AUTHENTICATION & INTEGRATION APPROACHES FOR MHEALTH APPS FROM A USABILITY VIEW

被引:1
作者
Teng, Zhongwei [1 ]
Zhang, Peng [2 ]
Li, Xiao [1 ]
Nock, William [1 ]
Gilmore, Denis [3 ]
Rodriguez-Cancio, Marcelino [1 ]
White, Jules [1 ]
Nesbitt, Jonathan Carl [3 ]
Schmidt, Douglas Craig [1 ]
机构
[1] Vanderbilt Univ, Sch Engn, Dept Elect Engn & Comp Sci, 2201 West End Ave, El Paso, TX 79968 USA
[2] Belmt Univ, Dept Math & Comp Sci, 1900 Belmont Blvd, El Paso, TX 79968 USA
[3] Vanderbilt Univ, Dept Thorac Surg, Med Ctr, 1211 Med Ctr Dr, El Paso, TX 79968 USA
基金
美国国家科学基金会;
关键词
Authentication; mHealth; patterns; usability; HEALTH; INFORMATION;
D O I
10.15598/aeee.v19i1.3301
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile Health (mHealth) apps are increasingly adopted in healthcare domains, such as diabetes management, physical activity monitoring, and HIV treatment. However, mHealth app development is restricted due to healthcare privacy regulations, which require apps to handle collected data securely. The advent of online platforms, such as REDCap, alleviates this problem by providing privacy-compliant databases, so that mHealth apps developed for research groups can securely handle stored inactive data (data-at-rest) with fewer privacy concerns. Unfortunately, the authentication architectures of many online platforms do not meet the needs of mHealth apps and provide insufficient integration support. Assumptions made in other types of mobile apps about how users operate, such as a user's ability to type or remember a password, therefore may not be valid in the mHealth domain. To address these problems this paper evaluates how authentication approaches impact the usability of mHealth apps. In particular, we present metrics to evaluate usability and show how the Proxy User Adapter pattern can integrate usability-enhanced authentication approaches to legacy secure database providers. We also propose a QR-Code authentication approach that applies the Proxy User Adapter pattern to help mHealth apps overcome common impediments, improve processing efficiency, and reduce potential mistakes caused by patients and providers alike.
引用
收藏
页码:74 / 89
页数:16
相关论文
共 45 条
  • [1] HIPAA regulations - A new era of medical-record privacy?
    Annas, GJ
    [J]. NEW ENGLAND JOURNAL OF MEDICINE, 2003, 348 (15) : 1486 - 1490
  • [2] [Anonymous], 2002, Proceedings of the 9th ACM conference on Computer and communications security, DOI DOI 10.1145/586110.586133
  • [3] [Anonymous], 2015, TEL CONS ACC SEC REP
  • [4] Buschmann F., 2007, Pattern-Oriented Software Architecture, on Patterns and Pattern Languages
  • [5] CHAUDHRY B. M., 2017, MHEALTH, V3, P1
  • [6] An efficient and practical solution to remote authentication: Smart card
    Chien, HY
    Jan, JK
    Tseng, YM
    [J]. COMPUTERS & SECURITY, 2002, 21 (04) : 372 - 375
  • [7] Coursaris CK, 2011, J USABILITY STUD, V6, P117
  • [8] Free for All! Assessing User Data Exposure to Advertising Libraries on Android
    Demetriou, Soteris
    Merrill, Whitney
    Yang, Wei
    Zhang, Aston
    Gunter, Carl A.
    [J]. 23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
  • [9] Effectiveness of acute postoperative pain management: I. Evidence from published data
    Dolin, SJ
    Cashman, JN
    Bland, JM
    [J]. BRITISH JOURNAL OF ANAESTHESIA, 2002, 89 (03) : 409 - 423
  • [10] The effectiveness of M-health technologies for improving health and health services: A systematic review protocol
    Free C.
    Phillips G.
    Felix L.
    Galli L.
    Patel V.
    Edwards P.
    [J]. BMC Research Notes, 3 (1)