All Title Author
Keywords Abstract

Publish in OALib Journal
ISSN: 2333-9721
APC: Only $99

ViewsDownloads

Relative Articles

More...

A Literature Review: Potential Effects That Health Apps on Mobile Devices May Have on Patient Privacy and Confidentiality

DOI: 10.4236/etsn.2024.133003, PP. 23-44

Keywords: Mobile Devices, Patient Privacy, Confidentiality Breaches, Data Security, Data Protection, Regulatory Compliance, User Consent, Data Encryption, Third-Party Integration, User Awareness

Full-Text   Cite this paper   Add to My Lib

Abstract:

Purpose: This research aims to evaluate the potential threats to patient privacy and confidentiality posed by mHealth applications on mobile devices. Methodology: A comprehensive literature review was conducted, selecting eighty-eight articles published over the past fifteen years. The study assessed data gathering and storage practices, regulatory adherence, legal structures, consent procedures, user education, and strategies to mitigate risks. Results: The findings reveal significant advancements in technologies designed to safeguard privacy and facilitate the widespread use of mHealth apps. However, persistent ethical issues related to privacy remain largely unchanged despite these technological strides.

References

[1]  Dicianno, B.E., Parmanto, B., Fairman, A.D., Crytzer, T.M., Yu, D.X., Pramana, G., et al. (2015) Perspectives on the Evolution of Mobile (mHealth) Technologies and Application to Rehabilitation. Physical Therapy, 95, 397-405.
https://doi.org/10.2522/ptj.20130534
[2]  Coiera, E. (2015) Guide to Health Informatics. 3rd Edition, CRC Press.
https://doi.org/10.1201/b13617
[3]  Larson, R.S. (2018) A Path to Better-Quality mHealth Apps. JMIR mHealth and uHealth, 6, e10414.
https://doi.org/10.2196/10414
[4]  Nouri, R.R., Niakan Kalhori, S., Ghazisaeedi, M., Marchand, G. and Yasini, M. (2018) Criteria for Assessing the Quality of mHealth Apps: A Systematic Review. Journal of the American Medical Informatics Association, 25, 1089-1098.
https://doi.org/10.1093/jamia/ocy050
[5]  Scott, K., Richards, D. and Adhikari, R. (2015) A Review and Comparative Analysis of Security Risks and Safety Measures of Mobile Health Apps. Australasian Journal of Information Systems, 19, 1-18.
https://doi.org/10.3127/ajis.v19i0.1210
[6]  Cano, A.I.D. and Esplugues, A. (2023) Actualización y recomendación de apps sobre lactancia materna. Anales De Pediatria, 99, 440-442.
[7]  Roberts, A.E., Davenport, T.A., Wong, T., Moon, H., Hickie, I.B. and LaMonica, H.M. (2021) Evaluating the Quality and Safety of Health-Related Apps and E-Tools: Adapting the Mobile App Rating Scale and Developing a Quality Assurance Protocol. Internet Interventions, 24, Article ID: 100379.
https://doi.org/10.1016/j.invent.2021.100379
[8]  Palos-Sanchez, P.R., Saura, J.R., Rios Martin, M.Á. and Aguayo-Camacho, M. (2021) Toward a Better Understanding of the Intention to Use mHealth Apps: Exploratory Study. JMIR mHealth and uHealth, 9, e27021.
https://doi.org/10.2196/27021
[9]  Hussain, M., Al-Haiqi, A., Zaidan, A.A., Zaidan, B.B., Kiah, M., Iqbal, S., et al. (2018) A Security Framework for mHealth Apps on Android Platform. Computers & Security, 75, 191-217.
https://doi.org/10.1016/j.cose.2018.02.003
[10]  Vo, V., Auroy, L. and Sarradon-Eck, A. (2019) Patients’ Perceptions of mHealth Apps: Meta-Ethnographic Review of Qualitative Studies. JMIR mHealth and uHealth, 7, e13817.
https://doi.org/10.2196/13817
[11]  Schroeder, T., Haug, M. and Gewald, H. (2022) Data Privacy Concerns Using mHealth Apps and Smart Speakers: Comparative Interview Study among Mature Adults. JMIR Formative Research, 6, e28025.
https://doi.org/10.2196/28025
[12]  Sampat, B.H. and Prabhakar, B. (2017) Privacy Risks and Security Threats in mHealth Apps. Journal of International Technology and Information Management, 26, 126-153.
https://doi.org/10.58729/1941-6679.1353
[13]  Manworren, N., Letwat, J. and Daily, O. (2016) Why You Should Care about the Target Data Breach. Business Horizons, 59, 257-266.
https://doi.org/10.1016/j.bushor.2016.01.002
[14]  Khan, F., Kim, J.H., Mathiassen, L. and Moore, R. (2021) Data Breach Management: An Integrated Risk Model. Information & Management, 58, Article ID: 103392.
https://doi.org/10.1016/j.im.2020.103392
[15]  Liu, L., Han, M., Wang, Y. and Zhou, Y. (2018) Understanding Data Breach: A Visualization Aspect. In: Chellappan, S., Cheng, W., Li, W., Eds., Lecture Notes in Computer Science, Springer, 883-892.
https://doi.org/10.1007/978-3-319-94268-1_81
[16]  Benjumea, J., Ropero, J., Rivera-Romero, O., Dorronzoro-Zubiete, E. and Carrasco, A. (2020) Privacy Assessment in Mobile Health Apps: Scoping Review. JMIR mHealth and uHealth, 8, e18868.
https://doi.org/10.2196/18868
[17]  Iwaya, L.H., Ahmad, A. and Babar, M.A. (2020) Security and Privacy for mHealth and uHealth Systems: A Systematic Mapping Study. IEEE Access, 8, 150081-150112.
https://doi.org/10.1109/access.2020.3015962
[18]  Chatzipavlou, I.A., Christoforidou, S.A. and Vlachopoulou, M. (2016) A Recommended Guideline for the Development of mHealth Apps. mHealth, 2, 21-21.
https://doi.org/10.21037/mhealth.2016.05.01
[19]  Jusob, F.R., George, C. and Mapp, G. (2017) Exploring the Need for a Suitable Privacy Framework for mHealth When Managing Chronic Diseases. Journal of Reliable Intelligent Environments, 3, 243-256.
https://doi.org/10.1007/s40860-017-0049-7
[20]  Rajput, A.R., Masood, I., Tabassam, A., Aslam, M.S., ShaoYu, Z. and Rajput, M.A. (2023) Patient’s Data Privacy and Security in mHealth Applications: A Charles Proxy-Based Recommendation. Soft Computing, 27, 18165-18180.
https://doi.org/10.1007/s00500-023-09265-8
[21]  Vithanwattana, N., Mapp, G. and George, C. (2017) Developing a Comprehensive Information Security Framework for mHealth: A Detailed Analysis. Journal of Reliable Intelligent Environments, 3, 21-39.
https://doi.org/10.1007/s40860-017-0038-x
[22]  Yahya, F., Walters, R.J. and Wills, G.B. (2016) Goal-Based Security Components for Cloud Storage Security Framework: A Preliminary Study. 2016 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), London, 13-14 June 2016, 1-5.
https://doi.org/10.1109/cybersecpods.2016.7502338
[23]  Thamilarasu, G. and Lakin, C. (2017) A Security Framework for Mobile Health Applications. 2017 5th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), Prague, 21-23 August 2017, 221-226.
https://doi.org/10.1109/ficloudw.2017.96
[24]  Srivastava, M. and Thamilarasu, G. (2019) MSF: A Comprehensive Security Framework for mHealth Applications. 2019 7th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), Istanbul, 26-28 August 2019, 70-75.
https://doi.org/10.1109/ficloudw.2019.00026
[25]  Jusob, F.R., George, C. and Mapp, G. (2021) A New Privacy Framework for the Management of Chronic Diseases via mHealth in a Post-Covid-19 World. Journal of Public Health, 30, 37-47.
https://doi.org/10.1007/s10389-021-01608-9
[26]  Saracevic, M.H., Adamovic, S.Z., Miskovic, V.A., Elhoseny, M., Macek, N.D., Selim, M.M., et al. (2021) Data Encryption for Internet of Things Applications Based on Catalan Objects and Two Combinatorial Structures. IEEE Transactions on Reliability, 70, 819-830.
https://doi.org/10.1109/tr.2020.3010973
[27]  Galvin, H.K. and DeMuro, P.R. (2020) Developments in Privacy and Data Ownership in Mobile Health Technologies, 2016-2019. Yearbook of Medical Informatics, 29, 32-43.
https://doi.org/10.1055/s-0040-1701987
[28]  Ahmad, G.I., Singla, J. and Giri, K. J. (2021) Security and Privacy of E-Health Data. In: Giri, K.J., Parah, S.A., Bashir, R. and Muhammad, K., Eds., Multimedia Security: Algorithm Development, Analysis and Applications, Springer, 199-214.
https://doi.org/10.1007/978-981-15-8711-5_10
[29]  Zhou, P., Zhou, G., Wu, D. and Fei, M. (2021) Detecting Multi-Stage Attacks Using Sequence-to-Sequence Model. Computers & Security, 105, Article ID: 102203.
https://doi.org/10.1016/j.cose.2021.102203
[30]  Morera, E.P., de la Torre Díez, I., Garcia-Zapirain, B., López-Coronado, M. and Arambarri, J. (2016) Security Recommendations for mHealth Apps: Elaboration of a Developer’s Guide. Journal of Medical Systems, 40, Article No. 152.
https://doi.org/10.1007/s10916-016-0513-6
[31]  Martínez-Pérez, B., de la Torre-Díez, I. and López-Coronado, M. (2014) Privacy and Security in Mobile Health Apps: A Review and Recommendations. Journal of Medical Systems, 39, Article No. 181.
https://doi.org/10.1007/s10916-014-0181-3
[32]  Shafique, U., Khan, H., Waqar, S., Sher, A., Zeb, A., Shafi, U., et al. (2017) Modern Authentication Techniques in Smart Phones: Security and Usability Perspective. International Journal of Advanced Computer Science and Applications, 8, 331-340.
https://doi.org/10.14569/ijacsa.2017.080142
[33]  Kharrazi, H., Chisholm, R., Van Nasdale, D. and Thompson, B. (2012) Mobile Personal Health Records: An Evaluation of Features and Functionality. International Journal of Medical Informatics, 81, 579-593.
https://doi.org/10.1016/j.ijmedinf.2012.04.007
[34]  Mustafa, U., Pflugel, E. and Philip, N. (2019) A Novel Privacy Framework for Secure M-Health Applications: The Case of the GDPR. 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3), London, 16-18 January 2019, 1-9.
https://doi.org/10.1109/icgs3.2019.8688019
[35]  Hasan, M.K., Islam, S., Sulaiman, R., Khan, S., Hashim, A.A., Habib, S., et al. (2021) Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications. IEEE Access, 9, 47731-47742.
https://doi.org/10.1109/access.2021.3061710
[36]  Tan, S., Lo, K.C., Leau, Y., Chung, G. and Ahmedy, F. (2021) Securing mHealth Applications with Grid-Based Honey Encryption. 2021 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET), Kota Kinabalu, 13-15 September 2021, 1-5.
https://doi.org/10.1109/iicaiet51634.2021.9573645
[37]  Deebak, B.D., Al-Turjman, F., Aloqaily, M. and Alfandi, O. (2019) An Authentic-Based Privacy Preservation Protocol for Smart E-Healthcare Systems in IoT. IEEE Access, 7, 135632-135649.
https://doi.org/10.1109/access.2019.2941575
[38]  Zhou, L. and Parmanto, B. (2020) User Preferences for Privacy Protection Methods in Mobile Health Apps: A Mixed-Methods Study. International Journal of Telerehabilitation, 12, 13-26.
https://doi.org/10.5195/ijt.2020.6319
[39]  Enamamu, T., Otebolaku, A., Marchang, J. and Dany, J. (2020) Continuous M-Health Data Authentication Using Wavelet Decomposition for Feature Extraction. Sensors, 20, Article 5690.
https://doi.org/10.3390/s20195690
[40]  Huh, J. (2020) Surgery Agreement Signature Authentication System for Mobile Health Care. Electronics, 9, Article 890.
https://doi.org/10.3390/electronics9060890
[41]  Egala, B.S., Pradhan, A.K., Badarla, V. and Mohanty, S.P. (2021) Fortified-chain: A Blockchain-Based Framework for Security and Privacy-Assured Internet of Medical Things with Effective Access Control. IEEE Internet of Things Journal, 8, 11717-11731.
https://doi.org/10.1109/jiot.2021.3058946
[42]  Thabit, R. (2019) Review of Cryptography Applications in eHealth Security Systems. International Journal of Science and Engineering Investigations, 8, 110-116.
[43]  van Haasteren, A., Gille, F., Fadda, M. and Vayena, E. (2019) Development of the mHealth App Trustworthiness Checklist. Digital Health, 5.
https://doi.org/10.1177/2055207619886463
[44]  Mia, M.R., Shahriar, H., Valero, M., Sakib, N., Saha, B., Barek, M.A., et al. (2022) A Comparative Study on HIPAA Technical Safeguards Assessment of Android mHealth Applications. Smart Health, 26, Article ID: 100349.
https://doi.org/10.1016/j.smhl.2022.100349
[45]  Braghin, C., Cimato, S. and Della Libera, A. (2018) Are mHealth Apps Secure? A Case Study. 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Tokyo, 23-27 July 2018, 335-340.
https://doi.org/10.1109/compsac.2018.10253
[46]  Nagaraj, S., Raju, G.S.V.P. and Srinadth, V. (2015) Data Encryption and Authetication Using Public Key Approach. Procedia Computer Science, 48, 126-132.
https://doi.org/10.1016/j.procs.2015.04.161
[47]  Shuwandy, M.L., Zaidan, B.B., Zaidan, A.A., Albahri, A.S., Alamoodi, A.H., Albahri, O.S., et al. (2020) mHealth Authentication Approach Based 3D Touchscreen and Microphone Sensors for Real-Time Remote Healthcare Monitoring System: Comprehensive Review, Open Issues and Methodological Aspects. Computer Science Review, 38, Article ID: 100300.
https://doi.org/10.1016/j.cosrev.2020.100300
[48]  Jaeger, J., Ristenpart, T. and Tang, Q. (2016) Honey Encryption Beyond Message Recovery Security. In: Fischlin, M. and Coron, J.S., Eds., Lecture Notes in Computer Science, Springer, 758-788.
https://doi.org/10.1007/978-3-662-49890-3_29
[49]  Daley, B.J., Ni’Man, M., Neves, M.R., Bobby Huda, M.S., Marsh, W., Fenton, N.E., et al. (2021) mHealth Apps for Gestational Diabetes Mellitus That Provide Clinical Decision Support or Artificial Intelligence: A Scoping Review. Diabetic Medicine, 39, e14735.
https://doi.org/10.1111/dme.14735
[50]  Silva, B.M., Rodrigues, J.J., Canelo, F., Lopes, I.C. and Zhou, L. (2013) A Data Encryption Solution for Mobile Health Apps in Cooperation Environments. Journal of Medical Internet Research, 15, e66.
https://doi.org/10.2196/jmir.2498
[51]  Zhu, M., Wu, C., Huang, S., Zheng, K., Young, S.D., Yan, X., et al. (2021) Privacy Paradox in mHealth Applications: An Integrated Elaboration Likelihood Model Incorporating Privacy Calculus and Privacy Fatigue. Telematics and Informatics, 61, Article ID: 101601.
https://doi.org/10.1016/j.tele.2021.101601
[52]  O’Loughlin, K., Neary, M., Adkins, E.C. and Schueller, S.M. (2019) Reviewing the Data Security and Privacy Policies of Mobile Apps for Depression. Internet Interventions, 15, 110-115.
https://doi.org/10.1016/j.invent.2018.12.001
[53]  Parker, L., Halter, V., Karliychuk, T. and Grundy, Q. (2019) How Private Is Your Mental Health App Data? An Empirical Study of Mental Health App Privacy Policies and Practices. International Journal of Law and Psychiatry, 64, 198-204.
https://doi.org/10.1016/j.ijlp.2019.04.002
[54]  Robillard, J.M., Feng, T.L., Sporn, A.B., Lai, J., Lo, C., Ta, M., et al. (2019) Availability, Readability, and Content of Privacy Policies and Terms of Agreements of Mental Health Apps. Internet Interventions, 17, Article ID: 100243.
https://doi.org/10.1016/j.invent.2019.100243
[55]  Zhou, L., Bao, J., Watzlaf, V. and Parmanto, B. (2019) Barriers to and Facilitators of the Use of Mobile Health Apps from a Security Perspective: Mixed-Methods Study. JMIR mHealth and uHealth, 7, e11223.
https://doi.org/10.2196/11223
[56]  Sardi, L., Idri, A., Redman, L.M., Alami, H., Bezad, R. and Fernández-Alemán, J.L. (2020) Mobile Health Applications for Postnatal Care: Review and Analysis of Functionalities and Technical Features. Computer Methods and Programs in Biomedicine, 184, Article ID: 105114.
https://doi.org/10.1016/j.cmpb.2019.105114
[57]  Sunyaev, A., Dehling, T., Taylor, P.L. and Mandl, K.D. (2014) Availability and Quality of Mobile Health App Privacy Policies. Journal of the American Medical Informatics Association, 22, e28-e33.
https://doi.org/10.1136/amiajnl-2013-002605
[58]  Shipp, L. and Blasco, J. (2020) How Private Is Your Period? A Systematic Analysis of Menstrual App Privacy Policies. Proceedings on Privacy Enhancing Technologies, 2020, 491-510.
https://doi.org/10.2478/popets-2020-0083
[59]  Amanul Islam, M. (2022) Privacy Risks and Security Threat Strategy to Optimize the Vulnerability in Health Information System (HIS). International Journal of Advanced Networking and Applications, 14, 5271-5276.
https://doi.org/10.35444/ijana.2022.14106
[60]  He, D., Naveed, M., Gunter, C.A. and Nahrstedt, K. (2014) Security Concerns in Android mHealth Apps. AMIA Annual Symposium Proceedings, 2014, 645–654.
[61]  Greene, E., Proctor, P. and Kotz, D. (2019) Secure Sharing of mHealth Data Streams through Cryptographically-Enforced Access Control. Smart Health, 12, 49-65.
https://doi.org/10.1016/j.smhl.2018.01.003
[62]  Ammar, N., Bailey, J.E., Davis, R.L. and Shaban-Nejad, A. (2021) Using a Personal Health Library-Enabled mHealth Recommender System for Self-Management of Diabetes among Underserved Populations: Use Case for Knowledge Graphs and Linked Data. JMIR Formative Research, 5, e24738.
https://doi.org/10.2196/24738
[63]  Cvrkel, T. (2018) The Ethics of mHealth: Moving Forward. Journal of Dentistry, 74, S15-S20.
https://doi.org/10.1016/j.jdent.2018.04.024
[64]  Gurupur, V.P. and Wan, T.T.H. (2017) Challenges in Implementing mHealth Interventions: A Technical Perspective. mHealth, 3, Article 32.
https://doi.org/10.21037/mhealth.2017.07.05
[65]  Hathaliya, J.J. and Tanwar, S. (2020) An Exhaustive Survey on Security and Privacy Issues in Healthcare 4.0. Computer Communications, 153, 311-335.
https://doi.org/10.1016/j.comcom.2020.02.018
[66]  Ren, Y., Shen, J., Zheng, Y., Wang, J. and Chao, H. (2015) Efficient Data Integrity Auditing for Storage Security in Mobile Health Cloud. Peer-to-Peer Networking and Applications, 9, 854-863.
https://doi.org/10.1007/s12083-015-0346-y
[67]  Benaloh, J., Chase, M., Horvitz, E. and Lauter, K. (2009) Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records. Proceedings of the 2009 ACM Workshop on Cloud Computing Security, Chicago, 13 November 2009, 103-114.
https://doi.org/10.1145/1655008.1655024
[68]  Aljedaani, B., Ahmad, A., Zahedi, M. and Babar, M.A. (2023) End-Users’ Knowledge and Perception about Security of Clinical Mobile Health Apps: A Case Study with Two Saudi Arabian mHealth Providers. Journal of Systems and Software, 195, Article ID: 111519.
https://doi.org/10.1016/j.jss.2022.111519
[69]  Plachkinova, M., Andres, S. and Chatterjee, S. (2015) A Taxonomy of mHealth Apps—Security and Privacy Concerns. 2015 48th Hawaii International Conference on System Sciences, Kauai, 5-8 January 2015, 3187-3196.
https://doi.org/10.1109/hicss.2015.385
[70]  Alsyouf, A., Lutfi, A., Alsubahi, N., Alhazmi, F.N., Al-Mugheed, K., Anshasi, R.J., et al. (2023) The Use of a Technology Acceptance Model (TAM) to Predict Patients’ Usage of a Personal Health Record System: The Role of Security, Privacy, and Usability. International Journal of Environmental Research and Public Health, 20, Article 1347.
https://doi.org/10.3390/ijerph20021347
[71]  Yarbrough, A.K. and Smith, T.B. (2007) Technology Acceptance among Physicians: A New Take on TAM. Medical Care Research and Review, 64, 650-672.
https://doi.org/10.1177/1077558707305942
[72]  Aydin, G. (2023) Increasing Mobile Health Application Usage among Generation Z Members: Evidence from the UTAUT Model. International Journal of Pharmaceutical and Healthcare Marketing, 17, 353-379.
https://doi.org/10.1108/ijphm-02-2021-0030
[73]  Shemesh, T. and Barnoy, S. (2020) Assessment of the Intention to Use Mobile Health Applications Using a Technology Acceptance Model in an Israeli Adult Population. Telemedicine and e-Health, 26, 1141-1149.
https://doi.org/10.1089/tmj.2019.0144
[74]  Hilty, D.M., Chan, S., Torous, J., Luo, J. and Boland, R.J. (2019) A Telehealth Framework for Mobile Health, Smartphones, and Apps: Competencies, Training, and Faculty Development. Journal of Technology in Behavioral Science, 4, 106-123.
https://doi.org/10.1007/s41347-019-00091-0
[75]  Boyles, J.L., Smith, A. and Madden, M. (2012) Privacy and Data Management on Mobile Devices. Pew Internet & American Life Project, 4, 1-19.
[76]  Mancini, E. (2023) Privacy and Security Analysis of mHealth Apps.
https://thesis.unipd.it/handle/20.500.12608/46196
[77]  Sheppard, M.K. (2020) mHealth Apps: Disruptive Innovation, Regulation, and Trust—A Need for Balance. Medical Law Review, 28, 549-572.
https://doi.org/10.1093/medlaw/fwaa019
[78]  Dagher, G.G., Mohler, J., Milojkovic, M. and Marella, P.B. (2018) Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology. Sustainable Cities and Society, 39, 283-297.
https://doi.org/10.1016/j.scs.2018.02.014
[79]  Shu, I.N. and Jahankhani, H. (2017) The Impact of the New European General Data Protection Regulation (GDPR) on the Information Governance Toolkit in Health and Social Care with Special Reference to Primary Care in England. 2017 Cybersecurity and Cyberforensics Conference (CCC), London, 21-23 November 2017, 31-37.
https://doi.org/10.1109/ccc.2017.16
[80]  Oliva, A., Grassi, S., Vetrugno, G., Rossi, R., Della Morte, G., Pinchi, V., et al. (2022) Management of Medico-Legal Risks in Digital Health Era: A Scoping Review. Frontiers in Medicine, 8, Article 821756.
https://doi.org/10.3389/fmed.2021.821756
[81]  Jain, D. (2023) Regulation of Digital Healthcare in India: Ethical and Legal Challenges. Healthcare, 11, Article 911.
https://doi.org/10.3390/healthcare11060911
[82]  Knorr, K. and Aspinall, D. (2015) Security Testing for Android mHealth Apps. 2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Graz, 13-17 April 2015, 1-8.
https://doi.org/10.1109/icstw.2015.7107459
[83]  Kotz, D., Gunter, C.A., Kumar, S. and Weiner, J.P. (2016) Privacy and Security in Mobile Health: A Research Agenda. Computer, 49, 22-30.
https://doi.org/10.1109/mc.2016.185
[84]  Ducato, R. (2016) Cloud Computing for S-Health and the Data Protection Challenge: Getting Ready for the General Data Protection Regulation. 2016 IEEE International Smart Cities Conference (ISC2), Trento, 12-15 September 2016, 1-4.
https://doi.org/10.1109/isc2.2016.7580803
[85]  Hendricks-Sturrup, R. (2022) Pulse Oximeter App Privacy Policies during COVID-19: Scoping Assessment. JMIR mHealth and uHealth, 10, e30361.
https://doi.org/10.2196/30361
[86]  Nurgalieva, L., O’Callaghan, D. and Doherty, G. (2020) Security and Privacy of mHealth Applications: A Scoping Review. IEEE Access, 8, 104247-104268.
https://doi.org/10.1109/access.2020.2999934
[87]  Tung, B. (2021) The Challenges of Applying Computational Legal Analysis to mHealth Security and Privacy Regulations. Master’s Thesis, McKelvey School of Engineering.
[88]  Tangari, G., Ikram, M., Ijaz, K., Kaafar, M.A. and Berkovsky, S. (2021) Mobile Health and Privacy: Cross Sectional Study. BMJ, 373, n1248.
https://doi.org/10.1136/bmj.n1248

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133