2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) 2016
DOI: 10.1109/mipro.2016.7522357
|View full text |Cite
|
Sign up to set email alerts
|

Challenges of mobile device use in healthcare

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“… Secure Mobile Devices: Many healthcare providers use mobile devices in their work, and also the patient uses the mobile devices to collect PGHD these can be a potential security risk if not properly secured. Vrhovec et al [ 82 ] examines the proliferation of mobile devices in healthcare and the consequent security risks, noting that 44% of data breaches in healthcare are linked to mobile device use. It highlights the benefits of mobile devices, such as improved healthcare worker coordination and reduced data redundancy, while also addressing the significant security challenges posed by rapid technology adoption, including device theft, insecure applications, and inadequate security management.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“… Secure Mobile Devices: Many healthcare providers use mobile devices in their work, and also the patient uses the mobile devices to collect PGHD these can be a potential security risk if not properly secured. Vrhovec et al [ 82 ] examines the proliferation of mobile devices in healthcare and the consequent security risks, noting that 44% of data breaches in healthcare are linked to mobile device use. It highlights the benefits of mobile devices, such as improved healthcare worker coordination and reduced data redundancy, while also addressing the significant security challenges posed by rapid technology adoption, including device theft, insecure applications, and inadequate security management.…”
Section: Resultsmentioning
confidence: 99%
“…RQS1 [76][77][78][79][80][81][82][83][84][85] explores several important strategies that can help safeguard the security and privacy of PGHD. These include restricting data access to authorized personnel only, implementing robust data usage controls, maintaining audit trails to monitor data access, encrypting data at rest and in transit, securing mobile devices used to collect PGHD, mitigating risks associated with connected devices, conducting regular risk assessments to identify vulnerabilities, educating healthcare staff about security protocols, and carefully considering how to integrate PGHD into electronic medical record systems.…”
mentioning
confidence: 99%
“…Therefore, there is a gap in the motivational theories that would focus on individuals outside of the organizational context. Such insights would also benefit the research on the motivation of individuals in organizational contexts as people tend to behave similarly at work and at home [22]. This paper focuses on the effect of privacy concerns and perceived threats of individual social network users on intention for engaging in self-protective behavior.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand 44 percent of data breaches happen in healthcare alone [8,49]. In an evaluation of mHealth solutions and corresponding studies McKay et al [37] point out the "lack of information in any of these studies about readability, privacy or security".…”
Section: Introductionmentioning
confidence: 99%