Mental Health Apps Deceptively Selling Data, Human-Centered Computing Expert, Dr. Kelly Caine, Interview and Reflections




InfoSec ICU show

Summary: Steve and Gerry discuss recent research discovering mental health applications that are sharing personal data without informing the user, and the implications this practice has for individuals. Clemson’s Dr. Kelly Caine is interviewed on her work around her paper “Privacy is Health” and the bioethical implications of technology diagnosing individuals that are not seeking treatment.<br> As always they end with One Cool Thing.<br> <a href="https://podcast.musc.edu/podcast/infosec/e73-infosecicu/" target="_blank" rel="noopener noreferrer">Show Notes</a><br> <br> Resources:<br> Mental Health Apps Selling Data<br> <a href="https://www.theverge.com/2019/4/20/18508382/apps-mental-health-smoking-cessation-data-sharing-privacy-facebook-google-advertising" target="_blank" rel="noopener noreferrer">https://www.theverge.com/2019/4/20/18508382/apps-mental-health-smoking-cessation-data-sharing-privacy-facebook-google-advertising</a><br> Privacy is Health<br> <a href="https://kellycaine.files.wordpress.com/2010/11/2016-ieee-pervasive-column-privacy-is-healthy-caine.pdf" target="_blank" rel="noopener noreferrer">https://kellycaine.files.wordpress.com/2010/11/2016-ieee-pervasive-column-privacy-is-healthy-caine.pdf</a><br> Dr. Kelly Caine: twitter: @kellycaine<br> <br> Clemson Human Technology Lab: <br> <a href="http://www.hatlab.org/">www.hatlab.org</a><br> <br> Wearable Platforms for mHealth Research<br> <a href="https://auracle-project.org/" target="_blank" rel="noopener noreferrer">https://auracle-project.org/</a><br> <a href="https://amulet-project.org/" target="_blank" rel="noopener noreferrer">https://amulet-project.org/</a><br> <br> HomeSHARE initiative is a geographically distributed test-bed to design, develop, and evaluate pervasive home-based technologies for aging-in-place.<br> <a href="https://crihomeshare.wordpress.com/" target="_blank" rel="noopener noreferrer">https://crihomeshare.wordpress.com/</a><br> <br> Kellie Caine’s book: <br> <a href="https://www.amazon.com/Understanding-Your-Users-Requirements-Technologies/dp/1558609350" target="_blank" rel="noopener noreferrer">https://www.amazon.com/Understanding-Your-Users-Requirements-Technologies/dp/1558609350</a><br> One Cool Thing<br> 20 year anniversary of laser mouse<br> <a href="https://gizmodo.com/20-years-ago-microsoft-changed-how-we-mouse-forever-1834274151" target="_blank" rel="noopener noreferrer">https://gizmodo.com/20-years-ago-microsoft-changed-how-we-mouse-forever-1834274151</a><br> CISO Desk Reference Guide<br> <a href="https://cisodrg.com/" target="_blank" rel="noopener noreferrer">https://cisodrg.com/</a><br> Contact<br> Email <a href="mailto:infosecicu@musc.edu">infosecicu@musc.edu</a><br> Twitter:<br> <br> * <a href="https://twitter.com/Gerald_Auger" target="_blank" rel="noopener noreferrer">Gerry Auger (@Gerald_Auger)</a><br> * <a href="https://twitter.com/sgcardinal" target="_blank" rel="noopener noreferrer">Steven Cardinal (@sgcardinal)</a><br> <br>