Mobile Device Essays (Examples)

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

… from everyday objects to provide real-time analyses and new applications for these technologies are being developed every day. Indeed, there are already more mobile device in use around the world than there are people, and most authorities agree that the Internet of Things deployments will continue to increase … – and software engineers and IT professionals are hard at work to exploit these technologies even further, including using cloud-based technologies and sensor-equipped device to collect, aggregate and analyze a wide range of data in real time.
Although there are different IT platforms that are currently being … many businesses at present is the Internet of Things or IoT. For example, according to An and Wang (2018), “After the Internet and mobile communication network, the Internet of Things has become an important trend in the development of information technology, greatly promoting the reform of the … advantage, especially in an……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Studyspark

Study Document Study Document

Twitter External Internal Analysis Report To CEO

Pages: 15 (4857 words) Sources: 1 Document Type:Essay Document #:23822356

… symbol of freedom (C-147)
1.3.2. The need to express feelings and experiences without a character constraint. The popularity of internet and social media device has allowed social media companies to ensure that their platform is optimized for mobile device. Encouraging real-time interactions. (C-141)
1.3.3. Global celebrities like Rihanna, Lady Gaga, Jimmy Fallon, and Taylor Swift use Twitter to communicate with their fans, … million (C-143)
1.5. Ecological
1.5.1. Data centres require electricity and total energy use is increasing. (C-142)
1.5.2. In order to access social media, mobile phones and laptops are often used. These device have their own carbon footprint.
1.6. Legal
1.6.1. Freedom of speech is suppressed in Jared Taylor case. Users believe that platforms like Twitter …
· Twitter's global platform allows users to instantly share real-time breaking news, clip opinions, and knowledge and can be accessed using desktop or mobile web browsers (C-142).
3.2 Marketing and……

References

References

Thompson, Arthur A.,. (2015). Crafting and Executing Strategy: Concepts and Readings..New York: McGraw-Hill Education, (pp. 138-148)

Studyspark

Study Document Study Document

Care Plan

Pages: 6 (1764 words) Sources: 6 Document Type:Case Study Document #:78842568

… on the app for all the health professionals to access it. For women who can’t access a teleultrasound, the program will have the device placed in offices near the women so as to alleviate the need to travel a long distance to the nearest hospitals offering ultrasound … of complications in high-risk pregnancies e.g. hypertension, diabetes, obesity. In addition to a tool to manage these complications, there will also be wearable device for use as educations and/or counseling tools. The app will provide a notification system where women can be reminded on time for their ……

References

References

American College of Obstetricians and Gynecologists. (2015). ACOG Practice Bulletin No. 156: Obesity in pregnancy. Obstetrics and Gynecology, 126(6), e112–126.

Gallardo, A. & Martin, N. (2017, Sept. 5). Another Thing Disappearing From Rural America: Maternal Care. ProPublica. Retrieved from  https://www.propublica.org/article/another-thing-disappearing-from-rural-america-maternal-care 

Healy, J. (2018, July 17). It’s 4 A.M. The Baby’s Coming. But the Hospital Is 100 Miles Away. The New York Times. Retrieved from  https://www.nytimes.com/2018/07/17/us/hospital-closing-missouri-pregnant.html 

Hung, P., Henning-Smith, C. E., Casey, M. M., & Kozhimannil, K. B. (2017). Access to obstetric services in rural counties still declining, with 9 percent losing services, 2004–14. Health Affairs, 36(9), 1663-1671.

Lowery, C. (2018). “Chapter 6: High-Risk Obstetrics and Telehealth,” in Rheuban, K.S. & Krupinski, E.A., Understanding Telehealth. McGraw-Hill Education. 

National Institutes of Health, (2017). What is a high-risk pregnancy? Retrieved from  https://www.nichd.nih.gov/health/topics/pregnancy/conditioninfo/high-risk 

Studyspark

Study Document Study Document

Investigative Conclusion And Testimony

Pages: 9 (2819 words) Sources: 6 Document Type:Research Paper Document #:77583608

… the results of the investigation could provide the basis for legal action with the options available for the organization being inclusive of: personal device subpoena, permanent injunction, or just a restraining order.
Section II
Question 1: Identify, for the lab, what digital or non-digital evidence you would … interest given that Mr. Belcamp could have tried to cover his tracks by either deleting stored data or transferring it to other storage device.
Question 2: Locations outside of Mr. Belcamp's immediate work space where pertinent digital evidence might be found
Outside of Mr. Belcamp workplace, there ……

References

References

Adam, C. (2016). Forensic Evidence in Court: Evaluation and Scientific Opinion. Hoboken, NJ: John Wiley & Sons.

Casey, E. (Ed.). (2009). Handbook of Digital Forensics and Investigation. Burlington, MA: Academic Press.

Maras, M. (2014). Computer Forensics: Cybercriminals, Laws, and Evidence (2nd ed.). Burlington, MA: Jones & Bartlett Publishers.

Newman, R.C. (2007). Computer Forensics: Evidence Collection and Management. New York, NY: CRC Press.

Reddy, N. (2019). Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations. New York, NY: Springer.

U.S. Department of Justice (2018). Reporting Intellectual Property Crime: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft. Retrieved from  https://www.justice.gov/criminal-ccips/file/891011/download 

Studyspark

Study Document Study Document

Privacy In Social Networks Regarding Machine Learning

Pages: 8 (2537 words) Sources: 10 Document Type:Research Paper Document #:98311751

… and information sharing may seem like two diametrically opposed concepts in the context of social media, and to a high degree they are. mobile device allow users to set information sharing settings that allow algorithms on other applications to identify a person’s location, habits, and view other information ……

References

References

Balle, B., Gascón, A., Ohrimenko, O., Raykova, M., Schoppmmann, P., & Troncoso, C. (2019, November). PPML\\\\\\\\\\\\'19: Privacy Preserving Machine Learning. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 2717-2718). ACM.

Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., Gazaki, M., & Hubaux, J. P. (2016). A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Pervasive and Mobile Computing, 25, 125-142.

Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., ... & Seth, K. (2017, October). Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1175-1191). ACM.

Hunt, T., Song, C., Shokri, R., Shmatikov, V., & Witchel, E. (2018). Chiron: Privacy-preserving machine learning as a service. arXiv preprint arXiv:1803.05961.

Lindsey, N. (2019). New Research Study Shows That Social Media Privacy Might Not Be Possible. Retrieved from https://www.cpomagazine.com/data-privacy/new-research-study-shows-that-social-media-privacy-might-not-be-possible/

Mohassel, P., & Zhang, Y. (2017, May). Secureml: A system for scalable privacy-preserving machine learning. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 19-38). IEEE.

Mooney, S. J., & Pejaver, V. (2018). Big data in public health: terminology, machine learning, and privacy. Annual review of public health, 39, 95-112.

Oh, S. J., Benenson, R., Fritz, M., & Schiele, B. (2016, October). Faceless person recognition: Privacy implications in social media. In European Conference on Computer Vision (pp. 19-35). Springer, Cham.

Studyspark

Study Document Study Document

Starbucks Use Of Wireless Technology

Pages: 2 (686 words) Sources: 5 Document Type:Term Paper Document #:87468045

… aware of the locations of Starbucks due to the GPS system. [1: Torrington, M. (2016, April 12). Starbucks: A Case Study in Effective mobile App Marketing. Digital Turbine.]…

References

References

Brewin, B. (2001, Jan 08). Starbucks takes wireless leap. Computer World .

Greenemeier, L. (2014, June 24). Starbucks to Offer Wireless Caffeine for Smartphones. Scientific American .

How Household Names Use GIS. (2019, October 9). USC Dornsife.

Torrington, M. (2016, April 12). Starbucks: A Case Study in Effective Mobile App Marketing. Digital Turbine.

Wheeler, C. (2014). Going BIG with GIS. Esri User Conference.

Studyspark

Study Document Study Document

Application Of Quality And Safety Concepts

Pages: 11 (3179 words) Sources: 8 Document Type:Case Study Document #:72132391

… events and clinical errors. Considering the fact that several million healthcare practitioners worldwide utilize almost 5,000 kinds of clinical tools and equipment, such device-linked issues are unavoidable. Even with the above challenges, mistakes and inefficiencies persist within the healthcare domain owing to the low-key technology utilized by … heart failure, stroke, asthma, elevated blood pressure, and chronic obstructive pulmonary disease. PDMS (patient data management systems) automatically retrieve information from bedside clinical device such as patient monitors, ventilators, and intravenous pumps). The information is then synopsized and restructured for facilitating its interpretation by healthcare practitioners.
Evaluation ……

References

Bibliography

Alotaibi, Y. K., & Federico, F. (2017). The impact of health information technology on patient safety. Saudi Med J, 38(12), 1173–1180.

Amit, M. (2019, January 28). 5 Problems Which Healthcare Technology Can Solve for a Healthier World. Retrieved from Net Solutions:  https://www.netsolutions.com/insights/5-healthcare-problems-which-digital-technologies-can-solve-for-a-fit-and-healthy-world/ 

DeSanctis, G., & Poole, M. S. (1994). Capturing the Complexity in Advanced Technology Use: Adaptive Structuration Theory. Organization Science, 5(2), 121-147.

Feldman, S. S., Buchalter, S., & Hayes, L. W. (2018). Health Information Technology in Healthcare Quality and Patient Safety: Literature Review. JMIR Med Inform, 6(2).

Halamka, J., Mandl, K., & Tang, P. (2008). Early Experiences with Personal Health Records. Journal of the American Medical Informatics Association, 15(1), 1-7.

IOM. (1999). To Err is Human: Building a Safer Health System. National Academy of Sciences.

Singh, H., & Sittig, D. (2016). Measuring and improving patient safety through health information technology: The Health IT Safety Framework. BMJ Quality & Safety, 25, 226-232.

Weigel, F., Hall, D. J., & Landrum, W. H. (2009). Human/Technology Adaptation Fit Theory for Healthcare. SAIS 2009 Proceedings.

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821


Security risks
Two classes of risks exist, against which corporate information systems require protection: logical and physical. The latter, more to do with device as compared to the actual information system, encompasses natural calamities like floods, earthquakes, typhoons, among others, terror attacks, vandalism, fire outbreak, illegal tampering, … the most frequent risk (49 percent of respondent firms). The next most commonly occurring event was insider network abuse (44 percent) and, subsequently, mobile device (including laptop) theft (42 percent) (Suduc et al., 2010). Even corporate security measures concentrate on external threats owing to their disturbingly high incidence … security measures include authenticating principals (including who said it, or which entities have access to that data – i.e., individuals, groups, programs, or device). Moreover, these measures also include authorizing access ("Which entities are permitted to carry out what operations on a given object?") and decision auditing ……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

Allied Health And Technology Institute Reopening Guidelines COVID 19

Pages: 11 (3201 words) Sources: 3 Document Type:Essay Document #:35262297

… these symptoms throughout the day and immediately report to the Director of Student Health Services (SHS). The institution could work towards developing a mobile app or tool that works like the PiratePort Tool at East Carolina University, which allows students and faculty to voluntarily register their mobile device and thereafter receive alerts reminding them of their obligation to conduct self-screening and provide CDC guidance on the screening process and self-isolation. This ……

References

References

CDC (2019). Operating Schools during Covid-19: CDC’s Considerations. Center for Diseases Prevention and Control (CDC). Retrieved from  https://www.cdc.gov/coronavirus/2019-ncov/community/schools-childcare/schools.html 

DC Health (2020). Health Notice for district of Columbia Healthcare Providers . DC Health. Retrieved from  https://dchealth.dc.gov/sites/default/files/dc/sites/doh/publication/attachments/COVID-19_HAN_20200305_Final_update.pdf 

WHO (2020). Key Messages and Actions for Covid-19 Prevention and Control in Schools. World Health Organization. Retrieved from  https://www.who.int/docs/default-source/coronaviruse/key-messages-and-actions-for-covid-19-prevention-and-control-in-schools-march-2020.pdf?sfvrsn=baf81d52_4 

Studyspark

Study Document Study Document

Ethics And Health Information

Pages: 8 (2462 words) Sources: 6 Document Type:Term Paper Document #:87876213

...Mobile device Managing Medical Records and the Implementation of Tools and Safeguards Required within HIS
Introduction
Few practices are more important in managing health information systems than managing medical records, safeguarding patients’ medical history, and ensuring that all end users of medical information technology are approved and trained. Some of the biggest factors in security breaches are end users themselves (Rhee, Kim & Ryu, 2009). This is why training of staff on how to use equipment and the importance of protecting passwords is so important (Jackson, 2018). However, the system itself should have system protections built-in that can protect against end user mistakes—protections such as double security via multi-factor authentication (Crossler & Posey, 2017). This paper will discuss the programming language and relational databases that should be used to accommodate security needs for the HIS, the information tools and safeguards required to protect it, the security needed for electronic health records, an……

References

References

Campbell, R. J. (2004). Database Design: What HIM Professionals Need to Know.

Perspectives in Health Information Management 2004, 1:6 (August 4, 2004). Retrieved from  http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_024637.hcsp?dDocName=bok1_024637 

Crossler, R. E., & Posey, C. (2017). Robbing Peter to Pay Paul: Surrendering Privacy for Security's Sake in an Identity Ecosystem. Journal of The Association for Information Systems, 18(7), 487-515.

Donovan, F. (2018). Judge Gives Final OK to $115M Anthem Data Breach Settlement. Retrieved from https://healthitsecurity.com/news/judge-gives-final-ok-to-115m-anthem-data-breach-settlement

HealthIT.gov. (2018). Health Information Privacy, Security, and Your EHR. Retrieved from  https://www.healthit.gov/providers-professionals/ehr-privacy-security 

The IMIA Code of Ethics for Health Information Professionals. (n.d.). Retrieved from http://www.imia medinfo.org/new2/pubdocs/Ethics_Eng.pdf

Jackson, R. (2018). Pulling strings. Retrieved from  https://iaonline.theiia.org/2018/Pages/Pulling-Strings.aspx 

Prince, B. (2013). Programming Languages Susceptible to Specific Security Flaws: Report. Eweek, 12.  Retrieved from  https://www.eweek.com/security/programming-languages-susceptible-to-specific-security-flaws-report

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".