{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,27]],"date-time":"2025-04-27T01:02:29Z","timestamp":1745715749302,"version":"3.37.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030316341"},{"type":"electronic","value":"9783030316358"}],"license":[{"start":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T00:00:00Z","timestamp":1569369600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-31635-8_168","type":"book-chapter","created":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T13:05:22Z","timestamp":1569330322000},"page":"1377-1384","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["How Secure Is Your Mobile Health?"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0953-9411","authenticated-orcid":false,"given":"Ana","family":"Ferreira","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7755-5002","authenticated-orcid":false,"given":"Rute","family":"Almeida","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4186-6033","authenticated-orcid":false,"given":"Joana","family":"Muchagata","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,25]]},"reference":[{"key":"168_CR1","doi-asserted-by":"crossref","unstructured":"Mirkovic, J., Bryhni, H., Ruland, C.M.: Secure solution for mobile access to patient\u2019s health care record. In: 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services, pp. 296\u2013303 (2011)","DOI":"10.1109\/HEALTH.2011.6026769"},{"issue":"5","key":"168_CR2","first-page":"356","volume":"39","author":"CL Ventola","year":"2014","unstructured":"Ventola, C.L.: Mobile devices and apps for health care professionals: uses and benefits. Pharm. Ther. 39(5), 356 (2014)","journal-title":"Pharm. Ther."},{"key":"168_CR3","doi-asserted-by":"crossref","unstructured":"Plachkinova, M., Andr\u00e9s, S., Chatterjee, S.: A taxonomy of mHealth apps - security and privacy concerns. In: 48th Hawaii International Conference on System Sciences, pp. 3187\u20133196 (2015)","DOI":"10.1109\/HICSS.2015.385"},{"key":"168_CR4","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1037\/a0024485","volume":"42","author":"DD Luxton","year":"2011","unstructured":"Luxton, D.D., McCann, R.A., Bush, N.E., Mishkind, M.C., Reger, G.M.: mHealth for mental health: integrating smartphone technology in behavioral healthcare. Prof. Psychol. Res. Pract. 42, 505\u2013512 (2011)","journal-title":"Prof. Psychol. Res. Pract."},{"key":"168_CR5","doi-asserted-by":"crossref","unstructured":"Ferreira, A., Lenzini, G., Santos-Pereira, C., Augusto, A.B., Correia, M.E.: Envisioning secure and usable access control for patients. In: 2014 IEEE 3rd International Conference on Serious Games and Applications for Health (SeGAH), pp. 1\u20138 (2014)","DOI":"10.1109\/SeGAH.2014.7067093"},{"key":"168_CR6","first-page":"SR17","volume":"10","author":"C Pyper","year":"2004","unstructured":"Pyper, C., Amery, J., Watson, M., Crook, C.: Access to electronic health records in primary care-a survey of patients\u2019 views. Med. Sci. Monit. Int. Med. J. Exp. Clin. Res. 10, SR17\u2013SR22 (2004)","journal-title":"Med. Sci. Monit. Int. Med. J. Exp. Clin. Res."},{"key":"168_CR7","doi-asserted-by":"crossref","unstructured":"Ferreira, A., Chadwick, D., Farinha, P., Correia, R., Zao, G., Chilro, R., Antunes, L.: How to securely break into RBAC: the BTG-RBAC model. In: 2009 Annual Computer Security Applications Conference, pp. 23\u201331 (2009)","DOI":"10.1109\/ACSAC.2009.12"},{"key":"168_CR8","doi-asserted-by":"crossref","unstructured":"Parati, G., Torlasco, C., Omboni, S., Pellegrini, D.: Smartphone applications for hypertension management: a potential game-changer that needs more control (2017)","DOI":"10.1007\/s11906-017-0743-0"},{"key":"168_CR9","doi-asserted-by":"crossref","unstructured":"Muchagata, J., Ferreira, A.: Visual schedule: a mobile application for autistic children - preliminary study. In: 21st International Conference on Enterprise Information Systems, pp. 452\u2013459 (2019)","DOI":"10.5220\/0007732804520459"},{"key":"168_CR10","doi-asserted-by":"publisher","first-page":"e10414","DOI":"10.2196\/10414","volume":"6","author":"RS Larson","year":"2018","unstructured":"Larson, R.S.: A path to better-quality mHealth apps. JMIR Mhealth Uhealth 6, e10414 (2018)","journal-title":"JMIR Mhealth Uhealth"},{"key":"168_CR11","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.anai.2016.01.012","volume":"117","author":"VE Cook","year":"2016","unstructured":"Cook, V.E., Ellis, A.K., Hildebrand, K.J.: Mobile health applications in clinical practice: pearls, pitfalls, and key considerations. Ann. Allergy Asthma Immunol. 117, 143\u2013149 (2016)","journal-title":"Ann. Allergy Asthma Immunol."},{"key":"168_CR12","doi-asserted-by":"publisher","first-page":"9390","DOI":"10.1109\/ACCESS.2018.2799522","volume":"6","author":"A Papageorgiou","year":"2018","unstructured":"Papageorgiou, A., Strigkos, M., Politou, E., Alepis, E., Solanas, A., Patsakis, C.: Security and privacy analysis of mobile health applications: the alarming state of practice. IEEE Access 6, 9390\u20139403 (2018)","journal-title":"IEEE Access"},{"key":"168_CR13","unstructured":"European Union: Regulation (EU) 2016\/679 of the European Parliament and of the Council L 119. Official Journal of the European Union (2016)"},{"key":"168_CR14","first-page":"126","volume":"26","author":"BH Sampat","year":"2017","unstructured":"Sampat, B.H., Prabhakar, B.: Privacy risks and security threats in mHealth apps. J. Int. Technol. Inf. Manage. 26, 126\u2013153 (2017)","journal-title":"J. Int. Technol. Inf. Manage."},{"key":"168_CR15","unstructured":"Maymi, F., Harris, S.: CISSP all-in-one exam guide (2016)"},{"key":"168_CR16","unstructured":"Shugalo, I. \n                    https:\/\/thedoctorweighsin.com\/mhealth-apps-security-privacy\n                    \n                  . Accessed March 2019"},{"key":"168_CR17","unstructured":"He, D., Naveed, M., Gunter, C.A., Nahrstedt, K.: Security concerns in Android mHealth apps. In: AMIA \u2026 Annual Symposium Proceedings. AMIA Symposium 2014, pp. 645\u2013654 (2014)"},{"key":"168_CR18","doi-asserted-by":"crossref","unstructured":"Muchagata, J., Ferreira, A.: How can visualization affect security? In: ICEIS 2018 - 20th International Conference on Enterprise Information Systems. SCITEPRESS Digital Library, Poster Presentation in Funchal, Madeira \u2013 Portugal, vol. 2, pp. 503\u2013510 (2018)","DOI":"10.5220\/0006695505030510"},{"key":"168_CR19","doi-asserted-by":"crossref","unstructured":"Moura, P., Fazendeiro, P., Vieira-Marques, P., Ferreira, A.: SoTRAACE \u2013 socio-technical risk-adaptable access control model. In: 2017 International Carnahan Conference on Security Technology (ICCST), Madrid, pp. 1\u20136 (2017)","DOI":"10.1109\/CCST.2017.8167835"}],"container-title":["IFMBE Proceedings","XV Mediterranean Conference on Medical and Biological Engineering and Computing \u2013 MEDICON 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-31635-8_168","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T13:11:52Z","timestamp":1569330712000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-31635-8_168"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,25]]},"ISBN":["9783030316341","9783030316358"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-31635-8_168","relation":{},"ISSN":["1680-0737","1433-9277"],"issn-type":[{"type":"print","value":"1680-0737"},{"type":"electronic","value":"1433-9277"}],"subject":[],"published":{"date-parts":[[2019,9,25]]},"assertion":[{"value":"25 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MEDICON","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mediterranean Conference on Medical and Biological Engineering and Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Coimbra","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"medicon2019a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.medicon2019.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}