Table 1.
Processes in mHealth monitoring | Privacy threat/concern |
---|---|
Data collection and activity monitoring using wearables or sensors |
• Continuous monitoring (Avancha et al. 2012) • Volume of data collection (Steinhubl et al. 2015) • Invisibility (Brey 2005) |
Communication between wearable device and mobile phone |
• Data security (Steinhubl et al. 2015) • Encryption (Avancha et al. 2012) (Steinhubl et al. 2015) • Confidentiality (Harvey and Harvey 2014) |
Location tracking using mobile phones |
• Profiling (Avancha et al. 2012) • Surveillance (Shilton 2009) |
Sharing of data with healthcare practitioners, insurance companies and other users |
• Data use (unauthorised or unanticipated) (European Commission 2011) • Sharing of data (Avancha et al. 2012) • Information misuse/abuse (European Commission 2011) |
Manual data input | • Data quality (Avancha et al. 2012) |
Use of mobile applications |
• Encryption (McCarthy 2013) • Data control (Arora et al. 2014) • Accessibility (Arora et al. 2014) • Disclosure risks (Steinhubl et al. 2015) |
Doctor to patient communication | • Confidentiality (Harvey and Harvey 2014) |