Published on in Vol 8, No 6 (2020): June

Preprints (earlier versions) of this paper are available at https://preprints.jmir.org/preprint/18175, first published .
Hospital Bring-Your-Own-Device Security Challenges and Solutions: Systematic Review of Gray Literature

Hospital Bring-Your-Own-Device Security Challenges and Solutions: Systematic Review of Gray Literature

Hospital Bring-Your-Own-Device Security Challenges and Solutions: Systematic Review of Gray Literature

Review

1School of Computing and Information Systems, The University of Melbourne, Melbourne, Australia

2Centre for Digital Transformation of Health, The University of Melbourne, Melbourne, Australia

Corresponding Author:

Tafheem Ahmad Wani, MIT

School of Computing and Information Systems

The University of Melbourne

Level 6, Doug McDonell Building

Parkville

Melbourne, 3010

Australia

Phone: 61 451906170

Email: twani@student.unimelb.edu.au


Background: As familiarity with and convenience of using personal devices in hospitals help improve the productivity, efficiency, and workflow of hospital staff, the health care bring-your-own-device (BYOD) market is growing consistently. However, security concerns owing to the lack of control over the personal mobile devices of staff, which may contain sensitive data such as personal health information of patients, make it one of the biggest health care information technology (IT) challenges for hospital administrations.

Objective: Given that the hospital BYOD security has not been adequately addressed in peer-reviewed literature, the aim of this paper was to identify key security challenges associated with hospital BYOD usage as well as relevant solutions that can cater to the identified issues by reviewing gray literature. Therefore, this research will provide additional practical insights from current BYOD practices.

Methods: A comprehensive gray literature review was conducted, which followed the stepwise guidelines and quality assessment criteria set out by Garousi et al. The searched literature included tier 1 sources such as health care cybersecurity market reports, white papers, guidelines, policies, and frameworks as well as tier 2 sources such as credible and reputed health IT magazines, databases, and news articles. Moreover, a deductive thematic analysis was conducted to organize the findings based on Schlarman’s People Policy Technology model, promoting a holistic understanding of hospitals’ BYOD security issues and solutions.

Results: A total of 51 sources were found to match the designed eligibility criteria. From these studies, several sociotechnical issues were identified. The major challenges identified were the use of devices with insufficient security controls by hospital staff, lack of control or visibility for the management to maintain security requirements, lack of awareness among hospital staff, lack of direction or guidance for BYOD usage, poor user experience, maintenance of legal requirements, shortage of cybersecurity skills, and loss of devices. Although technologies such as mobile device management, unified endpoint management, containerization, and virtual private network allow better BYOD security management in hospitals, policies and people management measures such as strong security culture and staff awareness and training improve staff commitment in protecting hospital data.

Conclusions: The findings suggest that to optimize BYOD security management in hospitals, all 3 dimensions of the security process (people, policy, and technology) need to be given equal emphasis. As the nature of cybersecurity attacks is becoming more complex, all dimensions should work in close alignment with each other. This means that with the modernization of BYOD technology, BYOD strategy, governance, education, and relevant policies and procedures also need to adapt accordingly.

JMIR Mhealth Uhealth 2020;8(6):e18175

doi:10.2196/18175

Keywords



Background

Bring-your-own-device (BYOD) is a term that refers to the use of personal devices by employees for professional purposes. These devices typically include smartphones, tablets, and laptops and may even include internet of things (IoT) devices such as wearables. Health care is one of the leading industries driving BYOD usage [1-5]. Health care professionals are known to use personal mobile devices for work such as documenting clinical notes; accessing medical records, drug information, or test results; time-tabling; communicating with other staff as well as with patients; and looking up reference resources [1,6-9]. It is suggested that BYOD saves time and improves the productivity of clinicians, makes patient care more efficient through better care coordination and continuity, saves device procurement costs for health care organizations, and may even reduce hospital admission rates [10-12].

However, one of the key issues that BYOD faces is data security. The health care industry sees the greatest number of data breaches among all major industries around the world [13,14]. In part, health care is a target of cybercriminals for various reasons; for instance, medical credentials are said to be sold in the black market, especially the dark web, for over US $1000 [15,16].

One of the primary reasons for health care data breaches is BYOD itself. Hospitals may have little or no control over the security of their employees’ personal mobile devices, which may contain sensitive organizational data such as patient information. Hospitals also do not have any control over a user’s nonwork-related activity on their BYOD device, as ownership lies with the employee. In addition, health care IoT devices such as personal wearables are growing at an exponential rate, and with each device added to the hospital network, the chance of breach increases. Furthermore, given the highly regulated nature of the health care industry, which enforces strict measures to protect patient information, health care organizations face a heavy task of compliance with health data protection laws [17-19]. In short, BYOD security is “one of the biggest headaches for healthcare IT management” [20].

Objectives

There has been little research into BYOD security, especially in health care [21-23]. Our previous literature review of hospital BYOD security issues and risk mitigation found mostly expert commentaries and a dearth of real-life studies in clinical settings [17]. A limitation of our previous review was that only peer-reviewed literature was considered.

Therefore, the aim of this study was to investigate the challenges and solutions of hospital BYOD security by reviewing the gray literature. The aim of this paper meets the criteria set out by Garousi et al [24] for including gray literature in research: to reduce the gap between academic research and industry practices, to provide perspectives missing from peer-reviewed research, and to provide practical insights about hospitals’ BYOD usage.


This gray literature review followed the stepwise guidelines set out by Garousi et al [24].

Search Process

First, specialized and credible health information technology (IT) sources, which include magazines, databases, and news sources such as Xtelligent Healthcare Media (HITInfrastructure and HealthITSecurity), Pulse IT Communications, Healthcare IT News Australia, and Healthcare Information and Management Systems Society (HIMSS) media were searched.

Second, other tier 1 and tier 2 gray literature sources searched from Google and the market research platform Gartner, which fit the quality assessment criteria of Garousi et al [24], were considered. Tier 1 sources include highly credible sources where knowledge and authority of the source are well established and where content is produced in conformance with well-defined criteria [25]. These included mobile security white papers and reports, national health care department guidelines or policies, BYOD market research reports, and frameworks from reputable agencies and organizations [24]. Tier 2 sources include sources where knowledge and authority of the source are moderately credible [25]. These included news articles, company annual reports, and document presentations [24]. For these sources, health care terms were used in addition to the terms mentioned above, as part of the search string. These include terms such as “health,” “healthcare,” and “hospital.” Only the top 100 search results from tier 1 and 2 sources were inspected, as saturation of concepts was observed after this.

Finally, some articles were also extracted through snowballing of links or citations provided in the abovementioned sources.

Quality Assessment and Eligibility Criteria

Only articles that fit the quality assessment criteria established by Garousi et al [24] were chosen for the study. Articles were assessed based on the authority of source, method, date, objectivity, novelty, and impact to determine their suitability for this study. Articles from credible and reputable sources (first- and second-tier gray literature), with a clear objective and adding a unique perspective to the research or corroborating previous scientific evidence, were included.

Only gray literature articles published from 2016 to 2019 in the English language were considered eligible. This ensured contemporaneity and practical relevance of this research, given that BYOD security management has seen significant changes during this period, such as an increase in the number and type of data breaches as well as improvements in technology. In addition, this study was limited to mid- and large-size clinical settings, mainly hospitals and community health centers; smaller settings with budget or technological constraints to invest in BYOD security, such as private practices, were excluded. Finally, eligibility was strictly limited to security issues related to the usage of BYOD in hospitals. Issues such as bandwidth, availability, device interference, and medical infection risks were excluded.

Overall, 51 articles were included, as shown in the Preferred Reporting Items for Systematic Reviews and Meta-Analyses flowchart [26] in Figure 1.

Figure 1. Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) flowchart.
View this figure

Data Extraction and Synthesis

Deductive thematic analysis was conducted using the People Policy Technology (PPT) model by Schlarman [27] to organize the findings [28] in accordance with the previous review conducted by the authors [17]. The PPT model breaks down the security process into 3 core elements: people responsible for executing and supporting the security process; policy used for explaining supporting procedures and providing a clear direction for ideal security behavior; and technology, which includes products, tools, or materials used for supporting the security process [27]. Previous studies indicate that to optimize the cybersecurity controls, the alignment between technical and social dimensions is necessary. Therefore, a holistic approach is required to completely understand the security process [28-31]. Experts also say that the technocentric nature of the present cybersecurity practices has increased the success of cyberattacks as the social dimension of security is relatively neglected [32]. This makes the PPT model very useful as it advocates for equal emphasis on all 3 dimensions (people, policy, and technology) of the security process.


Characteristics of the Included Gray Literature

Table 1 summarizes the types of articles included. The detailed characteristics of each article are provided in Multimedia Appendix 1.

Table 1. Characteristics of the included gray literature (N=51).
CharacteristicsStudies, n (%)
Year of publication

20197 (14)

201812 (24)

201722 (43)

201610 (20)
Type of study

Primary29 (57)

Secondary22 (43)
Outlet source

Market report12 (24)

News article17 (33)

Opinion post7 (14)

Legislation6 (12)

White paper5 (10)

Policy document2 (4)

Newsletter post2 (4)
Outlet type

First-tier gray literature14 (27)

Second-tier gray literature37 (73)

Hospital Bring-Your-Own-Device Security Challenges

Hospitals face several data security challenges owing to the use of BYOD. These challenges are sociotechnical in nature. Therefore, based on the PPT model, this study classifies them as technology, policy, and people challenges [27].

Hospital Bring-Your-Own-Device Technology Challenges

The following sections discuss the key technical challenges associated with the use of BYOD in hospitals, which pose a threat to data security.

Devices With Insufficient Security Control

Personal mobile devices (BYOD devices) used by health care professionals lack the security controls and visibility of company-owned devices that may have preinstalled security settings and enable better security management [33,34]. For example, in a 2016 survey of US health care organizations, 11% of doctor-owned personal devices that stored patient data had highly vulnerable operating systems that were either outdated or jailbroken/rooted [35]. Although outdated versions may lack the necessary resistance against modern security attacks, jailbroken or rooted devices forcefully block security controls in lieu of additional functionality/control [34].

Device Locking/Authentication

According to the same survey, 14% of the devices owned by doctors contained some form of patient data, yet had no device locking or authentication mechanism for protecting sensitive information such as passwords, pattern locks, or biometric authentication [35].

App Security

The same survey also revealed that about 27.79 million mobile devices that had installed medical apps were infected with at least one high-risk malware, through downloading vulnerable apps from unregulated app stores [35].

Overall, 46% of the doctors shared patient data through picture messaging, 65% through SMS, and 33% via WhatsApp, according to the mentioned survey [35]. Similarly, 87% of the staff at a National Health Services (NHS)-based hospital in the United Kingdom were found to use such apps to discuss patient cases at work [36]. Consequently, their patients’ health information might be viewed by their colleagues or family members who have access to these platforms [37].

Network Security

The Skycure survey also revealed that 39% of the devices used by doctors for their day-to-day practice were susceptible to network attacks by the fourth month of using the device [35], typically when the clinicians connected their devices to unsecure networks such as public hotspots [34,38].

Hospital Bring-Your-Own-Device Policy Challenges

The following sections discuss the key BYOD policy-related challenges in hospitals.

Lack of Direction

About 62% of health care executives from US health care organizations stated that their hospitals either do not have a BYOD policy or that they are not aware of it [39]. Absence of a dedicated BYOD policy or BYOD program means that there may be a lack of clarity about associated issues such as corporate chain of responsibility, data ownership, data protection, prerequisites for device enrollment, access control, or clinical communication and compliance [33,40].

Legislative Compliance

Given the highly regulated nature of the health care industry, health care organizations need to maintain strict compliance with privacy laws. These laws are intended to protect patient privacy and provide transparency to patients in terms of who uses their data and how they are used or transmitted. They make it compulsory for health care organizations to strictly enforce strong and appropriate security controls and also define standard operating procedures. The notification of breaches to the government has also become compulsory under health data privacy laws [41]. Examples of such laws include the Australian Privacy Principles of 1988 and the Healthcare Identifiers Act of 2010 in Australia, the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health (HITECH) Act in the United States, the General Data Protection Regulation (GDPR) in the European Union, and the Personal Health Information Protection Act (PHIPA) and the Personal Information Protection and Electronic Documents Act (PIPEDA) in Canada [42-47].

Penalties

In case of failure to provide adequate security safeguards, or if found responsible for data breaches, health care organizations may face heavy penalties from the government, in addition to reputational damages. For instance, personal data of 3800 patients at a children’s hospital in Dallas, United States, were accessed from an international airport from an unencrypted, nonpassword-protected Blackberry device, which led to a fine of US $3.2 million over patient privacy breaches [48]. In another example, a lost laptop owned by an employee at a Pennsylvania-based cardiology center led to a breach of 1391 electronic patient records, for which the center was fined US $2.5 million [49].

Hospital Bring-Your-Own-Device People Challenges

The following sections discuss the key social or people-related challenges associated with the use of BYOD in hospitals.

Inappropriate Behavior

Health care is the only industry where insider threats such as human error and system misuse are more prevalent than external threats such as hacking. Overall, 35% of all insider threats in the health care industry are attributed to human error, whereas 24% of them occur because of system misuse [14]. BYOD is a major contributor to human error as it converges private and organizational data, thus increasing the chance of unintentionally sending patients’ information to the device owner’s friend or family member [37]. System misuse occurs when employees abuse the authority or permissions given to them, for example, retrieving personal information about a patient for purposes not related to health care [14]. BYOD limits the control of hospitals in managing sensitive organizational data and, therefore, increases the chances for system misuse to occur.

Lack of Awareness

Employee awareness is a critically important component of any BYOD program [14]. Phishing scams, fake tech support requests, and ransomware attacks have been successfully used in recent times [41,50]. In 2017, HIMSS Analytics revealed that 80% of the surveyed health IT executives rated employee awareness as the foremost concern related to health care data security [50,51].

Poor User Experience

If clinicians have to go through complex security procedures such as typing in long passwords or logging in repeatedly after periods of inactivity, they will use work-arounds instead, such as using common or easy-to-remember passwords, sharing passwords with colleagues, or using unauthorized/banned messaging apps such as WhatsApp for communication to minimize lost time, which is again a threat to BYOD security [38,52].

Skills Shortage

Overall, 82% of IT executives in a survey of 8 developed countries, including the United States, the United Kingdom, and Australia, said that there is a shortage of cybersecurity skills, and 76% of IT executives believed that their government was not investing sufficiently in cybersecurity talent. In addition, 25% of the respondents claimed that a lack of cybersecurity staff made their organization susceptible to cyberattacks [53].

Hospital Bring-Your-Own-Device Security Solutions

As discussed, to curb BYOD security risks, a holistic approach is required, with equal emphasis on technology, people, and policy-based measures. This section, therefore, classifies the solutions based on the PPT elements of the security process [27].

Hospital Bring-Your-Own-Device Technology Solutions

Technology is one of the core components of the security process, which can aid in efficiently managing BYOD security. The following are important technologies used to curb BYOD security risks.

Mobile Device Management

Mobile device management (MDM) is a platform used to manage devices existing within an enterprise centrally. It performs functions such as automation of device registration and deregistration as well as updating or patching of BYOD devices by remotely installing secure configurations, settings, and policies [34]. Moreover, MDM also automates remote installation of enterprise apps such as antivirus or antimalware over-the-air onto devices or scans enterprise networks for vulnerabilities [54,55]. Furthermore, it also automates the enforcement of organizational policies such as enabling screen lock or log-off functionalities; encrypting hospital data; securing remote connections through virtual private networks (VPNs); tracking device location; wiping, locking, and securing devices remotely; and whitelisting and blacklisting apps and devices such as jailbroken/rooted devices or unapproved third-party apps [33,56,57].

Containerization

Containerization allows logical separation of organizational and personal data. This means that the hospital will only have control over the container where the hospital data reside, rather than the whole device. Containers are encrypted and therefore protect sensitive patient data that may reside on the employee’s device. The hospital can scan these data for viruses. It can even lock or delete the data remotely, while keeping the personal data intact [52]. In addition, containers also allow separate cloud backups for both personal and organizational data. Personal data can be uploaded on a personal cloud, whereas hospital data are uploaded on corporate or private cloud. IT administrators retain full control of the containers, and the need to manage the whole device is eliminated [52,58].

Virtual Desktop Infrastructure

Virtual desktop infrastructure eliminates BYOD security risks by removing the need to store hospital data on employees’ personal devices. It can provide access to hospital data through remote servers owned by the hospital, which can be connected to via a VPN after logging in remotely with proper credentials [34].

Identity and Access Management

Identity and access management (IAM) technologies ensure appropriate access to verified BYOD users through strong authentication, authorization, and access control mechanisms. Modern IAM solutions used in health care typically involve dual-factor authentication. In addition to supplying the username/passwords, users have to use an additional factor for authentication, for example, a biometric such as fingerprint, iris, or face [58]. IAM solutions also provide a feature called role-based access control, which ensures that permissions to access or modify patient data depend on the role of a person [34].

In a time-sensitive industry such as health care, the last thing clinicians want is cumbersome or repeated log-ins [38,52]. Single sign-on solutions avoid this, as the user needs to authenticate only once when accessing hospital services, rather than separately authenticating for each hospital app [34,58].

Endpoint Security Tools

BYOD devices need to be secured within as well as outside the hospital network. Therefore, endpoint security tools such as antivirus, antimalware, antispyware, or antiphishing tools need to be installed and regularly run on BYOD devices within hospital containers to protect and isolate hospital data within the device [52].

Secure Clinical Communication Platforms

Secure health care communication platforms provide an extra layer of security through strong encryption [37,59]. The United States has developed a national encryption standard called Direct for secure exchange of health care data, which provides guidelines on safe, scalable, and standards-based clinical communication and also ensures strict compliance to HIPAA [60].

Other Emerging Technologies

Several technologies have the potential to revolutionize the BYOD security management process. Unified endpoint management (UEM) is considered to be a good MDM alternative as it provides a single unified interface for managing all types of devices existing within the enterprise, such as PCs, laptops, smartphones, tablets, IoT devices, and wearables, which include both BYOD and company-owned devices. It also allows better methods of managing hospital apps/data, confining them to a secure workspace and separating the personal data of caregivers, which ensures the privacy of both personal health information (PHI) and personal data [61,62].

Another important technology that is gaining adoption is cloud access security broker (CASB), which is used in cloud-based MDM platforms and allows an organization to extend its security policies even outside its infrastructure and therefore manage the organizational data on the device even outside organizational parameters [63]. Health care can significantly benefit from this technology, given the mobile nature of its workforce comprising people who may work with different hospitals or health care organizations. Secure web gateway is another emerging technology that ensures that unsecured traffic, which may be initiated from BYOD devices such as malicious traffic from the web, viruses, or malware, does not enter the internal network of an organization [63]. As these technologies are relatively new, they still have not seen widespread adoption, but organizations are seriously considering their procurement [64].

Hospital Bring-Your-Own-Device Policy Solutions

Policy provides the required strategies, rules, and guidelines for the implementation of BYOD. The following policy components form an important part of the BYOD program.

Bring-Your-Own-Device Strategy and Governance

Given the lack of direction in hospitals regarding BYOD security, hospitals need to define a comprehensive hospital-wide strategy for BYOD, which should be regularly reviewed and updated. This strategy should be aligned with the hospital’s core values, future vision, and needs and requires close collaboration among all relevant stakeholders, including both clinical and nonclinical staff [65,66]. This strategy must take into consideration previous relevant procedures, data flows, and clinical workflows to understand what hospital data may be stored or transmitted from the clinician’s devices. The hospital must define who will have access to what information and where. It must also ensure that clinical productivity is not hampered [34].

User Agreement

Before joining the BYOD program, employees must be asked to sign a BYOD user agreement that elucidates the responsibilities of employees, defines penalties in case of noncompliance, and highlights the responsibilities of the hospital as well. An example of a BYOD user agreement is Queensland Health’s BYOD self-managed service policy document available on the web [67].

Bring-Your-Own-Device Policy

Before the rollout of the BYOD program in the hospital, policies that are in line with the BYOD strategy need to be put in place. Important elements that should be included in a BYOD policy are mentioned in Table 2 [33,34,58,65,68].

Health care examples that exhibit these elements include Queensland Health’s BYOD policy document and the sample BYOD policy by the UK NHS [67,69].

Table 2. Key elements of a hospital’s bring-your-own-device policy.
ItemDescription
Key definitionsScope, purpose, and governance structure of the BYODa program, along with the definition of important terms used in the policy.
Service provisionSpecifies the process of enrollment, registration, and deregistration.
Access controlDefines who will have access to what information and when. This is particularly important for personal health information, where the principle of least privileges must be applied. Only the required information must be supplied and only when needed, especially when it comes to patient data.
Data storageSpecifies what hospital data are allowed to be stored on BYOD devices and how. If backup is involved, the policy should also advocate for separate backup of personal and hospital data.
Incident reportingDefines the procedure for reporting cases of breaches, including cases of theft/loss of device. Employees must report such cases to the ITb department, especially if patient data are involved, and the IT department must report it to government agencies in case of major breaches.
Legislation and noncomplianceDefines applicable privacy or health care laws as well as actions or penalties in case of noncompliance with the policy or in case of breaches caused by employee’s personal devices.
Education strategyStrategies to train employees periodically to ensure secure user behavior. BYOD users should be constantly updated about latest cybersecurity threats. Policies should be disseminated through all means possible. Changes in policies should also be communicated.
Acceptable useStates the purposes for which BYOD devices could be used, whether clinical or nonclinical, and by whom. It defines reasonable use and prohibited activities.

aBYOD: bring-your-own-device.

bIT: information technology.

Hospital Bring-Your-Own-Device People Solutions

People form a critical part of the BYOD security process. The following are important measures that help improve the user security behavior of hospital employees.

Security Culture

All groups of hospital employees, which include the hospital’s senior management, the IT department, and BYOD users (both clinical and nonclinical staff), should be actively consulted throughout the duration of the BYOD program and made aware of their responsibilities. The leadership should make security an organizational priority so that clinicians understand the value of preserving the privacy of sensitive patient data. These steps will help in establishing a safe and secure BYOD culture, where the privacy of hospital data is taken seriously [34,65].

Employee Awareness and Training

Modes of training can include classroom training, computer-based training, staff meetings, monthly newsletters, posters, and regular team discussions [41]. A study conducted in 6 US health care organizations over 8 years (2011-2018) highlights the effectiveness of antiphishing campaigns in improving the security behavior of health care professionals [50].

Skills Improvement

Table 3 provides a summary of hospital BYOD security challenges and solutions.

Experts advocate for government investment in cybersecurity education and research and incorporation of practical training as part of academic programs. Employers also need to support their employees to complete cybersecurity certifications [70].

Table 3. Summary of hospital bring-your-own-device security challenges and solutions.
People, policy, and technology dimension and challengesSolutions
Technology

Weak authentication mechanisms
  • Identity and access management/MDMa to manage user authentication centrally
  • Strong passwords
  • Two-factor authentication with single sign-on
  • Automatic log off after periods of inactivity

Malicious medical apps downloaded on BYODb devices
  • Internal/regulated app stores
  • Whitelist/blacklist apps using MDM

BYOD devices connected to unsecure networks/hotspots
  • Over-the-air network scanning
  • Remote access through virtual private network
  • Data protection in rest and motion (use of AESc/TLSd)

Vulnerable devices connected on hospital network
  • MDM to prevent vulnerable devices from connecting to hospital networks
  • Network scanning

Mixing of personal and hospital data
  • Containerization for logical separation of hospital and personal data
  • Use sandboxed apps for PHIe access
  • Use secure and encrypted clinical communication platforms

Lost device containing sensitive PHI
  • Use MDM to track/lock device remotely
  • Use MDM with containerization to selectively wipe hospital data
  • Limit storage of hospital data on device using virtual desktop infrastructure
  • Report theft incidents to hospital information technology department
Policy

Lack of strategy/direction for ideal BYOD use
  • Define hospital-wide BYOD strategy to be updated regularly
  • Dedicated BYOD policy for complete guidance on authentication, access control, chain of responsibility, data ownership, devices allowed, acceptable use, training, legislation, and noncompliance
  • Mandating signing of user agreement for BYOD users

Maintaining compliance with health care data protection laws
  • Notify relevant government departments about breaches as per law
  • Perform regular audits and legal risk assessments
  • Define applicable privacy regulations and penalties for noncompliance
  • Train BYOD users about incident reporting to notify breaches/thefts

Access privilege abuse
  • Use principle of least privileges and role-based access control in defining staff access to PHI
People

Inappropriate behavior by BYOD users
  • Penalize staff found guilty of breaches
  • Encourage safe and secure use by establishing a security culture
  • Monitor user behavior regularly

Lack of awareness among hospital BYOD users
  • Educate BYOD users periodically
  • Check awareness levels regularly, for example, through phishing campaigns

Poor user experience
  • Consult all relevant stakeholders throughout the BYOD program
  • Carefully consider clinical workflow and ease of use

Cybersecurity budget and skills shortage
  • Government investment in technology, education, and research
  • Hiring experts
  • Sponsoring and supporting employees for skills improvement

aMDM: mobile device management.

bBYOD: bring-your-own-device.

cAES: Advanced Encryption Standard.

dTLS: Transport Layer Security.

ePHI: personal health information.


Principal Findings

A wide range of technological solutions, policy control measures, and social practices are available that can be used together to curb BYOD security risks in hospitals. The findings suggest that the key challenge lies in ensuring a proper balance between usability and security. Therefore, BYOD security management should not only involve the use of resilient security mechanisms but also ensure that the mobility and productivity of hospital employees, especially clinicians, are not hampered. Hospital-owned enterprise productivity apps such as secure messaging and photography or the use of single sign-on for accessing hospital apps can help to address such concerns.

From a technological perspective, the BYOD landscape is changing. Gartner analysts predict that the BYOD model will change to a bring-your-own-environment model as users bring not only devices and apps but also services, personal networks, and even collaborative workspaces beyond email or messaging [71]. It is expected that large health care organizations will have to deal with as many as 80,000 connected IoT devices [72]. Modern BYOD security technologies such as UEM or containerization allow BYOD security management to become device independent. The highlight of these technologies is that they allow logical separation of hospital and personal data on employees’ devices. As such, BYOD security management is moving from a traditional device-centric approach to a data-centric or app-centric approach, to gain complete control of hospital data residing on employees’ devices and relinquish the management of the whole device itself.

On the basis of our findings from the policy perspective, this study highlights how a lack of clarity with regard to optimal BYOD usage prevalent in hospitals can be addressed through a dedicated BYOD policy as it will provide complete direction and guidelines for safe, secure, and productive BYOD usage in the hospital. Important components that must be covered in the policy include governance of the BYOD program, choosing the right technologies to support the program, providing guidelines for appropriate use, training and education strategies for employees, and compliance with health care data privacy laws. In addition, the policy needs to be contextual and inclusive of various stakeholders. The policy must also be in alignment with the organization’s goals and the limits of the hospital’s capabilities. Finally, with rapid changes in BYOD technology, modernization of policy is also required. This means that the introduction or reformation of security standards or protocols needs to be contemplated by considering both security and the clinical workflow [73].

From people’s perspective, effective implementation of technology and policy will require strong consultations with all relevant stakeholders from the management side, which includes the hospital’s senior management; the IT department; and the user side, including BYOD users such as clinicians, administrative staff, and other staff. Educating and training employees about BYOD threats and security measures should be directed to improve their commitment to protect hospital data, especially PHI. The changing BYOD landscape also demands expansion and refreshment of skill set for the management, IT department, and BYOD users. Hospitals may need to recruit external staff capable of successfully implementing complex technologies such as UEM and CASB, which may also require training of hospital IT personnel [62].

Limitations

As far as the limitations of this study are concerned, the complex nature of gray literature searches means that the number of items available for review is significantly higher than that of peer-reviewed literature searches; therefore, limiting the items analyzed was unavoidable [24]. Nevertheless, some important sources may have been neglected. Furthermore, although some gray literature sources gave examples from real-life studies, others were based on the opinions of credible experts who wrote blogs for well-known media publications. Although these sources are useful, they do not meet the criteria of the highest quality sources.

Comparison With Prior Work

The use of the PPT model [27] to answer the research questions has aided in providing a holistic perspective of BYOD security management, which may have been lacking in previous studies, as highlighted earlier. This study, therefore, complements and augments the authors’ previous findings, where the same model was used for analyzing peer-reviewed literature [17]. The practical, real-life evidence extracted through the gray literature review not only corroborates the previous outcomes but also provides additional insights.

Conclusions

As modern BYOD security threats grow in size and complexity, this study elucidates how health care organizations can use technological solutions, policy control mechanisms, and people management measures in close alignment to curb such risks effectively and holistically. This has become very important as cybersecurity is seen as one of the biggest challenges in the health care industry [74], with BYOD being one of the major threats to cybersecurity itself [39,75].

Acknowledgments

This work was funded by the School of Computing and Information Systems and the Centre for Digital Transformation of Health at the University of Melbourne. The authors would also like to acknowledge the University of Melbourne’s support through its PhD research scholarship.

Conflicts of Interest

None declared.

Multimedia Appendix 1

Gray literature summary and characteristics.

PDF File (Adobe PDF File), 179 KB

  1. Nerminathan A, Harrison A, Phelps M, Alexander S, Scott KM. Doctors' use of mobile devices in the clinical setting: a mixed methods study. Intern Med J 2017 Mar;47(3):291-298. [CrossRef] [Medline]
  2. Hexa Research: Market Research Reports and Industry Analysis. 2016. BYOD (Bring Your Own Device) Market Analysis, Market Size, Application Analysis, Regional Outlook, Competitive Strategies and Forecasts, 2016 To 2024   URL: https://www.hexaresearch.com/research-report/bring-your-own-device-byod-industry [accessed 2019-09-10]
  3. HIMSS Analytics. 2017. 2017 Essentials Brief: Enabling Better Health Through Information Technology   URL: https:/​/www.​himssanalytics.org/​sites/​himssanalytics/​files/​2017_Essentials%20Brief_Mobile_SNAPSHOT%20REPORT.​pdf [accessed 2019-09-15]
  4. Million Insights: Market Research Reports, Industry Analysis. 2014. Bring Your Own Device (BYOD) Market Size & Forecast Report 2012 - 2020   URL: https:/​/www.​millioninsights.com/​industry-reports/​bring-your-own-device-byod-market?utm_source=pressrelease&utm_medium=referral&utm_campaign=Abnewswire_Shweta_ Sept12&utm_content=Content [accessed 2019-09-11]
  5. Snell E. Health IT Security. 2017. Mobile Security Essential Healthcare Provider Priority   URL: https://healthitsecurity.com/news/mobile-security-essential-healthcare-provider-priority [accessed 2019-11-05]
  6. Armstrong K, Semple J, Coyte P. Replacing ambulatory surgical follow-up visits with mobile app home monitoring: modeling cost-effective scenarios. J Med Internet Res 2014 Sep 22;16(9):e213 [FREE Full text] [CrossRef] [Medline]
  7. Rodriguez K, Burkitt K, Bayliss N, Skoko J, Switzer G, Zickmund S, et al. Veteran, primary care provider, and specialist satisfaction with electronic consultation. JMIR Med Inform 2015 Jan 14;3(1):e5 [FREE Full text] [CrossRef] [Medline]
  8. Schooley B, San Nicolas-Rocca T, Burkhard R. Patient-provider communications in outpatient clinic settings: a clinic-based evaluation of mobile device and multimedia mediated communications for patient education. JMIR Mhealth Uhealth 2015 Jan 12;3(1):e2 [FREE Full text] [CrossRef] [Medline]
  9. Landman A, Emani S, Carlile N, Rosenthal D, Semakov S, Pallin D, et al. A mobile app for securely capturing and transferring clinical images to the electronic health record: description and preliminary usability study. JMIR Mhealth Uhealth 2015 Jan 2;3(1):e1 [FREE Full text] [CrossRef] [Medline]
  10. Twilley R. Forbes. 2013. With BYOD, Employee Productivity Surges   URL: https:/​/www.​forbes.com/​sites/​centurylink/​2013/​04/​26/​byod-employees-bring-their-own-efficiency-to-work/​ [accessed 2019-10-10]
  11. Markets and Markets. 2016. BYOD and Enterprise Mobility Market by Software (MDM, Mobile Content Management), Security (Device Security, Network Security, IAM), Service (Managed & Professional Services), Deployment (Cloud & On-Premise), Vertical, and Region - Global Forecast to 2021   URL: https://www.marketsandmarkets.com/Market-Reports/enterprise-mobility-334.html [accessed 2019-10-11]
  12. Williams J. Left to their own devices how healthcare organizations are tackling the BYOD trend. Biomed Instrum Technol 2014;48(5):327-339. [CrossRef] [Medline]
  13. Minion L. Healthcare IT Australia. 2018. Healthcare Suffers Almost a Quarter of Data Breaches, as Reports Skyrocket Under Mandatory Notification Scheme   URL: https:/​/www.​healthcareit.com.au/​article/​healthcare-suffers-almost-quarter-data-breaches-reports-skyrocket-under-mandatory [accessed 2019-10-13]
  14. Verizon Wireless. 2018. 2018 Data Breach Investigations Report   URL: https://enterprise.verizon.com/resources/reports/DBIR_2018_Report.pdf [accessed 2020-05-05]
  15. Coventry L, Branley D. Cybersecurity in healthcare: a narrative review of trends, threats and ways forward. Maturitas 2018 Jul;113:48-52. [CrossRef] [Medline]
  16. Sulleyman A. The Independent. 2017. NHS Cyber Attack: Why Stolen Medical Information is So Much More Valuable Than Financial Data   URL: http:/​/www.​independent.co.uk/​life-style/​gadgets-and-tech/​news/​nhs-cyber-attack-medical-data-records-stolen-why-so-valuable-to-sell-financial-a7733171.​html [accessed 2019-10-21]
  17. Wani T, Mendoza A, Gray K. BYOD in Hospitals-Security Issues and Mitigation Strategies. In: Proceedings of the Australasian Computer Science Week Multiconference. 2019 Presented at: ACSW'19; January 29-31, 2019; Sydney, NSW, Australia. [CrossRef]
  18. Jalali M, Kaiser J. Cybersecurity in hospitals: a systematic, organizational perspective. J Med Internet Res 2018 May 28;20(5):e10059 [FREE Full text] [CrossRef] [Medline]
  19. Al Ayubi SU, Pelletier A, Sunthara G, Gujral N, Mittal V, Bourgeois FC. A mobile app development guideline for hospital settings: maximizing the use of and minimizing the security risks of 'bring your own devices' policies. JMIR Mhealth Uhealth 2016 May 11;4(2):e50 [FREE Full text] [CrossRef] [Medline]
  20. Schiff JL. CIO. 2017. The 4 Biggest Healthcare IT Headaches   URL: https://www.cio.com/article/3197698/healthcare/the-4-biggest-healthcare-it-headaches.html [accessed 2019-10-14]
  21. Arregui D, Maynard S, Ahmad A. Minerva Access. 2015. Mitigating BYOD Information Security Risks   URL: http://minerva-access.unimelb.edu.au/handle/11343/56627 [accessed 2019-10-19]
  22. Moyer JE. Managing mobile devices in hospitals: a literature review of BYOD policies and usage. J Hosp Librariansh 2013 Jul;13(3):197-208. [CrossRef]
  23. Zahadat N, Blessner P, Blackburn T, Olson BA. BYOD security engineering: a framework and its analysis. Comput Secur 2015 Nov;55:81-99. [CrossRef]
  24. Garousi V, Felderer M, Mäntylä MV. Guidelines for including grey literature and conducting multivocal literature reviews in software engineering. Inf Softw Technol 2019 Feb;106:101-121 [FREE Full text] [CrossRef]
  25. Adams RJ, Smart P, Huff AS. Shades of grey: guidelines for working with the grey literature in systematic reviews for management and organizational studies. Int J Manag Rev 2016 Apr 19;19(4):432-454. [CrossRef]
  26. Moher D, Liberati A, Tetzlaff J, Altman DG, PRISMA Group. Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement. PLoS Med 2009 Jul 21;6(7):e1000097 [FREE Full text] [CrossRef] [Medline]
  27. Schlarman S. The people, policy, technology (PPT) model: core elements of the security process. Inf Syst Sec 2006 Dec 21;10(5):1-6. [CrossRef]
  28. Fereday J, Muir-Cochrane E. Demonstrating rigor using thematic analysis: a hybrid approach of inductive and deductive coding and theme development. Int J Qual Methods 2016 Nov 29;5(1):80-92. [CrossRef]
  29. Malatji M, von Solms S, Marnewick A. Socio-technical systems cybersecurity framework. Info Comput Secur 2019 Jun 12;27(2):233-272. [CrossRef]
  30. Sabbagh B, Kowalski S. ST(CS)2 - Featuring Socio-Technical Cyber Security Warning Systems. In: Proceedings of the 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic. 2012 Presented at: CyberSec'12; June 26-28, 2012; Kuala Lumpur, Malaysia. [CrossRef]
  31. Soomro ZA, Shah MH, Ahmed J. Information security management needs more holistic approach: a literature review. Int J Inf Manage 2016 Apr;36(2):215-225. [CrossRef]
  32. Davis MC, Challenger R, Jayewardene DN, Clegg CW. Advancing socio-technical systems thinking: a call for bravery. Appl Ergon 2014 Mar;45(2):171-180. [CrossRef] [Medline]
  33. Bryant M. Healthcare Dive. 2018. BYOD Use is on the Rise, and Hospital Policies Need to Be Robust   URL: https:/​/www.​healthcaredive.com/​news/​byod-use-is-on-the-rise-and-hospital-policies-need-to-be-robust/​521653/​ [accessed 2019-10-08]
  34. ClearDATA. 2017. Securing Health Data in a BYOD World: Five Strategies to Minimize Risk   URL: https://www.cleardata.com/wp-content/uploads/2017/11/SET-MKTG-WP-13-Securing_PHI_in_a_BYOD_World.pdf [accessed 2019-10-08]
  35. Skycure. 2016. Mobile Security Trends in Healthcare   URL: https:/​/www.​globenewswire.com/​news-release/​2016/​04/​05/​1115839/​0/​en/​Skycure-Mobile-Threat-Intelligence-Report-Finds-One-in-Five-Doctors-Mobile-Device-Might-Be-at-High-Risk.​html [accessed 2020-05-05]
  36. Lovell T. MobiHealthNews. 2019. Whatsapp Use in the NHS a ‘Privacy and Clinical Safety Timebomb’   URL: https:/​/www.​mobihealthnews.com/​content/​whatsapp-use-nhs-%E2%80%98privacy-and-clinical-safety-timebomb%E2%80%99 [accessed 2019-10-13]
  37. Spannbauer B. Help Net Security. 2019. How Can Healthcare Organizations Remedy Their Cybersecurity Ailments?   URL: https://www.helpnetsecurity.com/2019/03/11/healthcare-organizations-cybersecurity/ [accessed 2019-09-10]
  38. Citrix. 2017. Navigating BYOD and BYOA in Healthcare Without Compromising Security   URL: https:/​/www.​citrix.com/​content/​dam/​citrix/​en_us/​documents/​analyst-report/​navigating-byod-and-byoa-in-healthcare-without-copromising-security.​pdf [accessed 2019-10-12]
  39. Spok: The Leader in Clinical Communication Solutions. 2018. 10 Facts About BYOD: Healthcare Secure Text Messaging   URL: https://www.spok.com/infographic/infographic-byod [accessed 2019-10-17]
  40. HIMSS: Healthcare Information and Management Systems. 2017. 9 Bring Your Own Device (BYOD) Challenges   URL: https://www.himss.org/9-bring-your-own-device-byod-challenges [accessed 2019-08-09]
  41. Snell E. Health IT Security. 2017. 4 Key Concerns in Healthcare Mobile Security Options   URL: https://healthitsecurity.com/news/top-4-key-concerns-in-healthcare-mobile-security-options [accessed 2019-10-19]
  42. European Data Protection Supervisor. 2019. GDPR Health Data Protection   URL: https://edps.europa.eu/data-protection/our-work/subjects/health_en [accessed 2019-10-15]
  43. Federal Register of Legislation. 2017. Healthcare Identifiers Act 2010   URL: https://www.legislation.gov.au/Details/C2017C00239 [accessed 2019-10-15]
  44. Office of the Australian Information Commissioner. 2018. Australian Privacy Principles   URL: https://www.oaic.gov.au/privacy-law/privacy-act/australian-privacy-principles [accessed 2019-10-15]
  45. Office of the Privacy Commissioner of Canada. 2018. PIPEDA Legislation and Related Regulations   URL: https:/​/www.​priv.gc.ca/​en/​privacy-topics/​privacy-laws-in-canada/​the-personal-information-protection-and-electronic-documents-act-pipeda/​r_o_p/​ [accessed 2019-10-15]
  46. Government of Ontario. 2019. Personal Health Information Protection Act, 2004, SO 2004, c3, Sched A   URL: https://www.ontario.ca/laws/statute/04p03?search=Personal+Health+Information+Protection+Act+; [accessed 2019-09-15]
  47. The US Department of Health and Human Services. 2018. Laws & Regulations   URL: https://www.hhs.gov/regulations/index.html [accessed 2019-10-15]
  48. Rice S. Dallas News. 2017. Children’s Dallas Docked $3.2 Million Over Patient Privacy Breaches   URL: https:/​/www.​dallasnews.com/​business/​health-care/​2017/​02/​02/​childrens-dallas-docked-3-2-million-over-patient-privacy-breaches/​ [accessed 2019-10-16]
  49. The US Department of Health and Human Services. 2017. $2.5 Million Settlement Shows That Not Understanding HIPAA Requirements Creates Risk   URL: https:/​/www.​hhs.gov/​about/​news/​2017/​04/​24/​2-5-million-settlement-shows-not-understanding-hipaa-requirements-creates-risk.​html [accessed 2019-10-16]
  50. Davis J. Health IT Security. 2019. Phishing Education, Training Can Reduce Healthcare Cyber Risk   URL: https://healthitsecurity.com/news/phishing-education-training-can-reduce-healthcare-cyber-risk [accessed 2019-10-22]
  51. Snell E. Health IT Security. 2017. Employee Healthcare Data Security Awareness Top Industry Threat   URL: https://healthitsecurity.com/news/employee-healthcare-data-security-awareness-top-industry-threat [accessed 2019-10-22]
  52. Optum. 2016. Security Implications of BYOD in Health Care   URL: https:/​/www.​optum.com/​content/​dam/​optum3/​optum/​en/​resources/​white-papers/​Security_Implications_White_Paper.​pdf [accessed 2019-10-23]
  53. McAfee: Security Solutions for Cloud, Endpoint, and Antivirus. 2016. Hacking the Skills Shortage: A Study of the International Shortage in Cybersecurity Skills   URL: https://www.mcafee.com/au/resources/reports/rp-hacking-skills-shortage-summary.pdf [accessed 2019-10-08]
  54. Kleyman B. Health IT Security. 2018. 4 Key Ways to Overcome Healthcare BYOD Security Challenges   URL: https://healthitsecurity.com/news/4-key-ways-to-overcome-healthcare-byod-security-challenges [accessed 2019-10-29]
  55. Malkary G. Education - Extreme Networks. 2016. 'Bring Your Own Device' (BYOD) Initiatives Enable Clinical Transformation   URL: https://learn.extremenetworks.com/BYODEnablesClinicalTransformationSpyglass_lp.html [accessed 2019-10-25]
  56. Health IT Security. 2018. Developing a Successful, Sustainable Mobile Device Management Program for Healthcare   URL: https:/​/healthitsecurity.​com/​news/​developing-a-successful-sustainable-mobile-device-management-program-for-healthcare [accessed 2019-10-27]
  57. O'Dowd E. HITInfrastructure. 2016. Why the Difference Between MDM, EMM Matters in Health IT   URL: https://hitinfrastructure.com/news/why-the-difference-between-mdm-emm-matters-in-health-it [accessed 2019-11-12]
  58. Keunemany A. Vocera. 2018. 7 Tips for Secure BYOD in Healthcare   URL: https://www.vocera.com/au/blog/7-tips-secure-byod-healthcare [accessed 2019-11-07]
  59. Health IT Security. 2016. BYOD Security in the Healthcare Setting   URL: https://healthitsecurity.com/features/what-is-healthcare-mobile-security-secure-messaging [accessed 2019-11-11]
  60. Snell E. Health IT Security. 2016. Enabling Providers to Use Truly HIPAA Compliant Email   URL: https://healthitsecurity.com/features/enabling-providers-to-use-truly-hipaa-compliant-email [accessed 2019-11-22]
  61. MobileIron. 2019. Mobile First Healthcare   URL: https://www.mobileiron.com/en/resources-library/datasheets/mobile-first-healthcare [accessed 2019-11-22]
  62. Smith R, Silva C, Silver M. Gartner Inc. 2017. Predicts 2018: Mobile, Endpoint and Wearable Computing Strategies   URL: https:/​/www.​gartner.com/​en/​documents/​3823232/​predicts-2018-mobile-endpoint-and-wearable-computing-str [accessed 2019-11-22]
  63. O'Dowd E. HITInfrastructure. 2017. Healthcare BYOD Security Embraces Cloud, Biometric Authentication   URL: https://hitinfrastructure.com/news/healthcare-byod-security-embraces-cloud-biometric-authentication [accessed 2019-11-24]
  64. Send Press Releases with GlobeNewsWire. 2017. One in Four Organizations Rely Solely on User-Generated Passwords to Secure BYOD Access   URL: http:/​/www.​globenewswire.com/​news-release/​2017/​11/​02/​1195630/​0/​en/​One-in-Four-Organizations-Rely-Solely-on-User-Generated-Passwords-to-Secure-BYOD-Access.​html [accessed 2019-11-24]
  65. Devine D. Becker's Hospital Review - Healthcare News. 2017. Bring Your Own Device (BYOD) Reality – And What to Do About It   URL: https:/​/www.​beckershospitalreview.com/​healthcare-information-technology/​bring-your-own-device-byod-reality-and-what-to-do-about-it.​html [accessed 2019-11-21]
  66. Lenova. 2018. BYOD Trends: Looking to the Future   URL: https://www.lenovo.com/au/en/solutions/smb/future-byod-tracking-trends [accessed 2019-11-11]
  67. Queensland Health. 2017. BYOD Self-Managed Service   URL: https://www.health.qld.gov.au/__data/assets/pdf_file/0031/397453/qh-imp-032-3.pdf [accessed 2019-10-21]
  68. Healthcare Information and Management Systems Society. 2017. 20 Questions to Ask About Bring Your Own Device (BYOD)   URL: https://www.himss.org/20-questions-ask-about-bring-your-own-device-byod/ [accessed 2019-10-10]
  69. Heathcote A. NHS Digital. 2017. Bring Your Own Device Security: Example Policy   URL: https:/​/digital.​nhs.uk/​services/​data-and-cyber-security-protecting-information-and-data-in-health-and-care/​cyber-and-data-security-policy-and-good-practice-in-health-and-care/​bring-your-own-device-byod-guidance-for-health-and-care-organisations/​bring-your-own-device-example-policy [accessed 2019-10-10]
  70. Snell E. Health IT Security. 2016. Is There a Healthcare Cybersecurity Skills Shortage?   URL: https://healthitsecurity.com/news/is-there-a-healthcare-cybersecurity-skills-shortage [accessed 2019-11-14]
  71. Taylor B, Silver M, Troni F, Kleynhans S. Gartner Inc. 2018. Hype Cycle for Mobile, Endpoint and Enterprise Wearable Computing, 2018   URL: https://www.gartner.com/document/3884581 [accessed 2019-11-22]
  72. O'Dowd E. HITInfrastructure. 2017. IoT, BYOD Prompt Healthcare Cloud Security Market Growth   URL: https://hitinfrastructure.com/news/iot-byod-prompt-healthcare-cloud-security-market-growth [accessed 2019-11-26]
  73. Bullock L. Forbes. 2019. The Future Of BYOD: Statistics, Predictions And Best Practices To Prep For The Future   URL: https:/​/www.​forbes.com/​sites/​lilachbullock/​2019/​01/​21/​the-future-of-byod-statistics-predictions-and-best-practices-to-prep-for-the-future/​ [accessed 2019-10-10]
  74. HealthCare Executive Group: HCEG. 2018. Healthcare Executives Rank the Top 10 For 2019   URL: https://hceg.org/healthcare-executives-rank-the-top-10-for-2019/ [accessed 2019-10-10]
  75. Spok: The Leader in Clinical Communication Solutions. 2017. The State of Mobile Communications in Healthcare: Devices, Infrastructure, and Access   URL: https://www.spok.com/spok-skim-articles/state-mobile-2017/ [accessed 2019-10-19]


BYOD: bring-your-own-device
CASB: cloud access security broker
HIMSS: Healthcare Information and Management Systems Society
HIPAA: Health Insurance Portability and Accountability Act
IAM: identity and access management
IoT: internet of things
IT: information technology
MDM: mobile device management
NHS: National Health Services
PHI: personal health information
PPT: People Policy Technology
UEM: unified endpoint management
VPN: virtual private network


Edited by G Eysenbach; submitted 09.02.20; peer-reviewed by F Seidl, B Brumen; comments to author 31.03.20; revised version received 08.04.20; accepted 09.04.20; published 18.06.20

Copyright

©Tafheem Ahmad Wani, Antonette Mendoza, Kathleen Gray. Originally published in JMIR mHealth and uHealth (http://mhealth.jmir.org), 18.06.2020.

This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR mHealth and uHealth, is properly cited. The complete bibliographic information, a link to the original publication on http://mhealth.jmir.org/, as well as this copyright and license information must be included.