{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T07:07:33Z","timestamp":1775891253873,"version":"3.50.1"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319777023","type":"print"},{"value":"9783319777030","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-77703-0_58","type":"book-chapter","created":{"date-parts":[[2018,3,24]],"date-time":"2018-03-24T07:53:05Z","timestamp":1521877985000},"page":"587-598","source":"Crossref","is-referenced-by-count":16,"title":["A Vulnerability Study of Mhealth Chronic Disease Management (CDM) Applications (apps)"],"prefix":"10.1007","author":[{"given":"Tolulope","family":"Mabo","sequence":"first","affiliation":[]},{"given":"Bobby","family":"Swar","sequence":"additional","affiliation":[]},{"given":"Shaun","family":"Aghili","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"58_CR1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-163","volume-title":"Vetting the Security of Mobile Applications","author":"S Quirolgico","year":"2015","unstructured":"Quirolgico, S., Voas, J., Karygiannis, T., Michael, C., Scarfone, K.: Vetting the Security of Mobile Applications. National Institutes of Standards and Technology, Gaithersburg (2015)"},{"key":"58_CR2","unstructured":"Scher, D.L.: The Big Problem with Mobile Health Apps, 04 March 2015. medscape, http:\/\/www.medscape.com\/viewarticle\/840335_1"},{"key":"58_CR3","unstructured":"NIST: Security Assurance; does anybody care. NIST (1998). http:\/\/csrc.nist.gov\/nissc\/1998\/proceedings\/panelA7.pdf . Accessed 19 June 2017"},{"issue":"3","key":"58_CR4","doi-asserted-by":"publisher","first-page":"e229","DOI":"10.5210\/ojphi.v513.4814","volume":"5","author":"KN Maged","year":"2014","unstructured":"Maged, K.N., Brewer, A.C., Karimkhani, C., Buller, D.B., Dellavalle, R.P.: Mobile medical and health apps: state of the art, concerns, regulatory control and certification. Online J. Pub. Health Inform. 5(3), e229 (2014). https:\/\/doi.org\/10.5210\/ojphi.v513.4814","journal-title":"Online J. Pub. Health Inform."},{"key":"58_CR5","unstructured":"Stringfellow, A.: Top smartphone health apps, 3 January 2017. tccrocks, https:\/\/www.tccrocks.com\/blog\/top-smartphone-health-apps\/#MedicalApps"},{"key":"58_CR6","unstructured":"Lopez, N., Seville, P.: Managing Chronic Disease with #mhealth, 26 August 2014. HIMSS transforming health through IT, http:\/\/www.himss.org\/managing-chronic-disease-mhealth . Accessed 28 May 2017"},{"key":"58_CR7","unstructured":"Manisha, K.: 40 mhealth statistics to blow your mind, 22 November 2016. Kays harbour technologies, http:\/\/kaysharbor.com\/blog\/healthcare\/40-amazing-mhealth-statistics-to-blow-your-mind . Accessed 05 June 2017"},{"key":"58_CR8","unstructured":"Landro, L.: How apps can help manage chronic disease, 25 June 2017. The Wall Street Journal, https:\/\/www.wsj.com\/articles\/how-apps-can-help-manage-chronic-diseases-1498443120 . Accessed 27 Sept 2017"},{"key":"58_CR9","unstructured":"Statista: Mobile health revenue worldwide in 2017, by service category (in billion U.S. dollars) (2017). https:\/\/www.statista.com\/statistics\/219266\/global-mobile-health-revenue-forecast-by-service-category\/"},{"key":"58_CR10","unstructured":"Office for Civil Rights: HIPAA for Professionals, 13 February 2017. HHS, https:\/\/www.hhs.gov\/hipaa\/for-professionals\/index.html . Accessed 28 May 2017"},{"key":"58_CR11","doi-asserted-by":"publisher","unstructured":"Adesina, A., Agbele, K., Februarie, R., Abidoye, A., Nyongesa, H.: Ensuring the security and privacy of information in mobile health-care communication systems. S. Afr. J. Sci. 109(9\/10) (2011). https:\/\/doi.org\/10.4102\/sajs.v107i9\/10.508","DOI":"10.4102\/sajs.v107i9\/10.508"},{"issue":"5","key":"58_CR12","doi-asserted-by":"publisher","first-page":"e129","DOI":"10.2196\/jmir.1989","volume":"14","author":"Robyn Whittaker","year":"2012","unstructured":"Whittaker, R.: Issues in mHealth: findings from key informant interviews. Med. Internet Res. 14(5) (2012). https:\/\/doi.org\/10.2196\/jmir.1989","journal-title":"Journal of Medical Internet Research"},{"key":"58_CR13","doi-asserted-by":"crossref","unstructured":"Boulos, M., Wheeler, S., Tavares, C., Jones, R.: How smartphones are changing the face of mobile and participatory healthcare: an overview, with example from eCAALYX. BioMedCentral (2011)","DOI":"10.1186\/1475-925X-10-24"},{"issue":"1","key":"58_CR14","first-page":"143","volume":"36","author":"S Arora","year":"2014","unstructured":"Arora, S., Yttri, J., Nilsen, W.: Privacy and security in mobile health (mHealth) research. Alcohol Res. 36(1), 143\u2013151 (2014)","journal-title":"Alcohol Res."},{"key":"58_CR15","first-page":"645","volume":"2014","author":"H Dongjing","year":"2014","unstructured":"Dongjing, H., Naveed, M.N., Gunter, C.A., Nahrstedt, K.: Security concerns in android mHealth apps. PMC 2014, 645\u2013654 (2014)","journal-title":"PMC"},{"key":"58_CR16","unstructured":"Tan, S.: 8 Apps That Make Condition Management Easier, 7 July 2015. everyday health, https:\/\/www.everydayhealth.com\/news\/8-apps-make-condition-management-easier\/ . Accessed 9 Sept 2017"},{"key":"58_CR17","unstructured":"Sarah: Best apps for chronic disease management, 15 June 2015. Infusion express, http:\/\/ivxpress-vm.cloudapp.net\/best-apps-for-chronic-disease-management\/ . Accessed 9 Sept 2017"},{"key":"58_CR18","unstructured":"Chandan, K.: Mobile app security scanner, 26 December 2016. geekflare, https:\/\/geekflare.com\/mobile-app-security-scanner\/"},{"key":"58_CR19","unstructured":"Bansal, V., Henein, N., Hogben, G., Nohl, K., Mannino, J., Papathanasiou, C., Rueping, S., Woods, B.: Smartphones secure development guidelines for app developers. ENSA (2011)"}],"container-title":["Advances in Intelligent Systems and Computing","Trends and Advances in Information Systems and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-77703-0_58","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,13]],"date-time":"2019-10-13T07:27:58Z","timestamp":1570951678000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-77703-0_58"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319777023","9783319777030"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-77703-0_58","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}