This website uses cookies to ensure you have the best experience. Learn more

Mobile Computing And Social Networks Essay

1731 words - 7 pages

Maxwell Troy

CIS500 – Information Systems for Decision Making

MOBILE COMPUTING AND SOCIAL NETWORKING

Dr. Albert C. Dominic

Strayer University

August 14, 2014

Introduction
Mobile computing has created new ways in which information can be accessed and distributed. The use of wireless networking has been a major contributor factor in utilization of mobile computing. Nurses are now better suited to monitor patient’s vital signs preventing the need for periodic doctors’ visits to perform readings such as glucose levels and blood pressure readings.
Compare and contrast monitoring of patient vital signs using mobile computing technology to in-patient visits to the doctor’s ...view middle of the document...

Advantages range from increased accuracy of patient record, diagnosis of patient being simplified and at the same time, saving valuable time that can now be used to treat patient illness Yant, (2012). According to Smith, (2011) the utilization of mobile computing technology may help avoid health issues such as a stroke while simultaneously saving money for the patient and the health care system. Mobile technology has been used to monitor military veterans suffering from multiple chronic illnesses thus allowing many veterans to be cared for allowing videoconferencing updates when needed Smith, (2011). Disadvantages in using mobile computing to monitor patients range from the following; many older health care workers may face the challenge of having to learn new technology. Another problem is the potential of the system failure causing major problems with medication issue as well as communication loss Yant, (2012).
. Assess the security concerns with regard to the transmission of personal medical information over wireless networks
Data is bought and sold daily, regulations that protect medical information and who is authorized access to that information is protected by HIPPAA, however these regulations must be upgraded to include mobile technologies in the medical industry. The storage of data by hospitals mobile patient monitoring systems is susceptible to possible eavesdropping and skimming when data is being transmitted by a wireless router network Yant, (2012). Information security of patients is a factor that must be taken into consideration when using mobile technology. Patients personal information must be protected, security breakdowns may allow hackers the window of opportunity to steal patient medical information. The lack of information control is yet another disadvantage of mobile technology. Complaints and concerns have been voiced by hospitals, the potential for unauthorized personnel obtaining patients personal information in vast quantities is a very real possibility. Information can be collected by unauthorized individuals without raising awareness of others World Press, (n.d.). The transmission of medical information over wireless networks saves hospitals money and patient lives. Protection of patient health information technology is better protected when the information is stored in cloud based service Caswell, (2011). According to Caswell, (2011) some experts in the IT technological field insist that; While some people in the IT industry have stated that security risks are created when data is moved from a local source moving to remote services eliminates control. Other experts in the field argue that IT experts say Cloud Computing allows hospitals and others millions of dollars and provides more protection that could be experts say Cloud Computing saved those companies millions of dollars and is more secure than what they could have provided internally Caswell, (2011). Some advantages and disadvantages...

Other Papers Like Mobile Computing and Social Networks

Mobile Computing And Social Networking Essay

733 words - 3 pages Mobile Computing and Social Networking Arram Kadir CIS 500 08/15/2012 Health Care has taken a technological and revolutionary stand in the last few decades. With the onslaught of smart phones, wifi, various mobile technologies, social networking, and an array of data, the world has finally found a way to make online health care a real thing. “There are a lot of interesting things happening right now in the

Mobile Computing and Social Networking Essay

871 words - 4 pages -definition mobile TV, video conferencing, 3D television, and cloud computing. 4G networks are becoming pretty standard, so most of the newest and most cutting-edge phones (Samsung Galaxy S3, iPhone 5, etc.) are typically 4G phones.  4G network can download files from the Internet up to 10 times faster than with 3G. With 4G LTE, using the web from phone becomes as pleasurable as using it from computer. 3G is “3rd generation,” refers to a networking

Mobile computing and social networking

3010 words - 13 pages Mobile Computing and Social Networks by Jamia Yant June 6th, 2012   Effectiveness and Efficiency Mobile-based Applications Provide With Regard to Geolocation and Consumer Data Geolocation is a technology that uses data acquired from an individual’s computer or mobile device (any type of radio or network-connection-enabled device) to identify or describe his/her actual physical location.  (ISACA, 2011)  This technology has become

Organizations And Social Networks

1739 words - 7 pages knowledge is created in the minds of individuals, knowledge progress thrives in a rich web of communal contact amongst individuals, groups, and organizations. A learning organization provides imaginative opportunities for this knowledge to be developed and shared with others through interpersonal contact and access to documentation, and Social Medias.The most commonly use of social media networks, are Facebook and LinkedIn. "Keeping social contact

Trust and Social Networks

2229 words - 9 pages age, as shown in different studies [3]. In fact, users’ actual usage and disclosure of information in social networks is linked to the levels of risk taking attitudes more than to deep knowledge and awareness of information handling procedures. Users have consequently higher levels of trust towards the used tools, although they express their trust in a nuanced way according to the counterparty they have to deal with: friends, acquaintances and

Social Computing and Tools for Collaboration

1249 words - 5 pages , 2006, p. 15). A key feature of the new social computing trends is the use of easy-to-use, lightweight, mostly open-source computing tools. Examples include blogs, wikis, social bookmarking, peer-to-peer networks, open source communities, photo and video sharing communities, and online business networks. Many of the popular online networks have been growing dramatically; with the most spectacular examples being Facebook and YouTube, “each of

Securing Data and Infrastructure in a Cloud Computing Environment at Mobile Insurance Corporation

2584 words - 11 pages Securing Data and Infrastructure in a Cloud Computing Environment at Mobile Insurance Corporation Carrie Miller Managerial Applications of Information Technology – MIS 535 DeVry University, Keller Graduate School of Management April 13th, 2010 Contents Abstract 3 Company Background 3 Business Problem(s) 4 High Level Solution 5 Benefits of Solving the Problem 5 Business Process Changes 6 Technology or Business Practices

Relationship Between Social Networks And It"S Effect On Student Academics Performances

4158 words - 17 pages The Effect of Social Networking Sites on Students' Academic Performance in Girne American University, North Cyprus By NAPOLEON, EGEDEGBE Abstract: Social network is a platform for people share their ideals, to meet new friends and to reconnect with old friends. Social networking sites offer people new and varied ways to communicate via the internet, whether through their PC or their mobile phone. Examples include MySpace, Facebook, Skype

Mobile Cloud Computing

5666 words - 23 pages more tasks, e.g., for playing games; capturing, editing, annotating and uploading video; handling finances; managing personal health, micro payments, ticket purchase, interacting with ubiquitous computing infrastructures. Even mobile device hardware and mobile networks continue to evolve and to improve, mobile devices will always be resource-poor, less secure, with unstable connectivity, and with less energy since they are powered by battery

Mobile Computing in the Health Industry

1107 words - 5 pages overall must agree to a certain industry standard. The biggest issue regarding mobile computing technology is data security. There has however, been tremendous strides in the technologies formulated to secure patient data and to prevent eavesdropping, sniffing, active interception, or man-in-the-middle attacks. There have been many flaws found in older encryption protocols used to protect wireless networks. Improper cryptographic methods has

A Hierarchical Frameworkmodel of Mobile Security

3701 words - 15 pages as a hierarchical model in which mobile security research is partitioned into three different layers, including Property Theory, Limited Targets, and Classified Applications. Key research topics in each layer are discussed respectively in detail. In the Property Theory layer, some basic topics related to security are provided. Then, security issues in networks, computing, and multimedia processing are fused together in the Limited Targets

Related Essays

Mobile Computing And Social Networks Essay

1497 words - 6 pages Assignment 3: Mobile Computing and Social Networking CIS 500 November 24, 2013 Introduction The U.S. market for advanced patient monitoring systems has grown from $3.9 billion in 2007 to $8.9 billion in 2011 and is forecast to reach $20.9 billion by 2016, according to a study by Kalorama Information. Efforts to reduce costs in healthcare, avoid emergency room overcrowding, and prepare for a growing number of elderly patients in the years

Mobile Computing And Social Networks Essay

2686 words - 11 pages Mobile Computing and Social Networks Week 10 Term Paper CIS500 2014 Professor: 9/8/2014 Mobile Computing and Social Networking Mobile base applications are capable of providing your most sensitive information with and sometimes without your knowledge. The geolocation data can reveal a person’s physical location, and this can be done by a Global Positioning System (GPS), Internet Protocol (IP) geolocation using data bases

Cis 500 Mobile Computing & Social Networks

2391 words - 10 pages let our friends know where we are, identify popular or convenient places close to our physical location or even remotely check in to restaurants. When you leave your home, you inevitably sacrifice some of your privacy; and by sharing your location on social networks, you could put yourself at some increased level of risk. Mobile computing applications have proven to be effective, efficient, and very fast capturing data and quickly uploading it to

Mobile Computing And Social Networking Essay

1395 words - 6 pages Mobile Computing and Social Networking Mobile Computing and Social Networking Introduction The medical world has embraced information technology, particularly the growing mobile computing technology. Initially, it was used as a source of information regarding health issues. Persons were able to interact with others via blogs, social networks, video content on the internet, and use search engines to determine the state of their health