Review the literature regarding mobile apps (portable devices), social media and health information management; write a 8-10 page report addressing the following:
Answer:
Security challenges of portable device as storage and application platforms are:
1. Inadequate Infrastructure and Services
2. Mobile Malware and Malvertising
3. Device Attacks and Takeovers
4. Intercepted Communications
5. Insider Threats and Human Error
6. Services and Client Confidentiality
7. Confidentiality and Disclosure
Security strategies to safeguard data on portable devices are:
1. Protect mobile devices with password control, lock screens or biometrics.
2. Install mobile anti-virus and anti-malware software on your devices.
3.Protect information in transit with encryption.
4. Use multi-factor authentication for accessing web resources, which requires a login password and a confirmation code sent to your mobile phone.
5. Regularly update all your mobile apps.
6. Use a virtual private network (VPN) when accessing WiFi.
Obstacles to securing data on social network platforms are:
1. Phishing and scam attacks.
Security strategies to safeguard data on social network platforms are:
1. Employ strong passwords.
2. Don't link personal and business accounts.
3. Get rid of accounts that aren't in use.
4. Implement a Social Media Officer
5. Stay Up To Date
Roles of government and Quasi-Government are:
1. A quasi-public government is a type of government in the private sector that is backed by a branch of government that has a public mandate to provide a given service.
2. It is used for a specific purpose such as the management of resources, financial oversight of industries, or national security issues.
3. It is created to benefit the public.
4. Example of quasi- government is Sallie Mae.
Review the literature regarding mobile apps (portable devices), social media and health information management; write a...
Title: Partners Health Care Systems (PHS): Transforming Health Care Services Delivery through Information Management According to government sources, U.S. expenditures on health care in 2009 reached nearly $2.4 trillion dollars ($2.7 trillion by the end of 2010).[1] Despite this vaunting national level of expenditure on medical treatment, death rates due to preventable errors in the delivery of health services rose to approximately 98,000 deaths in 2009.[2] To address the dual challenges of cost control and quality improvement, some have argued...
The world’s 3 billion-plus smartphones emit the kind of data that health authorities covet during outbreaks. They show where individuals are, where they’ve been and who they might have talked to or even touched — potentially offering maps to find infected people and clues to stopping new ones. But gaining access to this data, even amid a global pandemic, is made complex by the legal and ethical issues surrounding government access to information that can reveal intimate details about citizens’...
Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...
Case Study 1: Apple Merging Technology, Business, and Entertainment Why are data, information, business intelligence, and knowledge important to Apple? Give an example of each type in relation to the iPad. (1 Mark) Explain how Apple achieved business success through the use of information, information technology, and people. (1 Mark) Evaluate how Apple can gain business intelligence through the implementation of a customer relationship management system. (1 Mark) Case Study 1: Apple Merging Technology, Business, and Entertainment This might sound...