skip to main content


Title: A Privacy Concern: Bioinformatics and Storing Biodata
Security and privacy, regardless of the instance, are preponderating topics for most organizations. Bioinformatics and the study of computational biology are no exception. The premise of this report is to discuss the many different privacy concerns as it pertains to the field of bioinformatics, as well as the usage and storage of personal biodata. With the varying threats that target average users of technology, is the capability and infrastructure currently in place to protect users against a leakage or breach in personal data? This study discusses the different concerns surrounding the field of bioinformatics, how the data and personal information is currently stored, and will make recommendations on how to mitigate the risks associated with the usage and storage of personal biodata. This study includes interviews from bioinformaticians and industry professionals, a survey of adults who have the potential for impact, and current legislature that exists to address personal data protection.  more » « less
Award ID(s):
1458729
NSF-PAR ID:
10301437
Author(s) / Creator(s):
Date Published:
Journal Name:
The ADMI 2021 Symposium
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. null (Ed.)
    Background The use of wearables facilitates data collection at a previously unobtainable scale, enabling the construction of complex predictive models with the potential to improve health. However, the highly personal nature of these data requires strong privacy protection against data breaches and the use of data in a way that users do not intend. One method to protect user privacy while taking advantage of sharing data across users is federated learning, a technique that allows a machine learning model to be trained using data from all users while only storing a user’s data on that user’s device. By keeping data on users’ devices, federated learning protects users’ private data from data leaks and breaches on the researcher’s central server and provides users with more control over how and when their data are used. However, there are few rigorous studies on the effectiveness of federated learning in the mobile health (mHealth) domain. Objective We review federated learning and assess whether it can be useful in the mHealth field, especially for addressing common mHealth challenges such as privacy concerns and user heterogeneity. The aims of this study are to describe federated learning in an mHealth context, apply a simulation of federated learning to an mHealth data set, and compare the performance of federated learning with the performance of other predictive models. Methods We applied a simulation of federated learning to predict the affective state of 15 subjects using physiological and motion data collected from a chest-worn device for approximately 36 minutes. We compared the results from this federated model with those from a centralized or server model and with the results from training individual models for each subject. Results In a 3-class classification problem using physiological and motion data to predict whether the subject was undertaking a neutral, amusing, or stressful task, the federated model achieved 92.8% accuracy on average, the server model achieved 93.2% accuracy on average, and the individual model achieved 90.2% accuracy on average. Conclusions Our findings support the potential for using federated learning in mHealth. The results showed that the federated model performed better than a model trained separately on each individual and nearly as well as the server model. As federated learning offers more privacy than a server model, it may be a valuable option for designing sensitive data collection methods. 
    more » « less
  2. Fitness trackers are an increasingly popular tool for tracking one’s health and physical activity. While research has evaluated the potential benefits of these devices for health and well-being, few studies have empirically evaluated users’ behaviors when sharing personal fitness information (PFI) and the privacy concerns that stem from the collection, aggregation, and sharing of PFI. In this study, we present findings from a survey of Fitbit and Jawbone users (N=361) to understand how concerns about privacy in general and user- generated data in particular affect users’ mental models of PFI privacy, tracking, and sharing. Findings highlight the complex relationship between users’ demographics, sharing behaviors, privacy concerns, and internet skills with how valuable and sensitive they rate their PFI. We conclude with a discussion of opportunities to increase user awareness of privacy and PFI. 
    more » « less
  3. Fitness trackers are an increasingly popular tool for tracking one’s health and physical activity. While research has evaluated the potential benefits of these devices for health and well-being, few studies have empirically evaluated users’ behaviors when sharing personal fitness information (PFI) and the privacy concerns that stem from the collection, aggregation, and sharing of PFI. In this study, we present findings from a survey of Fitbit and Jawbone users (N=361) to understand how concerns about privacy in general and user- generated data in particular affect users’ mental models of PFI privacy, tracking, and sharing. Findings highlight the complex relationship between users’ demographics, sharing behaviors, privacy concerns, and internet skills with how valuable and sensitive they rate their PFI. We conclude with a discussion of opportunities to increase user awareness of privacy and PFI. 
    more » « less
  4. null (Ed.)
    Amazon's voice-based assistant, Alexa, enables users to directly interact with various web services through natural language dialogues. It provides developers with the option to create third-party applications (known as Skills) to run on top of Alexa. While such applications ease users' interaction with smart devices and bolster a number of additional services, they also raise security and privacy concerns due to the personal setting they operate in. This paper aims to perform a systematic analysis of the Alexa skill ecosystem. We perform the first large-scale analysis of Alexa skills, obtained from seven different skill stores totaling to 90,194 unique skills. Our analysis reveals several limitations that exist in the current skill vetting process. We show that not only can a malicious user publish a skill under any arbitrary developer/company name, but she can also make backend code changes after approval to coax users into revealing unwanted information. We, next, formalize the different skill-squatting techniques and evaluate the efficacy of such techniques. We find that while certain approaches are more favorable than others, there is no substantial abuse of skill squatting in the real world. Lastly, we study the prevalence of privacy policies across different categories of skill, and more importantly the policy content of skills that use the Alexa permission model to access sensitive user data. We find that around 23.3% of such skills do not fully disclose the data types associated with the permissions requested. We conclude by providing some suggestions for strengthening the overall ecosystem, and thereby enhance transparency for end-users. 
    more » « less
  5. null (Ed.)
    Abstract Clean technologies aim to address climatic, environmental, and health concerns associated with their conventional counterparts. However, such technologies achieve these goals only if they are adopted by users and effectively replace conventional practices. Despite the important role that users play to accomplish these goals by making decisions whether to adopt such clean alternatives or not, currently, there is no systematic framework for quantitative integration of the behavioral motivations of users during the design process for these technologies. In this study, the theory of planned behavior (TPB) is integrated with usage-context-based design to provide a holistic approach for predicting the market share of clean versus conventional product alternatives based on users’ personal beliefs, social norms, and perception of behavioral control. Based on the mathematical linkage of the model components, technology design attributes can then be adjusted, resulting in the design of products that are more in line with users’ behavioral intentions, which can lead to higher adoption rates. The developed framework is applied in a case study of adoption of improved cookstoves in a community in Northern Uganda. Results indicate that incorporating TPB attributes into utility functions improves the prediction power of the model and that the attributes that users in the subject community prioritize in a clean cookstove are elicited through the TPB. Households’ decision-making behavior before and after a trial period suggests that design and marketing strategy should systematically integrate user’s behavioral tendencies prior to interventions to improve the outcomes of clean technology implementation projects. 
    more » « less