Please wait a minute...
Data Analysis and Knowledge Discovery  2019, Vol. 3 Issue (5): 93-106    DOI: 10.11925/infotech.2096-3467.2018.0844
Current Issue | Archive | Adv Search |
Health APPs and Privacy Concerns: A Three-Entities Game-theoretic Approach
Guang Zhu1,2(),Hu Liu1,Xinmeng Du1
1(School of Management Science and Engineering, Nanjing University of Information Science and Technology, Nanjing 210044, China)
2(China Institute of Manufacturing Development, Nanjing University of Information Science and Technology, Nanjing 210044, China)
Download: PDF (922 KB)   HTML ( 41
Export: BibTeX | EndNote (RIS)      

[Objective] This paper studies the usage intention of mobile health APPs (mHealth) and privacy concerns. It analyzes the interferences among various entity behaviors, aiming to improve mHealth privacy protection and increase APP usage. [Methods] Using evolutionary game theory, we proposed a model to examine the patient behaviors, mHealth APP providers and government regulations. Then we analyzed the benefits, costs and loss of different behaviors to establish the payoff matrices and evolutionarily stable strategies (ESSs). Finally, we discussed the impacts of different factors on patient behaviors. [Results] The usage intention of mHealth APP was correlated with benefits from mHealth service and probability of privacy leaking. However, the government’s regulation has few impacts on patient’s behaviors. Investments of mHealth service providers in privacy was correlated with APP usage intention, government regulations, costs and privacy loss, etc. Government regulations were correlated with costs and social credibility. [Limitations] We did not include the nonlinear benefit function in this study. Other factors, such as success rate of regulation and advertisement effects should also be examined. [Conclusions] This study promotes the development of mHealth service by analyzing the impacts of various factors on APP usage privacy protection and government regulation.

Key wordsPrivacy Concern      mHealth APP      Usage Intention      Regulation      Evolutionary Game     
Received: 29 July 2018      Published: 03 July 2019

Cite this article:

Guang Zhu,Hu Liu,Xinmeng Du. Health APPs and Privacy Concerns: A Three-Entities Game-theoretic Approach. Data Analysis and Knowledge Discovery, 2019, 3(5): 93-106.

URL:     OR

[1] 何晓琳, 钱庆, 吴思竹, 等. 健康医疗可穿戴设备数据安全与隐私研究进展[J]. 中华医学图书情报杂志, 2016, 25(10): 32-37.
[1] (He Xiaolin, Qian Qing, Wu Sizhu, et al.Advances in Data Security and Privacy Protection of Wearable Health and Medical Devices[J]. Chinese Journal of Medical Library and Information Science, 2016, 25(10): 32-37.)
[2] Avancha S, Baxi A, Kotz D. Privacy in Mobile Technology for Personal Healthcare[J]. ACM Computing Surveys, 2012, 45(1): Article No. 3.
[3] 2017数据泄露成本研究报告: 全球概览[OL]. [2018-07-09]..
[3] (2017 Report of Data Breach: A Global Review [OL]. [2018-07-09].
[4] Hallam C, Zanella G.Online Self-Disclosure: The Privacy Paradox Explained as a Temporally Discounted Balance Between Concerns and Rewards[J]. Computers in Human Behavior, 2017, 68: 217-227.
[5] 2017中国网站安全形势分析报告[OL]. [2018-10-27]. .
[5] (2017 Security Report of Chinese Websites [OL]. [2018-10-27].
[6] 搜狐. 医疗系统遭受攻击——数据安全何去何从?[OL]. [2018-10-27]. .
[6] (Sohu. Medical System under Attack——Where Data is Going? [OL]. [2018-10-27].
[7] Health Insurance Portability and Accountability Act [OL]. [2017-12-20]..
[8] 张玥, 朱庆华. 国外信息隐私研究述评[J]. 图书情报工作, 2014, 58(13): 140-148.
[8] (Zhang Yue, Zhu Qinghua.Review on Foreign Study of Information Privacy[J]. Library and Information Service, 2014, 58(13): 140-148.)
[9] Chen H, Beaudoin C E, Hong T.Securing Online Privacy: An Empirical Test on Internet Scam Victimization, Online Privacy Concerns, and Privacy Protection Behaviors[J]. Computers in Human Behavior, 2017, 70: 291-302.
[10] 朱光, 丰米宁, 张薇薇. 激励机制下图书馆信息安全管理的投入意愿研究——基于演化博弈的视角[J]. 数据分析与知识发现, 2018, 2(6): 13-24.
[10] (Zhu Guang, Feng Mining, Zhang Weiwei.Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach[J]. Data Analysis and Knowledge Discovery, 2018, 2(6): 13-24.)
[11] Lai J, Mu Y, Guo F, et al.Fully Privacy-Preserving and Revocable ID-Based Broadcast Encryption for Data Access Control in Smart City[J]. Personal & Ubiquitous Computing, 2017, 21(5): 855-868.
[12] Yue X, Wang H, Jin D, et al.Healthcare Data Gateways: Found Healthcare Intelligence on Block-Chain with Novel Privacy Risk Control[J]. Journal of Medical Systems, 2016, 40(10): 218.
[13] Poon C C Y, Zhang Y T, Bao S D. A Novel Biometrics Method to Secure Wireless Body Area Sensor Networks for Telemedicine and M-Health[J]. IEEE Communications Magazine, 2006, 44(4): 73-81.
[14] 孟大程, 罗恩韬, 王国军. 移动医疗中基于机会计算的安全和隐私保护模型[J]. 小型微型计算机系统, 2016, 37(12): 2643-2648.
[14] (Meng Dacheng, Luo Entao, Wang Guojun.Opportunity-Calculation-Based Secure and Privacy-Preserving Model for Mobile Healthcare[J]. Journal of Chinese Computer Systems, 2016, 37(12): 2643-2648.)
[15] Ameen M A, Liu J, Kwak K.Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications[J]. Journal of Medical Systems, 2012, 36(1): 93-101.
[16] Ozturk A B, Nusair K, Okumus F, et al.Understanding Mobile Hotel Booking Loyalty: An Integration of Privacy Calculus Theory and Trust-risk Framework[J]. Information Systems Frontiers, 2017, 19(4): 753-767.
[17] Rahman F, Bhuiyan M Z A, Ahamed S I. A Privacy Preserving Framework for RFID Based Healthcare Systems[J]. Future Generation Computer Systems, 2016, 72: 339-352.
[18] 曹靖, 伍林生. 医疗2.0时代背景下e-患者模式的构建[J]. 医学与哲学:A, 2017, 38(1): 65-67.
[18] (Cao Jing, Wu Linsheng.The Construction of E-patient Mode in the Time of Healthcare 2.0[J]. Medicine & Philosophy:Humanistic & Social Medicine Edition, 2017, 38(1) :65-67.)
[19] Jiang Z, Cheng S H, Choi B C F. Research Note—Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions[J]. Information Systems Research, 2013, 24(3): 579-595.
[20] Xu H, Teo H H, Tan B C Y, et al. Research Note—Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services[J]. Information Systems Research, 2012, 23(4): 1087-1383.
[21] Martin K D, Murphy P E.The Role of Data Privacy in Marketing[J]. Journal of the Academy of Marketing Science, 2017, 45(2): 135-155.
[22] 朱侯, 王可, 严芷君, 等. 基于隐私计算理论的 SNS 用户隐私悖论现象研究[J]. 情报杂志, 2017, 36(2): 134-139.
[22] (Zhu Hou, Wang Ke, Yan Zhijun, et al.An Analysis of Privacy Paradox Phenomenon in SNS Users Based on Privacy Calculus[J]. Journal of Intelligence, 2017, 36(2): 134-139.)
[23] Guo X, Zhang X, Sun Y.The Privacy-Personalization Paradox in mHealth Services Acceptance of Different Age Groups[J]. Electronic Commerce Research and Applications, 2016, 16: 55-65.
[24] Atienza A A, Zarcadoolas C, Vaughon W, et al.Consumer Attitudes and Perceptions on mHealth Privacy and Security: Findings from a Mixed-Methods Study[J]. Journal of Health Communication, 2015, 20(6): 673-679.
[25] Eikey E V, Murphy A R, Reddy M C, et al.Designing for Privacy Management in Hospitals: Understanding the Gap Between User Activities and IT Staff’s Understandings[J]. International Journal of Medical Informatics, 2015, 84(12): 1065-1075.
[26] Li T, Slee T.The Effects of Information Privacy Concerns on Digitizing Personal Health Records[J]. Journal of the Association for Information Science & Technology, 2014, 65(8): 1541-1554.
[27] 赵栋祥. 移动健康管理服务使用意愿的影响因素研究——基于创新扩散的视角[J]. 情报杂志, 2017, 36(11): 120-128.
[27] (Zhao Dongxiang.Empirical Research on the Influencing Factors of the Intention to Use of Mobile Health Management Service: From the Perspective of Innovation Diffusion[J]. Journal of Intelligence, 2017, 36(11): 120-128.)
[28] 张嵩, 赵佳丽, 吴剑云. LBS的隐私关注与采纳意向的模型构建及实证[J]. 计算机集成制造系统, 2018, 24(2): 524-532.
[28] (Zhang Song, Zhao Jiali, Wu Jianyun.Model Construction and Empirical Study on LBS’s Users’ Privacy Concern and Behavior Intention[J]. Computer Integrated Manufacturing Systems, 2018, 24(2): 524-532.)
[29] Gordon L A, Loeb M P.The Economics of Information Security Investment[J]. ACM Transactions on Information and System Security (TISSEC), 2002, 5(4): 438-457.
[30] Cavusoglu H, Mishra B, Raghunathan S.A Model for Evaluating IT Security Investments[J]. Communications of the ACM, 2004, 47(7): 87-92.
[31] Fielder A, Panaousis E, Malacaria P, et al.Decision Support Approaches for Cyber Security Investment[J]. Decision Support Systems, 2016, 86(6): 13-23.
[32] Gao X, Zhong W, Mei S.A Game-Theoretic Analysis of Information Sharing and Security Investment for Complementary Firms[J]. Journal of the Operational Research Society, 2014, 65(11): 1682-1691.
[33] Liu D, Ji Y, Mookerjee V.Knowledge Sharing and Investment Decisions in Information Security[J]. Decision Support Systems, 2012, 52(1): 95-107.
[34] Shokri R, Theodorakopoulos G, Troncoso C.Privacy Games Along Location Traces: A Game-Theoretic Framework for Optimizing Location Privacy[J]. ACM Transactions on Privacy and Security, 2017, 19(4): 11-41.
[35] Zhu F W, Carpenter S, Zhu W, et al.A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments[J]. International Journal of Information Security and Privacy, 2010, 4(4): 1-20.
[36] 顾建强, 梅姝娥, 仲伟俊. 考虑相互依赖性的信息系统安全投资及协调机制[J]. 运筹与管理, 2015, 24(6): 136-142.
[36] (Gu Jianqiang, Mei Shue, Zhong Weijun.Dynamic Coordination Mechanism of Information System Security Investment Based on Interdependent Security[J]. Operations Research and Management Science, 2015, 24(6): 136-142.)
[37] Deng X Y, Han D Q, Dezert J, et al.Evidence Combination from an Evolutionary Game Theory Perspective[J]. IEEE Transactions on Cybernetics, 2016, 46(9): 2070-2082.
[38] Deng X Y, Han D Q, Dezert J, et al.Evidence Combination from an Evolutionary Game Theory Perspective[J]. IEEE Transactions on Cybernetics, 2016, 46(9): 2070-2082.
[39] Guo S X.Environmental Options of Local Governments for Regional Air Pollution Joint Control: Application of Evolutionary Game Theory[J]. Economic and Political Studies, 2016, 4(3): 238-257
[40] Friedman D.On Economic Applications of Evolutionary Game Theory[J]. Journal of Evolutionary Economics, 1998, 8(1): 15-43.
[41] 纪颖, 宋波, 屈绍建. 基于众筹融资的决策博弈及合同机制研究[J]. 阅江学刊, 2018(3): 40-50.
[41] (Ji Ying, Song Bo, Qu Shaojian.Research on Decision-making Gaming and Contract Mechanism Based on Crowdfunding[J]. Yuejiang Academic Journal, 2018(3): 40-50.)
[1] Zhu Guang,Feng Mining,Zhang Weiwei. Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach[J]. 数据分析与知识发现, 2018, 2(6): 13-24.
[2] Zhang Liyi,Li Huiran. Studying Social Interaction of Online Medical Question-Answering Service[J]. 数据分析与知识发现, 2018, 2(1): 76-87.
[3] Zhang Zhixiong, Zhang Shanshan, Ku Liping, Li Lin. Survey and Analysis on Cognition and Using of arXiv for China Mainland Researchers[J]. 现代图书情报技术, 2014, 30(7): 1-8.
[4] Zhuang Mei, Wang Ping, Yang Jie, Chen Hong, Wang Yifei. Construction and Application of Assistant Management System for Regulation Violation Cases in Tsinghua University Library[J]. 现代图书情报技术, 2013, 29(7/8): 132-136.
[5] Wei Jing, Zhu Hengmin, Hong Xiaojuan, Song Ruixiao, Xu Zan. Study of Public Sentiment Transfer Based on Complex Online Network ——Evolutionary Game Angle[J]. 现代图书情报技术, 2013, 29(3): 65-70.
[6] Tong Zhaojuan, Xu Xin, Chen Chao. Research on Answer Format Regulation in Knowledge Base of Collaborative Virtual Reference System of Shanghai Library[J]. 现代图书情报技术, 2012, (9): 10-14.
[7] Yang Haiping. Study on the Technical Measures of Digital Publications[J]. 现代图书情报技术, 2004, 20(8): 70-73.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938