81
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      Submit your digital health research with an established publisher
      - celebrating 25 years of open access

      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Exploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Apps on iOS and Android

      research-article
      , Dipl -Wirt -Inf 1 , , MSc 1 , , Dipl -Wirt -Inf 1 , , PhD 1 ,
      (Reviewer), (Reviewer), (Reviewer)
      JMIR mHealth and uHealth
      JMIR Publications Inc.
      mobile health, mobile apps, data security, software and application security, patient privacy, health information technology

      Read this article at

      ScienceOpenPublisherPMC
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Background

          Mobile health (mHealth) apps aim at providing seamless access to tailored health information technology and have the potential to alleviate global health burdens. Yet, they bear risks to information security and privacy because users need to reveal private, sensitive medical information to redeem certain benefits. Due to the plethora and diversity of available mHealth apps, implications for information security and privacy are unclear and complex.

          Objective

          The objective of this study was to establish an overview of mHealth apps offered on iOS and Android with a special focus on potential damage to users through information security and privacy infringements.

          Methods

          We assessed apps available in English and offered in the categories “Medical” and “Health & Fitness” in the iOS and Android App Stores. Based on the information retrievable from the app stores, we established an overview of available mHealth apps, tagged apps to make offered information machine-readable, and clustered the discovered apps to identify and group similar apps. Subsequently, information security and privacy implications were assessed based on health specificity of information available to apps, potential damage through information leaks, potential damage through information manipulation, potential damage through information loss, and potential value of information to third parties.

          Results

          We discovered 24,405 health-related apps (iOS; 21,953; Android; 2452). Absence or scarceness of ratings for 81.36% (17,860/21,953) of iOS and 76.14% (1867/2452) of Android apps indicates that less than a quarter of mHealth apps are in more or less widespread use. Clustering resulted in 245 distinct clusters, which were consolidated into 12 app archetypes grouping clusters with similar assessments of potential damage through information security and privacy infringements. There were 6426 apps that were excluded during clustering. The majority of apps (95.63%, 17,193/17,979; of apps) pose at least some potential damage through information security and privacy infringements. There were 11.67% (2098/17,979) of apps that scored the highest assessments of potential damages.

          Conclusions

          Various kinds of mHealth apps collect and offer critical, sensitive, private medical information, calling for a special focus on information security and privacy of mHealth apps. In order to foster user acceptance and trust, appropriate security measures and processes need to be devised and employed so that users can benefit from seamlessly accessible, tailored mHealth apps without exposing themselves to the serious repercussions of information security and privacy infringements.

          Related collections

          Most cited references91

          • Record: found
          • Abstract: found
          • Article: found
          Is Open Access

          The structure and function of complex networks

          M. Newman (2003)
          Inspired by empirical studies of networked systems such as the Internet, social networks, and biological networks, researchers have in recent years developed a variety of techniques and models to help us understand or predict the behavior of these systems. Here we review developments in this field, including such concepts as the small-world effect, degree distributions, clustering, network correlations, random graph models, models of network growth and preferential attachment, and dynamical processes taking place on networks.
            Bookmark
            • Record: found
            • Abstract: found
            • Article: found
            Is Open Access

            Fast unfolding of communities in large networks

            We propose a simple method to extract the community structure of large networks. Our method is a heuristic method that is based on modularity optimization. It is shown to outperform all other known community detection method in terms of computation time. Moreover, the quality of the communities detected is very good, as measured by the so-called modularity. This is shown first by identifying language communities in a Belgian mobile phone network of 2.6 million customers and by analyzing a web graph of 118 million nodes and more than one billion links. The accuracy of our algorithm is also verified on ad-hoc modular networks. .
              Bookmark
              • Record: found
              • Abstract: found
              • Article: not found

              Finding and evaluating community structure in networks.

              We propose and study a set of algorithms for discovering community structure in networks-natural divisions of network nodes into densely connected subgroups. Our algorithms all share two definitive features: first, they involve iterative removal of edges from the network to split it into communities, the edges removed being identified using any one of a number of possible "betweenness" measures, and second, these measures are, crucially, recalculated after each removal. We also propose a measure for the strength of the community structure found by our algorithms, which gives us an objective metric for choosing the number of communities into which a network should be divided. We demonstrate that our algorithms are highly effective at discovering community structure in both computer-generated and real-world network data, and show how they can be used to shed light on the sometimes dauntingly complex structure of networked systems.
                Bookmark

                Author and article information

                Contributors
                Journal
                JMIR Mhealth Uhealth
                JMIR Mhealth Uhealth
                JMU
                JMIR mHealth and uHealth
                JMIR Publications Inc. (Toronto, Canada )
                2291-5222
                Jan-Mar 2015
                19 January 2015
                : 3
                : 1
                : e8
                Affiliations
                [1] 1Department of Information Systems Faculty of Management, Economics and Social Sciences University of Cologne CologneGermany
                Author notes
                Corresponding Author: Ali Sunyaev sunyaev@ 123456wiso.uni-koeln.de
                Author information
                http://orcid.org/0000-0002-3445-3003
                http://orcid.org/0000-0003-3471-0716
                http://orcid.org/0000-0001-5024-1126
                http://orcid.org/0000-0002-4353-8519
                Article
                v3i1e8
                10.2196/mhealth.3672
                4319144
                25599627
                364b3bcf-4d4a-4e60-8fcc-c3325d98d53b
                ©Tobias Dehling, Fangjian Gao, Stephan Schneider, Ali Sunyaev. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 19.01.2015.

                This is an open-access article distributed under the terms of the Creative Commons Attribution License ( http://creativecommons.org/licenses/by/2.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR mhealth and uhealth, is properly cited. The complete bibliographic information, a link to the original publication on http://mhealth.jmir.org/, as well as this copyright and license information must be included.

                History
                : 06 July 2014
                : 19 September 2014
                : 21 October 2014
                : 03 November 2014
                Categories
                Original Paper
                Original Paper

                mobile health,mobile apps,data security,software and application security,patient privacy,health information technology

                Comments

                Comment on this article