Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Securing Mobile Data Computing in Healthcare

View through CrossRef
Access to mobile data and messages is essential in healthcare environment as patients and healthcare providers are mobile. This is inline with the need of ubiquitous computing in everyday life. Mobile and wireless devices can assist in ensuring patient’s safety by providing easy availability of the data at the point of care. Portability and accessibility of these devices enhances use of them in healthcare environment. However, data integrity and confidentiality of information in them need to be ensured to provide safe, effective and efficient healthcare. Mobile healthcare involves conducting healthcare related activities through using mobile devices such as a smart phone, Personal digital assistant (PDA), wireless enabled computer, iPod and so on. Mobile computing is suitable for healthcare as healthcare providers are mobile. These would be suitable for conducting patient’s healthcare activities in emergencies, ward rounds, homecare, chronic disease management, conducting clinical trials, and so on. There are various projects using mobile devices to enhance patient’s care. With the advancement of medical informatics, telemedicine and information technology, mobile data devices play an enormous role in healthcare system. In this chapter, we outline the need of mobile devices in healthcare, usage of these devices, underlying technology and applications, importance of security of these devices, securing mobile data communication in healthcare through different security models and case examples of applications that we have developed, in particular (1) iPathology tool on iPod, (2) securing healthcare information using Pocket PC 2003, and (3) securing information on handheld devices. There were several incidents in the past due to the insecurity of mobile devices that can leak information to anyone who does not have access to the information. In this chapter, we will illustrate several techniques that we have developed to protect these malicious activities and how these are applicable for securing mobile data computing in healthcare.
Title: Securing Mobile Data Computing in Healthcare
Description:
Access to mobile data and messages is essential in healthcare environment as patients and healthcare providers are mobile.
This is inline with the need of ubiquitous computing in everyday life.
Mobile and wireless devices can assist in ensuring patient’s safety by providing easy availability of the data at the point of care.
Portability and accessibility of these devices enhances use of them in healthcare environment.
However, data integrity and confidentiality of information in them need to be ensured to provide safe, effective and efficient healthcare.
Mobile healthcare involves conducting healthcare related activities through using mobile devices such as a smart phone, Personal digital assistant (PDA), wireless enabled computer, iPod and so on.
Mobile computing is suitable for healthcare as healthcare providers are mobile.
These would be suitable for conducting patient’s healthcare activities in emergencies, ward rounds, homecare, chronic disease management, conducting clinical trials, and so on.
There are various projects using mobile devices to enhance patient’s care.
With the advancement of medical informatics, telemedicine and information technology, mobile data devices play an enormous role in healthcare system.
In this chapter, we outline the need of mobile devices in healthcare, usage of these devices, underlying technology and applications, importance of security of these devices, securing mobile data communication in healthcare through different security models and case examples of applications that we have developed, in particular (1) iPathology tool on iPod, (2) securing healthcare information using Pocket PC 2003, and (3) securing information on handheld devices.
There were several incidents in the past due to the insecurity of mobile devices that can leak information to anyone who does not have access to the information.
In this chapter, we will illustrate several techniques that we have developed to protect these malicious activities and how these are applicable for securing mobile data computing in healthcare.

Related Results

Perceptions of Telemedicine and Rural Healthcare Access in a Developing Country: A Case Study of Bayelsa State, Nigeria
Perceptions of Telemedicine and Rural Healthcare Access in a Developing Country: A Case Study of Bayelsa State, Nigeria
Abstract Introduction Telemedicine is the remote delivery of healthcare services using information and communication technologies and has gained global recognition as a solution to...
Negotiating Mobile Phone Usage for MHealth by Maternal Healthcare Clients Who Do Not Own Mobile Phones in rural Malawi
Negotiating Mobile Phone Usage for MHealth by Maternal Healthcare Clients Who Do Not Own Mobile Phones in rural Malawi
In poor-resource settings, owning a mobile phone could be an advantage to using developmental interventions based on mobile phones. However, maternal mHealth interventions in these...
Everyday Life in the "Tourist Zone"
Everyday Life in the "Tourist Zone"
This article makes a case for the everyday while on tour and argues that the ability to continue with everyday routines and social relationships, while at the same time moving thro...
Analisis SWOT Mobile Dictionary Pleco dan Hanping Lite
Analisis SWOT Mobile Dictionary Pleco dan Hanping Lite
Penelitian berjudul “Analisis SWOT Mobile Dictionary Pleco dan Hanping Lite” dirancang sebagai pedoman pengguna untuk menentukan Mobile Dictionary yang sesuai dengan kebutuhan ...
A NOVEL APPROACH FOR MOBILE WALLET SECURITY AND MONEY ASSOCIATE’S SECURITY
A NOVEL APPROACH FOR MOBILE WALLET SECURITY AND MONEY ASSOCIATE’S SECURITY
 Mobile money refers to performing monetary transactions using telecommunications networks. This activity is intended to be referred to as "mobile money." The rapid use of mobile m...
The Hazards of Data Mining in Healthcare
The Hazards of Data Mining in Healthcare
From the mid-1990s, data mining methods have been used to explore and find patterns and relationships in healthcare data. During the 1990s and early 2000's, data mining was a topic...
Revolutionizing multimodal healthcare diagnosis, treatment pathways, and prognostic analytics through quantum neural networks
Revolutionizing multimodal healthcare diagnosis, treatment pathways, and prognostic analytics through quantum neural networks
The advent of quantum computing has introduced significant potential to revolutionize healthcare through quantum neural networks (QNNs), offering unprecedented capabilities in proc...

Back to Top