1 Introduction

During a health crisis, people are often worried about their safety and healthcare facilities. In such circumstances, the number of people utilizing health services such as those covered by the Medicaid and Medicare programs increases ("Modern Healthcare," 2020, April 29). This increase has been associated with the generation of medical data including hospital records, personal data such as contact details and private data such as diagnosis and testing information. Unfortunately, there are numerous cases of negligence (Mercer, 2020, April 06) due to which data leakages happen thereby jeopardizing users’ privacy during health crises.

Often during a health crisis, user privacy is not given much importance when planning response efforts (Palen et al., 2010). User data is generated at a rapid pace because of developments in telehealth/telemedicine, remote work, and unique supply chains. Online health counselling and therapy, virtual doctor visits and remote health monitoring require personal information from the users. This information can be a potential target for adversaries to compromise user's privacy. There is a high probability of a lack of oversight regarding user privacy during emergencies. It comes as no surprise then that during health crises, incidents of breaches of user privacy have increased exponentially (The National Law Review, 2020, March 12).

As pointed out in the literature on the framework for formulating Bright Information Communication Technologies (ICT), during times such as the current pandemic there is an increase in public health concerns owing to an increased reliance on the internet and the need for privacy often gets overlooked at a time when it is even more critical to address not just cybersecurity but privacy as well (Lee et al., 2020). In accordance, researchers have called for developing solutions for global trust building so that users’ privacy concerns are alleviated (Lee et al., 2018) with an emphasis on preventive cybersecurity and proactive privacy preservation (http://brightinternet.org/).

Social media is a rich source for investigating privacy discussions during health crises because it allows us to gather organic information pertaining to tracking and sharing of trending health topics as well as digital health data (Greenhalgh et al., 2020; Househ, 2012; Jain et al., 2016; Liu et al., 2021). The context of social media has seen increasing research (Kapoor et al., 2018) and is particularly well suited to examine conversations around privacy as it acts as a platform for individuals to share controlled information at their own will (Househ, 2012). Despite this, the extraction of privacy-related insights from social media in the aftermath of a health crisis have hitherto not been addressed in literature.

Along this backdrop, we ask the following research questions: 1) What aspects of health privacy do social media users discuss during the COVID-19 pandemic? and 2) what are the privacy discussions by the public around potentially the most invasive topics of contact tracing and surveillance? In addressing this question, this paper investigates privacy discussion around public health on a social media platform, Twitter, in the context of the ongoing COVID-19 pandemic. Using topic modeling approach, we conduct two studies to analyze social media messages on Twitter to ascertain what privacy topics related to their health information people are discussing during the COVID-19 pandemic. In study 1, we analyze user tweets and highlight the major categories of health privacy that social media users are tweeting about. In Study 2, we draw on the insights from Study 1 to create a taxonomy of the most salient privacy and cybersecurity discussions around the topics of contact tracing and digital surveillance that social media users on Twitter are engaged in. Our research adds to the growing body of knowledge about public interest in privacy concerns, contact tracing, and privacy violations in crisis situations like the current COVID-19 pandemic.

This investigation is important because the different aspects of privacy discussed on Twitter can help to guide policymaking by providing early insights into the concerns uppermost in people’s minds. The insights from these discussions can help to strengthen frameworks to address and alleviate privacy concerns of people, with respect to technologies such as contact tracing and digital surveillance. The rest of the paper is organized as follows. In the next Sect. 2 we discuss the literature on user privacy in social media conversations. This is followed by the methodology Sect. 3 which describes the LDA topic modeling and hierarchical clustering approach to extract health privacy tweets of the users. In the following Sects. 4 and 5 we explain Study 1 and Study 2 respectively, and extract the various issues that users discuss on social media regarding health privacy. We also interpret the findings of our two studies, elaborate on privacy issues, and explain user privacy conversations that users discuss about the most on Twitter. The following discussion Sect. 6 explains the implications of the research, study contributions and future work. Finally, in the conclusion Sect. 7 we discuss the limitations of the study and outline our future work.

2 Literature Review

In this section, we discuss three related streams of literature on privacy issues from the context of healthcare data, contact tracing, and the role of social media in raising awareness during crisis events, which together lay the theoretical foundation of our study. The first stream focuses on privacy issues and addresses the concerns and benefits around the discussion of health information on social media. The second stream focuses on the core issues that are specific to health crisis such as COVID-19 where contact tracing is important to mitigate the risk of disease spread but may come at a cost of compromising the user privacy. The third and last stream focuses on the role of social media during crisis events.

2.1 Privacy Issues with Healthcare Data

The mode of accessing health information is changing as internet technologies, artificial intelligence and social media become more widely used (Trocin et al., 2021). On the internet, it is possible to discuss health information without alienating others or using an inaccessible language of healthcare (Cayton, 2006). With the spread of new infections and diseases, a free form of sharing health information is seen as having a positive impact on society. However, there are growing concerns about information privacy in relation to this type of free information sharing (Pershad, Hangge, Albadawi & Oklu, 2018). Recent studies on privacy have found that as internet adoption and technology integration into healthcare grows, there is a greater risk of user privacy being compromised (Greenhalgh et al., 2020). In the event of a healthcare crisis such as influenza, large-scale testing is required to halt the spread of the virus and identify any potential side effects from early-stage vaccinations (Signorini et al., 2011). During COVID-19, much of the industrialized world saw an increase in infections which forced governments to enforce lockdowns and individuals to remain indoors (Choudrie et al., 2021). To combat the pandemic, a variety of strategies have been implemented, including large-scale testing of patient samples. In such times, it is unavoidable to collect personal identifying information, which raises concerns about data loss. The number of reports of privacy breaches involving patient information has risen dramatically (HHS.gov, 2020, April 9).

2.2 Privacy Concerns, Contact Tracing, and Privacy Violations during Crisis

During the COVID-19 pandemic, people have relied on collaborative online video conferencing solutions to work and study remotely, schedule appointments with doctors using telehealth facilities. Scholars have also noted that a lack of understanding of privacy policies can influence whether or not people use telemedicine and virtual healthcare (Greenhalgh et al., 2020). Remote work has its fair share of privacy violations that can be counterproductive to the whole point of moving to online operations.

Another strategy for combating the virus is the increased use of contact tracing efforts by governments or other related agencies, which are tasked with monitoring the virus's spread. Contact tracing refers to efforts by public-health workers to track down potentially infected individuals (House & Keeling, 2010). Traditional contact tracing is used in situations of contagious outbreaks and relies on the knowledge of interpersonal network of physical interactions among people. However, due to privacy concerns of people and collection of noisy data, such tracing networks are difficult to reconstruct accurately (Farrahi et al., 2014). The authors note that communication traces obtained through mobile phones can be good proxies for physical interaction and may provide a valuable tool for contact tracing. Thus, during the crisis, several mobile applications were released by national governments to track the movement of its citizens—NHS COVID-19 (for the UK), Aarogya Setu (for India), COVIDSAFE (for Australia), Apple’s Exposure notifications system. Recent contact tracing technology and methods are a matter of significant privacy concerns on the internet (Bhatt et al., 2020; Herold, 2006; Hiller & Russell, 2017). In summary, there are numerous concerns about privacy violations during crisis situations.

2.3 The Role of Social Media during Crisis

People search for information in times of crisis, especially in online environments. During this time, with a lack of consistent information from trusted agents there is a desire to gather as much information as possible, especially from social media. Social media, such as Twitter, has been effective in allowing public communication about the events of an emergency or crisis (Abedin & Babar, 2018). In health crises, it can provide early and valuable information about the situation and educate communities about preparedness measures, reduce the intensity of negative messages and promote positive messages (Rao et al., 2020). During health crises social media platforms can also play an important role in the lives of its users. Schillinger et al (2020) describes how they can serve as an outlet for disseminating information that promotes public health awareness. Zhou et al (2018) focus on how such platforms can help to improve the quality of care and communication. They can also serve as a cost effective and convenient venue for health intervention, patient health self-management, patient education, drug and healthcare service advertisements, etc. In addition, the social media context is particularly suited for examining conversations about privacy (Househ, 2012). Social media can serve as an outlet for people to express their views about the privacy of users during COVID-19. By enabling the exploration of social media content, we can extract intelligible information about people's privacy needs and concerns. While concerns about privacy on social media platforms are well recognized in the academic community, there is currently a lack of research in identifying user concerns in an automated manner (Saura et al., 2021). Organizations commonly use semi-structured interviews and qualitative research to identify user concerns specific to a domain or a specific event (Bandara et al., 2020). However, this is a time-consuming and laborious process, and in a global event like the COVID pandemic, identifying data privacy concerns in an automated manner is critical.

Despite this, the extraction of privacy-related insights in the aftermath of the health crisis has not received much attention in the literature. In accordance, this study examines privacy topics during the COVID-19 pandemic, outlining various issues discussed in the tweets. While some of these issues such as privacy policies, violations, and lack of transparency) have been previously studied by researchers (Janssen & van den Hoven, 2015; Sarathy & Robertson, 2003; Solove, 2008) from non-social media contexts, the resurgence of privacy concerns on Twitter during the pandemic underscores the importance of such discussions of health privacy specific to the context of social media networks for policymakers.

3 Methodology

Given the extensive use of Twitter during crisis communication management, researchers have adopted various techniques to extract meaningful information from tweets using text mining techniques like content analysis (Oh et al., 2011), social network analysis (Chatfield & Brajawidagda, 2012; Vemprala & Dietrich, 2019) and clustering (Aiello et al., 2013). Recently, sentiment analysis from subjective phrases has been combined with a machine learning algorithm to produce better disaster data classification accuracy (Ragini et al., 2018). We conduct two studies in this paper and follow a data driven exploration approach, similar to Bachura et al. (forthcoming 2022), to conduct exploratory research on data from Twitter conversation regarding users’ health privacy discussions. A computational analysis of over 273 million tweets resulted in the extraction of 9 key health privacy topics in Study 1. Based on the public display of users’ health privacy concerns shared on Twitter, we further distilled these topics into 3 main privacy issues in Study 2. Studying such public displays of privacy concerns are important for governments, organizations and policymakers. The social sharing of health related information concerns can provide clear guidance not only to organizations, but also to governments, allowing them to make informed decisions about what measures are working during a disaster and where they should focus their immediate attention. Researchers note that such social sharing is an important source of interpersonal interactions which people engage in to overcome from emotional experiences (Rodríguez-Hidalgo et al., 2017). Various topic classification methods are studied in combination with sentiment analysis to provide a generalized framework of how sentiment around a given topic changes over time in the study using disaster social media tweets during the Kerala floods (Mendon et al., 2021). For analyzing sentiments, the LDA and Hierarchical Clustering methods have been shown to work well. Information dissemination and the issue of credibility are another important stream of research related to crisis communication management, such as the COVID-19 pandemic. Understanding the underlying topics on a tweet-by-tweet basis is critical in addressing this issue. The authors were able to answer the question about user retweeting behavior by treating each tweet as if it represented only one topic discussion and by looking at the tweet characteristics (Son et al., 2020). Building on the prior literature related to the crisis response and topic classification, in this paper, we utilize hierarchical clustering, a text-mining approach, to obtain semantic patterns from tweets over a specific time period so that we can effectively model the various user privacy issues in the COVID-19 context.

Twitter data can be effectively used to detect subtle variations in public response (Tan et al., 2013) which are ever more visible during the COVID-19 pandemic. This study presents an analysis of tweets produced beginning from January 20, the day China officially confirmed the infection outside Hubei province until July 2020. We used Twitter streaming API to collect the tweets based on the keyword coronavirus and added COVID-19 to our list when the WHO officially named the disease.

3.1 Data Description

We developed a Python script that calls the streaming API and searches for keywords anywhere in the tweet's text and extracts the tweet and the tweet characteristics, including retweets count, the tweeting user's screen name, the tweet's time, and hashtags. By the end of July, we collected around 273 million tweets for 194 days. Figure 1 shows the records count by days. There are considerable number of days where the daily tweet count crossed 2 million tweets a day. We utilized 6 months of tweets from January 20, 2020 to July 31, 2020 owing to a continuous stream of data during this period. The distribution of tweets across this period can be seen in Fig. 1. The 273 million tweets are representative of user discussions on the social media platform about COVID-19. Before we analyze the health privacy topics within users’ conversations in these tweets, we have to extract the relevant tweets. This was done in two steps: First, we used a keyword-based search to extract privacy-related tweets by including keywords ‘privacy’ and ‘confidentiality’ in our search criteria. Second, we matched keywords specific to health using an LDA topic model created from the relevant web pages providing health updates on COVID-19 (Blei, 2012). To create topic models, we used the Python Gensim package's LDA model. Gensim includes several text processing methods, such as removing stop words (commonly used words in sentences that add no contextual meaning to the topics) and lemmatization (to return root words instead of inflectional ending of the words, e.g., mouse instead of mice and foot instead of foot). Additionally, we followed a heuristics approach to pre-process the text data to filter Twitter specific characters and filtered URL links, user mentions before passing it to the Gensim package LDA method. Gensim functions are optimized to converge in the fewest number of iterations and provide the topics as quickly as possible.

Fig. 1
figure 1

Timeline of coronavirus tweets

3.2 Extracting Health Privacy-Related Tweets

Topic model provides keywords that are closely related to each of the topic. We systematically analyzed the words under each topic, to represent unique keywords, and classified the tweets as health-related tweets if any of the respective keywords were present in the tweet text. Figure 2 shows the distribution of health privacy-related tweets. It shows the magnitude of discussions that relate to health privacy across our dataset with significant spikes in the months of March and June as the infection spread accelerated during these months.

Fig. 2
figure 2

Distribution of health privacy tweets

We extract insights from the health privacy tweets in a sequence of two studies. In Study 1, we determine the major topics on the different aspects of health privacy being discussed by Twitter users. In Study 2, we delve further into the topics which were most salient in Study 1. For this deeper investigation into the main topics of cybersecurity and privacy, we also include additional tweets in the second study as the data for two additional months became available up to September 2020. Figure 3 presents the process for extraction and analysis for Study 1 and Study 2. These are further elaborated subsequently in the corresponding sections.

Fig. 3
figure 3

Study 1 and 2 process model

4 Study 1: Health Privacy Topic Discussion in Twitterverse

In this study, we begin our detailed analysis by identifying the critical health privacy topics that are at the forefront of discussions and concerns voiced in our data using the process characterized in the upper half of Fig. 3. Owing to the inherent nature of conversations on social media that continue for several days, we decided to use a topic modeling approach reinforced with hierarchical clustering. This enabled us to get new topics each week based on their popularity which was determined by the coherence score. We also utilized reverse boosting to ensure that popular topics in initial weeks did not affect the algorithm in the coming weeks by assigning additional feature weights to recent discussions. The model used the timestamps from tweets to infer the temporal progression of emerging topic discussions in the Twitterverse. The topic model generated the most popular weekly topics for 14 weeks. There were 549 unique topics within this period which directly mapped to 114,296 individual tweets. We have also used the structural topic model (STM) to present the high-level topics within the overall privacy discussions (Roberts et al., 2019). From our analysis, we identified 9 distinct overarching health privacy topics. Consistent with the number of topics, we ran the STM to capture the 9 distinct topics in the overall tweets (Table 1).

Table 1 Topic keywords – generated using STM

To get the major topics of health privacy, we followed a topic distillation approach (Chakrabarti, 2001; Chakrabarti et al., 2001) based on the topic text and the frequency of topic occurrences. To this end we compared the text content of the topic with our set of keywords. For example, if a topic contained the words (bi-grams) ‘patient information’ and another topic contained ‘patient reports’, it was distilled under the bigger ‘patient data confidentiality’ topic. Using this topic distillation approach, the individual 549 health privacy topics were read by the first and second authors, and classified based on their content. After the initial round of distillation, there were 46 interrelated topics which were further distilled to 16 topics with significant differences within their content and minimal overlap. These topics were merged into 9 distinct overarching health privacy topics shown in Table 2 that provides a description of the distilled set of 9 privacy topics as well as a sample of tweets.

Table 2 Central discussions within the clusters of tweets over timeline

These 9 privacy topics were related to 3 major topics relating to digital privacy, lack of transparent privacy policies and privacy violations. These topics are grounded in prior research on privacy with articles addressing issues of digital privacy (Sarathy & Robertson, 2003), privacy violations (Solove, 2008), and lack of transparent privacy policies with respect to governments’ use of data (Janssen & van den Hoven, 2015).

To understand the underlying topics, we ran the hierarchical clustering algorithm. The df-idf (document frequency-inverse document frequency) metric was used to detect the discussion's central topic over a given period (Aiello et al., 2013). We used bi-grams (a combination of two words) to detect events by comparing bi-gram frequencies daily with those of the preceding days. The df-idf approach clusters bi-grams rather than the regular document cluster approach that uses tf-idf technique (term frequency—inverse document frequency) to cluster documents within a given time interval. A regular clustering algorithm based on the tf-idf technique considers all these messages as a single large cluster and may ignore the emerging topics from new incoming messages (because the old, repetitive topics still carry a large weight), making it difficult to identify the development of new topics. As the primary focus of the df-idf approach is word co-occurrence, df-idf provides greater accuracy in extracting the central discussion tweets for each time interval. Bi-grams naturally cluster the co-occurring words together and provide an efficient cluster of sentences than the unigrams algorithm (Aiello et al., 2013). Once, the central tweets were extracted, we performed the content analysis to group the extracted focal tweets into different categories.

Through this approach, the 9 health privacy topics were related to user discussions about data privacy, privacy policies and privacy violations. (1) Data privacy has been a contentious issue ever since the emergence of the Big data era (Jain et al., 2016). The highly unstructured form of data as well as the continuous stream of data points makes it all the more difficult to isolate privacy incidents. (2) Privacy policies can safeguard people’s privacy. It has been observed that in times of crises privacy policies are often not clear and sometimes there may even be a tradeoff that results in further privacy loss (Büscher et al., 2019). (3) As for privacy violations, crisis or not, they are commonplace as well as difficult to track. Palen and Dourish (2003) had observed that privacy is visceral in a networked world and violations do occur frequently, which rings true even in this contemporary time. We have visualized the trends of the central discussion of the topics over the timeline in Fig. 4.

Fig. 4
figure 4

Diffusion of privacy tweets by topics within health categories

Data Privacy

Much of the work has shifted online during the pandemic including increase in Telemedicine (Smith et al., 2020). In addition, on account of the increased infection spread as well as testing of those infected, it has resulted in the generation of large health data. Therefore, conversations on Twitter rightly mimic this pattern as evidenced by the significant peaks seen in the health data graph. The peaks correspond to the general perception of health-related discussions during the month of May rising significantly with the total number of COVID-19 related deaths exceeding 100,000.

Privacy Policies

The major topic of discussion revolves around the lack of transparency. People online are sharing their views on privacy and its implications for data regulation policies, guidelines, and rules. We see from our analysis that users regularly tweet about the absence of strong privacy policies that can govern data collection and storage. We see from the policy graphs a consistent discussion regarding privacy policies during the earlier days of transmission of the virus. As the information percolated to the masses, we see these discussions trailing off towards the end of our dataset as more robust health policies regarding data collection were put in place by state and federal authorities.

Privacy Violations

We see from the graph that privacy violations are the most discussed topics during our dataset time period. They begin slowly, because of a tepid response to formulating contact tracing guidelines, but once the cases started increasing and as a result of an influx of contact tracing mobile applications (Ahmed et al., 2020), more tracking efforts were made. We see consistent spikes in these issues being discussed on Twitter. Another important issue was how medical negligence has increased and users shared their views regarding health data violations, hospital administrations and leakage of health records.

5 Study 2: Discussions about Contact Tracing and Digital Surveillance Topics in Twittersphere

Within the 9 health privacy topics, tracking issues had the most frequency of occurrences and a majority of the discussion on Twitter revolved around these two topics – contact tracing and surveillance. Of the 549 topic models we had initially obtained from our topic modeling approach, over a 100 applied to these two topics alone. Since COVID-19 first started spreading rapidly in March, these two topics have endured through our entire datasets with consistent discussions being generated across different weeks. It has ushered in new surveillance technologies that seek to parse people’s digital footprints (Calvo et al., 2020). The level of information (including telephones, email addresses, etc.) collected in response to contact tracing efforts has been unprecedented (Madewell et al., 2020).

Since the two major health privacy topics and areas of discussions revolved around contact tracing and digital surveillance (which were consistently present topics of conversations across our time series data), we decided to conduct a follow up study using a second topic model that utilized n-gram word embeddings. These n-gram relates to using either one-word (unigrams) searches over the dataset or a combination of two subsequently occurring words (bigrams) or three subsequently occurring words (trigrams) to generate the topic of interest for each of the weeks in the dataset. Using this approach, we were able to generate topics from our list of keywords, which included a mix of n-gram words, that capture more relevant and coherent topics. The model focused exclusively on surveillance and contact tracing discussions with respect to health privacy concerns of people on social media on the initial dataset plus an additional two months of data up until September 30, 2020.

After running the model on this narrower search criteria, the number of topics found sharply decreased and showed more direct word associations with the tweet content. In total we extracted 155 unique topics that related to either surveillance or tracing or both which roughly mapped to around 70,400 individual tweets. These topics captured discussions around surveillance and contact tracing. For instance, users discussed the need for greater privacy protections in light of the introduction of new technology or systems that can track people and their contact with close acquaintances.

We again proceeded with the topic distillation approach of content analysis and frequency occurrences on the newer reduced set of 155 topics. The various topics discussed were highly correlated and after the first round of analysis the topics were reduced to 75 interrelated topics of discussion. For example, these interrelated topics included some that discussed ‘increase in surveillance technology’ and others that discussed a similar topic ‘increase in surveillance programs/networks’. The grouping of similar topics helped to reduce the number of topics under consideration and laid the foundation to creating a smaller non overlapping set of privacy issues, that could be explained further. In this regard, the 75 topics were then distilled into 6 non-overlapping major privacy topics related to surveillance and contact tracing. Table 3 represents the 6 major privacy topics and key issues along with their representative tweets.

Table 3 Central discussions within contact tracing and surveillance domain

These topics relate to the major discussions on Twitter during the period of Study 2. In these discussions, new issues emerged that corresponded to users’ discussions regarding newer technology and infrastructure being developed during the pandemic that can have serious impact on privacy both in current times as well as in the future.

The Internet users’ information privacy concerns (IUIPC) framework proposed by Malhotra et al. (2004) can help understand online consumers’ concerns for information privacy. The first component that impacts users in any online setting is the collection of data. Data has been famously referred to as the price you pay for free services on the internet. Data collection is thus the first issue that might affect people’s privacy decisions and their intention to engage or share their personal data. The second component is control which manifest into the perceived level of control that users feel they have over their data. If users believe that they have control over what is shared in the online space regarding their personal information, it manifests into lower privacy concerns. The final component is awareness of privacy practices. It translates to the level of disclosure and knowledge users are provided about the usage of their data. It is related to being transparent upfront about the intended use of people’s data, and the purpose of data collection should be clearly communicated to users in order to inspire confidence in them to share personal details.

Through the two studies, we have ascertained the different privacy issues that users discuss online during the COVID-19 pandemic. We observe that our findings from Study 2 closely align with the existing privacy mechanisms of privacy issues discussed by Malhotra et al. (2004). Using our findings from Study 2 we explain how the major six topics revealed from our topic modeling approach relate to the privacy components.

Data Collection

Two major privacy topics from our topic model that correspond to it are individual and community surveillance. The key issues within each of the surveillance topics were representative of the context that data collection for the purposes of contact tracing has. Within individual surveillance topic, the privacy issues raised by users included the access to phone data, maps data and location data. Apart from this, the encroachment of personal freedom and the dwindling civil liberties afforded to citizens were other major issues being discussed. Under community surveillance topic, the Twitter users discussed issues relating to the widespread tracking of travel and itinerary details, the use of mass surveillance programs to collect data and community tracking of affected populations. As noted by Lyon (2010), individual, institutional and community surveillance are all closely linked to personal data collection from users. It relates to users’ choice of providing their personal data, which in some scenarios may not exist such as in the case of mandatory contact tracing. The existence of these two major topics shows how important data collection is to contact tracing. In order to inspire confidence among people to voluntarily participate in contact tracing programs, it is essential to clearly communicate to them the data collection objectives at the very outset.

Data Control

Two major topics from our topic model related to control are safeguarding of data and state and federal tracking control. Within the safeguarding data topic, the privacy discussions mirrored data collection issues such that a majority of the users tweeted about data collection procedures and guidelines. The discussions also echoed a lack of data protections and security during the period of study. In times of crises, it is seen that data collection procedures as well as governments themselves are not fully transparent (De Araujo & Tejedo-Romero, 2016). A majority of the topics discussed online also pointed to the control of data as a major topic of interest, especially the level of control by local, state and federal institutions. The users prominently discussed the use of their personal data well after the pandemic ends. The emphasis of users on control sheds light on its importance for future surveillance and tracing programs. Since sharing personal information is always attached with a risk, people naturally like to have more control over what is done with their personal information (Prince, 2018). Therefore, it would be beneficial for policy makers to provide users with sufficient control over their data so that they can voluntarily and proactively participate in such programs in the future.

Awareness of Privacy Practices

The primary issue is that people do not want to share information online unless they are aware of the intended use of that information (Hoffman & Novak, 1996). We see users’ privacy issues on Twitter, extracted from our topic model, that discuss topics like the introduction of newer surveillance technology and systems. Such new applications are released and advertised as using contact tracing to limit the spread of the virus. However, in the case of such healthcare apps, it is often seen that the data collection process, the actual personal information requested and the policies governing data usage are rarely stated (Rosenfeld et al., 2017). In this manner the majority of contact tracing apps that are released are doomed from the start and suffer from low adoption rates (Kim et al., 2007). Therefore, for policy makers it is very important to advertise the intended use of information and create awareness about the privacy protections for adopters of contact tracing programs. Figure 5 shows a combination of our results from Study 2, with the 6 major privacy topics, and the IUIPC framework to generate a word cloud based on interrelated topics.

Fig. 5
figure 5

WordCloud of 3 major privacy dimensions

6 Research Findings

In this paper, we have extracted privacy insights from social media discussions in the aftermath of a health crisis, COVID-19 pandemic. The findings from this paper conform with the Internet users’ information privacy concerns (IUIPC) framework proposed by Malhotra et al. (2004). We segregated the major health privacy topics discussed by Twitter users into three issues. First, data privacy correlates with the first component of IUIPC, which is collection. Since the majority of discussions revolved around health data, its collection is naturally an issue that people discuss online. Second, privacy policies closely relate to control. As it has been shown by numerous studies, users like to understand the policies that control their data and govern its usage (Earp et al., 2005; Sadeh et al., 2009). Privacy policies exert effective control on data aggregators or collectors and prevent user data from being misused. Third, privacy violations align with the awareness of privacy practices’ component.

6.1 Theoretical Implications

In terms of theoretical implications, we have outlined the need to consider user privacy and its sustained importance whence forming guidelines, designing protective measures, and establishing a response mechanism to counter the adverse privacy implications of pandemics. In this work, we explore the social sharing of health related information concerns through an analysis of over 270 million tweets. Using data driven exploration we uncover 9 different health privacy topics in Study 1 further distil them into 3 central privacy topics. Our data exploration approach contributes to enhancing privacy literacy and bridging theory and practice (Wissinger, 2017) by incorporating discussions on digital privacy shared on social media platforms during crises events like the COVID-19 pandemic. During crisis, privacy might not be a central focus for the authorities, but from our analysis of Twitter conversations, it most certainly is an emotional issue for the community. Prior research has noted the importance of social sharing of emotions on Twitter and other similar platforms as such sharing serves as a form of interpersonal interaction which helps people to overcome their emotions (Rodríguez-Hidalgo et al., 2017; Bachura et al., forthcoming 2022). During times of crisis, privacy might not be a central focus for the authorities, but from our analysis of Twitter users, it most certainly is an emotional issue for the community. The right to privacy is even enshrined in the constitution, and users do not want to compromise it for a sure pandemic or not. Therefore, privacy during times of crises such as pandemics is an essential avenue for future research in the domain of user privacy.

6.2 Practical Implications

In terms of practical implications, official agencies can utilize the insights to focus on alleviating the privacy issues of individuals in the society and design better information systems and enforce stronger privacy policies. For ensuring the success of any technologies, the participation of the people is very important. It is then sensible to install measures that satisfy the basic tenets of confidentiality set forth in the right to privacy so as to ensure users' privacy is protected, and people are assured of the sanctity of their information. This research can also help to drive official campaigns that target the need for community participation in handling crisis situations.

6.3 Policymaking Implications

The privacy issues discussed on Twitter have implications for governments and policy makers, and addressing them sufficiently can help revitalize tracing programs. With the increase in vaccination efforts across the developed world and the discovery of new variants of the virus, contact tracing and surveillance have become a contentious issue (John Hopkins School of Public Health, 2021, Feb 2). Also, the debate around the use of vaccination passports to enable safe travel across state and national boundaries has added to already existing privacy concerns of users (The New York Times, 2021, Feb 4). In this light, monitoring social media discussions are all the more important for deriving insights for policymaking to ensure success of such mechanisms. In addition, these privacy issues show the need for better of data protection policies and warrant the need to regulate the virtual space including online learning or remote work. There needs to be a stronger emphasis on regulating data collected during this crisis. Also, with respect to privacy violation issues it is imperative that the myths around contact tracing, surveillance and tracking are addressed. This would enable greater participation of the public in such tracing efforts provided their privacy issues are alleviated.

7 Conclusion

Using an LDA topic modeling approach we analyzed social media messages on Twitter and determined the most salient privacy topics that people are discussing during the COVID-19 pandemic. The topics of contact tracing and digital surveillance, which are related to user privacy and cybersecurity were also discussed. We also present the contribution from our work to the Bright ICT initiative and its importance in policymaking for ensuring user privacy preservation and cybersecurity. The vision of the Bright Internet can be used by governments and policy makers to develop solutions for global trust building so that users’ privacy concerns are alleviated (Lee et al., 2018). Contact tracing and surveillance applications developed to reign in the pandemic can also be fortified with these Bright ICT initiatives so that there is an emphasis on preventive cybersecurity and proactive privacy preservation (http://brightinternet.org/).

During pandemic times, it is even more critical to ensure privacy is protected along with cybersecurity due to the increased reliance on the internet and virtual interactions. This paper utilizes Twitter data in a crisis in order to provide guidance on the cybersecurity and privacy concerns that are foremost in people’s mind during a public health crisis. We plan to extend this work into a drawn-out investigation of the privacy needs of social media users. In our future efforts, we will also study the impact of privacy breaches on the population when their confidential data is used to drive a global response but without explicit user consent on data sharing. For other researchers in this domain, we present them with a few challenges regarding how to ensure privacy is maintained during times of a global emergency and how to sustain this privacy even when everything goes back to normal. With many news outlets, healthcare institutions and individual users on the Twitter, subtle variations in public sentiment can be observed on the platform (Tan et al., 2013). We aim to augment our data source in our future work and expand it to include other social media platforms as well.

Our research, like any other research into information management systems, has its limitations. First and foremost, our approach focuses on privacy concerns related to health wherein the severity of data privacy concerns, as well as their prevalence, varies from country to country. In this study, we did not separate tweets originating from a specific country or target the privacy concerns of a specific country when collecting the data. Nevertheless, governments are addressing the issue of data privacy and working toward regulating social media platforms so that individuals' privacy is not at stake. A tweet message's source can be determined by multiple approaches, including hashtags, geolocation tags, and the presence of location in the tweet text. Identifying the location allows public bodies and governments to strengthen data privacy laws on social media platforms by tagging tweets with the origin country of the tweet. We plan to extend our research at a later point in time, considering the location-specific attributes in combination with health-privacy tweets. Second, our data collection does not distinguish between authentic and fraudulent tweets. During a pandemic, many social media users around the world try to influence other users by spreading false or misleading information about a specific event or situation, as well as creating unnecessarily tense situations in the general public. In such a situation, the ability to comprehend the widely discussed topic in conjunction with the authenticity of information allows one to mitigate the risks associated with misinformation. We encourage researchers conducting misinformation-related studies to consider privacy concerns alongside misinformation tweets when examining topic comparisons by misinformation. Also, future researchers can consider Communication Privacy Theory to study the social sharing of information, especially in the context of health privacy which creates tension within individuals and increases or decreases their risk of privacy leakages (Petronio & Venetis, 2017). On the one hand, social sharing of private health information can help to garner support to cope with health problems, On the other, people’s privacy concerns may prevent them from seeking such much needed support. Finally, the focus of our research is textual information shared on the internet. This study does not address the issue of sharing personal patient records as an image file or in any other format other than text format in order to avoid violating patient privacy.