Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Securing Mobile Data Computing in Healthcare

Securing Mobile Data Computing in Healthcare
View Sample PDF
Author(s): Willy Susilo (University of Wollongong, Australia)
Copyright: 2009
Pages: 10
Source title: Medical Informatics: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Joseph Tan (McMaster University, Canada)
DOI: 10.4018/978-1-60566-050-9.ch147


View Securing Mobile Data Computing in Healthcare on the publisher's website for pricing and purchasing information.


Access to mobile data and messages is essential in healthcare environment as patients and healthcare providers are mobile. This is inline with the need of ubiquitous computing in everyday life. Mobile and wireless devices can assist in ensuring patient’s safety by providing easy availability of the data at the point of care. Portability and accessibility of these devices enhances use of them in healthcare environment. However, data integrity and confidentiality of information in them need to be ensured to provide safe, effective and efficient healthcare. Mobile healthcare involves conducting healthcare related activities through using mobile devices such as a smart phone, Personal digital assistant (PDA), wireless enabled computer, iPod and so on. Mobile computing is suitable for healthcare as healthcare providers are mobile. These would be suitable for conducting patient’s healthcare activities in emergencies, ward rounds, homecare, chronic disease management, conducting clinical trials, and so on. There are various projects using mobile devices to enhance patient’s care. With the advancement of medical informatics, telemedicine and information technology, mobile data devices play an enormous role in healthcare system. In this chapter, we outline the need of mobile devices in healthcare, usage of these devices, underlying technology and applications, importance of security of these devices, securing mobile data communication in healthcare through different security models and case examples of applications that we have developed, in particular (1) iPathology tool on iPod, (2) securing healthcare information using Pocket PC 2003, and (3) securing information on handheld devices. There were several incidents in the past due to the insecurity of mobile devices that can leak information to anyone who does not have access to the information. In this chapter, we will illustrate several techniques that we have developed to protect these malicious activities and how these are applicable for securing mobile data computing in healthcare.

Related Content

David Edson Ribeiro, Valter Augusto de Freitas Barbosa, Clarisse Lins de Lima, Ricardo Emmanuel de Souza, Wellington Pinheiro dos Santos. © 2021. 15 pages.
Juliana Carneiro Gomes, Maíra Araújo de Santana, Clarisse Lins de Lima, Ricardo Emmanuel de Souza, Wellington Pinheiro dos Santos. © 2021. 12 pages.
Maíra Araújo de Santana, Jessiane Mônica Silva Pereira, Clarisse Lins de Lima, Maria Beatriz Jacinto de Almeida, José Filipe Silva de Andrade, Thifany Ketuli Silva de Souza, Rita de Cássia Fernandes de Lima, Wellington Pinheiro dos Santos. © 2021. 19 pages.
Jessiane Mônica Silva Pereira, Maíra Araújo de Santana, Clarisse Lins de Lima, Rita de Cássia Fernandes de Lima, Sidney Marlon Lopes de Lima, Wellington Pinheiro dos Santos. © 2021. 25 pages.
Adriel dos Santos Araujo, Roger Resmini, Maira Beatriz Hernandez Moran, Milena Henriques de Sousa Issa, Aura Conci. © 2021. 35 pages.
Abir Baâzaoui, Walid Barhoumi. © 2021. 21 pages.
Marcus Costa de Araújo, Luciete Alves Bezerra, Kamila Fernanda Ferreira da Cunha Queiroz, Nadja A. Espíndola, Ladjane Coelho dos Santos, Francisco George S. Santos, Rita de Cássia Fernandes de Lima. © 2021. 44 pages.
Body Bottom