| Literature DB >> 30938756 |
Cynthia E Schairer1, Cynthia Cheung2, Caryn Kseniya Rubanovich3, Mildred Cho4, Lorrie Faith Cranor5,6, Cinnamon S Bloss1,2,7.
Abstract
OBJECTIVE: We sought to present a model of privacy disposition and its development based on qualitative research on privacy considerations in the context of emerging health technologies.Entities:
Keywords: confidentiality; disclosure; patient data privacy; privacy; social values
Mesh:
Year: 2019 PMID: 30938756 PMCID: PMC6562158 DOI: 10.1093/jamia/ocz010
Source DB: PubMed Journal: J Am Med Inform Assoc ISSN: 1067-5027 Impact factor: 4.497
Sample demographics (N = 108)
| Participation type | |
| Focus group | 64 (59.3) |
| Interview | 44 (40.7) |
| Female | 65 (60.2) |
| Age, y | 40.35 ± 20.0 (13-82) |
| Hispanic/Latino | 28 (26.2) |
| Race | |
| American Indian/Alaska Native | 3 (3.2) |
| Asian | 10 (10.6) |
| Black or African American | 8 (8.5) |
| Native Hawaiian or Other Pacific Islander | 8 (8.5) |
| White | 63 (67.0) |
| Mixed/more than 1 race | 2 (2.1) |
| Marital status | |
| Single | 62 (57.9) |
| Married/in a domestic partnership | 36 (33.6) |
| Divorced/widowed | 9 (8.1) |
| Highest education | |
| Completed 11 or fewer years (majority adolescents still in school) | 29 (27.1) |
| Graduated from high school or GED completed | 12 (11.2) |
| Graduated from 2-year college | 13 (12.1) |
| Graduated from 4-year college | 21 (19.6) |
| Some postcollege education | 11 (10.3) |
| Master’s degree | 17 (15.9) |
| Professional degree or PhD | 4 (3.7) |
| Approximate annual household income | |
| Under $25 000 | 28 (29.2) |
| $25 000-$49 999 | 20 (20.8) |
| $50 000-$99 999 | 22 (22.9) |
| $100 000-$149 999 | 12 (12.5) |
| $150 000+ | 14 (14.5) |
| Self-reported health status | |
| Very good | 24 (22.2) |
| Good | 52 (48.1) |
| Average | 26 (24.1) |
| Poor | 6 (5.6) |
| Very Poor | 0 (0.0) |
Values are n (%) or mean ± SD (range).
Missing data for 1 participant.
Missing data for 14 participants.
Missing data for 12 participants.
Names and definitions of codes selected for incorporation into privacy disposition model
| Thematic Code Name | Definition |
|---|---|
|
| Discussion of control over access to and content of electronic data. Includes discussion of who should or should not have access or the ability to change the content. |
|
| Discussion of potential negative outcomes of data sharing on self or others. |
|
| Discussion about regulations/infrastructure/policies/laws that exist to protect personal information and respondent's level of confidence in regulations or institutions. May be positive, negative, or neutral on the topic of whether such checks and balances are adequate. Include discussion of informed consent and de-identification procedures. |
|
| Discussion of privacy and information sharing in the context of relationships with a company (for profit or nonprofit), health system, university, research institution, biobank, government, or other institutional entity. Include entities' motivations or willingness to protect privacy. |
|
| Discussions of privacy or information sharing in the context of relationships with people (eg, friends, relatives, acquaintances, strangers). |
|
| Discussion of intentional actions taken to protect privacy (eg, using privacy settings, private browsing, reading privacy statements, shredding documents, avoiding email for certain purposes, limits on what type of information is posted). |
|
| Discussion of personal benefits of sharing information. May include perceived or actual personal benefit (eg, to get better care, find others like me, learn more information). |
|
| Discussion of societal benefits of sharing information (altruistic or for a greater good). May include perceived or actual societal benefit (eg, contribute to better knowledge, help others, help my community). |
|
| Discussions of feeling vulnerable or protected with respect to the movement of personal information. |
|
| Discussions of health information and if it is sensitive relative to other types of information (eg, respondent may or may not feel health information is sensitive—need to capture discussions either way). |
|
| Discussion about sharing or protecting potentially stigmatizing/ embarrassing information. Respondent must point to the stigmatizing potential of the information—coder should not infer. Includes acknowledgement of others' attitude toward this type of information, even if respondent does not agree. |
|
| Discussions about when too much electronic information is collected or requested. |
TMI: too much information.
Contextual disclosure habits
| Interpersonal Habits | Institutional Habits | |
|---|---|---|
| Definition: | Behaviors, practices, or personal codes related to sharing or protecting information within interpersonal relationships | Behaviors, practices, or personal codes related to sharing or protecting information in institutional settings |
| Examples: |
Open with coworkers or acquaintances Open with potential romantic partners Open with people who see me (because I look sick) Open with people who have conditions like mine Talk about health with people who are seeking information Talk about health only when it comes up in conversation Talk about health only with people I trust Disclose only select information with friends and family Disclose only on a “need to know” basis Lie to my friends about my chronic disease Tell only my mom about my health Discuss my health only with my doctor More open with people online than in-person Discuss condition with others (eg, friends) when it’s serious or I know exactly what’s going on |
Read terms and conditions or privacy policies Lie or obfuscate information Do not disclose health information with companies Ask about how research information will be stored Ask what research information is for Deal only with credible health and research institutions Bring physical copies of health records rather than sending electronically Avoid certain search terms or posting about certain topics when online Avoid online shopping or online banking Avoid clicking on online ads Clear online browsing history Avoid disclosing sensitive information online Disable features on apps Delete apps that ask for too many permissions Disable smartphone GPS |
Reasons for and against sharing inclusive of benefits and risks, philosophies of privacy, and emotional factors
| Reasons for Sharing | Reasons Against Sharing | |
|---|---|---|
| Conventional |
Receive better medical care Gain or maintain employment Gain or maintain insurance Convenience Receive social support Legal requirement |
Avoid discrimination or loss of benefits Avoid stigma or being treated differently Prevent tracking, targeting, or information “used against me” |
| Emotional/Intangible |
Belief in research Desire to help others Feelings of safety (trust or familiarity; belief in anonymity, good information security and rules/regulations; sense of control) Desire to demonstrate trustworthiness or other socially desirable trait Desire to take a stand or “change the culture” Build community |
Concerns about unspecified unintended consequences Negative past experiences High value on control of personal information Negative or uncomfortable feeling when asked for too much or inappropriate information Lack of trust in the commercial, political, or disrespectful motives of others Protect others from worry or sadness Uncertainty in what could happen with information Fear of hacking |
| Philosophies of Privacy |
Conviction that privacy does not exist or cannot be maintained (fatalism) Willingness to trade privacy for other benefits (tradeoff) Assumption that privacy is not necessary if one has no secrets (nothing to hide) |
Conviction that privacy is a kind of human right or property right (moral right) Conviction that maintaining privacy is an individual’s responsibility (personal responsibility) Assumption that privacy is necessary because the individual has a secret (something to hide) |
Definitions of philosophies of privacy
| Philosophies of Privacy | Definition |
|---|---|
|
| Privacy cannot be controlled or does not exist. |
|
| Privacy is a moral right—something that everyone is entitled to. |
|
| Protection of personal information is unimportant as long as the information does not include something sensitive or stigmatizing. |
|
| Protection of personal information is important because that information includes something that is sensitive or stigmatizing. |
|
| Privacy is a personal responsibility; everyone must work to keep or have privacy if they want it. |
|
| Privacy is something to be traded for desired goods, services, or conveniences and reflects a risk/reward or other tradeoff. |