Access the full text.
Sign up today, get DeepDyve free for 14 days.
Tarleton Gillespie, P. Boczkowski (2013)
The Relevance of Algorithms
J. Kopstein (2016)
UK hospitals are feeding 1.6 million patients’ health records to Google’s AI. Vice
Kirsty Best (2010)
Living in the control societyInternational Journal of Cultural Studies, 13
Roxanne Nelson (2008)
HealthMap: the future of infectious diseases surveillance?The Lancet. Infectious Diseases, 8
K. Haggerty, R. Ericson (2006)
The New Politics of Surveillance and Visibility
Michael Buratowski (2016)
The DNC server breach: who did it and what does it mean?Netw. Secur., 2016
Ted Striphas (2015)
Algorithmic cultureEuropean Journal of Cultural Studies, 18
A. Galloway (2006)
Gaming: Essays On Algorithmic Culture
W. Hartzog, E. Selinger (2013)
Quitters never win: the costs of leaving social mediaThe Atlantic
M. Andrejevic (2002)
The Work of Watching One Another: Lateral Surveillance, Risk, and Governancesurveillance and society, 2
Daniel Solove (2012)
Privacy Self-Management and the Consent DilemmaGeorge Washington University Law School
B.K. Adams (2013)
If you don’t like Facebook, you can leave – it’s easier than you think
Gregory Asmolov (2015)
Crowdsourcing and the folksonomy of emergency response: the construction of a mediated subject
(2008)
Guide for businesses and organizations on the personal information protection act
J. Kotenko (2013)
This scary-useful site plots illness-related social media posts on a map
(2017)
Reporting a privacy breach to the commissioner
(2016)
mHealth app developer economics 2016
D. Lyon (2006)
Theorizing surveillance : the panopticon and beyond
Policy Options
G. Steelfisher, R. Blendon, Narayani Lasala-Blanco (2015)
Ebola in the United States--Public Reactions and Implications.The New England journal of medicine, 373 9
K. Huckvale, José Prieto, M. Tilney, Pierre Benghozi, J. Car (2015)
Unaddressed privacy risks in accredited health and wellness apps: a cross-sectional systematic assessmentBMC Medicine, 13
S. Shead (2016)
Google has access to medical data on 1.6 million NHS patientsBusiness Insider
Frank Pasquale (2015)
The Black Box Society: The Secret Algorithms That Control Money and Information
Karl Palmås (2010)
Predicting what you'll do tomorrow: Panspectric surveillance and the contemporary corporationsurveillance and society, 8
Ahmad Jusmin, Syahnur Said, M. Bima, Roslina Alam (2016)
Specific Determinants of Work Motivation, Competence, Organizational Climate, Job Satisfaction and Individual Performance: A Study among LecturersJournal of business management, 4
K. Haggerty, R. Ericson (2000)
The surveillant assemblage.The British journal of sociology, 51 4
L. Gilpin (2014)
How an algorithm detected the Ebola outbreak a week early, and what it could do next
(2010)
PIPEDA for business: what you need to know about protecting your customers’ privacy
Dongjing He, Muhammad Naveed, Carl Gunter, K. Nahrstedt (2014)
Security Concerns in Android mHealth AppsAMIA ... Annual Symposium proceedings. AMIA Symposium, 2014
B. Koops (2014)
The trouble with European data protection lawInternational Data Privacy Law, 4
(2011)
Guidelines and practices manual
(2011)
Crowdsourcing as user-driven innovation
G. Elmer (2003)
A Diagram of Panoptic SurveillanceNew Media & Society, 5
Daniel Solove (2013)
Introduction: Privacy Self-Management and the Consent DilemmaHarvard Law Review, 126
(2016)
FTC releases new guidance for developers of mobile health apps
D. Lazer, R. Kennedy (2015)
What we can learn from the epic failure of Google flu trendsWired
Henry Jenkins (2006)
Convergence Culture: Where Old and New Media Collide
(2017)
The long arm of the European privacy regulator: does the new EU GDPR reach US media companies?
G. Deleuze (2017)
Postscript on the Societies of Control
K. Mitchener, Gary Richardson (2020)
Contagion of FearMonetary Economics: Financial System & Institutions eJournal
Barbara Filkins, J. Kim, Bruce Roberts, Winston Armstrong, Mark Miller, M. Hultner, A. Castillo, Jean-Christophe Ducom, E. Topol, S. Steinhubl (2016)
Privacy and security in the era of digital health: what should translational researchers know and do about it?American journal of translational research, 8 3
L. Ackerman (2013)
Mobile health and fitness applications and information privacy: report to California consumer protection foundation
(2014)
Second annual report
(2013)
Mobile healthcare apps
E. Mykhalovskiy, Lorna Weir (2006)
The Global Public Health Intelligence Network and early warning outbreak detection: a Canadian contribution to global public health.Canadian journal of public health = Revue canadienne de sante publique, 97 1
G. Gorman (2012)
From deception to deceit: Google and privacy? Don’t make me laughOnline Information Review, 36
Y. Benkler (2006)
The wealth of networks: how social production transforms markets and freedom
D. Grewal (2008)
Network Power: The Social Dynamics of Globalization
Harvard Law Review, 126
Lisa Parker, T. Karliychuk, D. Gillies, B. Mintzes, M. Raven, Q. Grundy (2017)
A health app developer’s guide to law and policy: a multi-sector policy analysisBMC Medical Informatics and Decision Making, 17
Frank Kleemann, G. Voß, K. Rieder (2008)
Un(der)paid innovators: the commercial utilization of consumer work through crowdsourcing, 4
Gordon Hull (2015)
Successful failure: what Foucault can teach us about privacy self-management in a world of Facebook and big dataEthics and Information Technology, 17
D. Lazer, Ryan Kennedy, Gary King, A. Vespignani (2014)
The Parable of Google Flu: Traps in Big Data AnalysisScience, 343
(2013)
Getting accountability right with a privacy management program
D. Armstrong (1995)
The rise of surveillance medicineSociology of Health and Illness, 17
A. Helm, Daniel Georgatos (2014)
Privacy and mHealth: How Mobile Health 'Apps' Fit into a Privacy Framework Not Limited to HIPAASocial Science Research Network
K. Miller (2014)
Health agencies track outbreaks on social media
M. Castells (2011)
A Network Theory of Power
C. Tankard (2016)
What the GDPR means for businessesNetw. Secur., 2016
Kathleen McNutt (2014)
Public engagement in the Web 2.0 era: Social collaborative technologies in a public sector contextCanadian Public Administration-administration Publique Du Canada, 57
B. Light, J. Burgess, Stefanie Duguay (2018)
The walkthrough method: An approach to the study of appsNew Media & Society, 20
C. Fuchs (2013)
Class and exploitation on the internet
Syracuse Law Review, 64
A. Cavoukian (2004)
A guide to the personal health information protection act
M. Castells (2007)
Communication Power and Counter-power in the Network SocietyJournal of Communications
V. Mosco (2014)
To the Cloud: Big Data in a Turbulent World
Carlo Caduff (2014)
Sick Weather Ahead: On Data-Mining, Crowd-Sourcing and White NoiseCambridge Anthropology, 32
(2015)
Guiding principles for physicians recommending mobile health applications to patients
F. Manjoo (2009)
You have no friendsSlate
(2014)
Trafficking in the Zombie: the CDC Zombie apocalypse campaign, diseaseability and pandemic culture
W. Voss (2017)
European Union Data Privacy Law Reform: General Data Protection Regulation, Privacy Shield, and the Right to DelistingBusiness Lawyer, 72
Traditional public health methods for tracking contagious diseases are increasingly complemented with digital tools, which use data mining, analytics and crowdsourcing to predict disease outbreaks. In recent years, alongside these public health tools, commercial mobile apps such as Sickweather have also been released. Sickweather collects information from across the web, as well as self-reports from users, so that people can see who is sick in their neighborhood. The purpose of this paper is to examine the privacy and surveillance implications of digital disease tracking tools.Design/methodology/approachThe author performed a content and platform analysis of two apps, Sickweather and HealthMap, by using them for three months, taking regular screenshots and keeping a detailed user journal. This analysis was guided by the walkthrough method and a cultural-historical activity theory framework, taking note of imagery and other content, but also the app functionalities, including characteristics of membership, “rules” and parameters of community mobilization and engagement, monetization and moderation. This allowed me to study HealthMap and Sickweather as modes of governance that allow for (and depend upon) certain actions and particular activity systems.FindingsDraw on concepts of network power, the surveillance assemblage, and Deleuze’s control societies, as well as the data gathered from the content and platform analysis, the author argues that disease tracking apps construct disease threat as omnipresent and urgent, compelling users to submit personal information – including sensitive health data – with little oversight or regulation.Originality/valueDisease tracking mobile apps are growing in popularity yet have received little attention, particularly regarding privacy concerns or the construction of disease risk.
Online Information Review – Emerald Publishing
Published: Oct 9, 2019
Keywords: Surveillance; Privacy; Mobile apps; Data; Disease tracking; Surveillance medicine
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.