| Literature DB >> 25599627 |
Tobias Dehling1, Fangjian Gao, Stephan Schneider, Ali Sunyaev.
Abstract
BACKGROUND: Mobile health (mHealth) apps aim at providing seamless access to tailored health information technology and have the potential to alleviate global health burdens. Yet, they bear risks to information security and privacy because users need to reveal private, sensitive medical information to redeem certain benefits. Due to the plethora and diversity of available mHealth apps, implications for information security and privacy are unclear and complex.Entities:
Keywords: data security; health information technology; mobile apps; mobile health; patient privacy; software and application security
Year: 2015 PMID: 25599627 PMCID: PMC4319144 DOI: 10.2196/mhealth.3672
Source DB: PubMed Journal: JMIR Mhealth Uhealth ISSN: 2291-5222 Impact factor: 4.773
Cluster assessment characteristics.
| # | Name | Definition | Possible values |
| 1 | Specificity | Health specificity of information available to apps (eg, phone identifiers, eating habits, disease history) | Standard, |
| 2 | Leaks | Potential damage through leaks of information (eg, embarrassment, lessened employment prospects) | None, low, high |
| 3 | Change | Potential damage through manipulation (change) of information (eg, treatment errors) | None, low, high |
| 4 | Loss | Potential damage through loss of information (eg, loss of information important for treatment) | None, low, high |
| 5 | Value | Value of information to third parties (eg, medical identity theft, selection of employees) | None, low, high |
Figure 1Flow chart of apps selection.
Figure 2Rating count of mHealth apps by store. Number of ratings increases from left to right.
Figure 3Rating of rated mHealth apps by store.
Figure 4Boxplot of Android app rating count (log-scaled) and download count. Mean values are indicated with asterisks.
Figure 5Outline of clustering process (AT = archetype).
Cluster assessments with respect to the five information security and privacy characteristics.
|
| Clusters n (%)a
| Apps n (%)a
| |
|
|
|
| |
|
| Standardc | 88 (50.3) | 8463 (47.07) |
|
| Nonstandardd | 28 (16.0) | 4818 (26.80) |
|
| Medicale | 59 (33.7) | 4698 (26.13) |
|
|
|
| |
|
| None | 88 (50.3) | 8463 (47.07) |
|
| Low | 41 (23.4) | 5388 (29.97) |
|
| High | 46 (26.3) | 4128 (22.96) |
|
|
|
| |
|
| None | 9 (5.1) | 786 (4.37) |
|
| Low | 97 (55.4) | 11,641 (64.75) |
|
| High | 69 (39.4) | 5552 (30.88) |
|
|
|
| |
|
| None | 118 (67.4) | 10,049 (55.89) |
|
| Low | 32 (18.3) | 5832 (32.44) |
|
| High | 25 (14.3) | 2098 (11.67) |
|
|
|
| |
|
| None | 88 (50.3) | 8463 (47.07) |
|
| Low | 48 (27.4) | 6108 (33.97) |
|
| High | 39 (22.3) | 3408 (18.96) |
a Uninformative clusters are not included in percentages
b Health specificity of information available to apps
c Apps only have access to information ordinarily available to apps, for example, phone identifiers or location information
d Apps have access to information not ordinarily available to apps, but no access to medical information, for example, workout history or eating habits
e Apps have access to medical information, for example, disease history or health insurance information
f Potential damage through leaks of information, for example, embarrassment, lessened employment possibilities
g Potential damage through manipulation, change, of information, for example, treatment based on erroneous information
h Potential damage through loss of information, for example, loss of information important for treatment
i Value of information to third parties, for example, medical identity theft, selection of employees
Exemplary functionality of apps represented by the AT.
| Archetype | Descriptor | Exemplary kinds of contained apps |
| AT 1 | Casual Tools | Life improvement guides; mosquito repellents; brain fitness trainer |
| AT 2 | Common Knowledge Providers | Information provision for education; alarm clocks; fitness guides |
| AT 3 | Treatment Guides | First aid guides; home remedy guides; medication guides |
| AT 4 | Fitness Ad-Hoc Tools | Diet calculators; weight control calculators; fitness calculators |
| AT 5 | Fitness Trackers | Workout tracker; smoking cessation tools; diet tracker |
| AT 6 | Treatment Support Tools | Diabetes calculators; dosage calculators; diagnosis support tools |
| AT 7 | Intimate Ad-Hoc Tools | Fertility calculators; pregnancy calculators; physician finder |
| AT 8 | State of Health Tests | Acuity tests; color vision tests; blood alcohol calculators |
| AT 9 | Intimate Trackers | Menstruation, intercourse, fertility, and pregnancy tracker |
| AT 10 | Health Monitors | Heart rate monitors; disease counseling; tools for blood test analysis |
| AT 11 | Treatment Reminders | Medication reminder; patient interaction and communities |
| AT 12 | Health Records | Health/emergency records; disease management tools; medication tracker |
AT with respective assessments of the five information security and privacy characteristics and contained clusters and apps.
| AT | Specificitya | Leakse | Changef | Lossg | Valueh | Clusters n (%)i
| Apps n (%)i
|
| 1 | Standardb | None | None | None | None | 9 (5.1) | 786 (4.37) |
| 2 | Standard | None | Low | None | None | 58 (33.1) | 5603 (31.16) |
| 3 | Standard | None | High | None | None | 21 (12.0) | 2074 (11.54) |
| 4 | Nonstandardc | Low | Low | None | Low | 7 (4.0) | 216 (1.20) |
| 5 | Nonstandard | Low | Low | Low | Low | 21 (12.0) | 4602 (25.60) |
| 6 | Medicald | Low | High | None | Low | 13 (7.4) | 570 (3.17) |
| 7 | Medical | High | Low | None | Low | 3 (1.7) | 60 (0.33) |
| 8 | Medical | High | Low | None | High | 4 (2.3) | 500 (2.78) |
| 9 | Medical | High | Low | Low | Low | 4 (2.3) | 660 (3.67) |
| 10 | Medical | High | High | None | High | 3 (1.7) | 240 (1.33) |
| 11 | Medical | High | High | Low | High | 7 (4.0) | 570 (3.17) |
| 12 | Medical | High | High | High | High | 25 (14.3) | 2098 (11.67) |
a Health specificity of information available to apps
b Apps only have access to information ordinarily available to apps, for example, phone identifiers or location information
c Apps have access to information not ordinarily available to apps, but no access to medical information, for example, workout history or eating habits
d Apps have access to medical information, for example, disease history or health insurance information
e Potential damage through leaks of information, for example, embarrassment, lessened employment possibilities
f Potential damage through manipulation, change, of information, for example, treatment based on erroneous information
g Potential damage through loss of information, for example, loss of information important for treatment
h Value of information to third parties, for example, medical identity theft, selection of employees
i Uninformative clusters are not included in percentages