Bodies Like Yours: Enquiring Data Privacy in FemTech

被引:6
|
作者
Almeida, Teresa [1 ]
Shipp, Laura [2 ]
Mehrnezhad, Maryam [2 ]
Toreini, Ehsan [3 ]
机构
[1] Univ Lisbon, Inst Super Tecn, ITI LARSyS, Lisbon, Portugal
[2] Newcastle Univ, Newcastle Upon Tyne, Tyne & Wear, England
[3] Univ Durham, Durham, England
来源
ADJUNCT PROCEEDINGS OF THE 12TH NORDIC CONFERENCE ON HUMAN-COMPUTER INTERACTION, NORDICHI 2022 | 2022年
基金
英国工程与自然科学研究理事会;
关键词
Intimate Data; FemTech; Privacy; Security; Collective Privacy;
D O I
10.1145/3547522.3547674
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The digitalisation of the reproductive body has seen a myriad of cutting-edge technologies to prioritise neglected intimate health and care topics, such as fertility and contraception. The impact of these intimate data on livelihood and society is pervasive including that privacy is critical to safeguarding security as this increasing digitalisation also produces increasingly large datasets. In this paper, we enquire the collective nature of privacy in female-oriented technologies (FemTech) to show how this ever-extending collection of data implicates many beyond the individual. We introduce a pilot study on the data collection practices of a subset of FemTech devices with fertility tracking service. We demonstrate that data is collected about the user and others, such as their immediate relationships and user groups as a whole. We suggest that it is critical we ask who is vulnerable and discuss approaches to mitigate collective harm.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Privacy and data protection in cloud scenarios
    Samarati, Pirengila
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 8 - 8
  • [22] Security and Privacy Challenges in Big Data
    Wadhwa, Bhawna
    Tomar, Parul
    PROCEEDINGS OF THIRD DOCTORAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE, DOSCI 2022, 2023, 479 : 821 - 837
  • [23] Big Data security and privacy techniques
    El Haourani, Lamia
    Kalam, Anas Abou El
    Ouahman, Abdellah Ait
    3RD INTERNATIONAL CONFERENCE ON NETWORKING, INFORMATION SYSTEM & SECURITY (NISS'20), 2020,
  • [24] A Comparative Analysis of Differential Privacy Vs other Privacy Mechanisms for Big Data
    Begum, Sayyada Hajera
    Nausheen, Farha
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 512 - 516
  • [25] PRIVACY, CONSUMER TRUST AND BIG DATA: PRIVACY BY DESIGN AND THE 3 C'S
    Chibba, Michelle
    Cavoukian, Ann
    2015 ITU KALEIDOSCOPE: TRUST IN THE INFORMATION SOCIETY (K-2015), 2015, : 235 - 239
  • [26] An Effective Data Privacy Protection Algorithm Based on Differential Privacy in Edge Computing
    Qiao, Yi
    Liu, Zhaobin
    Lv, Haoze
    Li, Minghui
    Huang, Zhiyi
    Li, Zhiyang
    Liu, Weijiang
    IEEE ACCESS, 2019, 7 : 136203 - 136213
  • [27] Privacy Perceptions on Personal Data and Data Breaches in South Africa
    Nyoni, Phillip
    Velempini, Mthulisi
    Mavetera, Nehemiah
    AFRICAN JOURNAL OF INFORMATION SYSTEMS, 2024, 16 (03):
  • [28] A framework for data privacy and security accountability in data breach communications
    Thomas, Louise
    Gondal, Iqbal
    Oseni, Taiwo
    Firmin, Selena
    COMPUTERS & SECURITY, 2022, 116
  • [29] Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures
    Itani, Wassim
    Kayssi, Ayman
    Chehab, Ali
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 711 - 716
  • [30] Privacy-preserving collaborative data mining
    Zhan, J
    Chang, LW
    Matwin, S
    FOUNDATIONS AND NOVEL APPROACHES IN DATA MINING, 2006, 9 : 213 - +