4.5 Article

An empirical study on secure usage of mobile health apps: The attack simulation approach

期刊

INFORMATION AND SOFTWARE TECHNOLOGY
卷 163, 期 -, 页码 -

出版社

ELSEVIER
DOI: 10.1016/j.infsof.2023.107285

关键词

Mobile computing; Software engineering; Mobile healthcare (mHealth); Empirical study

向作者/读者索取更多资源

This article presents a study on mobile health apps, where attack simulation scenarios were used to monitor user actions. The findings show that most users have negative views on access permissions, and many users do not carefully review privacy policies before granting permissions, leading to undesired or malicious access to health data.
Context: Mobile applications (apps) have proven their usefulness in enhancing service provisioning across a multitude of domains that range from smart healthcare, to mobile commerce, and areas of context-sensitive computing. In smart healthcare context, mobile health (mHealth) apps -representing a specific genre of mo-bile apps that manage health information -face some critical challenges relating to security and privacy of device and user data. In recent years, a number of empirically grounded, survey-based studies have been conducted to investigate secure usage of mHealth apps. However, such studies rely on self-reported behaviors documented via interviews or survey questions that lack practical approaches that can simulate attack scenario for monitoring users' actions and behaviors while using mHealth apps. Objective: Our objective was to conduct an empirical study -engaging participants with attack simulation sce-narios and analyze their actions -for investigating the security awareness of mHealth app users.Method: We simulated some common security attack scenarios in mHealth context and engaged a total of 105 app users to monitor their actions and analyze their behavior. We analyzed users' data with statistical analysis including correlations test, descriptive analysis, and qualitative data analysis (i.e., thematic analysis method). \Results: Our results indicate that whilst the minority of our participants perceived access permissions positively, the majority had negative views. Users provide their consent, granting permissions, without a careful review of privacy policies that leads to undesired or malicious access to health data. Findings also indicated that 73.3% of our participants had denied at least one access permission, and 36% of our participants preferred no authenti-cation method.Conclusion: The study complements existing research on secure usage of mHealth apps, simulates security threats to monitor users' actions, and provides empirically grounded guidelines for secure development and usage of mobile health systems.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据