On the security controls of portable computing devices in healthcare environments

This source preferred by Vasilis Katos

Authors: Briggs, J., Katos, V. and Bhaludin, A.

Start date: 1 July 2008

This data was imported from Scopus:

Authors: Briggs, J.S., Katos, V. and Bhaludin, A.

Journal: Proceedings of the 7th International Network Conference, INC 2008

Pages: 161-170

ISBN: 9781841021881

© 2008 University of Plymouth All rights reserved. This paper reports on the findings of a study relating to the use of portable computing devices in hospitals. The investigation used as a vehicle a recently purpose developed mobile computing infrastructure, but the findings and conclusions have been generalized and could be applied to most healthcare contexts. The two main factors relating to the higher risk of the introduction of a wireless network infrastructure are the uncontrolled boundaries of the corporate (wireless) network, and the elimination of the physical security assumption concerning the mobile computing devices. The methodology adopted in this paper considers the new risks attributed to the threat vectors capable of exploiting vulnerabilities of a mobile network and proposes policy controls and considerations in order to diversify the risks of these threats being successful.

The data on this page was last updated at 11:59 on June 25, 2019.