TY - GEN
T1 - Monitoring patient apps security vulnerabilities
AU - Hussein, Khalid
N1 - Publisher Copyright:
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2026.
PY - 2025/7/25
Y1 - 2025/7/25
N2 - The rapid growth of self-monitoring patient apps has revolutionized the healthcare industry, enabling individuals to track their health metrics and engage more actively in their own care. However, this technological advancement has also introduced significant security and privacy concerns. This article examines the security vulnerabilities inherent in self-monitoring patient apps, highlighting the risks to patient data and the potential consequences of these vulnerabilities. It explores the common security flaws found in these apps, such as weak authentication mechanisms, inadequate data encryption, and the lack of secure data transmission protocols. The article also discusses the regulatory landscape and the need for comprehensive security standards to protect patient privacy and ensure the integrity of health data. Additionally, it delves into emerging technologies and their impact on app security, as well as the role of user education in maintaining app security. Finally, it provides recommendations for app developers, healthcare providers, and policymakers to address these vulnerabilities and enhance the security of self-monitoring patient apps.
AB - The rapid growth of self-monitoring patient apps has revolutionized the healthcare industry, enabling individuals to track their health metrics and engage more actively in their own care. However, this technological advancement has also introduced significant security and privacy concerns. This article examines the security vulnerabilities inherent in self-monitoring patient apps, highlighting the risks to patient data and the potential consequences of these vulnerabilities. It explores the common security flaws found in these apps, such as weak authentication mechanisms, inadequate data encryption, and the lack of secure data transmission protocols. The article also discusses the regulatory landscape and the need for comprehensive security standards to protect patient privacy and ensure the integrity of health data. Additionally, it delves into emerging technologies and their impact on app security, as well as the role of user education in maintaining app security. Finally, it provides recommendations for app developers, healthcare providers, and policymakers to address these vulnerabilities and enhance the security of self-monitoring patient apps.
KW - Self-monitoring patient apps
KW - authentication
KW - data en cryption
KW - data privacy
KW - healthcare security
KW - mobile health applications
KW - security vulnerabilities
UR - https://www.scopus.com/pages/publications/105012238837
U2 - 10.1007/978-3-031-92517-7_15
DO - 10.1007/978-3-031-92517-7_15
M3 - Conference contribution
SN - 9783031925160
T3 - Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
SP - 201
EP - 210
BT - Cloud Computing - 12th EAI International Conference, CloudComp 2024, Proceedings
A2 - Feng, Xiaohua
A2 - Siarry, Patrick
A2 - Han, Liangxiu
A2 - Yang, Longzhi
PB - Springer
T2 - Cloud Computing 12th EAI International Conference, CloudComp 2024
Y2 - 9 September 2024 through 10 September 2024
ER -