<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v23i7e25266</article-id>
      <article-id pub-id-type="pmid">36260399</article-id>
      <article-id pub-id-type="doi">10.2196/25266</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>US Privacy Laws Go Against Public Preferences and Impede Public Health and Research: Survey Study</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Kukafka</surname>
            <given-names>Rita</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Jose</surname>
            <given-names>James</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Swire</surname>
            <given-names>Peter</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes" equal-contrib="yes">
          <name name-style="western">
            <surname>Schmit</surname>
            <given-names>Cason</given-names>
          </name>
          <degrees>JD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Population Informatics Lab</institution>
            <institution>Department of Health Policy and Management</institution>
            <institution>Texas A&#38;M University</institution>
            <addr-line>1266 TAMU</addr-line>
            <addr-line>College Station, TX, 77843</addr-line>
            <country>United States</country>
            <phone>1 (979)436 0277</phone>
            <email>schmit@tamu.edu</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-7929-7198</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Giannouchos</surname>
            <given-names>Theodoros</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-1574-6767</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Ramezani</surname>
            <given-names>Mahin</given-names>
          </name>
          <degrees>BS</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-2659-6151</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author">
          <name name-style="western">
            <surname>Zheng</surname>
            <given-names>Qi</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-3920-2059</ext-link>
        </contrib>
        <contrib id="contrib5" contrib-type="author">
          <name name-style="western">
            <surname>Morrisey</surname>
            <given-names>Michael A</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-9357-1141</ext-link>
        </contrib>
        <contrib id="contrib6" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Kum</surname>
            <given-names>Hye-Chung</given-names>
          </name>
          <degrees>PhD, MSW</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-6882-8053</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Population Informatics Lab</institution>
        <institution>Department of Health Policy and Management</institution>
        <institution>Texas A&#38;M University</institution>
        <addr-line>College Station, TX</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Pharmacotherapy Outcomes Research Center</institution>
        <institution>College of Pharmacy</institution>
        <institution>University of Utah</institution>
        <addr-line>Salt Lake City, UT</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>Department of Epidemiology and Biostatistics</institution>
        <institution>Texas A&#38;M University</institution>
        <addr-line>College Station, TX</addr-line>
        <country>United States</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Cason Schmit <email>schmit@tamu.edu</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>7</month>
        <year>2021</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>5</day>
        <month>7</month>
        <year>2021</year>
      </pub-date>
      <volume>23</volume>
      <issue>7</issue>
      <elocation-id>e25266</elocation-id>
      <history>
        <date date-type="received">
          <day>26</day>
          <month>10</month>
          <year>2020</year>
        </date>
        <date date-type="rev-request">
          <day>22</day>
          <month>11</month>
          <year>2020</year>
        </date>
        <date date-type="rev-recd">
          <day>8</day>
          <month>12</month>
          <year>2020</year>
        </date>
        <date date-type="accepted">
          <day>30</day>
          <month>4</month>
          <year>2021</year>
        </date>
      </history>
      <copyright-statement>©Cason Schmit, Theodoros Giannouchos, Mahin Ramezani, Qi Zheng, Michael A Morrisey, Hye-Chung Kum. Originally published in the Journal of Medical Internet Research (https://www.jmir.org), 05.07.2021.</copyright-statement>
      <copyright-year>2021</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on https://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://www.jmir.org/2021/7/e25266" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Reaping the benefits from massive volumes of data collected in all sectors to improve population health, inform personalized medicine, and transform biomedical research requires the delicate balance between the benefits and risks of using individual-level data. There is a patchwork of US data protection laws that vary depending on the type of data, who is using it, and their intended purpose. Differences in these laws challenge big data projects using data from different sources. The decisions to permit or restrict data uses are determined by elected officials; therefore, constituent input is critical to finding the right balance between individual privacy and public benefits.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>This study explores the US public’s preferences for using identifiable data for different purposes without their consent.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>We measured data use preferences of a nationally representative sample of 504 US adults by conducting a web-based survey in February 2020. The survey used a choice-based conjoint analysis. We selected choice-based conjoint attributes and levels based on 5 US data protection laws (Health Insurance Portability and Accountability Act, Family Educational Rights and Privacy Act, Privacy Act of 1974, Federal Trade Commission Act, and the Common Rule). There were 72 different combinations of attribute levels, representing different data use scenarios. Participants were given 12 pairs of data use scenarios and were asked to choose the scenario they were the most comfortable with. We then simulated the population preferences by using the hierarchical Bayes regression model using the ChoiceModelR package in R.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>Participants strongly preferred data reuse for public health and research than for profit-driven, marketing, or crime-detection activities. Participants also strongly preferred data use by universities or nonprofit organizations over data use by businesses and governments. Participants were fairly indifferent about the different types of data used (health, education, government, or economic data).</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>Our results show a notable incongruence between public preferences and current US data protection laws. Our findings appear to show that the US public favors data uses promoting social benefits over those promoting individual or organizational interests. This study provides strong support for continued efforts to provide safe access to useful data sets for research and public health. Policy makers should consider more robust public health and research data use exceptions to align laws with public preferences. In addition, policy makers who revise laws to enable data use for research and public health should consider more comprehensive protection mechanisms, including transparent use of data and accountability.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>privacy</kwd>
        <kwd>law</kwd>
        <kwd>medical informatics</kwd>
        <kwd>conjoint analysis</kwd>
        <kwd>surveys and questionnaires</kwd>
        <kwd>public health</kwd>
        <kwd>information dissemination</kwd>
        <kwd>health policy</kwd>
        <kwd>public policy</kwd>
        <kwd>big data</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <p>Cleaning, integrating, and managing the uncertainty in chaotic real data is essential for reproducible science and to unleash the potential power of big data for biomedical research. This often requires access to very detailed data that inevitably raise privacy concerns. Despite the widespread use of personal information for big data purposes (eg, marketing, intelligence gathering, political campaigns), big data analytics are still challenged in health applications owing to concerns about privacy and complex and differing federal and state laws [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref2">2</xref>]. The patchwork of federal and state data protection laws poses a substantial challenge to leveraging data to promote health outcomes [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref2">2</xref>]. Data protection laws have 5 fundamental elements: (1) a definition of protected data, (2) definition of a regulated person or entity, (3) data use or disclosure restrictions, (4) data use or disclosure exceptions, and (5) penalties for violating the law. It is common for data protection laws to vary wildly in these 5 elements [<xref ref-type="bibr" rid="ref2">2</xref>-<xref ref-type="bibr" rid="ref6">6</xref>]. Consequently, it can be exceptionally difficult to understand which law (or laws) apply to a data project and whether a proposed data use is permitted. Often, the only commonality between different data protection laws is that they usually protect only identifiable data. Data that do not identify a person typically are not protected by US data protection laws. However, legal definitions for “identifiable” data or deidentification standards vary considerably [<xref ref-type="bibr" rid="ref6">6</xref>]. This inconsistency encourages highly conservative measures to strip data of potential identifiers, which can severely limit data utility [<xref ref-type="bibr" rid="ref6">6</xref>]. This reality poses a substantial barrier to cross-sectoral and cross-jurisdictional data uses relevant to health outcomes, including exploration of social determinants of health, retrospective database research studies, informatics research on decision support systems, digital ethology, and big data analytics in health (eg, precision public health) [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref7">7</xref>]. These barriers challenge efforts to rapidly leverage data in public health emergencies (eg, COVID-19).</p>
      <p>An increasing number of published stories highlight the fact that different privacy protections apply in different contexts. For example, popular news stories have addressed how health information is treated differently when it is collected by health care providers as opposed to commercial companies such as Fitbit, Apple, or Ancestry.com [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref9">9</xref>]. Data use by health care providers is regulated by the Health Insurance Portability and Accountability Act of 1996 whereas data use by Fitbit or Apple is regulated by the Federal Trade Commission Act, which permits data use so long as they are neither unfair nor deceptive (ie, disclosed in a lengthy privacy policy) [<xref ref-type="bibr" rid="ref10">10</xref>].</p>
      <p>Recent high profile breaches (eg, Equifax) and scandals (eg, Facebook and the 2016 US election) have raised awareness of these different privacy standards [<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref11">11</xref>]. Moreover, new data protection regulations in some jurisdictions have provoked debate and congressional inquiry into new federal privacy legislation [<xref ref-type="bibr" rid="ref12">12</xref>-<xref ref-type="bibr" rid="ref15">15</xref>]. Any new federal privacy law will necessarily address the 5 fundamental elements of data protection laws and will inevitably address the trade-off between privacy and utility [<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref17">17</xref>]. Privacy risk in database studies is best minimized through a holistic approach that involves security technology (eg, encryption), data manipulation (eg, differential privacy), as well as good data governance models (eg, transparency) and legal protections. Legal protections can shield against a variety of harms. Alternatively, permitting certain data use can promote social benefits, including advancing knowledge and science, promoting public health, facilitating law enforcement, and enabling economic activity [<xref ref-type="bibr" rid="ref18">18</xref>]. In the United States, the decision to permit or restrict certain data uses is determined by elected officials. These are policy choices with significant consequences for both individual interests (eg, privacy) and public benefit. Consequently, constituent input is critical to finding the right balance between individual privacy and public benefits.</p>
      <p>The purpose of this paper is to report on the results of a nationally representative survey examining US residents’ preferences for which of their identifiable personal data should be available for use, by whom, and for what purposes. Prior research focusing on Americans’ attitudes on data use and privacy shows strong support for socially beneficial uses such as research [<xref ref-type="bibr" rid="ref19">19</xref>-<xref ref-type="bibr" rid="ref23">23</xref>]. However, few US privacy laws provide specific exceptions for data uses for research or public health [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref2">2</xref>]. Thus, information on how the US population views certain data uses in relation to other data uses is valuable, especially if one data use is currently restricted under US laws and the other is permitted. Such data would be extremely useful to US policy makers as they deliberate new data protection frameworks.</p>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Study Design and Recruitment</title>
        <p>In February 2020, we conducted a web-based survey to explore the comfort levels and the preferences of the US population when individually identifiable data is reused for different purposes without their consent. Potential participants were recruited via a third-party research company (Dynata) that specializes in deploying surveys by using nationally representative sampling. We sought to balance the sample on 6 targets based on population characteristics used by the census (gender, race/ethnicity, age, education, household income, and region) where possible. Our goal was to recruit 500 adult (≥18 years) US residents fluent in English to enable reasonable sample balancing [<xref ref-type="bibr" rid="ref24">24</xref>]. To provide a demographic context for participants’ baseline privacy concerns, we included the validated Concern for Information Privacy instrument [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref26">26</xref>]. The Concern for Information Privacy instrument has 15 seven-point Likert scale questions (1=strongly disagree to 7=strongly agree) and provides a composite score with 4 subscales for privacy [<xref ref-type="bibr" rid="ref25">25</xref>]. We estimated participants’ preferences on the potential reuse of their data with a choice-based conjoint analysis [<xref ref-type="bibr" rid="ref27">27</xref>-<xref ref-type="bibr" rid="ref30">30</xref>]. Choice-based conjoint analysis is built on the premise that an individual places different values on an option according to its characteristics and makes trade-off choices among alternatives based on the combination of characteristics. Conjoint analysis is a decomposition method because the implicit value for a characteristic is derived from some overall score for a profile consisting of 2 or more  (conjoint) characteristics [<xref ref-type="bibr" rid="ref27">27</xref>-<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref31">31</xref>]. Choice-based conjoint analysis is commonly used in health care and economics research to understand clinical decision making, to assess patients’ preferences, evaluation, and willingness to accept new treatments and health states, and to promote shared decision making among patients and stakeholders by quantifying the relative importance that individuals place on different attributes and levels within those attributes [<xref ref-type="bibr" rid="ref27">27</xref>-<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref32">32</xref>-<xref ref-type="bibr" rid="ref34">34</xref>].</p>
        <p>We selected attributes based on 4 of the 5 elements of the data protection laws (excluding violation penalties) (<xref ref-type="table" rid="table1">Table 1</xref>). The “source of identifiable data” is related to the definition of protected data, “who” is related to the regulated entity, and the “proposed data use” is related to 2 different elements: legal restrictions and exceptions for data use or disclosure [<xref ref-type="bibr" rid="ref2">2</xref>]. We selected attribute levels to correspond to various legal provisions permitting or restricting data reuse and to identify the nuances within the categories (eg, business vs nonprofit organization), which resulted in 80 different scenarios comprising different attribute levels (4×4×5) [<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref35">35</xref>-<xref ref-type="bibr" rid="ref38">38</xref>]. Of those, we excluded 8 as implausible or likely to confuse survey respondents (eg, government or nonprofit conducting profit-driven activity), leaving 72 different scenarios.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Attributes and levels for data reuse scenarios.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="240"/>
            <col width="450"/>
            <col width="310"/>
            <thead>
              <tr valign="top">
                <td>Who</td>
                <td>Purpose</td>
                <td>Source of identifiable data</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Researcher, University</td>
                <td>Research, scientific knowledge dissemination</td>
                <td>Education records</td>
              </tr>
              <tr valign="top">
                <td>Nonprofit Organization</td>
                <td>Promoting population health</td>
                <td>Health records</td>
              </tr>
              <tr valign="top">
                <td>Government</td>
                <td>Identify criminal activity</td>
                <td>Government program or activity</td>
              </tr>
              <tr valign="top">
                <td>Business</td>
                <td>Marketing, recruitment <break/>Profit-driven activity</td>
                <td>Economic activity, customer behavior</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <p>Since it is not feasible and manageable to present all the possible combinations of each scenario to the participants, a fractional factorial design was used to randomly generate subsets of all the combinations, which were sufficient to obtain robust and meaningful differences in preferences through a standard web-based platform called "conjoint.ly", similar to that reported in previous work  [<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref39">39</xref>,<xref ref-type="bibr" rid="ref40">40</xref>]. This resulted in 72 choice sets, with each set consisting of 12 pairs of data use scenarios that would allow for simulating participant preferences in the full space of data use scenario permutations. Each participant was randomly assigned to respond to one of the choice sets, and we asked each participant to select the data use scenario that they were the most comfortable with for each of their assigned 12 scenario pairs (<xref rid="figure1" ref-type="fig">Figure 1</xref>).</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>Sample pair scenario question.</p>
          </caption>
          <graphic xlink:href="jmir_v23i7e25266_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Statistical Analysis</title>
        <p>To estimate the parameters, we used a hierarchical Bayes regression model, and in estimating the parameters at the individual level, we generated 10,000 posterior draws by using the Markov chain Monte Carlo simulation [<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref41">41</xref>,<xref ref-type="bibr" rid="ref42">42</xref>]. This approach allowed the estimation of attributes and levels with the small amount of data collected from each respondent, while simultaneously accounting for the heterogeneity of preferences across and within individuals, the nested structure of the choices, and thus, the nonrandom preference variation of the respondents [<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref41">41</xref>-<xref ref-type="bibr" rid="ref43">43</xref>]. The value of 3 attributes was scaled to sum up to 100%, while the values of the levels within each attribute (part worth utilities) sum up to zero, with negative values indicating decreased and positive values indicating increased preferences. Finally, we used the sum of the estimated relative values (utilities) of different levels to identify and rank the alternative scenarios from the most to the least preferable. All measures were estimated at the individual level, which were then averaged and reported as the population mean with standard deviation in the results. Data analyses were conducted using the ChoiceModelR package in R [<xref ref-type="bibr" rid="ref44">44</xref>]. This study was approved by our university institutional review board.</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <p>The survey was distributed to 687 individuals. Of them, 22 individuals declined to participate (3.2%), 157 did not fully complete the survey (22.8%), and 4 participant responses (0.6%) were marked as low quality based on detected participant behavior (eg, rapidly clicking through without mouse movement). This resulted in 504 respondents who fully completed the web-based survey (response rate 74.4%), which was our final analytic sample. Generally, we were able to meet our census sampling targets for gender, race/ethnicity, age, education, income, and census region (<xref ref-type="table" rid="table2">Table 2</xref>). In addition, although we did not try to balance for it, our sample’s health insurance coverage is similar to data published by the US Census Bureau [<xref ref-type="bibr" rid="ref45">45</xref>]. Around half of the respondents had used a health care provider in the past year, around one-third had at least one chronic condition, and around 19.8% (100/504) of the respondents visited an emergency department in the past year. The overall privacy score was 5.8 (SD 1.1), which is consistent with the Concern for Information Privacy validation samples (ie, scores ranging from 5 to 6) [<xref ref-type="bibr" rid="ref25">25</xref>].</p>
      <table-wrap position="float" id="table2">
        <label>Table 2</label>
        <caption>
          <p>Sociodemographic data, clinical characteristics, and privacy attitude scores of the participants (N=504).</p>
        </caption>
        <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
          <col width="30"/>
          <col width="330"/>
          <col width="0"/>
          <col width="370"/>
          <col width="0"/>
          <col width="270"/>
          <thead>
            <tr valign="top">
              <td colspan="3">Participant characteristics</td>
              <td colspan="2">Values</td>
              <td>Target sample percentage<sup>a,b</sup></td>
            </tr>
          </thead>
          <tbody>
            <tr valign="top">
              <td colspan="6">
                <bold>Age categories (years), n (%)</bold>
              </td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>18-24</td>
              <td colspan="2">41 (8.1)</td>
              <td colspan="2">13.1</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>25-34</td>
              <td colspan="2">75 (14.9)</td>
              <td colspan="2">17.5</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>35-44</td>
              <td colspan="2">100 (19.8)</td>
              <td colspan="2">17.5</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>45-54</td>
              <td colspan="2">101 (20.0)</td>
              <td colspan="2">19.2</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>55-64</td>
              <td colspan="2">68 (13.5)</td>
              <td colspan="2">15.6</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>65 or older</td>
              <td colspan="2">89 (17.7)</td>
              <td colspan="2">17.2</td>
            </tr>
            <tr valign="top">
              <td colspan="6">
                <bold>Gender, n (%)</bold>
              </td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Male</td>
              <td colspan="2">224 (44.4)</td>
              <td colspan="2">48.5</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Female</td>
              <td colspan="2">278 (55.2)</td>
              <td colspan="2">50.5</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Other/prefer not to answer</td>
              <td colspan="2">2 (0.4)</td>
              <td colspan="2">—<sup>c</sup></td>
            </tr>
            <tr valign="top">
              <td colspan="6">
                <bold>Race categories, n (%)</bold>
              </td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>White</td>
              <td colspan="2">315 (62.5)</td>
              <td colspan="2">63.7</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>African American</td>
              <td colspan="2">77 (15.3)</td>
              <td colspan="2">12.2</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Hispanic</td>
              <td colspan="2">51 (10.1)</td>
              <td colspan="2">16.4</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Asian</td>
              <td colspan="2">46 (9.1)</td>
              <td colspan="2">4.7</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Other</td>
              <td colspan="2">15 (3.0)</td>
              <td colspan="2">3.0</td>
            </tr>
            <tr valign="top">
              <td colspan="6">
                <bold>Income categories, n (%)</bold>
              </td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>$20,000 or less</td>
              <td colspan="2">103 (20.4)</td>
              <td colspan="2">19.9</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>$20,000 to $49,999</td>
              <td colspan="2">149 (29.6)</td>
              <td colspan="2">30.6</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>$50,000 to $99,999</td>
              <td colspan="2">137 (27.2)</td>
              <td colspan="2">29.1</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>$100,000 to $149,999</td>
              <td colspan="2">67 (13.3)</td>
              <td colspan="2">12.0</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>$150,000 or more</td>
              <td colspan="2">48 (9.5)</td>
              <td colspan="2">8.3</td>
            </tr>
            <tr valign="top">
              <td colspan="6">
                <bold>Educational level, n (%)</bold>
              </td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>High school or less</td>
              <td colspan="2">172 (34.1)</td>
              <td colspan="2">32.0</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Some college completed</td>
              <td colspan="2">99 (19.6)</td>
              <td colspan="2">19.0</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>College degree</td>
              <td colspan="2">191 (37.9)</td>
              <td colspan="2">31.0</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Master’s</td>
              <td colspan="2">37 (7.3)</td>
              <td colspan="2">—</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>PhD/doctoral</td>
              <td colspan="2">5 (1.0)</td>
              <td colspan="2">—</td>
            </tr>
            <tr valign="top">
              <td colspan="6">
                <bold>Region, n (%)</bold>
              </td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Midwest</td>
              <td colspan="2">95 (18.8)</td>
              <td colspan="2">22.0</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Northeast</td>
              <td colspan="2">126 (25.0)</td>
              <td colspan="2">18.2</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>South</td>
              <td colspan="2">174 (34.5)</td>
              <td colspan="2">36.2</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>West</td>
              <td colspan="2">109 (21.6)</td>
              <td colspan="2">23.6</td>
            </tr>
            <tr valign="top">
              <td colspan="6">
                <bold>Health insurance coverage, n (%)<sup>b</sup></bold>
              </td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Private</td>
              <td colspan="2">169 (33.5)</td>
              <td colspan="2">64.7</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Medicare</td>
              <td colspan="2">112 (22.2)</td>
              <td colspan="2">17.7</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Medicaid</td>
              <td colspan="2">83 (16.5)</td>
              <td colspan="2">17.9</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Uninsured</td>
              <td colspan="2">52 (10.3)</td>
              <td colspan="2">8.5</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>VA/TRICARE</td>
              <td colspan="2">10 (2.0)</td>
              <td colspan="2">3.6</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Multiple</td>
              <td colspan="2">78 (15.5)</td>
              <td colspan="2">14.5</td>
            </tr>
            <tr valign="top">
              <td colspan="6">
                <bold>Any chronic condition, n (%)</bold>
              </td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>No</td>
              <td colspan="2">319 (63.3)</td>
              <td colspan="2">—</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Yes</td>
              <td colspan="2">181 (35.9)</td>
              <td colspan="2">—</td>
            </tr>
            <tr valign="top">
              <td colspan="6">
                <bold>Use of health care provider in the past year, n (%)</bold>
              </td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>No</td>
              <td colspan="2">93 (18.5)</td>
              <td colspan="2">—</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Yes</td>
              <td colspan="2">256 (50.8)</td>
              <td colspan="2">—</td>
            </tr>
            <tr valign="top">
              <td colspan="6">
                <bold>At least one emergency department visit in the past year, n (%)</bold>
              </td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>No</td>
              <td colspan="2">404 (80.2)</td>
              <td colspan="2">—</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Yes</td>
              <td colspan="2">100 (19.8)</td>
              <td colspan="2">—</td>
            </tr>
            <tr valign="top">
              <td colspan="6">
                <bold>Respondent is a primary care giver for someone else, n (%)</bold>
              </td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>No</td>
              <td colspan="2">423 (83.9)</td>
              <td colspan="2">—</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>Yes</td>
              <td colspan="2">77 (15.3)</td>
              <td colspan="2">—</td>
            </tr>
            <tr valign="top">
              <td colspan="3">Concern for information privacy scores, mean (SD)</td>
              <td colspan="2">5.8 (1.1)</td>
              <td>—</td>
            </tr>
          </tbody>
        </table>
        <table-wrap-foot>
          <fn id="table2fn1">
            <p><sup>a</sup>Survey sampling targets based on census data.</p>
          </fn>
          <fn id="table2fn2">
            <p><sup>b</sup>Insurance data were not used as the sampling target. These data show 2018 insurance statistics from the US census for survey sampling comparisons [<xref ref-type="bibr" rid="ref45">45</xref>]. Our survey solicited mutually exclusive responses in contrast to the US census data, which do not exclude persons with multiple insurance types from these groups.</p>
          </fn>
          <fn id="table2fn3">
            <p><sup>c</sup>Not available.</p>
          </fn>
        </table-wrap-foot>
      </table-wrap>
      <p><xref rid="figure2" ref-type="fig">Figure 2</xref> presents the relative importance for the different levels within each attribute. Positive values indicate preference with higher values and reveal greater importance, while negative values indicate nonpreferred levels associated with potential data reuse. Participants were most comfortable with the reuse of identifiable data if the proposed data use was intended to promote population health (10.1%, SD 11.6) or promote science or research (8.2%, SD 6.5), if the data were used by university-affiliated researchers (6.4%, SD 10.7) or nonprofit organizations (2.5%, SD 16.1), and if the source of the data included educational (2.2%, SD 11.3) or health care records (1.4%, SD 10.4). In contrast, participants were least comfortable with data reuse by businesses (–4.5%, SD 13.7) or the government (–4.3%, SD 16.8) mainly for profit-driven (–11.7%, SD 12.3) or marketing (–4.2%, SD 11) activities based on governmental (–1.7%, SD 10.1) or economic activity data (–1.8%, SD 11.4). Overall, we observed higher differences in the values between the levels of the proposed data use attribute compared to other 2 attributes, particularly with the attribute related to the source of the identifiable data.</p>
      <fig id="figure2" position="float">
        <label>Figure 2</label>
        <caption>
          <p>Relative importance by level within each attribute in percentage (SD).</p>
        </caption>
        <graphic xlink:href="jmir_v23i7e25266_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
      </fig>
      <p><xref rid="figure3" ref-type="fig">Figure 3</xref> presents the relative importance of the different data use purposes by users. All data use activities were more preferred when conducted by universities or nonprofit organizations than when conducted by government or business. Public health and research activities received positive relative importance values regardless of who conducts the activity. Conversely, for-profit and marketing activities received near uniform negative relative importance values. Universities conducting marketing activities was the lone exception, which had a small but positive relative importance value (2.6%). The relative importance of identifying criminal activity was either positive (university and nonprofit) or negative (government and business) depending on the user. We also estimated the overall values that participants placed on each scenario. <xref rid="figure4" ref-type="fig">Figure 4</xref> presents only the 10 highest and lowest ranked scenarios (<xref rid="figure4" ref-type="fig">Figure 4</xref>). The 4 lowest ranked scenarios all involved businesses using data for profit-driven purposes. The remainder of the lowest ranked scenarios involved business or government organizations engaging in marketing or identifying criminal activity. Eight of the 10 highest ranked scenarios involved universities/researchers engaging in scientific research or public health activities. Nonprofit organizations conducting population health programs represented the seventh and eighth highest ranked scenarios. We checked model validity by comparing the actual choices made by each participant with the estimated choices made for at least 90% of the last 50 iterations of the Markov chain Monte Carlo simulation. Precision (% of correct estimates) was good at 92% for the simulated model.</p>
      <fig id="figure3" position="float">
        <label>Figure 3</label>
        <caption>
          <p>Public preferences for use of data by users and purpose in percentage (SD). Our survey did not pair “for-profit” purposes with government or nonprofit users because these pairings were implausible and likely to confuse survey respondents.</p>
        </caption>
        <graphic xlink:href="jmir_v23i7e25266_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
      </fig>
      <fig id="figure4" position="float">
        <label>Figure 4</label>
        <caption>
          <p>Top 10 and bottom 10 ranked data use scenarios derived from the sum of scenario attributes' relative values (who/use purpose/data source) in percentage (SD).</p>
        </caption>
        <graphic xlink:href="jmir_v23i7e25266_fig4.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
      </fig>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>In contrast to federal and state laws, US residents make little distinctions across types of data. However, they express much more favorable preferences for uses by academic researchers and nonprofit organizations than by the government or the business community. Moreover, all types of users consistently preferred uses that focus on public health and scientific research rather than on crime detection, marketing, or for-profit activities. Our data demonstrate interesting inconsistencies between public preferences and US privacy laws. These inconsistencies are best exemplified by our participants’ most preferred data reuse (researchers using education data to promote population health) and least preferred data reuse (businesses using consumer data for profit). Ironically, our data indicate that the US public’s most preferred data reuse scenario is currently prohibited under the federal Family Educational Rights and Privacy Act of 1974 while the US public’s least preferred data reuse is completely legal and ubiquitous under the permissive Federal Trade Commission Act [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref46">46</xref>]. A recent review of 22 federal data protection frameworks funded by the Network for Public Health Law indicates that few data protection laws have a general research exception and fewer have a specific exception for public health uses. However, these data uses were by far the most preferred options of those we presented to our participant and were consistently preferred, regardless of who was the data user. Yet, public health uses are treated differently under different US laws [<xref ref-type="bibr" rid="ref6">6</xref>]. For example, the law protecting substance use treatment records has hamstrung the use of data in the present opioid epidemic response, while the laws covering cell phone location data have permitted public health officials to track entire populations in the current COVID-19 pandemic [<xref ref-type="bibr" rid="ref47">47</xref>,<xref ref-type="bibr" rid="ref48">48</xref>].</p>
        <p>Our participants also strongly favored data uses by universities and nonprofit organizations. Both universities and nonprofit organizations received higher preference ratings for all data use activities when compared to those received by the government or businesses. In some cases, activities that participants viewed as heavily undesirable when conducted by the government or business (crime detection, marketing) were rated favorably when conducted by a nonprofit organization or university. In contrast, the least preferred scenarios involved data reused for profit-driven or marketing activities by businesses or government. Mistrust in government has been documented in other research on attitudes of research and is perhaps unsurprising in the present partisan political environment [<xref ref-type="bibr" rid="ref21">21</xref>]. Negative preference ratings for businesses, profit-driven activities, and marketing are likely due to frequent stories of controversial data use, mismanagement, or breaches that are all too common in the news [<xref ref-type="bibr" rid="ref49">49</xref>]. This finding is consistent with other research documenting strong public attitudes in favor of altruistic goals and skepticism of data uses that advance specific individual or private (ie, for-profit) interests [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref21">21</xref>].</p>
        <p>We did find some preference differences for certain data types, but these differences were modest. Our data show that the public prefers the use of health or educational data (both heavily regulated under US laws) as compared to government data or economic data. Still, our data do not show any strong preferences. The public seems to view data as data. We noted that 4 of the 5 data use purposes we included in our study fall neatly into 2 broad categories: altruistic purposes and self-serving purposes. Public health and scientific purposes both ultimately contribute to the greater good, and our data suggest that these purposes are strongly preferred by the US public, regardless of who is doing the activity. In contrast, our respondents generally found those activities that are primarily self-serving (ie, profit-driven or marketing/recruitment activities) undesirable, regardless of who was doing the activity. The lone exception was marketing by universities, which received a modest positive relative importance score. Consequently, it could be that our participants based some of their preference decisions on whether they saw the data use as contributing to an altruistic or common good objective as opposed to primarily benefiting the data user’s self-interests.</p>
        <p>Identifying criminal activity was the one data use that does not neatly fit in the broad categories of altruistic or self-serving purposes. While law enforcement clearly has some social benefits (as do all the activities used in our study), identifying criminal activity implies punishment for some individuals. Consequently, it is not entirely altruistic and not entirely self-serving. Interestingly, participant preferences for identifying criminal activity seemed to vary depending on the data user. Universities and nonprofit organizations both received positive relative importance scores whereas governments and businesses received negative scores. Just as with other data uses, it could be that participants positively associate universities and nonprofit organizations with motivations more in line with social benefits rather than individual benefits.</p>
        <p>Collectively, our results do not support the current patchwork of US data protection laws. Many US data protection laws focus primarily on the type of data (ie, health, education, governmental program data), but our respondents were fairly indifferent toward these distinctions. Instead, our findings suggest that the US public is much more interested in who is using the data and for what purposes the data are being used. In particular, our results suggest that the US public has a strong preference for data uses that promote the common good as opposed to individual or self-serving interests.</p>
        <p>In fact, findings suggest that US preferences more closely align with a comprehensive data protection framework such as the General Data Protection Regulation enacted by the European Union where rules vary based on data use but are broadly applicable to all identifiable data [<xref ref-type="bibr" rid="ref50">50</xref>]. For example, the General Data Protection Regulation has broad applications and express provisions permitting scientific research and activities in the public interest (eg, public health) [<xref ref-type="bibr" rid="ref51">51</xref>,<xref ref-type="bibr" rid="ref52">52</xref>]. Policy makers who revise laws to increase access to data for research and public health can support data protection through new security standards. A 2009 report by the Institute of Medicine, “Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health through Research” [<xref ref-type="bibr" rid="ref53">53</xref>] argued for a different data protection approach to “enhance privacy protections through improved data security, increased transparency of activities and policies, and greater accountability.” These good governance practices, as opposed to strict prohibitions on uses and disclosures (ie, for research or public health), provide a way to protect individuals while permitting big data applications (eg, linking data from different sources) with social benefits. These results provide strong public support for continued efforts to make data available for research and public health.</p>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>There are 2 important limitations. We did not capture the universe of data use possibilities; therefore, the measured participants’ preferences are relative to the 72 provided scenarios. Additionally, this design measured participants’ preferences rather than acceptability, meaning that a participants’ least preferred scenario could still be acceptable to them or the most preferred scenario might be unacceptable.</p>
      </sec>
      <sec>
        <title>Conclusion</title>
        <p>Importantly, these results support a close re-examination of the absence of public health and research data use exceptions in US laws. It is clear that the US public strongly prefers using data to promote population health (as compared to other legal data uses); yet, few laws allow this kind of exception. The Family Educational Rights and Privacy Act provides an excellent example, given that it does not have a public health exception (or a research exception that permits exploring health implications) despite being one of the most potent known social determinants of health. Moreover, the absence of these data use exceptions within the current patchwork of inconsistent US data protection laws persistently frustrates secondary database researchers and public health professionals, thereby delaying, impeding, or increasing the cost of data-intensive scientific discovery and public health practice [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref6">6</xref>]. These findings clearly show that there is poor alignment between the present US legal data protection framework and the preferences of the US population.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group/>
    <ack>
      <p>This study was funded in part by the Presidential Impact Fellow Award at Texas A&#38;M University and the Population Informatics Lab in the School of Public Health at Texas A&#38;M University.</p>
    </ack>
    <fn-group>
      <fn fn-type="con">
        <p>CS and HCK were responsible for conceptualization, study design and implementation, data analysis, interpretation, writing and revisions, and supervision. TG and MR were responsible for study implementation, data analysis, interpretation, writing, and revisions. QZ and MM were responsible for data analysis, interpretation, writing, and revisions.</p>
      </fn>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hulkower</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Penn</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Schmit</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Magnuson</surname>
              <given-names>JA</given-names>
            </name>
            <name name-style="western">
              <surname>Dixon</surname>
              <given-names>BE</given-names>
            </name>
          </person-group>
          <article-title>Privacy and confidentiality of public health information</article-title>
          <source>Public Health Informatics and Information Systems</source>
          <year>2020</year>
          <publisher-loc>Cham, Switzerland</publisher-loc>
          <publisher-name>Springer Nature</publisher-name>
          <fpage>147</fpage>
          <lpage>166</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schmit</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Kelly</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Bernstein</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Cross Sector Data Sharing: Necessity, Challenge, and Hope</article-title>
          <source>J Law Med Ethics</source>
          <year>2019</year>
          <month>06</month>
          <volume>47</volume>
          <issue>2_suppl</issue>
          <fpage>83</fpage>
          <lpage>86</lpage>
          <pub-id pub-id-type="doi">10.1177/1073110519857325</pub-id>
          <pub-id pub-id-type="medline">31298141</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Begley</surname>
              <given-names>EB</given-names>
            </name>
            <name name-style="western">
              <surname>Ware</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Hexem</surname>
              <given-names>SA</given-names>
            </name>
            <name name-style="western">
              <surname>Rapposelli</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Thompson</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Penn</surname>
              <given-names>MS</given-names>
            </name>
            <name name-style="western">
              <surname>Aquino</surname>
              <given-names>GA</given-names>
            </name>
          </person-group>
          <article-title>Personally Identifiable Information in State Laws: Use, Release, and Collaboration at Health Departments</article-title>
          <source>Am J Public Health</source>
          <year>2017</year>
          <month>08</month>
          <volume>107</volume>
          <issue>8</issue>
          <fpage>1272</fpage>
          <lpage>1276</lpage>
          <pub-id pub-id-type="doi">10.2105/ajph.2017.303862</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>O'Connor</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Matthews</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Informational Privacy, Public Health, and State Laws</article-title>
          <source>Am J Public Health</source>
          <year>2011</year>
          <month>10</month>
          <volume>101</volume>
          <issue>10</issue>
          <fpage>1845</fpage>
          <lpage>1850</lpage>
          <pub-id pub-id-type="doi">10.2105/ajph.2011.300206</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Savage</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>To bring health information privacy into the 21st century, look beyond HIPAA</article-title>
          <source>Health Affairs Blog</source>
          <year>2018</year>
          <month>07</month>
          <day>05</day>
          <access-date>2020-07-15</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.healthaffairs.org/do/10.1377/hblog20180702.168974/full/">https://www.healthaffairs.org/do/10.1377/hblog20180702.168974/full/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wartenberg</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Thompson</surname>
              <given-names>WD</given-names>
            </name>
          </person-group>
          <article-title>Privacy Versus Public Health: The Impact of Current Confidentiality Rules</article-title>
          <source>Am J Public Health</source>
          <year>2010</year>
          <month>03</month>
          <volume>100</volume>
          <issue>3</issue>
          <fpage>407</fpage>
          <lpage>412</lpage>
          <pub-id pub-id-type="doi">10.2105/ajph.2009.166249</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kum</surname>
              <given-names>HC</given-names>
            </name>
            <name name-style="western">
              <surname>Ahalt</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Privacy-by-Design: Understanding Data Access Models for Secondary Data</article-title>
          <source>AMIA Jt Summits Transl Sci Proc</source>
          <year>2013</year>
          <volume>2013</volume>
          <fpage>126</fpage>
          <lpage>30</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/24303251"/>
          </comment>
          <pub-id pub-id-type="medline">24303251</pub-id>
          <pub-id pub-id-type="pmcid">PMC3845756</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Elfin</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>DNA testing? you might want to wait for more legal protection</article-title>
          <source>Bloomberg Law</source>
          <year>2019</year>
          <month>01</month>
          <day>07</day>
          <access-date>2020-05-25</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://news.bloomberglaw.com/pharma-and-life-sciences/dna-testing-you-might-want-to-wait-for-more-legal-protection">https://news.bloomberglaw.com/pharma-and-life-sciences/dna-testing-you-might-want-to-wait-for-more-legal-protection</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>North</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Google, Fitbit, and the sale of our private health data</article-title>
          <source>Health Law &#38; Policy Brief</source>
          <year>2019</year>
          <month>11</month>
          <day>18</day>
          <access-date>2020-05-25</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.healthlawpolicy.org/google-fitbit-and-the-sale-of-our-private-health-data/">http://www.healthlawpolicy.org/google-fitbit-and-the-sale-of-our-private-health-data/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="web">
          <article-title>Federal Trade Commission Act</article-title>
          <source>Federal Trade Commission</source>
          <year>2012</year>
          <access-date>2021-06-14</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ftc.gov/enforcement/statutes/federal-trade-commission-act">https://www.ftc.gov/enforcement/statutes/federal-trade-commission-act</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Granville</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Facebook and Cambridge Analytica: What you need to know as the fallout widens</article-title>
          <source>The New York Times</source>
          <year>2018</year>
          <month>03</month>
          <day>19</day>
          <access-date>2020-05-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.nytimes.com/2018/03/19/technology/facebook-cambridge-analytica-explained.html">https://www.nytimes.com/2018/03/19/technology/facebook-cambridge-analytica-explained.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="web">
          <article-title>California Consumer Privacy Act</article-title>
          <source>State of California Department of Justice</source>
          <year>2018</year>
          <access-date>2021-06-14</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://oag.ca.gov/privacy/ccpa">https://oag.ca.gov/privacy/ccpa</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>European Commission</collab>
          </person-group>
          <article-title>General Data Protection Regulation</article-title>
          <source>Official Journal of the European Union</source>
          <year>2018</year>
          <month>05</month>
          <day>25</day>
          <access-date>2021-06-14</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A52018PC0249&#38;qid=1623685068702">https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A52018PC0249&#38;qid=1623685068702</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cameron</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>FTC members unanimously press Congress for tough national privacy protections</article-title>
          <source>Gizmodo</source>
          <year>2019</year>
          <month>05</month>
          <day>08</day>
          <access-date>2020-05-21</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://gizmodo.com/ftc-members-unanimously-press-congress-for-tough-nation-1834624258">https://gizmodo.com/ftc-members-unanimously-press-congress-for-tough-nation-1834624258</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mulligan</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Freeman</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Linebaugh</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Data protection law: An overview</article-title>
          <source>Congressional Research Service</source>
          <access-date>2020-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://crsreports.congress.gov/product/pdf/R/R45631">https://crsreports.congress.gov/product/pdf/R/R45631</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dinur</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Nissim</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Revealing Information while Preserving Privacy</article-title>
          <source>PODS '03: Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems</source>
          <year>2003</year>
          <month>06</month>
          <day>09</day>
          <fpage>202</fpage>
          <lpage>210</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/773153.773173"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/773153.773173</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ragan</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Kum</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Ilangovan</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Balancing privacy and information disclosure in interactive record linkage with visual masking</article-title>
          <year>2018</year>
          <month>04</month>
          <day>20</day>
          <conf-name>Proceedings of the  CHI Conference on Human Factors in Computing Systems</conf-name>
          <conf-date>April</conf-date>
          <conf-loc>New York</conf-loc>
          <fpage>1</fpage>
          <lpage>12</lpage>
          <pub-id pub-id-type="doi">10.1145/3173574.3173900</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kum</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Krishnamurthy</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Machanavajjhala</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Ahalt</surname>
              <given-names>SC</given-names>
            </name>
          </person-group>
          <article-title>Social Genome: Putting Big Data to Work for Population Informatics</article-title>
          <source>Computer</source>
          <year>2014</year>
          <month>01</month>
          <volume>47</volume>
          <issue>1</issue>
          <fpage>56</fpage>
          <lpage>63</lpage>
          <pub-id pub-id-type="doi">10.1109/mc.2013.405</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Aitken</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>de St Jorre</surname>
              <given-names>Jenna</given-names>
            </name>
            <name name-style="western">
              <surname>Pagliari</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Jepson</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Cunningham-Burley</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Public responses to the sharing and linkage of health data for research purposes: a systematic review and thematic synthesis of qualitative studies</article-title>
          <source>BMC Med Ethics</source>
          <year>2016</year>
          <month>11</month>
          <day>10</day>
          <volume>17</volume>
          <issue>1</issue>
          <fpage>73</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedethics.biomedcentral.com/articles/10.1186/s12910-016-0153-x"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12910-016-0153-x</pub-id>
          <pub-id pub-id-type="medline">27832780</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12910-016-0153-x</pub-id>
          <pub-id pub-id-type="pmcid">PMC5103425</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Damschroder</surname>
              <given-names>LJ</given-names>
            </name>
            <name name-style="western">
              <surname>Pritts</surname>
              <given-names>JL</given-names>
            </name>
            <name name-style="western">
              <surname>Neblo</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Kalarickal</surname>
              <given-names>RJ</given-names>
            </name>
            <name name-style="western">
              <surname>Creswell</surname>
              <given-names>JW</given-names>
            </name>
            <name name-style="western">
              <surname>Hayward</surname>
              <given-names>RA</given-names>
            </name>
          </person-group>
          <article-title>Patients, privacy and trust: patients' willingness to allow researchers to access their medical records</article-title>
          <source>Soc Sci Med</source>
          <year>2007</year>
          <month>01</month>
          <volume>64</volume>
          <issue>1</issue>
          <fpage>223</fpage>
          <lpage>35</lpage>
          <pub-id pub-id-type="doi">10.1016/j.socscimed.2006.08.045</pub-id>
          <pub-id pub-id-type="medline">17045717</pub-id>
          <pub-id pub-id-type="pii">S0277-9536(06)00444-8</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Haga</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>O'Daniel</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Public perspectives regarding data-sharing practices in genomics research</article-title>
          <source>Public Health Genomics</source>
          <year>2011</year>
          <volume>14</volume>
          <issue>6</issue>
          <fpage>319</fpage>
          <lpage>24</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.karger.com?DOI=10.1159/000324705"/>
          </comment>
          <pub-id pub-id-type="doi">10.1159/000324705</pub-id>
          <pub-id pub-id-type="medline">21430368</pub-id>
          <pub-id pub-id-type="pii">000324705</pub-id>
          <pub-id pub-id-type="pmcid">PMC3221256</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>O'Brien</surname>
              <given-names>Emily C</given-names>
            </name>
            <name name-style="western">
              <surname>Rodriguez</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>Kum</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Schanberg</surname>
              <given-names>LE</given-names>
            </name>
            <name name-style="western">
              <surname>Fitz-Randolph</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>O'Brien</surname>
              <given-names>Sean M</given-names>
            </name>
            <name name-style="western">
              <surname>Setoguchi</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Patient perspectives on the linkage of health data for research: Insights from an online patient community questionnaire</article-title>
          <source>Int J Med Inform</source>
          <year>2019</year>
          <month>07</month>
          <volume>127</volume>
          <fpage>9</fpage>
          <lpage>17</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1386-5056(18)31263-2"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2019.04.003</pub-id>
          <pub-id pub-id-type="medline">31128837</pub-id>
          <pub-id pub-id-type="pii">S1386-5056(18)31263-2</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Willison</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Keshavjee</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Nair</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Goldsmith</surname>
              <given-names>Charlie</given-names>
            </name>
            <name name-style="western">
              <surname>Holbrook</surname>
              <given-names>Anne M</given-names>
            </name>
            <collab>Computerization of Medical Practices for the Enhancement of Therapeutic Effectiveness investigators</collab>
          </person-group>
          <article-title>Patients' consent preferences for research uses of information in electronic medical records: interview and survey data</article-title>
          <source>BMJ</source>
          <year>2003</year>
          <month>02</month>
          <day>15</day>
          <volume>326</volume>
          <issue>7385</issue>
          <fpage>373</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/12586673"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/bmj.326.7385.373</pub-id>
          <pub-id pub-id-type="medline">12586673</pub-id>
          <pub-id pub-id-type="pmcid">PMC148897</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Siddiqui</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Heuristics for sample size determination in multivariate statistical techniques</article-title>
          <source>World Applied Sciences Journal</source>
          <year>2013</year>
          <volume>27</volume>
          <issue>2</issue>
          <fpage>285</fpage>
          <lpage>7</lpage>
          <pub-id pub-id-type="doi">10.1002/0471667196.ess2329</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>HJ</given-names>
            </name>
            <name name-style="western">
              <surname>Milberg</surname>
              <given-names>SJ</given-names>
            </name>
            <name name-style="western">
              <surname>Burke</surname>
              <given-names>SJ</given-names>
            </name>
          </person-group>
          <article-title>Information Privacy: Measuring Individuals' Concerns about Organizational Practices</article-title>
          <source>MIS Quarterly</source>
          <year>1996</year>
          <month>06</month>
          <volume>20</volume>
          <issue>2</issue>
          <fpage>167</fpage>
          <pub-id pub-id-type="doi">10.2307/249477</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Stewart</surname>
              <given-names>KA</given-names>
            </name>
            <name name-style="western">
              <surname>Segars</surname>
              <given-names>AH</given-names>
            </name>
          </person-group>
          <article-title>An Empirical Examination of the Concern for Information Privacy Instrument</article-title>
          <source>Information Systems Research</source>
          <year>2002</year>
          <month>03</month>
          <volume>13</volume>
          <issue>1</issue>
          <fpage>36</fpage>
          <lpage>49</lpage>
          <pub-id pub-id-type="doi">10.1287/isre.13.1.36.97</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ben-Akiva</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>de Palma</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>McFadden</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Abou-Zeid</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Chiappori</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>de Lapparent</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Durlauf</surname>
              <given-names>SN</given-names>
            </name>
            <name name-style="western">
              <surname>Fosgerau</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Fukuda</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Hess</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Manski</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Pakes</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Picard</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Walker</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Process and context in choice models</article-title>
          <source>Mark Lett</source>
          <year>2012</year>
          <month>5</month>
          <day>17</day>
          <volume>23</volume>
          <issue>2</issue>
          <fpage>439</fpage>
          <lpage>456</lpage>
          <pub-id pub-id-type="doi">10.1007/s11002-012-9180-7</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ben-Akiva</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>McFadden</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Abe</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Modeling methods for discrete choice analysis</article-title>
          <source>Marketing Letters</source>
          <year>1997</year>
          <access-date>2021-06-14</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://deepblue.lib.umich.edu/bitstream/handle/2027.42/47225/11002_2004_Article_138116.pdf?sequence=1">https://deepblue.lib.umich.edu/bitstream/handle/2027.42/47225/11002_2004_Article_138116.pdf?sequence=1</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bridges</surname>
              <given-names>JF</given-names>
            </name>
            <name name-style="western">
              <surname>Hauber</surname>
              <given-names>AB</given-names>
            </name>
            <name name-style="western">
              <surname>Marshall</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Lloyd</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Prosser</surname>
              <given-names>LA</given-names>
            </name>
            <name name-style="western">
              <surname>Regier</surname>
              <given-names>DA</given-names>
            </name>
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>FR</given-names>
            </name>
            <name name-style="western">
              <surname>Mauskopf</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Conjoint analysis applications in health--a checklist: a report of the ISPOR Good Research Practices for Conjoint Analysis Task Force</article-title>
          <source>Value Health</source>
          <year>2011</year>
          <month>06</month>
          <volume>14</volume>
          <issue>4</issue>
          <fpage>403</fpage>
          <lpage>13</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1098-3015(10)00083-5"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jval.2010.11.013</pub-id>
          <pub-id pub-id-type="medline">21669364</pub-id>
          <pub-id pub-id-type="pii">S1098-3015(10)00083-5</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ryan</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Farrar</surname>
              <given-names>SJB</given-names>
            </name>
          </person-group>
          <article-title>Using conjoint analysis to elicit preferences for health care</article-title>
          <source>BMJ</source>
          <year>2000</year>
          <month>06</month>
          <day>03</day>
          <volume>320</volume>
          <issue>7248</issue>
          <fpage>1530</fpage>
          <lpage>3</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/10834905"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/bmj.320.7248.1530</pub-id>
          <pub-id pub-id-type="medline">10834905</pub-id>
          <pub-id pub-id-type="pmcid">PMC1118112</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lancsar</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Louviere</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Conducting discrete choice experiments to inform healthcare decision making: a user's guide</article-title>
          <source>Pharmacoeconomics</source>
          <year>2008</year>
          <volume>26</volume>
          <issue>8</issue>
          <fpage>661</fpage>
          <lpage>77</lpage>
          <pub-id pub-id-type="doi">10.2165/00019053-200826080-00004</pub-id>
          <pub-id pub-id-type="medline">18620460</pub-id>
          <pub-id pub-id-type="pii">2684</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Marshall</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Bridges</surname>
              <given-names>JF</given-names>
            </name>
            <name name-style="western">
              <surname>Hauber</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Cameron</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Donnalley</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Fyie</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>FR</given-names>
            </name>
          </person-group>
          <article-title>Conjoint Analysis Applications in Health - How are Studies being Designed and Reported?: An Update on Current Practice in the Published Literature between 2005 and 2008</article-title>
          <source>Patient</source>
          <year>2010</year>
          <month>12</month>
          <day>01</day>
          <volume>3</volume>
          <issue>4</issue>
          <fpage>249</fpage>
          <lpage>56</lpage>
          <pub-id pub-id-type="doi">10.2165/11539650-000000000-00000</pub-id>
          <pub-id pub-id-type="medline">22273432</pub-id>
          <pub-id pub-id-type="pii">01312067-201003040-00006</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Soekhai</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>de Bekker-Grob</surname>
              <given-names>EW</given-names>
            </name>
            <name name-style="western">
              <surname>Ellis</surname>
              <given-names>AR</given-names>
            </name>
            <name name-style="western">
              <surname>Vass</surname>
              <given-names>CM</given-names>
            </name>
          </person-group>
          <article-title>Discrete Choice Experiments in Health Economics: Past, Present and Future</article-title>
          <source>Pharmacoeconomics</source>
          <year>2019</year>
          <month>02</month>
          <volume>37</volume>
          <issue>2</issue>
          <fpage>201</fpage>
          <lpage>226</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/30392040"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s40273-018-0734-2</pub-id>
          <pub-id pub-id-type="medline">30392040</pub-id>
          <pub-id pub-id-type="pii">10.1007/s40273-018-0734-2</pub-id>
          <pub-id pub-id-type="pmcid">PMC6386055</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zimmermann</surname>
              <given-names>TM</given-names>
            </name>
            <name name-style="western">
              <surname>Clouth</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Elosge</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Heurich</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Schneider</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Wilhelm</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Wolfrath</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Patient preferences for outcomes of depression treatment in Germany: a choice-based conjoint analysis study</article-title>
          <source>J Affect Disord</source>
          <year>2013</year>
          <month>06</month>
          <volume>148</volume>
          <issue>2-3</issue>
          <fpage>210</fpage>
          <lpage>9</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jad.2012.11.062</pub-id>
          <pub-id pub-id-type="medline">23290792</pub-id>
          <pub-id pub-id-type="pii">S0165-0327(12)00829-4</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="web">
          <article-title>45 CFR Parts 160 and 164</article-title>
          <source>HIPAA Privacy Rule</source>
          <access-date>2021-06-14</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.hhs.gov/hipaa/for-professionals/privacy/guidance/introduction/index.html">https://www.hhs.gov/hipaa/for-professionals/privacy/guidance/introduction/index.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lamdan</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Privacy act of 1974</article-title>
          <source>The SAGE Encyclopedia of Surveillance, Security, and Privacy</source>
          <year>2018</year>
          <access-date>2021-06-14</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://sk.sagepub.com/reference/the-sage-encyclopedia-of-surveillance-security-privacy/i9567.xml">http://sk.sagepub.com/reference/the-sage-encyclopedia-of-surveillance-security-privacy/i9567.xml</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Porter</surname>
              <given-names>JP</given-names>
            </name>
          </person-group>
          <article-title>The Federal Policy for the Protection of Human Subjects</article-title>
          <source>IRB: Ethics and Human Research</source>
          <year>1991</year>
          <month>09</month>
          <volume>13</volume>
          <issue>5</issue>
          <fpage>8</fpage>
          <pub-id pub-id-type="doi">10.2307/3564127</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="web">
          <article-title>Family educational rights and privacy act (FERPA)</article-title>
          <source>US Department of Education</source>
          <year>1988</year>
          <access-date>2021-06-14</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www2.ed.gov/policy/gen/guid/fpco/ferpa/index.html">https://www2.ed.gov/policy/gen/guid/fpco/ferpa/index.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Frost</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Freeman</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Brixner</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Mort</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Clem</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ngorsuraches</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Patients' preferences and willingness-to-pay for disease-modifying therapies</article-title>
          <source>Mult Scler Relat Disord</source>
          <year>2019</year>
          <month>10</month>
          <volume>35</volume>
          <fpage>55</fpage>
          <lpage>60</lpage>
          <pub-id pub-id-type="doi">10.1016/j.msard.2019.07.005</pub-id>
          <pub-id pub-id-type="medline">31323483</pub-id>
          <pub-id pub-id-type="pii">S2211-0348(19)30289-5</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jaynes</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Wong</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Using blocked fractional factorial designs to construct discrete choice experiments for healthcare studies</article-title>
          <source>Stat Med</source>
          <year>2016</year>
          <month>07</month>
          <day>10</day>
          <volume>35</volume>
          <issue>15</issue>
          <fpage>2543</fpage>
          <lpage>60</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/26823156"/>
          </comment>
          <pub-id pub-id-type="doi">10.1002/sim.6882</pub-id>
          <pub-id pub-id-type="medline">26823156</pub-id>
          <pub-id pub-id-type="pmcid">PMC4893005</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Allenby</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Rossi</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Grover</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Vriens</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Hierarchical bayes models</article-title>
          <source>The Handbook of Marketing Research: Uses, Misuses, and Future Advances</source>
          <year>2006</year>
          <publisher-loc>Thousand Oaks, CA</publisher-loc>
          <publisher-name>Sage Publications, Inc</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mohammadi</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Sou</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Langlois</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Munro</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Anis</surname>
              <given-names>AH</given-names>
            </name>
          </person-group>
          <article-title>A Hierarchical Bayes Approach to Modeling Heterogeneity in Discrete Choice Experiments: An Application to Public Preferences for Prenatal Screening</article-title>
          <source>Patient</source>
          <year>2020</year>
          <month>04</month>
          <volume>13</volume>
          <issue>2</issue>
          <fpage>211</fpage>
          <lpage>223</lpage>
          <pub-id pub-id-type="doi">10.1007/s40271-019-00402-w</pub-id>
          <pub-id pub-id-type="medline">31814082</pub-id>
          <pub-id pub-id-type="pii">10.1007/s40271-019-00402-w</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Regier</surname>
              <given-names>DA</given-names>
            </name>
            <name name-style="western">
              <surname>Ryan</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Phimister</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Marra</surname>
              <given-names>CA</given-names>
            </name>
          </person-group>
          <article-title>Bayesian and classical estimation of mixed logit: An application to genetic testing</article-title>
          <source>J Health Econ</source>
          <year>2009</year>
          <month>05</month>
          <volume>28</volume>
          <issue>3</issue>
          <fpage>598</fpage>
          <lpage>610</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jhealeco.2008.11.003</pub-id>
          <pub-id pub-id-type="medline">19345433</pub-id>
          <pub-id pub-id-type="pii">S0167-6296(08)00189-6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sermas</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Colias</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <source>ChoiceModelR</source>
          <year>2015</year>
          <access-date>2020-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://cran.r-project.org/web/packages/ChoiceModelR/ChoiceModelR.pdf">https://cran.r-project.org/web/packages/ChoiceModelR/ChoiceModelR.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Berchick</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Hood</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Barnett</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Health insurance coverage in the United States: 2018</article-title>
          <source>US Census Bureau</source>
          <year>2019</year>
          <month>11</month>
          <access-date>2021-06-14</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.census.gov/content/dam/Census/library/publications/2019/demo/p60-267.pdf">https://www.census.gov/content/dam/Census/library/publications/2019/demo/p60-267.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Solove</surname>
              <given-names>DJ</given-names>
            </name>
            <name name-style="western">
              <surname>Hartzog</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>The FTC and the New Common Law of Privacy</article-title>
          <source>Columbia Law Review</source>
          <year>2014</year>
          <volume>114</volume>
          <fpage>583</fpage>
          <pub-id pub-id-type="doi">10.2139/ssrn.2312913</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Frakt</surname>
              <given-names>AB</given-names>
            </name>
            <name name-style="western">
              <surname>Bagley</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Protection or Harm? Suppressing Substance-Use Data</article-title>
          <source>N Engl J Med</source>
          <year>2015</year>
          <month>05</month>
          <day>14</day>
          <volume>372</volume>
          <issue>20</issue>
          <fpage>1879</fpage>
          <lpage>1881</lpage>
          <pub-id pub-id-type="doi">10.1056/nejmp1501362</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>O’Sullivan</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>How the cell phones of spring breakers who flouted coronavirus warnings were tracked?</article-title>
          <source>CNN</source>
          <year>2020</year>
          <month>04</month>
          <day>04</day>
          <access-date>2020-05-25</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.cnn.com/2020/04/04/tech/location-tracking-florida-coronavirus/index.html">https://www.cnn.com/2020/04/04/tech/location-tracking-florida-coronavirus/index.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="web">
          <article-title>Equifax data breach settlement</article-title>
          <source>Federal Trade Commission</source>
          <year>2020</year>
          <access-date>2020-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ftc.gov/enforcement/cases-proceedings/refunds/equifax-data-breach-settlement">https://www.ftc.gov/enforcement/cases-proceedings/refunds/equifax-data-breach-settlement</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bari</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>O’Neill</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Rethinking patient data privacy in the era of digital health</article-title>
          <source>Health Affairs Blog</source>
          <year>2019</year>
          <access-date>2020-07-16</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.healthaffairs.org/do/10.1377/hblog20191210.216658/full/">https://www.healthaffairs.org/do/10.1377/hblog20191210.216658/full/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>European Parliament</collab>
          </person-group>
          <article-title>GDPR article 6 (1)(e)</article-title>
          <source>Official Journal of the European Union</source>
          <year>2018</year>
          <month>05</month>
          <day>25</day>
          <access-date>2021-06-14</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679">https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>European Parliament</collab>
          </person-group>
          <article-title>GDPR articles 5 (1)(b), 89(1)</article-title>
          <source>Official Journal of the European Union</source>
          <year>2018</year>
          <month>05</month>
          <day>25</day>
          <access-date>2021-06-14</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679">https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Nass</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Levit</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Gostin</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <source>Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research</source>
          <year>2009</year>
          <publisher-loc>Washington DC</publisher-loc>
          <publisher-name>National Academies Press</publisher-name>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
