Privacy and Security in Mobile Health (mHealth) Research

Research on the use of mobile technologies for alcohol use problems is a developing field. Rapid technological advances in mobile health (or mHealth) research generate both opportunities and challenges, including how to create scalable systems capable of collecting unprecedented amounts of data and conducting interventions—some in real time—while at the same time protecting the privacy and safety of research participants. Although the research literature in this area is sparse, lessons can be borrowed from other communities, such as cybersecurity or Internet security, which offer many techniques to reduce the potential risk of data breaches or tampering in mHealth. More research into measures to minimize risk to privacy and security effectively in mHealth is needed. Even so, progress in mHealth research should not stop while the field waits for perfect solutions.

[1]  A. Zomaya,et al.  A security framework for wireless sensor networks , 2006, Proceedings of the 2006 IEEE Sensors Applications Symposium, 2006..

[2]  D. Luxton,et al.  mHealth data security: the need for HIPAA-compliant standardization. , 2012, Telemedicine journal and e-health : the official journal of the American Telemedicine Association.

[3]  Deborah Estrin,et al.  Small data, where n = me , 2014, Commun. ACM.

[4]  J. P. Porter The federal policy for the protection of human subjects. , 1991, IRB.

[5]  Budi Arief,et al.  Computer security impaired by legitimate users , 2004, Comput. Secur..

[6]  Matthew C. Mishkind,et al.  Legal, Regulatory, and Risk Management Issues in the Use of Technology to Deliver Mental Health Care , 2015 .

[7]  Minho Shin,et al.  Adapt-lite: privacy-aware, secure, and efficient mhealth sensing , 2011, WPES '11.

[8]  Minho Shin,et al.  Adaptive Security and Privacy for mHealth Sensing , 2011, HealthSec.

[9]  Katie Shilton,et al.  Participatory personal data: An emerging research challenge for the information sciences , 2012, J. Assoc. Inf. Sci. Technol..

[10]  Su Li,et al.  Mobile Phones and Privacy , 2012 .

[11]  Nilmini Wickramasinghe,et al.  CCmH: The cloud computing paradigm for mobile health (mHealth) , 2013, SOCO 2013.

[12]  Bernd Blobel,et al.  Trust-based information system architecture for personal wellness , 2014, MIE.

[13]  L K Morgan,et al.  Alcohol research. , 1988, Advances in alcohol & substance abuse.

[14]  D. Levicky,et al.  Multimodal biometric authentication using speech and hand geometry fusion , 2008, 2008 15th International Conference on Systems, Signals and Image Processing.

[15]  Eva Henriksen,et al.  Privacy and information security risks in a technology platform for home-based chronic disease rehabilitation and education , 2013, BMC Medical Informatics and Decision Making.

[16]  K. Griffiths,et al.  Security Considerations for E-Mental Health Interventions , 2010, Journal of medical Internet research.

[17]  Cognitive Board on Behavioral Federal Policy for the Protection of Human Subjects (“Common Rule”) , 2014 .

[18]  Minho Shin,et al.  An amulet for trustworthy wearable mHealth , 2012, HotMobile '12.