Reporting and understanding the safety and adverse effect profile of mobile apps for psychosocial interventions: An update
Recent years have seen a rapidly increasing trend towards the delivery of health technology through mobile devices. Smartphones and tablet devices are thus becoming increasingly popular for accessing information and a wide range of services, including health care services. Modern mobile apps can be...
| Main Authors: | Naeem, Farooq, Gire, Nadeem, Xiang, Shuo, Yang, Megan, Syed, Yumeen, Shokraneh, Farhad, Adams, Clive E., Farooq, Saeed |
|---|---|
| Format: | Article |
| Published: |
Baishideng Publishing Group
2016
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/50102/ |
Similar Items
Development, testing and reporting of mobile apps for psycho-social interventions: lessons from the pharmaceuticals
by: Naeem, Farooq, et al.
Published: (2015)
by: Naeem, Farooq, et al.
Published: (2015)
Secure e-transactions using mobile agents with agent broker
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A survey of eMedia-delivered interventions for
schizophrenia used in randomized controlled trials
by: Naeem, Farooq, et al.
Published: (2017)
by: Naeem, Farooq, et al.
Published: (2017)
A taxonomy for information privacy in virtual collaborations
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Exploring the psychosocial needs of adults with haematological cancer under watch-and-wait
by: Russell, Katie
Published: (2023)
by: Russell, Katie
Published: (2023)
Reputation aware obfuscation for mobile opportunistic networks
by: Radenkovic, Milena, et al.
Published: (2015)
by: Radenkovic, Milena, et al.
Published: (2015)
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Adverse drug reactions in West Africa
by: Cliff-Eribo, Kennedy O.
Published: (2016)
by: Cliff-Eribo, Kennedy O.
Published: (2016)
Low-Cost RFID Identification Variation
by: Lin, K., et al.
Published: (2006)
by: Lin, K., et al.
Published: (2006)
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)
by: Syamsuddin, I, et al.
Published: (2008)
An introduction to a taxonomy of information privacy in collaborative environments
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
A new conceptual framework within information privacy: Meta privacy
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
An information privacy taxonomy for collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Special theme on privacy and the Internet of Things
by: Chamberlain, Alan, et al.
Published: (2018)
by: Chamberlain, Alan, et al.
Published: (2018)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Secure electronic commerce with mobile agents
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Secure e-transactions protocol preserving privacy for customers and bidders
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Understanding smartphone users' awareness of security and privacy in downloading third-party applications - A survey in UK and Japan
by: Kawakubo, Noriko
Published: (2013)
by: Kawakubo, Noriko
Published: (2013)
A conceptual framework for information privacy and security in collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A conceptual framework for information security and privacy
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Shield privacy: A conceptual framework for information privacy and data access controls
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
The computational view of information privacy enhancing technologies
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A conceptual framework for privacy policy negotiation in web services
by: Wu, Chen, et al.
Published: (2006)
by: Wu, Chen, et al.
Published: (2006)
Does high e-government adoption assure stronger security? A cross-country analysis of Australia and Thailand.
by: Thompson, Nik, et al.
Published: (2019)
by: Thompson, Nik, et al.
Published: (2019)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
PP-SDLC The privacy protecting systems development life cycle
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
A generic privacy ontology and its applications to different domains
by: Hecker, Michael
Published: (2009)
by: Hecker, Michael
Published: (2009)
A practice research study concerning homeless service user involvement with a programme of social support work delivered in a specialized psychological trauma service
by: Archard, P.J., et al.
Published: (2015)
by: Archard, P.J., et al.
Published: (2015)
Efficient location privacy-aware forwarding in opportunistic mobile networks
by: Zakhary, Sameh, et al.
Published: (2014)
by: Zakhary, Sameh, et al.
Published: (2014)
Usability evaluation framework for mobile apps
by: Rahmat, Hazwani
Published: (2020)
by: Rahmat, Hazwani
Published: (2020)
Privacy Perceptions of Twitter Users in Saudi Arabia.
by: ALAMR, BADR
Published: (2018)
by: ALAMR, BADR
Published: (2018)
Digital forensics framework for investigating client cloud storage applications on smartphones
by: Daryabar, Farid
Published: (2015)
by: Daryabar, Farid
Published: (2015)
Impact of DC-link fault on the dynamic performance of DFIG
by: Yunus, A., et al.
Published: (2012)
by: Yunus, A., et al.
Published: (2012)
Interpreting the Tinnitus Questionnaire (German version):
what individual differences are clinically important?
by: Hall, Deborah A., et al.
Published: (2018)
by: Hall, Deborah A., et al.
Published: (2018)
Examining the risks of social networking adoption in the Bhutanese healthcare system
by: Peldon, P., et al.
Published: (2015)
by: Peldon, P., et al.
Published: (2015)
New proxy signatures with message recovery using pairing
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Integration of situational and reward elements for fair privacy principles and preferences (F3P)
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A framework for the design of privacy preserving pervasive health care
by: Moncrieff, Simon, et al.
Published: (2009)
by: Moncrieff, Simon, et al.
Published: (2009)
A framework of privacy shield in organizational information systems
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
Similar Items
-
Development, testing and reporting of mobile apps for psycho-social interventions: lessons from the pharmaceuticals
by: Naeem, Farooq, et al.
Published: (2015) -
Secure e-transactions using mobile agents with agent broker
by: Han, Song, et al.
Published: (2005) -
A survey of eMedia-delivered interventions for
schizophrenia used in randomized controlled trials
by: Naeem, Farooq, et al.
Published: (2017) -
A taxonomy for information privacy in virtual collaborations
by: Skinner, Geoff, et al.
Published: (2006) -
Exploring the psychosocial needs of adults with haematological cancer under watch-and-wait
by: Russell, Katie
Published: (2023)