Health APPs and Privacy Concerns: A Three-Entities Game-theoretic Approach
Guang Zhu1,2(),Hu Liu1,Xinmeng Du1
1(School of Management Science and Engineering, Nanjing University of Information Science and Technology, Nanjing 210044, China) 2(China Institute of Manufacturing Development, Nanjing University of Information Science and Technology, Nanjing 210044, China)
[Objective] This paper studies the usage intention of mobile health APPs (mHealth) and privacy concerns. It analyzes the interferences among various entity behaviors, aiming to improve mHealth privacy protection and increase APP usage. [Methods] Using evolutionary game theory, we proposed a model to examine the patient behaviors, mHealth APP providers and government regulations. Then we analyzed the benefits, costs and loss of different behaviors to establish the payoff matrices and evolutionarily stable strategies (ESSs). Finally, we discussed the impacts of different factors on patient behaviors. [Results] The usage intention of mHealth APP was correlated with benefits from mHealth service and probability of privacy leaking. However, the government’s regulation has few impacts on patient’s behaviors. Investments of mHealth service providers in privacy was correlated with APP usage intention, government regulations, costs and privacy loss, etc. Government regulations were correlated with costs and social credibility. [Limitations] We did not include the nonlinear benefit function in this study. Other factors, such as success rate of regulation and advertisement effects should also be examined. [Conclusions] This study promotes the development of mHealth service by analyzing the impacts of various factors on APP usage privacy protection and government regulation.
朱光,刘虎,杜欣蒙. 隐私忧虑背景下的移动医疗APP使用意愿研究*——基于三方博弈的视角[J]. 数据分析与知识发现, 2019, 3(5): 93-106.
Guang Zhu,Hu Liu,Xinmeng Du. Health APPs and Privacy Concerns: A Three-Entities Game-theoretic Approach. Data Analysis and Knowledge Discovery, 2019, 3(5): 93-106.
(He Xiaolin, Qian Qing, Wu Sizhu, et al.Advances in Data Security and Privacy Protection of Wearable Health and Medical Devices[J]. Chinese Journal of Medical Library and Information Science, 2016, 25(10): 32-37.)
[2]
Avancha S, Baxi A, Kotz D. Privacy in Mobile Technology for Personal Healthcare[J]. ACM Computing Surveys, 2012, 45(1): Article No. 3.
[3]
2017数据泄露成本研究报告: 全球概览[OL]. [2018-07-09]..
[3]
(2017 Report of Data Breach: A Global Review [OL]. [2018-07-09].https://www.sohu.com/a/164873455_804262)
[4]
Hallam C, Zanella G.Online Self-Disclosure: The Privacy Paradox Explained as a Temporally Discounted Balance Between Concerns and Rewards[J]. Computers in Human Behavior, 2017, 68: 217-227.
[5]
2017中国网站安全形势分析报告[OL]. [2018-10-27]. .
[5]
(2017 Security Report of Chinese Websites [OL]. [2018-10-27].
[6]
搜狐. 医疗系统遭受攻击——数据安全何去何从?[OL]. [2018-10-27]. .
[6]
(Sohu. Medical System under Attack——Where Data is Going? [OL]. [2018-10-27].
[7]
Health Insurance Portability and Accountability Act [OL]. [2017-12-20]..
(Zhang Yue, Zhu Qinghua.Review on Foreign Study of Information Privacy[J]. Library and Information Service, 2014, 58(13): 140-148.)
[9]
Chen H, Beaudoin C E, Hong T.Securing Online Privacy: An Empirical Test on Internet Scam Victimization, Online Privacy Concerns, and Privacy Protection Behaviors[J]. Computers in Human Behavior, 2017, 70: 291-302.
(Zhu Guang, Feng Mining, Zhang Weiwei.Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach[J]. Data Analysis and Knowledge Discovery, 2018, 2(6): 13-24.)
[11]
Lai J, Mu Y, Guo F, et al.Fully Privacy-Preserving and Revocable ID-Based Broadcast Encryption for Data Access Control in Smart City[J]. Personal & Ubiquitous Computing, 2017, 21(5): 855-868.
[12]
Yue X, Wang H, Jin D, et al.Healthcare Data Gateways: Found Healthcare Intelligence on Block-Chain with Novel Privacy Risk Control[J]. Journal of Medical Systems, 2016, 40(10): 218.
[13]
Poon C C Y, Zhang Y T, Bao S D. A Novel Biometrics Method to Secure Wireless Body Area Sensor Networks for Telemedicine and M-Health[J]. IEEE Communications Magazine, 2006, 44(4): 73-81.
(Meng Dacheng, Luo Entao, Wang Guojun.Opportunity-Calculation-Based Secure and Privacy-Preserving Model for Mobile Healthcare[J]. Journal of Chinese Computer Systems, 2016, 37(12): 2643-2648.)
[15]
Ameen M A, Liu J, Kwak K.Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications[J]. Journal of Medical Systems, 2012, 36(1): 93-101.
[16]
Ozturk A B, Nusair K, Okumus F, et al.Understanding Mobile Hotel Booking Loyalty: An Integration of Privacy Calculus Theory and Trust-risk Framework[J]. Information Systems Frontiers, 2017, 19(4): 753-767.
[17]
Rahman F, Bhuiyan M Z A, Ahamed S I. A Privacy Preserving Framework for RFID Based Healthcare Systems[J]. Future Generation Computer Systems, 2016, 72: 339-352.
(Cao Jing, Wu Linsheng.The Construction of E-patient Mode in the Time of Healthcare 2.0[J]. Medicine & Philosophy:Humanistic & Social Medicine Edition, 2017, 38(1) :65-67.)
[19]
Jiang Z, Cheng S H, Choi B C F. Research Note—Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions[J]. Information Systems Research, 2013, 24(3): 579-595.
[20]
Xu H, Teo H H, Tan B C Y, et al. Research Note—Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services[J]. Information Systems Research, 2012, 23(4): 1087-1383.
[21]
Martin K D, Murphy P E.The Role of Data Privacy in Marketing[J]. Journal of the Academy of Marketing Science, 2017, 45(2): 135-155.
(Zhu Hou, Wang Ke, Yan Zhijun, et al.An Analysis of Privacy Paradox Phenomenon in SNS Users Based on Privacy Calculus[J]. Journal of Intelligence, 2017, 36(2): 134-139.)
[23]
Guo X, Zhang X, Sun Y.The Privacy-Personalization Paradox in mHealth Services Acceptance of Different Age Groups[J]. Electronic Commerce Research and Applications, 2016, 16: 55-65.
[24]
Atienza A A, Zarcadoolas C, Vaughon W, et al.Consumer Attitudes and Perceptions on mHealth Privacy and Security: Findings from a Mixed-Methods Study[J]. Journal of Health Communication, 2015, 20(6): 673-679.
[25]
Eikey E V, Murphy A R, Reddy M C, et al.Designing for Privacy Management in Hospitals: Understanding the Gap Between User Activities and IT Staff’s Understandings[J]. International Journal of Medical Informatics, 2015, 84(12): 1065-1075.
[26]
Li T, Slee T.The Effects of Information Privacy Concerns on Digitizing Personal Health Records[J]. Journal of the Association for Information Science & Technology, 2014, 65(8): 1541-1554.
(Zhao Dongxiang.Empirical Research on the Influencing Factors of the Intention to Use of Mobile Health Management Service: From the Perspective of Innovation Diffusion[J]. Journal of Intelligence, 2017, 36(11): 120-128.)
(Zhang Song, Zhao Jiali, Wu Jianyun.Model Construction and Empirical Study on LBS’s Users’ Privacy Concern and Behavior Intention[J]. Computer Integrated Manufacturing Systems, 2018, 24(2): 524-532.)
[29]
Gordon L A, Loeb M P.The Economics of Information Security Investment[J]. ACM Transactions on Information and System Security (TISSEC), 2002, 5(4): 438-457.
[30]
Cavusoglu H, Mishra B, Raghunathan S.A Model for Evaluating IT Security Investments[J]. Communications of the ACM, 2004, 47(7): 87-92.
[31]
Fielder A, Panaousis E, Malacaria P, et al.Decision Support Approaches for Cyber Security Investment[J]. Decision Support Systems, 2016, 86(6): 13-23.
[32]
Gao X, Zhong W, Mei S.A Game-Theoretic Analysis of Information Sharing and Security Investment for Complementary Firms[J]. Journal of the Operational Research Society, 2014, 65(11): 1682-1691.
[33]
Liu D, Ji Y, Mookerjee V.Knowledge Sharing and Investment Decisions in Information Security[J]. Decision Support Systems, 2012, 52(1): 95-107.
[34]
Shokri R, Theodorakopoulos G, Troncoso C.Privacy Games Along Location Traces: A Game-Theoretic Framework for Optimizing Location Privacy[J]. ACM Transactions on Privacy and Security, 2017, 19(4): 11-41.
[35]
Zhu F W, Carpenter S, Zhu W, et al.A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments[J]. International Journal of Information Security and Privacy, 2010, 4(4): 1-20.
(Gu Jianqiang, Mei Shue, Zhong Weijun.Dynamic Coordination Mechanism of Information System Security Investment Based on Interdependent Security[J]. Operations Research and Management Science, 2015, 24(6): 136-142.)
[37]
Deng X Y, Han D Q, Dezert J, et al.Evidence Combination from an Evolutionary Game Theory Perspective[J]. IEEE Transactions on Cybernetics, 2016, 46(9): 2070-2082.
[38]
Deng X Y, Han D Q, Dezert J, et al.Evidence Combination from an Evolutionary Game Theory Perspective[J]. IEEE Transactions on Cybernetics, 2016, 46(9): 2070-2082.
[39]
Guo S X.Environmental Options of Local Governments for Regional Air Pollution Joint Control: Application of Evolutionary Game Theory[J]. Economic and Political Studies, 2016, 4(3): 238-257
[40]
Friedman D.On Economic Applications of Evolutionary Game Theory[J]. Journal of Evolutionary Economics, 1998, 8(1): 15-43.
(Ji Ying, Song Bo, Qu Shaojian.Research on Decision-making Gaming and Contract Mechanism Based on Crowdfunding[J]. Yuejiang Academic Journal, 2018(3): 40-50.)