Free Essay SamplesAbout UsContact Us Order Now

Topic is listed in the attached file

0 / 5. 0

Words: 275

Pages: 1

53

BRING YOUR OWN DEVICE
Name
Institutional affiliations
Date

Theft resource center has stated that the healthcare industry has accounted for over 42% of most of the data breaches. According to informatics, and having the patients’ privacy is one of the most significant things. To uphold the security of patients’ data, organizations such as hospitals must have the state of art security apparatus and have strict security policies which should be adhered to (Wang et al. 2014). There should be constant, analysis, recording, and reporting of how the security systems perform.
In today’s world there has been the advancement of technology in different fields, some of the organizations have been allowing some of their employees to bring their electronic devices instead of providing that equipment. This new trend which has been emerging is known as carrying your device (BYOD). This idea has some of the importance and disadvantages. Companies which champion this idea, see it positively since they see it as a way of saving money because they will not have provided electronics to employees and having thinking the employees will put more work since employees can have access to this equipment from anywhere (Ghosh et al. 2013). The disadvantage of this idea is that most of the organization have not taken into consideration the cost which comes with the installations of security apparatus, which is one of the requirements of bringing your device. To put more emphasis on this personal equipment is not under the same security protection when compared with the company electronics.

Wait! Topic is listed in the attached file paper is just an example!

Also, another concern which has arisen because of this concept is the issue of mishandling information which has been stored in personal equipment.
It is now one of the necessities for the nurse to use their equipment. The technology of informatics has enabled nurses to access patients’ information on their gadgets. This technology leads to the efficient patient care.
To address this challenges, applications which help to bring your device should be deployed effectively. Also, organizations should provide substantial network support which aids in the implementation of this idea, providing strong security for devices which may get lost. And finally, there should be severe consequences for people who breach the patients’ data.

References
Ghosh, A., Gajar, P. K., & Rai, S. (2013). Bring your device (BYOD): Security risks and mitigating strategies. International Journal of Global Research in Computer Science (UGC Approved Journal), 4(4), 62-70.
Wang, Y., Wei, J., & Vangury, K. (2014, January). Bring your own device security issues and challenges. In Consumer Communications and Networking Conference (CCNC), 2014 IEEE 11th (pp. 80-85). IEEE.

Get quality help now

Steve Taylor

5.0 (493 reviews)

Recent reviews about this Writer

School projects are funny sometimes, but I just can’t deal with all my assignments at the same time! I’m not a Caesar! I’m happy I’ve found your website because only you and I know the secret of my awesome performance.

View profile

Related Essays

Legal Pitfalls of sonography

Pages: 1

(275 words)

HIV/AIDS In Uganda

Pages: 1

(275 words)

Human Resources Research paper

Pages: 1

(275 words)

Support

Pages: 1

(275 words)

SEX WORKERS

Pages: 1

(275 words)

Scenario Analysis and Respons

Pages: 1

(275 words)