Autobed Manufacturing Update Management Hijacking usability 4.3 2.5 3.5 4.5 telehealth Manufacturing Update Management Hijacking usability 2.4 4.4000000000000004 1.8 2.8 E Alert Manufacturing Update Man agement Hijacking usability 2 2 3 5
Scholarly Article Discussion: The Three Strike Law
The three strike law was enacted on March 4th, 1994 in the hopes of permanently reducing recidivism rates especially among violent offenders (Helland & Tabarrok, 2007). The legislation, just as the name implies in baseball, sentences a criminal to a minimum 25-year sentence to life after their third offense, or strike. There are variations of the three strike law in different states, with California being the most aggressive state to adhere to the legislation. Proponents of the law believe that harsher penalties for repeat felons will deter them from committing more crimes; however, there is not enough wide-spread reliable data to support this conclusion. Critics claim that the three strike law is undefined which leads to a violation of a criminal’s eighth amendment right against cruel and unusual punishment coupled with a fiscal cost too high, that is overcrowding prisons and the legal system (Eaton, 2003).
In the article, “Three Strikes and You’re Out: Enhanced Sentences for Repeat Offenders Research Pathfinder,” Lisa Eaton discusses the public’s concern with crime and the three strikes effectiveness on recidivism rates. She explains that the genesis of the three strike law began in Washington in 1993 and since then, more and more states began to adopt the legislation, but on their own terms. The intended criminal is the violent anti-social offender and states modified the law in their own way. The varied definitions include:
different sentencings lengths, parole eligibility, the number of strikes required to trigger a mandatory sentence, the nature of crimes that qualify as strikes, the time elapsed between strikes, the type of felony that triggers the sentencing enhancement, and the degree of discretion permitted in invoking and applying the law (Eaton, 2003).
California is one of the most well-known states to enact the law with, “36,043 ‘second strike’ and 4,468 ‘third strike’ convictions in California” (Eaton, 2003). Opponents of three strikes claim the law violates the eighth amendment right against cruel and unusual punishment considering a majority of three strike defendants are charged with petty crimes so their sentencing is “disproportionate” (Eaton, 2003).
Eaton’s methodology focuses on each state’s three strike variation and uses legal periodicals, books, reports, treatise and individual/state cases and other secondary sources in an attempt to locate the most accurate and reliable studies. The article explains the difficulty in establishing the effectiveness of the law because of the variations within each state and inconclusive data showing long-term results. Eaton suggests each state can affect the outcome of a study.
1. Autobed Manufacturing Update Management Hijacking
usability 4.3 2.5 3.5 4.5 telehealth Manufacturing
Update Management Hijacking usability 2.4
4.4000000000000004 1.8 2.8 E Alert
Manufacturing Update Man agement Hijacking
usability 2 2 3 5
Scholarly Article Discussion: The Three Strike Law
The three strike law was enacted on March 4th, 1994 in the
hopes of permanently reducing recidivism rates especially
among violent offenders (Helland & Tabarrok, 2007). The
legislation, just as the name implies in baseball, sentences a
criminal to a minimum 25-year sentence to life after their third
offense, or strike. There are variations of the three strike law in
different states, with California being the most aggressive state
to adhere to the legislation. Proponents of the law believe that
harsher penalties for repeat felons will deter them from
committing more crimes; however, there is not enough wide-
spread reliable data to support this conclusion. Critics claim
that the three strike law is undefined which leads to a violation
of a criminal’s eighth amendment right against cruel and
unusual punishment coupled with a fiscal cost too high, that is
overcrowding prisons and the legal system (Eaton, 2003).
In the article, “Three Strikes and You’re Out: Enhanced
Sentences for Repeat Offenders Research Pathfinder,” Lisa
Eaton discusses the public’s concern with crime and the three
strikes effectiveness on recidivism rates. She explains that the
2. genesis of the three strike law began in Washington in 1993 and
since then, more and more states began to adopt the legislation,
but on their own terms. The intended criminal is the violent
anti-social offender and states modified the law in their own
way. The varied definitions include:
different sentencings lengths, parole eligibility, the number of
strikes required to trigger a mandatory sentence, the nature of
crimes that qualify as strikes, the time elapsed between strikes,
the type of felony that triggers the sentencing enhancement, and
the degree of discretion permitted in invoking and applying the
law (Eaton, 2003).
California is one of the most well-known states to enact the law
with, “36,043 ‘second strike’ and 4,468 ‘third strike’
convictions in California” (Eaton, 2003). Opponents of three
strikes claim the law violates the eighth amendment right
against cruel and unusual punishment considering a majority of
three strike defendants are charged with petty crimes so their
sentencing is “disproportionate” (Eaton, 2003).
Eaton’s methodology focuses on each state’s three strike
variation and uses legal periodicals, books, reports, treatise and
individual/state cases and other secondary sources in an attempt
to locate the most accurate and reliable studies. The article
explains the difficulty in establishing the effectiveness of the
law because of the variations within each state and inconclusive
data showing long-term results. Eaton suggests each state can
affect the outcome of a study because there isn’t a cohesive
definition of a strike. How a “‘strike zone’ is defined, how
many strikes are required to be ‘out,’ and what it means to be
‘out,’ varies widely” (2003). By examining each state’s
definition of the law and individual cases, the article further
points to the difficulty in studying its effectiveness. Although
Eaton’s article is filled with rich and reliable studies regarding
the legislation, what seems to be lacking is the overall
conclusion of how researchers can resolve these shortcomings in
future research. Eaton does include “recent developments in
three-strikes case law,” but the reader would need to make their
3. own assertions of the article to draw a conclusion (2003).
In the article, “Symbol and Substance: Effects of California’s
Three Strikes Law on Felony Sentencing,” John Sutton (2013)
explains three schools of thought related to the three strike law.
There are the governmental advocates who believe the law will
help fight crime and reduce costs associated with public safety,
the second school involves critics who believe the law will
create injustices for those tried under it, overcrowding in jails
and increased government costs to uphold it. The third school
is one of neutrality as the law is viewed as a “symbolic
accomplishment” in the fight towards crime, but neither wreaks
havoc on the criminal justice system nor makes advancements in
reduced recidivism rates (Sutton, 2013). In Sutton’s analysis,
he tests the “severity, racial disparities, and individual- and
jurisdiction-level variability in sentence outcomes using data on
felony cases from the 12 most populous counties in California”
(2013). Three factors are used in the analysis, the seriousness
of the crime, the potential bias in the sentencing process, and
the bias that occurs within the criminal justice system itself.
The fact that there are many different stages within the justice
system increases the potential bias in each stage. For example,
pretrial detention for those who cannot afford bail may be
viewed by officials as defendants who need to stay in jail
because they are more dangerous, when in fact they don’t have
the means to leave (Sutton, 2013).
A few hypotheses were used in the study. One involved “macro
level-studies” that tended to be more conservative in nature
because of the political climate and the second focused on the
prosecution’s means and limitations. There are only so many
cases that can be tried and the rest must be pled out. The
sample consisted of all male subjects in felony cases in twelve
California counties. Possible outcomes that affected the results
included the prosecutor’s decision of what type of crime
constituted a defendant’s third strike. Independent variables
like race and ethnicity were binary and prison length and
sentence were calculated separately.
4. For hypothesis one, Sutton (2013) found that the law was more
punitive and increased the defendant’s sentencing length and
increased the likelihood they would go to prison once tried.
The effects of race and ethnicity were not as significant as
expected. For example, black defendants were sentenced at the
same rate before the law and after, the only change being longer
sentence lengths in line with the legislation. Also, “legal
factors” viewed to enhance sentences showed no real change
between the seriousness of the crime or the “effect of a prior
felony conviction” (Sutton, 2013). An important finding
revealed zero evidence of prosecutors using their power unfairly
to decide what qualifies as a third strike offense, thus
manipulation was not at play in the legal process. In
conclusion, it is much more difficult to quantify an individual
offender into separate variables and the likelihood that they
would be sentenced more severely depends on the cluster of
attributes they have as a whole (Sutton, 2013).
Marvell & Moody describe in “The Lethal Effects of
Three‐Strikes Laws” how deterrence is affected, specifically in
homicides (2001). They focus on how deterrence affects a
criminal with two strikes against them and their decision to
engage in a felony. Marvell & Moody (2001) surmise that the
“cost” is what the criminal takes into account when they make
the choice to commit a crime. Even if the cost is too high,
deterrence might not be the outcome. Suppose for example a
second strike individual commits a robbery and realizes that if
he or she gets caught, they would receive a minimum of 25
years to life. They murder the victims they robbed in order to
eradicate the possibility any witnesses can identify them as
suspects. Marvell & Moody hypothesize that the opposite effect
of deterrence occurs and there is an actual increase that a
criminal will murder their victim (s) to escape capture (2001).
“The difference between three-strikes states and other states is
roughly 10 percentage points, which translates to some 1,400
extra murders per year in the three-strikes states” (Marvell &
Moody, 2001).
5. The research design used during the 29-year study in all
fifty states is a fixed-effect model. The dependent variable is
crime rate and a dummy rate variable is used for the three strike
law. Their findings revealed that homicide rates increased
short-term (and also long-term) averaging “60 additional
homicides occurred” short-term, and for states who have not
enacted the law, those states saved lives yearly (Marvell &
Moody, 2001).
A shortcoming of the study indicated that perhaps the increase
in homicides for violent crimes is because of an overall trend
and not necessarily connected with the law. Also noteworthy,
states with the most severe three strike law, had the least
increase in homicide rates. Although more studies need to be
done, Marvell and Moody (2001) concluded that the three strike
law has no overall reduction in crime, although incapacitation
was not taken into account. They surmise that the cost is too
high to continue to keep the three strike law in effect.
In the article, “Does Three Strikes Deter?” Helland &
Tabarrok (2007) compare deterrence in criminals with two
strikes and in criminals with one or two strikes, but who
underwent two separate trials to create a stronger causal
relationship. They claim that there is a detriment for those who
study deterrence because researchers cannot discern the
difference between incapacitation and those truly deterred,
which significantly skews results. Their study is limited by the
fact that bias does occur because the profile of the criminal’s
arrests focuses on a marginal effect and not the total outcome.
The data was a random sample of prisoners released in
California and the study was conducted as a quasi-experiment
(Helland & Tabarrok, 2007).
There are two important values used in the study. One being
the number of arrests and the risk involved for released
prisoners. The findings showed in some states that criminals
with two strikes against them had an increased chance of a new
felony conviction. For those who were tried twice for separate
felonies, but only convicted of one or two strikes, the findings
6. revealed a significant reduction in the chance of committing
another strike, although the findings varied in each state. In
California, the three strike legislation has reduced “felony
arrest rates among the class of criminals with two strikes by 17
to 20 percent” (Helland & Tabarrok, 2007).
In the article, “Officer Down: Implications of Three Strikes for
Public Safety” Johnson & Saint-Germain investigate the impact
that the three strike law has on suspects and law enforcement
officers and whether there was an increase in violent
confrontations (2005). The study was longitudinal in nature
using a time series analysis from 1990-2001. Questionnaires
were mailed to six large police departments in California and
one in Arizona where the three strike law has not been
implemented. The data included the number of arrests, whether
those arrests involved threat or harm to a police officer and
whether use of force was used by the police officer (Johnson &
Saint-Germain, 2005).
The findings showed a statistically significant increase in
arrests made after the three strike policy was implemented,
despite lower crime rates. The study did not discern between
felony and misdemeanor arrests. The use of force by a police
officer became more unpredictable after the three strike law and
did not correlate to the number of arrests made. The same
results were found with officer-related shootings after 1994. In
order for this study to become more reliable, the number of
arrests versus the number of officer-related harm must increase
over time to show a valid correlation. The three strike law
might be dangerous for officers, but no evidence was significant
enough to support that conclusion (Johnson & Saint-Germain,
2005).
7. References
Eaton, L. (2003). Three strikes and you're out: Enhanced
sentences for repeat offenders
research pathfinder. Legal Reference Services Quarterly, 22(4),
55-85. doi:10.1300/j113v22n04_0
Helland, E., & Tabarrok, A. (2007). Does three strikes
deter? Journal of Human
Resources,XLII(2), 309-330. doi:10.3368/jhr.xlii.2.309
John R., S. (2013). Symbol and substance: Effects of
California's three strikes law on felony
sentencing. Law & Society Review, (1), 37.
doi:10.1111/lasr.12001
Johnson, J. L., & Saint-Germain, M. A. (2005). Officer down:
Implications of three strikes for
public safety. Criminal Justice Policy Review, 16(4), 443-460.
doi:10.1177/0887403405277001
Marvell, T. B., & Moody, C. E. (2001). The lethal effects of
three‐strikes
laws. The Journal of Legal Studies, (1), 89. doi:10.1086/468112
8. 4
References
Barrenger, S., Draine, J., Angell, B., & Herman, D. (2017).
Reincarceration Risk Among Men with Mental Illnesses
Leaving Prison: A Risk Environment Analysis. Community
Mental Health Journal, 53(8), 883–892. https://doi-
org.ezproxy.fiu.edu/10.1007/s10597-017- 0113-z
Garot, R. (2019). Rehabilitation Is Reentry. Prisoner Reentry in
the 21st Century: Critical Perspectives of Returning Home.
Hlavka, H., Wheelock, D., & Jones, R. (2015). Exoffender
Accounts of Successful Reentry from Prison. Journal of
Offender Rehabilitation, 54(6), 406–428. https://doi-
org.ezproxy.fiu.edu/10.1080/10509674.2015.1057630
Ho, D. (2011). Intervention-A New Way-Out to Solve the
Chronic Offenders. International Journal of Interdisciplinary
Social Sciences, 6(2), 167–172.
Mobley, A. (2014). Prison reentry as a rite of passage for the
formerly incarcerated. Contemporary Justice Review, 17(4),
465–477. https://doi-
org.ezproxy.fiu.edu/10.1080/10282580.2014.980968
Reisdorf, B. C., & Rikard, R. V. (2018). Digital Rehabilitation:
A Model of Reentry Into the Digital Age. American
Behavioral Scientist, 62(9), 1273–1290. https://doi-
org.ezproxy.fiu.edu/10.1177/0002764218773817
Serowik, K. L., & Yanos, P. (2013). The relationship between
services and outcomes for a prison reentry population of those
with severe mental illness. Mental Health & Substance Use:
Dual Diagnosis, 6(1), 4–14. https://doi-
org.ezproxy.fiu.edu/10.1080/17523281.2012.660979
SHUFORD, J. A. (2018). The missing link in reentry: Changing
prison culture. Corrections Today, 80(2), 42–102.
Thompkins, D. E., Curtis, R., & Wendel, T. (2010). Forum: the
prison reentry industry. Dialectical Anthropology, 34(4), 427–
429. https://doi- org.ezproxy.fiu.edu/10.1007/s10624-010-
9. 9164-z
Woods, L. N., Lanza, A. S., Dyson, W., & Gordon, D. M.
(2013). The Role of Prevention in Promoting Continuity of
Health Care in Prisoner Reentry Initiatives. American Journal of
Public Health, 103(5), 830–838. https://doi-
org.ezproxy.fiu.edu/10.2105/AJPH.2012.300961
CCJ 4497
Professor Leimberg
Scholarly Article Discussion
Directions
The purpose of this assignment is to help you understand how to
read scholarly articles and gather important information from
the article such as the research question/hypothesis, the methods
used, and the findings. Reading these articles will help you to
discover your ideas and thoughts about a topic and to prepare
you to write a formal paper on the subject.
Cite your references according to APA guidelines. See
http://libguides.fiu.edu/criminology for sources related to
criminal justice and criminology.
The grade for this assignment will be based on the selection and
quality of the articles chosen, the proper formatting of the
references, and the quality of your interpretation.
You will need to submit annotations for 5 peer-reviewed articles
from the list of 10 that were selected as part of last week’s
assignment.
Additional Information
Reading a scholarly journal article is not easy. If an article has
been published in a scholarly journal, presumably, the editors
believed that it contained information significant to the
discipline(s) covered by the journal. Here are a few tips that
should assist you in critically evaluating the research articles
you read.
10. The Title
Read the title carefully: more information is contained in the
title than you think. It is very important that you pay attention
to information in the title.
What are the major ideas addressed in the article?
Who were the participants? What was their affiliation?
Were they a special kind of group (e.g., adolescents, girls
only)?
The Abstract
The purpose of the abstract is to summarize the article. Read the
abstract carefully. If the author has done a good job, the
abstract should provide you with the theoretical motivation for
the paper, the major results and a brief general discussion. You
should not JUST read the abstract, but often it is a great help to
understanding the entire article.
What variables were examined? What were the findings?
Does the study show a cause-and-effect relationship between
variables, or does it just show that a relationship exists?
Where was the work conducted (i.e., laboratory or field). If
field, what was the geographical location?
The Introduction
The introduction will give you the rationale for the study (an
explanation of what the study investigates and why). The
introduction typically includes a review of previous research or
theory that provides a context for the specific questions being
addressed in the article. You should understand what the
research question(s) being studied and what the authors
predicted they would find? Reading the introduction of a journal
article can be made easier if you keep a number of key
questions in mind, and look for the answers to them:
What is the purpose of the article?
Is it reporting an empirical study, a new theory, or is it
reviewing previously published theory and research on a certain
topic?
What is the topic of the article?
What specifically is the article addressing? Is it answering a
11. specific question, trying to explain certain observations,
presenting a model of some process, exploring the relationship
between two or more variables, or something else? Look to the
title and abstract for guidance. What variables are mentioned?
Where is the article going?
Look over the structure of the article, paying particular note to
headings and subheadings. Scan tables and figures. You want to
get an overview of what the article starts out discussing, what it
ends up concluding, and how it leads you to that conclusion. If
you get a rough outline of the entire article in your head before
you begin reading, you have a better chance of seeing how each
piece fits into a larger framework.
Why is this an interesting or worthwhile topic/phenomenon to
research? Why would this article interest researchers in the field
(the journal editors would not have accepted the article for
publication unless it met this role in some way)?
What is already known about this topic/phenomenon?
Where are the gaps in contemporary knowledge or
understanding of this topic/phenomenon?
How does the research being reported fill gaps in our
knowledge/ or understanding of this topic/phenomenon? What
niche does this work fill?
What specific prediction(s) or hypothesis(es) are being tested?
What were the main independent variables (what the researchers
manipulated) and dependent variables (what the researchers
measured)?
The Method
Generally speaking, when reading the method section you
should ask yourself:
What research techniques are used by the author(s)?
Reading this section should provide you with a better idea of
what was actually done in the research as well as a clue into the
thinking of the researcher.
Is the method employed a valid test of the predictions or
hypotheses?
There is rarely (if ever) a single way of testing a prediction or
12. hypothesis. The researcher will have made a choice between a
number of possible research designs/sets of
materials/procedures/sample groups, etc. You need to consider
whether the choices made by the researcher will allow them to
make valid claims about their predictions or hypotheses.
Has the researcher overlooked any possible confounds or
extraneous variables which could affect interpretations of the
findings?
No piece of research is 'perfect', and there are usually limits as
to how much 'control' can be achieved over the research
environment. However, some researchers attempt to achieve
more control in their research designs than others do. You need
to consider whether sufficient control has been achieved.
How do the methods employed compare with the methods used
in other investigations of the same topic/phenomenon?
As researchers usually seek to make comparisons between their
study and earlier studies, you need to consider whether or not
the method employed allows the researcher to make valid
comparisons between studies, and how much you feel they are
entitled to generalize their findings.
The Results
This section is very important because it provides numerical
evidence that supports or refutes the hypotheses being studied.
When reading the results section you should ask yourself:
How do the results relate to the predictions/hypotheses set out
in the introduction (i.e., are they supported or not)?
What differences did the authors find that support or refute the
project hypotheses?
Are the results reported and analyzed in an unbiased manner?
The manner in which data are reported and analyzed could
dramatically affect interpretation. For example, different types
or formats of graphs can emphasize or de-emphasize the sizes of
effects, and different inferential tests can yield different results.
The Discussion
The discussion should summarize the main findings in
(relatively) plain English. How do the authors interpret the
13. findings? That is, what do they say the findings tell us about
their research question? Do we now know' something new? Are
there new questions raised? Do the authors discuss implications
of their findings for theory, or for the "real world"? When
reading the discussion section you should ask yourself:
Have the appropriate interpretations of the results been made?
Are there ways of interpreting the results that haven't been
considered?
Has the researcher presented an unbiased evaluation of the
study/method employed?
Is the researcher justified in making any theoretical claims that
are made on the basis of the study's findings? Were the
hypotheses supported or rejected?
What are the implications of those findings (what do they tell us
about theory, research, or real life concerns)?
What suggestions are being made about future research into this
topic/phenomenon or what does the researcher consider to be
'the way forward'?
The Conclusion
The conclusions may be in a separate section at the end of the
article or incorporated as part of the discussion section. The
conclusions should summarize the important findings of the
study and point out their significance to the general research
area. They might also point out some limitations to the study
and avenues for future research based on the findings of the
study.
Writing a Project Report
By Gail Marie, eHow Contributor
Project reports communicate a project's background, its
objectives, the methods used to achieve the objectives and the
results of these efforts. The writer may also discuss important
14. aspects of the project and draw certain conclusions. Like most
reports, the information should be formatted with headings,
clearly communicated and well supported. There are countless
ways to write a
project report. The steps below represent one method.
Information needed in advance includes:
Project details
Background information
Supporting information
Sources of information
Steps include:
1. Create a title or cover page, followed by a table of contents
and an abstract (see Step 9).
The project report's title should convey the area and scope of
the project.
2. Consider your reader, his or her knowledge of your project
and its subject. If your project was, for example, scientific but
your reader is not a scientist, consider using less technical
language than if he were.
3. Describe the project's scope, its objective and the main
result(s) in the Introduction. You may include what you
personally contributed to the project as well.
4. Tell the reader about the research behind the project in a
Background section, if too extensive to include in the
Introduction.
5. Describe the methods you used during the project to
accomplish the stated objectives in a Methods/Procedures
section. Don't forget to use the past tense, as these actions have
already been taken.
6. Present the results of the project, which may not be the
intended results. Use a Results section heading. Depending on
your reader and what your project entailed, you may want to
discuss the results by explaining what they show, analyzing
uncertainties, noting trends, comparing the results with known
15. theories or with the expected results, evaluating limitations of
the project, detailing the possibilities of faulty interpretation or
simply
discussing assumptions about the results.
7. Conclude by summarizing, once again, the project report's
content and by suggesting the implications of the project's
results. Because your reader is familiar with your work, you
may use project-specific terms and reference names of people
and places under the
Conclusion heading.
8. Propose, under a Recommendations heading, suggestions
based on the conclusions outlined earlier. Describe actions you
think should be taken because of the project's results or
additional work that you think is needed to gain more
knowledge about the subject.
9. Write the report abstract, which summarizes, like the
conclusion, the report's contents.
The abstract is actually the first section of the report, so keep it
more general than the conclusion. Because the abstract is such a
comprehensive summary, it is most easily written last.
10. Include references and appendices such as charts, graphs,
photos or additional
information at the end of the report.
1
Running Head: The security Vulnerabilities of IoT devices in
the medical fieldCarmelia DalmeidaIT680 – Research
PaperProject Proposal
The security vulnerabilities of IoT devices in the medical
fieldObjective
The core objective of the topic will be to explore and examine
the security vulnerabilities of the devices used in the medical
field. As some devices are working as IoT, the chances of
security breaches are enhanced. The devices contain information
16. from different patients, and it is vulnerable when it is connected
to the internet. If the device itself is not securing the
information, then the administrator who is running the system
operation and operating system on the device is responsible.
The objective is to find the vulnerabilities and propose a
solution that will give surety on the security factor of the
devices.Project Plan
The security issues in medical devices have been arising since
their invention. Many companies are denying the fact that these
are promoting data leaks and contain personally identifiable
information (PII). It will probably create problems in different
companies and patients. The patient record will be vulnerable,
and some of the companies that are utilizing these devices are
mainly using outdated software and operating systems. The
main point of the research is to point out the vulnerabilities in
the IoT devices and what type of security breaches they cause.
In taking the example of some IoT devices with different
abilities, infusion and insulin pump comes first then, smart
pens, cardiac devices, wireless vital monitors, thermometer and
temperature sensors, security cameras, and various other
hardware. Every device has its benefits and its security
concerns. Especially when you are working in the medical field,
many inventions prevent humans from getting a disease and
making upgrade through to cure any problem, but they also have
a drawback when you try to more the very nature of the
hardware. This project will elaborate on security vulnerabilities
and present counter solutions for their issues. The task will
involve taking few devices condition into consideration,
exploring the working and mechanism of the devices, examining
the security vulnerabilities and results gathered from different
operations, comparing the reserves with the research findings,
and presenting a proper report for solution providing with the
exposed vulnerabilities. There will be teams running different
module of the proposal, and they will collect single device and
the team will run its functionalities in the programming side,
and the other team will run for the architecture design and see
17. what type of operation and how long it takes to send the data
from device to the administrator server. The gap between the
transmissions will be analysed for vulnerabilities, and the
device hardware and software configuration will also be held
responsible for any data leak. Literature Overview
In the literature review, we will describe the function of IoT
devices and how they can be used in the medical field. In the
healthcare department, the IoT devices are growing rapidly and
are packed with interesting features and factors like
technological advancements, decrease prices of sensor
technology, better accessibility of high-speed internet, and
more. What type of application is the medical field currently
running with the devices, and in how many sectors these devices
are utilized and what type of result they generate? After that,
we will conduct a study on one or two hospital for their IoT
devices that poses a security threat, and it is vulnerable for data
extraction. The study will elaborate on every module of the
system and it will provide an in-depth view of the working
device and we will also propose a countermeasure for any issue
found in operation.
Likely Outcome
We will focus on one outcome that will be to ensuring the
safety of any security leek. We will also elaborate on the
methods by which you can make the device more secure and less
vulnerable, which will also give the authentication protocol
provided for both the patient and the administrator. The results
will ensure the integrity of the IoT device and ensure the patient
that the device will run efficiently, and records and data will be
monitored with care, and find the solution for the generated
outcomes.Relationship to the Master’s Program
This project will be best suited for the master program because
the subject elaborates on the internet devices, and it concern
every type of protocol we run before giving a final product. It
will also elaborate on the hardware structure of the program so
that it will ensure that before running it in the field
18. implementation and testing phase will be thoroughly examined.
The Programming course and System Architecture course will
help more in understanding and working on this proposed
project.Reviews
The survey shows 82 percent of healthcare organizations
experienced IoT-focused cyber-attack in the previous 12
months, with only 6 percent of organizations saying they have
resources to tackle cybersecurity challenges.( Davis, 2019) The
paper highlight the security risk in the healthcare department
and its integration with the internet of things devices. What
type of vulnerabilities expects it exposes to its administrator
and patient, and if the data they collected is still under
surveillance or not? (Cansu Eken, 2016)
References
Cansu ken, H. E. (2016). Retrieved from
http://www.ep.liu.se/ecp/142/054/ecp17142054.pdf
Davis, Jessica (2019) Health IT Security-
https://healthitsecurity.com/news/82-iot-devices-of-health-
providers-vendors-targeted-by-cyberattacks