On the security controls of portable computing devices in healthcare environments

J. S. Briggs, V. Katos, A. Bhaludin

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper reports on the findings of a study relating to the use of portable computing devices in hospitals. The investigation used as a vehicle a recently purpose developed mobile computing infrastructure, but the findings and conclusions have been generalized and could be applied to most healthcare contexts. The two main factors relating to the higher risk of the introduction of a wireless network infrastructure are the uncontrolled boundaries of the corporate (wireless) network, and the elimination of the physical security assumption concerning the mobile computing devices. The methodology adopted in this paper considers the new risks attributed to the threat vectors capable of exploiting vulnerabilities of a mobile network and proposes policy controls and considerations in order to diversify the risks of these threats being successful.

Original languageEnglish
Title of host publicationProceedings of the 7th International Network Conference, INC 2008
PublisherUniversity of Plymouth
Pages161-170
Number of pages10
ISBN (Print)9781841021881
Publication statusPublished - 2008
Event7th International Network Conference, INC 2008 - Plymouth, United Kingdom
Duration: 8 Jul 200810 Jul 2008

Conference

Conference7th International Network Conference, INC 2008
Country/TerritoryUnited Kingdom
CityPlymouth
Period8/07/0810/07/08

Keywords

  • Medical Informatics Computing
  • Personal Digital Assistant

Fingerprint

Dive into the research topics of 'On the security controls of portable computing devices in healthcare environments'. Together they form a unique fingerprint.

Cite this