Exploring the usability, security and privacy taxonomy for mobile health applications

The increase use of smartphones in healthcare industry leads to situations of users sharing their personal healthcare information in several types of applications. The massive number of mobile health (mHealth) applications becomes a serious problem for users, as they are unaware of how to manage and use their data. In this study, usability, security and privacy in mobile health applications are explored and identified by studying and evaluating mHealth applications available in the market. We design and propose a taxonomy intended to assist the developers in developing healthcare applications with usability, security and privacy dimensions in mind. This paper describes an on-going work for developing the taxonomy and describes how we plan to measure the proposed taxonomy.

[1]  B. Schneirdeman,et al.  Designing the User Interface: Strategies for Effective Human-Computer Interaction , 1998 .

[2]  David Kotz,et al.  A threat taxonomy for mHealth privacy , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).

[3]  Alain Abran,et al.  The state of the art of mobile application usability evaluation , 2012, 2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).

[4]  Qing Zhu,et al.  Status and trends of mobile-health applications for iOS devices: A developer's perspective , 2011, J. Syst. Softw..

[5]  Stuart McGil,et al.  Low Back Disorders , 2007 .

[6]  Derek Flood,et al.  Usability of mobile applications: literature review and rationale for a new usability model , 2013, Journal of Interaction Science.

[7]  N. Ahuja,et al.  The Smartphone in Medicine: A Review of Current and Potential Use Among Physicians and Students , 2012, Journal of medical Internet research.

[8]  Begoña García Zapirain,et al.  Security Recommendations for mHealth Apps: Elaboration of a Developer’s Guide , 2016, Journal of Medical Systems.

[9]  J. Car,et al.  Mobile phone messaging for preventive health care. , 2012, The Cochrane database of systematic reviews.

[10]  Deborah Richards,et al.  Security and Privacy Issues Related to the Use of Mobile Health Apps , 2014 .

[11]  Samir Chatterjee,et al.  A Taxonomy of mHealth Apps -- Security and Privacy Concerns , 2015, 2015 48th Hawaii International Conference on System Sciences.

[12]  T. L. Lewis,et al.  How to identify, assess and utilise mobile medical applications in clinical practice , 2014, International journal of clinical practice.

[13]  Phillip Olla,et al.  mHealth taxonomy: a literature survey of mobile health applications , 2015 .

[14]  Rozilawati Razali,et al.  Usability Dimensions for Mobile Applications-A Review , 2013 .

[15]  Ivan Flechais,et al.  Designing Secure and Usable Systems , 2005 .

[16]  Ergonomic requirements for office work with visual display terminals ( VDTs ) — Part 11 : Guidance on usability , 1998 .

[17]  Jan Bosch,et al.  Architecting for usability: a survey , 2004, J. Syst. Softw..

[18]  M. Modarreszadeh,et al.  Wireless, 32-channel, EEG and epilepsy monitoring system , 1997, Proceedings of the 19th Annual International Conference of the IEEE Engineering in Medicine and Biology Society. 'Magnificent Milestones and Emerging Opportunities in Medical Engineering' (Cat. No.97CH36136).

[19]  Peter Werth,et al.  LOW BACK DISORDERS , 2003, Australasian Chiropractic & Osteopathy.

[20]  Elisa Bertino,et al.  Database security - concepts, approaches, and challenges , 2005, IEEE Transactions on Dependable and Secure Computing.

[21]  Steve Hanna,et al.  A survey of mobile malware in the wild , 2011, SPSM '11.

[22]  Borja Martínez-Pérez,et al.  Mobile Health Applications for the Most Prevalent Conditions by the World Health Organization: Review and Analysis , 2013, Journal of medical Internet research.

[23]  William Brown,et al.  Assessment of the Health IT Usability Evaluation Model (Health-ITUEM) for evaluating mobile health (mHealth) technology , 2013, J. Biomed. Informatics.

[24]  David Kotz,et al.  Understanding sharing preferences and behavior for mHealth devices , 2012, WPES '12.

[25]  P. Schulz,et al.  Mapping mHealth Research: A Decade of Evolution , 2013, Journal of medical Internet research.

[26]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[27]  Sherali Zeadally,et al.  Analysis of Security Protocols for Mobile Healthcare , 2016, Journal of Medical Systems.

[28]  Reza Safdari,et al.  Patient Monitoring in Mobile Health: Opportunities and Challenges , 2014, Medical archives.

[29]  Maro Vlachopoulou,et al.  A recommended guideline for the development of mHealth Apps. , 2016, mHealth.

[30]  David Kotz,et al.  Privacy in mobile technology for personal healthcare , 2012, CSUR.

[31]  Majed Alshamari,et al.  A Review of Gaps between Usability and Security/Privacy , 2016 .

[32]  David G. Novick,et al.  Universal usability , 2002, Interact. Comput..

[33]  Guy Albert Dumont,et al.  Development of mHealth Applications for Pre-Eclampsia Triage , 2014, IEEE Journal of Biomedical and Health Informatics.

[34]  Bernd Blobel,et al.  Mobile Health Requires Mobile Security: Challenges, Solutions, and Standardization , 2008, MIE.

[35]  Illhoi Yoo,et al.  A Systematic Review of Healthcare Applications for Smartphones , 2012, BMC Medical Informatics and Decision Making.

[36]  Fadi A. Aloul,et al.  Security of mobile health (mHealth) systems , 2015, 2015 IEEE 15th International Conference on Bioinformatics and Bioengineering (BIBE).

[37]  Heather Hedden The Accidental Taxonomist , 2010 .

[38]  A. Bastawrous,et al.  Mobile health use in low- and high-income countries: an overview of the peer-reviewed literature , 2013, Journal of the Royal Society of Medicine.