{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:06:48Z","timestamp":1776110808332,"version":"3.50.1"},"reference-count":123,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100010665","name":"EU Horizon 2020 Research and Innovation Programme under the Marie Sk\u0142odowska-Curie","doi-asserted-by":"publisher","award":["754489"],"award-info":[{"award-number":["754489"]}],"id":[{"id":"10.13039\/100010665","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001602","name":"Science Foundation Ireland","doi-asserted-by":"publisher","award":["13\/RC\/2094"],"award-info":[{"award-number":["13\/RC\/2094"]}],"id":[{"id":"10.13039\/501100001602","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund through the Southern and Eastern Regional Operational Programme to Lero\u2014the Irish Software Research Centre","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2999934","type":"journal-article","created":{"date-parts":[[2020,6,4]],"date-time":"2020-06-04T20:12:38Z","timestamp":1591301558000},"page":"104247-104268","source":"Crossref","is-referenced-by-count":127,"title":["Security and Privacy of mHealth Applications: A Scoping Review"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8870-7363","authenticated-orcid":false,"given":"Leysan","family":"Nurgalieva","sequence":"first","affiliation":[]},{"given":"David","family":"O'Callaghan","sequence":"additional","affiliation":[]},{"given":"Gavin","family":"Doherty","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Robust de-anonymization of large datasets (how to break anonymity of the Netflix prize dataset)","author":"narayanan","year":"2008","journal-title":"Proc IEEE Symp Secur Privacy"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1055\/s-0038-1641197"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.24105\/ejbi.2015.11.3.3"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1111\/1468-0009.12043"},{"key":"ref31","year":"2014","journal-title":"Medical Devices X STOP Interspinous Process Decompression System (XSTOP)&#x2013;P040001"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"85","DOI":"10.18060\/25040","article-title":"Digital health privacy and age: Quality and safety improvement in long-term-care","volume":"17","author":"zuraw","year":"2020","journal-title":"Indiana Health Law Review"},{"key":"ref37","first-page":"273","article-title":"Digital health data: A comprehensive review of privacy and security risks and some recommendations","volume":"24","author":"khan","year":"2016","journal-title":"Computer Science Journal of Moldova"},{"key":"ref36","article-title":"Privacy after the agile turn","author":"gurses","year":"2017","journal-title":"SocArXiv"},{"key":"ref35","first-page":"59","article-title":"Managing digital records within South Africa&#x2019;s legislative and regulatory framework","author":"katuu","year":"2015","journal-title":"Proc 3rd Int Conf Cloud Secur Manage (ICCSM)"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1111\/bioe.12674"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-017-0535-0"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.2196\/mhealth.9217"},{"key":"ref29","volume":"29","year":"2016","journal-title":"Children&#x2019;s Online Privacy Protection Rule (&#x2018;COPPA&#x2019;)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.7861\/clinmedicine.15-6-519"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s12553-018-0216-8"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.2196\/mhealth.4149"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2015.0619"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.2196\/mhealth.9871"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.5498\/wjp.v6.i2.187"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1186\/s12916-015-0444-y"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1037\/pro0000069"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.2196\/12390"},{"key":"ref50","first-page":"258","author":"dix","year":"2003","journal-title":"Human-Computer Interaction"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-77703-0_58"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2016.50"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.jagp.2017.04.009"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.2196\/mhealth.7791"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.invent.2019.100243"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1001\/jamanetworkopen.2019.2542"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2018.10253"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58460-7_8"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44760-5_12"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.2196\/mhealth.3422"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.2196\/13882"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.2196\/formative.9954"},{"key":"ref6","first-page":"126","article-title":"Privacy risks and security threats in mHealth apps","volume":"26","author":"sampat","year":"2017","journal-title":"Int J Inf Tech Manage"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s40501-018-0154-0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.7347"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2015.1099390"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0513-6"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.l920"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1655084.1655086"},{"key":"ref45","first-page":"1","article-title":"Regulation (EU) 2016\/679 of the European parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46","volume":"59","year":"2016","journal-title":"Off J Eur Union"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2007.08.004"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSIT.2010.5564015"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2009.02.002"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.7270"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1093\/pubmed\/fdr015"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2011.11.007"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.2196\/13645"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.5314"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0154248"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1891\/1933-3196.12.1.2"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7328274"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1177\/1460458215574120"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.18553\/jmcp.2016.22.10.1124"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.2196\/mhealth.9069"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.5955"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1186\/s12937-018-0366-6"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.invent.2018.12.001"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2799522"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.9818"},{"key":"ref63","first-page":"1","article-title":"Health apps, their privacy policies and the GDPR","volume":"10","author":"mulder","year":"2019","journal-title":"European Journal of Law and Technology"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00029"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.5220\/0007352200680077"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2942420"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-24907-6_17"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1177\/1715163516680226"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-019-0827-7"},{"key":"ref69","first-page":"715","article-title":"A cross-sectional study of prominent us mobile health applications: Evaluating the current landscape","volume":"2017","author":"fougerouse","year":"2017","journal-title":"Proc AMIA Annu Symp"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-1002-x"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.2196\/11785"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/j.smhl.2018.01.003"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1007\/s40120-019-0133-4"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.07.139"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.2196\/10334"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.08.322"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23525-3_68"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.4018\/IJSI.2018010103"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.2196\/11111"},{"key":"ref91","article-title":"Simulation environment for testing security and privacy of mobile health apps","author":"mense","year":"2016","journal-title":"Proceedings of the Symposium on Modeling and Simulation in Medicine"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.2196\/mhealth.6335"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.2196\/11642"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.2196\/10211"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.2196\/formative.9922"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.2196\/11223"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2018.8585546"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1177\/1178222619829083"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.2196\/mhealth.6845"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.2196\/mhealth.9856"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.5220\/0007720002130221"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/s13142-016-0448-y"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2011.5716518"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1093\/hrlr\/ngu014"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2196\/mental.9423"},{"key":"ref13","year":"2010","journal-title":"Standards for Privacy of Individually Identifiable Health Information Final Rule 45 CFR Parts 160 and 164 Code of Federal Regulations"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-019-09499-x"},{"key":"ref15","first-page":"593","article-title":"Digital health data and information sharing: A new frontier for health care competition?","volume":"82","author":"savage","year":"2019","journal-title":"Antitrust Law J"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.601"},{"key":"ref16","year":"2020","journal-title":"EU Data Protection Rules"},{"key":"ref82","article-title":"mHealth quality: A process to seal the qualified mobile health apps","author":"yasini","year":"2016","journal-title":"Exploring Complexity in Health An Interdisciplinary Systems Approach"},{"key":"ref117","article-title":"Can you pay for privacy? consumer expectations and the behavior of free and paid apps","volume":"35","author":"bamberger","year":"2020","journal-title":"Berkeley Technol Law J"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijlp.2019.04.002"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2016.06.008"},{"key":"ref18","first-page":"659","article-title":"Designing without privacy","volume":"55","author":"waldman","year":"2018","journal-title":"Houston Law Rev"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.2196\/10016"},{"key":"ref119","article-title":"Manifesto for agile software development","author":"beck","year":"2013"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3171801"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1377\/hlthaff.2016.0578"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58706-6_36"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.2196\/11210"},{"key":"ref116","article-title":"Exploring the impact of readability of privacy policies on users&#x2019; trust","author":"ermakova","year":"2016","journal-title":"Proc Eur Conf Inf Syst"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/NICS.2018.8606901"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/618\/1\/012033"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1207\/S15327957PSPR0504_2"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1186\/s12916-018-1211-7"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1002\/mar.20660"},{"key":"ref122","article-title":"Fake review detection: Classification and analysis of real and pseudo reviews","author":"mukherjee","year":"2013"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1080\/10447311003781300"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2018.03.005"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.5863\/1551-6776-24.4.254"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1093\/tbm\/ibz074"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1136\/eb-2017-102751"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09108214.pdf?arnumber=9108214","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T01:08:39Z","timestamp":1641949719000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9108214\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":123,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2999934","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}