Abstract

The purpose of this study is to contribute to creating awareness of information security requirements in customized health applications. The study refers to how developing mobile applications affect information security in accordance with the developments in health informatics and evaluates the aspects of network and information security in the health-related systems as well as attacks and types of attacks. Today, health information systems are modeled in integrated systems as application, control, tracking and warning systems. These systems have been turning into systems that collect private information as long as they have patients on one side. With this approach, the concept of mobility has become a must in systems because of the patient. Data communication can be performed from machine to machine (M2M) between the systems without the human factor. This ensures the communication of accurate and timely data. This study contributes to health administrators’ awareness of information security in health with a different point of view.

Highlights

  • In parallel with the advancements in Health Informatics, information system security is becoming more important for individuals, agencies and institutions

  • This study addresses the network security in mobile health applications and the information security in health applications

  • The glasses as a wearable technology product used by a doctor attending to a patient in intensive care unit or in a critical treatment can broadcast the whole process to patient’s relatives

Read more

Summary

Introduction

In parallel with the advancements in Health Informatics, information system security is becoming more important for individuals, agencies and institutions. There are several different studies to achieve security in health information systems. It is aimed with these studies to provide information or computer systems with security. Security software utilized to this end is of great importance in the protection of systems. This study addresses the network security in mobile health applications and the information security in health applications. It provides an overview of attacks and types of attacks on health systems from the perspective of personnel and administration

Objectives
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call