Social networking applications in health care: threats to the privacy and security of health information

The advent of social networking websites for use in health care has prompted concerns about the risks that such systems pose to the security and privacy of personal health information. In this paper, we survey the research literature, in order to provide a current snapshot of privacy and security safeguards for social network websites. We describe some of the unique features of the health care space, and recommend directions for future research in this relatively new area.

[1]  Nabil R. Adam,et al.  Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..

[2]  Balachander Krishnamurthy,et al.  Key differences between Web 1.0 and Web 2.0 , 2008, First Monday.

[3]  Barbara Carminati,et al.  Private Relationships in Social Networks , 2007, 2007 IEEE 23rd International Conference on Data Engineering Workshop.

[4]  Maged N Kamel Boulos,et al.  The emerging Web 2.0 social software: an enabling suite of sociable technologies in health and health care education. , 2007, Health information and libraries journal.

[5]  Manfred Tscheligi,et al.  How much do you tell?: information disclosure behaviour indifferent types of online communities , 2009, C&T.

[6]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[7]  D. Flaherty Protecting privacy in surveillance societies: the federal republic of germany , 1989 .

[8]  Heather Richter Lipford,et al.  Strategies and struggles with privacy in an online social networking community , 2008, BCS HCI.

[9]  Jordi Nin,et al.  Privacy and anonymization for very large datasets , 2009, CIKM.

[10]  Alec Wolman,et al.  A Social Networking-Based Access Control Scheme for Personal Content , 2007 .

[11]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .

[12]  Mohamed Shehab,et al.  Social applications: exploring a more secure framework , 2009, SOUPS.

[13]  Jessica Staddon Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy , 2009, AISec '09.

[14]  Hausi A. Müller,et al.  Policy and Legal Challenges of VirtualWorlds and Social Network Sites , 2008, 2008 Requirements Engineering and Law.

[15]  Andrew S. Tanenbaum,et al.  Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System , 2004, Security Protocols Workshop.

[16]  Bruce Morton,et al.  Protecting privacy in surveillance societies: The Federal Republic of Germany, Sweden, France, Canada, and the United States , 1990 .

[17]  Qi Xie,et al.  FaceCloak: An Architecture for User Privacy on Social Networking Sites , 2009, 2009 International Conference on Computational Science and Engineering.

[18]  Qing Zhang,et al.  Anonymizing bipartite graph data using safe groupings , 2008, The VLDB Journal.

[19]  Huan Liu,et al.  Trust evaluation in health information on the World Wide Web , 2008, 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[20]  Kate Raynes-Goldie,et al.  Aliases, Creeping, and Wall Cleaning: Understanding Privacy in the Age of Facebook , 2010, First Monday.

[21]  Nikita Borisov,et al.  FlyByNight: mitigating the privacy risks of social networking , 2008, WPES '08.

[22]  Jian Pei,et al.  A brief survey on anonymization techniques for privacy preserving publishing of social network data , 2008, SKDD.

[23]  Aris Gkoulalas-Divanis,et al.  Privacy challenges and solutions in the social web , 2009, ACM Crossroads.

[24]  Bruno Crispo,et al.  Anonymous opinion exchange over untrusted social networks , 2009, SNS '09.

[25]  A. Felt Privacy Protection for Social Networking APIs , 2008 .

[26]  Oded Nov,et al.  Social computing privacy concerns: antecedents and effects , 2009, CHI.

[27]  F Johnson,et al.  Personal health record , 1988, Medical Journal of Australia.

[28]  Weider D. Yu,et al.  Towards a Wireless Mobile Social Network System Design in Healthcare , 2009, 2009 Third International Conference on Multimedia and Ubiquitous Engineering.

[29]  Saikat Guha,et al.  NOYB: privacy in online social networks , 2008, WOSN '08.

[30]  Anna Cinzia Squicciarini,et al.  WWW 2009 MADRID! Track: Security and Privacy / Session: Web Privacy Collective Privacy Management in Social Networks , 2022 .

[31]  Balachander Krishnamurthy,et al.  WWW 2009 MADRID! Track: Security and Privacy / Session: Web Privacy Privacy Diffusion on the Web: A Longitudinal Perspective , 2022 .

[32]  Barbara Carminati,et al.  Privacy-Aware Collaborative Access Control in Web-Based Social Networks , 2008, DBSec.

[33]  Balachander Krishnamurthy,et al.  On the leakage of personally identifiable information via online social networks , 2009, CCRV.

[34]  David S. Rosenblum,et al.  What Anyone Can Know: The Privacy Risks of Social Networking Sites , 2007, IEEE Security & Privacy.

[35]  Anabel Quan-Haase,et al.  Information revelation and internet privacy concerns on social network sites: a case study of facebook , 2009, C&T.

[36]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[37]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[38]  Balachander Krishnamurthy,et al.  Characterizing privacy in online social networks , 2008, WOSN '08.