Health Information Databases: High Potential or Privacy Concerns?

21

October

2017

No ratings yet.

Recent trends have emerged in digitising increasingly larger amounts of information. With the ever-growing senescence of the world population, the demand of elderly care has experienced a steep rise and is expected to grow even further. (Schumacher 2017) This higher demand has led to an increased number of burnouts reports by care staff and on top of that, governments have announced budget cuts and savings in decreased subsidies (Voskuil 2014, Stam 2010). Therefore, measures have been taken in digitising health information in order to increase efficiency (Het Digitale Landschap 2016).

Blog2med2

Despite the significant benefits associated with health information databases, however, potential threats to privacy could arise that should be considered. Regarding security issues, there are many risks associated with sensitive information storages that are highly volatile to burglary, hacks and abuse. Leaking such data involves unprecedented negative consequences. (Johnson et al. 2004) Even though most citizens would allow health organisations to use their sensitive information fostering medical research and preventing diseases, the majority would most likely only agree with limited, exclusive access to such medical organisations. Nonetheless, there are many other third parties that would be interested in analysing the health surveillance data.

This problem comprises privacy as contextual integrity, which is defined as the “adequate protection for privacy to norms of specific contexts, demanding that information gathering and dissemination to be appropriate to that context and obey the governing norms of distribution within it” (Nissenbaum, 2004, p. 101). Failing such separation of spheres would involve exposing citizens to considerable dangers. Starting within the medical world itself, health insurance companies could potentially exploit the sensitive information derived from the DNA samples by discriminating prices between high-risk and low-risk patients. Moving outside the medical world, many examples could be provided of other interested parties that could harm privacy rights. For example, employers could act unethically by avoid hiring employees with high risks of diseases. Furthermore, law enforcement would have a high stake in using the health information for solving its own cases by scanning DNA found at a crime scene against the health surveillance database. Although sometimes well intended (e.g. solving criminal cases), police and other institutions violate a person’s right of privacy established in laws and constitutions.

However, there are several ways to offset these confidentiality and security risks. Firstly, DNA samples could be destroyed after being analysed and converted into DNA profiles, thereby eliminating risks of theft since the actual physical sample itself does no longer exist. Moreover, another solution encompasses a role‑based access control model which assigns ‘read/write’ or ‘read only’ privileges to authorised people only. To enable its operationalisation, modern security technologies could be employed. One way to ensure data security and to prevent eavesdropping can be achieved through encryption, which transforms sensitive information into cipher text using a code or formula. (Meingast, Roosta, Sastry, 2006) This way, the data becomes unreadable for outsiders while only granting access to those who have a ‘key’ – a code that unlocks encryption. More specifically, public key encryption could be used to secure electronic transmissions considering today’s digitising and globalising world. This system relies on two keys: a public key and a private key, the latter to be held only by certificate authorities. By implementing encryption systems, the impact of hacks and brute-force attacks could be reduced close to zero as the scrambled data codes hide the content from unauthorised third parties. (Coppersmith, 1994)

Blog2med3

Furthermore, authentication mechanisms can be employed to ensure the data is coming from or sent to the person/entity it is claiming to be (Meingast, Roosta, Sastry, 2006). Multi-factor authentication could be used to require users to present more than one item to prove credentials. In addition, biometrics could be employed to authenticate users by analysing a person’s human body. (Jain, Bolle, Pankanti, 2006) Finally, laws and regulations should be developed to ensure data safety and privacy. For example, the existing Dutch law of DNA Testing Convicted Persons Act states that law enforcement is only allowed to use DNA samples of citizens that have committed a criminal offence (Openbaar Ministerie 2015). International guidelines should be designed and expanded in the same matter based on fair principles that respect citizen’s privacy.

References

Canetti, R., Halevi, S., & Katz, J. (2003, May). A forward-secure public-key encryption scheme. In International Conference on the Theory and Applications of Cryptographic Techniques (pp. 255-271). Springer Berlin Heidelberg.

Coppersmith, D. (1994). The Data Encryption Standard (DES) and its strength against attacks. IBM journal of research and development, 38(3), 243-250.

Het Digitale Landschap 2016, Onderzoeksrapport digitale landschap zorg 2016, Het Digitale Landschap, viewed 14 September 2017, <https://hetdigitalelandschap.nl/zorg/onderzoeksrapport-digitale-landschap-zorg-2016/#download>.

Jain, A., Bolle, R., & Pankanti, S. (Eds.). (2006). Biometrics: personal identification in networked society (Vol. 479). Springer Science & Business Media.

Johnson, P, Martin P, Williams R 2004, Genetic information and crime investigation: social, ethical and public policy aspects of the establishment, expansion and police use of the National DNA Database, Durham University, Durham

Meingast, M., Roosta, T., & Sastry, S. (2006, August). Security and privacy issues with health care information technology. In Engineering in Medicine and Biology Society, 2006. EMBS’06. 28th Annual International Conference of the IEEE (pp. 5453-5458). IEEE.

Nissenbaum, H. (2004). Privacy as contextual integrity. Wash. L. Rev., 79, 119.

Openbaar Ministerie. (2015). DNA Testing Convicted Persons Act. The Hague: Public Prosecution Service. Communication Department.

Schumacher (2017). Cijfers: Vergrijzing en toenemende zorg. Zorg voor Beter.

Voskuil (2014) Zorgpersoneel: verwaarlozing ouderen structureel probleem. Algemeen Daglblad

Please rate this

How to Become Instagram Famous

20

October

2017

5/5 (1)

Over the past years, Instagram has become increasingly more popular with its ever-growing number of users. It has only been a little over five years ago since Kevin Systrom – the founder of Instagram – had agreed to sell his company to Mark Zuckerberg – founder of that other big social media platform: Facebook – for an astonishing amount of $1 billion of both cash and stock. At that time of the deal, Instagram had an active user base of 30 million people. This past April however, Facebook announced that Instagram had grown to an extraordinary amount of 700 million monthly active users. (Jackson 2017) By integrating the two social platforms and adding Instagram as a complement, Facebook will be able to exploit network effects and expend its overall user base. (Eisenmann 2009)

 

Therefore, it has become prevalent that companies are willing to invest large sums of money in Instagram marketing campaigns in order to reach the social media’s network large audience. To illustrate: the top celebrities in terms of Instagram earnings are estimated to be around £425,000, £387,000 and £310,000 per Instagram post by Selena Gomez, Kim Kardashian and Cristiano Ronaldo respectively. (Burnip 2017) However, a trend has emerged of so-called ‘influencers’, referring to people who can have a great impact on a large number of potential buyers. The interesting part is that companies do not only focus on celebrities anymore, but nowadays the-girl-next-door could become the next Instagram it-girl.

Screen Shot 2017-10-20 at 23.10.50

This business has proven to be highly lucrative: earnings for a ‘mid-level influencer’, which implies a follower base between 2,500-25,000, are estimated to be around $200-$500 per post. Moreover, influencers can also get many products for free in change for a post promoting that product in a so-called affiliate marketing strategy. This can take many forms: luxury brands provide influencers with their latest hot items while hotels can even provide an influencer with its master suite room. Since everyone is interest in getting a piece of the pie, this has lured many people into Instagram’s profitable industry.

 

However, recent studies have shown that many of these self-claimed influencers are actually fakes: many of their users consist of manufactured, automatic bots. Even more so, a large share of the activity has found to be inauthentic, consisting of bought likes and positive comments to boost posts. (Maheshwari 2017) A whole new business has risen in providing these followers, comments and likes against a price with suppliers mostly operating in Russia, Ukraine and India. These suppliers create ten thousand fake accounts at once and provide customers with likes and some positive comments. They operate through forum such as BlackHatWorld, where all all kinds of internet experts try to generate revenue with their online operations. (van Niekerk & de Graaf 2017) Instagram has already tried taking measures against these detrimental activities, it is facing challenges in dealing with accounts that are manufactured altogether. In 2014, the social media platform has deleted millions of fake users, which is known as the ‘Instagram Rapture’. Nevertheless, these automation services keep posing a real threat evading detection by simply mimicking what real people would do. Furthermore, these services are offered for prices lower than paid ads. (Maheshwari 2017)

Screen Shot 2017-10-20 at 23.07.49

These services allow people like yourself to grow a large user base and generate many likes and comments against a nice price. To illustrate, a Dutch news provider paid $30 in order to get 2000 followers and around 250 likes and 30 comments for their alpaca account in an experiment. (van Niekerk & de Graaf 2017) So the secret is out: you can simply buy your way into your Instagram fame career, at least until Instagram bashes your fake follower base.

 

 

Bibliography

 

Burnip, L 2017, ‘Cristiano Ronaldo earns £310,000 per Instagram post placing him third on the social network’s list of top ten influencers’, The Sun UK, 5 July, viewed 6 October, <https://www.thesun.co.uk/news/3956497/cristiano-ronaldo-instagram-earnings-per-post-ranking-influencers/>.

 

Eisenmann, T, Parker, G, and Van Alstyne, M.W. 2009, ‘Opening Platforms: How, When and Why?’ in Platforms, Markets and Innovation, Gawer, A. (ed.), Northampton, MA: Edward Elgar, 131-162.

 

Influencer Marketing Hub 2017, ‘Instagram influencer sponsored post money calculator’, Influencer Marketing Hub, viewed 20 October 2017, <https://influencermarketinghub.com/instagram-money-calculator/>.

 

Jackson, E 2017, ‘How much would Facebook be worth today if it hadn’t bought Instagram?’, Forbes, 30 April, viewed 5 October 2017, <https://www.forbes.com/sites/ericjackson/2017/04/30/how-much-would-facebook-be-worth-today-if-it-hadnt-bought-instagram/#91ec9209d77b>.

 

Maheshwari, S 2017, ‘How bots are inflating Instagram egos’, The New York Times, 6 June, viewed 5 October 2017, <https://www.nytimes.com/2017/06/06/business/media/instagram-bots.html>.

 

van Niekerk, R, de Graaf, I 2017, ‘Instagram: wereld van gekochte volgers, neplikes an likebotes’ Nederlandse Omroep Stichting, 23 September, viewed 5 October 2017, <https://nos.nl/op3/artikel/2194372-instagram-wereld-van-gekochte-volgers-neplikes-en-likebots.html>.

Please rate this