Question

Review the literature regarding mobile apps (portable devices), social media and health information management; write a...

Review the literature regarding mobile apps (portable devices), social media and health information management; write a 8-10 page report addressing the following:

  • Determine the security challenges of portable device as storage and application platforms.
  • Recommend security strategies to safeguard data on portable devices.
  • Investigate social networks as a new and unregulated frontier in health information exchange.
  • Identify obstacles to securing data on social network platforms.
  • Recommend security strategies to safeguard data on social network platforms.
  • Discuss the role of government and quasi-government agencies have in implementing policy surrounding the use of mobile applications and social media in health information management.
  • Create a PowerPoint presentation that informs your superiors of your findings (10 slide minimum with speaker notes).
0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer:

Security challenges of portable device as storage and application platforms are:

1. Inadequate Infrastructure and Services

2. Mobile Malware and Malvertising

3. Device Attacks and Takeovers

4. Intercepted Communications

5. Insider Threats and Human Error

6. Services and Client Confidentiality

7. Confidentiality and Disclosure

Security strategies to safeguard data on portable devices are:

1. Protect mobile devices with password control, lock screens or biometrics.

2. Install mobile anti-virus and anti-malware software on your devices.

3.Protect information in transit with encryption.

4. Use multi-factor authentication for accessing web resources, which requires a login password and a confirmation code sent to your mobile phone.

5. Regularly update all your mobile apps.

6. Use a virtual private network (VPN) when accessing WiFi.

Obstacles to securing data on social network platforms are:

1. Phishing and scam attacks.

Security strategies to safeguard data on social network platforms are:

1. Employ strong passwords.

2. Don't link personal and business accounts.

3.  Get rid of accounts that aren't in use.

4. Implement a Social Media Officer

5. Stay Up To Date

Roles of government and Quasi-Government are:

1. A quasi-public government is a type of government in the private sector that is backed by a branch of government that has a public mandate to provide a given service.

2. It is used for a specific purpose such as the management of resources, financial oversight of industries, or national security issues.

3. It is created to benefit the public.

4. Example of quasi- government is Sallie Mae.

Add a comment
Know the answer?
Add Answer to:
Review the literature regarding mobile apps (portable devices), social media and health information management; write a...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Title: Partners Health Care Systems (PHS): Transforming Health Care Services Delivery through Information Management According to...

    Title: Partners Health Care Systems (PHS): Transforming Health Care Services Delivery through Information Management According to government sources, U.S. expenditures on health care in 2009 reached nearly $2.4 trillion dollars ($2.7 trillion by the end of 2010).[1] Despite this vaunting national level of expenditure on medical treatment, death rates due to preventable errors in the delivery of health services rose to approximately 98,000 deaths in 2009.[2] To address the dual challenges of cost control and quality improvement, some have argued...

  • The world’s 3 billion-plus smartphones emit the kind of data that health authorities covet during outbreaks....

    The world’s 3 billion-plus smartphones emit the kind of data that health authorities covet during outbreaks. They show where individuals are, where they’ve been and who they might have talked to or even touched — potentially offering maps to find infected people and clues to stopping new ones. But gaining access to this data, even amid a global pandemic, is made complex by the legal and ethical issues surrounding government access to information that can reveal intimate details about citizens’...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Case Study 1: Apple Merging Technology, Business, and Entertainment Why are data, information, business intelligence, and...

    Case Study 1: Apple Merging Technology, Business, and Entertainment Why are data, information, business intelligence, and knowledge important to Apple? Give an example of each type in relation to the iPad. (1 Mark) Explain how Apple achieved business success through the use of information, information technology, and people. (1 Mark) Evaluate how Apple can gain business intelligence through the implementation of a customer relationship management system. (1 Mark) Case Study 1: Apple Merging Technology, Business, and Entertainment This might sound...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT