Javascript must be enabled to continue!
Securing Mobile Data Computing in Healthcare
View through CrossRef
Access to mobile data and messages is essential in healthcare environment as patients and healthcare providers are mobile. This is inline with the need of ubiquitous computing in everyday life. Mobile and wireless devices can assist in ensuring patient’s safety by providing easy availability of the data at the point of care. Portability and accessibility of these devices enhances use of them in healthcare environment. However, data integrity and confidentiality of information in them need to be ensured to provide safe, effective and efficient healthcare. Mobile healthcare involves conducting healthcare related activities through using mobile devices such as a smart phone, Personal digital assistant (PDA), wireless enabled computer, iPod and so on. Mobile computing is suitable for healthcare as healthcare providers are mobile. These would be suitable for conducting patient’s healthcare activities in emergencies, ward rounds, homecare, chronic disease management, conducting clinical trials, and so on. There are various projects using mobile devices to enhance patient’s care. With the advancement of medical informatics, telemedicine and information technology, mobile data devices play an enormous role in healthcare system. In this chapter, we outline the need of mobile devices in healthcare, usage of these devices, underlying technology and applications, importance of security of these devices, securing mobile data communication in healthcare through different security models and case examples of applications that we have developed, in particular (1) iPathology tool on iPod, (2) securing healthcare information using Pocket PC 2003, and (3) securing information on handheld devices. There were several incidents in the past due to the insecurity of mobile devices that can leak information to anyone who does not have access to the information. In this chapter, we will illustrate several techniques that we have developed to protect these malicious activities and how these are applicable for securing mobile data computing in healthcare.
Title: Securing Mobile Data Computing in Healthcare
Description:
Access to mobile data and messages is essential in healthcare environment as patients and healthcare providers are mobile.
This is inline with the need of ubiquitous computing in everyday life.
Mobile and wireless devices can assist in ensuring patient’s safety by providing easy availability of the data at the point of care.
Portability and accessibility of these devices enhances use of them in healthcare environment.
However, data integrity and confidentiality of information in them need to be ensured to provide safe, effective and efficient healthcare.
Mobile healthcare involves conducting healthcare related activities through using mobile devices such as a smart phone, Personal digital assistant (PDA), wireless enabled computer, iPod and so on.
Mobile computing is suitable for healthcare as healthcare providers are mobile.
These would be suitable for conducting patient’s healthcare activities in emergencies, ward rounds, homecare, chronic disease management, conducting clinical trials, and so on.
There are various projects using mobile devices to enhance patient’s care.
With the advancement of medical informatics, telemedicine and information technology, mobile data devices play an enormous role in healthcare system.
In this chapter, we outline the need of mobile devices in healthcare, usage of these devices, underlying technology and applications, importance of security of these devices, securing mobile data communication in healthcare through different security models and case examples of applications that we have developed, in particular (1) iPathology tool on iPod, (2) securing healthcare information using Pocket PC 2003, and (3) securing information on handheld devices.
There were several incidents in the past due to the insecurity of mobile devices that can leak information to anyone who does not have access to the information.
In this chapter, we will illustrate several techniques that we have developed to protect these malicious activities and how these are applicable for securing mobile data computing in healthcare.
Related Results
Perceptions of Telemedicine and Rural Healthcare Access in a Developing Country: A Case Study of Bayelsa State, Nigeria
Perceptions of Telemedicine and Rural Healthcare Access in a Developing Country: A Case Study of Bayelsa State, Nigeria
Abstract
Introduction
Telemedicine is the remote delivery of healthcare services using information and communication technologies and has gained global recognition as a solution to...
Mobile phone usage for m‐learning: comparing heavy and light mobile phone users
Mobile phone usage for m‐learning: comparing heavy and light mobile phone users
PurposeMobile technologies offer the opportunity to embed learning in a natural environment. The objective of the study is to examine how the usage of mobile phones for m‐learning ...
ACM SIGCOMM computer communication review
ACM SIGCOMM computer communication review
At some point in the future, how far out we do not exactly know, wireless access to the Internet will outstrip all other forms of access bringing the freedom of mobility to the way...
ESSENTIAL SECURITY PRACTICES FOR FORTIFYING MOBILE APPS
ESSENTIAL SECURITY PRACTICES FOR FORTIFYING MOBILE APPS
“Essential Security Practices for Fortifying Mobile Apps” is a definitive guide designed to empower developers, security professionals, and organizations with the knowledge and too...
Mobile Communication Studies
Mobile Communication Studies
Mobile media are recognized as the fastest-growing media category. Although mobile media users were already enjoying mobile devices in their everyday lives, prior to the millennium...
Transportation mobility management
Transportation mobility management
Today, the world has observed a remarkable growth in the use of transportation mobile communications for road safety. While a user in a vehicle moves to a new communication cell, a...
Quantum Computing and Healthcare
Quantum Computing and Healthcare
The use of quantum computing1 in healthcare represents a significant shift with the potential to revolutionize medical research, diagnostics, and treatment. Quantum computing can p...
Parent's Perception Regarding the Effects of Excessive Use of Mobile Phone on Children's Health: A Sociological Study in City Dera Ghazi Khan
Parent's Perception Regarding the Effects of Excessive Use of Mobile Phone on Children's Health: A Sociological Study in City Dera Ghazi Khan
The use of mobile phones among children has major effects on their health. Excessive and unrestricted use of mobile phones can contribute to various physical and psychological prob...

