Skip to main content
. 2021 Jun 18;30(1):37–47. doi: 10.1007/s10389-021-01608-9

Table 1.

Identification of privacy threats/concerns – mHealth and monitoring chronic diseases

Processes in mHealth monitoring Privacy threat/concern
Data collection and activity monitoring using wearables or sensors

• Continuous monitoring (Avancha et al. 2012)

• Volume of data collection (Steinhubl et al. 2015)

• Invisibility (Brey 2005)

Communication between wearable device and mobile phone

• Data security (Steinhubl et al. 2015)

• Encryption (Avancha et al. 2012) (Steinhubl et al. 2015)

• Confidentiality (Harvey and Harvey 2014)

Location tracking using mobile phones

• Profiling (Avancha et al. 2012)

• Surveillance (Shilton 2009)

Sharing of data with healthcare practitioners, insurance companies and other users

• Data use (unauthorised or unanticipated)

(European Commission 2011)

• Sharing of data (Avancha et al. 2012)

• Information misuse/abuse (European Commission 2011)

Manual data input • Data quality (Avancha et al. 2012)
Use of mobile applications

• Encryption (McCarthy 2013)

• Data control (Arora et al. 2014)

• Accessibility (Arora et al. 2014)

• Disclosure risks (Steinhubl et al. 2015)

Doctor to patient communication • Confidentiality (Harvey and Harvey 2014)