Please wait a minute...
Advanced Search
数据分析与知识发现  2019, Vol. 3 Issue (5): 93-106     https://doi.org/10.11925/infotech.2096-3467.2018.0844
  研究论文 本期目录 | 过刊浏览 | 高级检索 |
隐私忧虑背景下的移动医疗APP使用意愿研究*——基于三方博弈的视角
朱光1,2(),刘虎1,杜欣蒙1
1(南京信息工程大学管理工程学院 南京 210044)
2(南京信息工程大学中国制造业发展研究院 南京 210044)
Health APPs and Privacy Concerns: A Three-Entities Game-theoretic Approach
Guang Zhu1,2(),Hu Liu1,Xinmeng Du1
1(School of Management Science and Engineering, Nanjing University of Information Science and Technology, Nanjing 210044, China)
2(China Institute of Manufacturing Development, Nanjing University of Information Science and Technology, Nanjing 210044, China)
全文: PDF (922 KB)   HTML ( 43
输出: BibTeX | EndNote (RIS)      
摘要 

【目的】从隐私泄露和隐私保护角度, 研究隐私忧虑背景下的移动医疗APP使用意愿问题, 分析不同主体行为间的相互影响, 提升移动医疗APP的隐私保护水平和患者使用意愿。【方法】运用演化博弈理论, 设计由患者、移动医疗APP服务商和政府组成的博弈主体, 讨论其在移动医疗APP使用过程中的博弈行为。根据不同行为策略的收益、成本和损失, 计算博弈三方的支付矩阵, 分析演化稳定策略, 并探究不同因素对演化稳定策略的影响。【结果】患者的移动医疗APP使用意愿与APP服务收益、隐私泄露损失和概率密切相关, 政府监管措施对其无显著影响; 移动医疗APP服务商的隐私保护行为与患者使用意愿、政府监管、投入成本、隐私泄露损失等因素密切相关; 政府监管行为与投入成本、社会公信力等因素密切相关。【局限】未能设计非线性收益函数; 未能考虑其他影响演化稳定策略的因素, 如监管成功率、广告因素等。【结论】通过分析不同因素对移动医疗APP使用意愿、移动医疗隐私投入和隐私监管的影响, 能够促进移动医疗服务水平的发展和提高。

服务
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章
朱光
刘虎
杜欣蒙
关键词 隐私忧虑移动医疗APP使用意愿监管演化博弈    
Abstract

[Objective] This paper studies the usage intention of mobile health APPs (mHealth) and privacy concerns. It analyzes the interferences among various entity behaviors, aiming to improve mHealth privacy protection and increase APP usage. [Methods] Using evolutionary game theory, we proposed a model to examine the patient behaviors, mHealth APP providers and government regulations. Then we analyzed the benefits, costs and loss of different behaviors to establish the payoff matrices and evolutionarily stable strategies (ESSs). Finally, we discussed the impacts of different factors on patient behaviors. [Results] The usage intention of mHealth APP was correlated with benefits from mHealth service and probability of privacy leaking. However, the government’s regulation has few impacts on patient’s behaviors. Investments of mHealth service providers in privacy was correlated with APP usage intention, government regulations, costs and privacy loss, etc. Government regulations were correlated with costs and social credibility. [Limitations] We did not include the nonlinear benefit function in this study. Other factors, such as success rate of regulation and advertisement effects should also be examined. [Conclusions] This study promotes the development of mHealth service by analyzing the impacts of various factors on APP usage privacy protection and government regulation.

Key wordsPrivacy Concern    mHealth APP    Usage Intention    Regulation    Evolutionary Game
收稿日期: 2018-07-29      出版日期: 2019-07-03
基金资助:*本文系国家自然科学基金项目“信息生命周期视角下的大数据隐私风险评估和溯源问责机制研究”(项目编号: 71503133)、国家社会科学基金重大项目“中国社会应急救援服务体系建设研究”(项目编号: 16ZDA054)和江苏省大学生创新重点项目“基于隐私视角的移动医疗服务采纳意愿研究”(项目编号: 201810300026Z)的研究成果之一
引用本文:   
朱光,刘虎,杜欣蒙. 隐私忧虑背景下的移动医疗APP使用意愿研究*——基于三方博弈的视角[J]. 数据分析与知识发现, 2019, 3(5): 93-106.
Guang Zhu,Hu Liu,Xinmeng Du. Health APPs and Privacy Concerns: A Three-Entities Game-theoretic Approach. Data Analysis and Knowledge Discovery, 2019, 3(5): 93-106.
链接本文:  
https://manu44.magtech.com.cn/Jwk_infotech_wk3/CN/10.11925/infotech.2096-3467.2018.0844      或      https://manu44.magtech.com.cn/Jwk_infotech_wk3/CN/Y2019/V3/I5/93
[1] 何晓琳, 钱庆, 吴思竹, 等. 健康医疗可穿戴设备数据安全与隐私研究进展[J]. 中华医学图书情报杂志, 2016, 25(10): 32-37.
[1] (He Xiaolin, Qian Qing, Wu Sizhu, et al.Advances in Data Security and Privacy Protection of Wearable Health and Medical Devices[J]. Chinese Journal of Medical Library and Information Science, 2016, 25(10): 32-37.)
[2] Avancha S, Baxi A, Kotz D. Privacy in Mobile Technology for Personal Healthcare[J]. ACM Computing Surveys, 2012, 45(1): Article No. 3.
[3] 2017数据泄露成本研究报告: 全球概览[OL]. [2018-07-09]..
[3] (2017 Report of Data Breach: A Global Review [OL]. [2018-07-09].https://www.sohu.com/a/164873455_804262)
[4] Hallam C, Zanella G.Online Self-Disclosure: The Privacy Paradox Explained as a Temporally Discounted Balance Between Concerns and Rewards[J]. Computers in Human Behavior, 2017, 68: 217-227.
[5] 2017中国网站安全形势分析报告[OL]. [2018-10-27]. .
[5] (2017 Security Report of Chinese Websites [OL]. [2018-10-27].
[6] 搜狐. 医疗系统遭受攻击——数据安全何去何从?[OL]. [2018-10-27]. .
[6] (Sohu. Medical System under Attack——Where Data is Going? [OL]. [2018-10-27].
[7] Health Insurance Portability and Accountability Act [OL]. [2017-12-20]..
[8] 张玥, 朱庆华. 国外信息隐私研究述评[J]. 图书情报工作, 2014, 58(13): 140-148.
[8] (Zhang Yue, Zhu Qinghua.Review on Foreign Study of Information Privacy[J]. Library and Information Service, 2014, 58(13): 140-148.)
[9] Chen H, Beaudoin C E, Hong T.Securing Online Privacy: An Empirical Test on Internet Scam Victimization, Online Privacy Concerns, and Privacy Protection Behaviors[J]. Computers in Human Behavior, 2017, 70: 291-302.
[10] 朱光, 丰米宁, 张薇薇. 激励机制下图书馆信息安全管理的投入意愿研究——基于演化博弈的视角[J]. 数据分析与知识发现, 2018, 2(6): 13-24.
[10] (Zhu Guang, Feng Mining, Zhang Weiwei.Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach[J]. Data Analysis and Knowledge Discovery, 2018, 2(6): 13-24.)
[11] Lai J, Mu Y, Guo F, et al.Fully Privacy-Preserving and Revocable ID-Based Broadcast Encryption for Data Access Control in Smart City[J]. Personal & Ubiquitous Computing, 2017, 21(5): 855-868.
[12] Yue X, Wang H, Jin D, et al.Healthcare Data Gateways: Found Healthcare Intelligence on Block-Chain with Novel Privacy Risk Control[J]. Journal of Medical Systems, 2016, 40(10): 218.
[13] Poon C C Y, Zhang Y T, Bao S D. A Novel Biometrics Method to Secure Wireless Body Area Sensor Networks for Telemedicine and M-Health[J]. IEEE Communications Magazine, 2006, 44(4): 73-81.
[14] 孟大程, 罗恩韬, 王国军. 移动医疗中基于机会计算的安全和隐私保护模型[J]. 小型微型计算机系统, 2016, 37(12): 2643-2648.
[14] (Meng Dacheng, Luo Entao, Wang Guojun.Opportunity-Calculation-Based Secure and Privacy-Preserving Model for Mobile Healthcare[J]. Journal of Chinese Computer Systems, 2016, 37(12): 2643-2648.)
[15] Ameen M A, Liu J, Kwak K.Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications[J]. Journal of Medical Systems, 2012, 36(1): 93-101.
[16] Ozturk A B, Nusair K, Okumus F, et al.Understanding Mobile Hotel Booking Loyalty: An Integration of Privacy Calculus Theory and Trust-risk Framework[J]. Information Systems Frontiers, 2017, 19(4): 753-767.
[17] Rahman F, Bhuiyan M Z A, Ahamed S I. A Privacy Preserving Framework for RFID Based Healthcare Systems[J]. Future Generation Computer Systems, 2016, 72: 339-352.
[18] 曹靖, 伍林生. 医疗2.0时代背景下e-患者模式的构建[J]. 医学与哲学:A, 2017, 38(1): 65-67.
[18] (Cao Jing, Wu Linsheng.The Construction of E-patient Mode in the Time of Healthcare 2.0[J]. Medicine & Philosophy:Humanistic & Social Medicine Edition, 2017, 38(1) :65-67.)
[19] Jiang Z, Cheng S H, Choi B C F. Research Note—Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions[J]. Information Systems Research, 2013, 24(3): 579-595.
[20] Xu H, Teo H H, Tan B C Y, et al. Research Note—Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services[J]. Information Systems Research, 2012, 23(4): 1087-1383.
[21] Martin K D, Murphy P E.The Role of Data Privacy in Marketing[J]. Journal of the Academy of Marketing Science, 2017, 45(2): 135-155.
[22] 朱侯, 王可, 严芷君, 等. 基于隐私计算理论的 SNS 用户隐私悖论现象研究[J]. 情报杂志, 2017, 36(2): 134-139.
[22] (Zhu Hou, Wang Ke, Yan Zhijun, et al.An Analysis of Privacy Paradox Phenomenon in SNS Users Based on Privacy Calculus[J]. Journal of Intelligence, 2017, 36(2): 134-139.)
[23] Guo X, Zhang X, Sun Y.The Privacy-Personalization Paradox in mHealth Services Acceptance of Different Age Groups[J]. Electronic Commerce Research and Applications, 2016, 16: 55-65.
[24] Atienza A A, Zarcadoolas C, Vaughon W, et al.Consumer Attitudes and Perceptions on mHealth Privacy and Security: Findings from a Mixed-Methods Study[J]. Journal of Health Communication, 2015, 20(6): 673-679.
[25] Eikey E V, Murphy A R, Reddy M C, et al.Designing for Privacy Management in Hospitals: Understanding the Gap Between User Activities and IT Staff’s Understandings[J]. International Journal of Medical Informatics, 2015, 84(12): 1065-1075.
[26] Li T, Slee T.The Effects of Information Privacy Concerns on Digitizing Personal Health Records[J]. Journal of the Association for Information Science & Technology, 2014, 65(8): 1541-1554.
[27] 赵栋祥. 移动健康管理服务使用意愿的影响因素研究——基于创新扩散的视角[J]. 情报杂志, 2017, 36(11): 120-128.
[27] (Zhao Dongxiang.Empirical Research on the Influencing Factors of the Intention to Use of Mobile Health Management Service: From the Perspective of Innovation Diffusion[J]. Journal of Intelligence, 2017, 36(11): 120-128.)
[28] 张嵩, 赵佳丽, 吴剑云. LBS的隐私关注与采纳意向的模型构建及实证[J]. 计算机集成制造系统, 2018, 24(2): 524-532.
[28] (Zhang Song, Zhao Jiali, Wu Jianyun.Model Construction and Empirical Study on LBS’s Users’ Privacy Concern and Behavior Intention[J]. Computer Integrated Manufacturing Systems, 2018, 24(2): 524-532.)
[29] Gordon L A, Loeb M P.The Economics of Information Security Investment[J]. ACM Transactions on Information and System Security (TISSEC), 2002, 5(4): 438-457.
[30] Cavusoglu H, Mishra B, Raghunathan S.A Model for Evaluating IT Security Investments[J]. Communications of the ACM, 2004, 47(7): 87-92.
[31] Fielder A, Panaousis E, Malacaria P, et al.Decision Support Approaches for Cyber Security Investment[J]. Decision Support Systems, 2016, 86(6): 13-23.
[32] Gao X, Zhong W, Mei S.A Game-Theoretic Analysis of Information Sharing and Security Investment for Complementary Firms[J]. Journal of the Operational Research Society, 2014, 65(11): 1682-1691.
[33] Liu D, Ji Y, Mookerjee V.Knowledge Sharing and Investment Decisions in Information Security[J]. Decision Support Systems, 2012, 52(1): 95-107.
[34] Shokri R, Theodorakopoulos G, Troncoso C.Privacy Games Along Location Traces: A Game-Theoretic Framework for Optimizing Location Privacy[J]. ACM Transactions on Privacy and Security, 2017, 19(4): 11-41.
[35] Zhu F W, Carpenter S, Zhu W, et al.A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments[J]. International Journal of Information Security and Privacy, 2010, 4(4): 1-20.
[36] 顾建强, 梅姝娥, 仲伟俊. 考虑相互依赖性的信息系统安全投资及协调机制[J]. 运筹与管理, 2015, 24(6): 136-142.
[36] (Gu Jianqiang, Mei Shue, Zhong Weijun.Dynamic Coordination Mechanism of Information System Security Investment Based on Interdependent Security[J]. Operations Research and Management Science, 2015, 24(6): 136-142.)
[37] Deng X Y, Han D Q, Dezert J, et al.Evidence Combination from an Evolutionary Game Theory Perspective[J]. IEEE Transactions on Cybernetics, 2016, 46(9): 2070-2082.
[38] Deng X Y, Han D Q, Dezert J, et al.Evidence Combination from an Evolutionary Game Theory Perspective[J]. IEEE Transactions on Cybernetics, 2016, 46(9): 2070-2082.
[39] Guo S X.Environmental Options of Local Governments for Regional Air Pollution Joint Control: Application of Evolutionary Game Theory[J]. Economic and Political Studies, 2016, 4(3): 238-257
[40] Friedman D.On Economic Applications of Evolutionary Game Theory[J]. Journal of Evolutionary Economics, 1998, 8(1): 15-43.
[41] 纪颖, 宋波, 屈绍建. 基于众筹融资的决策博弈及合同机制研究[J]. 阅江学刊, 2018(3): 40-50.
[41] (Ji Ying, Song Bo, Qu Shaojian.Research on Decision-making Gaming and Contract Mechanism Based on Crowdfunding[J]. Yuejiang Academic Journal, 2018(3): 40-50.)
[1] 朱光, 丰米宁, 张薇薇. 激励机制下图书馆信息安全管理的投入意愿研究*——基于演化博弈的视角[J]. 数据分析与知识发现, 2018, 2(6): 13-24.
[2] 张李义, 李慧然. 基于互动视角的在线医疗问答患者用户使用研究[J]. 数据分析与知识发现, 2018, 2(1): 76-87.
[3] 张敏, 罗梅芬, 聂瑞, 张艳. 信息生态视域下移动医疗APP用户持续使用意愿分析*[J]. 数据分析与知识发现, 2017, 1(4): 46-56.
[4] 张梦霞,顾立平. 数据监管的政策研究综述*[J]. 现代图书情报技术, 2016, 32(1): 3-10.
[5] 刘翔. 基于SNMP协议的智能化中心机房监管系统研究*[J]. 现代图书情报技术, 2008, 24(4): 66-70.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
版权所有 © 2015 《数据分析与知识发现》编辑部
地址:北京市海淀区中关村北四环西路33号 邮编:100190
电话/传真:(010)82626611-6626,82624938
E-mail:jishu@mail.las.ac.cn