TITLE

Smartphone healthcare apps: Tricorder quality yet?

AUTHOR(S)
Schmitt, Terri L.
PUB. DATE
September 2013
SOURCE
Online Journal of Nursing Informatics;Fall2013, Vol. 17 Issue 3, p1
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
No abstract available.
ACCESSION #
91911402

 

Related Articles

  • Secure Remote Health Monitoring with Unreliable Mobile Devices. Minho Shin // Journal of Biomedicine & Biotechnology;2012, Vol. 2012, p1 

    As the nation's healthcare information infrastructure continues to evolve, new technologies promise to provide readily accessible health information that can help people address personal and community health concerns. In particular, wearable and implantable medical sensors and portable computing...

  • Unsecured Mobile Devices: The Weak Link. Raths, David // Healthcare Informatics;Feb2012, Vol. 29 Issue 2, p60 

    The article discusses a study by the Ponemon Institute LLC which found that the frequency of reported data breaches among organizations had increased 32 percent from the previous year, with unsecured mobile devices being a key source of vulnerability. Other reasons cited for the increase in...

  • A Secure Lightweight RFID Binding Proof Protocol for Medication Errors and Patient Safety. Wu, Shuhua; Chen, Kefei; Zhu, Yuefei // Journal of Medical Systems;Oct2012, Vol. 36 Issue 5, p2743 

    No abstract available.

  • Improved Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems. Cao, Tianjie; Zhai, Jingxuan // Journal of Medical Systems;Apr2013, Vol. 37 Issue 2, p1 

    In order to protect users' identity privacy, Chen et al. proposed an efficient dynamic ID-based authentication scheme for telecare medical information systems. However, Chen et al.'s scheme has some weaknesses. In Chen et al.'s scheme, an attacker can track a user by a linkability attack or an...

  • Caring and technology. Hill, Taryn L. // Online Journal of Nursing Informatics;Fall2013, Vol. 17 Issue 3, p1 

    No abstract available.

  • An App a day, are you ready for another way? Nagle, Lynn // Online Journal of Nursing Informatics;Fall2013, Vol. 17 Issue 3, p1 

    No abstract available.

  • You Can Lead a Horse to Water, but.... Effken, Judith; Benham-Hutchins, Marge; Carrington, Jane // Online Journal of Nursing Informatics;Feb2013, Vol. 17 Issue 1, p45 

    No abstract available.

  • Smartphones may increase risk of health data breaches.  // Contemporary OB/GYN;Feb2012, Vol. 57 Issue 2, p18 

    The article reports a survey which revealed that 96 percent of the respondents in the study experienced at least one health data breach, with the growing use of smartphones by physicians in past two years, with 49 percent reporting loss of device or theft.

  • BYOD policies address personal issues.  // Hospital Case Management;Mar2013, Vol. 21 Issue 3, p42 

    The article discusses the importance of developing Bring Your Own Device (BYOD) policies for healthcare organizations. It mentions that people are increasingly using personal devices for work-related communications; therefore, healthcare organizations need to formulate BYOD policies for the...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics