1,939
Views
14
CrossRef citations to date
0
Altmetric
Research Article

Privacy, security and resilience in mobile healthcare applications

ORCID Icon, , & ORCID Icon
Article: 1939896 | Received 12 Jan 2021, Accepted 03 Jun 2021, Published online: 22 Jun 2021

References

  • Aceto, G., V. Persico, and P. Antonio. 2020. “Industry 4.0 And Health: Internet of Things, Big Data, and Cloud Computing for Healthcare 4.0.” Journal of Industrial Information Integration 18: 100129.
  • Al-Muhtadi, J., B. Shahzad, K. Saleem, W. Jameel, and M. A. Orgun. 2019. “Cybersecurity and Privacy Issues for Socially Integrated Mobile Healthcare Applications Operating in a Multi-cloud Environment.” Health Informatics Journal 25 (2): 315–359. doi:10.1177/1460458217706184.
  • Alpár, G., J.-H. Hoepman, and J. Siljee. 2011. “The Identity Crisis. Security, Privacy and Usability Issues in Identity Management.” arXiv Preprint arXiv: 1101.0427.
  • Avancha, S., A. Baxi, and D. Kotz. 2012. “Privacy in Mobile Technology for Personal Healthcare.” ACM Computing Surveys (CSUR) 45 (1): 1–54. doi:10.1145/2379776.2379779.
  • Bokolo, Anthony Jnr. 2021. “Managing digital transformation of smart cities through enterprise architecture – a review and research agenda.” Enterprise InformationSystems 15 (3): 299–331. doi:10.1080/17517575.2020
  • Cai, M. Y., Y. Lin, Z. Gao, C. W. Yuan, and W. J. Zhang. 2017. “Comparison of AH and MFM for Work Domain Analysis in Light of Interface Design.” In IEEE Inte national Systems Engineering Symposium (ISSE), 1–6. Vienna, Austria: IEEE.
  • Chen, H., C. E. Beaudoin, and T. Hong. 2017. “Securing Online Privacy: An Empirical Test on Internet Scam Victimization, Online Privacy Concerns, and Privacy Protection Behaviors.” Computers in Human Behavior 70: 291–302. doi:10.1016/j.chb.2017.01.003.
  • Collins, T. 2006. “NHS Trust Uncovers Password Sharing Risk to Patient Data.” ComputerWeekly.com. ComputerWeekly.com, July 10, 2006. https://www.computerweekly.com/news/2240077810/NHS-trust-uncovers-password-sharing-risk-to-patient-data.
  • Dai, F. 2016. “On Development of a Green Web-based System for Reducing Waiting Times of Outpatients.” PhD diss., MSc Thesis, Division of Biomedical Engineering, University of Saskatchewan …
  • Di, P., G. O. Roberto, C. Soriente, and G. Tsudik. 2012. “United We Stand: Intrusion Resilience in Mobile Unattended WSNs.” IEEE Transactions on Mobile Computing 12 (7): 1456–1468.
  • Fan, L. X., M. Y. Cai, Y. Lin, and W. J. Zhang. 2015. “Axiomatic Design Theory: Further Notes and Its Guideline to Applications.” International Journal of Materials & Product Technology 51 (4): 359–374. doi:10.1504/IJMPT.2015.072557.
  • Hathaliya, J. J., and S. Tanwar. 2020. “An Exhaustive Survey on Security and Privacy Issues in Healthcare 4.0.” Computer Communications 153: 311–335. doi:10.1016/j.comcom.2020.02.018.
  • Holling, C. S. 1973. “Resilience and Stability of Ecological Systems.” Annual Review of Ecology and Systematics 4 (1): 1–23. doi:10.1146/annurev.es.04.110173.000245.
  • Huang, D., X. Zhang, M. Kang, and J. Luo. 2010. “MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication.” In fifth IEEE international symposium on service oriented system engineering, 27–34. Nanjing, China: Ieee.
  • Khan, F., and O. Reyad. 2020. “Application of Intelligent Multi Agent Based Systems for E-Healthcare Security.” arXiv Preprint arXiv: 2004.01256.
  • Lancharoen, S., P. Suksawang, and T. Naenna. 2020. “Readiness Assessment of Information Integration in a Hospital Using an Analytic Network Process Method for Decision-making in a Healthcare Network.” International Journal of Engineering Business Management 12: 1847979019899318. doi:10.1177/1847979019899318.
  • Li, Y., H. Wang, L. Yingying, and L. Li. 2019. “Patient Assignment Scheduling in a Cloud Healthcare System Based on Petri Net and Greedy-based Heuristic.” Enterprise Information Systems 13 (4): 515–533. doi:10.1080/17517575.2018.1526323.
  • Liang, X., M. Barua, C. Le, R. Lu, X. Shen, X. Li, and H. Y. Luo. 2012. “Enabling Pervasive Healthcare through Continuous Remote Health Monitoring.” IEEE Wireless Communications 19 (6): 10–18. doi:10.1109/MWC.2012.6393513.
  • Lo’ai, T., N. Alassaf, W. Bakheder, and A. Tawalbeh. 2015. “Resilience Mobile Cloud Computing: Features, Applications and Challenges.” In Fifth International Conference on e-Learning (econf), 280–284. Manama, Bahrain: IEEE.
  • Loft, P., H. Ying, H. Janicke, and I. Wagner. 2021. “Dying of a Hundred Good Symptoms: Why Good Security Can Still Fail-a Literature Review and Analysis.” Enterprise Information Systems 15 (4): 448–473. doi:10.1080/17517575.2019.1605000.
  • Mozilla. “Web Technology for Developers”.Last accessed 16 December 2020. https://developer.mozilla.org/en-US/docs/DOM/window.navigator.battery
  • Ng, C. K., C. H. Wu, K. L. Yung, W. H. Ip, and T. Cheung. 2018. “A Semantic Similarity Analysis of Internet of Things.” Enterprise Information Systems 12 (7): 820–855. doi:10.1080/17517575.2018.1464666.
  • Ogbeyemi, A., W. Lin, F. Zhang, and W. Zhang. 2020. “Human Factors among Workers in a Small Manufacturing Enterprise: A Case Study.”
  • Rahmadika, S., and K.-H. Rhee. 2018. “Blockchain Technology for Providing an Architecture Model of Decentralized Personal Health Information.” International Journal of Engineering Business Management 10: 1847979018790589. doi:10.1177/1847979018790589.
  • Solove, D. J. 2002. “Conceptualizing Privacy.” Calif. L. Rev 90 (4): 1087. doi:10.2307/3481326.
  • Sun, Z., B. Zhang, L. Cheng, and W. J. Zhang. 2011. “Application of the Redundant Servomotor Approach to Design of Path Generator with Dynamic Performance Improvement.” Mechanism and Machine Theory 46 (11): 1784–1795. doi:10.1016/j.mechmachtheory.2011.06.003.
  • Taleb, T., A. Ksentini, and B. Sericola. 2016. “On Service Resilience in Cloudnative 5G Mobile Systems.” IEEE Journal on Selected Areas in Communications 34 (3): 483–496. doi:10.1109/JSAC.2016.2525342.
  • Tsang, Y. P., C. H. Wu, W. H. Ip, and W.-L. Shiau. 2021. “Exploring the Intellectual Cores of the blockchain–Internet of Things (Biot).” Journal of Enterprise Information Management ahead-of-print (ahead–of–print). doi:10.1108/JEIM-10-2020-0395.
  • Wang, J., R. Dou, R. R. Muddada, and W. Zhang. 2018. “Management of a Holistic Supply Chain Network for Proactive Resilience: Theory and Case Study.” Computers & Industrial Engineering 125: 668–677. doi:10.1016/j.cie.2017.12.021.
  • Wang, J., R. R. Muddada, H. Wang, J. Ding, Y. Lin, C. Liu, and W. Zhang. 2014. “Toward a Resilient Holistic Supply Chain Network System: Concept, Review and Future Direction.” IEEE Systems Journal 10 (2): 410–421. doi:10.1109/JSYST.2014.2363161.
  • Woods, D. D. 2015. “Four Concepts for Resilience and the Implications for the Future of Resilience Engineering.” Reliability Engineering & System Safety 141: 5–9. doi:10.1016/j.ress.2015.03.018.
  • Xu, M. 2019. “A System Perspective to Privacy, Security and Resilience in Mobile Applications.” Master’sthesis, University of Saskatchewan.
  • Zhang, W. 1994. “An Integrated Environment for CAD/CAM of Mechanical Systems.” PhD diss., Delft University of Technology.
  • Zhang, W. J., and C. A. Van Luttervelt. 2011. “Toward a Resilient Manufacturing System.” CIRP Annals 60 (1): 469–472. doi:10.1016/j.cirp.2011.03.041.
  • Zhang, W. J., and J. W. Wang. 2016. “Design Theory and Methodology for Enterprise Systems.” Enterprise Information Systems 10 (3): 245–248. doi:10.1080/17517575.2015.1080860.
  • Zhang, W. J., J. W. Wang, and Y. Lin. 2019. “Integrated Design and Operation Management for Enterprise Systems.” Enterprise Information Systems 13 (4): 424–429. doi:10.1080/17517575.2019.1597169.
  • Zhang, W.-J., and Y. Lin. 2010. “On the Principle of Design of Resilient Systems– Application to Enterprise Information Systems.” Enterprise Information Systems 4 (2): 99–110. doi:10.1080/17517571003763380.
  • Zhang, X., J. Schiffman, S. Gibbs, A. Kunjithapatham, and S. Jeong. 2009. “Securing Elastic Applications on Mobile Devices for Cloud Computing.” In Proceedings of the 2009 ACM workshop on Cloud computing security, 127–134. New York, NY, USA: Association for Computing Machinery.
  • Zhou, J., Z. Cao, X. Dong, X. Lin, and A. V. Vasilakos. 2013. “Securing M-healthcare Social Networks: Challenges, Countermeasures and Future Directions.” IEEE Wireless Communications 20 (4): 12–21. doi:10.1109/MWC.2013.6590046.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.