Annotated Bibliography

Tomer Yakov

Professor Ian Beilin

LIB 1201

Due: March 28th

Annotated Bibliography                                                            

Work Cited

 

1) Adesina , O, Ademola.  “Ensuring the security and privacy of information in mobile health-care communication systems”. South African journal of science. Vol 107, No 9/10 (2011).

 

http://www.sajs.co.za/index.php/SAJS/article/view/508/765

 

 

 The privacy, integrity and confidentiality of a patient’s data are key factors to be considered in the transmission of medical information for use by authorized health-care personnel. Mobile communication has enabled medical consultancy, treatment, drug administration and the provision of laboratory results to take place outside the hospital. With the implementation of electronic patient records and the Internet and Intranets, medical information sharing amongst relevant health-care providers was made possible. in addition acceptance of the Internet as a tool by health-care providers has not only enabled a transformation from paper-based records to electronic patient records  but has also facilitated the use of sensor networks for remote patient monitoring, which allows for easy accessibility of medical information by health-care practitioners.

 

 

 

2) Februarie, Ronald. “Ensuring the security and privacy of information in mobile health-care”. South African Journal of Science; Sep/Oct2011, Vol. 107 Issue 9/10, p26-32.

 

http://ehis.ebscohost.com.citytech.ezproxy.cuny.edu:2048/ehost/detail?sid=d3045d4d-be15-4c43-883b-f483f436ede1%40sessionmgr112&vid=1&hid=120&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=a9h&AN=69955854

 

The sensitivity of health-care information is extremely fragile and opened to all. The privacy, of a patient’s data is a key factor to be considered in the transfer of patients medical records in various ways such a physics’ and electronic. Mobile communication has enabled many medical advances such as, electronic patient records and the Internet records online. Most important issue is the following, the method in which information sharing is used by

 

 

 

 

 

 

 

 

3)Flores, a, Joe.” HIPAA: PAST, PRESENT AND FUTURE IMPLICATIONS FOR NURSES”. Online Journal of Issues in Nursing; 2005, Vol. 10 Issue 2, p131-147, 17p.

 

 

http://ehis.ebscohost.com.citytech.ezproxy.cuny.edu:2048/ehost/detail?sid=dc7b334d-b9b1-4895-86b0-fff6c8111a2b%40sessionmgr113&vid=1&hid=120&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=a9h&AN=17356286

 

The Health Insurance Portability and Accountability Act of 1996 protect private medical information. Most people are understandably clueless about it. Well HIPAA actually ordered the Department of Health and Human Services to create standards for the protection of electronically stored and submitted personal health care information. Those standards limit the use and dissemination of personal data. It forced to create a system for electronic information and to create security laws and agencies to follow all of these activities.

 

 

 

4) Goggle. Privacy Policy. Policy and procedures. Online resource.

http://www.google.com/policies/privacy/

We collect information to provide better services to all of our users – from figuring out basic stuff like which language you speak, to more complex things like which ads you’ll find most useful or the people who matter most to you online. We may collect device-specific information (such as your hardware model, operating system version, unique device identifiers, and mobile network information including phone number). Google may associate your device identifiers or phone number with your Google Account.

 

 

 

5) Shelby, Watson  Quantia.” New York State Privacy Laws Regarding Medical Information”.ehowhealth.com

 

 

. http://www.ehow.com/list_6718964_new-laws-regarding-medical-information.html

 

It is a Law concerning medical security and privacy rules and procedures for simplifying the administration of healthcare billing and automating the transfer of healthcare. In addition holds the basis of a HIPAA is a federal act helping to set a national standard for protecting the security and integrity of medical records when they are kept in electronic form.

 

 

 

 

 

6) Solomont, E.B.” Hospitals are Getting ‘Smart’ About Patient Data”. New Yorkthe sun newspaper. June 30th 2008.

 

http://www.nysun.com/health-fitness/hospitals-are-getting-smart-about-patient-data/80906/

 

InMount SinaiMedicalCenterthey are capable to carry their medical records in their wallets,. I mean the patients have special cards the hold all their information action, thanks to the new “smart” identification cards the hospital is distributing. Each one of these cards, which is the size of simple credit card, it will have a digital image of the patient and will hold a computer chip that is will hold on it 33 pages of data relating to the individual patients.

 

 

7) Waters Jennifer.” Why ID Thieves Love Social Media “. The Wall Street journal. March 25th 2012.

http://online.wsj.com/article/SB10001424052702304636404577293851428596744.html?KEYWORDS=medical+information+in+mobile+health-care+communication+systems

 

 

Smart phones are minicomputers that store vast quantities of personal information, yet many users don’t protect their smart phones the way they do laptops and PCs. Fact is that “LinkedIn, a site most users consider more “business” than “social,” had the highest identity-fraud incident rate, at 10%, versus 5% for the general population, the Javelin study found”. Well sharing information of viewing information is especially dangers on Smartphone’s or any other phones that holds an internet connection.

 

 

 

 

This entry was posted in Uncategorized and tagged . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *