Monitoring patient apps security vulnerabilities
| dc.contributor.author | Hussein, Khalid | |
| dc.date.accessioned | 2025-09-29T09:15:26Z | |
| dc.date.available | 2025-09-29T09:15:26Z | |
| dc.date.issued | 2025-07-25 | |
| dc.identifier.citation | Hussein K. (2026) 'Monitoring patient apps security vulnerabilities', Cloud Computing 12th EAI International Conference, CloudComp 2024 - Luton, Springer Science and Business Media Deutschland GmbH. | en_US |
| dc.identifier.isbn | 9783031925160 | |
| dc.identifier.doi | 10.1007/978-3-031-92517-7_15 | |
| dc.identifier.uri | http://hdl.handle.net/10547/626776 | |
| dc.description.abstract | The rapid growth of self-monitoring patient apps has revolutionized the healthcare industry, enabling individuals to track their health metrics and engage more actively in their own care. However, this technological advancement has also introduced significant security and privacy concerns. This article examines the security vulnerabilities inherent in self-monitoring patient apps, highlighting the risks to patient data and the potential consequences of these vulnerabilities. It explores the common security flaws found in these apps, such as weak authentication mechanisms, inadequate data encryption, and the lack of secure data transmission protocols. The article also discusses the regulatory landscape and the need for comprehensive security standards to protect patient privacy and ensure the integrity of health data. Additionally, it delves into emerging technologies and their impact on app security, as well as the role of user education in maintaining app security. Finally, it provides recommendations for app developers, healthcare providers, and policymakers to address these vulnerabilities and enhance the security of self-monitoring patient apps. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | Springer Science and Business Media Deutschland GmbH | en_US |
| dc.relation.url | https://link.springer.com/chapter/10.1007/978-3-031-92517-7_15 | en_US |
| dc.subject | mobile health applications | en_US |
| dc.subject | security vulnerabilities | en_US |
| dc.subject | healthcare security | en_US |
| dc.subject | data encryption | en_US |
| dc.subject | data privacy | en_US |
| dc.subject | authentication | en_US |
| dc.subject | self-monitoring patient apps | en_US |
| dc.title | Monitoring patient apps security vulnerabilities | en_US |
| dc.title.alternative | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering | en_US |
| dc.type | Conference papers, meetings and proceedings | en_US |
| dc.contributor.department | University of Bedfordshire | en_US |
| dc.date.updated | 2025-09-29T09:13:47Z | |
| dc.description.note |
