skip to main content
10.1145/2441776.2441837acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
research-article

Privacy management in dynamic groups: understanding information privacy in medical practices

Authors Info & Claims
Published:23 February 2013Publication History

ABSTRACT

Recent wide adoption of Electronic Medical Record (EMR) systems provides health practitioners with easy access to patient private information. However, there is a dilemma between the easy access to patient information and the potential privacy infringement brought by such easy access. This paper elaborates three types of group dynamics that identify challenges of privacy management in medical practices: team members, temporal involvement, and different levels of information sensitivity. Drawing on the theory of contextual integrity, this work identifies the appropriate actors, information access, and information transmission principles for understanding the norms of information flows. The findings of the study shed lights on the design insights that privacy enhancing features should be appropriately aligned with the dynamic group behaviors of medical practices.

References

  1. Agrawal, R. and Johnson, C. Securing Electronic Health Records without Impeding the Flow of Information. International Journal of Medical Informatics 76, 5--6 (2007), 471--479.Google ScholarGoogle ScholarCross RefCross Ref
  2. Aronsky, D., Jones, I., Lanaghan, K., and Slovis, C.M. Supporting Patient Care in the Emergency Department with a Computerized Whiteboard System. Journal of the American Medical Informatics Association 15, 2 (2007), 184--194.Google ScholarGoogle Scholar
  3. Bardram, J.E. and Bossen, C. Mobility Work: The Spatial Dimension of Collaboration at a Hospital. Computer Supported Cooperative Work (CSCW) 14, 2 (2005), 131--160. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Barkhuus, L. The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI. Proceedings of the CHI 2012, 367--376. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Bauer, L., Cranor, L.F., Reeder, R.W., Reiter, M.K., and Vaniea, K. Real life challenges in access-control management. Proceedings of CHI 2009, 899--908. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Bélanger, F. and Crossler, R.E. Privacy in the digital age: a review of information privacy research in information systems. MIS Quarterly. 35, 4 (2011), 1017--1042. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Berg, M. Accumulating and Coordinating: Occasions for Information Technologies in Medical Work. Computer Supported Cooperative Work (CSCW) 8, 4 (1999), 373--401. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Bulgurcu, B., Cavusoglu, H., and Benbasat, I. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness. MIS Quarterly 34, 3 (2010), 523--54 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Cavoukian, A. and Prosch, M. Privacy by ReDesign: Building a Better Legacy. 2011. http://www.ipc.on.ca/english/Resources/Discussion-Papers/Discussion-Papers-Summary/?id=1070.Google ScholarGoogle Scholar
  10. Chen, Y. Documenting transitional information in EMR. Proceedings of CHI 2010, 1787--1796. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Choi, Y.B., Capitan, K.E., Krause, J.S., and Streeper, M.M. Challenges Associated with Privacy in Health care Industry: Implementation of HIPAA and the Security Rules. Journal of Medical Systems 30, 1 (2006), 57--64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Coiera, E. and Clarke, R. E-Consent: The Design and Implementation of Consumer Consent Mechanisms in an Electronic Environment. Journal of the American Medical Informatics Association 11, 2 (2004), 129--140.Google ScholarGoogle Scholar
  13. Culnan, M.J. and Williams, C.C. How ethics can enhance organizational privacy: lessons from the choicepoint and TJX data breaches. MIS Quarterly. 33, 4 (2009), 673--687. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Dmitrienko, A., Sadeghi, A.-R., Tamrakar, S., and Wachsmann, C. SmartTokens: Delegable Access Control with NFC-enabled Smartphones. Proceedings of the 5th International Conference on Trust & Trustworthy Computing (TRUST), Springer, 325--339. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Earp, J.B. and Payton, F.C. Information privacy in the service sector: An exploratory study of health care and banking professionals. J. Organ. Comp. Electron. Commer. 16, 2 (2006), 105--122.Google ScholarGoogle ScholarCross RefCross Ref
  16. Ferreira, A., Cruz-Correia, R., Antunes, L., et al. How to break access control in a controlled manner. Proceedings of the IEEE International Symposium on Computer-Based Medical Systems, (2006), 847--854. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Fitzpatrick, G. and Ellingsen, G. A Review of 25 Years of CSCW Research in Healthcare: Contributions, Challenges and Future Agendas. Computer Supported Cooperative Work. (2012). 1--57.Google ScholarGoogle Scholar
  18. Glaser, B.G. and Strauss, A.L. The discovery of grounded theory: Strategies for qualitative research. Aldine de Gruyter, Hawthorne, NY, 1967.Google ScholarGoogle Scholar
  19. Grudin, J. Why CSCW applications fail: problems in the design and evaluationof organizational interfaces. Proceedings of CSCW 1988, 85--93. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Gunter, C.A., Liebovitz, D.M., and Malin, B. Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems. IEEE Security and Privacy 9, 5 (2011), 48--55. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Heckle, R., Lutters, W.G., and Gurzick, D. Network authentication using single sign-on: the challenge of aligning mental models. Proceedings of the Symposium on Computer Human Interaction for Management of Information Technology (2008), 6:1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Kluge, E.H.W. Secure e-Health: Managing Risks to Patient Health Data. International Journal of Medical Informatics 76, 5--6 (2007), 402--406.Google ScholarGoogle ScholarCross RefCross Ref
  23. Lee, S., Tang, C., Park, S.Y., and Chen, Y. Loosely formed patient care teams: communication challenges and technology design. Proceedings of CSCW 2012, 867--876. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Luff, P. and Heath, C. Mobility in collaboration. Proceedings of CSCW 1998, 305--314. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Murphy, A., Xu, H., Reddy, M., and Ringel, B. Exploring Collaborative Privacy Practices. CHI 2011 Workshop on Privacy for a Networked World: Bridging Theory and Design.Google ScholarGoogle Scholar
  26. Nissenbaum, H. Privacy as Contextual Integrity. Washington Law Review 79, 1 (2004). 101--139.Google ScholarGoogle Scholar
  27. Nissenbaum, H. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford Law Books, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Ohno-Machado, L., Silveira, P.S.P., and Vinterbo, S. Protecting Patient Privacy by Quantifiable Control of Disclosures in Disseminated Databases. International Journal of Medical Informatics 73, 7--8 (2004), 599--606.Google ScholarGoogle ScholarCross RefCross Ref
  29. Palen, L. and Dourish, P. Unpacking "privacy" for a networked world. Proceedings of CHI 2003, 129--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Parks, R., Chu, C.-H., Xu, H., and Adams, L. Understanding the Drivers and Outcomes of Healthcare Organizational Privacy Responses. Proceedings of 32nd Annual International Conference on Information Systems (ICIS), (2011).Google ScholarGoogle Scholar
  31. Parks, R., Chu, C.-H., and Xu, H. Healthcare Information Privacy Research: Issues, Gaps and What Next. Proceedings of the 17th Americas Conference on Information Systems (AMCIS), (2011).Google ScholarGoogle Scholar
  32. Patel, V.L., Arocha, J.F., and Shortliffe, E.H. Cognitive Models in Training Health Professionals to Protect Patients' Confidential Information. International Journal of Medical Informatics 60, 2 (2000), 143--150.Google ScholarGoogle ScholarCross RefCross Ref
  33. Peleg, M., Beimel, D., Dori, D., and Denekamp, Y. Situation-Based Access Control: Privacy Management via Modeling of Patient Data Access Scenarios. Journal of Biomedical Informatics 41, 6 (2008), 1028--1040. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. PRC. http://www.privacyrights.org/data-breach. 2012.Google ScholarGoogle Scholar
  35. Reddy, M. and Dourish, P. A finger on the pulse: temporal rhythms and information seeking in medical work. Proceedings of CSCW 2002. 344--353. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Siponen, M. and Vance, A. Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly 34, 3 (2010), 487--502. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Smith, H.J., Dinev, T., and Xu, H. Information Privacy Research: An Interdisciplinary Review. MIS Quarterly 35, 4 (2011), 989--1015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Steinbrook, R. Health Care and the American Recovery and Reinvestment Act. New England Journal of Medicine 360, 11 (2009), 1057--1060.Google ScholarGoogle ScholarCross RefCross Ref
  39. Strauss, A., Fagerhaugh, S., Suczek, B., and Wiener, C. Social Organization of Medical Work. University of Chicago, Chicago, 1985.Google ScholarGoogle Scholar
  40. Zhang, W., Gunter, C., Liebovitz, D., Tian, J., and Malin, B. Role Prediction using Electronic Medical Record System Audits. Proceedings of the 2011 American Medical Informatics Association Annual Symposium (2011), 858--867.Google ScholarGoogle Scholar
  41. Hospital personnel fired for accessing records of Tucson victims. CNN. http://articles.cnn.com/2011-01--12/us/arizona.hospital.records_1_patient-hospital-personnel-medical-records?_s=PM:US.Google ScholarGoogle Scholar

Index Terms

  1. Privacy management in dynamic groups: understanding information privacy in medical practices

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            CSCW '13: Proceedings of the 2013 conference on Computer supported cooperative work
            February 2013
            1594 pages
            ISBN:9781450313315
            DOI:10.1145/2441776

            Copyright © 2013 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 23 February 2013

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate2,235of8,521submissions,26%

            Upcoming Conference

            CSCW '24

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader