06.09.26
-
Upload
mohammad-al-ubaydli -
Category
Technology
-
view
335 -
download
0
description
Transcript of 06.09.26
Principles ofmobile medical computing
MohammadAl-Ubaydlimemomd
Principles ofmobile medical computing
Introductions Mobile computing basics Advantages of the medium Databases Ensuring security Scholarship how to win $1000
Learn these two URLs wwwnlmnihgovmobile wwwhandheldsfordoctorscomscholarship
Introductions
How many of you own a PDA have beamed want to start a
PDA project
Mobile computing basics
Personal Digital Assistantsndash Handheld computer a small mobile device that is
part of your computing toolbox
ndash Forget Palm Pocket PC
ndash Forget PDA and smartphone
Just think about the possibilities of a mobile clinical computer
Great for personal use
For the first time IT departments are behind the clinicians in adoptionndash Schedule of course
ndash Personal notes
ndash Personal textbooks Personal Digital Educators NLM mobile eg Clinical Methods
Personal digital educators Cimino et al N Engl J Med 2005 Mar 3352(9)860-2
Why it is here to stay
Handheld computers become smartphones and every clinician is already carrying a phonendash Aziz et al (PMID 16109177) gave smartphones to
surgeons and improved responsiveness to nurses
No charge left behindndash Moulton et al (PMID 16385275) gave handheld
computers to trauma surgeons and increases charge capture
Advantages of handheld computers
Perhaps the best computer ever designed for cliniciansndash Mobility
ndash Synchronization
ndash Beaming
What would you wish you could do
Pt 50 year old Native American female co cough and chest painndash Productive cough for 37 but chest pain 124 ago
PMHndash HTN (capsule half green half blue-green)
ndash TB while pregnant but Rx and duration
ndash Liver biopsy hemachromatosis at other hospital
ndash Allergy to Bufferin
PE well-developed well-nourished female in moderate respiratory distress ndash Vital pulse 90 RR 22 1003 F BP 150100
ndash Rales and rhonchi in the left upper chest
ndash Tender palpable liver edge
What would you wish you could do
Labsndash Chem7 (serum) Glucose 100 (70-105)
ndash Chem7 (plasma) Glucose 150 (75-110)
ndash CBC Hgb 15 (120-158) Hct 45 (424-480) WBC 11000 (3540-9060) platelets 145000 (165000-415000)
ndash Fingerstick blood sugar was 80
ndash Urinalysis showed protein of 1+ and glucose of 0
ndash Blood culture was positive for MRSA
ndash ECG - NSR 74BPM Axis -30 degrees ST segment 2mm elevated and T-waves down in I L V5 and V6
ndash CXR Left upper lobe infiltrate LVH
What would you wish you could do
Txndash Nitroglycerin sublingual tablet with relief of pain
ndash ceftriaxone for pneumonia
ndash admitted to the CCU for monitoring
ndash then enteric-coated aspirin
Nurse found that the patient was caring for elderly fatherndash concerned that she would no longer be able to manage caring for herself
and him
ndash Consider antidepressant and a social work consult
Medical student concerned about MRSA in pt with pneumonia and recent MIndash Literature search
Databases
There are many ways of storing your data Memo Pad Notes Spreadsheets Simple databases Bespoke databases
Memo Pad Notes
Fast and simple But limited
Spreadsheets
Excel To Go or Pocket Excel Easy and great for calculations But problems with security error checking
synchronization and relational data
Databases
Everything is a database ndash quite right too
Software like HanDBase makes it easy to get startedndash eg surgical logbook
Bespoke databasesndash Allow advanced user
interface
ndash Expensive and require computer expertise
Security
Five steps to analyse security systems
1What assets are you trying to protect
2What are the risks to those assets
3How well does the security solution mitigate those risks
4What other risks does the security solution cause
5What costs and trade-offs does the security solution impose
ldquoBeyond Fearrdquo Bruce Schneier Springer
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Fives steps1 What assets are you trying to protect
2 What are the risks to those assets
3 How well does the security solution mitigate those risks
4 What other risks does the security solution cause
5 What costs and trade-offs does the security solution impose
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Encryption
Scenario 2
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash home PC
ndash work PC
ndash secretarys PC
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The five selected winners will each receive $1000 Scholarship
Mentoring and one-on-one tutorials with me
Publication of your work in the Mobile Medical Computing Reviews journal
Press campaigns by Epocrates and me
One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics
Principles ofmobile medical computing
MohammadAl-Ubaydlimemomd
Principles ofmobile medical computing
Introductions Mobile computing basics Advantages of the medium Databases Ensuring security Scholarship how to win $1000
Learn these two URLs wwwnlmnihgovmobile wwwhandheldsfordoctorscomscholarship
Introductions
How many of you own a PDA have beamed want to start a
PDA project
Mobile computing basics
Personal Digital Assistantsndash Handheld computer a small mobile device that is
part of your computing toolbox
ndash Forget Palm Pocket PC
ndash Forget PDA and smartphone
Just think about the possibilities of a mobile clinical computer
Great for personal use
For the first time IT departments are behind the clinicians in adoptionndash Schedule of course
ndash Personal notes
ndash Personal textbooks Personal Digital Educators NLM mobile eg Clinical Methods
Personal digital educators Cimino et al N Engl J Med 2005 Mar 3352(9)860-2
Why it is here to stay
Handheld computers become smartphones and every clinician is already carrying a phonendash Aziz et al (PMID 16109177) gave smartphones to
surgeons and improved responsiveness to nurses
No charge left behindndash Moulton et al (PMID 16385275) gave handheld
computers to trauma surgeons and increases charge capture
Advantages of handheld computers
Perhaps the best computer ever designed for cliniciansndash Mobility
ndash Synchronization
ndash Beaming
What would you wish you could do
Pt 50 year old Native American female co cough and chest painndash Productive cough for 37 but chest pain 124 ago
PMHndash HTN (capsule half green half blue-green)
ndash TB while pregnant but Rx and duration
ndash Liver biopsy hemachromatosis at other hospital
ndash Allergy to Bufferin
PE well-developed well-nourished female in moderate respiratory distress ndash Vital pulse 90 RR 22 1003 F BP 150100
ndash Rales and rhonchi in the left upper chest
ndash Tender palpable liver edge
What would you wish you could do
Labsndash Chem7 (serum) Glucose 100 (70-105)
ndash Chem7 (plasma) Glucose 150 (75-110)
ndash CBC Hgb 15 (120-158) Hct 45 (424-480) WBC 11000 (3540-9060) platelets 145000 (165000-415000)
ndash Fingerstick blood sugar was 80
ndash Urinalysis showed protein of 1+ and glucose of 0
ndash Blood culture was positive for MRSA
ndash ECG - NSR 74BPM Axis -30 degrees ST segment 2mm elevated and T-waves down in I L V5 and V6
ndash CXR Left upper lobe infiltrate LVH
What would you wish you could do
Txndash Nitroglycerin sublingual tablet with relief of pain
ndash ceftriaxone for pneumonia
ndash admitted to the CCU for monitoring
ndash then enteric-coated aspirin
Nurse found that the patient was caring for elderly fatherndash concerned that she would no longer be able to manage caring for herself
and him
ndash Consider antidepressant and a social work consult
Medical student concerned about MRSA in pt with pneumonia and recent MIndash Literature search
Databases
There are many ways of storing your data Memo Pad Notes Spreadsheets Simple databases Bespoke databases
Memo Pad Notes
Fast and simple But limited
Spreadsheets
Excel To Go or Pocket Excel Easy and great for calculations But problems with security error checking
synchronization and relational data
Databases
Everything is a database ndash quite right too
Software like HanDBase makes it easy to get startedndash eg surgical logbook
Bespoke databasesndash Allow advanced user
interface
ndash Expensive and require computer expertise
Security
Five steps to analyse security systems
1What assets are you trying to protect
2What are the risks to those assets
3How well does the security solution mitigate those risks
4What other risks does the security solution cause
5What costs and trade-offs does the security solution impose
ldquoBeyond Fearrdquo Bruce Schneier Springer
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Fives steps1 What assets are you trying to protect
2 What are the risks to those assets
3 How well does the security solution mitigate those risks
4 What other risks does the security solution cause
5 What costs and trade-offs does the security solution impose
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Encryption
Scenario 2
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash home PC
ndash work PC
ndash secretarys PC
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The five selected winners will each receive $1000 Scholarship
Mentoring and one-on-one tutorials with me
Publication of your work in the Mobile Medical Computing Reviews journal
Press campaigns by Epocrates and me
One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics
Principles ofmobile medical computing
MohammadAl-Ubaydlimemomd
Introductions
How many of you own a PDA have beamed want to start a
PDA project
Mobile computing basics
Personal Digital Assistantsndash Handheld computer a small mobile device that is
part of your computing toolbox
ndash Forget Palm Pocket PC
ndash Forget PDA and smartphone
Just think about the possibilities of a mobile clinical computer
Great for personal use
For the first time IT departments are behind the clinicians in adoptionndash Schedule of course
ndash Personal notes
ndash Personal textbooks Personal Digital Educators NLM mobile eg Clinical Methods
Personal digital educators Cimino et al N Engl J Med 2005 Mar 3352(9)860-2
Why it is here to stay
Handheld computers become smartphones and every clinician is already carrying a phonendash Aziz et al (PMID 16109177) gave smartphones to
surgeons and improved responsiveness to nurses
No charge left behindndash Moulton et al (PMID 16385275) gave handheld
computers to trauma surgeons and increases charge capture
Advantages of handheld computers
Perhaps the best computer ever designed for cliniciansndash Mobility
ndash Synchronization
ndash Beaming
What would you wish you could do
Pt 50 year old Native American female co cough and chest painndash Productive cough for 37 but chest pain 124 ago
PMHndash HTN (capsule half green half blue-green)
ndash TB while pregnant but Rx and duration
ndash Liver biopsy hemachromatosis at other hospital
ndash Allergy to Bufferin
PE well-developed well-nourished female in moderate respiratory distress ndash Vital pulse 90 RR 22 1003 F BP 150100
ndash Rales and rhonchi in the left upper chest
ndash Tender palpable liver edge
What would you wish you could do
Labsndash Chem7 (serum) Glucose 100 (70-105)
ndash Chem7 (plasma) Glucose 150 (75-110)
ndash CBC Hgb 15 (120-158) Hct 45 (424-480) WBC 11000 (3540-9060) platelets 145000 (165000-415000)
ndash Fingerstick blood sugar was 80
ndash Urinalysis showed protein of 1+ and glucose of 0
ndash Blood culture was positive for MRSA
ndash ECG - NSR 74BPM Axis -30 degrees ST segment 2mm elevated and T-waves down in I L V5 and V6
ndash CXR Left upper lobe infiltrate LVH
What would you wish you could do
Txndash Nitroglycerin sublingual tablet with relief of pain
ndash ceftriaxone for pneumonia
ndash admitted to the CCU for monitoring
ndash then enteric-coated aspirin
Nurse found that the patient was caring for elderly fatherndash concerned that she would no longer be able to manage caring for herself
and him
ndash Consider antidepressant and a social work consult
Medical student concerned about MRSA in pt with pneumonia and recent MIndash Literature search
Databases
There are many ways of storing your data Memo Pad Notes Spreadsheets Simple databases Bespoke databases
Memo Pad Notes
Fast and simple But limited
Spreadsheets
Excel To Go or Pocket Excel Easy and great for calculations But problems with security error checking
synchronization and relational data
Databases
Everything is a database ndash quite right too
Software like HanDBase makes it easy to get startedndash eg surgical logbook
Bespoke databasesndash Allow advanced user
interface
ndash Expensive and require computer expertise
Security
Five steps to analyse security systems
1What assets are you trying to protect
2What are the risks to those assets
3How well does the security solution mitigate those risks
4What other risks does the security solution cause
5What costs and trade-offs does the security solution impose
ldquoBeyond Fearrdquo Bruce Schneier Springer
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Fives steps1 What assets are you trying to protect
2 What are the risks to those assets
3 How well does the security solution mitigate those risks
4 What other risks does the security solution cause
5 What costs and trade-offs does the security solution impose
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Encryption
Scenario 2
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash home PC
ndash work PC
ndash secretarys PC
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The five selected winners will each receive $1000 Scholarship
Mentoring and one-on-one tutorials with me
Publication of your work in the Mobile Medical Computing Reviews journal
Press campaigns by Epocrates and me
One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics
Principles ofmobile medical computing
MohammadAl-Ubaydlimemomd
Mobile computing basics
Personal Digital Assistantsndash Handheld computer a small mobile device that is
part of your computing toolbox
ndash Forget Palm Pocket PC
ndash Forget PDA and smartphone
Just think about the possibilities of a mobile clinical computer
Great for personal use
For the first time IT departments are behind the clinicians in adoptionndash Schedule of course
ndash Personal notes
ndash Personal textbooks Personal Digital Educators NLM mobile eg Clinical Methods
Personal digital educators Cimino et al N Engl J Med 2005 Mar 3352(9)860-2
Why it is here to stay
Handheld computers become smartphones and every clinician is already carrying a phonendash Aziz et al (PMID 16109177) gave smartphones to
surgeons and improved responsiveness to nurses
No charge left behindndash Moulton et al (PMID 16385275) gave handheld
computers to trauma surgeons and increases charge capture
Advantages of handheld computers
Perhaps the best computer ever designed for cliniciansndash Mobility
ndash Synchronization
ndash Beaming
What would you wish you could do
Pt 50 year old Native American female co cough and chest painndash Productive cough for 37 but chest pain 124 ago
PMHndash HTN (capsule half green half blue-green)
ndash TB while pregnant but Rx and duration
ndash Liver biopsy hemachromatosis at other hospital
ndash Allergy to Bufferin
PE well-developed well-nourished female in moderate respiratory distress ndash Vital pulse 90 RR 22 1003 F BP 150100
ndash Rales and rhonchi in the left upper chest
ndash Tender palpable liver edge
What would you wish you could do
Labsndash Chem7 (serum) Glucose 100 (70-105)
ndash Chem7 (plasma) Glucose 150 (75-110)
ndash CBC Hgb 15 (120-158) Hct 45 (424-480) WBC 11000 (3540-9060) platelets 145000 (165000-415000)
ndash Fingerstick blood sugar was 80
ndash Urinalysis showed protein of 1+ and glucose of 0
ndash Blood culture was positive for MRSA
ndash ECG - NSR 74BPM Axis -30 degrees ST segment 2mm elevated and T-waves down in I L V5 and V6
ndash CXR Left upper lobe infiltrate LVH
What would you wish you could do
Txndash Nitroglycerin sublingual tablet with relief of pain
ndash ceftriaxone for pneumonia
ndash admitted to the CCU for monitoring
ndash then enteric-coated aspirin
Nurse found that the patient was caring for elderly fatherndash concerned that she would no longer be able to manage caring for herself
and him
ndash Consider antidepressant and a social work consult
Medical student concerned about MRSA in pt with pneumonia and recent MIndash Literature search
Databases
There are many ways of storing your data Memo Pad Notes Spreadsheets Simple databases Bespoke databases
Memo Pad Notes
Fast and simple But limited
Spreadsheets
Excel To Go or Pocket Excel Easy and great for calculations But problems with security error checking
synchronization and relational data
Databases
Everything is a database ndash quite right too
Software like HanDBase makes it easy to get startedndash eg surgical logbook
Bespoke databasesndash Allow advanced user
interface
ndash Expensive and require computer expertise
Security
Five steps to analyse security systems
1What assets are you trying to protect
2What are the risks to those assets
3How well does the security solution mitigate those risks
4What other risks does the security solution cause
5What costs and trade-offs does the security solution impose
ldquoBeyond Fearrdquo Bruce Schneier Springer
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Fives steps1 What assets are you trying to protect
2 What are the risks to those assets
3 How well does the security solution mitigate those risks
4 What other risks does the security solution cause
5 What costs and trade-offs does the security solution impose
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Encryption
Scenario 2
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash home PC
ndash work PC
ndash secretarys PC
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The five selected winners will each receive $1000 Scholarship
Mentoring and one-on-one tutorials with me
Publication of your work in the Mobile Medical Computing Reviews journal
Press campaigns by Epocrates and me
One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics
Principles ofmobile medical computing
MohammadAl-Ubaydlimemomd
Great for personal use
For the first time IT departments are behind the clinicians in adoptionndash Schedule of course
ndash Personal notes
ndash Personal textbooks Personal Digital Educators NLM mobile eg Clinical Methods
Personal digital educators Cimino et al N Engl J Med 2005 Mar 3352(9)860-2
Why it is here to stay
Handheld computers become smartphones and every clinician is already carrying a phonendash Aziz et al (PMID 16109177) gave smartphones to
surgeons and improved responsiveness to nurses
No charge left behindndash Moulton et al (PMID 16385275) gave handheld
computers to trauma surgeons and increases charge capture
Advantages of handheld computers
Perhaps the best computer ever designed for cliniciansndash Mobility
ndash Synchronization
ndash Beaming
What would you wish you could do
Pt 50 year old Native American female co cough and chest painndash Productive cough for 37 but chest pain 124 ago
PMHndash HTN (capsule half green half blue-green)
ndash TB while pregnant but Rx and duration
ndash Liver biopsy hemachromatosis at other hospital
ndash Allergy to Bufferin
PE well-developed well-nourished female in moderate respiratory distress ndash Vital pulse 90 RR 22 1003 F BP 150100
ndash Rales and rhonchi in the left upper chest
ndash Tender palpable liver edge
What would you wish you could do
Labsndash Chem7 (serum) Glucose 100 (70-105)
ndash Chem7 (plasma) Glucose 150 (75-110)
ndash CBC Hgb 15 (120-158) Hct 45 (424-480) WBC 11000 (3540-9060) platelets 145000 (165000-415000)
ndash Fingerstick blood sugar was 80
ndash Urinalysis showed protein of 1+ and glucose of 0
ndash Blood culture was positive for MRSA
ndash ECG - NSR 74BPM Axis -30 degrees ST segment 2mm elevated and T-waves down in I L V5 and V6
ndash CXR Left upper lobe infiltrate LVH
What would you wish you could do
Txndash Nitroglycerin sublingual tablet with relief of pain
ndash ceftriaxone for pneumonia
ndash admitted to the CCU for monitoring
ndash then enteric-coated aspirin
Nurse found that the patient was caring for elderly fatherndash concerned that she would no longer be able to manage caring for herself
and him
ndash Consider antidepressant and a social work consult
Medical student concerned about MRSA in pt with pneumonia and recent MIndash Literature search
Databases
There are many ways of storing your data Memo Pad Notes Spreadsheets Simple databases Bespoke databases
Memo Pad Notes
Fast and simple But limited
Spreadsheets
Excel To Go or Pocket Excel Easy and great for calculations But problems with security error checking
synchronization and relational data
Databases
Everything is a database ndash quite right too
Software like HanDBase makes it easy to get startedndash eg surgical logbook
Bespoke databasesndash Allow advanced user
interface
ndash Expensive and require computer expertise
Security
Five steps to analyse security systems
1What assets are you trying to protect
2What are the risks to those assets
3How well does the security solution mitigate those risks
4What other risks does the security solution cause
5What costs and trade-offs does the security solution impose
ldquoBeyond Fearrdquo Bruce Schneier Springer
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Fives steps1 What assets are you trying to protect
2 What are the risks to those assets
3 How well does the security solution mitigate those risks
4 What other risks does the security solution cause
5 What costs and trade-offs does the security solution impose
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Encryption
Scenario 2
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash home PC
ndash work PC
ndash secretarys PC
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The five selected winners will each receive $1000 Scholarship
Mentoring and one-on-one tutorials with me
Publication of your work in the Mobile Medical Computing Reviews journal
Press campaigns by Epocrates and me
One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics
Principles ofmobile medical computing
MohammadAl-Ubaydlimemomd
Why it is here to stay
Handheld computers become smartphones and every clinician is already carrying a phonendash Aziz et al (PMID 16109177) gave smartphones to
surgeons and improved responsiveness to nurses
No charge left behindndash Moulton et al (PMID 16385275) gave handheld
computers to trauma surgeons and increases charge capture
Advantages of handheld computers
Perhaps the best computer ever designed for cliniciansndash Mobility
ndash Synchronization
ndash Beaming
What would you wish you could do
Pt 50 year old Native American female co cough and chest painndash Productive cough for 37 but chest pain 124 ago
PMHndash HTN (capsule half green half blue-green)
ndash TB while pregnant but Rx and duration
ndash Liver biopsy hemachromatosis at other hospital
ndash Allergy to Bufferin
PE well-developed well-nourished female in moderate respiratory distress ndash Vital pulse 90 RR 22 1003 F BP 150100
ndash Rales and rhonchi in the left upper chest
ndash Tender palpable liver edge
What would you wish you could do
Labsndash Chem7 (serum) Glucose 100 (70-105)
ndash Chem7 (plasma) Glucose 150 (75-110)
ndash CBC Hgb 15 (120-158) Hct 45 (424-480) WBC 11000 (3540-9060) platelets 145000 (165000-415000)
ndash Fingerstick blood sugar was 80
ndash Urinalysis showed protein of 1+ and glucose of 0
ndash Blood culture was positive for MRSA
ndash ECG - NSR 74BPM Axis -30 degrees ST segment 2mm elevated and T-waves down in I L V5 and V6
ndash CXR Left upper lobe infiltrate LVH
What would you wish you could do
Txndash Nitroglycerin sublingual tablet with relief of pain
ndash ceftriaxone for pneumonia
ndash admitted to the CCU for monitoring
ndash then enteric-coated aspirin
Nurse found that the patient was caring for elderly fatherndash concerned that she would no longer be able to manage caring for herself
and him
ndash Consider antidepressant and a social work consult
Medical student concerned about MRSA in pt with pneumonia and recent MIndash Literature search
Databases
There are many ways of storing your data Memo Pad Notes Spreadsheets Simple databases Bespoke databases
Memo Pad Notes
Fast and simple But limited
Spreadsheets
Excel To Go or Pocket Excel Easy and great for calculations But problems with security error checking
synchronization and relational data
Databases
Everything is a database ndash quite right too
Software like HanDBase makes it easy to get startedndash eg surgical logbook
Bespoke databasesndash Allow advanced user
interface
ndash Expensive and require computer expertise
Security
Five steps to analyse security systems
1What assets are you trying to protect
2What are the risks to those assets
3How well does the security solution mitigate those risks
4What other risks does the security solution cause
5What costs and trade-offs does the security solution impose
ldquoBeyond Fearrdquo Bruce Schneier Springer
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Fives steps1 What assets are you trying to protect
2 What are the risks to those assets
3 How well does the security solution mitigate those risks
4 What other risks does the security solution cause
5 What costs and trade-offs does the security solution impose
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Encryption
Scenario 2
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash home PC
ndash work PC
ndash secretarys PC
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The five selected winners will each receive $1000 Scholarship
Mentoring and one-on-one tutorials with me
Publication of your work in the Mobile Medical Computing Reviews journal
Press campaigns by Epocrates and me
One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics
Principles ofmobile medical computing
MohammadAl-Ubaydlimemomd
Advantages of handheld computers
Perhaps the best computer ever designed for cliniciansndash Mobility
ndash Synchronization
ndash Beaming
What would you wish you could do
Pt 50 year old Native American female co cough and chest painndash Productive cough for 37 but chest pain 124 ago
PMHndash HTN (capsule half green half blue-green)
ndash TB while pregnant but Rx and duration
ndash Liver biopsy hemachromatosis at other hospital
ndash Allergy to Bufferin
PE well-developed well-nourished female in moderate respiratory distress ndash Vital pulse 90 RR 22 1003 F BP 150100
ndash Rales and rhonchi in the left upper chest
ndash Tender palpable liver edge
What would you wish you could do
Labsndash Chem7 (serum) Glucose 100 (70-105)
ndash Chem7 (plasma) Glucose 150 (75-110)
ndash CBC Hgb 15 (120-158) Hct 45 (424-480) WBC 11000 (3540-9060) platelets 145000 (165000-415000)
ndash Fingerstick blood sugar was 80
ndash Urinalysis showed protein of 1+ and glucose of 0
ndash Blood culture was positive for MRSA
ndash ECG - NSR 74BPM Axis -30 degrees ST segment 2mm elevated and T-waves down in I L V5 and V6
ndash CXR Left upper lobe infiltrate LVH
What would you wish you could do
Txndash Nitroglycerin sublingual tablet with relief of pain
ndash ceftriaxone for pneumonia
ndash admitted to the CCU for monitoring
ndash then enteric-coated aspirin
Nurse found that the patient was caring for elderly fatherndash concerned that she would no longer be able to manage caring for herself
and him
ndash Consider antidepressant and a social work consult
Medical student concerned about MRSA in pt with pneumonia and recent MIndash Literature search
Databases
There are many ways of storing your data Memo Pad Notes Spreadsheets Simple databases Bespoke databases
Memo Pad Notes
Fast and simple But limited
Spreadsheets
Excel To Go or Pocket Excel Easy and great for calculations But problems with security error checking
synchronization and relational data
Databases
Everything is a database ndash quite right too
Software like HanDBase makes it easy to get startedndash eg surgical logbook
Bespoke databasesndash Allow advanced user
interface
ndash Expensive and require computer expertise
Security
Five steps to analyse security systems
1What assets are you trying to protect
2What are the risks to those assets
3How well does the security solution mitigate those risks
4What other risks does the security solution cause
5What costs and trade-offs does the security solution impose
ldquoBeyond Fearrdquo Bruce Schneier Springer
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Fives steps1 What assets are you trying to protect
2 What are the risks to those assets
3 How well does the security solution mitigate those risks
4 What other risks does the security solution cause
5 What costs and trade-offs does the security solution impose
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Encryption
Scenario 2
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash home PC
ndash work PC
ndash secretarys PC
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The five selected winners will each receive $1000 Scholarship
Mentoring and one-on-one tutorials with me
Publication of your work in the Mobile Medical Computing Reviews journal
Press campaigns by Epocrates and me
One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics
Principles ofmobile medical computing
MohammadAl-Ubaydlimemomd
What would you wish you could do
Pt 50 year old Native American female co cough and chest painndash Productive cough for 37 but chest pain 124 ago
PMHndash HTN (capsule half green half blue-green)
ndash TB while pregnant but Rx and duration
ndash Liver biopsy hemachromatosis at other hospital
ndash Allergy to Bufferin
PE well-developed well-nourished female in moderate respiratory distress ndash Vital pulse 90 RR 22 1003 F BP 150100
ndash Rales and rhonchi in the left upper chest
ndash Tender palpable liver edge
What would you wish you could do
Labsndash Chem7 (serum) Glucose 100 (70-105)
ndash Chem7 (plasma) Glucose 150 (75-110)
ndash CBC Hgb 15 (120-158) Hct 45 (424-480) WBC 11000 (3540-9060) platelets 145000 (165000-415000)
ndash Fingerstick blood sugar was 80
ndash Urinalysis showed protein of 1+ and glucose of 0
ndash Blood culture was positive for MRSA
ndash ECG - NSR 74BPM Axis -30 degrees ST segment 2mm elevated and T-waves down in I L V5 and V6
ndash CXR Left upper lobe infiltrate LVH
What would you wish you could do
Txndash Nitroglycerin sublingual tablet with relief of pain
ndash ceftriaxone for pneumonia
ndash admitted to the CCU for monitoring
ndash then enteric-coated aspirin
Nurse found that the patient was caring for elderly fatherndash concerned that she would no longer be able to manage caring for herself
and him
ndash Consider antidepressant and a social work consult
Medical student concerned about MRSA in pt with pneumonia and recent MIndash Literature search
Databases
There are many ways of storing your data Memo Pad Notes Spreadsheets Simple databases Bespoke databases
Memo Pad Notes
Fast and simple But limited
Spreadsheets
Excel To Go or Pocket Excel Easy and great for calculations But problems with security error checking
synchronization and relational data
Databases
Everything is a database ndash quite right too
Software like HanDBase makes it easy to get startedndash eg surgical logbook
Bespoke databasesndash Allow advanced user
interface
ndash Expensive and require computer expertise
Security
Five steps to analyse security systems
1What assets are you trying to protect
2What are the risks to those assets
3How well does the security solution mitigate those risks
4What other risks does the security solution cause
5What costs and trade-offs does the security solution impose
ldquoBeyond Fearrdquo Bruce Schneier Springer
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Fives steps1 What assets are you trying to protect
2 What are the risks to those assets
3 How well does the security solution mitigate those risks
4 What other risks does the security solution cause
5 What costs and trade-offs does the security solution impose
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Encryption
Scenario 2
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash home PC
ndash work PC
ndash secretarys PC
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The five selected winners will each receive $1000 Scholarship
Mentoring and one-on-one tutorials with me
Publication of your work in the Mobile Medical Computing Reviews journal
Press campaigns by Epocrates and me
One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics
Principles ofmobile medical computing
MohammadAl-Ubaydlimemomd
What would you wish you could do
Labsndash Chem7 (serum) Glucose 100 (70-105)
ndash Chem7 (plasma) Glucose 150 (75-110)
ndash CBC Hgb 15 (120-158) Hct 45 (424-480) WBC 11000 (3540-9060) platelets 145000 (165000-415000)
ndash Fingerstick blood sugar was 80
ndash Urinalysis showed protein of 1+ and glucose of 0
ndash Blood culture was positive for MRSA
ndash ECG - NSR 74BPM Axis -30 degrees ST segment 2mm elevated and T-waves down in I L V5 and V6
ndash CXR Left upper lobe infiltrate LVH
What would you wish you could do
Txndash Nitroglycerin sublingual tablet with relief of pain
ndash ceftriaxone for pneumonia
ndash admitted to the CCU for monitoring
ndash then enteric-coated aspirin
Nurse found that the patient was caring for elderly fatherndash concerned that she would no longer be able to manage caring for herself
and him
ndash Consider antidepressant and a social work consult
Medical student concerned about MRSA in pt with pneumonia and recent MIndash Literature search
Databases
There are many ways of storing your data Memo Pad Notes Spreadsheets Simple databases Bespoke databases
Memo Pad Notes
Fast and simple But limited
Spreadsheets
Excel To Go or Pocket Excel Easy and great for calculations But problems with security error checking
synchronization and relational data
Databases
Everything is a database ndash quite right too
Software like HanDBase makes it easy to get startedndash eg surgical logbook
Bespoke databasesndash Allow advanced user
interface
ndash Expensive and require computer expertise
Security
Five steps to analyse security systems
1What assets are you trying to protect
2What are the risks to those assets
3How well does the security solution mitigate those risks
4What other risks does the security solution cause
5What costs and trade-offs does the security solution impose
ldquoBeyond Fearrdquo Bruce Schneier Springer
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Fives steps1 What assets are you trying to protect
2 What are the risks to those assets
3 How well does the security solution mitigate those risks
4 What other risks does the security solution cause
5 What costs and trade-offs does the security solution impose
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Encryption
Scenario 2
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash home PC
ndash work PC
ndash secretarys PC
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The five selected winners will each receive $1000 Scholarship
Mentoring and one-on-one tutorials with me
Publication of your work in the Mobile Medical Computing Reviews journal
Press campaigns by Epocrates and me
One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics
Principles ofmobile medical computing
MohammadAl-Ubaydlimemomd
What would you wish you could do
Txndash Nitroglycerin sublingual tablet with relief of pain
ndash ceftriaxone for pneumonia
ndash admitted to the CCU for monitoring
ndash then enteric-coated aspirin
Nurse found that the patient was caring for elderly fatherndash concerned that she would no longer be able to manage caring for herself
and him
ndash Consider antidepressant and a social work consult
Medical student concerned about MRSA in pt with pneumonia and recent MIndash Literature search
Databases
There are many ways of storing your data Memo Pad Notes Spreadsheets Simple databases Bespoke databases
Memo Pad Notes
Fast and simple But limited
Spreadsheets
Excel To Go or Pocket Excel Easy and great for calculations But problems with security error checking
synchronization and relational data
Databases
Everything is a database ndash quite right too
Software like HanDBase makes it easy to get startedndash eg surgical logbook
Bespoke databasesndash Allow advanced user
interface
ndash Expensive and require computer expertise
Security
Five steps to analyse security systems
1What assets are you trying to protect
2What are the risks to those assets
3How well does the security solution mitigate those risks
4What other risks does the security solution cause
5What costs and trade-offs does the security solution impose
ldquoBeyond Fearrdquo Bruce Schneier Springer
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Fives steps1 What assets are you trying to protect
2 What are the risks to those assets
3 How well does the security solution mitigate those risks
4 What other risks does the security solution cause
5 What costs and trade-offs does the security solution impose
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Encryption
Scenario 2
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash home PC
ndash work PC
ndash secretarys PC
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The five selected winners will each receive $1000 Scholarship
Mentoring and one-on-one tutorials with me
Publication of your work in the Mobile Medical Computing Reviews journal
Press campaigns by Epocrates and me
One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics
Principles ofmobile medical computing
MohammadAl-Ubaydlimemomd
Databases
There are many ways of storing your data Memo Pad Notes Spreadsheets Simple databases Bespoke databases
Memo Pad Notes
Fast and simple But limited
Spreadsheets
Excel To Go or Pocket Excel Easy and great for calculations But problems with security error checking
synchronization and relational data
Databases
Everything is a database ndash quite right too
Software like HanDBase makes it easy to get startedndash eg surgical logbook
Bespoke databasesndash Allow advanced user
interface
ndash Expensive and require computer expertise
Security
Five steps to analyse security systems
1What assets are you trying to protect
2What are the risks to those assets
3How well does the security solution mitigate those risks
4What other risks does the security solution cause
5What costs and trade-offs does the security solution impose
ldquoBeyond Fearrdquo Bruce Schneier Springer
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Fives steps1 What assets are you trying to protect
2 What are the risks to those assets
3 How well does the security solution mitigate those risks
4 What other risks does the security solution cause
5 What costs and trade-offs does the security solution impose
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Encryption
Scenario 2
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash home PC
ndash work PC
ndash secretarys PC
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The five selected winners will each receive $1000 Scholarship
Mentoring and one-on-one tutorials with me
Publication of your work in the Mobile Medical Computing Reviews journal
Press campaigns by Epocrates and me
One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics
Principles ofmobile medical computing
MohammadAl-Ubaydlimemomd
Memo Pad Notes
Fast and simple But limited
Spreadsheets
Excel To Go or Pocket Excel Easy and great for calculations But problems with security error checking
synchronization and relational data
Databases
Everything is a database ndash quite right too
Software like HanDBase makes it easy to get startedndash eg surgical logbook
Bespoke databasesndash Allow advanced user
interface
ndash Expensive and require computer expertise
Security
Five steps to analyse security systems
1What assets are you trying to protect
2What are the risks to those assets
3How well does the security solution mitigate those risks
4What other risks does the security solution cause
5What costs and trade-offs does the security solution impose
ldquoBeyond Fearrdquo Bruce Schneier Springer
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Fives steps1 What assets are you trying to protect
2 What are the risks to those assets
3 How well does the security solution mitigate those risks
4 What other risks does the security solution cause
5 What costs and trade-offs does the security solution impose
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Encryption
Scenario 2
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash home PC
ndash work PC
ndash secretarys PC
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The five selected winners will each receive $1000 Scholarship
Mentoring and one-on-one tutorials with me
Publication of your work in the Mobile Medical Computing Reviews journal
Press campaigns by Epocrates and me
One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics
Principles ofmobile medical computing
MohammadAl-Ubaydlimemomd
Spreadsheets
Excel To Go or Pocket Excel Easy and great for calculations But problems with security error checking
synchronization and relational data
Databases
Everything is a database ndash quite right too
Software like HanDBase makes it easy to get startedndash eg surgical logbook
Bespoke databasesndash Allow advanced user
interface
ndash Expensive and require computer expertise
Security
Five steps to analyse security systems
1What assets are you trying to protect
2What are the risks to those assets
3How well does the security solution mitigate those risks
4What other risks does the security solution cause
5What costs and trade-offs does the security solution impose
ldquoBeyond Fearrdquo Bruce Schneier Springer
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Fives steps1 What assets are you trying to protect
2 What are the risks to those assets
3 How well does the security solution mitigate those risks
4 What other risks does the security solution cause
5 What costs and trade-offs does the security solution impose
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Encryption
Scenario 2
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash home PC
ndash work PC
ndash secretarys PC
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The five selected winners will each receive $1000 Scholarship
Mentoring and one-on-one tutorials with me
Publication of your work in the Mobile Medical Computing Reviews journal
Press campaigns by Epocrates and me
One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics
Principles ofmobile medical computing
MohammadAl-Ubaydlimemomd
Databases
Everything is a database ndash quite right too
Software like HanDBase makes it easy to get startedndash eg surgical logbook
Bespoke databasesndash Allow advanced user
interface
ndash Expensive and require computer expertise
Security
Five steps to analyse security systems
1What assets are you trying to protect
2What are the risks to those assets
3How well does the security solution mitigate those risks
4What other risks does the security solution cause
5What costs and trade-offs does the security solution impose
ldquoBeyond Fearrdquo Bruce Schneier Springer
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Fives steps1 What assets are you trying to protect
2 What are the risks to those assets
3 How well does the security solution mitigate those risks
4 What other risks does the security solution cause
5 What costs and trade-offs does the security solution impose
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Encryption
Scenario 2
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash home PC
ndash work PC
ndash secretarys PC
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The five selected winners will each receive $1000 Scholarship
Mentoring and one-on-one tutorials with me
Publication of your work in the Mobile Medical Computing Reviews journal
Press campaigns by Epocrates and me
One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics
Principles ofmobile medical computing
MohammadAl-Ubaydlimemomd
Security
Five steps to analyse security systems
1What assets are you trying to protect
2What are the risks to those assets
3How well does the security solution mitigate those risks
4What other risks does the security solution cause
5What costs and trade-offs does the security solution impose
ldquoBeyond Fearrdquo Bruce Schneier Springer
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Fives steps1 What assets are you trying to protect
2 What are the risks to those assets
3 How well does the security solution mitigate those risks
4 What other risks does the security solution cause
5 What costs and trade-offs does the security solution impose
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Encryption
Scenario 2
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash home PC
ndash work PC
ndash secretarys PC
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The five selected winners will each receive $1000 Scholarship
Mentoring and one-on-one tutorials with me
Publication of your work in the Mobile Medical Computing Reviews journal
Press campaigns by Epocrates and me
One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics
Principles ofmobile medical computing
MohammadAl-Ubaydlimemomd
Five steps to analyse security systems
1What assets are you trying to protect
2What are the risks to those assets
3How well does the security solution mitigate those risks
4What other risks does the security solution cause
5What costs and trade-offs does the security solution impose
ldquoBeyond Fearrdquo Bruce Schneier Springer
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Fives steps1 What assets are you trying to protect
2 What are the risks to those assets
3 How well does the security solution mitigate those risks
4 What other risks does the security solution cause
5 What costs and trade-offs does the security solution impose
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Encryption
Scenario 2
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash home PC
ndash work PC
ndash secretarys PC
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The five selected winners will each receive $1000 Scholarship
Mentoring and one-on-one tutorials with me
Publication of your work in the Mobile Medical Computing Reviews journal
Press campaigns by Epocrates and me
One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics
Principles ofmobile medical computing
MohammadAl-Ubaydlimemomd
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Fives steps1 What assets are you trying to protect
2 What are the risks to those assets
3 How well does the security solution mitigate those risks
4 What other risks does the security solution cause
5 What costs and trade-offs does the security solution impose
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Encryption
Scenario 2
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash home PC
ndash work PC
ndash secretarys PC
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The five selected winners will each receive $1000 Scholarship
Mentoring and one-on-one tutorials with me
Publication of your work in the Mobile Medical Computing Reviews journal
Press campaigns by Epocrates and me
One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics
Principles ofmobile medical computing
MohammadAl-Ubaydlimemomd
Scenario 1
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Encryption
Scenario 2
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash home PC
ndash work PC
ndash secretarys PC
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The five selected winners will each receive $1000 Scholarship
Mentoring and one-on-one tutorials with me
Publication of your work in the Mobile Medical Computing Reviews journal
Press campaigns by Epocrates and me
One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics
Principles ofmobile medical computing
MohammadAl-Ubaydlimemomd
Scenario 2
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash home PC
ndash work PC
ndash secretarys PC
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The five selected winners will each receive $1000 Scholarship
Mentoring and one-on-one tutorials with me
Publication of your work in the Mobile Medical Computing Reviews journal
Press campaigns by Epocrates and me
One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics
Principles ofmobile medical computing
MohammadAl-Ubaydlimemomd
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The five selected winners will each receive $1000 Scholarship
Mentoring and one-on-one tutorials with me
Publication of your work in the Mobile Medical Computing Reviews journal
Press campaigns by Epocrates and me
One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics
Principles ofmobile medical computing
MohammadAl-Ubaydlimemomd
Scenario 3
One handheld computer storingndash appointments (clinics and personal)
ndash addresses (ward phone numbers computer passwords)
ndash tasks (including name of the patient)
ndash memos (lecture notes patient summaries)
Synchronise withndash MAU SAU PCs
ndash sever PC
ndash other PDAs
ndash home PCs
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The five selected winners will each receive $1000 Scholarship
Mentoring and one-on-one tutorials with me
Publication of your work in the Mobile Medical Computing Reviews journal
Press campaigns by Epocrates and me
One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics
Principles ofmobile medical computing
MohammadAl-Ubaydlimemomd
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The five selected winners will each receive $1000 Scholarship
Mentoring and one-on-one tutorials with me
Publication of your work in the Mobile Medical Computing Reviews journal
Press campaigns by Epocrates and me
One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics
Principles ofmobile medical computing
MohammadAl-Ubaydlimemomd
The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing
The five selected winners will each receive $1000 Scholarship
Mentoring and one-on-one tutorials with me
Publication of your work in the Mobile Medical Computing Reviews journal
Press campaigns by Epocrates and me
One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics
Principles ofmobile medical computing
MohammadAl-Ubaydlimemomd
Principles ofmobile medical computing
MohammadAl-Ubaydlimemomd