| Literature DB >> 26259009 |
Shifali Arora1, Jennifer Yttri1, Wendy Nilse2.
Abstract
Research on the use of mobile technologies for alcohol use problems is a developing field. Rapid technological advances in mobile health (or mHealth) research generate both opportunities and challenges, including how to create scalable systems capable of collecting unprecedented amounts of data and conducting interventions-some in real time-while at the same time protecting the privacy and safety of research participants. Although the research literature in this area is sparse, lessons can be borrowed from other communities, such as cybersecurity or Internet security, which offer many techniques to reduce the potential risk of data breaches or tampering in mHealth. More research into measures to minimize risk to privacy and security effectively in mHealth is needed. Even so, progress in mHealth research should not stop while the field waits for perfect solutions.Entities:
Mesh:
Year: 2014 PMID: 26259009 PMCID: PMC4432854
Source DB: PubMed Journal: Alcohol Res ISSN: 2168-3492
Addressing confidentiality, privacy, and security challenges in mHealth. Many risks may occur in design and use of mHealth. Solutions that are cost-effective and can be implemented without interfering with research are recommended to mitigate these risks. These solutions are commonly used in Internet/eHealth, telemedicine, and cybersecurity research.
| Risk | Solution |
|---|---|
| Share data in aggregate | |
| Use consent to educate participants about what data are being collected and what can be inferred from such data | |
| Enable password, pin, or passphrase on phones before distribution | |
| Use WPA2 and 128-bit key encryption | |
| Use non-sensitive messages to contact participants | |
| Store critical data in two locations to ensure availability | |
| Have a second system to collect the same data, such as in-person visits or surveys, to verify mobile data integrity and quality | |
| Have adjustable security settings for trusted and untrusted locations | |
| Use two-factor authentication, such as with a pin/password and a token/smart card/dongle | |
| Include audits in security protocols, potentially with the help of a “red team”; risk assessment should be done at each stage of implementation |