ebook img

Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps PDF

366 Pages·2020·4.68 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps

Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps Devjani Sen Algonquin College, Canada Rukhsana Ahmed University at Albany, SUNY, USA A volume in the Advances in Information Security, Privacy, and Ethics (AISPE) Book Series Published in the United States of America by IGI Global Information Science Reference (an imprint of IGI Global) 701 E. Chocolate Avenue Hershey PA, USA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: [email protected] Web site: http://www.igi-global.com Copyright © 2021 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher. Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. Library of Congress Cataloging-in-Publication Data Names: Sen, Devjani, editor. | Ahmed, Rukhsana, editor. Title: Privacy concerns surrounding personal information sharing on health and fitness mobile apps / Devjani Sen and Rukhsana Ahmed, editors. Description: Hershey, PA : Information Science Reference, [2020] | Includes bibliographical references and index. | Summary: “This book provides research on the dangers of sharing personal information on health and wellness apps, as well as how such information can be used by employers, insurance companies, advertisers, and other third parties”-- Provided by publisher. Identifiers: LCCN 2019054148 (print) | LCCN 2019054149 (ebook) | ISBN 9781799834878 (h/c) | ISBN 9781799834885 (s/c) | ISBN 9781799834892 (eISBN) Subjects: LCSH: Medical records--Security measures. | Mobile apps--Security measures. | Privacy, Right of. | Personal information management. | Data protection. Classification: LCC R864 .P74 2020 (print) | LCC R864 (ebook) | DDC 610.69--dc23 LC record available at https://lccn.loc.gov/2019054148 LC ebook record available at https://lccn.loc.gov/2019054149 This book is published in the IGI Global book series Advances in Information Security, Privacy, and Ethics (AISPE) (ISSN: 1948-9730; eISSN: 1948-9749) British Cataloguing in Publication Data A Cataloguing in Publication record for this book is available from the British Library. All work contributed to this book is new, previously-unpublished material. The views expressed in this book are those of the authors, but not necessarily of the publisher. For electronic access to this publication, please contact: [email protected]. Advances in Information Security, Privacy, and Ethics (AISPE) Book Series ISSN:1948-9730 EISSN:1948-9749 Editor-in-Chief: Manish Gupta State University of New York, USA Mission As digital technologies become more pervasive in everyday life and the Internet is utilized in ever increasing ways by both private and public entities, concern over digital threats becomes more prevalent. The Advances in Information Security, Privacy, & Ethics (AISPE) Book Series provides cutting-edge research on the protection and misuse of information and technology across various industries and settings. Comprised of scholarly research on topics such as identity management, cryptography, system security, authentication, and data protection, this book series is ideal for reference by IT professionals, academicians, and upper-level students. Coverage • Data Storage of Minors IGI Global is currently accepting • CIA Triad of Information Security manuscripts for publication within this • Cyberethics series. To submit a proposal for a volume in • Electronic Mail Security this series, please contact our Acquisition • Privacy-Enhancing Technologies Editors at [email protected] or • Network Security Services visit: http://www.igi-global.com/publish/. • Cookies • Internet Governance • Security Information Management • Tracking Cookies The Advances in Information Security, Privacy, and Ethics (AISPE) Book Series (ISSN 1948-9730) is published by IGI Global, 701 E. Chocolate Avenue, Hershey, PA 17033-1240, USA, www.igi-global.com. This series is composed of titles available for purchase individually; each title is edited to be contextually exclusive from any other title within the series. For pricing and ordering information please visit http://www.igi-global.com/book-series/advances-information-security- privacy-ethics/37157. Postmaster: Send all address changes to above address. Copyright © 2021 IGI Global. All rights, including translation in other languages reserved by the publisher. No part of this series may be reproduced or used in any form or by any means – graphics, electronic, or mechanical, including photocopying, recording, taping, or information and retrieval systems – without written permission from the publisher, except for non commercial, educational use, including classroom teaching purposes. The views expressed in this series are those of the authors, but not necessarily of IGI Global. Titles in this Series For a list of additional titles in this series, please visit: http://www.igi-global.com/book-series/advances-information-security-privacy-ethics/37157 Large-Scale Data Streaming, Processing, and Blockchain Security Hemraj Saini (Jaypee University of Information Technology, India) Geetanjali Rathee (Jaypee University of Information Technology, India) and Dinesh Kumar Saini (Sohar University, Oman) Information Science Reference • © 2021 • 285pp • H/C (ISBN: 9781799834441) • US $225.00 Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM) Gregory B. White (CIAS, The University of Texas at San Antonio, USA) and Natalie Sjelin (CIAS, The University of Texas at San Antonio, USA) Information Science Reference • © 2021 • 221pp • H/C (ISBN: 9781799844716) • US $195.00 Applied Approach to Privacy and Security for the Internet of Things Parag Chatterjee (National Technological University, Argentina & University of the Republic, Uruguay) Emmanuel Benoist (Bern University of Applied Sciences, Switzerland) and Asoke Nath (St. Xavier’s College, Kolkata, India) Information Science Reference • © 2020 • 295pp • H/C (ISBN: 9781799824442) • US $235.00 Advanced Localization Algorithms for Wireless Sensor Networks M. Vasim Babu (Institute of Technology and Sciences, India) Information Science Reference • © 2020 • 300pp • H/C (ISBN: 9781799837336) • US $195.00 Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies Gianluca Cornetta (Universidad CEU San Pablo, Spain) Abdellah Touhafi (Vrije Universiteit Brussel, Belgium) and Gabriel-Miro Muntean (Dublin City University, Ireland) For an entire list of titles in this series, please visit: http://www.igi-global.com/book-series/advances-information-security-privacy-ethics/37157 701 East Chocolate Avenue, Hershey, PA 17033, USA Tel: 717-533-8845 x100 • Fax: 717-533-8661 E-Mail: [email protected] • www.igi-global.com Editorial Advisory Board Nigel Cameron, Center for Policy on Emerging Technologies Affiliation, USA Heather Carmack, The University of Alabama, USA  Teresa Harrison, University at Albany, SUNY, USA  Rocci Luppicini, University of Ottawa, Canada  Yuping Mao, California State University, Long Beach, USA  Trina Ogilvie, Human Data Inc., Canada  Noam Tractinsky, University of the Negev, Israel Table of Contents Foreword.............................................................................................................xiv Preface.................................................................................................................xix Acknowledgment............................................................................................xxviii Section 1 Personal Information Sharing and Data Ownership: Mobile Applications and Wearable Technologies Chapter 1 What.Can.Fitness.Apps.Teach.Us.About.Group.Privacy?.....................................1 Miriam J. Metzger, University of California, Santa Barbara, USA Jennifer Jiyoung Suh, University of California, Santa Barbara, USA Scott Reid, University of California, Santa Barbara, USA Amr El Abbadi, University of California, Santa Barbara, USA Chapter 2 Role.of.Wearable.Technology.and.Fitness.Apps.in.Obesity.and.Diabetes:. Privacy,.Ownership,.and.Portability.of.Data........................................................31 Shariq I. Sherwani, Ohio University, USA Benjamin R. Bates, Ohio University, USA Chapter 3 Data.Ownership:.Legalities.Concerning.Wearable.Technologies........................60 Thora Knight, University at Albany, SUNY, USA  Chapter 4 Wearable.Devices.and.Privacy.Concerns:.Data.Collection,.Analysis,.and. Interpretation.........................................................................................................83 Ersin Dincelli, University of Colorado Denver, USA Xin Zhou, Yale University, USA Alper Yayla, The University of Tampa, USA Haadi Jafarian, University of Colorado Denver, USA Section 2 Health and Fitness Apps: Data Privacy and Data Breach Chapter 5 How.Do.Mobile.Applications.for.Cancer.Communicate.About.Their.Privacy. Practices?.An.Analysis.of.Privacy.Policies........................................................113 Zerin Mahzabin Khan, Virginia Tech, USA Rukhsana Ahmed, University at Albany, SUNY, USA Devjani Sen, Algonquin College, Canada Chapter 6 Case.Study:.Under.Armour.Hack.......................................................................145 Kylie Torres, Grand Valley State University, USA Andrew Stevenson, Davenport University, USA Justin Hicks, Grand Rapids Press, USA Section 3 The Psychology of Behavior: What Motivates Users to Share Personal Information? Chapter 7 Exploitation.of.Health.on.Instagram:.Motivations,.Social.Support,.and. Influencers...........................................................................................................164 Michael Blight, North Central College, USA Chapter 8 Governmentality,.Playbor,.and.Peak.Performance:.Critiques.and.Concerns.of. Health.and.Wellness.Gamification......................................................................186 Nicholas David Bowman, Texas Tech University, USA Megan Condis, Texas Tech University, USA  Section 4 The Role of Language in Shaping Conceptions of Privacy Chapter 9 An.Analysis.of.Privacy.Language.in.the.Scholarly.Literature.on.Mental. Health.Apps........................................................................................................212 Maureen Ebben, University of Southern Maine, USA Julien S. Murphy, University of Southern Maine, USA Chapter 10 “Sensitive.but.Essential.Information”:.Policy.Debates.on.Fitness.Application. Privacy.and.Data.Security..................................................................................240 Alison Nicole Novak, Rowan University, USA Epilogue.............................................................................................................268 Afterword...........................................................................................................274 Compilation of References...............................................................................276 About the Contributors....................................................................................325 Index...................................................................................................................332 Detailed Table of Contents Foreword.............................................................................................................xiv Preface.................................................................................................................xix Acknowledgment............................................................................................xxviii Section 1 Personal Information Sharing and Data Ownership: Mobile Applications and Wearable Technologies Chapter 1 What.Can.Fitness.Apps.Teach.Us.About.Group.Privacy?.....................................1 Miriam J. Metzger, University of California, Santa Barbara, USA Jennifer Jiyoung Suh, University of California, Santa Barbara, USA Scott Reid, University of California, Santa Barbara, USA Amr El Abbadi, University of California, Santa Barbara, USA This.chapter.begins.with.a.case.study.of.Strava,.a.fitness.app.that.inadvertently. exposed.sensitive.military.information.even.while.protecting.individual.users’. information.privacy..The.case.study.is.analyzed.as.an.example.of.how.recent.advances. in.algorithmic.group.inference.technologies.threaten.privacy,.both.for.individuals. and.for.groups..It.then.argues.that.while.individual.privacy.from.big.data.analytics.is. well.understood,.group.privacy.is.not..Results.of.an.experiment.to.better.understand. group.privacy.are.presented..Findings.show.that.group.and.individual.privacy.are. psychologically.distinct.and.uniquely.affect.people’s.evaluations,.use,.and.tolerance. for.a.fictitious.fitness.app..The.chapter.concludes.with.a.discussion.of.group-inference. technologies.ethics.and.offers.recommendations.for.fitness.app.designers.

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.