Towards a contextual theory of Mobile Health Data Protection (MHDP): A realist perspective

BACKGROUND With the introduction of privacy regulations such as the California Consumer Privacy Act and the European Union General Data Protection Regulation (GDPR), effective data protection in mobile health (mHealth) is rapidly becoming a concern. However, we have a limited understanding of the contexts and mechanisms that affect the likelihood of failures and successes in mHealth data protection, and their subsequent impacts. In this review and theory development paper, we aim to address this critical knowledge gap. METHOD We conducted a systematic literature search using PubMed, Embase, and Scopus databases. To synthesize the evidence, we adopted a realist review approach and compiled the extracted information based on context-mechanism-outcome (CMO) configurations. Out of an initial set of 611 records, 19 articles met the eligibility criteria and were included. RESULTS Our findings indicate that the failures and successes in data protection and their impacts (effective mHealth interventions, data protection awareness, and adoption/use of mHealth systems) depend contingently upon a number of contextual factors (systems, users, tasks, services, geographic elements) and causal mechanisms (unauthorized access, device theft, loss, and sharing, lack of cyber-hygiene, and data protection concerns for failures, and trust building activity, secure and law compliant platforms, and perceived data protection, for successes). We conceptualized the CMO configurations to provide explanations for the reported failures and successes in data protection. CONCLUSION For effective mHealth interventions, the dark side of system use (data breaches) must be mitigated and remediated. Our study offers a theoretical model that contextually explains how the mechanisms of success and failures work in mHealth.

[1]  Line Dubé,et al.  Rigor in Information Systems Positivist Case Research: Current Practices , 2003, MIS Q..

[2]  Shintaro Okazaki,et al.  Factors Affecting Mobile Diabetes Monitoring Adoption Among Physicians: Questionnaire Study and Path Model , 2012, Journal of medical Internet research.

[3]  K. Berry,et al.  Early Psychosis Service User Views on Digital Technology: Qualitative Analysis , 2018, JMIR mental health.

[4]  Amira A. Roess,et al.  The Promise, Growth, and Reality of Mobile Health - Another Data-free Zone. , 2017, The New England journal of medicine.

[5]  C. Bradley,et al.  Use of text messaging in general practice: a mixed methods investigation on GPs' and patients' views. , 2017, The British journal of general practice : the journal of the Royal College of General Practitioners.

[6]  Voula Gkatzidou,et al.  User interface design for mobile-based sexual health interventions for young people: Design recommendations from a qualitative study on an online Chlamydia clinical care pathway , 2015, BMC Medical Informatics and Decision Making.

[7]  J. Lam,et al.  Health Insurance Portability and Accountability Act Noncompliance in Patient Photograph Management in Plastic Surgery , 2019, Annals of plastic surgery.

[8]  Liwei Chen,et al.  Mobile Health (mHealth) Channel Preference: An Integrated Perspective of Approach-Avoidance Beliefs and Regulatory Focus , 2019, J. Assoc. Inf. Syst..

[9]  Ray Pawson,et al.  The Science of Evaluation: A Realist Manifesto , 2013 .

[10]  M. C. Roberts,et al.  Critical incidents in the marriage of psychology and technology: A discussion of potential ethical issues in practice, education, and policy. , 2011 .

[11]  N. King,et al.  The Utility of Template Analysis in Qualitative Psychology Research , 2014, Qualitative research in psychology.

[12]  Z. Daruwalla,et al.  The Application of Telemedicine in Orthopedic Surgery in Singapore: A Pilot Study on a Secure, Mobile Telehealth Application and Messaging Platform , 2014, JMIR mHealth and uHealth.

[13]  Harris Cooper,et al.  Research Synthesis and Meta-Analysis: A Step-by-Step Approach , 2009 .

[14]  J. Jagosh,et al.  A realist review of shared medical appointments: How, for whom, and under what circumstances do they work? , 2017, BMC Health Services Research.

[15]  Elfi Furtmueller,et al.  Using grounded theory as a method for rigorously reviewing literature , 2013, Eur. J. Inf. Syst..

[16]  Trisha Greenhalgh,et al.  What works for whom in pharmacist-led smoking cessation support: realist review , 2016, BMC Medicine.

[17]  Ritu Agarwal,et al.  The Digital Transformation of Healthcare: Current Status and the Road Ahead , 2010 .

[18]  K. Lewin Psychology and the Process of Group Living , 1943 .

[19]  Quentin Eichbaum,et al.  Exploring the patterns of use and the feasibility of using cellular phones for clinic appointment reminders and adherence messages in an antiretroviral treatment clinic, Durban, South Africa. , 2010, AIDS patient care and STDs.

[20]  O. Muensterer,et al.  Google Glass in pediatric surgery: an exploratory study. , 2014, International journal of surgery.

[21]  Stylianos Kavadias,et al.  Digital Transformation and Disruption of the Health Care Sector: Internet-Based Observational Study , 2018, Journal of medical Internet research.

[22]  John Robert Bautista,et al.  Influence of Organizational Issues on Nurse Administrators’ Support to Staff Nurses’ Use of Smartphones for Work Purposes in the Philippines: Focus Group Study , 2020, JMIR nursing.

[23]  Joanne Greenhalgh,et al.  What’s in a mechanism? Development of a key concept in realist evaluation , 2015, Implementation Science.

[24]  G. Johns The Essential Impact of Context on Organizational Behavior , 2006 .

[25]  Kevin G. Corley,et al.  Seeking Qualitative Rigor in Inductive Research , 2013 .

[26]  Trisha Greenhalgh,et al.  Internet-based medical education: a realist review of what works, for whom and in what circumstances , 2010, BMC medical education.

[27]  Guy Paré,et al.  A Framework for Guiding and Evaluating Literature Reviews , 2015, Commun. Assoc. Inf. Syst..

[28]  Juhee Kwon,et al.  Proactive Versus Reactive Security Investments in the Healthcare Sector , 2014, MIS Q..

[29]  Trisha T. C. Lin,et al.  Sociotechnical analysis of nurses' use of personal mobile phones at work , 2016, Int. J. Medical Informatics.

[30]  Robert E. Crossler,et al.  Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..

[31]  Josip Car,et al.  Unaddressed privacy risks in accredited health and wellness apps: a cross-sectional systematic assessment , 2015, BMC Medicine.

[32]  D. Constant,et al.  Exploring the feasibility of using mobile phones to improve the management of clients with cervical cancer precursor lesions , 2019, BMC Women's Health.

[33]  Kendall Ho,et al.  Clinical Texting Among Medical Trainees of the University of British Columbia , 2018, Journal of cutaneous medicine and surgery.

[34]  Maurice Mars,et al.  Ethical considerations of mobile phone use by patients in KwaZulu-Natal: Obstacles for mHealth? , 2014, African journal of primary health care & family medicine.

[35]  Taylor Hardin,et al.  Blockchain in Health Data Systems: A Survey , 2019, 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS).

[36]  Gurpreet Dhillon,et al.  A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research , 2014, Inf. Syst. Res..

[37]  Marlies P Schijven,et al.  Advantages of mobile health in the management of adult patients with congenital heart disease , 2019, Int. J. Medical Informatics.

[38]  Ida Sim,et al.  Mobile Devices and Health. , 2019, The New England journal of medicine.

[39]  Ron Weber,et al.  Evaluating and Developing Theories in the Information Systems Discipline , 2012, J. Assoc. Inf. Syst..

[40]  Ali Sunyaev,et al.  Availability and quality of mobile health app privacy policies , 2015, J. Am. Medical Informatics Assoc..

[41]  Jo Durham,et al.  Explaining how unexploded ordnance clearance enhances livelihoods in the Lao PDR. , 2016, Evaluation and program planning.

[42]  Ralph Holz,et al.  Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis , 2019, BMJ.

[43]  J. Elhai,et al.  How secure is mental health providers' electronic patient communication? An empirical investigation , 2015 .

[44]  F. Baiden,et al.  Using community pharmacies to expand access to screening for noncommunicable diseases in suburban Ghana—A facility‐based survey on client needs and acceptability , 2018, Health science reports.

[45]  Marie-Pierre Gagnon,et al.  m-Health adoption by healthcare professionals: a systematic review , 2016, J. Am. Medical Informatics Assoc..

[46]  Shelley Lees,et al.  Acceptability, Usability, and Views on Deployment of Peek, a Mobile Phone mHealth Intervention for Eye Care in Kenya: Qualitative Study , 2016, JMIR mHealth and uHealth.

[47]  Kim-Kwang Raymond Choo,et al.  Blockchain in healthcare applications: Research challenges and opportunities , 2019, J. Netw. Comput. Appl..

[48]  Urs-Vito Albrecht,et al.  Mobile Technologies: Expectancy, Usage, and Acceptance of Clinical Staff and Patients at a University Medical Center , 2014, JMIR mHealth and uHealth.

[49]  J. Jagosh Realist Synthesis for Public Health: Building an Ontologically Deep Understanding of How Programs Work, For Whom, and In Which Contexts. , 2019, Annual review of public health.

[50]  Uma Kumar,et al.  Predicting mobile health adoption behaviour: A demand side perspective , 2014 .