Friday, March 1, 2019

Mobile Computing in the Health Industry Essay

Computing in the health Industry Michael Murillo CIS500 Strayer University Professor Eve Yeates August 19, 2012 Introduction e rattlingplace the years, the growth of the information engineering science exertion has pioneered new developments in the discipline of erratic figuring technology. liquid computer science devices has brought about change in several organizations around the world including the banking and financial industries. One of the industries that mobile calculation has had the biggest impact is the healthcare industry.Health care providers and clinicians alike are always finding new and inventive ways to take advant get on of the mobile computing technology to increase revenues, and to improve quality of service in terms of patient care and response. However, the use and implementation of mobile computing technology within the healthcare industry has non come without its writer of problems. Laptop computers were bulky and the carts designed to tote these devices around the facility were very difficult to manage.According to the Healthcare study and Management Systems Society (HIMSS), those solutions oft failed in real-world healthcare environments, largely due to inconvenience. The introduction of mobile computing technology in its infancy stage brought about cellphones and PDAs which proved to be inconvenient as well. Now we come to the age of tablets and smartphones which has improved mobile computing technology for the healthcare industry immensely. Mobile Computing in the Healthcare Industry The mobile computing technology currently implemented in the healthcare industry has both its advantages and disadvantages.To summarize, the deliver the goods list of both pros and cons are as follows Advantages 1. Quick response to patients. diligent care questions and answers, remedies, prescriptions, and patient records are immediately available and approachible. 2. Patients have access to health check examination records, histo ry, and information utilizing mobile apps. 3. Doctors and clinicians have access to patient selective information while on the go. 4. Eliminates the use of multiple devices to access patient medical records. 5. Applications in general are simple and require no or little technical knowledge. 6. Application development for mobile solutions piece of tail be realized within modest budgets.Disadvantages 1. Technical emphasis can be a stress factor for patients as well as medical staff. 2. The input of data needs to be secured and stored. 3. The infrastructure may not be able to offer the same standards as with wired technologies. 4. The beam of light way out still unclear and needs to be defined and clarified. 5. The industry overall must agree to a certain industry standard. The biggest issue regarding mobile computing technology is data security. There has however, been tremendous strides in the technologies formulated to secure patient data and to prevent eavesdropping, sniffing, a ctive interception, or man-in-the-middle attacks.There have been many flaws found in older encoding protocols used to protect radio earningss. Improper cryptographic methods has left fit Equivalent Privacy (WEP) vulnerable to attack, especially so in a healthcare environment where we are dealing with Protected Health Information (PHI). Since then, cryptographic methods have improved. Now we have WPA2 which provides a more modern method of encryption by the use of Advanced Encryption Standards (AES) base on the Rijndael algorithm a symmetric block cipher that can process data blocks of 128bits using cipher keys with lengths of 128bits, 192bits, and 256bits.This is the highest form of encryption for wireless technology to date and there is no such method of hacking or cracking AES at this time. Another form of protection to wireless interlockings and the mobile computing industry is the introduction of the 802. 1x standard, which was developed as a actor to face the challenge s regarding wireless networks and wired networks from such vulnerabilities and threats. Port based trademark eliminated the threat of user intervention by unauthorized means of gaining access to an organizations network by providing a mechanism of authenticating the user at the tear of connection (the port).Therefore, if an unauthorized person tried to gain access into an organizations network, he/she would have to be authenticated at the port level antecedent to gaining access to resources on the network or from the network servers. Another method of providing protection to an organizations network via wireless technology is through the use of mackintosh address filtering. Access points come with a built in feature film that could allow the administrator to configure which devices can have access to the network based on the physical address of the device.These methods gave more flexibility to the network administrator in delegating control of network resources to authenticated users and preventing unauthorized access from malicious attack. The Power of Shared Experiences via Social Networking The power of mixer networking has proven to be a helpful tool in organizing care when dealing with a major illness. Carepages. com is a website designed to provide declare to families coping with cancer and other sedate illnesses. Patients can post updates on there condition, appropriate thoughts about how they are feeling.They can also share multimedia contents such as photos or videos, and obtain a flux of support from individuals from around the world experiencing the same illnesses. The power of neighborly networking call also be helpful in updating family and friends in an instant without having to take the time to make several phone calls or text messages. Amazon. coms Universal Wish List is also a creative means to have family and friends help during a time of serious illness and financial crisis. This service allows the patient to post a give care lis t of things as simple as detergent to pricey dietetical supplement drinks.

2 comments: