Monday, February 3, 2020
Mobile Health Application Research Paper Example | Topics and Well Written Essays - 500 words
Mobile Health Application - Research Paper Example It is a small book for not only drug reference but also has several rules for disease pathologies. Medical students and professionals like Medscape because it has instructions on performing medical procedures, videos on the actual action and detailed pictures (Sullivan, 2013). Many because of free content also love it; over 7,000 drug orientations, 3,500 disease medical references and medical images about 2,500 are all free on the app. Strong drug interaction tool checker CME activities are also some features that make Medscape more favorable. The app regardless of features achieves the application in mobile phones and tablets. It can be accessed offline without the internet connection; you only download the medical reference database (Schulk, 2013). The idea is almost real to everyone since almost each person owns a smartphone (Dalrymple,2010). Despite all the benefits acquired from the app, it also has disadvantages especially on security and privacy threats. Some of the threats include: Stolen mobile device- in case the mobile device which was actively used to access, transmit and eventually store patientââ¬â¢s information on his/her health gets lost or is stolen, the patients data might be at great risk of getting into wrong hands. The culprits might alter the medical information, and this may pose a great risk to personââ¬â¢s health. In addition, medical identity theft may occur whereby another person uses a personââ¬â¢s name and medical number (Dixon, 2006). To avoid all these, all mobile devices used by medics must be designed to ask for passwords, special codes or fingerprints in order to gain access. Area for entering passwords must be masked so that a person cannot see it avoid cracking of the password. Remote wiping or disabling can be activated on the device, which can allow erasure of all information on the device in case it is lost or stolen and if later recovered data can be recovered by enabling the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.