<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Health data leaks to third parties in web-based health services</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Sampsa</forename><surname>Rauti</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Turku</orgName>
								<address>
									<addrLine>Vesilinnantie 5</addrLine>
									<postCode>20500</postCode>
									<settlement>Turku</settlement>
									<country key="FI">Finland</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Robin</forename><surname>Carlsson</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Turku</orgName>
								<address>
									<addrLine>Vesilinnantie 5</addrLine>
									<postCode>20500</postCode>
									<settlement>Turku</settlement>
									<country key="FI">Finland</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Samuli</forename><surname>Laato</surname></persName>
							<email>samuli.laato@tuni.fi</email>
							<affiliation key="aff1">
								<orgName type="institution">Tampere University</orgName>
								<address>
									<addrLine>Kalevantie 4</addrLine>
									<postCode>33100</postCode>
									<settlement>Tampere</settlement>
									<country key="FI">Finland</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Timi</forename><surname>Heino</surname></persName>
							<email>tdhein@utu.fi</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Turku</orgName>
								<address>
									<addrLine>Vesilinnantie 5</addrLine>
									<postCode>20500</postCode>
									<settlement>Turku</settlement>
									<country key="FI">Finland</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Panu</forename><surname>Puhtila</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Turku</orgName>
								<address>
									<addrLine>Vesilinnantie 5</addrLine>
									<postCode>20500</postCode>
									<settlement>Turku</settlement>
									<country key="FI">Finland</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ville</forename><surname>Leppänen</surname></persName>
							<email>ville.leppanen@utu.fi</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Turku</orgName>
								<address>
									<addrLine>Vesilinnantie 5</addrLine>
									<postCode>20500</postCode>
									<settlement>Turku</settlement>
									<country key="FI">Finland</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Health data leaks to third parties in web-based health services</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">3BE8D41D9662A6DF8E308C87EDA2E5EF</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:26+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Medical websites</term>
					<term>data leaks</term>
					<term>data concerning health</term>
					<term>web privacy</term>
					<term>third-party services</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Today, users may share sensitive health data on web-based health services. We rely on these services to keep our data safe and secured, but this is not always the case. Therefore, this study investigates the privacy of a snapshot of 10 Finnish web-based health services, providing an analysis of health data leaks. We show that all analyzed services leaked at least some kind of personal data to third parties -from topics of visited pages to details on appointment bookings. While the situation has improved after we have notified the health service providers about this issue, the study serves as a reminder of the ongoing challenges in protecting user privacy in online health services and highlights the pressing need to address these issues.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Web-based health services have become a vital part of essential electronic services <ref type="bibr" target="#b0">[1]</ref>. Booking appointments, viewing personal health information and test results, and searching for health-related information can be conveniently carried out online. Many web-based healthcare services, such as medical centers' websites, process sensitive personal information concerning health. Due to the sensitivity of this data, it is critical to ensure it remains confidential and does not leak to third parties <ref type="bibr" target="#b1">[2]</ref>.</p><p>However, previous research has demonstrated that across websites and services, regardless of sensitivity requirements, numerous third-party services and components, such as web analytics, are often used <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4]</ref>. Using such services makes monitoring business goals and improving user experience more convenient, but at the same time, there is a risk that sensitive information is leaked through these third party services. This typically happens without users' knowledge, and also unbeknownst to website developers and maintainers.</p><p>This study conducts an in-depth examination of the privacy of 10 web-based health services. We present an overview of health data leaks, an issue that an even larger group of web-based health services is likely to have. Our study specifically focuses on the privacy and confidentiality of Finnish web-based health services. Hence, in this study we address the following research question: Do web-based healthcare services leak sensitive data related to an individual user's health status? This paper serves as an analysis and discussion on the privacy threats associated with integrating third-party services in web-based health services.</p><p>The rest of the paper is organized as follows. Section 2 reviews related work on the privacy of medical websites. Section 3 outlines the study setting and the method, describing how the studied websites were selected and how the network traffic analysis was performed. Section 4 discusses the results of our network traffic analysis and explores the found data leaks. Section 5 presents a discussion on our</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related work</head><p>In recent years, a number of papers pertinent to our research have been published. Huo et al. <ref type="bibr" target="#b4">[5]</ref> analyzed 459 health-related web portals and found that Google Analytics was used in 14% of them. Sensitive health data leaks were present on 9 websites, and details on e.g. prescribed medicines and laboratory results were transferred to third parties. Libert <ref type="bibr" target="#b5">[6]</ref> investigates the problem of leaking health data contained in URL addresses to third parties. Zheutlin et al. <ref type="bibr" target="#b6">[7]</ref> studied user data tracking through third-party cookies on USA-based government, non-profit, and commercial health-related websites, but did not go into detail about what personal data is sent to third parties.</p><p>Friedman et al. <ref type="bibr" target="#b7">[8]</ref> discussed the risks of third-party tracking technologies in hospital websites, highlighting potential legal liabilities. Yu et al. <ref type="bibr" target="#b8">[9]</ref> conducted a large-scale automated survey on hospital websites around the world, revealing that 53.5% of them employed tracking tools that collected user data. Friedman et al. <ref type="bibr" target="#b9">[10]</ref> examined the prevalence of third-party tracking tools in abortion clinic websites and concluded that the majority (99.1%) used some form of tracking tool leaking user data to third parties. Surani et al. <ref type="bibr" target="#b10">[11]</ref> found clear deficiencies in privacy policies of web-based health services.</p><p>Huesch <ref type="bibr" target="#b11">[12]</ref> reminds that searching and accessing free health-related information online raises concerns about privacy and the potential for information on a user's health to be used for profiling and targeted advertising. Wesselkamp et al. <ref type="bibr" target="#b12">[13]</ref> studied 385 medical websites in the EU area. They found that 62% used tracking tools before user consent for data collection and 15% tracked the user even after consent rejection. Kes et al. <ref type="bibr" target="#b13">[14]</ref> argue that collecting of users' health data on websites, despite privacy concerns, can lead to an improved user experience akin to a personalized customer relationship. Still, the actual benefits are debatable, and transferring health data to third parties to improve targeted advertising is very problematic in the light of the GDPR.</p><p>Compared to many earlier studies, the current study conducts a more in-depth examination of types of personal data that web-based health services leak to third parties in different scenarios. We show that the issue of third-party analytics being present in web-based health services re-mains a significant problem despite having been addressed in research well over ten years ago <ref type="bibr" target="#b14">[15]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Study Setting and Method</head><p>We selected 10 Finnish web-based health services for closer inspection in this study. We chose the websites of several important healthcare providers in Finland, such as medical centers, therapy houses, and laboratories. We searched healthcare providers using the Google search engine, with keywords "lääkärikeskus" (medical center), "terapia" (therapy) and "laboratorio" (laboratory). Instead of analyzing a large number of health services, our study examines the network traffic of these services more thoroughly. It includes various usage scenarios where sensitive health data web services process can leak to third parties. We examined the data leaks in the chosen services two times, first in December 2022 and then again in February 2024 after the service providers had been informed of the issue.</p><p>It is important to note that we aim to address privacy challenges at a general level and avoid singling out the affected health service providers in a negative light. To adhere to ethical research practices, the chosen web services are not referred to by their actual names but are denoted by abbreviations WS1-WS10.</p><p>In our test sequence, the browser cache was first cleared, cookies were deleted, and then the front page of the health service under examination was opened. On the front page, all cookies and data collection were accepted. When using the health service, all network traffic was recorded using Google Chrome browser developer tools (DevTools). The network traffic recordings were saved as HAR files (HTTP Archive) for more detailed analysis. We manually examined the log files, searching through the HTTP request payloads and documented all instances of personal data meticulously.</p><p>Here we considered two distinct categories of personal data:</p><p>• Identifying data, capable of uniquely identifying the website user, such as IP addresses, User-Agent strings, and device-specific identifiers. Identification may also happen with a combination of technical details, including operating system or browser details, window size, etc. • Sensitive contextual data, for example an URL address containing a sensitive search term used on a medical website, or details on a booked appointment. Although this kind of sensitive contextual data is often contained in URL addresses sent to a third party, it may also be elsewhere in the HTTP request payload.</p><p>What makes data leaks dangerous is the combination of these two categories: identifying a user by e.g. their IP address and then combining this to sensitive contextual data such as details on doctor's appointment. This enables third parties to infer user's potential medical conditions, for example. It is also worth noting that while the identifying personal data such as an IP address cannot always be immediately combined to a person's identity (real name), large technology companies such and Google and Meta often have the capability to fully identify the user, as users may use the same device to login to the other services run by these companies.</p><p>Four common usage scenarios where the leakage of health data to third parties is possible were recorded while using the health services. The chosen scenarios were key functionalities of the web-based health services that involved processing of sensitive personal data, and the scenarios varied based on the tested service. Network traffic was recorded when 1) booking an appointment, 2) viewing personal information, 3) using the search function, and 4) accessing information pages.</p><p>For the appointment booking scenario, network traffic was recorded from clicking the appointment link on the front page to the final stage of making the appointment. In other words, the test was concluded before the final confirmation of the appointment. In the appointment scenario, an appointment was scheduled with a specific specialist (such as a doctor or therapist). We also conducted a separate test for booking an appointment for a specific procedure or service (e.g. a COVID-19 test or influenza vaccination) if such an option was available in the tested health service.</p><p>The second scenario, viewing personal information, refers to the section behind the authentication of the web service. In this section of the web service, users can usually review their own prescriptions, test results, vaccinations, or previous appointments. In this scenario, we investigated whether data leaks occur when the user displays different types of personal information. For example, information about laboratory results and previous appointments could potentially be disclosed to third parties.</p><p>We also examined the possible leaks when using the search functions of the studied web services. The leakage of search terms to third parties can be particularly dangerous, because users may input highly sensitive terms, such as the name of a specific disease or symptom. If user-defined search terms are transmitted to third parties, these external actors can possibly build a detailed profile of the user's assumed health status and medical history.</p><p>The fourth usage scenario was related to information pages within web services, often containing information about specific diseases. It can be problematic if information about the pages a user browses is sent to third parties, as users can be profiled based on this. This can be especially effective over a longer time period.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Results</head><p>Figure <ref type="figure" target="#fig_0">1</ref> displays information leaked to third parties on the studied websites (December 2022). Each cell in Figure <ref type="figure" target="#fig_0">1</ref> indicates a leak of specific information type in a specific health service. The numbers indicate how many third parties the information was leaked to. For example, information about initiating an appointment booking was leaked to 5 different third parties in WS1.</p><p>A common data leak pertained to the use of the appointment booking function. Even though the appointment booking process was not completed in this study, the information about initiating this process indicates the user's intention to make a booking. In all services except for one (WS7), information about initiating the appointment booking process leaked to at least one third party. In three services, details about entering specific stages of the appointment booking process (e.g., selecting a time for the appointment, entering personal information) also leaked. Leaking any information about the appointment booking process is a problem because it strongly indicates a relationship between the patient and health provider. This kind of relationship must be kept confidential according to the Finnish Deputy Seven of the studied web services leaked additional information about appointments to third parties. These included the selected clinic location (3 web services), appointment date (3), appointment time (1), the name of the specialist (e.g., doctor) (3), the specialist's field of expertise (2), and whether the appointment was made as a private or occupational health customer (2). The selected service (e.g., influenza vaccination, COVID-19 test, or STD test) also leaked on three of the studied websites. In one case (WS10), the specific region (e.g., Central Finland) leaked instead of the exact clinic location.</p><p>The information transmitted to the third party about the initiation of the appointment is problematic by itself, because it implies a relationship between a patient and a healthcare provider. Details about the reserved health service or the doctor's name reveal the nature of this relationship even more precisely. It is also important to understand that a third party can often track a specific individual's online activities over a long period of time. When multiple appointments accumulate, a clear picture of the patient's treatment measures and health status begins to emerge.</p><p>Figure <ref type="figure" target="#fig_0">1</ref> also shows how users' searches were tracked. Notably, in all seven cases where a health service website had a search function, potentially sensitive search terms were transferred to at least one third party, and in the worst cases (WS4 and WS8), even up to four separate analytics services.</p><p>In all 10 examined health services, the URL addresses of information pages opened by the user were delivered to at least one third party. In the case of one service (WS2), the URL was sent to six third parties. Of course, viewing an information page about a specific illness does not necessarily imply that the visitor has that illness or even suspicion of it. However, the exposure of sensitive browsed pages to multiple third-party analytics services is not favorable.</p><p>Lastly, in our experiments we found no data leaks when viewing personal information such as laboratory results after logging in to the studied services. It seems these more sensitive sections of the health services have been implemented with the privacy-by-design approach in mind.</p><p>To sum up, the findings of Figure <ref type="figure" target="#fig_0">1</ref> are concerning: for each examined health service, information leaked to third parties either from the appointment booking page or search function, in most cases, both. These pieces of informationpossibly combined with the pages the user browsed -can, in just one visit, give a third party an accurate picture of the user's current health.</p><p>Figure <ref type="figure" target="#fig_1">2</ref> shows the most common third parties (two instances or more) present in the studied health services in December 2022. Google Analytics and Meta Pixel were the most common ones, Google appearing in every single service and Meta in 8 services out of 10. The average number of third parties per health service was 5.2, which we consider a large number in websites processing such sensitive data. WS1 had a staggering 9 third parties, WS2 and WS6 following close behind with 8 third parties.</p><p>After discovering the data leaks in December 2022, the studied healthcare providers were informed about the issue. Figure <ref type="figure" target="#fig_2">3</ref> shows the updated status of data leaks in February 2024. The number of data leaks has decreased. For example, calculating the sum of all data leaks in Figure <ref type="figure" target="#fig_0">1</ref> yields 116, while this sum is 70 in Figure <ref type="figure" target="#fig_2">3</ref>. However, this number is still very disappointing. Figure <ref type="figure" target="#fig_2">3</ref> shows clearly that revealing the initiation of the appointment booking process, and leaking viewed pages and search terms to third parties are still a significant issue in majority of the studied health services, although the number of leaks has gone down. It is also surprising that highly sensitive information such as the selected health service or the name of the specialist the patient is going to see is still being leaked. Only a single service, WS5, has completely removed third-party web analytics and eliminated data leaks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Discussion</head><p>While the sensitivity of the data leaked by studied services ranged from visited information pages (not so sensitive) to details on booked appointments (highly sensitive), this data is still often directly related to the visitor's health status <ref type="bibr" target="#b5">[6]</ref>. Also, even though the dataset we collected for the current study is not large in quantity, the finding that all of the analyzed web services leaked personal data to third parties cannot be simply dismissed. Although the situation has improved with time, web-based health services in Finland  still appear to have many privacy challenges. Regrettably, it is highly likely that these issues extend well beyond the scope of the websites we examined.</p><p>Compared to many other studies (e.g. <ref type="bibr" target="#b4">[5]</ref>), we found a high number of data leaks and observed these data leaks were widespread among the services we studied. One reason for this is likely to be different data collection methods. While many previous studies use automatic collection methods, we analyzed the network traffic and data leaks manually. Also, the other studies may not consider all the same data items our study does. Our goal was to consider all contextual data items that may relate to the user's health status. Some previous studies may only include the most sensitive data leaks like leaking laboratory results and medications and possibly exclude appointment booking related information, for example. Therefore, our set of studied data items and included use scenarios was more extensive than in most studies, which affects the numbers of found data leaks.</p><p>The use of third-party analytics is very difficult to justify on web-based health services. While we strongly believe the studied web-based services have not leaked sensitive personal data intentionally and while the third parties may not abuse it, the fact this data is sent to third parties remains a concern. There are multiple precautionary measures web developers and website maintainers should adopt to prevent such leaks.</p><p>A convincing argument can be made that third-party web analytics do not belong to websites processing sensitive health data. A straightforward alternative would be eliminating third-party analytics entirely. In the cases web analytics are necessary, locally hosted services like Matomo <ref type="bibr" target="#b15">[16,</ref><ref type="bibr" target="#b16">17]</ref> should be used. With the use of such self-hosted analytics, the health service provider now has full control over the collected data and there is no need to transfer it to a third party.</p><p>If third-party services really are necessary, chosen services should be thoroughly assessed and their use should be carefully justified. Of course, there are some well-justified use cases for trusted third-party services such as chat services or appointment booking systems that are vital for the functionality of the web-based health service. On the other hand, third-party analytics cannot be deemed essential for the functionality of web-based health services to the same extent.</p><p>During the software testing phase, a careful assessment of data leakages to third parties should be conducted, similar to the approach taken in the current study. In this examination of outgoing network traffic, special attention should be paid to pages that handle sensitive data, such as appointment bookings pages. Analyzing network traffic gives developers an accurate understanding of the data third parties collect. This analysis also helps website administrators in decid-ing which third-party services should be excluded from the service altogether. It is worth noting developers may unknowingly incorporate third-party analytics into websites, as off-the-shelf platforms commonly offer easy integration options or include them by default. This is why a network traffic analysis is essential.</p><p>A good understanding of the application area, such as the healthcare sector, holds great significance. The development team should aim to gain knowledge about the privacy regulations governing this particular industry. Effective communication with stakeholders is important in order to understand the requirements for protecting sensitive health data. When talking about essential online services such as medical center websites, the implemented service should also undergo an external privacy audit.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusion</head><p>Our alarming discoveries should urge software developers and data protection officers overseeing web-based healthcare services to carefully assess the used third-party services and adopt a privacy-by-design approach. Developers and administrators of web services have to acknowledge their responsibility in protecting sensitive customer data and following fair data processing practices. The nature of processed personal data and the involved third parties have to be transparently communicated to users. When it comes to web-based medical services, it is unreasonable to rely on external services that may collect sensitive data. Failing to address serious data leaks, such as the ones presented in this study, increases the vulnerability of specific user groups online, especially in terms of privacy. Users of web-based health services should be able to see these websites as trustworthy and confidential equivalents to traditional onsite healthcare.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Data leaked in the web-based health services in December 2022.</figDesc><graphic coords="3,105.84,65.61,383.59,184.55" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: The most common third-party services present in the web-based health services in December 2022. Each third-party has only been counted once for each web service.</figDesc><graphic coords="4,184.82,65.61,225.64,142.59" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Data leaked in the web-based health services in February 2024.</figDesc><graphic coords="4,105.84,249.42,383.59,183.99" type="bitmap" /></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">https://yle.fi/a/3-11213545</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>This research has been funded by Academy of Finland project 327397, IDA -Intimacy in Data-Driven Culture.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Design and implementation of a web-service-based public-oriented personalized health care platform</title>
		<author>
			<persName><forename type="first">P</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Ding</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Jiang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Zhou</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Systems, Man, and Cybernetics: Systems</title>
		<imprint>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="page" from="941" to="957" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">A novel two phase data sensitivity based access control framework for healthcare data</title>
		<author>
			<persName><forename type="first">S</forename><surname>Saha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Chowdhury</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Neogy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Multimedia Tools and Applications</title>
		<imprint>
			<biblScope unit="volume">83</biblScope>
			<biblScope unit="page" from="8867" to="8892" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Privacy in popular children&apos;s mobile applications: A network traffic analysis</title>
		<author>
			<persName><forename type="first">R</forename><surname>Carlsson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Rauti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Laato</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Heino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Leppänen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2023 46th MIPRO ICT and Electronics Convention (MIPRO)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="1213" to="1218" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Analyzing third-party data leaks on online pharmacy websites</title>
		<author>
			<persName><forename type="first">S</forename><surname>Rauti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Carlsson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Mickelsson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Mäkilä</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Heino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Pirjatanniemi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Leppänen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Health and Technology</title>
		<imprint>
			<biblScope unit="page" from="1" to="18" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">All eyes on me: Inside third party trackers&apos; exfiltration of phi from healthcare providers&apos; online systems</title>
		<author>
			<persName><forename type="first">M</forename><surname>Huo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Bland</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Levchenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 21st Workshop on Privacy in the Electronic Society, WPES&apos;22</title>
				<meeting>the 21st Workshop on Privacy in the Electronic Society, WPES&apos;22<address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>Association for Computing Machinery</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="197" to="211" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Privacy implications of health information seeking on the web</title>
		<author>
			<persName><forename type="first">T</forename><surname>Libert</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications of the ACM</title>
		<imprint>
			<biblScope unit="volume">58</biblScope>
			<biblScope unit="page" from="68" to="77" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Datatracking on government, non-profit, and commercial health-related websites</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">R</forename><surname>Zheutlin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">D</forename><surname>Niforatos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">B</forename><surname>Sussman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of general internal medicine</title>
		<imprint>
			<biblScope unit="page" from="1" to="3" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Widespread third-party tracking on hospital websites poses privacy risks for patients and legal liability for hospitals</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">B</forename><surname>Friedman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">M</forename><surname>Merchant</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Maley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Farhat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Smith</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Felkins</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">E</forename><surname>Gonzales</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Bauer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">S</forename><surname>Mccoy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Health Affairs</title>
		<imprint>
			<biblScope unit="volume">42</biblScope>
			<biblScope unit="page" from="508" to="515" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Got sick and tracked: Privacy analysis of hospital websites</title>
		<author>
			<persName><forename type="first">X</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Samarasinghe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Mannan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Youssef</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE European Symposium on Security and Privacy Workshops (EuroS&amp;PW)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2022">2022. 2022</date>
			<biblScope unit="page" from="278" to="286" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Prevalence of third-party tracking on abortion clinic web pages</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">B</forename><surname>Friedman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Bauer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Gonzales</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">S</forename><surname>Mccoy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">JAMA Internal Medicine</title>
		<imprint>
			<biblScope unit="volume">182</biblScope>
			<biblScope unit="page" from="1221" to="1222" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Security and privacy of digital mental health: An analysis of web services and mobile apps</title>
		<author>
			<persName><forename type="first">A</forename><surname>Surani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Bawaked</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Wheeler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Kelsey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Roberts</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Vincent</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Das</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Conference on Data and Applications Security and Privacy</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Privacy threats when seeking online health information</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">D</forename><surname>Huesch</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">JAMA Internal Medicine</title>
		<imprint>
			<biblScope unit="volume">173</biblScope>
			<biblScope unit="page" from="1838" to="1840" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">In-depth technical and legal analysis of tracking on health related websites with ernie extension</title>
		<author>
			<persName><forename type="first">V</forename><surname>Wesselkamp</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Fouad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Santos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Boussad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Bielova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Legout</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, WPES &apos;21</title>
				<meeting>the 20th Workshop on Workshop on Privacy in the Electronic Society, WPES &apos;21<address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>Association for Computing Machinery</publisher>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="151" to="166" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Behavioral targeting in health care marketing: Uncovering the sunny side of tracking consumers online, in: Let&apos;s Get Engaged! Crossing the Threshold of</title>
		<author>
			<persName><forename type="first">I</forename><surname>Kes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Heinrich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">M</forename><surname>Woisetschlager</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Marketing&apos;s Engagement Era: Proceedings of the 2014 Academy of Marketing Science (AMS) Annual Conference</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="297" to="297" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">The gathering of user data by national medical association websites</title>
		<author>
			<persName><forename type="first">K</forename><surname>Masters</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The Internet Journal of Medical Informatics</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Towards open government through open source software for web analytics: The case of matomo</title>
		<author>
			<persName><forename type="first">J</forename><surname>Gamalielsson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Lundell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Butler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Brax</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Persson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Mattsson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Gustavsson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Feist</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Lönroth</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">JeDEM-eJournal of eDemocracy and Open Government</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page" from="133" to="153" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Analytics and privacy</title>
		<author>
			<persName><forename type="first">D</forename><surname>Quintel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wilson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Technology and Libraries</title>
		<imprint>
			<biblScope unit="volume">39</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
