Information Security Requirements of Customized Mobile Health Applications
نویسندگان
چکیده
منابع مشابه
Information Security Requirements for Implementing Electronic Health Records in Iran
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
متن کاملInformation Security Requirements for Implementing Electronic Health Records in Iran
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
متن کاملinformation security requirements for implementing electronic health records in iran
background and goal: ict development in recent years has created excellent developments in human social and economic life. one of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (ehr).the purpose of this research is to investigate the effects information security requirements in electronic health records a...
متن کاملCustomized network management based on applications requirements
To manage current network environments we have to change the existent network and systems management paradigms, if we even can admit that one exists. Network Management shouldnot be restricted to protocols, MIB definition, and associated instrumentation. In the end, what is really important is to satisfy user application requirements. One should note that blindly monitoring raw MIB data values ...
متن کاملDatabase Security Meets Mobile Requirements
Mobile work including mobile devices and wireless links comprehends a row of problems concerning security issues like availability, conndentiality, and accountability. Mobile processed information in database systems are distributed, heterogeneous, and repli-cated. They are endangered by various threats based on user's mobility and restricted mobile resources of portable devices and wireless li...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Health Care Academician Journal
سال: 2017
ISSN: 2148-7472
DOI: 10.5455/sad.13-1493676116