Security Issues in Mobile Healthcare Applications

Author(s):  
Alexander Feldner ◽  
Youna Jung
Author(s):  
Yaira K. Rivera Sánchez ◽  
Steven A. Demurjian

The emergence and ubiquity of mobile computing has placed powerful capabilities in one's hand providing a wide range of applications such as email, calendar, photos, browsers, social network, communication, shopping, health and fitness, games etc., which were once restricted to traditional platforms. Such applications on a single mobile device raise critical security issues related to managing identity, re-authenticating users that stay active for long periods of time, protecting sensitive PII and PHI against access and misuse, insuring secure transactions, and protecting the physical device. This chapter explores user authentication requirements for mobile computing by: evaluating alternative user authentication requirements in order to make recommendations on their usage in authentication; identifying authentication methods used in mobile healthcare applications; and proposing a set of requirements for user authentication to handle the situation when a user seeks to be securely authenticated across a set of applications that are placed into context within a framework.


2020 ◽  
pp. 1254-1282
Author(s):  
Yaira K. Rivera Sánchez ◽  
Steven A. Demurjian

The emergence and ubiquity of mobile computing has placed powerful capabilities in one's hand providing a wide range of applications such as email, calendar, photos, browsers, social network, communication, shopping, health and fitness, games etc., which were once restricted to traditional platforms. Such applications on a single mobile device raise critical security issues related to managing identity, re-authenticating users that stay active for long periods of time, protecting sensitive PII and PHI against access and misuse, insuring secure transactions, and protecting the physical device. This chapter explores user authentication requirements for mobile computing by: evaluating alternative user authentication requirements in order to make recommendations on their usage in authentication; identifying authentication methods used in mobile healthcare applications; and proposing a set of requirements for user authentication to handle the situation when a user seeks to be securely authenticated across a set of applications that are placed into context within a framework.


2019 ◽  
Vol 47 (12) ◽  
pp. 1-10
Author(s):  
Yuanrong Hu ◽  
Shengkang Lu ◽  
Zhongming Tang

We explored how donation relates to patient satisfaction with the quality of process and outcome in an online healthcare service. Using a dataset of 496,723 patient consultation records collected from ChunyuDoctor, which is among the largest of the Chinese mobile healthcare applications, we conducted a multiple regression and found that patient satisfaction with both process and outcome jointly influenced their donation. We also found that higher quality satisfaction levels meant paying patients were more likely to donate than were free patients. Our results also showed satisfaction with the quality of the process and the outcome had an equal impact on patient donation for the free patients, but the impact of process quality was greater than that of outcome quality for the paying patients, suggesting the importance of enhancing the quality of the process in an online healthcare service. Implications of the findings are discussed.


Author(s):  
Benjamin Falchuk ◽  
David Famolari ◽  
Russell Fischer ◽  
Shoshana Loeb ◽  
Euthimios Panagos

Applications accessible through mobile devices, such as mobile phones, are playing an increasingly important part in the delivery of high quality and personalized healthcare services. In this paper, we examine current usage of mobile devices and networks by mobile healthcare applications, and present our views on how mobile devices and networks could be used for creating patient-centered healthcare applications. The patient-centered healthcare paradigm allows for increased quality of care and quality of life for patients while increasing personal freedom to move about and be always connected to care-givers and healthcare services. The structure of our discussion is analogous to layered protocol stack in communications, progressing from the network and radio technologies, servicing middleware, cloud services, health sensors, mobile smartphones, and applications. All these layers come into play to support future mobile healthcare services.


2018 ◽  
Vol 97 ◽  
pp. 54-66 ◽  
Author(s):  
Lamia Ben Amor ◽  
Imene Lahyani ◽  
Mohamed Jmaiel

2014 ◽  
Vol 49 (4) ◽  
pp. 801-811 ◽  
Author(s):  
Shu-Yu Hsu ◽  
Yingchieh Ho ◽  
Po-Yao Chang ◽  
Chauchin Su ◽  
Chen-Yi Lee

Sign in / Sign up

Export Citation Format

Share Document