] to our case studya.
| Principle | Short description | Alignment with Privacy by Design |
| 1.Proactive not Reactive; | PbDb seeks to anticipate and prevent privacy-invasive events before they happen. PbD does not wait for privacy risks to materialize nor offer remedies after the fact. | Privacy notices proactively informed users about the privacy risks of social media, but required individuals to take action to protect their privacy. On the other hand, marketing headlines proactively protected individuals’ privacy by ensuring that those interested in the study were concealed within a broader population than just those targeted for recruitment. In contrast, editing or removing posts after publication represents a remedial, after-the-fact solution. |
| 2.Privacy as the Default | PbD seeks to deliver the maximum degree of privacy by ensuring that personal data are automatically protected. No action is required on the part of the individual to protect their privacy. It is built into the system, by default. | We built privacy protection into the recruitment strategy using marketing headlines and a hospital blog with a disabled comment feature to recruit interested individuals. Those that chose to enroll in the study did so through the hospital’s private data collection system without tracing back to social media. |
| 3.Privacy Embedded into | PbD is embedded into the design and architecture of the system. It is not bolted on as an add-on, after the fact. Privacy is integral to the system, without diminishing functionality. | We embedded privacy into the design of the recruitment strategy using marketing headlines, without diminishing the functionality of social media. On the other hand, we lost functionality that could have enhanced the spread and exposure of our recruitment messages by opting to use a blog with a disabled comment feature and by proposing to edit and delete sensitive posts before publication. |
| 4. Full Functionality | PbD seeks to accommodate all legitimate interests and objectives in a positive-sum, win-win manner, not through a dated, zero-sum approach where unnecessary trade-offs are made. | Using marketing headlines is an example of a win-win, privacy-enhancing strategy. It increased the reach of the recruitment strategy (which one would expect to increase enrollment) without compromising privacy. Disabling the comment feature on the hospital blog, on the other hand, is not win-win because we traded function for privacy. |
| 5. End-to-End Security | PbD explains that strong security measures are essential to PbD from start to finish. Embedding PbD into the system prior to the first element of information being collected ensures that all data are securely retained throughout the entire lifecycle of the data involved. | We used social media to garner interest in the research study, embedding privacy protection in the |
| 6.Visibility and Transparency | PbD seeks to assure all stakeholders that whatever the business practice or technology involved, it is, in fact, operating according to the stated promises and objectives, subject to independent verification. | Our aim with privacy notices was two-fold: (1) to inform users about privacy risks and their implications; and (2) to be as open and transparent as possible. We also adhered to the procedural practices and requirements set by our governing bodies to protect the rights and safety of potential research participants. This included Research Ethics Board review of the research protocol and approval of all social media posts and privacy notices prior to publication. |
| 7. Respect for User Privacy | PbD requires architects and operators to keep the interests of the individual uppermost by offering such measures as strong privacy defaults, appropriate notice, and empowering user-friendly options. | We were cautious in our use of marketing headlines so as not to risk deceiving people or wasting their time. We used privacy notices to offer users appropriate notice and attempted to design them effectively, but we did not use a user-centered design approach to develop them nor did we test their effectiveness. In addition, we do not know people’s views on the marketing headline strategy. Some may have disliked the lack of directness in the notice to get them to the second site. |
aThe principles and their descriptions are described verbatim [24].
bPbD: Privacy by Design.
Privacy notices and disclaimers.
| Medium | Privacy notice/disclaimer |
| “Please note that the security of email messages is not guaranteed. Messages may be forged, forwarded, kept indefinitely, or seen by others using the Internet. Do not use email to discuss information you think is sensitive. Do not use email in an emergency since email may be delayed.” | |
| “Please also note that the privacy and confidentiality of content (text or pictures) shared on social media platforms is not guaranteed. Content may be forged, forwarded, kept indefinitely, or seen by others using the Internet whether you share publicly to everyone or privately to specific people. Do not use social media to discuss information you think is sensitive. While you may share this information with a select group of people, someone in your networks may share it more widely without your consent.” | |
| “The security of social media is not guaranteed. Contact us about the study. Don’t post if concerned about privacy.”a |
aPlease note that this tweet focuses on security as a possible threat to privacy if data is leaked. Privacy is not limited to security issues.
Figure 2Facebook recruitment post with privacy disclaimer.
Privacy by Design framework for online health research recruitment: Proposed considerations for researchers and institutional Research Ethics Boards.
| Privacy-by-Design principles | Considerations | |
| Justification | Why is it necessary to use the Internet and social media to recruit participants for your research project? | |
| Context | Where does the study recruitment take place? What are the terms of use and privacy policies of the recruitment sites or applications? What are users’ privacy expectations regarding the recruitment sites or applications? | |
| Sensitivity | What is the subject of study? Is the data considered personal information? Is the data considered “sensitive” personal information? What are the privacy expectations commonly associated with these types of data? | |
| Vulnerability | Who are the recruitment targets? What additional privacy measures may be required to protect the privacy of vulnerable individuals? | |
| Proactive not Reactive; Preventative not Remedial | What are the potential privacy risks and related harms associated with the recruitment strategy? Do certain data, people, or groups require more privacy protection? | |
| Privacy as the Default Setting | If an individual does nothing, is their privacy still intact when they are exposed to the recruitment strategy or do they have to take action (eg, opt out or add a privacy measure) to protect their privacy? | |
| Privacy Embedded into Design | Is your privacy-enhancing measure built into the design of your recruitment strategy or has it been bolted on as an add-on, after the fact? | |
| Full Functionality—Positive-Sum not Zero-Sum | Does your recruitment strategy offer privacy protection without sacrificing your recruitment goals and objectives? | |
| End-to-End Security—Full Lifecycle Protection | Are there any weak links or gaps in the implementation or oversight of your recruitment strategy? | |
| Visibility and Transparency—Keep it Open | Are all people and organizations involved in recruiting participants (directly or indirectly) operating according to stated promises and objectives, and is information about their privacy policies and practices readily available to the public? | |
| Respect for User Privacy—Keep it User Centric | Are your privacy measures user centric? Have they been designed with the user in mind? Are they simple to use and written in easy-to-understand plain language? Have they been tested and approved by users? | |
aPbD: Privacy by Design.