SlideShare a Scribd company logo
1 of 4
Running head: MOBILE DEVICES 1
Article Review #1 Mobile Devices
Jennifer Smith
Jacksonville University
February 23, 2014
Article Review #1 Mobile Devices
Cavoukian, A. (2013, November). Encrypt Your Mobile Devices: Do It Now. Canadian
Nurses Protective Society, 21(1).
Technology is an ever evolving phenomena. The introduction of technology into
the healthcare setting has increased overall patient outcomes and unfortunately has
become avenues for failures. Mobile devices have the capacity to provide immediate
diagnostic assessments and results, patient as well as practitioner education, and a direct
line of communication between the medical staff. It is vital that patients’ personal health
information (PHI) is protected from any type of invasion possible.
According to the article Encrypt Your Mobile Devices: Do It Now (2013), Ann
Cavoukian notes that nurses have a professional and legal obligation to protect the
privacy of patients’ PHI. She also identifies several barriers that may present in terms of
hospital and personal liability when utilizing mobile devices. I found the article
extremely realistic for practice utilization. The article also incorporates examples of
privacy breaches of PHI. The examples presented were “down to earth” and I could
easily identify with them. PHI was compromised, but was of no purposeful fault of the
practitioner involved. Henceforth, the importance of encrypting devices when using them
for patient care.
The issues of Infection Control was discussed briefly, she stated that studies have
found high bacterial contamination including MRSA on mobile devices (Cavoukian,
2013). I can definitely appreciated this information, but I feel including some reference
points as to which study would have been beneficial for practicing nurses for further
research follow-up.
Overall, I found the article extremely valuable. Cavoukian listed several
precautions to implement for the security of the mobile devices. All of the precautions
were useful and appear to be easy to implement. The article was easy to read and
comprehend. The information was thorough and straight to the point. I would absolutely
recommend this article to any healthcare provider looking to increase the security and
integrity of their organization.
Fry article review one

More Related Content

What's hot

Narayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentation
Narayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentationNarayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentation
Narayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentation
Rob Narayana
 
Narayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentation
Narayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentationNarayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentation
Narayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentation
Rob Narayana
 
amd-overview-2016-508
amd-overview-2016-508amd-overview-2016-508
amd-overview-2016-508
Scott Chancey
 
Predictive Analytics Help Achieve the Triple Aim
Predictive Analytics Help Achieve the Triple AimPredictive Analytics Help Achieve the Triple Aim
Predictive Analytics Help Achieve the Triple Aim
jetweedy
 

What's hot (19)

Narayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentation
Narayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentationNarayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentation
Narayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentation
 
Narayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentation
Narayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentationNarayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentation
Narayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentation
 
Electronic Health Records Issues & Challenges in a Government Institution
Electronic Health Records Issues & Challenges in a Government InstitutionElectronic Health Records Issues & Challenges in a Government Institution
Electronic Health Records Issues & Challenges in a Government Institution
 
amd-overview-2016-508
amd-overview-2016-508amd-overview-2016-508
amd-overview-2016-508
 
iHT2 Health IT Summit San Francisco 2013 - Christopher Longhurst, MD, CMIO, L...
iHT2 Health IT Summit San Francisco 2013 - Christopher Longhurst, MD, CMIO, L...iHT2 Health IT Summit San Francisco 2013 - Christopher Longhurst, MD, CMIO, L...
iHT2 Health IT Summit San Francisco 2013 - Christopher Longhurst, MD, CMIO, L...
 
The impact from social media on public health
The impact from social media on public healthThe impact from social media on public health
The impact from social media on public health
 
The Librarian Reloaded: Evolving Roles in Health Informatics
The Librarian Reloaded: Evolving Roles in Health InformaticsThe Librarian Reloaded: Evolving Roles in Health Informatics
The Librarian Reloaded: Evolving Roles in Health Informatics
 
Mycin
MycinMycin
Mycin
 
Pattern diagnostics 2015
Pattern diagnostics 2015Pattern diagnostics 2015
Pattern diagnostics 2015
 
The Use of Predictive Analytics in Health Care
The Use of Predictive Analytics in Health CareThe Use of Predictive Analytics in Health Care
The Use of Predictive Analytics in Health Care
 
[Infographic] What's Growing On Your Mobile Device?
[Infographic] What's Growing On Your Mobile Device? [Infographic] What's Growing On Your Mobile Device?
[Infographic] What's Growing On Your Mobile Device?
 
Technology will save our minds and bodies
Technology will save our minds and bodiesTechnology will save our minds and bodies
Technology will save our minds and bodies
 
Predictive Analytics Help Achieve the Triple Aim
Predictive Analytics Help Achieve the Triple AimPredictive Analytics Help Achieve the Triple Aim
Predictive Analytics Help Achieve the Triple Aim
 
Pottinger_Abstract
Pottinger_AbstractPottinger_Abstract
Pottinger_Abstract
 
Health care informatics evolutions and transitions to today
Health care informatics evolutions and transitions to todayHealth care informatics evolutions and transitions to today
Health care informatics evolutions and transitions to today
 
Safety II
Safety IISafety II
Safety II
 
Unit5DQ1
Unit5DQ1Unit5DQ1
Unit5DQ1
 
From Big Data to Precision Medicine
From Big Data to Precision Medicine From Big Data to Precision Medicine
From Big Data to Precision Medicine
 
Paradigmshift in precision medicine
Paradigmshift in precision medicineParadigmshift in precision medicine
Paradigmshift in precision medicine
 

Viewers also liked

Arma tu plan de acción
Arma tu plan de acciónArma tu plan de acción
Arma tu plan de acción
wolaap
 
Hart andrew ignite slides (keynote)
Hart andrew ignite slides (keynote)Hart andrew ignite slides (keynote)
Hart andrew ignite slides (keynote)
dr3whart
 

Viewers also liked (10)

Arma tu plan de acción
Arma tu plan de acciónArma tu plan de acción
Arma tu plan de acción
 
Clean code
Clean codeClean code
Clean code
 
Hart andrew ignite slides (keynote)
Hart andrew ignite slides (keynote)Hart andrew ignite slides (keynote)
Hart andrew ignite slides (keynote)
 
Administrasi Jaringan
Administrasi JaringanAdministrasi Jaringan
Administrasi Jaringan
 
Caroline Carpenedo
Caroline CarpenedoCaroline Carpenedo
Caroline Carpenedo
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of Internet
 
Educazione sentimentale. Sintesi della proposta di legge
Educazione sentimentale. Sintesi della proposta di leggeEducazione sentimentale. Sintesi della proposta di legge
Educazione sentimentale. Sintesi della proposta di legge
 
The Lombok Project
The Lombok ProjectThe Lombok Project
The Lombok Project
 
Contoh Project Metode Penelitian
Contoh Project Metode PenelitianContoh Project Metode Penelitian
Contoh Project Metode Penelitian
 
Pressure Vessel Design
Pressure Vessel DesignPressure Vessel Design
Pressure Vessel Design
 

Similar to Fry article review one

MMHA 6600 WU Technology and The Future in Healthcare Discussion.docx
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docxMMHA 6600 WU Technology and The Future in Healthcare Discussion.docx
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docx
4934bk
 
Power Case Study Of A Registered Nurse
Power Case Study Of A Registered NursePower Case Study Of A Registered Nurse
Power Case Study Of A Registered Nurse
Susan Kennedy
 
Computer Technology’S Effect On The Practice Of Nursing Essay
Computer Technology’S Effect On The Practice Of Nursing EssayComputer Technology’S Effect On The Practice Of Nursing Essay
Computer Technology’S Effect On The Practice Of Nursing Essay
Jessica Deakin
 
Confidentiality Of Health Information Essays
Confidentiality Of Health Information EssaysConfidentiality Of Health Information Essays
Confidentiality Of Health Information Essays
Jessica Tanner
 
1-Evidence-based practice is what keeps the health care system u
1-Evidence-based practice is what keeps the health care system u1-Evidence-based practice is what keeps the health care system u
1-Evidence-based practice is what keeps the health care system u
sandibabcock
 
Beckers Executive Briefing Sarah Snow Jan 2015
Beckers Executive Briefing Sarah Snow Jan 2015Beckers Executive Briefing Sarah Snow Jan 2015
Beckers Executive Briefing Sarah Snow Jan 2015
Sarah Severson Snow
 
Two general technology trends in my workplace are that EHRs and the us.docx
Two general technology trends in my workplace are that EHRs and the us.docxTwo general technology trends in my workplace are that EHRs and the us.docx
Two general technology trends in my workplace are that EHRs and the us.docx
kdennis3
 
Two general technology trends in my workplace are that EHRs.docx
Two general technology trends in my workplace are that EHRs.docxTwo general technology trends in my workplace are that EHRs.docx
Two general technology trends in my workplace are that EHRs.docx
write5
 
Plagiarism ReportProfessor’s feedbackEMS respond.docx
Plagiarism ReportProfessor’s feedbackEMS respond.docxPlagiarism ReportProfessor’s feedbackEMS respond.docx
Plagiarism ReportProfessor’s feedbackEMS respond.docx
mattjtoni51554
 

Similar to Fry article review one (20)

Safety-MarApr13_FINAL
Safety-MarApr13_FINALSafety-MarApr13_FINAL
Safety-MarApr13_FINAL
 
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docx
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docxMMHA 6600 WU Technology and The Future in Healthcare Discussion.docx
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docx
 
Power Case Study Of A Registered Nurse
Power Case Study Of A Registered NursePower Case Study Of A Registered Nurse
Power Case Study Of A Registered Nurse
 
Computer Technology’S Effect On The Practice Of Nursing Essay
Computer Technology’S Effect On The Practice Of Nursing EssayComputer Technology’S Effect On The Practice Of Nursing Essay
Computer Technology’S Effect On The Practice Of Nursing Essay
 
Patient safety issues
Patient safety issuesPatient safety issues
Patient safety issues
 
Confidentiality Of Health Information Essays
Confidentiality Of Health Information EssaysConfidentiality Of Health Information Essays
Confidentiality Of Health Information Essays
 
Introduction.pdf
Introduction.pdfIntroduction.pdf
Introduction.pdf
 
10 top patient safety issues for 2016 by Dr.Mahboob ali khan Phd
10 top patient safety issues for 2016 by Dr.Mahboob ali khan Phd 10 top patient safety issues for 2016 by Dr.Mahboob ali khan Phd
10 top patient safety issues for 2016 by Dr.Mahboob ali khan Phd
 
1-Evidence-based practice is what keeps the health care system u
1-Evidence-based practice is what keeps the health care system u1-Evidence-based practice is what keeps the health care system u
1-Evidence-based practice is what keeps the health care system u
 
Beckers Executive Briefing Sarah Snow Jan 2015
Beckers Executive Briefing Sarah Snow Jan 2015Beckers Executive Briefing Sarah Snow Jan 2015
Beckers Executive Briefing Sarah Snow Jan 2015
 
Patient Safety: Evolving from Compliance to Culture
Patient Safety: Evolving from Compliance to CulturePatient Safety: Evolving from Compliance to Culture
Patient Safety: Evolving from Compliance to Culture
 
Patient Safety: Evolving from Compliance to Culture
Patient Safety: Evolving from Compliance to CulturePatient Safety: Evolving from Compliance to Culture
Patient Safety: Evolving from Compliance to Culture
 
Two general technology trends in my workplace are that EHRs and the us.docx
Two general technology trends in my workplace are that EHRs and the us.docxTwo general technology trends in my workplace are that EHRs and the us.docx
Two general technology trends in my workplace are that EHRs and the us.docx
 
Unwashed Hands Essay
Unwashed Hands EssayUnwashed Hands Essay
Unwashed Hands Essay
 
Two general technology trends in my workplace are that EHRs.docx
Two general technology trends in my workplace are that EHRs.docxTwo general technology trends in my workplace are that EHRs.docx
Two general technology trends in my workplace are that EHRs.docx
 
ORDER NOW FOR PAPERS.pdf
ORDER NOW FOR PAPERS.pdfORDER NOW FOR PAPERS.pdf
ORDER NOW FOR PAPERS.pdf
 
Digital medicine comes of age - ISDM E-Newsletter Feb 2020
Digital medicine comes of age - ISDM E-Newsletter Feb 2020Digital medicine comes of age - ISDM E-Newsletter Feb 2020
Digital medicine comes of age - ISDM E-Newsletter Feb 2020
 
Plagiarism ReportProfessor’s feedbackEMS respond.docx
Plagiarism ReportProfessor’s feedbackEMS respond.docxPlagiarism ReportProfessor’s feedbackEMS respond.docx
Plagiarism ReportProfessor’s feedbackEMS respond.docx
 
The Future of Wearables - From a fitness accessory to a clinical tool - uli c...
The Future of Wearables - From a fitness accessory to a clinical tool - uli c...The Future of Wearables - From a fitness accessory to a clinical tool - uli c...
The Future of Wearables - From a fitness accessory to a clinical tool - uli c...
 
emPATH Open Sourced Mobile Framework
emPATH Open Sourced Mobile FrameworkemPATH Open Sourced Mobile Framework
emPATH Open Sourced Mobile Framework
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Fry article review one

  • 1. Running head: MOBILE DEVICES 1 Article Review #1 Mobile Devices Jennifer Smith Jacksonville University February 23, 2014
  • 2. Article Review #1 Mobile Devices Cavoukian, A. (2013, November). Encrypt Your Mobile Devices: Do It Now. Canadian Nurses Protective Society, 21(1). Technology is an ever evolving phenomena. The introduction of technology into the healthcare setting has increased overall patient outcomes and unfortunately has become avenues for failures. Mobile devices have the capacity to provide immediate diagnostic assessments and results, patient as well as practitioner education, and a direct line of communication between the medical staff. It is vital that patients’ personal health information (PHI) is protected from any type of invasion possible. According to the article Encrypt Your Mobile Devices: Do It Now (2013), Ann Cavoukian notes that nurses have a professional and legal obligation to protect the privacy of patients’ PHI. She also identifies several barriers that may present in terms of hospital and personal liability when utilizing mobile devices. I found the article extremely realistic for practice utilization. The article also incorporates examples of privacy breaches of PHI. The examples presented were “down to earth” and I could easily identify with them. PHI was compromised, but was of no purposeful fault of the practitioner involved. Henceforth, the importance of encrypting devices when using them for patient care. The issues of Infection Control was discussed briefly, she stated that studies have found high bacterial contamination including MRSA on mobile devices (Cavoukian, 2013). I can definitely appreciated this information, but I feel including some reference points as to which study would have been beneficial for practicing nurses for further research follow-up.
  • 3. Overall, I found the article extremely valuable. Cavoukian listed several precautions to implement for the security of the mobile devices. All of the precautions were useful and appear to be easy to implement. The article was easy to read and comprehend. The information was thorough and straight to the point. I would absolutely recommend this article to any healthcare provider looking to increase the security and integrity of their organization.