iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://unpaywall.org/10.1007/978-3-030-72379-8_22
Privacy by Design for Neuropsychological Studies Based on an mHealth App | SpringerLink
Skip to main content

Privacy by Design for Neuropsychological Studies Based on an mHealth App

  • Conference paper
  • First Online:
Biomedical Engineering Systems and Technologies (BIOSTEC 2020)

Abstract

mHealth applications provide a huge potential to integrate neuropsychological rehabilitation into the everyday life of patients with executive dysfunctions by supporting them in daily activities and achieving personal goals. In the context of intervention studies it is important to gain insight in the usage of these applications by patients as an additional measurement beside neuropsychological pre- and post-tests. On the other hand, measuring usage of mobile applications constitutes a privacy risk for users. In this article the neuropsychological intervention study is described and a concept for privacy-preserving metrics with a focus on data minimization is derived from research questions. These considerations are then incorporated in a thorough privacy by design and privacy by default design process for the mHealth app.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Aschenbrenner, S., Tucha, O., Lange, K.W.: Regensburger Wortflüssigkeits-Test. Hogrefe (2000)

    Google Scholar 

  2. Atkinson, R.C., Shiffrin, R.M.: The control of short-term memory. Sci. Am. 225(2), 82–91 (1971)

    Article  Google Scholar 

  3. Baddeley, A.D., Hitch, G.: Working memory. In: Bower, G.H. (ed.) Psychology of Learning and Motivation, vol. 8, pp. 47–89. Academic Press (1974). https://doi.org/10.1016/S0079-7421(08)60452-1, http://www.sciencedirect.com/science/article/pii/S0079742108604521

  4. Bertens, D., Fasotti, L., Boelen, D.H., Kessels, R.P.: A randomized controlled trial on errorless learning in goal management training: study rationale and protocol. BMC Neurol. 13(1), 64 (2013). https://doi.org/10.1186/1471-2377-13-64

    Article  Google Scholar 

  5. Bonawitz, K., et al.: Practical secure aggregation for privacy preserving machine learning. Cryptology ePrint Archive, Report 2017/281 (2017). https://eprint.iacr.org/2017/281

  6. Brooke, J.: SUS - a quick and dirty usability scale. Usability Eval. Ind. 189(194), 4–7 (1996). http://www.usabilitynet.org/trump/documents/Suschapt.doc

  7. Cafazzo, J.A., Casselman, M., Hamming, N., Katzman, D.K., Palmert, M.R.: Design of an mHealth App for the self-management of adolescent type 1 diabetes: a pilot study. J. Med. Internet Res. 14(3), e70 (2012). https://doi.org/10.2196/jmir.2058

    Article  Google Scholar 

  8. Colesky, M., Hoepman, J.H., Hillen, C.: A critical analysis of privacy design strategies. In: 2016 IEEE Security and Privacy Workshops (SPW), pp. 33–40 (2016). https://doi.org/10.1109/SPW.2016.23

  9. Colesky, M., et al.: Privacy patterns. https://privacypatterns.org/. Accessed 10 June 2020

  10. Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1–19. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-79228-4_1

    Chapter  MATH  Google Scholar 

  11. Emmanouel, A.: Look at the frontal side of life: anterior brain pathology and everyday executive function: assessment approaches and treatment. Ph.D. thesis, Radboud University (2017). http://repository.ubn.ru.nl/handle/2066/166754

  12. Regulation (EU) 2016/679 of the European parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95/46/EC (general data protection regulation). Official Journal of the European Union L119, pp. 1–88, May 2016. http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=OJ:L:2016:119:TOC

  13. Gabel, A., Ertas, F., Pleger, M., Schiering, I., Müller, S.: Privacy-preserving metrics for an mHealth App in the context of neuropsychological studies. In: Proceedings of the 13th International Joint Conference on Biomedical Engineering Systems and Technologies - Volume 5: HEALTHINF, pp. 166–177. SciTePress (2020). https://doi.org/10.5220/0008982801660177, https://www.scitepress.org/DigitalLibrary/Link.aspx?doi=10.5220/0008982801660177

  14. Gabel, A., Schiering, I.: Privacy patterns for pseudonymity. In: Kosta, E., Pierson, J., Slamanig, D., Fischer-Hübner, S., Krenn, S. (eds.) Privacy and Identity 2018. IAICT, vol. 547, pp. 155–172. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-16744-8_11

    Chapter  Google Scholar 

  15. Gabel, A., Schiering, I., Müller, S.V., Ertas, F.: mHealth applications for goal management training - privacy engineering in neuropsychological studies. In: Hansen, M., Kosta, E., Nai-Fovino, I., Fischer-Hübner, S. (eds.) Privacy and Identity 2017. IAICT, vol. 526, pp. 330–345. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-92925-5_22

    Chapter  Google Scholar 

  16. Garcia-Ceja, E., Osmani, V., Mayora, O.: Automatic stress detection in working environments from smartphones’ accelerometer data: a first step. IEEE J. Biomed. Health Inform. 20(4), 1053–1060 (2016). https://doi.org/10.1109/JBHI.2015.2446195

    Article  Google Scholar 

  17. Goodfellow, I., et al.: Generative adversarial nets. In: Ghahramani, Z., Welling, M., Cortes, C., Lawrence, N.D., Weinberger, K.Q. (eds.) Advances in Neural Information Processing Systems 27, pp. 2672–2680. Curran Associates, Inc. (2014). https://papers.nips.cc/paper/5423-generative-adversarial-nets

  18. Grünerbl, A., et al.: Smartphone-based recognition of states and state changes in bipolar disorder patients. IEEE J. Biomed. Health Inform. 19(1), 140–148 (2015). https://doi.org/10.1109/JBHI.2014.2343154

    Article  Google Scholar 

  19. Hafiz, M.: A pattern language for developing privacy enhancing technologies. Softw. Pract. Exp. 43(7), 769–787 (2013)

    Article  Google Scholar 

  20. Hansen, M., Jensen, M., Rost, M.: Protection goals for privacy engineering. In: 2015 IEEE Security and Privacy Workshops, pp. 159–166, May 2015. https://doi.org/10.1109/SPW.2015.13

  21. Härting, C., Markowitsch, H.J., Neufeld, H., Calabrese, P., Deisinger, K., Kessler, J.: Wechsler Gedächtnistest - Revidierte Fassung: WMS-R (2000)

    Google Scholar 

  22. Huckvale, K., Prieto, J.T., Tilney, M., Benghozi, P.J., Car, J.: Unaddressed privacy risks in accredited health and wellness apps: a cross-sectional systematic assessment. BMC Med. 13, 214 (2015). https://doi.org/10.1186/s12916-015-0444-y

    Article  Google Scholar 

  23. Karras, T., Laine, S., Aittala, M., Hellsten, J., Lehtinen, J., Aila, T.: Analyzing and improving the image quality of StyleGAN. In: The IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), June 2020

    Google Scholar 

  24. Kiresuk, T.J., Sherman, R.E.: Goal attainment scaling: a general method for evaluating comprehensive community mental health programs. Community Mental Health J. 4(6), 443–453 (1968). https://doi.org/10.1007/BF01530764

    Article  Google Scholar 

  25. Kleiman, E.M., et al.: Digital phenotyping of suicidal thoughts, July 2018. https://doi.org/10.1002/da.22730, https://onlinelibrary.wiley.com/doi/abs/10.1002/da.22730

  26. Knorr, K., Aspinall, D.: Security testing for Android mHealth apps. In: 2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), pp. 1–8, April 2015. https://doi.org/10.1109/ICSTW.2015.7107459

  27. Levine, B., et al.: Rehabilitation of executive functioning: an experimental-clinical validation of goal management training. J. Int. Neuropsychol. Soc. 6(3), 299–312 (2000). https://doi.org/10.1017/S1355617700633052

    Article  Google Scholar 

  28. Levine, B., et al.: Rehabilitation of executive functioning: an experimental-clinical validation of goal management training. J. Int. Neuropsychol. Soc. 6(3), 299–312 (2000). https://doi.org/10.1017/S1355617700633052, https://www.cambridge.org/core/journals/journal-of-the-international-neuropsychological-society/article/rehabilitation-of-executive-functioning-an-experimentalclinical-validation-of-goal-management-training/79A6CAE70C3703008D083F64F34246D8

  29. Levine, B., et al.: Rehabilitation of executive functioning in patients with frontal lobe brain damage with goal management training. Front. Hum. Neurosci. 5 (2011). https://doi.org/10.3389/fnhum.2011.00009, https://www.frontiersin.org/articles/10.3389/fnhum.2011.00009/full

  30. Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: privacy beyond k-anonymity and l-diversity. In: 2007 IEEE 23rd International Conference on Data Engineering, pp. 106–115, April 2007. https://doi.org/10.1109/ICDE.2007.367856, ISSN 2375-026X

  31. Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1), 3-es (2007). https://doi.org/10.1145/1217299.1217302

  32. Martínez-Pérez, B., de la Torre-Díez, I., López-Coronado, M.: Privacy and security in mobile health apps: a review and recommendations. J. Med. Syst. 39(1), 1–8 (2014). https://doi.org/10.1007/s10916-014-0181-3

    Article  Google Scholar 

  33. McMahan, B., Ramage, D., Talwar, K., Zhang, L.: Learning differentially private recurrent language models. In: International Conference on Learning Representations (ICLR) (2018). https://openreview.net/pdf?id=BJ0hF1Z0b

  34. Mense, A., Steger, S., Sulek, M., Jukic-Sunaric, D., Mészáros, A.: Analyzing privacy risks of mHealth applications. Stud. Health Technol. Inform. 221, 41–45 (2016). https://doi.org/10.3233/978-1-61499-633-0-41

    Article  Google Scholar 

  35. Mohr, D.L., Zhang, M., Schueller, S.M.: Personal sensing: understanding mental health using ubiquitous sensors and machine learning. Annu. Rev. Clin. Psychol. 13, 23–47 (2017). https://doi.org/10.1146/annurev-clinpsy-032816-044949

    Article  Google Scholar 

  36. Müller, S.V., Ertas, F., Aust, J., Gabel, A., Schiering, I.: Kann eine mobile Anwendung helfen abzuwaschen? Zeitschrift für Neuropsychologie 30(2), 123–131 (2019). https://doi.org/10.1024/1016-264X/a000256

  37. Müller, S.V.: Störungen der Exekutivfunktionen. Hogrefe (2013)

    Google Scholar 

  38. Onnela, J.P., Rauch, S.L.: Harnessing smartphone-based digital phenotyping to enhance behavioral and mental health. Neuropsychopharmacology 41(7), 1691–1696 (2016). https://doi.org/10.1038/npp.2016.7

    Article  Google Scholar 

  39. Papageorgiou, A., Strigkos, M., Politou, E., Alepis, E., Solanas, A., Patsakis, C.: Security and privacy analysis of mobile health applications: the alarming state of practice. IEEE Access 6, 9390–9403 (2018). https://doi.org/10.1109/ACCESS.2018.2799522

    Article  Google Scholar 

  40. Reitan, R.: Trail-Making Test. Reitan Neuropsychology Laboratory, Arizona (1979)

    Google Scholar 

  41. Robertson, I.: Goal Management Training: A Clinical Manual. PsyConsult, Cambridge (1996)

    Google Scholar 

  42. Schneider, W., Shiffrin, R.M.: Controlled and automatic human information processing: I. Detection, search, and attention. Psychol. Rev. 84(1), 1–66 (1977). https://doi.org/10.1037/0033-295X.84.1.1

  43. Stamenova, V., Levine, B.: Effectiveness of goal management training® in improving executive functions: a meta-analysis. Neuropsychol. Rehabil., 1–31 (2018). https://doi.org/10.1080/09602011.2018.1438294

  44. Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. (2012). https://doi.org/10.1142/S0218488502001648, http://www.worldscientific.com/doi/abs/10.1142/S0218488502001648

  45. Treacy, C., McCaffery, F.: Data security overview for medical mobile apps. Int. J. Adv. Secur. 9(3 & 4), 2016 (2016)

    Google Scholar 

  46. Tucha, O., Lange, K.W.: TL-D: Turm von London - Deutsche Version (2004)

    Google Scholar 

  47. Wilson, B.A., Alderman, N., Burgess, P.W., Emslie, H., Evans, J.J.: Behavioural Assessment of the Dysexecutive Syndrome. Harcourt Assessment, San Antonio (1996)

    Google Scholar 

  48. Zimmermann, P., Fimm, B.: TAP Testbatterie zur Aufmerksamkeitsprüfung. Vera Fimm, Psychologische Testsysteme (2017)

    Google Scholar 

Download references

Acknowledgements

This work was supported by the Ministry for Science and Culture of Lower Saxony as part of SecuRIn (VWZN3224).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alexander Gabel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gabel, A., Ertas, F., Pleger, M., Schiering, I., Müller, S.V. (2021). Privacy by Design for Neuropsychological Studies Based on an mHealth App. In: Ye, X., et al. Biomedical Engineering Systems and Technologies. BIOSTEC 2020. Communications in Computer and Information Science, vol 1400. Springer, Cham. https://doi.org/10.1007/978-3-030-72379-8_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-72379-8_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-72378-1

  • Online ISBN: 978-3-030-72379-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics