Annotated Bibliography on Information Technology Mobile Security in the Future
Adesina, A. O., Agbele, K. K., Februarie, R., Abidoye, A. P., & Nyongesa, H. O. (2011). Ensuring the security and privacy of information in mobile health-care communication systems. South African Journal of Science, 107(9), 26-32. This research article examines the security concerns of using mobile technology systems in health care institution. Various methods of ensuring privacy and security of patient’s electronic medical information are addressed. This high quality article is relevant for present day mobile security issues. The authors utilize a host of credible references in the health care and information technology fields. Ben-Asher,
…show more content…
Multimedia Systems, 17(4), 341-349. doi: 10.1007/s00530-010-0216-7 This case study compares desktop PCs to mobile devices in terms of cyberterrorism. The authors make the conclusion that cybercrimes can be deployed using modern day cellphone through web 2.0 applications. This study solidifies mobile security concerns.
Dagon, D., Martin, T., & Starner, T. (2004). Mobile phones as computing devices: The viruses are coming! Pervasive Computing, IEEE, 3(4), 11-15. This article warns about the impending launch of viruses on mobile phones. The advent of Internet-enabled mobiles has increased the threats of mobile viruses exponentially. Examining the types of attacks and the impacts on the users. Even though published before it’s time, this article is still very relevant for modern concerns.
Lawton, G. (2008). Is it finally time to worry about mobile malware? Computer, 41(5), 12-14. This article takes account of the security concerns in the early 2000s and states that it’s a reality. Provides a “long-range outlook” to mobile technology makers in designing future mobile devices. Concepts can be used in future security frameworks.
Massé, D. (2012). $389 M mobile application security market set to explode as threats increase. Microwave Journal, 55(11), 56-56. Small excerpt of the growing market of mobile security application. Focuses on the creating of a new
Securing larger volumes of data than before, health care providers must be able to adapt to new methods of data storage and access of patient records. Security breaches in health care organizations is lost or stolen from unencrypted devices and media where the provider is using to retrieve records. As more health providers continue to use mobile devices to access pertinent information from electronic medical records systems the chances for breach increases so dramatically. (Rogers,
This article gives a synopsis of threats to the mobile devices and the data existing in them and the available defenses. It classifies seven different types of threats on mobile devices and then it discusses about the precautions that can be taken to avoid these threats. It recommends how to prioritize the different threats and defenses.
However mobile devices also represent a significant risk to information security and data security as, if the appropriate security applications and procedures are not applied, they can be a conduit for unauthorized access to the Eastern Widgets’ data and IT infrastructure. This can subsequently lead to data leakage and system infection. Eastern Widgets has a requirement to protect its information assets in order to safeguard its customers, intellectual property and reputation. This policy outlines a set of practices and requirements for the safe use of mobile devices.
The authors have organized the article very logically by giving a series of problems that link together can make the smartphone insecure by giving the examples of outside sources: operating system security issues of L. Xing et al., “Unauthorized Cross-App Resource Access on MAC OSX and iOS,”, memory corruption attacks of E. Schwartz et al., “Q: Exploit Hardening Made Easy,”, etc. These logical series can build stronger relationships to the ethos and pathos to make their writing more effective.
The goal is to protect patients through a network of patient safety databases. There’s no doubt that mobile health technology improves patient care, engagement, and physician productivity. But, the security risks are vast.
New technology has spurred innovative ways to spend money. As mobile payment systems continually develop, consumer financial and personal information risk exposure. Industry officials state the technology is growing, but security specialists argue growth of will inevitably attract fraud. Smartphone owners must treat their phones as a miniature computer and equip proper anti-virus and malware software. Enacting preventative methods will help thwart security breaches over mobile networks. (Ladendorf, 2013)
Today’s technology-based society is plagued with an over abundance of mobile devices. These devices now control our homes, our transportation, and our
In a world full of electronics it would only seem logical to have health records electronic. Not only are medical records efficient, reliable, and quick to access, new technology allow patients to access their own personal medical records with a simple to use login and password. “People are asking whether any kind of electronic records can be made safe. If one is looking for a 100% privacy guarantee, the answer is no”(Thede, 2010). At my hospital, upon every admission we ask the patient for a password for friends and family to have to have if they would like an update on the patient 's condition. We do not let visitors come up and see the patient without the patient 's consent. In doing these things, we help to ensure the safety and protection of the patient 's health information and privacy.
In today’s society, medical records becomes a huge issue. In many organizations such as healthcare, patient confidentiality becomes a high concern. Having internet health services, creates a challenge for compliance in healthcare. Providers have treated application security and infrastructure security independently until now. Access must be secured for clinical applications to alleviate the concern from providers in healthcare. Therefore, IT infrastructure must be protected from hackers, misusing information as well as thieves. (FairWarning, n.d.)
In light of available security measures and their widespread acceptance within the information security community, there is no excuse for healthcare organizations to fail in fulfilling their duty to protect personal patient information. Guaranteeing the confidentiality and privacy of data in healthcare information is crucial in safeguarding the data of patients as there should be a legal responsibility to protect medical records from unauthorized access.
Information security and privacy is occupying a most important role in the healthcare territory in order to deliver protected information process to their patients (Appari, & Johnson, 2010). As healthcare department is the organization with vast data and essential information the hospitals has to keep a useful information security technique in their enterprise process (Mishra et al., 2011). Information security is one such phase in the healthcare sphere which is extremely problematic to describe and evaluate even to the individuals who are working on the process. In the healthcare organization, information is of many types which required for the work and even the security is a main control for almost all the practices which are transmitted out in the healthcare field (Appari, & Johnson, 2010). Hospitals, in specific, have been instructed to create a new set of security specialists to protect healthcare data tools techniques upon which exists may rely. Healthcare data is very critical for patients because it is very confidential records. If a medical apparatus is filled with a computer virus it can even exemplify a possibility to patients ' lives. Hence, hospitals should design alertness of the risk, to defend against concerns to healthcare databanks and be concerned about the high risk of infected computers or medical tools being connected to their networks (Mishra et al., 2011).
Preview of Main Points: Threats on mobiles, what to secure (how it works), and how to secure it order to prevent threats from happening.
Malware is a serious issue that is constantly threatening our security and privacy. As discussed in class malware is malicious software and it comes in a variety of forms such as computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other programs. These programs can harm the user by stealing their information and infecting their devices and it does a effective job of multiplying and spreading. Since malware poses a threat to our security and privacy it is essential to provide defenses against mobile malware by increasing knowledge of the problem and how to better the mobile anti-virus programs but also how to increase awareness and warn other people and companies of potential malware and viruses heading their
According to the U.S. Department of Homeland Security in the article Cyber Threats to Mobile Phones, phones are now sharing hardware and software similar to a PC and becoming each time more like a PC. Therefore, the risks of being hacked are increasing, allowing hackers to attack mobile devices the same way as if they were doing it with a regular PC. Personal and professional information are more often stored on mobile devices therefore it is imperative to have our data secure. Security solutions for mobile devices are not as broad or high-tech as those for PCs. The majority of mobile security relies on the proper use and smart choices that the user makes on a daily basis to be protected against cyber attacks. Even the most careful person can be attacked but the possibilities of that happening are less when you are proactive.
Milligan, P., & Hutcheson, D. (2008). Business risks and security assessment for mobile devices, Audit and Control Association. www.isaca.org