Security and privacy policy assessment in mobile health applications: a literature review

Currently, the availability of mobile health (mHealth) applications is growing, implying the development and effectiveness of healthcare facilities. However, the sensitive medical information potentially intrudes into the privacy and security of users which has not been acknowledged by the user. The...

Full description

Saved in:
Bibliographic Details
Main Authors: Hakiem, Nashrul, Afrizal, Sandra Hakiem, Setiadi, Yudi, Albab, Hadid Syaifullah, Riasetiawan, Mardhani, Zulhuda, Sonny
Format: Article
Language:English
English
Published: Success Culture Press 2024
Subjects:
Online Access:http://irep.iium.edu.my/112677/2/112677_Security%20and%20privacy%20policy%20assessment_SCOPUS.pdf
http://irep.iium.edu.my/112677/3/112677_Security%20and%20privacy%20policy%20assessment.pdf
http://irep.iium.edu.my/112677/
https://www.aasmr.org/jsms/Vol14/No.2/Vol.14.No.2.22.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Currently, the availability of mobile health (mHealth) applications is growing, implying the development and effectiveness of healthcare facilities. However, the sensitive medical information potentially intrudes into the privacy and security of users which has not been acknowledged by the user. The lack of guidance regarding privacy policy assessment causes concern with the development of privacy policy requirements based on privacy and security dimensions. This study objectives to identify the requirements of the privacy policy in mHealth applications. A narrative review has been conducted using keywords to find related open-source literature published from 2015 to 2022 from Science Direct, PMC, and PubMed databases to identify the privacy and security assessments based on the perspective of mHealth App research. A total of 17 articles were reviewed using the keywords “privacy policy” AND “privacy” AND “security” AND “mobile health”. Three major requirements were found related to privacy and security frameworks namely consistency and transparency, data management and processing, and interconnected-data arrangement. Consistency and transparency involve clear processes, data types, legal safeguards, access provisions, data sharing transparency, and data quality maintenance. Data management and processing require disclosure mechanisms, robust technical security measures, and protocols for vulnerable users. Lastly, an interconnected data arrangement should include data arrangement identification, data sharing policies, and data interconnection procedures.