SlideShare a Scribd company logo
Social Networking in Health
Care
Towards secure, privacy-preserving systems
James Williams,
BA, BSc, JD,
Privacy Officer, Ontario Telemedicine Network.
PhD candidate, University of Victoria.
Goal
This presentation is an introduction to an
understudied area in health informatics. We will
address the following issues:
1. What are social networking applications for
health care?
2. What unique security and privacy issues
exist?
3. What techniques can address them?
4. What remains to be done?
OUTLINE
Background
•Basics of Social Networking (SN) applications.
•Social Networking for Health Care
•Examples
Security/Privacy Issues
•Issues with SN apps in general.
•Unique features of the healthcare domain.
•Current work.
Future work.
Basics of Social Networking
The social web
•The term ‘Web 2.0’ has been used to refer to
internet architectures that permit content to be easily
generated and published by users
•Users are enabled to act both as readers and
writers, generating content and creating a visible
history of their activities.
•Key notions include:
•interpersonal networking,
•personalization
•individualism
•empowerment
Basics of Social Networking
Online networks
•First generation web applications like bulletin boards
allowed users to communicate and collaborate.
•Social networking (SN) applications expand upon
Web 1.0 apps by:
•providing a persistent, explicit and publically
visible representation of social networks.
•providing a variety of mechanisms by which
users may organize themselves. (ie: groups)
•incorporating privacy protection.
Basics of Social Networks
A social network involves:
1. A set of users, represented by individual user
profiles.
2. A set of mechanisms for exchanging
information, such as message boards, email,
and wall posts.
3. A set of binary relationship types.
4. A set of search functions, to locate user
profiles.
5. A site operator, who controls the site.
•A social network is naturally represented as a
dynamic graph in which an edge between two
Basics of Social Networks
Model of an SN
.
Social Networks in Health
Care
Rationale
‘Healthcare 2.0’ has been used to denote the use of
social software, with an emphasis on its ability to
promote collaboration between patients, caregivers
and medical professionals.
Patient empowerment may be a critical factor in
achieving sustainability of the health care system.
•Traditionally, the physician-patient relationship has
exhibited a degree of information asymmetry.
•SNAHC systems emphasize collaboration and
independence.
•User communities are springing up around ailments.
•Active management may make patients more health
conscious.
Social Networks in Health
Care
Differences
In the case of health care, we have more than one
type of user:
•Patients
•Providers
•Care givers
•Support staff
•Family members
•Substitute decision makers.
Social Networks in Health
Care
Examples: PHRs.
Basic social networking features are found in
personal health record (PHR) systems, including
Google Health, Microsoft HealthVault, and Dossia.
Google Health:
•Allows users to store/manage PHI, including medical
conditions, allergies and medication histories.
•Users can search for information about medical
conditions or adverse drug interactions.
•Information in the health record can be shared.
Users invite others to view their profile through email.
Social Networks in Health
Care
Examples
Microsoft Healthvault:
•Platform that provides basic services for PHR and
social networking products.
•Vendors can build customized products on top of it.
•Each individual owns his or her record.
•Others can be granted access to it, if desired.
•The mapping between records to users is many-
many, allowing for substitute decision makers and
other scenarios.
Social Networks in Health
Care
Examples
Healthy Circles
•Patients can store emergency contacts, insurance
plans, medications, immunizations, past procedures,
test results, medical conditions, allergies and family
histories
•Users can enter basic health metrics and view
reports.
•Programs are interactive applications that typically
require users to enter personal information in order
to provide diagnoses or recommend treatment
regimens or health management strategies.
•users can purchase consultation or monitoring
services from registered health care providers
Social Networks in Health
Care
Examples
Patients Like Me
•Patients can store a wide array of information.
•The site operator encourages users to share as
much information as possible.
•Pharmaceutical companies are partners, using the
site as a repository for voluntarily contributed data on
outcomes.
•Uses a more advanced social networking model.
Security / Privacy Issues in
SN
Awareness of Risk:
Empirical studies show that users:
•do value informational privacy.
•typically do not change default settings.
•are inclined to disclose information freely online.
•often restrict their information only after
breaches have occurred.
•Users may lack a method for assessing risks in
social networks. Social cues are missing.
•They may also be unaware of the mechanisms for
reducing risk.
Security / Privacy Issues in
SN
Ease of Network Formation:
•An individual’s online social network tends to be
more expansive, (containing more weak ties), than
the same individual’s offline network
•users often misjudge the extent, activity and
accessibility of their online social networks
Complex Workflows:
•In general, social networking applications offer
complex, many-to-many communications
mechanisms.
•The workflows are not easy to grasp, which makes
Security / Privacy Issues in
SN
Trust:
•Attackers may create fake profiles, and site
operators may not follow their privacy policies.
•Trust is a ‘social glue’ in a SN system.
Data Lifecycle:
•Users have little knowledge about retention periods,
backups, and the like.
•Information posted on a SN may have ramifications
for the user.
Security / Privacy Issues in
SN
Unauthorized Uses and Disclosures:
•Site operators may use or disclose the data.
•As an example, SN operators report increased
demands for bulk data from governments.
Leakage to Applications:
•Applications typically draw data from the system in
order to deliver personalized experiences.
•In many early architectures, they could retrieve quite
a lot of information, including information about one’s
friends.
Security / Privacy Issues in
SN
Aggregation by Third Parties:
•Third parties (ie: ad servers) can receive personal
information.
•Since 70% of the market is controlled by a small
number of firms, these companies are in a position to
aggregate data from various sources.
•Users typically are not aware that disclosures on
one site may be linked to disclosures on another site.
Security / Privacy Issues in
SN
Complex Privacy Policies:
•Because of the complex user scenarios, privacy
policies for SN systems tend to be complex.
•Studies indicate that some are inaccessible to users.
•Enforcement is more difficult. Unlike ecommerce, a
user may see another’s activities.
•Market lacks competition for comprehensible privacy
policies.
•There are few methods for negotiating policies on a
user’s behalf.
Security / Privacy Issues in
SN
Sunken Costs:
•In Ecommerce, it is fairly easy to switch service
providers.
•In SN settings, the costs associated with switching
providers are fairly severe.
•Users may stay with an insecure and non-private
system.
Shared Content:
•Shared content creates privacy risks for users, since
information may be linked to their profile without
consent or knowledge
Features of the Heath
Domain
Sensitivity of Information:
•Tends to be very high, and protected by law.
Motivated Data Recipients:
•Employers, insurers, researchers.
Secondary Damage:
•Since many serious health concerns are genetically
based, information about an individual can convey
information about a family member.
Features of the Heath
Domain
Community Interests:
•Individuals sharing information on health trends can,
if their submissions are aggregated, reveal
information about the health issues affecting groups.
Motivated Data Recipients:
•Employers, insurers, researchers.
Signaling:
•The mere act of making an inquiry about a condition
can be a signal that the individual in question has the
condition. The same is true of an individual’s
Features of the Heath
Domain
Compensability:
•Difficult to value PHI.
•Indemnification and compensation is much more
difficult.
Dynamic Networks:
•Health teams form around episodes.
•They are ephemeral.
What can we do (as software
engineers, developers and systems
architects) to alleviate some of these
issues?
Current Work
Securing the Framework
Restrict information flowing to apps:
•Privacy by Proxy.
•User-to-application policies.
New Access Models:
•‘proof’ to access particular resources.
•Social Access Control List.
• Walk through trusted nodes in the network
structure.
Current Work
Securing the Framework
Anonymizing Users
•Use encryption and various key exchange
mechanisms.
•FlybyNight: uses client side javascript.
•Respondent k-anonymity.
•Fake data.
•NOYB: map operations on fake data back to real
data. Avoid ciphertext. Replace values
pseudonoymously from a dictionary. Keys
distributed out of band. Only works for small # of
users.
•FaceCloak: another approach using dictionary
Current Work
Dealing with Extracts
•Social network data can be extracted for processing
or data mining.
•Attacker may have background information,
including knowledge of certain properties of the
network.
•Most of the techniques are based on anonymization.
•Tabular algorithms don’t work well with network
data.
•Need to know privacy risk model, background
knowledge, and intended use of data.
•Two camps:
1. Clustering based.
Future Work
Improved Privacy Controls:
•Current social network applications allow the
construction of hierarchies, including groups.
•We need efficient, concise and usable controls for
this.
•Taking advantage of automation or group
knowledge:
•Agents
•Automatically assigning trust to users/resources.
•Heuristics (weighting), voting, reputation
mechanisms.
•Better user interfaces for privacy control
Future Work
Network Visualization Tools:
•Some of the uncertainty surrounding privacy risks
could be dispelled if users were able to visualize their
networks.
• To this end, user interfaces for displaying a user’s
profile accessibility would be highly useful
•increase the utilization of privacy options by clear
representations of social networks, friend proximity,
and availability of profile features.
Future Work
Detecting Attacks:
•Future software architectures for health care could
include facilities to discourage or detect common
attacks.
•For instance, prototypes could be developed that
scan for fake user profiles
•Also, search functionality can serve as a form of
querying that can reveal both user identities and
protected user information.
•Find heuristic approaches for limiting queries.
Future Work
Security in the Architecture:
•We need to do further work on secure architectures,
along the lines of the efforts we have discussed
above.
•In particular, we should develop architectures that:
•Work for all users (not just a subset)
•Provide anonymity against the platform.
•Make it easy to exchange keys.
Future Work
Shared Content Management:
•We need mechanisms for assigning permissions to
shared content.
•This is particularly relevant in the health domain,
where secondary disclosures may cause information
to be revealed about the health of family members.
Future Work
Policy Negotiation and Representation:
•Continue the development of tools and languages
for representing policies.
•Many privacy policy tools were developed with a
single organization’s behaviour in mind. We also
need tools for data exchange.
•Methods for evaluating formal requirements in the
context of policies would be highly useful.

More Related Content

What's hot

Misadventures in Interoperability
Misadventures in InteroperabilityMisadventures in Interoperability
Misadventures in Interoperability
Cedric Dark
 
Digital Health: Medicine at the Croosroads
Digital Health: Medicine at the CroosroadsDigital Health: Medicine at the Croosroads
Digital Health: Medicine at the Croosroads
Steven Peskin
 
HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007
Richard Moore
 
Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...
Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...
Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...
The Petrie-Flom Center for Health Law Policy, Biotechnology, and Bioethics
 
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
ijsptm
 
mHealth & the Medical Provider
mHealth & the Medical ProvidermHealth & the Medical Provider
mHealth & the Medical Provider
Luca Sergio
 
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
The Petrie-Flom Center for Health Law Policy, Biotechnology, and Bioethics
 
Kantara uma webinar july 2020
Kantara uma webinar   july 2020Kantara uma webinar   july 2020
Kantara uma webinar july 2020
kantarainitiative
 
Social media in healthcare 2012 moore mb for the lancet 7 12-12
Social media in healthcare 2012 moore mb for the lancet 7 12-12Social media in healthcare 2012 moore mb for the lancet 7 12-12
Social media in healthcare 2012 moore mb for the lancet 7 12-12
Mike Moore
 
Mobile Apps in Clinical Settings
Mobile Apps in Clinical SettingsMobile Apps in Clinical Settings
Mobile Apps in Clinical Settings
National Center for Telehealth & Technology
 
Bdigital Cs Businesstic20110407
Bdigital Cs Businesstic20110407Bdigital Cs Businesstic20110407
Bdigital Cs Businesstic20110407
Felip Miralles
 
The challenges and benefits of implementing and using personal health and car...
The challenges and benefits of implementing and using personal health and car...The challenges and benefits of implementing and using personal health and car...
The challenges and benefits of implementing and using personal health and car...
Patients Know Best
 
Social Media in the Legal Industry
Social Media in the Legal IndustrySocial Media in the Legal Industry
Social Media in the Legal Industry
tmfrankl
 
Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks
IJECEIAES
 
Mobile Health Symposium #HIMSS15 Session Mh1
Mobile Health Symposium #HIMSS15 Session Mh1Mobile Health Symposium #HIMSS15 Session Mh1
Mobile Health Symposium #HIMSS15 Session Mh1
3GDR
 
Direct Boot Camp 2 0 Federal Agency requirements for exchange via direct
Direct Boot Camp 2 0 Federal Agency requirements for exchange via directDirect Boot Camp 2 0 Federal Agency requirements for exchange via direct
Direct Boot Camp 2 0 Federal Agency requirements for exchange via direct
Brian Ahier
 
Kairon overview
Kairon overviewKairon overview
Kairon overview
Jeff McCloud
 
Implications for risk management of digital health technologies
Implications for risk management of digital health technologiesImplications for risk management of digital health technologies
Implications for risk management of digital health technologies
David Lee Scher, MD
 
Protecting Healthcare Data from Hackers
Protecting Healthcare Data from HackersProtecting Healthcare Data from Hackers
Protecting Healthcare Data from Hackers
Joshua Spencer
 
Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network site
ijcsit
 

What's hot (20)

Misadventures in Interoperability
Misadventures in InteroperabilityMisadventures in Interoperability
Misadventures in Interoperability
 
Digital Health: Medicine at the Croosroads
Digital Health: Medicine at the CroosroadsDigital Health: Medicine at the Croosroads
Digital Health: Medicine at the Croosroads
 
HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007
 
Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...
Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...
Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...
 
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
 
mHealth & the Medical Provider
mHealth & the Medical ProvidermHealth & the Medical Provider
mHealth & the Medical Provider
 
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
 
Kantara uma webinar july 2020
Kantara uma webinar   july 2020Kantara uma webinar   july 2020
Kantara uma webinar july 2020
 
Social media in healthcare 2012 moore mb for the lancet 7 12-12
Social media in healthcare 2012 moore mb for the lancet 7 12-12Social media in healthcare 2012 moore mb for the lancet 7 12-12
Social media in healthcare 2012 moore mb for the lancet 7 12-12
 
Mobile Apps in Clinical Settings
Mobile Apps in Clinical SettingsMobile Apps in Clinical Settings
Mobile Apps in Clinical Settings
 
Bdigital Cs Businesstic20110407
Bdigital Cs Businesstic20110407Bdigital Cs Businesstic20110407
Bdigital Cs Businesstic20110407
 
The challenges and benefits of implementing and using personal health and car...
The challenges and benefits of implementing and using personal health and car...The challenges and benefits of implementing and using personal health and car...
The challenges and benefits of implementing and using personal health and car...
 
Social Media in the Legal Industry
Social Media in the Legal IndustrySocial Media in the Legal Industry
Social Media in the Legal Industry
 
Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks
 
Mobile Health Symposium #HIMSS15 Session Mh1
Mobile Health Symposium #HIMSS15 Session Mh1Mobile Health Symposium #HIMSS15 Session Mh1
Mobile Health Symposium #HIMSS15 Session Mh1
 
Direct Boot Camp 2 0 Federal Agency requirements for exchange via direct
Direct Boot Camp 2 0 Federal Agency requirements for exchange via directDirect Boot Camp 2 0 Federal Agency requirements for exchange via direct
Direct Boot Camp 2 0 Federal Agency requirements for exchange via direct
 
Kairon overview
Kairon overviewKairon overview
Kairon overview
 
Implications for risk management of digital health technologies
Implications for risk management of digital health technologiesImplications for risk management of digital health technologies
Implications for risk management of digital health technologies
 
Protecting Healthcare Data from Hackers
Protecting Healthcare Data from HackersProtecting Healthcare Data from Hackers
Protecting Healthcare Data from Hackers
 
Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network site
 

Similar to Social Networks in Health Care - Talk at ICSE 2010

Social media and health care provider
Social media and health care providerSocial media and health care provider
Social media and health care provider
Naveen Pareek
 
Chapter 23
Chapter 23Chapter 23
Chapter 23
bodo-con
 
DOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptxDOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptx
JyotiPandey43595
 
Trust and Governance in Health and Social Care
Trust and Governance in Health and Social Care Trust and Governance in Health and Social Care
Trust and Governance in Health and Social Care
Napier University
 
2013: The Connected Workplace
2013: The Connected Workplace2013: The Connected Workplace
2013: The Connected Workplace
mkeane
 
Intergrating social media into healthcare systems practice nov 13 amsus v2 0 ...
Intergrating social media into healthcare systems practice nov 13 amsus v2 0 ...Intergrating social media into healthcare systems practice nov 13 amsus v2 0 ...
Intergrating social media into healthcare systems practice nov 13 amsus v2 0 ...
Mike Moore
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
JohnLagman3
 
The issues of security and privacy in social network
The issues of security and privacy in social network The issues of security and privacy in social network
The issues of security and privacy in social network
Noori Sadeq
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
M2SYS Technology
 
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET Journal
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Editor IJCATR
 
Mobility innovation and unknowns
Mobility innovation and unknownsMobility innovation and unknowns
Mobility innovation and unknowns
Lisa Marie Martinez
 
Giles Wilmore: How will the NHS Information Strategy support the new NHS?
Giles Wilmore: How will the NHS Information Strategy support the new NHS?Giles Wilmore: How will the NHS Information Strategy support the new NHS?
Giles Wilmore: How will the NHS Information Strategy support the new NHS?
The King's Fund
 
Professional Choices
Professional ChoicesProfessional Choices
Professional Choices
Dawn Yankeelov
 
Social Media and Patient Centric Design, Facilitating Provider-Patient Relati...
Social Media and Patient Centric Design, Facilitating Provider-Patient Relati...Social Media and Patient Centric Design, Facilitating Provider-Patient Relati...
Social Media and Patient Centric Design, Facilitating Provider-Patient Relati...
Mad*Pow
 
Drupal and the Future of Healthcare
Drupal and the Future of HealthcareDrupal and the Future of Healthcare
Drupal and the Future of Healthcare
Achieve Internet
 
Ethics of personalized information filtering
Ethics of personalized information filteringEthics of personalized information filtering
Ethics of personalized information filtering
Ansgar Koene
 
Healthcare System Design
Healthcare System DesignHealthcare System Design
Healthcare System Design
HtetThuzar
 
Always Be Prepared: 5 Documents for Social Media Readiness
Always Be Prepared: 5 Documents for Social Media ReadinessAlways Be Prepared: 5 Documents for Social Media Readiness
Always Be Prepared: 5 Documents for Social Media Readiness
Grey Matter Marketing
 
Statistics — Your Friend, Not Your Foe
Statistics — Your Friend, Not Your Foe Statistics — Your Friend, Not Your Foe
Statistics — Your Friend, Not Your Foe
Integrity Management Services, Inc.
 

Similar to Social Networks in Health Care - Talk at ICSE 2010 (20)

Social media and health care provider
Social media and health care providerSocial media and health care provider
Social media and health care provider
 
Chapter 23
Chapter 23Chapter 23
Chapter 23
 
DOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptxDOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptx
 
Trust and Governance in Health and Social Care
Trust and Governance in Health and Social Care Trust and Governance in Health and Social Care
Trust and Governance in Health and Social Care
 
2013: The Connected Workplace
2013: The Connected Workplace2013: The Connected Workplace
2013: The Connected Workplace
 
Intergrating social media into healthcare systems practice nov 13 amsus v2 0 ...
Intergrating social media into healthcare systems practice nov 13 amsus v2 0 ...Intergrating social media into healthcare systems practice nov 13 amsus v2 0 ...
Intergrating social media into healthcare systems practice nov 13 amsus v2 0 ...
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
 
The issues of security and privacy in social network
The issues of security and privacy in social network The issues of security and privacy in social network
The issues of security and privacy in social network
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
 
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Mobility innovation and unknowns
Mobility innovation and unknownsMobility innovation and unknowns
Mobility innovation and unknowns
 
Giles Wilmore: How will the NHS Information Strategy support the new NHS?
Giles Wilmore: How will the NHS Information Strategy support the new NHS?Giles Wilmore: How will the NHS Information Strategy support the new NHS?
Giles Wilmore: How will the NHS Information Strategy support the new NHS?
 
Professional Choices
Professional ChoicesProfessional Choices
Professional Choices
 
Social Media and Patient Centric Design, Facilitating Provider-Patient Relati...
Social Media and Patient Centric Design, Facilitating Provider-Patient Relati...Social Media and Patient Centric Design, Facilitating Provider-Patient Relati...
Social Media and Patient Centric Design, Facilitating Provider-Patient Relati...
 
Drupal and the Future of Healthcare
Drupal and the Future of HealthcareDrupal and the Future of Healthcare
Drupal and the Future of Healthcare
 
Ethics of personalized information filtering
Ethics of personalized information filteringEthics of personalized information filtering
Ethics of personalized information filtering
 
Healthcare System Design
Healthcare System DesignHealthcare System Design
Healthcare System Design
 
Always Be Prepared: 5 Documents for Social Media Readiness
Always Be Prepared: 5 Documents for Social Media ReadinessAlways Be Prepared: 5 Documents for Social Media Readiness
Always Be Prepared: 5 Documents for Social Media Readiness
 
Statistics — Your Friend, Not Your Foe
Statistics — Your Friend, Not Your Foe Statistics — Your Friend, Not Your Foe
Statistics — Your Friend, Not Your Foe
 

Recently uploaded

Cell Therapy Expansion and Challenges in Autoimmune Disease
Cell Therapy Expansion and Challenges in Autoimmune DiseaseCell Therapy Expansion and Challenges in Autoimmune Disease
Cell Therapy Expansion and Challenges in Autoimmune Disease
Health Advances
 
Physical demands in sports - WCSPT Oslo 2024
Physical demands in sports - WCSPT Oslo 2024Physical demands in sports - WCSPT Oslo 2024
Physical demands in sports - WCSPT Oslo 2024
Torstein Dalen-Lorentsen
 
Ophthalmic drugs latest. Xxxxxxzxxxxxx.pdf
Ophthalmic drugs latest. Xxxxxxzxxxxxx.pdfOphthalmic drugs latest. Xxxxxxzxxxxxx.pdf
Ophthalmic drugs latest. Xxxxxxzxxxxxx.pdf
MuhammadMuneer49
 
CLEAR ALIGNER THERAPY IN ORTHODONTICS .pptx
CLEAR ALIGNER THERAPY IN ORTHODONTICS .pptxCLEAR ALIGNER THERAPY IN ORTHODONTICS .pptx
CLEAR ALIGNER THERAPY IN ORTHODONTICS .pptx
Government Dental College & Hospital Srinagar
 
Skin Diseases That Happen During Summer.
 Skin Diseases That Happen During Summer. Skin Diseases That Happen During Summer.
Skin Diseases That Happen During Summer.
Gokuldas Hospital
 
Medical Quiz ( Online Quiz for API Meet 2024 ).pdf
Medical Quiz ( Online Quiz for API Meet 2024 ).pdfMedical Quiz ( Online Quiz for API Meet 2024 ).pdf
Medical Quiz ( Online Quiz for API Meet 2024 ).pdf
Jim Jacob Roy
 
Cosmetology and Trichology Courses at Kosmoderma Academy PRP (Hair), DR Growt...
Cosmetology and Trichology Courses at Kosmoderma Academy PRP (Hair), DR Growt...Cosmetology and Trichology Courses at Kosmoderma Academy PRP (Hair), DR Growt...
Cosmetology and Trichology Courses at Kosmoderma Academy PRP (Hair), DR Growt...
Kosmoderma Academy Of Aesthetic Medicine
 
CHEMOTHERAPY_RDP_CHAPTER 3_ANTIFUNGAL AGENT.pdf
CHEMOTHERAPY_RDP_CHAPTER 3_ANTIFUNGAL AGENT.pdfCHEMOTHERAPY_RDP_CHAPTER 3_ANTIFUNGAL AGENT.pdf
CHEMOTHERAPY_RDP_CHAPTER 3_ANTIFUNGAL AGENT.pdf
rishi2789
 
DECLARATION OF HELSINKI - History and principles
DECLARATION OF HELSINKI - History and principlesDECLARATION OF HELSINKI - History and principles
DECLARATION OF HELSINKI - History and principles
anaghabharat01
 
How to choose the best dermatologists in Indore.
How to choose the best dermatologists in Indore.How to choose the best dermatologists in Indore.
How to choose the best dermatologists in Indore.
Gokuldas Hospital
 
Demystifying Fallopian Tube Blockage- Grading the Differences and Implication...
Demystifying Fallopian Tube Blockage- Grading the Differences and Implication...Demystifying Fallopian Tube Blockage- Grading the Differences and Implication...
Demystifying Fallopian Tube Blockage- Grading the Differences and Implication...
FFragrant
 
Artificial Intelligence Symposium (THAIS)
Artificial Intelligence Symposium (THAIS)Artificial Intelligence Symposium (THAIS)
Artificial Intelligence Symposium (THAIS)
Josep Vidal-Alaball
 
Know the difference between Endodontics and Orthodontics.
Know the difference between Endodontics and Orthodontics.Know the difference between Endodontics and Orthodontics.
Know the difference between Endodontics and Orthodontics.
Gokuldas Hospital
 
Ageing, the Elderly, Gerontology and Public Health
Ageing, the Elderly, Gerontology and Public HealthAgeing, the Elderly, Gerontology and Public Health
Ageing, the Elderly, Gerontology and Public Health
phuakl
 
10 Benefits an EPCR Software should Bring to EMS Organizations
10 Benefits an EPCR Software should Bring to EMS Organizations   10 Benefits an EPCR Software should Bring to EMS Organizations
10 Benefits an EPCR Software should Bring to EMS Organizations
Traumasoft LLC
 
CBL Seminar 2024_Preliminary Program.pdf
CBL Seminar 2024_Preliminary Program.pdfCBL Seminar 2024_Preliminary Program.pdf
CBL Seminar 2024_Preliminary Program.pdf
suvadeepdas911
 
K CỔ TỬ CUNG.pdf tự ghi chép, chữ hơi xấu
K CỔ TỬ CUNG.pdf tự ghi chép, chữ hơi xấuK CỔ TỬ CUNG.pdf tự ghi chép, chữ hơi xấu
K CỔ TỬ CUNG.pdf tự ghi chép, chữ hơi xấu
HongBiThi1
 
pharmacology for dummies free pdf download.pdf
pharmacology for dummies free pdf download.pdfpharmacology for dummies free pdf download.pdf
pharmacology for dummies free pdf download.pdf
KerlynIgnacio
 
CHEMOTHERAPY_RDP_CHAPTER 4_ANTI VIRAL DRUGS.pdf
CHEMOTHERAPY_RDP_CHAPTER 4_ANTI VIRAL DRUGS.pdfCHEMOTHERAPY_RDP_CHAPTER 4_ANTI VIRAL DRUGS.pdf
CHEMOTHERAPY_RDP_CHAPTER 4_ANTI VIRAL DRUGS.pdf
rishi2789
 
Pharmacology of 5-hydroxytryptamine and Antagonist
Pharmacology of 5-hydroxytryptamine and AntagonistPharmacology of 5-hydroxytryptamine and Antagonist
Pharmacology of 5-hydroxytryptamine and Antagonist
Dr. Nikhilkumar Sakle
 

Recently uploaded (20)

Cell Therapy Expansion and Challenges in Autoimmune Disease
Cell Therapy Expansion and Challenges in Autoimmune DiseaseCell Therapy Expansion and Challenges in Autoimmune Disease
Cell Therapy Expansion and Challenges in Autoimmune Disease
 
Physical demands in sports - WCSPT Oslo 2024
Physical demands in sports - WCSPT Oslo 2024Physical demands in sports - WCSPT Oslo 2024
Physical demands in sports - WCSPT Oslo 2024
 
Ophthalmic drugs latest. Xxxxxxzxxxxxx.pdf
Ophthalmic drugs latest. Xxxxxxzxxxxxx.pdfOphthalmic drugs latest. Xxxxxxzxxxxxx.pdf
Ophthalmic drugs latest. Xxxxxxzxxxxxx.pdf
 
CLEAR ALIGNER THERAPY IN ORTHODONTICS .pptx
CLEAR ALIGNER THERAPY IN ORTHODONTICS .pptxCLEAR ALIGNER THERAPY IN ORTHODONTICS .pptx
CLEAR ALIGNER THERAPY IN ORTHODONTICS .pptx
 
Skin Diseases That Happen During Summer.
 Skin Diseases That Happen During Summer. Skin Diseases That Happen During Summer.
Skin Diseases That Happen During Summer.
 
Medical Quiz ( Online Quiz for API Meet 2024 ).pdf
Medical Quiz ( Online Quiz for API Meet 2024 ).pdfMedical Quiz ( Online Quiz for API Meet 2024 ).pdf
Medical Quiz ( Online Quiz for API Meet 2024 ).pdf
 
Cosmetology and Trichology Courses at Kosmoderma Academy PRP (Hair), DR Growt...
Cosmetology and Trichology Courses at Kosmoderma Academy PRP (Hair), DR Growt...Cosmetology and Trichology Courses at Kosmoderma Academy PRP (Hair), DR Growt...
Cosmetology and Trichology Courses at Kosmoderma Academy PRP (Hair), DR Growt...
 
CHEMOTHERAPY_RDP_CHAPTER 3_ANTIFUNGAL AGENT.pdf
CHEMOTHERAPY_RDP_CHAPTER 3_ANTIFUNGAL AGENT.pdfCHEMOTHERAPY_RDP_CHAPTER 3_ANTIFUNGAL AGENT.pdf
CHEMOTHERAPY_RDP_CHAPTER 3_ANTIFUNGAL AGENT.pdf
 
DECLARATION OF HELSINKI - History and principles
DECLARATION OF HELSINKI - History and principlesDECLARATION OF HELSINKI - History and principles
DECLARATION OF HELSINKI - History and principles
 
How to choose the best dermatologists in Indore.
How to choose the best dermatologists in Indore.How to choose the best dermatologists in Indore.
How to choose the best dermatologists in Indore.
 
Demystifying Fallopian Tube Blockage- Grading the Differences and Implication...
Demystifying Fallopian Tube Blockage- Grading the Differences and Implication...Demystifying Fallopian Tube Blockage- Grading the Differences and Implication...
Demystifying Fallopian Tube Blockage- Grading the Differences and Implication...
 
Artificial Intelligence Symposium (THAIS)
Artificial Intelligence Symposium (THAIS)Artificial Intelligence Symposium (THAIS)
Artificial Intelligence Symposium (THAIS)
 
Know the difference between Endodontics and Orthodontics.
Know the difference between Endodontics and Orthodontics.Know the difference between Endodontics and Orthodontics.
Know the difference between Endodontics and Orthodontics.
 
Ageing, the Elderly, Gerontology and Public Health
Ageing, the Elderly, Gerontology and Public HealthAgeing, the Elderly, Gerontology and Public Health
Ageing, the Elderly, Gerontology and Public Health
 
10 Benefits an EPCR Software should Bring to EMS Organizations
10 Benefits an EPCR Software should Bring to EMS Organizations   10 Benefits an EPCR Software should Bring to EMS Organizations
10 Benefits an EPCR Software should Bring to EMS Organizations
 
CBL Seminar 2024_Preliminary Program.pdf
CBL Seminar 2024_Preliminary Program.pdfCBL Seminar 2024_Preliminary Program.pdf
CBL Seminar 2024_Preliminary Program.pdf
 
K CỔ TỬ CUNG.pdf tự ghi chép, chữ hơi xấu
K CỔ TỬ CUNG.pdf tự ghi chép, chữ hơi xấuK CỔ TỬ CUNG.pdf tự ghi chép, chữ hơi xấu
K CỔ TỬ CUNG.pdf tự ghi chép, chữ hơi xấu
 
pharmacology for dummies free pdf download.pdf
pharmacology for dummies free pdf download.pdfpharmacology for dummies free pdf download.pdf
pharmacology for dummies free pdf download.pdf
 
CHEMOTHERAPY_RDP_CHAPTER 4_ANTI VIRAL DRUGS.pdf
CHEMOTHERAPY_RDP_CHAPTER 4_ANTI VIRAL DRUGS.pdfCHEMOTHERAPY_RDP_CHAPTER 4_ANTI VIRAL DRUGS.pdf
CHEMOTHERAPY_RDP_CHAPTER 4_ANTI VIRAL DRUGS.pdf
 
Pharmacology of 5-hydroxytryptamine and Antagonist
Pharmacology of 5-hydroxytryptamine and AntagonistPharmacology of 5-hydroxytryptamine and Antagonist
Pharmacology of 5-hydroxytryptamine and Antagonist
 

Social Networks in Health Care - Talk at ICSE 2010

  • 1. Social Networking in Health Care Towards secure, privacy-preserving systems James Williams, BA, BSc, JD, Privacy Officer, Ontario Telemedicine Network. PhD candidate, University of Victoria.
  • 2. Goal This presentation is an introduction to an understudied area in health informatics. We will address the following issues: 1. What are social networking applications for health care? 2. What unique security and privacy issues exist? 3. What techniques can address them? 4. What remains to be done?
  • 3. OUTLINE Background •Basics of Social Networking (SN) applications. •Social Networking for Health Care •Examples Security/Privacy Issues •Issues with SN apps in general. •Unique features of the healthcare domain. •Current work. Future work.
  • 4. Basics of Social Networking The social web •The term ‘Web 2.0’ has been used to refer to internet architectures that permit content to be easily generated and published by users •Users are enabled to act both as readers and writers, generating content and creating a visible history of their activities. •Key notions include: •interpersonal networking, •personalization •individualism •empowerment
  • 5. Basics of Social Networking Online networks •First generation web applications like bulletin boards allowed users to communicate and collaborate. •Social networking (SN) applications expand upon Web 1.0 apps by: •providing a persistent, explicit and publically visible representation of social networks. •providing a variety of mechanisms by which users may organize themselves. (ie: groups) •incorporating privacy protection.
  • 6. Basics of Social Networks A social network involves: 1. A set of users, represented by individual user profiles. 2. A set of mechanisms for exchanging information, such as message boards, email, and wall posts. 3. A set of binary relationship types. 4. A set of search functions, to locate user profiles. 5. A site operator, who controls the site. •A social network is naturally represented as a dynamic graph in which an edge between two
  • 7. Basics of Social Networks Model of an SN .
  • 8. Social Networks in Health Care Rationale ‘Healthcare 2.0’ has been used to denote the use of social software, with an emphasis on its ability to promote collaboration between patients, caregivers and medical professionals. Patient empowerment may be a critical factor in achieving sustainability of the health care system. •Traditionally, the physician-patient relationship has exhibited a degree of information asymmetry. •SNAHC systems emphasize collaboration and independence. •User communities are springing up around ailments. •Active management may make patients more health conscious.
  • 9. Social Networks in Health Care Differences In the case of health care, we have more than one type of user: •Patients •Providers •Care givers •Support staff •Family members •Substitute decision makers.
  • 10. Social Networks in Health Care Examples: PHRs. Basic social networking features are found in personal health record (PHR) systems, including Google Health, Microsoft HealthVault, and Dossia. Google Health: •Allows users to store/manage PHI, including medical conditions, allergies and medication histories. •Users can search for information about medical conditions or adverse drug interactions. •Information in the health record can be shared. Users invite others to view their profile through email.
  • 11.
  • 12. Social Networks in Health Care Examples Microsoft Healthvault: •Platform that provides basic services for PHR and social networking products. •Vendors can build customized products on top of it. •Each individual owns his or her record. •Others can be granted access to it, if desired. •The mapping between records to users is many- many, allowing for substitute decision makers and other scenarios.
  • 13.
  • 14. Social Networks in Health Care Examples Healthy Circles •Patients can store emergency contacts, insurance plans, medications, immunizations, past procedures, test results, medical conditions, allergies and family histories •Users can enter basic health metrics and view reports. •Programs are interactive applications that typically require users to enter personal information in order to provide diagnoses or recommend treatment regimens or health management strategies. •users can purchase consultation or monitoring services from registered health care providers
  • 15. Social Networks in Health Care Examples Patients Like Me •Patients can store a wide array of information. •The site operator encourages users to share as much information as possible. •Pharmaceutical companies are partners, using the site as a repository for voluntarily contributed data on outcomes. •Uses a more advanced social networking model.
  • 16.
  • 17. Security / Privacy Issues in SN Awareness of Risk: Empirical studies show that users: •do value informational privacy. •typically do not change default settings. •are inclined to disclose information freely online. •often restrict their information only after breaches have occurred. •Users may lack a method for assessing risks in social networks. Social cues are missing. •They may also be unaware of the mechanisms for reducing risk.
  • 18. Security / Privacy Issues in SN Ease of Network Formation: •An individual’s online social network tends to be more expansive, (containing more weak ties), than the same individual’s offline network •users often misjudge the extent, activity and accessibility of their online social networks Complex Workflows: •In general, social networking applications offer complex, many-to-many communications mechanisms. •The workflows are not easy to grasp, which makes
  • 19. Security / Privacy Issues in SN Trust: •Attackers may create fake profiles, and site operators may not follow their privacy policies. •Trust is a ‘social glue’ in a SN system. Data Lifecycle: •Users have little knowledge about retention periods, backups, and the like. •Information posted on a SN may have ramifications for the user.
  • 20. Security / Privacy Issues in SN Unauthorized Uses and Disclosures: •Site operators may use or disclose the data. •As an example, SN operators report increased demands for bulk data from governments. Leakage to Applications: •Applications typically draw data from the system in order to deliver personalized experiences. •In many early architectures, they could retrieve quite a lot of information, including information about one’s friends.
  • 21. Security / Privacy Issues in SN Aggregation by Third Parties: •Third parties (ie: ad servers) can receive personal information. •Since 70% of the market is controlled by a small number of firms, these companies are in a position to aggregate data from various sources. •Users typically are not aware that disclosures on one site may be linked to disclosures on another site.
  • 22. Security / Privacy Issues in SN Complex Privacy Policies: •Because of the complex user scenarios, privacy policies for SN systems tend to be complex. •Studies indicate that some are inaccessible to users. •Enforcement is more difficult. Unlike ecommerce, a user may see another’s activities. •Market lacks competition for comprehensible privacy policies. •There are few methods for negotiating policies on a user’s behalf.
  • 23. Security / Privacy Issues in SN Sunken Costs: •In Ecommerce, it is fairly easy to switch service providers. •In SN settings, the costs associated with switching providers are fairly severe. •Users may stay with an insecure and non-private system. Shared Content: •Shared content creates privacy risks for users, since information may be linked to their profile without consent or knowledge
  • 24. Features of the Heath Domain Sensitivity of Information: •Tends to be very high, and protected by law. Motivated Data Recipients: •Employers, insurers, researchers. Secondary Damage: •Since many serious health concerns are genetically based, information about an individual can convey information about a family member.
  • 25. Features of the Heath Domain Community Interests: •Individuals sharing information on health trends can, if their submissions are aggregated, reveal information about the health issues affecting groups. Motivated Data Recipients: •Employers, insurers, researchers. Signaling: •The mere act of making an inquiry about a condition can be a signal that the individual in question has the condition. The same is true of an individual’s
  • 26. Features of the Heath Domain Compensability: •Difficult to value PHI. •Indemnification and compensation is much more difficult. Dynamic Networks: •Health teams form around episodes. •They are ephemeral.
  • 27. What can we do (as software engineers, developers and systems architects) to alleviate some of these issues?
  • 28. Current Work Securing the Framework Restrict information flowing to apps: •Privacy by Proxy. •User-to-application policies. New Access Models: •‘proof’ to access particular resources. •Social Access Control List. • Walk through trusted nodes in the network structure.
  • 29. Current Work Securing the Framework Anonymizing Users •Use encryption and various key exchange mechanisms. •FlybyNight: uses client side javascript. •Respondent k-anonymity. •Fake data. •NOYB: map operations on fake data back to real data. Avoid ciphertext. Replace values pseudonoymously from a dictionary. Keys distributed out of band. Only works for small # of users. •FaceCloak: another approach using dictionary
  • 30. Current Work Dealing with Extracts •Social network data can be extracted for processing or data mining. •Attacker may have background information, including knowledge of certain properties of the network. •Most of the techniques are based on anonymization. •Tabular algorithms don’t work well with network data. •Need to know privacy risk model, background knowledge, and intended use of data. •Two camps: 1. Clustering based.
  • 31. Future Work Improved Privacy Controls: •Current social network applications allow the construction of hierarchies, including groups. •We need efficient, concise and usable controls for this. •Taking advantage of automation or group knowledge: •Agents •Automatically assigning trust to users/resources. •Heuristics (weighting), voting, reputation mechanisms. •Better user interfaces for privacy control
  • 32. Future Work Network Visualization Tools: •Some of the uncertainty surrounding privacy risks could be dispelled if users were able to visualize their networks. • To this end, user interfaces for displaying a user’s profile accessibility would be highly useful •increase the utilization of privacy options by clear representations of social networks, friend proximity, and availability of profile features.
  • 33. Future Work Detecting Attacks: •Future software architectures for health care could include facilities to discourage or detect common attacks. •For instance, prototypes could be developed that scan for fake user profiles •Also, search functionality can serve as a form of querying that can reveal both user identities and protected user information. •Find heuristic approaches for limiting queries.
  • 34. Future Work Security in the Architecture: •We need to do further work on secure architectures, along the lines of the efforts we have discussed above. •In particular, we should develop architectures that: •Work for all users (not just a subset) •Provide anonymity against the platform. •Make it easy to exchange keys.
  • 35. Future Work Shared Content Management: •We need mechanisms for assigning permissions to shared content. •This is particularly relevant in the health domain, where secondary disclosures may cause information to be revealed about the health of family members.
  • 36. Future Work Policy Negotiation and Representation: •Continue the development of tools and languages for representing policies. •Many privacy policy tools were developed with a single organization’s behaviour in mind. We also need tools for data exchange. •Methods for evaluating formal requirements in the context of policies would be highly useful.