Cite Score:
0.65
ELSEVIER SCOPUS

Mobile Health and Its Security in the Face Cyber Attacks

AUTHORS

B Vahidiataabadi 1 , * , M Abolverdi 2 , SJ Masoumi 3

AUTHORS INFORMATION

1 IT Incubator Center Building, Deputy Director of IT Incubator Center in Shiraz Medical of Sciences, Shiraz, Iran

2 South-Area Management Industrial Organization, IT Expert, Shiraz, Iran

3 IT Incubator Center of Shiraz Medical of Sciences, Head, Shiraz, Iran

ARTICLE INFORMATION

Shiraz E-Medical Journal: 19 (Suppl); e66317
Published Online: February 23, 2017
Article Type: Abstract
Received: January 15, 2018
Accepted: January 01, 2017
Crossmark

Crossmark

CHEKING

READ FULL TEXT
Abstract

Keywords

mHealth Security Mobile Information Systems E-mail

© 2018, Author(s). This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/) which permits copy and redistribute the material just in noncommercial usages, provided the original work is properly cited.
Fulltext

Background: Today, mobile phones are used as useful tools in medicine; however, the risks of using them have always been an important
concern of doctors and the medical community. The aim of this study is to evaluate mobile device risks of being attacked
in cyberspace and how to deal with them. Objectives: As we know, mobile phones and other portable electronic devices, including laptops, tablets, and etc. are always one of the favorite targets for small theft. In addition to the financial value of them, they are good choices for online thieves and hackers to access medical databases and IT systems in the medical community. In this work, the author studies the risks of mhealth and the ways to deal with them. These approaches include strong encryption on mobile health systems and a distrust of the links in
unknown emails.

Methods: This study is a review-analysis based on library sources and online articles. Data were collected using the resources available in PubMed-Medline, Springer, Magiran, and the Journal of Medical Internet Research. The results of the most common health
risks were developed as an analytical method. Results: The results showed that ‘Medjacking’ attacker or attackers to devices used in mobile health not only endanger the patient’s health, but are also a threat to the security of information systems used in hospitals or health systems. The best approach to handle such a problem can be by choosing a strong password on the mobile device and using tools such as URL X-ray to open the contents of the emails.

Conclusion: Although, vast use of mobile devices in mhealth increases the risk of virtual attack, using a proper security system
installed on the device can avoid this danger.

References
  • 1.
  • COMMENTS

    LEAVE A COMMENT HERE: