Tuesday, June 11, 2019

Mobile Health Application Research Paper Example | Topics and Well Written Essays - 500 words

Mobile Health Application - Research Paper ExampleIt is a small book for not only drug reference but also has several rules for disease pathologies. Medical students and professionals like Medscape because it has instructions on playacting medical examination procedures, videos on the actual action and detailed pictures (Sullivan, 2013).Many because of free content also love it over 7,000 drug orientations, 3,500 disease medical references and medical images about 2,500 are all free on the app. Strong drug interaction tool checker CME activities are also some features that make Medscape more(prenominal) favorable. The app regardless of features achieves the application in mobile phones and tablets. It can be accessed offline without the internet connection you only download the medical reference database (Schulk, 2013). The idea is almost true(a) to everyone since almost each person owns a smartphone (Dalrymple,2010). Despite all the benefits acquired from the app, it also has di sadvantages especially on security and privacy threats. Some of the threats includeStolen mobile device- in case the mobile device which was actively used to access, transmit and eventually store patients information on his/her health gets disoriented or is stolen, the patients data might be at massive risk of getting into wrong hands. The culprits might alter the medical information, and this may pose a great risk to persons health. In addition, medical identity theft may occur whereby another person uses a persons secern and medical number (Dixon, 2006). To avoid all these, all mobile devices used by medics must be designed to ask for passwords, special codes or fingerprints in order to gain access. Area for entering passwords must be masked so that a person cannot see it avoid cracking of the password. Remote wiping or disabling can be activated on the device, which can allow erasure of all information on the device in case it is lost or stolen and if later recovered data can be recovered by enabling the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.