{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T01:10:08Z","timestamp":1773882608289,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,2]],"date-time":"2019-12-02T00:00:00Z","timestamp":1575244800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Virginia Military Institute"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,2]]},"DOI":"10.1145\/3366030.3366106","type":"proceedings-article","created":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T12:18:47Z","timestamp":1582373927000},"page":"627-630","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Security Issues in Mobile Healthcare Applications"],"prefix":"10.1145","author":[{"given":"Alexander","family":"Feldner","sequence":"first","affiliation":[{"name":"Computer and Information Sciences, Virginia Military Institute, Lexington, VA, United States"}]},{"given":"Youna","family":"Jung","sequence":"additional","affiliation":[{"name":"Computer and Information Sciences, Virginia Military Institute, Lexington, VA, United States"}]}],"member":"320","published-online":{"date-parts":[[2020,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"P.R. Sama etal 2014. An evaluation of mobile health application tools. JMIR mHealth and uHealth 2(2):e19.  P.R. Sama et al. 2014. An evaluation of mobile health application tools. JMIR mHealth and uHealth 2(2):e19.","DOI":"10.2196\/mhealth.3088"},{"key":"e_1_3_2_1_2_1","unstructured":"B. Meg. 2019. Most Health Apps Share Data with Third Fourth Parties BMJ Analysis Warns. Healthcare Dive www.healthcaredive.com\/news\/most-health-apps-share-data-with-third-fourth-parties-bmj-analysis-warns\/550984\/.  B. Meg. 2019. Most Health Apps Share Data with Third Fourth Parties BMJ Analysis Warns. Healthcare Dive www.healthcaredive.com\/news\/most-health-apps-share-data-with-third-fourth-parties-bmj-analysis-warns\/550984\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1136\/amiajnl-2013-002605"},{"key":"e_1_3_2_1_4_1","unstructured":"V. Altmann and M. Gries. 20147. Factors influencing the usage intention of mHealth apps: An Empirical Study on the example of Sweden. Karlstad University. http:\/\/www.diva-portal.org\/smash\/get\/diva2:1118765\/FULLTEXT01.pdf.  V. Altmann and M. Gries. 20147. Factors influencing the usage intention of mHealth apps: An Empirical Study on the example of Sweden. Karlstad University. http:\/\/www.diva-portal.org\/smash\/get\/diva2:1118765\/FULLTEXT01.pdf."},{"key":"e_1_3_2_1_5_1","unstructured":"HHS Office of the Secretary US Department of Health and Human Services. 2013. Summary of the HIPAA Privacy Rule. www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html.  HHS Office of the Secretary US Department of Health and Human Services. 2013. Summary of the HIPAA Privacy Rule. www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/234313.234412"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-014-0181-3"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"R. Housley W. Ford W. Polk and D. Solo. 1999. Internet X.509 Public Key Infrastructure Certificate and CRL Profile (RFC 2459).  R. Housley W. Ford W. Polk and D. Solo. 1999. Internet X.509 Public Key Infrastructure Certificate and CRL Profile (RFC 2459).","DOI":"10.17487\/rfc2459"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2012.05.019"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, 465--473","author":"N."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"T. Dierks and E. Rescorla 2008. The Transport Layer Security (TLS) Protocol Version 1.2 (IETF RFC 5246) http:\/\/www.ietf.org\/rfc\/rfc5246.txt.  T. Dierks and E. Rescorla 2008. The Transport Layer Security (TLS) Protocol Version 1.2 (IETF RFC 5246) http:\/\/www.ietf.org\/rfc\/rfc5246.txt.","DOI":"10.17487\/rfc5246"},{"key":"e_1_3_2_1_12_1","unstructured":"William Stallings (Ed.). 2006. Cryptography and Network Security (4th ed.). Pearson Education India.  William Stallings (Ed.). 2006. Cryptography and Network Security (4th ed.). Pearson Education India."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"M. La Polla F. Martinelli and D. Sgandurra. 2012. A survey on security for mobile devices. IEEE communications surveys & tutorials. 15(1) 446--471.  M. La Polla F. Martinelli and D. Sgandurra. 2012. A survey on security for mobile devices. IEEE communications surveys & tutorials. 15(1) 446--471.","DOI":"10.1109\/SURV.2012.013012.00028"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"issue":"1","key":"e_1_3_2_1_15_1","first-page":"122","article-title":"Toward Usable and Trustworthy Online Monitoring on e-Health Applications","volume":"8","author":"Jung Y.","year":"2016","journal-title":"International Journal on Advances in Life Sciences"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceeding of Proceedings of the 25th Australasian Conference on Information Systems, ACIS.","author":"Adhikari R."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceeding of IEEE Security and Privacy Workshops. IEEE, 18--22","author":"Iyilade J."}],"event":{"name":"iiWAS2019: The 21st International Conference on Information Integration and Web-based Applications & Services","location":"Munich Germany","acronym":"iiWAS2019","sponsor":["JKU Johannes Kepler Universit\u00e4t Linz","@WAS International Organization of Information Integration and Web-based Applications and Services"]},"container-title":["Proceedings of the 21st International Conference on Information Integration and Web-based Applications &amp; Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366030.3366106","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3366030.3366106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:50Z","timestamp":1750202630000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366030.3366106"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,2]]},"references-count":17,"alternative-id":["10.1145\/3366030.3366106","10.1145\/3366030"],"URL":"https:\/\/doi.org\/10.1145\/3366030.3366106","relation":{},"subject":[],"published":{"date-parts":[[2019,12,2]]},"assertion":[{"value":"2020-02-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}