Page 171 - ITU KALEIDOSCOPE, ATLANTA 2019
P. 171

ICT for Health: Networks, standards and innovation




           have been proposed for this challenge include MeD-lights, a         REFERENCES
           system that uses the traffic light metaphor (i.e. red, yellow,
           green) to indicate and label the sensitivity levels of personal   [1]   K. Schwab, “The Fourth Industrial Revolution:
           health  data  [37].  The  MeD-lights  system  provides  a   what it means, how to respond,” Foreign Affairs,
           mechanism for an intuitive specification of the privacy and   Dec. 2015.
           confidentiality requirements associated with personal health
           data. In this solution, the challenge of forfeiting control, at a   [2]   L. Floridi, The 4th revolution : how the infosphere
           technology level, once data is shared, is not addressed.    is reshaping human reality. Oxford University
                                                                    Press, 2014.
           Mortier et al. [31] have proposed the concept of a databox,
           initially conceived as a distributed system for the federation   [3]   World Health Organization, “Resolution
           of personal health data, providing APIs to access data held   WHA71.7,” Resolut. deliberations eHealth, no.
           in  the  personal  databoxes,  and  fundamentally  moving  the   May, 2018.
           code  and processing  to  data,  such  that  only  results  of  the
           requested  computation  are  communicated  to  third  parties,   [4]   I. Li, A. Dey, and J. Forlizzi, “A stage-based model
           without releasing personal data. The design of the databox is   of personal informatics systems,” in Proceedings of
           informed by the requirements for it to be a trusted platform,   the 28th international conference on Human factors
           to provide for data management, enabled controlled access,   in computing systems - CHI ’10, 2010, p. 557.
           and to enable incentives for all parties. While the databox in
           this solution has some similarities to the functionality of the   [5]   A. Marcengo and A. Rapp, “Visualization of human
           DataAgent,  the  primary  difference  is  that  the  databox   behavior data: the quantified self,” Innov.
           provides a federated repository to various data sources and   approaches data Vis. Vis. Anal., vol. 1, pp. 236--
           accepts code requests for execution on the personal data. The   265, 2014.
           DataAgent  provides  data  sharing  through  agent  mobility,
           which is coupled with the functionality to manage the use of   [6]   J.E. Mai, “Big data privacy: The datafication of
           the data within the specific context.                    personal information,” Inf. Soc., vol. 32, no. 3, pp.
                                                                    192–199, May 2016.
           The  PHIX  architecture  is  consistent  with  both  the  digital
           phenotype  perspective  [34],  as  well  as  the  notion  of  a   [7]   K. Crawford, J. Lingel, and T. Karppi, “Our
           digital/virtual ‘data double’ that is endowed with both data   metrics, ourselves: A hundred years of self-tracking
           and  functionality.  Invariably,  the  proposed  architecture  is   from the weight scale to the wrist wearable device,”
           framed to deal with a very specific narrowly defined scenario   Eur. J. Cult. Stud., vol. 18, no. 4–5, pp. 479--496,
           (i.e. sharing of personal health informatics data with a health   2015.
           service  provider)  that  neglects  some  of  the  challenges
           experienced  in  personal  health  informatics,  such  as  N-  [8]   D. Boyd and K. Crawford, “Critical Questions for
           dimensional attribute of data associated with the social and   Big Data,” Information, Commun. Soc., vol. 15, no.
           communal ownership of data.                              5, pp. 662–679, Jun. 2012.

                          6.  CONCLUSION                      [9]   F. Henwood, S. Wyatt, A. Hart, and J. Smith,
                                                                    “‘Ignorance is bliss sometimes’: Constraints on the
           The use of technology and data in and by society needs to be   emergence of the ‘informed patient’ in the changing
           on terms that are consistent with the values and the ethical   landscapes of health information,” Sociol. Heal.
           standards  of  a  society.  As  far  as  digital  health  and  health   Illn., vol. 25, no. 6, pp. 589–607, 2003.
           informatics  are  concerned,  the  data  justice  principles
           encapsulated  in  frameworks  such  as  the  HDI,  stand  to   [10]   D. Lupton, “The digitally engaged patient: Self-
           provide  guidelines  that  can  inform  the  development  and   monitoring and self-care in the digital health era,”
           implementation  of  digital  health  technology  solutions.   Soc. Theory Heal., vol. 11, no. 3, pp. 256–270,
           Operationalizing  such  ethical  principles  and  value   Aug. 2013.
           frameworks is non-trivial and requires that the principles are
           translated and decomposed into specific constitutive system   [11]   J. O. Prochaska and W. F. Velicer, “The
           requirements.  This  paper  has  explored  and  presented  an   Transtheoretical Model of Health Behavior
           investigation  of  data  justice  in  health  informatics  and  has   Change,” Am. J. Heal. Promot., vol. 12, no. 1, pp.
           suggested  the  operationalization  of  the  HDI  negotiability   38–48, Sep. 1997.
           requirements of (perpetual) control and contextual integrity
           through a MAS-based PHIX architecture that encapsulates   [12]   D. A. Epstein, A. Ping, J. Fogarty, and S. A.
           individuals’ data in a dynamic, mobile, virtual ‘data double’   Munson, “A lived informatics model of personal
           DataAgent component.                                     informatics,” in Proceedings of the 2015 ACM
                                                                    International Joint Conference on Pervasive and
                                                                    Ubiquitous Computing - UbiComp ’15, 2015, pp.
                                                                    731–742.




                                                          – 151 –
   166   167   168   169   170   171   172   173   174   175   176