Open Access. Powered by Scholars. Published by Universities.®

Medicine and Health Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Medicine and Health Sciences

Security Risks Of Medical Devices In Wireless Environments, Krishnun Sansurooah Jan 2015

Security Risks Of Medical Devices In Wireless Environments, Krishnun Sansurooah

Australian eHealth Informatics and Security Conference

The advancement of wireless medical devices technology, that has developed in hospitals and migrated into the home environment, has created unsustainability in in terms of the management of security for such devices. Through this paper, we shall attempt to explain how medical devices have completely changed the way security needs to be approached in the medical field. We shall also explore the history of medical devices and the organizational problems faced for the development of these devices, the different stakeholders strengths and weaknesses, especially if the device is implanted inside the body of a patient. Once the risk is understood …


The Hare And The Hortoise [Sic]: The Potential Versus The Reality Of Etp Implementation, Kyaw Kyaw Htat, Patricia A. H Williams, Vincent Mccauley Jan 2015

The Hare And The Hortoise [Sic]: The Potential Versus The Reality Of Etp Implementation, Kyaw Kyaw Htat, Patricia A. H Williams, Vincent Mccauley

Research outputs 2014 to 2021

In a health system increasingly driven by cost constraints, there is a focus on improved electronic transfer of information to support healthcare delivery. One area of healthcare that has moved more quickly than others to achieve this is prescribing in the primary care environment. Whilst the move to electronic transfer of prescriptions has reduced transcription errors, the regulatory environment persists with handwritten signatures. This constraint, whilst addressed slowly with technology solutions, needs support from legislative change. The ultimate step is to have a secure mobile model, which would support the move to a fully-electronic, paperless transaction model.


Security Of Eprescription: Security Of Data At Rest In Prescription Exchange Services Vs On Mobile Devices, Kyaw Kyaw Htat, Patricia A. H. Williams, Vincent Mccauley Jan 2015

Security Of Eprescription: Security Of Data At Rest In Prescription Exchange Services Vs On Mobile Devices, Kyaw Kyaw Htat, Patricia A. H. Williams, Vincent Mccauley

Australian eHealth Informatics and Security Conference

One area of healthcare that has moved more quickly than others in adopting electronic transfer of information is prescribing in the primary care environment. Several Acts and Regulations have been repealed and amended at Commonwealth and State levels to enable this progress over the past decade, as medication provision is a strictly controlled area of healthcare. Further, numerous standards and specifications have been developed and adopted to support and safeguard the regulatory changes and facilitate the electronic transfer of prescriptions. However, the current model of electronic prescription transfer comes with a substantial price tag for ongoing use. With the Nation’s …


Cybersecurity Vulnerabilities In Medical Devices: A Complex Environment And Multifaceted Problem, Patricia A.H. Williams, Andrew J. Woodward Jan 2015

Cybersecurity Vulnerabilities In Medical Devices: A Complex Environment And Multifaceted Problem, Patricia A.H. Williams, Andrew J. Woodward

Research outputs 2014 to 2021

The increased connectivity to existing computer networks has exposed medical devices to cybersecurity vulnerabilities from which they were previously shielded. For the prevention of cybersecurity incidents, it is important to recognize the complexity of the operational environment as well as to catalog the technical vulnerabilities. Cybersecurity protection is not just a technical issue; it is a richer and more intricate problem to solve. A review of the factors that contribute to such a potentially insecure environment, together with the identification of the vulnerabilities, is important for understanding why these vulnerabilities persist and what the solution space should look like. This …