Abstract
The purpose of this study is to contribute to creating awareness of information security requirements in customized health applications. The study refers to how developing mobile applications affect information security in accordance with the developments in health informatics and evaluates the aspects of network and information security in the health-related systems as well as attacks and types of attacks. Today, health information systems are modeled in integrated systems as application, control, tracking and warning systems. These systems have been turning into systems that collect private information as long as they have patients on one side. With this approach, the concept of mobility has become a must in systems because of the patient. Data communication can be performed from machine to machine (M2M) between the systems without the human factor. This ensures the communication of accurate and timely data. This study contributes to health administrators awareness of information security in health with a different point of view.
Highlights
In parallel with the advancements in Health Informatics, information system security is becoming more important for individuals, agencies and institutions
This study addresses the network security in mobile health applications and the information security in health applications
The glasses as a wearable technology product used by a doctor attending to a patient in intensive care unit or in a critical treatment can broadcast the whole process to patient’s relatives
Summary
In parallel with the advancements in Health Informatics, information system security is becoming more important for individuals, agencies and institutions. There are several different studies to achieve security in health information systems. It is aimed with these studies to provide information or computer systems with security. Security software utilized to this end is of great importance in the protection of systems. This study addresses the network security in mobile health applications and the information security in health applications. It provides an overview of attacks and types of attacks on health systems from the perspective of personnel and administration
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have