Preview

Annotated Bibliography on Information Technology

Good Essays
Open Document
Open Document
781 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Annotated Bibliography on Information Technology
Annotated Bibliography on Information Technology Mobile Security in the Future

Adesina, A. O., Agbele, K. K., Februarie, R., Abidoye, A. P., & Nyongesa, H. O. (2011). Ensuring the security and privacy of information in mobile health-care communication systems. South African Journal of Science, 107(9), 26-32. This research article examines the security concerns of using mobile technology systems in health care institution. Various methods of ensuring privacy and security of patient’s electronic medical information are addressed. This high quality article is relevant for present day mobile security issues. The authors utilize a host of credible references in the health care and information technology fields. Ben-Asher, N., Kirschnick, N., Sieger, H., Meyer, J., Ben-Oved, A., & Moller, S. (2011). On the need for different security methods on mobile phones. Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, Stockholm, Sweden. 465-473. doi: 10.1145/2037373.2037442 This academic collection is the evaluation of a survey of mobile users’ perception of security needs. This paper addresses the current security methods and reveals their inadequate nature. Finally, this article proposes a two-level security method for mobile user authentication. Highly relevant for examining users’ lack of knowledge concerning mobile security.
Bose, A., Hu, X., Shin, K. G., & Park, T. (2008). Behavioral detection of malware on mobile handsets. Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services, Breckenridge, CO, USA. 225-238. doi: 10.1145/1378600.1378626 This is a highly technical paper that proposes software to identify mobile threats. Using observations of mobile viruses and worms the authors provide a method of detection with an accuracy rate of more than 96%. Proposed software can be a solution to growing mobile security concerns.
Chu, H. -C.,



Bibliography: Dagon, D., Martin, T., & Starner, T. (2004). Mobile phones as computing devices: The viruses are coming! Pervasive Computing, IEEE, 3(4), 11-15. This article warns about the impending launch of viruses on mobile phones Lawton, G. (2008). Is it finally time to worry about mobile malware? Computer, 41(5), 12-14. This article takes account of the security concerns in the early 2000s and states that it’s a reality Massé, D. (2012). $389 M mobile application security market set to explode as threats increase. Microwave Journal, 55(11), 56-56. Small excerpt of the growing market of mobile security application The mobile infections threat. (2009). Spectrum, IEEE, 46(5), 12-12. This is a short article with images that simulates a major virus outbreak on a mobile device Wang, Y., Streff, K., & Raman, S. (2012). Smartphone security challenges. Computer, 45(12), 52-58. This article provides a comprehensive analysis of the current shape of the mobile market and increased security concerns

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In this article, the authors not only cite the article by A. Fishman and M. Marquis-Boire but also used their own thoughts to make their story effectively “Cyanogen Mod is an open-source firmware distribution based on Android that lets users install apps without granting all requested permissions.” and “Blackphone has an OS that is based on a fork of Android. / Despite the Blackphone’s focus on security, a data-type confusion vulnerability in its code was disclosed and fixed in January 2015. The vulnerability could have allowed remote attackers to execute arbitrary code on Blackphones.” (3), these stories will cause attention to the readers…

    • 143 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Mobile code refers to interpreted or executable content that can be downloaded and run on a user’s computer. This type of attack offers the user visiting the site a method that’s provide a rich and dynamic content to users.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Privacy and security law questions can become challenging in a telemedicine setting because of the nature of the data and the ways in which it is being used. Telemedicine is increasingly becoming a medium for generating, transmitting and storing large volumes of electronic health information, and as telemedicine platforms and delivery models continue to evolve, the ways in which providers are creating and using health information are constantly changing.…

    • 608 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    CIS 500 Term Papaer

    • 3105 Words
    • 10 Pages

    "Lookout 's State of Mobile Security Identifies Malware Designed for Profit and Privacy as 2012…

    • 3105 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    This form of technology in the health care system will aid in rural district areas where the nearest hospital or physicians’ offices is 250 miles out or for elders who are not mobile. Although this may seem great for our health care industry, there are still several concerns with this technique; misuse on the patients part, lack of security sending and receiving information as well as breach of confidentiality.…

    • 708 Words
    • 3 Pages
    Good Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    Statistics Lab week 6

    • 3844 Words
    • 14 Pages

    Use of the Internet has resulted in recognition that information technology security is of major importance to our society. This concern seems relatively new in healthcare, but information technology security is a well established domain. A large body of knowledge exists that can be applied to protect healthcare information. A general understanding of security can be obtained by understanding: 1. Security Components 2.…

    • 3844 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Gun violence in America is not at all as bad as it is in Sierra Leone and other countries with war and little law enforcement as we read about in the book a long way gone. In the book the main character Ishmael discovers that America is not at all like he heard through rap songs. When he moves to America and tells his story of being a soldier and killing people the people he talks to about it think that it is cool and Ishmael states in the book “violence in America is romanticized. I do agree with this statement that we do make war look easy and fun through movies and video games. We do not understand what it is like to be in a war and witness killing and bloodshed every day.…

    • 613 Words
    • 3 Pages
    Good Essays
  • Good Essays

    According to a recent survey of physicians, an estimate of 83% own at least one mobile device and one in four doctors use smartphones and computers in their medical practice (Barrett, 2011). There is a great concern that protected health information (PHI) may be compromised by the use of mobile devices under the Health Insurance Portability and Accountability Act (HIPAA). The HIPAA law is in effect to secure patient medical records are kept confidential and safe. The increase of patients and health care practitioners communicating not only with the patient and other medical professionals using mobile devices raises security issues of protected health information (PHI). The HIPAA Security Rule requires reasonable safeguards to protect electronic PHI’s. It is important for administrative, physical and technical safeguards to be in place to protect electronic PHI’s (ePHI).…

    • 964 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Prior to the Information Age, medical records were all stored in folders in secure filing cabinets at doctor’s offices, hospitals, or health departments. The information within the folders was confidential, and shared solely amongst the patient and physician. Today these files are fragmented across multiple treatment sites due to the branching out of specialty centers such as urgent care centers, magnetic resonance imaging, outpatient surgical centers, and other diagnostic centers. Today’s ability to store medical records electronically has made it possible to easily send these files from one location to another. However, the same technology which can unify the fragmented pieces of a patient’s medical record has the ability to also create a path for privacy and security breaches. This paper will examine how electronic medical records are used, how they are secured, how security is enforced, and what the consequences of security breaches are.…

    • 1982 Words
    • 57 Pages
    Best Essays
  • Powerful Essays

    Chartlogic Software

    • 2260 Words
    • 10 Pages

    Everyday, the lives of hundreds lies in the hands of health systems; whether it is something serious or something minor. Everyday, the lives of hundreds depends on medicine, and treatments, in order to survive another day. Everyday, new researches and software’s are being developed in order to better patients’ services. As a patient they want to know and feel that they’re personal and medical information is being secure. Patients don’t want to feel that there is the need to worry about their information getting leaked to a third party that isn’t involved in their illness or members who don’t have the patients consent to share information. They want to be able to go for a checkup knowing that the clinic has all their information from their previous visits. Many patients also rely on their patients, and clinic or hospital to keep all information together instead of having to redo a process that’s been done before.…

    • 2260 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    In the world of technology today, consumers often purchase items through the internet using their personal information such as name, date of birth and credit card numbers. This information can easily be stolen from someone who seeks to exploit weakness in a computer network. According, to (Gagne, 2012), “data breaches often occur through technical vulnerabilities, malware, compromised user credentials or opportunist attackers”. Healthcare organizations maintain patient medical and personal information through an electronic source called the electronic health record. Healthcare quality and safety requires that the right information be available at the right time to support patient care and health system management decisions. Data breaches in healthcare have become common within the last few years which is a violation of the Health Insurance Portability Accountability Act of 1996 and patient privacy. Data security is a major concern pertaining to consumers choosing a health care organization to fit their needs. Care providers and insurance companies face the increased enforcement of regulatory requirements to ensure patients of their personal information secure. The key steps to achieving data security in healthcare organizations is to following policies and procedure, conduct audit trails, data classification, data protection, encryption and disaster recovery/business continuity.…

    • 1491 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Privacy, in healthcare is defined as patient’s right to control the disclosure of his or her confidential personal information. Security is defined as all the methods, processes and technology used to protect the confidentiality and safety of patient’s personal information. Privacy is very important aspect of the patient–physician relationship. Patients share personal information with their physicians to facilitate correct diagnosis and treatment, and to avoid adverse drug interactions. Privacy and security of patients health record has always been an important issue for the healthcare facilities. The need for stronger measures for protecting patient’s information is essential with the advent of Electronic Health Record…

    • 1261 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Ethics

    • 916 Words
    • 4 Pages

    2. Explain carefully the differences between Phishing and Pharming as types of mobile malware innovations.…

    • 916 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays