Abstract
Security and privacy have been well established as major considerations in health informatics generally (Rindfleisch 1997). A challenge for healthcare innovation is to embrace the potential of mobile health creatively within the healthcare system and not to merely replicate current technologies into a parallel wireless environment. In addressing this challenge, the complexities of securing health information along a composite clinical information pathway and in each situation of use must be defined.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Appari, A., Johnston, M.: Information security and privacy in healthcare: surrent state of research. Int. J. Internet and Enterprise Management 6(4), 279–314 (2010)
Ardito, S.: Mobile apps for the health professional. Searcher 19(6), 46–50 (2011)
Avancha, S., Baxi, A., Kotz, D.: Privacy in mobile technology for personal healthcare. ACM Comput. Surv. 45(1)3, 1–54 (2012)
Brusco, J.: Mobile health application regulations and compliance review. AORN Journal 95(3), 391–394 (2012)
COBIT, COBIT 4.1: Framework for IT Governance and Control (2013), http://www.isaca.org/knowledge-center/cobit/Pages/Overview.aspx
Dunbrack, L.A.: The Second Wave of Clinical Mobility: Strategic Solution Investments for Mobile Point of Care. IDC Health Insights, 29 (December 2011)
Evesti, A., Suomalainen, J., Ovaska, E.: Architecture and knowledge-driven self-adaptive security in smart space. Computers 2, 34–66 (2013)
FDA. Draft Guidance for Industry and Food and Drug Administration Staff - Mobile Medical Applications (2011), http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm263280.htm
Garg, V., Brewer, J.: Telemedicine security: a systematic review. Journal of Diabetes Science and Technology 5(3), 768–777 (2011)
Kotz, D.: A threat taxonomy for mHealth privacy. In: 2011 Third International Conference on Communication Systems and Networks (COMSNETS), pp. 1–6. IEEE (January 2011)
Lin, H., Shao, J., Zhang, C., Fang, Y.C.: Cloud-assisted privacy preserving mobile health monitoring. IEEE Trans Information Forensics and Security 8(6), 985–997 (2013)
Markovic, M., Savic, Z., Kovacevic, B.: Secure mobile health systems: principles and solutions. In: Istepanian, R., Laxminarayan, S., Pattichis, C.S. (eds.) M Health: emerging mobile health systems, pp. 81–106. Springer, Berlin (2006)
Martí, R., Delgado, J., Perramon, X.: Security specification and implementation for mobile e-health services. In: 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service, pp. 241–248 (March 2004)
Morgan, S.A., Agee, N.: Mobile healthcare. Frontiers of Health Services Management 29(2), 3–10 (2012)
NIST (n.d.) Guide to Storage Encryption Technologies for End-User Devices. National Institutes of Science and Technology Special Publication 800-111, http://www.csrc.nist.gov/publications/nistpubs/800-111/SP800-111.pdf
OAIC 2013, Australian Privacy Principles Guidelines (draft), Office of the Australian Information Commissioner 2013 (2013), http://www.oaic.gov.au/privacy/privacy-engaging-with-you/current-privacy-consultations/draft-australian-privacy-principles-guidelines/draft-app-guidelines
Osunmuyiwa, O., Ulusoy, A.: Wireless security in mobile health. Telemed J. EHealth 18(10), 810–814 (2012)
Rindfleisch, T.: Privacy, information technology, and health care. Comm. ACM 40(8), 92–100 (1997)
Ryoo, J., Choi, Y.B., Oh, T.H.: Security and Privacy in Mobile Telemedicine. Mobile Telemedicine: A Computing and Networking Perspective, 175–193 (2008)
Sahoo, P.K.: Efficient security mechanisms for mHealth applications using wireless body sensor networks. Sensors 12, 12606–12633 (2012)
Silberman, M.J., Clark, L.: M-Health: The union of technology and healthcare regulations. J. Med. Pract. Manage. 28(2), 118–120 (2012)
Steinberg, M.J., Rubin, E.R.: The HIPAA Privacy Rule: Lacks Patient Benefit, Impedes Research Growth. Association of Academic Health Centers (2009)
Takahashi, D., Xiao, Y., Hu, F.: A survey of security in telemedicine with wireless sensor networks. Mobile Telemedicine: A Computing and Networking Perspective, 209–235 (2008)
Tang, P.C., Ash, J.S., Bates, D.W., Overhage, J.M., Sands, D.: Personal health records: definitions, benefits, and strategies for overcoming barriers to adoption. JAMIA 13(2), 121–126 (2006)
Thomson Reuters Foundation. Patient privacy in a mobile world: A framework to address privacy law issues in mobile health (2013), http://www.mhealthalliance.org/images/content/trustlaw_connect_report.pdf#sthash.vpNtzBwS.dpuf
Williams, P.A.H., Maeder, A.: A conceptual framework for secure mobile health. J. Int. Soc. Telemed. eHealth 1(1), 44–51 (2013)
Williams, P.A.H., McCauley, V.B.: A rapidly moving target: Conformance with e-health standards for mobile computing. In: 2nd Australian eHealth Informatics and Security Conference, pp. 40–49 (2013), http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1013&context=aeis (retrieved)
Win, K.T., Susilo, W., Mu, Y.: Personal health record systems and their security protection. Journal of Medical Systems 30(4), 309–315 (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Williams, P.A.H., Maeder, A.J. (2015). “Security and Privacy Issues for Mobile Health”. In: Adibi, S. (eds) Mobile Health. Springer Series in Bio-/Neuroinformatics, vol 5. Springer, Cham. https://doi.org/10.1007/978-3-319-12817-7_44
Download citation
DOI: https://doi.org/10.1007/978-3-319-12817-7_44
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12816-0
Online ISBN: 978-3-319-12817-7
eBook Packages: EngineeringEngineering (R0)