Skip to main content

“Security and Privacy Issues for Mobile Health”

  • Chapter
Mobile Health

Part of the book series: Springer Series in Bio-/Neuroinformatics ((SSBN,volume 5))

Abstract

Security and privacy have been well established as major considerations in health informatics generally (Rindfleisch 1997). A challenge for healthcare innovation is to embrace the potential of mobile health creatively within the healthcare system and not to merely replicate current technologies into a parallel wireless environment. In addressing this challenge, the complexities of securing health information along a composite clinical information pathway and in each situation of use must be defined.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  • Appari, A., Johnston, M.: Information security and privacy in healthcare: surrent state of research. Int. J. Internet and Enterprise Management 6(4), 279–314 (2010)

    Article  Google Scholar 

  • Ardito, S.: Mobile apps for the health professional. Searcher 19(6), 46–50 (2011)

    Google Scholar 

  • Avancha, S., Baxi, A., Kotz, D.: Privacy in mobile technology for personal healthcare. ACM Comput. Surv. 45(1)3, 1–54 (2012)

    Google Scholar 

  • Brusco, J.: Mobile health application regulations and compliance review. AORN Journal 95(3), 391–394 (2012)

    Article  Google Scholar 

  • COBIT, COBIT 4.1: Framework for IT Governance and Control (2013), http://www.isaca.org/knowledge-center/cobit/Pages/Overview.aspx

  • Dunbrack, L.A.: The Second Wave of Clinical Mobility: Strategic Solution Investments for Mobile Point of Care. IDC Health Insights, 29 (December 2011)

    Google Scholar 

  • Evesti, A., Suomalainen, J., Ovaska, E.: Architecture and knowledge-driven self-adaptive security in smart space. Computers 2, 34–66 (2013)

    Article  Google Scholar 

  • FDA. Draft Guidance for Industry and Food and Drug Administration Staff - Mobile Medical Applications (2011), http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm263280.htm

  • Garg, V., Brewer, J.: Telemedicine security: a systematic review. Journal of Diabetes Science and Technology 5(3), 768–777 (2011)

    Article  Google Scholar 

  • Kotz, D.: A threat taxonomy for mHealth privacy. In: 2011 Third International Conference on Communication Systems and Networks (COMSNETS), pp. 1–6. IEEE (January 2011)

    Google Scholar 

  • Lin, H., Shao, J., Zhang, C., Fang, Y.C.: Cloud-assisted privacy preserving mobile health monitoring. IEEE Trans Information Forensics and Security 8(6), 985–997 (2013)

    Article  Google Scholar 

  • Markovic, M., Savic, Z., Kovacevic, B.: Secure mobile health systems: principles and solutions. In: Istepanian, R., Laxminarayan, S., Pattichis, C.S. (eds.) M Health: emerging mobile health systems, pp. 81–106. Springer, Berlin (2006)

    Chapter  Google Scholar 

  • Martí, R., Delgado, J., Perramon, X.: Security specification and implementation for mobile e-health services. In: 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service, pp. 241–248 (March 2004)

    Google Scholar 

  • Morgan, S.A., Agee, N.: Mobile healthcare. Frontiers of Health Services Management 29(2), 3–10 (2012)

    Google Scholar 

  • NIST (n.d.) Guide to Storage Encryption Technologies for End-User Devices. National Institutes of Science and Technology Special Publication 800-111, http://www.csrc.nist.gov/publications/nistpubs/800-111/SP800-111.pdf

  • OAIC 2013, Australian Privacy Principles Guidelines (draft), Office of the Australian Information Commissioner 2013 (2013), http://www.oaic.gov.au/privacy/privacy-engaging-with-you/current-privacy-consultations/draft-australian-privacy-principles-guidelines/draft-app-guidelines

  • Osunmuyiwa, O., Ulusoy, A.: Wireless security in mobile health. Telemed J. EHealth 18(10), 810–814 (2012)

    Article  Google Scholar 

  • Rindfleisch, T.: Privacy, information technology, and health care. Comm. ACM 40(8), 92–100 (1997)

    Article  Google Scholar 

  • Ryoo, J., Choi, Y.B., Oh, T.H.: Security and Privacy in Mobile Telemedicine. Mobile Telemedicine: A Computing and Networking Perspective, 175–193 (2008)

    Google Scholar 

  • Sahoo, P.K.: Efficient security mechanisms for mHealth applications using wireless body sensor networks. Sensors 12, 12606–12633 (2012)

    Article  MathSciNet  Google Scholar 

  • Silberman, M.J., Clark, L.: M-Health: The union of technology and healthcare regulations. J. Med. Pract. Manage. 28(2), 118–120 (2012)

    Google Scholar 

  • Steinberg, M.J., Rubin, E.R.: The HIPAA Privacy Rule: Lacks Patient Benefit, Impedes Research Growth. Association of Academic Health Centers (2009)

    Google Scholar 

  • Takahashi, D., Xiao, Y., Hu, F.: A survey of security in telemedicine with wireless sensor networks. Mobile Telemedicine: A Computing and Networking Perspective, 209–235 (2008)

    Google Scholar 

  • Tang, P.C., Ash, J.S., Bates, D.W., Overhage, J.M., Sands, D.: Personal health records: definitions, benefits, and strategies for overcoming barriers to adoption. JAMIA 13(2), 121–126 (2006)

    Google Scholar 

  • Thomson Reuters Foundation. Patient privacy in a mobile world: A framework to address privacy law issues in mobile health (2013), http://www.mhealthalliance.org/images/content/trustlaw_connect_report.pdf#sthash.vpNtzBwS.dpuf

  • Williams, P.A.H., Maeder, A.: A conceptual framework for secure mobile health. J. Int. Soc. Telemed. eHealth 1(1), 44–51 (2013)

    Google Scholar 

  • Williams, P.A.H., McCauley, V.B.: A rapidly moving target: Conformance with e-health standards for mobile computing. In: 2nd Australian eHealth Informatics and Security Conference, pp. 40–49 (2013), http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1013&context=aeis (retrieved)

  • Win, K.T., Susilo, W., Mu, Y.: Personal health record systems and their security protection. Journal of Medical Systems 30(4), 309–315 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Patricia A. H. Williams .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Williams, P.A.H., Maeder, A.J. (2015). “Security and Privacy Issues for Mobile Health”. In: Adibi, S. (eds) Mobile Health. Springer Series in Bio-/Neuroinformatics, vol 5. Springer, Cham. https://doi.org/10.1007/978-3-319-12817-7_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12817-7_44

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12816-0

  • Online ISBN: 978-3-319-12817-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics