Submitted:
18 September 2024
Posted:
19 September 2024
You are already at the latest version
Abstract
Keywords:
Introduction
Results
How Devices Collect and Transmit Data
How Data Are Used
Who Owns PGDH?
Looking Ahead: When AI Met PGHD
Patients’ Perceptions of Data Privacy
Health Literacy of Patients on Wearable Privacy
Clinical Considerations
Can Clinicians Make Things Better?
Discussion
Conclusions
Author Contributions
Funding
Ethics
Acknowledgments
References
- Lu, L.; Zhang, J.; Xie, Y.; et al. Wearable Health Devices in Health Care: Narrative Systematic Review. JMIR Mhealth Uhealth. 2020, 8, e18907. [Google Scholar] [CrossRef] [PubMed]
- Future Market Insights. Wearable fitness technology market snapshot (2023 to 2033). Future Market Insights,. Accessed August 9, 2024. https://www.futuremarketinsights.com/reports/wearable-fitness-technology-market#:~:text=Future%20Market%20Insights%20%28FMI%29%20projects%20the%20wearable%20fitness,contributed%20to%20the%20demand%20for%20wearable%20fitness%20devices.
- Loncar-Turukalo, T.; Zdravevski, E.; Machado da Silva, J.; Chouvarda, I.; Trajkovik, V. Literature on Wearable Technology for Connected Health: Scoping Review of Research Trends, Advances, and Barriers. J Med Internet Res. 2019, 21, e14017. [Google Scholar] [CrossRef] [PubMed]
- Kang, H.S.; Exworthy, M. Wearing the Future-Wearables to Empower Users to Take Greater Responsibility for Their Health and Care: Scoping Review. JMIR Mhealth Uhealth. 2022, 10, e35684. [Google Scholar] [CrossRef] [PubMed]
- Kreitmair, K.V. Mobile health technology and empowerment. Bioethics. 2024, 38, 481–490. [Google Scholar] [CrossRef] [PubMed]
- Esmaeili, B.; Vieluf, S.; Dworetzky, B.A.; Reinsberger, C. The Potential of Wearable Devices and Mobile Health Applications in the Evaluation and Treatment of Epilepsy. Neurol Clin. 2022, 40, 729–739. [Google Scholar] [CrossRef] [PubMed]
- Hansen, C.; Sanchez-Ferro, A.; Maetzler, W. How Mobile Health Technology and Electronic Health Records Will Change Care of Patients with Parkinson's Disease. J Parkinsons Dis. 2018, 8, S41–s45. [Google Scholar] [CrossRef] [PubMed]
- Gyselaers, W.; Lanssens, D.; Perry, H.; Khalil, A. Mobile Health Applications for Prenatal Assessment and Monitoring. Curr Pharm Des. 2019, 25, 615–623. [Google Scholar] [CrossRef] [PubMed]
- Rabinovich, L.; Molton, J.S.; Ooi, W.T.; Paton, N.I.; Batra, S.; Yoong, J. Perceptions and Acceptability of Digital Interventions Among Tuberculosis Patients in Cambodia: Qualitative Study of Video-Based Directly Observed Therapy. J Med Internet Res. 2020, 22, e16856. [Google Scholar] [CrossRef] [PubMed]
- Yuan, N.P.; Brooks, A.J.; Burke, M.K.; et al. My Wellness Coach: evaluation of a mobile app designed to promote integrative health among underserved populations. Transl Behav Med. 2022, 12, 752–760. [Google Scholar] [CrossRef]
- Zheng, Y.L.; Ding, X.R.; Poon, C.C.; et al. Unobtrusive sensing and wearable devices for health informatics. IEEE Trans Biomed Eng. 2014, 61, 1538–1554. [Google Scholar] [CrossRef]
- Yetisen, A.K.; Martinez-Hurtado, J.L.; Ünal, B.; Khademhosseini, A.; Butt, H. Wearables in Medicine. Adv Mater. 2018, 30, e1706910. [Google Scholar] [CrossRef]
- Khatiwada, P.; Yang, B.; Lin, J.C.; Blobel, B. Patient-Generated Health Data (PGHD): Understanding, Requirements, Challenges, and Existing Techniques for Data Security and Privacy. J Pers Med. 2024, 14. [Google Scholar] [CrossRef] [PubMed]
- Wen, D.; Zhang, X.; Lei, J. Consumers' perceived attitudes to wearable devices in health monitoring in China: A survey study. Comput Methods Programs Biomed. 2017, 140, 131–137. [Google Scholar] [CrossRef]
- Seneviratne, S.; Hu, Y.; Nguyen, T.; et al. A Survey of Wearable Devices and Challenges. IEEE Communications Surveys & Tutorials. 2017, 19, 2573–2620. [Google Scholar]
- Filkins, B.L.; Kim, J.Y.; Roberts, B.; et al. Privacy and security in the era of digital health: what should translational researchers know and do about it? Am J Transl Res. 2016, 8, 1560–1580. [Google Scholar] [PubMed]
- Silva-Trujillo, A.G.; González González, M.J.; Rocha Pérez, L.P.; García Villalba, L.J. Cybersecurity Analysis of Wearable Devices: Smartwatches Passive Attack. Sensors (Basel). 2023, 23. [Google Scholar] [CrossRef] [PubMed]
- Cuningkin, V.; Riley, E.; Rainey, L. Preventing Medjacking. Am J Nurs. 2021, 121, 46–50. [Google Scholar] [CrossRef]
- Cilliers, L. Wearable devices in healthcare: Privacy and information security issues. Health Inf Manag. 2020, 49, 150–156. [Google Scholar] [CrossRef] [PubMed]
- Statista. Annual number of data compromises and individuals impacted in the United States from 2005 to 2023. Statista. Accessed August 12, 2024. https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/.
- Huckvale, K.; Prieto, J.T.; Tilney, M.; Benghozi, P.J.; Car, J. Unaddressed privacy risks in accredited health and wellness apps: a cross-sectional systematic assessment. BMC Med. 2015, 13, 214. [Google Scholar] [CrossRef]
- Mukhopadhyay, A. How India's loose data privacy laws open the door to hackers. DW. Accessed August 8, 2024. https://www.dw.com/en/how-indias-loose-data-privacy-laws-open-the-door-to-hackers/a-53120972.
- Els, F.; Cilliers, L. Improving the information security of personal electronic health records to protect a patient's health information. 2017 Conference on Information Communication Technology and Society (ICTAS). 2017, 1–6. [Google Scholar]
- Perez-Pena, R.; Rosenberg, M. Strava Fitness App Can Reveal Military Sites, Analysts Say. The New York Times. January 29, 2018. https://www.nytimes.com/2018/01/29/world/middleeast/strava-heat-map.html.
- Heidel, A.; Hagist, C.; Schlereth, C. Pricing through health apps generated data-Digital dividend as a game changer: Discrete choice experiment. PLoS One. 2021, 16, e0254786. [Google Scholar] [CrossRef] [PubMed]
- Rising, C.J.; Gaysynsky, A.; Blake, K.D.; Jensen, R.E.; Oh, A. Willingness to Share Data From Wearable Health and Activity Trackers: Analysis of the 2019 Health Information National Trends Survey Data. JMIR Mhealth Uhealth. 2021, 9, e29190. [Google Scholar] [CrossRef] [PubMed]
- The Lancet Digital, H. Wearable health data privacy. Lancet Digit Health. 2023, 5, e174. [Google Scholar] [CrossRef] [PubMed]
- Segura Anaya, L.H.; Alsadoon, A.; Costadopoulos, N.; Prasad, P.W.C. Ethical Implications of User Perceptions of Wearable Devices. Sci Eng Ethics. 2018, 24, 1–28. [Google Scholar] [CrossRef] [PubMed]
- Hart, K. Genetic testing firms share your DNA data more than you think. Axios. Accessed October 27, 2022. https://www.axios.com/2019/02/25/dna-test-results-privacy-genetic-data-sharing.
- Schreiber, R.; Koppel, R.; Kaplan, B. What Do We Mean by Sharing of Patient Data? DaSH - A Data Sharing Hierarchy of Privacy and Ethical Challenges. Appl Clin Inform. 2024. [CrossRef]
- Liddell, K.; Simon, D.A.; Lucassen, A. Patient data ownership: who owns your health? J Law Biosci. 2021, 8, lsab023. [Google Scholar] [CrossRef] [PubMed]
- Sharma, R. Who really owns your health data? Forbes. Accessed August 13, 2024. https://www.forbes.com/sites/forbestechcouncil/2018/04/23/who-really-owns-your-health-data.
- Royal, K. Who owns patient medical records? Journal of Urgent Care Medicine. Accessed August 13, 2024. https://www.jucm.com/owns-patient-medical-records/.
- DOT Security. Who owns the data collected by wearable devices? DOT Security. Accessed August 13, 2024. https://dotsecurity.com/insights/blog-who-owns-data-collected-by-wearable-devices.
- Austin, P. The real reason Google is buying Fitbit. Time. Accessed August 13, 2024. https://time.com/5717726/google-fitbit/.
- Acosta, J.N.; Falcone, G.J.; Rajpurkar, P.; Topol, E.J. Multimodal biomedical AI. Nat Med. 2022, 28, 1773–1784. [Google Scholar] [CrossRef] [PubMed]
- Khalid, N.; Qayyum, A.; Bilal, M.; Al-Fuqaha, A.; Qadir, J. Privacy-preserving artificial intelligence in healthcare: Techniques and applications. Comput Biol Med. 2023, 158, 106848. [Google Scholar] [CrossRef]
- Siontis, K.C.; Noseworthy, P.A.; Attia, Z.I.; Friedman, P.A. Artificial intelligence-enhanced electrocardiography in cardiovascular disease management. Nature Reviews Cardiology. 2021, 18, 465–478. [Google Scholar] [CrossRef] [PubMed]
- Seh, A.H.; Zarour, M.; Alenezi, M.; et al. Healthcare Data Breaches: Insights and Implications. Healthcare. 2020, 8. [Google Scholar] [CrossRef]
- Attia, Z.I.; Harmon, D.M.; Behr, E.R.; Friedman, P.A. Application of artificial intelligence to the electrocardiogram. Eur Heart J. 2021, 42, 4717–4730. [Google Scholar] [CrossRef]
- van den Beuken WMF, van Schuppen, H. ; Demirtas, D.; et al. Investigating Users' Attitudes Toward Automated Smartwatch Cardiac Arrest Detection: Cross-Sectional Survey Study. JMIR Hum Factors. 2024, 11, e57574. [Google Scholar] [CrossRef]
- Hindelang, M.; Wecker, H.; Biedermann, T.; Zink, A. Continuously monitoring the human machine? - A cross-sectional study to assess the acceptance of wearables in Germany. Health Informatics J. 2024, 30, 14604582241260607. [Google Scholar] [CrossRef] [PubMed]
- Devine, J.K.; Schwartz, L.P.; Hursh, S.R. Technical, Regulatory, Economic, and Trust Issues Preventing Successful Integration of Sensors into the Mainstream Consumer Wearables Market. Sensors (Basel). 2022, 22. [Google Scholar] [CrossRef] [PubMed]
- Dobson, R.; Stowell, M.; Warren, J.; et al. Use of Consumer Wearables in Health Research: Issues and Considerations. J Med Internet Res. 2023, 25, e52444. [Google Scholar] [CrossRef] [PubMed]
- The American Medical Association. Patient perspectives around data privacy. The American Medical Association,. Accessed August 7, 2024. https://www.ama-assn.org/system/files/ama-patient-data-privacy-survey-results.pdf.
- Chikwetu, L.; Miao, Y.; Woldetensae, M.K.; Bell, D.; Goldenholz, D.M.; Dunn, J. Does deidentification of data from wearable devices give us a false sense of security? A systematic review. Lancet Digit Health. 2023, 5, e239–e247. [Google Scholar] [CrossRef]
- Yeke, D.; Ibrahim, M.; Tuncay, G.S.; et al. Wear's my data? Understanding the cross-device runtime permission model in wearables. Google Research. Accessed August 12, 2024. https://research.google/pubs/wears-my-data-understanding-the-cross-device-runtime-permission-model-in-wearables/.
- Li, Z.; Wang, B.; Li, J.; Hua, Y. ; SZ Local differential privacy protection for wearable device data. PLoS ONE. 2022, 17, e0272766. [Google Scholar]
- Coventry, L.; Branley, D. Cybersecurity in healthcare: A narrative review of trends, threats and ways forward. Maturitas. 2018, 113, 48–52. [Google Scholar] [CrossRef] [PubMed]
- El-Tallawy, S.N.; Pergolizzi, J.V.; Vasiliu-Feltes, I.; Ahmed, R.S.; LeQuang, J.K.; Alzahrani, T.; Varrassi, G.; Awaleh, F.I.; Alsubaie, A.T.; Nagiub, M.S. Innovative Applications of Telemedicine and Other Digital Health Solutions in Pain Management: A Literature Review. Pain Ther. 2024, 13, 791–812. [Google Scholar] [CrossRef] [PubMed]
- Tully, J.; Selzer, J.; Phillips, J.P.; O'Connor, P.; Dameff, C. Healthcare Challenges in the Era of Cybersecurity. Health Secur. 2020, 18, 228–231. [Google Scholar] [CrossRef] [PubMed]
| Term | Definition |
|---|---|
| Authentication | A method of validation of data destination that confirms proper identity of data recipient |
| Breach | A broad term for any act or event where an unauthorized party can access personal, private, or confidential information |
| Eavesdropping | Real-time interception of private communications |
| Hard trust | Mechanisms such as authenticity controls, encryption, algorithms, and audits in place to harden data security |
| Interruption | Failure of data in transit to reach its intended destination, which may be due to technical problems or a hacker intervention |
| Malware | The use of dangerous viruses, worms, or other tools to corrupt data once it is in a repository (such as stored on a computer or app) |
| Message alterations | Changing the content of the data while they are in transit; this may be the content of the message or the timestamp Also called data modification |
| Sniffing | Monitoring every data packet that passes through a certain checkpoint (network) |
| Soft trust | A personal and often emotion-drive perception of security and safety, often shaped by the brand and social influence of the device |
| Tapping | Using a hardware device to access data in transit |
| Traffic analysis attacks | Monitoring data transmissions from a wearable and a smartphone or software app in order to identify users or detect their activities |
| Virtual private network | A private, hidden, and restricted passageway (like a tunnel) through which data can flow |
| Privacy | Confidentiality | Security | |
|---|---|---|---|
| Key questions | Who has access to the information? Under what conditions may the information be accessed? |
Are there any limitations on what data may be collected and where/how? | What measures are being used to prevent unauthorized access, use, modification, or dissemination of my data? Are data encrypted? |
| Domains this affects | How and where are data stored and transmitted? Is personal information (name, address, birthdays, identification) collected? | What third parties (if any) can access the data? What laws are involved if data crosses borders? | What ways are there to protect against computer hacks, data breaches, unauthorized data disclosures? |
| Other issues | Can data collection be prevented in some cases? Are there limits to what type of data is collected? |
Can a clinician share data without permission if it is de-identified? | Security authorizes who can access data, but who controls the actions of the authorized users? What limitations (if any) may affect authorized users? |
| Data owner | Who owns the data? | How does the manufacturer protect the user’s privacy? | How does the system secure the data? |
| Crucial points to consider | Who may sell the data? | Can the wearable owner limit data collection of particularly sensitive information (mental health issues, pregnancy, cancer)? |
What techniques are used for cybersecurity? |
| Talking Points | Risk Mitigations | Risks |
|---|---|---|
| Wearables collect data and these data are owned by the manufacturer | Data are often anonymized and de-identified | Data can be breached Identity theft is possible with some systems |
| Data may be shared or sold to other organizations, universities, and research centers | Data are often anonymized and de-identified Such data-sharing may have scientific purposes |
Even when data are sold, patients get no remuneration |
| Data may be stored in any number of locations, including overseas. The privacy laws of the place where the data are located are the ones that are in force | Data are often anonymized and de-identified. | Patients most likely will not be able to find out where their data are stored Patients will not be able to remove their data or prevent their data from being stored in specific locations or databases |
| Health data are being used for AI and other systems to improve healthcare | Your data may be valuable to help build better systems | Patients will not be recognized or compensated for the use of their data |
| Wearables and their manufacturers may not have as robust security as other organizations, for example, credit card companies or banks | Systems to protect against identity theft, such as online services, may provide a degree of protection | No form of identity protection is fool-proof and vigilance is recommended |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).