.

Tuesday, May 21, 2019

Mobile Computing in the Health Industry Essay

Computing in the Health Industry Michael Murillo CIS500 Strayer University Professor Eve Yeates August 19, 2012 Introduction oer the years, the growth of the information engineering science sedulousness has pioneered mod developments in the field of mobile computing technology. Mobile computing devices has brought about change in some(prenominal) organizations around the world including the banking and financial industries. One of the industries that mobile computing has had the biggest impact is the health safeguard industry.Health aid providers and clinicians alike are constantly finding new and inventive ways to take advantage of the mobile computing technology to increase revenues, and to improve quality of service in terms of patient care and response. However, the use and implementation of mobile computing technology within the healthcare industry has not go far without its source of problems. Laptop computers were bulky and the carts designed to drive these devices aro und the facility were very difficult to manage.According to the Healthcare Information and Management Systems Society (HIMSS), those solutions frequently failed in real-world healthcare environments, largely due to inconvenience. The entranceway of mobile computing technology in its infancy stage brought about cellphones and PDAs which proved to be inconvenient as well. Now we come to the age of tablets and smartphones which has improved mobile computing technology for the healthcare industry immensely. Mobile Computing in the Healthcare Industry The mobile computing technology currently implemented in the healthcare industry has both its advantages and disadvantages.To summarize, the succeeding list of both pros and cons are as follows Advantages 1. Quick response to patients. Patient care questions and answers, remedies, prescriptions, and patient records are immediately available and accessible. 2. Patients hand access to medical records, history, and information utilizing mob ile apps. 3. Doctors and clinicians have access to patient data while on the go. 4. Eliminates the use of multiple devices to access patient medical records. 5. performances in general are simple and require no or little technical knowledge. 6. Application development for mobile solutions faecal matter be realized within modest budgets.Disadvantages 1. Technical emphasis can be a stress factor for patients as well as medical staff. 2. The input of data needs to be secured and stored. 3. The infrastructure may not be able to offer the same standards as with wired technologies. 4. The radiation issue still unclear and needs to be defined and clarified. 5. The industry overall must agree to a certain industry standard. The biggest issue regarding mobile computing technology is data security. There has however, been tremendous strides in the technologies formulated to secure patient data and to prevent eavesdropping, sniffing, active interception, or man-in-the-middle attacks.There ha ve been many flaws found in older encryption protocols used to protect wireless networks. Improper cryptographic methods has left Wired analogous Privacy (WEP) vulnerable to attack, especially so in a healthcare environment where we are dealing with Protected Health Information (PHI). Since then, cryptographic methods have improved. Now we have WPA2 which provides a more sophisticated method of encryption by the use of Advanced Encryption Standards (AES) based on the Rijndael algorithm a symmetric block cipher that can process data blocks of 128bits using cipher keys with lengths of 128bits, 192bits, and 256bits.This is the highest form of encryption for wireless technology to date and there is no such method of hacking or cracking AES at this time. Another form of tax shelter to wireless networks and the mobile computing industry is the introduction of the 802. 1x standard, which was developed as a gist to face the challenges regarding wireless networks and wired networks from s uch vulnerabilities and threats. Port based authentication eliminated the threat of user intervention by unauthorized means of gaining access to an organizations network by providing a mechanism of authenticating the user at the point of connection (the port).Therefore, if an unauthorized person tried to gain access into an organizations network, he/she would have to be authenticated at the port level prior to gaining access to resources on the network or from the network servers. Another method of providing protection to an organizations network via wireless technology is through the use of MAC address filtering. Access points come with a built in feature that could allow the administrator to configure which devices can have access to the network based on the physical address of the device.These methods gave more flexibility to the network administrator in commission control of network resources to authenticated users and preventing unauthorized access from malicious attack. The Power of Shared Experiences via Social Networking The power of social networking has proven to be a facilitatory tool in organizing assistance when dealing with a major illness. Carepages. com is a website designed to provide support to families coping with cancer and other serious illnesses. Patients can post updates on there condition, share thoughts about how they are feeling.They can also share multimedia contents such as photos or videos, and have got a flux of support from individuals from around the world experiencing the same illnesses. The power of social networking call also be helpful in updating family and friends in an instant without having to take the time to make several phone calls or text messages. Amazon. coms Universal Wish List is also a fanciful means to have family and friends help during a time of serious illness and financial crisis. This service allows the patient to post a wish list of things as simple as detergent to pricey dietary supplement drinks.

No comments:

Post a Comment