[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Monetary valuation of personal health data in the wild

Published: 25 June 2024 Publication History

Abstract

The value of personal health data continues to be a debated topic in HCI and society more broadly. We investigate the monetary value people attach to their health data. Using a custom mobile app for 14 days with 55 participants, we collected health data (sleep duration, sleep quality, pain intensity, wake-up times) and a daily monetary data valuation using a reverse second-price auction. Participants bid to sell their data to a for-profit company, the government, or academia. Our findings indicate that people value their data differently based on who is buying. We also show that people are interested in monetizing their personal health data despite privacy and data protection concerns. The presented study helps us understand the data value landscape and paves way to a healthier data-driven future where people may benefit more from their own contributions, either in monetary or other forms.

Highlights

The monetary value people attach to their data differs based on who is buying
Despite privacy and data protection concerns, people want to sell data
People trust themselves as reliable guardians of their data

References

[1]
Adar Eytan, Huberman Bernardo A., Valauskas Edward J. (Ed.), A Market for Secrets, 2001.
[2]
Afolalu Esther F., Ramlee Fatanah, Tang Nicole K.Y., Effects of sleep changes on pain-related health outcomes in the general population: a systematic review of longitudinal studies with exploratory meta-analysis, Sleep Med. Rev. 39 (2018) 82–97.
[3]
Alorwu Andy, van Berkel Niels, Goncalves Jorge, Oppenlaender Jonas, López Miguel Bordallo, Seetharaman Mahalakshmy, Hosio Simo, Crowdsourcing sensitive data using public displays—opportunities, challenges, and considerations, Pers. Ubiquitous Comput. (2020) 1–16.
[4]
Alorwu, Andy, Kheirinejad, Saba, Van Berkel, Niels, Kinnula, Marianne, Ferreira, Denzil, Visuri, Aku, Hosio, Simo, 2021. Assessing MyData Scenarios: Ethics, Concerns, and the Promise. In: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. pp. 1–11.
[5]
Andersen Monica Levy, Araujo Paula, Frange Cristina, Tufik Sergio, Sleep disturbance and pain: a tale of two common problems, Chest 154 (5) (2018) 1249–1259.
[6]
Babiloni Alberto Herrero, De Koninck Beatrice P, Beetz Gabrielle, De Beaumont Louis, Martel Marc O, Lavigne Gilles J, Sleep and pain: recent insights, mechanisms, and future directions in the investigation of this relationship, J. Neural Transm. 127 (4) (2020) 647–660.
[7]
Barkhuus, Louise, Brown, Barry, Bell, Marek, Sherwood, Scott, Hall, Malcolm, Chalmers, Matthew, 2008. From awareness to repartee: sharing location within social groups. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. pp. 497–506.
[8]
Birch Kean, Cochrane D.T., Ward Callum, Data as asset? The measurement, governance, and valuation of digital personal data by Big Tech, Big Data Soc. 8 (1) (2021).
[9]
Braun Virginia, Clarke Victoria, Using thematic analysis in psychology, Qual. Res. Psychol. 3 (2) (2006) 77–101.
[10]
Buchbinder Rachelle, van Tulder Maurits, Öberg Birgitta, Costa Lucíola Menezes, Woolf Anthony, Schoene Mark, Croft Peter, Hartvigsen Jan, Cherkin Dan, Foster Nadine E, et al., Low back pain: a call for action, Lancet 391 (10137) (2018) 2384–2388.
[11]
Carrascal, Juan Pablo, Riederer, Christopher, Erramilli, Vijay, Cherubini, Mauro, de Oliveira, Rodrigo, 2013. Your browsing behavior for a big mac: Economics of personal information online. In: Proceedings of the 22nd International Conference on World Wide Web. pp. 189–200.
[12]
Chaudhary Mamta, Selvamani Y., Association between back pain and subjective health, wellbeing and sleep problems among older adults in six middle-income countries: a cross-sectional study, J. Public Health (2021) 1–10.
[13]
Chunara Rumi, Aman Susan, Smolinski Mark, Brownstein John S, Flu near you: an online self-reported influenza surveillance system in the USA, Online J. Public Health Inf. 5 (1) (2013).
[14]
Cohen Julie E., Between Truth and Power, Oxford University Press, 2019.
[15]
Consolvo, Sunny, Smith, Ian E, Matthews, Tara, LaMarca, Anthony, Tabert, Jason, Powledge, Pauline, 2005. Location disclosure to social relations: why, when, & what people want to share. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. pp. 81–90.
[16]
Cvrcek, Dan, Kumpost, Marek, Matyas, Vashek, Danezis, George, 2006. A study on the value of location privacy. In: Proceedings of the 5th ACM Workshop on Privacy in Electronic Society. pp. 109–118.
[17]
Danezis George, Lewis Stephen, Anderson Ross J., How much is location privacy worth?, in: WEIS, vol. 5, 2005, Citeseer.
[18]
Easley David, Kleinberg Jon, Networks, Crowds, and Markets: Reasoning About a Highly Connected World, Cambridge University Press, 2010.
[19]
Edwards Lilian, Data protection: Enter the general data protection regulation, Law, Policy Internet (Hart Publishing, 2018) (2018).
[20]
Fourcade Marion, Kluttz Daniel N., A Maussian bargain: Accumulation by gift in the digital economy, Big Data Soc. 7 (1) (2020).
[21]
Freifeld Clark C, Chunara Rumi, Mekaru Sumiko R, Chan Emily H, Kass-Hout Taha, Iacucci Anahi Ayala, Brownstein John S, Participatory epidemiology: use of mobile phones for community-based health reporting, PLoS Med. 7 (12) (2010).
[22]
Grossklags Jens, Acquisti Alessandro, When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information, in: WEIS, 2007.
[23]
Hann, Il-Horn, Hui, Kai-Lung, Lee, Tom, Png, Ivan, 2002. Online information privacy: Measuring the cost-benefit trade-off. In: ICIS 2002 Proceedings. p. 1.
[24]
Hann Il-Horn, Hui Kai-Lung, Lee Sang-Yong Tom, Png Ivan PL, Overcoming online information privacy concerns: An information-processing theory approach, J. Manag. Inf. Syst. 24 (2) (2007) 13–42.
[25]
Hardjono Thomas, Shrier David L., Pentland Alex, Appendix A Personal Data: the Emergence of a New Asset Class, MIT Press, 2019.
[26]
Hillman David R., Lack Leon C., Public health implications of sleep loss: the community burden, Med. J. Aust. 199 (2013) S7–S10.
[27]
Hillman David, Mitchell Scott, Streatfeild Jared, Burns Chloe, Bruck Dorothy, Pezzullo Lynne, The economic cost of inadequate sleep, Sleep 41 (8) (2018) zsy083.
[28]
Hong, Hwajung, Gilbert, Eric, Abowd, Gregory D, Arriaga, Rosa I, 2015. In-group questions and out-group answers: crowdsourcing daily living advice for individuals with autism. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. pp. 777–786.
[29]
Hosio, Simo, Ferreira, Denzil, Goncalves, Jorge, van Berkel, Niels, Luo, Chu, Ahmed, Muzamil, Flores, Huber, Kostakos, Vassilis, 2016. Monetary assessment of battery life on smartphones. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. pp. 1869–1880.
[30]
Huberman Bernardo A., Adar Eytan, Fine Leslie R., Valuating privacy, IEEE Secur. Priv. 3 (5) (2005) 22–25.
[31]
Jensen Carlos, Potts Colin, Jensen Christian, Privacy practices of Internet users: Self-reports versus observed behavior, Int. J. Hum.-Comput. Stud. 63 (1–2) (2005) 203–227.
[32]
Killgore William D.S., Balkin Thomas J., Wesensten Nancy J., Impaired decision making following 49h of sleep deprivation, J. Sleep Res. 15 (1) (2006) 7–13.
[33]
Krasnova Hanna, Hildebrand Thomas, Guenther Oliver, Investigating the value of privacy on online social networks: conjoint analysis, 2009.
[34]
Lanier Jaron, Who Owns the Future?, Simon and Schuster, 2014.
[35]
Li Xiao-Bai, Liu Xiaoping, Motiwalla Luvai, Valuing personal data with privacy consideration, Decis. Sci. 52 (2) (2021) 393–426.
[36]
Loguercio Salvatore, Good Benjamin M., Su Andrew I., Dizeez: an online game for human gene-disease annotation, PLoS One 8 (8) (2013).
[37]
MacNeela Padraig, Doyle Catherine, O’Gorman David, Ruane Nancy, McGuire Brian E, Experiences of chronic low back pain: a meta-ethnography of qualitative research, Health Psychol. Rev. 9 (1) (2015) 63–82.
[38]
Malgieri Gianclaudio, Custers Bart, Pricing privacy–the right to know the value of your personal data, Comput. Law Secur. Rev. 34 (2) (2018) 289–303.
[39]
McAfee R. Preston, McMillan John, Auctions and bidding, J. Econ. Literat. 25 (2) (1987) 699–738.
[40]
Morey Timothy, Forbath Theodore, Schoop Allison, Customer data: Designing for transparency and trust, Harv. Bus. Rev. 93 (5) (2015) 96–105.
[41]
Palan Stefan, Schitter Christian, Prolific. ac—A subject pool for online experiments, J. Behav. Exp. Finance 17 (2018) 22–27.
[42]
Poikola Antti, Kuikkaniemi K, Kuittinen O, Honko H, Knuutila A, Lähteenoja V, MyData—An introduction to human-centric use of personal data, in: Finnish Ministry of Transport and Communications, vol. 8, 2020, p. 55.
[43]
Prainsack Barbara, Logged out: Ownership, exclusion and public value in the digital data and information commons, Big Data Soc. 6 (1) (2019).
[44]
Przkora Rene, Wallace Mark S, Doan Lisa, Wasan Ajay D, Ashburn Michael A, Mao Jianren, A major step to improve pain research infrastructure: The NIH early phase pain investigation clinical network (EPPIC-Net), ASA Monit. 84 (12) (2020) 38–39.
[45]
Saari Donald G., The mathematics of voting: Democratic symmetry, Economist 83 (2000).
[46]
Sarsenbayeva Zhanna, Fleming Charlie, Tag Benjamin, Withana Anusha, van Berkel Niels, McEwan Alistair, A review on mood assessment using smartphones, in: IFIP Conference on Human-Computer Interaction, Springer, 2023, pp. 385–413.
[47]
Shapiro Danielle N., Chandler Jesse, Mueller Pam A., Using Mechanical Turk to study clinical populations, Clin. Psychol. Sci. 1 (2) (2013) 213–220.
[48]
Shi Le, Chen Si-Jing, Ma Meng-Ying, Bao Yan-Ping, Han Ying, Wang Yu-Mei, Shi Jie, Vitiello Michael V, Lu Lin, Sleep disturbances increase the risk of dementia: a systematic review and meta-analysis, Sleep Med. Rev. 40 (2018) 4–16.
[49]
Smith H. Jeff, Dinev Tamara, Xu Heng, Information privacy research: an interdisciplinary review, MIS Q. (2011) 989–1015.
[50]
Staiano, Jacopo, Oliver, Nuria, Lepri, Bruno, de Oliveira, Rodrigo, Caraviello, Michele, Sebe, Nicu, 2014. Money walks: a human-centric study on the economics of personal mobile data. In: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing. pp. 583–594.
[51]
Syed Romilla, Dhillon Gurpreet, Merrick Jason, The identity management value model: A design science approach to assess value gaps on social media, Decis. Sci. 50 (3) (2019) 498–536.
[52]
Toch, Eran, Levi, Inbal, 2013. Locality and privacy in people-nearby applications. In: Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing. pp. 539–548.
[53]
Tufiş Mihnea, Boratto Ludovico, Toward a complete data valuation process. Challenges of personal data, J. Data Inf. Qual. (JDIQ) 13 (4) (2021) 1–7.
[54]
Upton Graham, Cook Ian, Understanding Statistics, Oxford University Press, 1996.
[55]
Vickrey William, Auctions and bidding games, in: Recent Advances in Game Theory, vol. 29, Princeton: Princeton University Press, 1962, pp. 15–27.
[56]
Vos Theo, Allen Christine, Arora Megha, Barber Ryan M, Bhutta Zulfiqar A, Brown Alexandria, Carter Austin, Casey Daniel C, Charlson Fiona J, Chen Alan Z, et al., Global, regional, and national incidence, prevalence, and years lived with disability for 310 diseases and injuries, 1990–2015: a systematic analysis for the Global Burden of Disease Study 2015, Lancet 388 (10053) (2016) 1545–1602.
[57]
Wazny Kerri, Applications of crowdsourcing in health: an overview, J. Glob. Health 8 (1) (2018).
[58]
Wheeler A.H., Diagnosis and management of low back pain and sciatica, Am. Fam. Physician 52 (5) (1995) 1333–1341.
[59]
Yin Jiawei, Jin Xiaoling, Shan Zhilei, Li Shuzhen, Huang Hao, Li Peiyun, Peng Xiaobo, Peng Zhao, Yu Kaifeng, Bao Wei, et al., Relationship of sleep duration with all-cause mortality and cardiovascular events: a systematic review and dose-response meta-analysis of prospective cohort studies, J. Am. Heart Assoc. 6 (9) (2017).
[60]
Zuboff Shoshana, The age of surveillance capitalism: The fight for a human future at the new frontier of power, 2019, Profile books.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image International Journal of Human-Computer Studies
International Journal of Human-Computer Studies  Volume 185, Issue C
May 2024
208 pages

Publisher

Academic Press, Inc.

United States

Publication History

Published: 25 June 2024

Author Tags

  1. Human-centered computing: Human computer interaction (HCI)
  2. Human-centered computing: Ubiquitous and mobile computing
  3. Security and privacy: Human and societal aspects of security and privacy

Author Tags

  1. Personal data
  2. Auctions
  3. Valuation
  4. Sleep
  5. Low back pain

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media