Purpose: This research aims to evaluate the potential threats to patient privacy and confidentiality posed by mHealth applications on mobile devices. Methodology: A comprehensive literature review was conducted, selecting eighty-eight articles published over the past fifteen years. The study assessed data gathering and storage practices, regulatory adherence, legal structures, consent procedures, user education, and strategies to mitigate risks. Results: The findings reveal significant advancements in technologies designed to safeguard privacy and facilitate the widespread use of mHealth apps. However, persistent ethical issues related to privacy remain largely unchanged despite these technological strides.
References
[1]
Dicianno, B.E., Parmanto, B., Fairman, A.D., Crytzer, T.M., Yu, D.X., Pramana, G., et al. (2015) Perspectives on the Evolution of Mobile (mHealth) Technologies and Application to Rehabilitation. Physical Therapy, 95, 397-405. https://doi.org/10.2522/ptj.20130534
[2]
Coiera, E. (2015) Guide to Health Informatics. 3rd Edition, CRC Press. https://doi.org/10.1201/b13617
[3]
Larson, R.S. (2018) A Path to Better-Quality mHealth Apps. JMIR mHealth and uHealth, 6, e10414. https://doi.org/10.2196/10414
[4]
Nouri, R.R., Niakan Kalhori, S., Ghazisaeedi, M., Marchand, G. and Yasini, M. (2018) Criteria for Assessing the Quality of mHealth Apps: A Systematic Review. JournaloftheAmericanMedicalInformaticsAssociation, 25, 1089-1098. https://doi.org/10.1093/jamia/ocy050
[5]
Scott, K., Richards, D. and Adhikari, R. (2015) A Review and Comparative Analysis of Security Risks and Safety Measures of Mobile Health Apps. AustralasianJournalofInformationSystems, 19, 1-18. https://doi.org/10.3127/ajis.v19i0.1210
[6]
Cano, A.I.D. and Esplugues, A. (2023) Actualización y recomendación de apps sobre lactancia materna. AnalesDePediatria, 99, 440-442.
[7]
Roberts, A.E., Davenport, T.A., Wong, T., Moon, H., Hickie, I.B. and LaMonica, H.M. (2021) Evaluating the Quality and Safety of Health-Related Apps and E-Tools: Adapting the Mobile App Rating Scale and Developing a Quality Assurance Protocol. InternetInterventions, 24, Article ID: 100379. https://doi.org/10.1016/j.invent.2021.100379
[8]
Palos-Sanchez, P.R., Saura, J.R., Rios Martin, M.Á. and Aguayo-Camacho, M. (2021) Toward a Better Understanding of the Intention to Use mHealth Apps: Exploratory Study. JMIRmHealthanduHealth, 9, e27021. https://doi.org/10.2196/27021
[9]
Hussain, M., Al-Haiqi, A., Zaidan, A.A., Zaidan, B.B., Kiah, M., Iqbal, S., et al. (2018) A Security Framework for mHealth Apps on Android Platform. Computers&Security, 75, 191-217. https://doi.org/10.1016/j.cose.2018.02.003
[10]
Vo, V., Auroy, L. and Sarradon-Eck, A. (2019) Patients’ Perceptions of mHealth Apps: Meta-Ethnographic Review of Qualitative Studies. JMIRmHealthanduHealth, 7, e13817. https://doi.org/10.2196/13817
[11]
Schroeder, T., Haug, M. and Gewald, H. (2022) Data Privacy Concerns Using mHealth Apps and Smart Speakers: Comparative Interview Study among Mature Adults. JMIRFormativeResearch, 6, e28025. https://doi.org/10.2196/28025
[12]
Sampat, B.H. and Prabhakar, B. (2017) Privacy Risks and Security Threats in mHealth Apps. JournalofInternationalTechnologyandInformationManagement, 26, 126-153. https://doi.org/10.58729/1941-6679.1353
[13]
Manworren, N., Letwat, J. and Daily, O. (2016) Why You Should Care about the Target Data Breach. BusinessHorizons, 59, 257-266. https://doi.org/10.1016/j.bushor.2016.01.002
[14]
Khan, F., Kim, J.H., Mathiassen, L. and Moore, R. (2021) Data Breach Management: An Integrated Risk Model. Information&Management, 58, Article ID: 103392. https://doi.org/10.1016/j.im.2020.103392
[15]
Liu, L., Han, M., Wang, Y. and Zhou, Y. (2018) Understanding Data Breach: A Visualization Aspect. In: Chellappan, S., Cheng, W., Li, W., Eds., LectureNotesinComputerScience, Springer, 883-892. https://doi.org/10.1007/978-3-319-94268-1_81
[16]
Benjumea, J., Ropero, J., Rivera-Romero, O., Dorronzoro-Zubiete, E. and Carrasco, A. (2020) Privacy Assessment in Mobile Health Apps: Scoping Review. JMIRmHealthanduHealth, 8, e18868. https://doi.org/10.2196/18868
[17]
Iwaya, L.H., Ahmad, A. and Babar, M.A. (2020) Security and Privacy for mHealth and uHealth Systems: A Systematic Mapping Study. IEEEAccess, 8, 150081-150112. https://doi.org/10.1109/access.2020.3015962
[18]
Chatzipavlou, I.A., Christoforidou, S.A. and Vlachopoulou, M. (2016) A Recommended Guideline for the Development of mHealth Apps. mHealth, 2, 21-21. https://doi.org/10.21037/mhealth.2016.05.01
[19]
Jusob, F.R., George, C. and Mapp, G. (2017) Exploring the Need for a Suitable Privacy Framework for mHealth When Managing Chronic Diseases. JournalofReliableIntelligentEnvironments, 3, 243-256. https://doi.org/10.1007/s40860-017-0049-7
[20]
Rajput, A.R., Masood, I., Tabassam, A., Aslam, M.S., ShaoYu, Z. and Rajput, M.A. (2023) Patient’s Data Privacy and Security in mHealth Applications: A Charles Proxy-Based Recommendation. SoftComputing, 27, 18165-18180. https://doi.org/10.1007/s00500-023-09265-8
[21]
Vithanwattana, N., Mapp, G. and George, C. (2017) Developing a Comprehensive Information Security Framework for mHealth: A Detailed Analysis. JournalofReliableIntelligentEnvironments, 3, 21-39. https://doi.org/10.1007/s40860-017-0038-x
[22]
Yahya, F., Walters, R.J. and Wills, G.B. (2016) Goal-Based Security Components for Cloud Storage Security Framework: A Preliminary Study. 2016 InternationalConference on CyberSecurity and Protection of DigitalServices (CyberSecurity), London, 13-14 June 2016, 1-5. https://doi.org/10.1109/cybersecpods.2016.7502338
[23]
Thamilarasu, G. and Lakin, C. (2017) A Security Framework for Mobile Health Applications. 2017 5thInternationalConferenceonFutureInternetofThingsandCloudWorkshops (FiCloudW), Prague, 21-23 August 2017, 221-226. https://doi.org/10.1109/ficloudw.2017.96
[24]
Srivastava, M. and Thamilarasu, G. (2019) MSF: A Comprehensive Security Framework for mHealth Applications. 2019 7thInternationalConferenceonFutureInternetofThingsandCloudWorkshops (FiCloudW), Istanbul, 26-28 August 2019, 70-75. https://doi.org/10.1109/ficloudw.2019.00026
[25]
Jusob, F.R., George, C. and Mapp, G. (2021) A New Privacy Framework for the Management of Chronic Diseases via mHealth in a Post-Covid-19 World. JournalofPublicHealth, 30, 37-47. https://doi.org/10.1007/s10389-021-01608-9
[26]
Saracevic, M.H., Adamovic, S.Z., Miskovic, V.A., Elhoseny, M., Macek, N.D., Selim, M.M., et al. (2021) Data Encryption for Internet of Things Applications Based on Catalan Objects and Two Combinatorial Structures. IEEETransactionsonReliability, 70, 819-830. https://doi.org/10.1109/tr.2020.3010973
[27]
Galvin, H.K. and DeMuro, P.R. (2020) Developments in Privacy and Data Ownership in Mobile Health Technologies, 2016-2019. YearbookofMedicalInformatics, 29, 32-43. https://doi.org/10.1055/s-0040-1701987
[28]
Ahmad, G.I., Singla, J. and Giri, K. J. (2021) Security and Privacy of E-Health Data. In: Giri, K.J., Parah, S.A., Bashir, R. and Muhammad, K., Eds., Multimedia Security: Algorithm Development, Analysis and Applications, Springer, 199-214. https://doi.org/10.1007/978-981-15-8711-5_10
[29]
Zhou, P., Zhou, G., Wu, D. and Fei, M. (2021) Detecting Multi-Stage Attacks Using Sequence-to-Sequence Model. Computers&Security, 105, Article ID: 102203. https://doi.org/10.1016/j.cose.2021.102203
[30]
Morera, E.P., de la Torre Díez, I., Garcia-Zapirain, B., López-Coronado, M. and Arambarri, J. (2016) Security Recommendations for mHealth Apps: Elaboration of a Developer’s Guide. JournalofMedicalSystems, 40, Article No. 152. https://doi.org/10.1007/s10916-016-0513-6
[31]
Martínez-Pérez, B., de la Torre-Díez, I. and López-Coronado, M. (2014) Privacy and Security in Mobile Health Apps: A Review and Recommendations. JournalofMedicalSystems, 39, Article No. 181. https://doi.org/10.1007/s10916-014-0181-3
[32]
Shafique, U., Khan, H., Waqar, S., Sher, A., Zeb, A., Shafi, U., et al. (2017) Modern Authentication Techniques in Smart Phones: Security and Usability Perspective. InternationalJournalofAdvancedComputerScienceandApplications, 8, 331-340. https://doi.org/10.14569/ijacsa.2017.080142
[33]
Kharrazi, H., Chisholm, R., Van Nasdale, D. and Thompson, B. (2012) Mobile Personal Health Records: An Evaluation of Features and Functionality. InternationalJournalofMedicalInformatics, 81, 579-593. https://doi.org/10.1016/j.ijmedinf.2012.04.007
[34]
Mustafa, U., Pflugel, E. and Philip, N. (2019) A Novel Privacy Framework for Secure M-Health Applications: The Case of the GDPR. 2019 IEEE 12thInternationalConferenceonGlobalSecurity, SafetyandSustainability (ICGS3), London, 16-18 January 2019, 1-9. https://doi.org/10.1109/icgs3.2019.8688019
[35]
Hasan, M.K., Islam, S., Sulaiman, R., Khan, S., Hashim, A.A., Habib, S., et al. (2021) Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications. IEEEAccess, 9, 47731-47742. https://doi.org/10.1109/access.2021.3061710
[36]
Tan, S., Lo, K.C., Leau, Y., Chung, G. and Ahmedy, F. (2021) Securing mHealth Applications with Grid-Based Honey Encryption. 2021 IEEEInternationalConferenceonArtificialIntelligenceinEngineeringandTechnology (IICAIET), Kota Kinabalu, 13-15 September 2021, 1-5. https://doi.org/10.1109/iicaiet51634.2021.9573645
[37]
Deebak, B.D., Al-Turjman, F., Aloqaily, M. and Alfandi, O. (2019) An Authentic-Based Privacy Preservation Protocol for Smart E-Healthcare Systems in IoT. IEEEAccess, 7, 135632-135649. https://doi.org/10.1109/access.2019.2941575
[38]
Zhou, L. and Parmanto, B. (2020) User Preferences for Privacy Protection Methods in Mobile Health Apps: A Mixed-Methods Study. InternationalJournalofTelerehabilitation, 12, 13-26. https://doi.org/10.5195/ijt.2020.6319
[39]
Enamamu, T., Otebolaku, A., Marchang, J. and Dany, J. (2020) Continuous M-Health Data Authentication Using Wavelet Decomposition for Feature Extraction. Sensors, 20, Article 5690. https://doi.org/10.3390/s20195690
[40]
Huh, J. (2020) Surgery Agreement Signature Authentication System for Mobile Health Care. Electronics, 9, Article 890. https://doi.org/10.3390/electronics9060890
[41]
Egala, B.S., Pradhan, A.K., Badarla, V. and Mohanty, S.P. (2021) Fortified-chain: A Blockchain-Based Framework for Security and Privacy-Assured Internet of Medical Things with Effective Access Control. IEEEInternetofThingsJournal, 8, 11717-11731. https://doi.org/10.1109/jiot.2021.3058946
[42]
Thabit, R. (2019) Review of Cryptography Applications in eHealth Security Systems. International Journal of Science and Engineering Investigations, 8, 110-116.
[43]
van Haasteren, A., Gille, F., Fadda, M. and Vayena, E. (2019) Development of the mHealth App Trustworthiness Checklist. Digital Health, 5. https://doi.org/10.1177/2055207619886463
[44]
Mia, M.R., Shahriar, H., Valero, M., Sakib, N., Saha, B., Barek, M.A., et al. (2022) A Comparative Study on HIPAA Technical Safeguards Assessment of Android mHealth Applications. SmartHealth, 26, Article ID: 100349. https://doi.org/10.1016/j.smhl.2022.100349
[45]
Braghin, C., Cimato, S. and Della Libera, A. (2018) Are mHealth Apps Secure? A Case Study. 2018 IEEE 42ndAnnualComputerSoftwareandApplicationsConference (COMPSAC), Tokyo, 23-27 July 2018, 335-340. https://doi.org/10.1109/compsac.2018.10253
[46]
Nagaraj, S., Raju, G.S.V.P. and Srinadth, V. (2015) Data Encryption and Authetication Using Public Key Approach. ProcediaComputerScience, 48, 126-132. https://doi.org/10.1016/j.procs.2015.04.161
[47]
Shuwandy, M.L., Zaidan, B.B., Zaidan, A.A., Albahri, A.S., Alamoodi, A.H., Albahri, O.S., et al. (2020) mHealth Authentication Approach Based 3D Touchscreen and Microphone Sensors for Real-Time Remote Healthcare Monitoring System: Comprehensive Review, Open Issues and Methodological Aspects. ComputerScienceReview, 38, Article ID: 100300. https://doi.org/10.1016/j.cosrev.2020.100300
[48]
Jaeger, J., Ristenpart, T. and Tang, Q. (2016) Honey Encryption Beyond Message Recovery Security. In: Fischlin, M. and Coron, J.S., Eds., LectureNotesinComputerScience, Springer, 758-788. https://doi.org/10.1007/978-3-662-49890-3_29
[49]
Daley, B.J., Ni’Man, M., Neves, M.R., Bobby Huda, M.S., Marsh, W., Fenton, N.E., et al. (2021) mHealth Apps for Gestational Diabetes Mellitus That Provide Clinical Decision Support or Artificial Intelligence: A Scoping Review. DiabeticMedicine, 39, e14735. https://doi.org/10.1111/dme.14735
[50]
Silva, B.M., Rodrigues, J.J., Canelo, F., Lopes, I.C. and Zhou, L. (2013) A Data Encryption Solution for Mobile Health Apps in Cooperation Environments. JournalofMedicalInternetResearch, 15, e66. https://doi.org/10.2196/jmir.2498
[51]
Zhu, M., Wu, C., Huang, S., Zheng, K., Young, S.D., Yan, X., et al. (2021) Privacy Paradox in mHealth Applications: An Integrated Elaboration Likelihood Model Incorporating Privacy Calculus and Privacy Fatigue. TelematicsandInformatics, 61, Article ID: 101601. https://doi.org/10.1016/j.tele.2021.101601
[52]
O’Loughlin, K., Neary, M., Adkins, E.C. and Schueller, S.M. (2019) Reviewing the Data Security and Privacy Policies of Mobile Apps for Depression. InternetInterventions, 15, 110-115. https://doi.org/10.1016/j.invent.2018.12.001
[53]
Parker, L., Halter, V., Karliychuk, T. and Grundy, Q. (2019) How Private Is Your Mental Health App Data? An Empirical Study of Mental Health App Privacy Policies and Practices. InternationalJournalofLawandPsychiatry, 64, 198-204. https://doi.org/10.1016/j.ijlp.2019.04.002
[54]
Robillard, J.M., Feng, T.L., Sporn, A.B., Lai, J., Lo, C., Ta, M., et al. (2019) Availability, Readability, and Content of Privacy Policies and Terms of Agreements of Mental Health Apps. InternetInterventions, 17, Article ID: 100243. https://doi.org/10.1016/j.invent.2019.100243
[55]
Zhou, L., Bao, J., Watzlaf, V. and Parmanto, B. (2019) Barriers to and Facilitators of the Use of Mobile Health Apps from a Security Perspective: Mixed-Methods Study. JMIRmHealthanduHealth, 7, e11223. https://doi.org/10.2196/11223
[56]
Sardi, L., Idri, A., Redman, L.M., Alami, H., Bezad, R. and Fernández-Alemán, J.L. (2020) Mobile Health Applications for Postnatal Care: Review and Analysis of Functionalities and Technical Features. ComputerMethodsandProgramsinBiomedicine, 184, Article ID: 105114. https://doi.org/10.1016/j.cmpb.2019.105114
[57]
Sunyaev, A., Dehling, T., Taylor, P.L. and Mandl, K.D. (2014) Availability and Quality of Mobile Health App Privacy Policies. JournaloftheAmericanMedicalInformaticsAssociation, 22, e28-e33. https://doi.org/10.1136/amiajnl-2013-002605
[58]
Shipp, L. and Blasco, J. (2020) How Private Is Your Period? A Systematic Analysis of Menstrual App Privacy Policies. ProceedingsonPrivacyEnhancingTechnologies, 2020, 491-510. https://doi.org/10.2478/popets-2020-0083
[59]
Amanul Islam, M. (2022) Privacy Risks and Security Threat Strategy to Optimize the Vulnerability in Health Information System (HIS). InternationalJournalofAdvancedNetworkingandApplications, 14, 5271-5276. https://doi.org/10.35444/ijana.2022.14106
[60]
He, D., Naveed, M., Gunter, C.A. and Nahrstedt, K. (2014) Security Concerns in Android mHealth Apps. AMIA Annual Symposium Proceedings, 2014, 645–654.
[61]
Greene, E., Proctor, P. and Kotz, D. (2019) Secure Sharing of mHealth Data Streams through Cryptographically-Enforced Access Control. SmartHealth, 12, 49-65. https://doi.org/10.1016/j.smhl.2018.01.003
[62]
Ammar, N., Bailey, J.E., Davis, R.L. and Shaban-Nejad, A. (2021) Using a Personal Health Library-Enabled mHealth Recommender System for Self-Management of Diabetes among Underserved Populations: Use Case for Knowledge Graphs and Linked Data. JMIRFormativeResearch, 5, e24738. https://doi.org/10.2196/24738
[63]
Cvrkel, T. (2018) The Ethics of mHealth: Moving Forward. JournalofDentistry, 74, S15-S20. https://doi.org/10.1016/j.jdent.2018.04.024
[64]
Gurupur, V.P. and Wan, T.T.H. (2017) Challenges in Implementing mHealth Interventions: A Technical Perspective. mHealth, 3, Article 32. https://doi.org/10.21037/mhealth.2017.07.05
[65]
Hathaliya, J.J. and Tanwar, S. (2020) An Exhaustive Survey on Security and Privacy Issues in Healthcare 4.0. ComputerCommunications, 153, 311-335. https://doi.org/10.1016/j.comcom.2020.02.018
[66]
Ren, Y., Shen, J., Zheng, Y., Wang, J. and Chao, H. (2015) Efficient Data Integrity Auditing for Storage Security in Mobile Health Cloud. Peer-to-PeerNetworkingandApplications, 9, 854-863. https://doi.org/10.1007/s12083-015-0346-y
[67]
Benaloh, J., Chase, M., Horvitz, E. and Lauter, K. (2009) Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records. Proceedingsofthe 2009 ACMWorkshoponCloudComputingSecurity, Chicago, 13 November 2009, 103-114. https://doi.org/10.1145/1655008.1655024
[68]
Aljedaani, B., Ahmad, A., Zahedi, M. and Babar, M.A. (2023) End-Users’ Knowledge and Perception about Security of Clinical Mobile Health Apps: A Case Study with Two Saudi Arabian mHealth Providers. JournalofSystemsandSoftware, 195, Article ID: 111519. https://doi.org/10.1016/j.jss.2022.111519
[69]
Plachkinova, M., Andres, S. and Chatterjee, S. (2015) A Taxonomy of mHealth Apps—Security and Privacy Concerns. 2015 48thHawaiiInternationalConferenceonSystemSciences, Kauai, 5-8 January 2015, 3187-3196. https://doi.org/10.1109/hicss.2015.385
[70]
Alsyouf, A., Lutfi, A., Alsubahi, N., Alhazmi, F.N., Al-Mugheed, K., Anshasi, R.J., et al. (2023) The Use of a Technology Acceptance Model (TAM) to Predict Patients’ Usage of a Personal Health Record System: The Role of Security, Privacy, and Usability. InternationalJournalofEnvironmentalResearchandPublicHealth, 20, Article 1347. https://doi.org/10.3390/ijerph20021347
[71]
Yarbrough, A.K. and Smith, T.B. (2007) Technology Acceptance among Physicians: A New Take on TAM. MedicalCareResearchandReview, 64, 650-672. https://doi.org/10.1177/1077558707305942
[72]
Aydin, G. (2023) Increasing Mobile Health Application Usage among Generation Z Members: Evidence from the UTAUT Model. InternationalJournalofPharmaceuticalandHealthcareMarketing, 17, 353-379. https://doi.org/10.1108/ijphm-02-2021-0030
[73]
Shemesh, T. and Barnoy, S. (2020) Assessment of the Intention to Use Mobile Health Applications Using a Technology Acceptance Model in an Israeli Adult Population. Telemedicineande-Health, 26, 1141-1149. https://doi.org/10.1089/tmj.2019.0144
[74]
Hilty, D.M., Chan, S., Torous, J., Luo, J. and Boland, R.J. (2019) A Telehealth Framework for Mobile Health, Smartphones, and Apps: Competencies, Training, and Faculty Development. JournalofTechnologyinBehavioralScience, 4, 106-123. https://doi.org/10.1007/s41347-019-00091-0
[75]
Boyles, J.L., Smith, A. and Madden, M. (2012) Privacy and Data Management on Mobile Devices. PewInternet&AmericanLifeProject, 4, 1-19.
[76]
Mancini, E. (2023) Privacy and Security Analysis of mHealth Apps. https://thesis.unipd.it/handle/20.500.12608/46196
[77]
Sheppard, M.K. (2020) mHealth Apps: Disruptive Innovation, Regulation, and Trust—A Need for Balance. MedicalLawReview, 28, 549-572. https://doi.org/10.1093/medlaw/fwaa019
[78]
Dagher, G.G., Mohler, J., Milojkovic, M. and Marella, P.B. (2018) Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology. SustainableCitiesandSociety, 39, 283-297. https://doi.org/10.1016/j.scs.2018.02.014
[79]
Shu, I.N. and Jahankhani, H. (2017) The Impact of the New European General Data Protection Regulation (GDPR) on the Information Governance Toolkit in Health and Social Care with Special Reference to Primary Care in England. 2017 CybersecurityandCyberforensicsConference (CCC), London, 21-23 November 2017, 31-37. https://doi.org/10.1109/ccc.2017.16
[80]
Oliva, A., Grassi, S., Vetrugno, G., Rossi, R., Della Morte, G., Pinchi, V., et al. (2022) Management of Medico-Legal Risks in Digital Health Era: A Scoping Review. FrontiersinMedicine, 8, Article 821756. https://doi.org/10.3389/fmed.2021.821756
[81]
Jain, D. (2023) Regulation of Digital Healthcare in India: Ethical and Legal Challenges. Healthcare, 11, Article 911. https://doi.org/10.3390/healthcare11060911
[82]
Knorr, K. and Aspinall, D. (2015) Security Testing for Android mHealth Apps. 2015 IEEEEighthInternationalConferenceonSoftwareTesting, VerificationandValidationWorkshops (ICSTW), Graz, 13-17 April 2015, 1-8. https://doi.org/10.1109/icstw.2015.7107459
[83]
Kotz, D., Gunter, C.A., Kumar, S. and Weiner, J.P. (2016) Privacy and Security in Mobile Health: A Research Agenda. Computer, 49, 22-30. https://doi.org/10.1109/mc.2016.185
[84]
Ducato, R. (2016) Cloud Computing for S-Health and the Data Protection Challenge: Getting Ready for the General Data Protection Regulation. 2016 IEEEInternationalSmartCitiesConference (ISC2), Trento, 12-15 September 2016, 1-4. https://doi.org/10.1109/isc2.2016.7580803
[85]
Hendricks-Sturrup, R. (2022) Pulse Oximeter App Privacy Policies during COVID-19: Scoping Assessment. JMIRmHealthanduHealth, 10, e30361. https://doi.org/10.2196/30361
[86]
Nurgalieva, L., O’Callaghan, D. and Doherty, G. (2020) Security and Privacy of mHealth Applications: A Scoping Review. IEEEAccess, 8, 104247-104268. https://doi.org/10.1109/access.2020.2999934
[87]
Tung, B. (2021) The Challenges of Applying Computational Legal Analysis to mHealth Security and Privacy Regulations. Master’s Thesis, McKelvey School of Engineering.
[88]
Tangari, G., Ikram, M., Ijaz, K., Kaafar, M.A. and Berkovsky, S. (2021) Mobile Health and Privacy: Cross Sectional Study. BMJ, 373, n1248. https://doi.org/10.1136/bmj.n1248