Security and privacy policy assessment in mobile health applications: a literature review
Currently, the availability of mobile health (mHealth) applications is growing, implying the development and effectiveness of healthcare facilities. However, the sensitive medical information potentially intrudes into the privacy and security of users which has not been acknowledged by the user. The...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English English |
Published: |
Success Culture Press
2024
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/112677/2/112677_Security%20and%20privacy%20policy%20assessment_SCOPUS.pdf http://irep.iium.edu.my/112677/3/112677_Security%20and%20privacy%20policy%20assessment.pdf http://irep.iium.edu.my/112677/ https://www.aasmr.org/jsms/Vol14/No.2/Vol.14.No.2.22.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Currently, the availability of mobile health (mHealth) applications is growing, implying the development and effectiveness of healthcare facilities. However, the sensitive medical information potentially intrudes into the privacy and security of users which has not been acknowledged by the user. The lack of guidance regarding privacy policy assessment causes concern with the development of privacy policy requirements based on privacy and security dimensions. This study objectives to identify the requirements of the privacy policy in mHealth applications. A narrative review has been conducted using keywords to find related open-source literature published from 2015 to 2022 from Science Direct, PMC, and PubMed databases to identify the privacy and security assessments based on the perspective of mHealth App research. A total of 17 articles were reviewed using the keywords “privacy policy” AND “privacy” AND “security” AND “mobile health”. Three major requirements were found related to privacy and security frameworks namely consistency and transparency, data management and processing, and interconnected-data arrangement. Consistency and transparency involve clear processes, data types, legal safeguards, access provisions, data sharing transparency, and data quality maintenance. Data management and processing require disclosure mechanisms, robust technical security measures, and protocols for vulnerable users. Lastly, an interconnected data arrangement should include data arrangement identification, data sharing policies, and data interconnection procedures. |
---|