Abstract
This paper reports on the findings of a study relating to the use of portable computing devices in hospitals. The investigation used as a vehicle a recently purpose developed mobile computing infrastructure, but the findings and conclusions have been generalized and could be applied to most healthcare contexts. The two main factors relating to the higher risk of the introduction of a wireless network infrastructure are the uncontrolled boundaries of the corporate (wireless) network, and the elimination of the physical security assumption concerning the mobile computing devices. The methodology adopted in this paper considers the new risks attributed to the threat vectors capable of exploiting vulnerabilities of a mobile network and proposes policy controls and considerations in order to diversify the risks of these threats being successful.
Original language | English |
---|---|
Title of host publication | Proceedings of the 7th International Network Conference, INC 2008 |
Publisher | University of Plymouth |
Pages | 161-170 |
Number of pages | 10 |
ISBN (Print) | 9781841021881 |
Publication status | Published - 2008 |
Event | 7th International Network Conference, INC 2008 - Plymouth, United Kingdom Duration: 8 Jul 2008 → 10 Jul 2008 |
Conference
Conference | 7th International Network Conference, INC 2008 |
---|---|
Country/Territory | United Kingdom |
City | Plymouth |
Period | 8/07/08 → 10/07/08 |
Keywords
- Medical Informatics Computing
- Personal Digital Assistant