Unaddressed privacy risks in accredited health and wellness apps: a cross-sectional systematic assessment

[1]  Mobile Health and Fitness Apps: What Are the Privacy Risks? , 2017 .

[2]  Ali Sunyaev,et al.  Availability and quality of mobile health app privacy policies , 2015, J. Am. Medical Informatics Assoc..

[3]  Tobias Dehling,et al.  Exploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Apps on iOS and Android , 2015, JMIR mHealth and uHealth.

[4]  Samir Chatterjee,et al.  A Taxonomy of mHealth Apps -- Security and Privacy Concerns , 2015, 2015 48th Hawaii International Conference on System Sciences.

[5]  Klara Nahrstedt,et al.  Security Concerns in Android mHealth Apps , 2014, AMIA.

[6]  Aaron S Kesselheim,et al.  FDA regulation of mobile health technologies. , 2014, The New England journal of medicine.

[7]  Irina Shklovski,et al.  Leakiness and creepiness in app space: perceptions of privacy and mobile app use , 2014, CHI.

[8]  Josip Car,et al.  Implementation of mobile health tools. , 2014, JAMA.

[9]  Gregory N. Connolly,et al.  Concern about security and privacy, and perceived control over collection and use of health information are related to withholding of health information from healthcare providers , 2014, J. Am. Medical Informatics Assoc..

[10]  R. Silverman,et al.  Mobile health applications: the patchwork of legal and liability issues suggests strategies to improve oversight. , 2014, Health affairs.

[11]  Deven McGraw,et al.  For telehealth to succeed, privacy and security risks must be identified and addressed. , 2014, Health affairs.

[12]  Samee Ullah Khan,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 , 2008 .

[13]  Isabel de la Torre Díez,et al.  Privacy and Security in Mobile Health Apps: A Review and Recommendations , 2014, Journal of Medical Systems.

[14]  Deborah Richards,et al.  Security and Privacy Issues Related to the Use of Mobile Health Apps , 2014 .

[15]  Eric J Topol,et al.  Can mobile health technologies transform health care? , 2013, JAMA.

[16]  Jennifer King How Come I'm Allowing Strangers to Go Through My Phone? Smartphones and Privacy Expectations. , 2012 .

[17]  Wanda Pratt,et al.  Healthcare in the pocket: Mapping the space of mobile-phone health interventions , 2012, J. Biomed. Informatics.

[18]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[19]  David Kotz,et al.  A threat taxonomy for mHealth privacy , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).

[20]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[21]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[22]  Franco Callegati,et al.  Man-in-the-Middle Attack to the HTTPS Protocol , 2009, IEEE Security & Privacy Magazine.

[23]  Robert LaRose,et al.  Your privacy is assured - of being disturbed: websites with and without privacy seals , 2006, New Media Soc..

[24]  V. Marín,et al.  Servicio de Farmacia de un Hospital acreditado por la Agencia de Calidad Sanitaria de Andalucía , 2005 .

[25]  P Gossman,et al.  All change for research , 1987, British medical journal.