IIUM Repository

Security and privacy policy assessment in mobile health applications: a literature review

Hakiem, Nashrul and Afrizal, Sandra Hakiem and Setiadi, Yudi and Albab, Hadid Syaifullah and Riasetiawan, Mardhani and Zulhuda, Sonny (2024) Security and privacy policy assessment in mobile health applications: a literature review. Journal of System and Management Sciences, 14 (2). pp. 355-371. ISSN 1816-6075 E-ISSN 1818-0523

[img]
Preview
PDF (SCOPUS) - Supplemental Material
Download (206kB) | Preview
[img] PDF (Article) - Published Version
Restricted to Repository staff only

Download (429kB) | Request a copy

Abstract

Currently, the availability of mobile health (mHealth) applications is growing, implying the development and effectiveness of healthcare facilities. However, the sensitive medical information potentially intrudes into the privacy and security of users which has not been acknowledged by the user. The lack of guidance regarding privacy policy assessment causes concern with the development of privacy policy requirements based on privacy and security dimensions. This study objectives to identify the requirements of the privacy policy in mHealth applications. A narrative review has been conducted using keywords to find related open-source literature published from 2015 to 2022 from Science Direct, PMC, and PubMed databases to identify the privacy and security assessments based on the perspective of mHealth App research. A total of 17 articles were reviewed using the keywords “privacy policy” AND “privacy” AND “security” AND “mobile health”. Three major requirements were found related to privacy and security frameworks namely consistency and transparency, data management and processing, and interconnected-data arrangement. Consistency and transparency involve clear processes, data types, legal safeguards, access provisions, data sharing transparency, and data quality maintenance. Data management and processing require disclosure mechanisms, robust technical security measures, and protocols for vulnerable users. Lastly, an interconnected data arrangement should include data arrangement identification, data sharing policies, and data interconnection procedures.

Item Type: Article (Journal)
Uncontrolled Keywords: privacy policy, privacy and security assessment, mobile health Apps, digital health
Subjects: K Law > K Law (General)
K Law > K3150 Public law
K Law > K3400 Administrative Law
Q Science > Q Science (General) > Q300 Cybernetics > Q350 Information theory
R Medicine > RA Public aspects of medicine
T Technology > T Technology (General) > T55.4 Industrial engineering.Management engineering. > T58.6 Management information systems
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Ahmad Ibrahim Kulliyyah of Laws
Ahmad Ibrahim Kulliyyah of Laws > Department of Civil Law
Depositing User: Dr Sonny Zulhuda
Date Deposited: 19 Jun 2024 11:00
Last Modified: 19 Jun 2024 12:43
URI: http://irep.iium.edu.my/id/eprint/112677

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year