Privacy, Security and Interoperability of Mobile Health Applications

  • Josette F. Jones
  • Sara A. Hook
  • Seong C. Park
  • LaSha M. Scott
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6767)

Abstract

This paper will discuss the security, privacy and interoperability of mobile health applications (MHAs) and how these issues must be reconciled in order for MHA devices to be implemented in the most robust fashion. Balance is needed between privacy and accessibility, between security and interoperability and between flexibility and standardization. The interoperability of diverse MHA devices must be a goal for the future in order to realize portability, true continuity and quality of care across a wide spectrum of health services. A pilot project to determine potential threats to the privacy of personal health information on an iPad will be described

Keywords

Security interoperability privacy mobile health devices usability 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bellamy, N., et al.: Osteoarthritis Index delivered by mobile phone (m-WOMAC) is valid, reliable, and responsive. Journal of Clinical Epidemiology 64, 182–190 (2011)CrossRefGoogle Scholar
  2. 2.
    Terry, M.: The Personal Health Dashboard: Consumer Electronics Is Growing in the Health and Wellness Market. Telemedicine and e-Health 15, 642–645 (2009)CrossRefGoogle Scholar
  3. 3.
    Krishna, S., et al.: Healthcare via Cell Phones: A Systematic Review. Telemedicine and e-Health 15, 231–240 (2009)CrossRefGoogle Scholar
  4. 4.
    Patrick, K., et al.: Health and the Mobile Phone. American Journal of Preventive Medicine 35, 177–181 (2008)CrossRefGoogle Scholar
  5. 5.
    Agarwal, S., Lau, C.T.: Remote Health Monitoring Using Mobile Phones and Web Services. Telemedicine and e-Health 16, 603–607 (2010)CrossRefGoogle Scholar
  6. 6.
    Ackerman, M.J., et al.: Developing Next-Generation Telehealth Tools and Technologies: Patients, Systems, and Data Perspectives. Telemedicine and e-Health 16, 93–95 (2009)CrossRefGoogle Scholar
  7. 7.
    Blake, H.: Innovation in practice: mobile phone technology in patient care. British Journal of Community Nursing 13, 160 (2008)CrossRefGoogle Scholar
  8. 8.
    Krishna, S., Boren, S.A.: Diabetes Self-Management Care via Cell Phone: A Systematic Review. J. Diabetes Sci. Technol. 2, 509–517 (2008)CrossRefGoogle Scholar
  9. 9.
    Bernabe-Ortiz, A., et al.: Handheld computers for self-administered sensitive data collection: A comparative study in Peru. BMC Medical Informatics and Decision Making 8, 11 (2008)CrossRefGoogle Scholar
  10. 10.
    Sheih, Y.Y., et al.: Mobile Healthcare: The Opportunities and Challenges. Int. J. Elect. Healthcare 4, 208–219 (2008)CrossRefGoogle Scholar
  11. 11.
    Pharow, P., Blobel, B.: Mobile Health Requires Mobile Security: Challenges, Solutions and Standardization. Stud. Health Tech. Info. 136, 697–702 (2008)Google Scholar
  12. 12.
    Simpson, L.A., et al.: Childhood Obesity: The Role of Health Policy. Report to the Second National Childhood Obesity Congres, Miami, Florida (2008)Google Scholar
  13. 13.
    Hufnagel, S.P.: Interoperability. Military Medicine 174, 43–50 (2009)CrossRefGoogle Scholar
  14. 14.
    ProjectHealthDesign, Tracking and Sharing Observations from Daily Life Could Transform Chronic Care Management, Johnson, R.W. (ed.) (2010) Google Scholar
  15. 15.
    Kaelber, D.C., et al.: A Research Agenda for Personal Health Records (PHRs). Journal of the American Medical Informatics Association 15, 729–736 (2008)CrossRefGoogle Scholar
  16. 16.
    Kendall, D.B.: Improving Health Care in America: Protecting Patient Privacy in the Information Age. Harvard Law & Policy Review 2 (2008)Google Scholar
  17. 17.
    Update: BlueCross ID Theft Warnings Top 5000,000 and Growing. Personal Health Information Privacy (February 22, 2010), http://www.phiprivacy.net/?p=1993
  18. 18.
    Wright, A., Sittig, D.F.: Security Threat Posed by USB-Based Personal Health Records. Annals of Internal Medicine 146, 314–315 (2007)CrossRefGoogle Scholar
  19. 19.
    Wright, A., Sittig, D.F.: Encryption Characteristics of Two USB-based Personal Health Record Devices. Journal of the American Medical Informatics Association 14, 397–399 (2007)CrossRefGoogle Scholar
  20. 20.
    Simborg, D.W.: The Limits of Free Speech: The PHR Problem. Journal of the American Medical Informatics Association 16, 282–283 (2009)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Josette F. Jones
    • 1
  • Sara A. Hook
    • 1
  • Seong C. Park
    • 1
  • LaSha M. Scott
    • 1
  1. 1.Indiana University School of Informatics, IUPUIIndianapolisU.S.A.

Personalised recommendations