2007
DOI: 10.1016/j.ijmedinf.2006.06.002
|View full text |Cite
|
Sign up to set email alerts
|

Risk analysis of information security in a mobile instant messaging and presence system for healthcare

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 64 publications
(30 citation statements)
references
References 6 publications
0
30
0
Order By: Relevance
“…Kukulska-Hulme (2008) and noted that mobile-assisted language learning (MALL) provides students with rich, real-time, convenient, social contact, collaborative, and contextual learning [5][6]. Various channels, such as Facebook groups, Twitter, WhatsApp, and WeChat, are available for learners, each with different characteristics [7]. Peslak (2010) used the theory of reasoned action (TRA) to explore the behavior of instant messaging at a small university in the US [8].…”
Section: State Of Artmentioning
confidence: 99%
“…Kukulska-Hulme (2008) and noted that mobile-assisted language learning (MALL) provides students with rich, real-time, convenient, social contact, collaborative, and contextual learning [5][6]. Various channels, such as Facebook groups, Twitter, WhatsApp, and WeChat, are available for learners, each with different characteristics [7]. Peslak (2010) used the theory of reasoned action (TRA) to explore the behavior of instant messaging at a small university in the US [8].…”
Section: State Of Artmentioning
confidence: 99%
“…Furthermore, according to (Bones et al, 2007) performed a risk analysis study to analyse the security challenges of an instant messaging (IM) service for healthcare industry based on CORAS risk management process framework. The methodology was based on the Australian and New Zealand standard for risk management (AS/NZS 4360/1999), which clearly sets out the risk analysis process in five main steps.…”
Section: Information Security Risk Analysis Methodsmentioning
confidence: 99%
“…The use of mobile phones and mobile technologies is well documented in fields such as the banking sector [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22], distance learning and mobile learning [35][36], the marketing sector [3][4], and in the health care sector [31]. The use of mobile technologies in health has led to the development of m-Health [31][32][33][34][35][36][37].…”
Section: Mobile Phones Mobile Technologies and M-health Emergencementioning
confidence: 99%
“…In the treatment of tuberculosis and HIV/AIDS for example where adherence to treatment is of key importance, mobile technologies have been used to improve adherence to treatment through the use of reminder messages [11][12][13][14][15][16][17][18][19]. Messages particularly have a great potential and according to Bønes et al [7] they are effective and suitable for instant notification because messages are delivered immediately and have become a valuable communication media very familiar to users in developing countries.…”
Section: Mobile Phones Mobile Technologies and M-health Emergencementioning
confidence: 99%