06.09.26

24
Principles of mobile medical computing Mohammad Al-Ubaydli [email protected]

description

 

Transcript of 06.09.26

Page 1: 06.09.26

Principles ofmobile medical computing

MohammadAl-Ubaydlimemomd

Principles ofmobile medical computing

Introductions Mobile computing basics Advantages of the medium Databases Ensuring security Scholarship how to win $1000

Learn these two URLs wwwnlmnihgovmobile wwwhandheldsfordoctorscomscholarship

Introductions

How many of you own a PDA have beamed want to start a

PDA project

Mobile computing basics

Personal Digital Assistantsndash Handheld computer a small mobile device that is

part of your computing toolbox

ndash Forget Palm Pocket PC

ndash Forget PDA and smartphone

Just think about the possibilities of a mobile clinical computer

Great for personal use

For the first time IT departments are behind the clinicians in adoptionndash Schedule of course

ndash Personal notes

ndash Personal textbooks Personal Digital Educators NLM mobile eg Clinical Methods

Personal digital educators Cimino et al N Engl J Med 2005 Mar 3352(9)860-2

Why it is here to stay

Handheld computers become smartphones and every clinician is already carrying a phonendash Aziz et al (PMID 16109177) gave smartphones to

surgeons and improved responsiveness to nurses

No charge left behindndash Moulton et al (PMID 16385275) gave handheld

computers to trauma surgeons and increases charge capture

Advantages of handheld computers

Perhaps the best computer ever designed for cliniciansndash Mobility

ndash Synchronization

ndash Beaming

What would you wish you could do

Pt 50 year old Native American female co cough and chest painndash Productive cough for 37 but chest pain 124 ago

PMHndash HTN (capsule half green half blue-green)

ndash TB while pregnant but Rx and duration

ndash Liver biopsy hemachromatosis at other hospital

ndash Allergy to Bufferin

PE well-developed well-nourished female in moderate respiratory distress ndash Vital pulse 90 RR 22 1003 F BP 150100

ndash Rales and rhonchi in the left upper chest

ndash Tender palpable liver edge

What would you wish you could do

Labsndash Chem7 (serum) Glucose 100 (70-105)

ndash Chem7 (plasma) Glucose 150 (75-110)

ndash CBC Hgb 15 (120-158) Hct 45 (424-480) WBC 11000 (3540-9060) platelets 145000 (165000-415000)

ndash Fingerstick blood sugar was 80

ndash Urinalysis showed protein of 1+ and glucose of 0

ndash Blood culture was positive for MRSA

ndash ECG - NSR 74BPM Axis -30 degrees ST segment 2mm elevated and T-waves down in I L V5 and V6

ndash CXR Left upper lobe infiltrate LVH

What would you wish you could do

Txndash Nitroglycerin sublingual tablet with relief of pain

ndash ceftriaxone for pneumonia

ndash admitted to the CCU for monitoring

ndash then enteric-coated aspirin

Nurse found that the patient was caring for elderly fatherndash concerned that she would no longer be able to manage caring for herself

and him

ndash Consider antidepressant and a social work consult

Medical student concerned about MRSA in pt with pneumonia and recent MIndash Literature search

Databases

There are many ways of storing your data Memo Pad Notes Spreadsheets Simple databases Bespoke databases

Memo Pad Notes

Fast and simple But limited

Spreadsheets

Excel To Go or Pocket Excel Easy and great for calculations But problems with security error checking

synchronization and relational data

Databases

Everything is a database ndash quite right too

Software like HanDBase makes it easy to get startedndash eg surgical logbook

Bespoke databasesndash Allow advanced user

interface

ndash Expensive and require computer expertise

Security

Five steps to analyse security systems

1What assets are you trying to protect

2What are the risks to those assets

3How well does the security solution mitigate those risks

4What other risks does the security solution cause

5What costs and trade-offs does the security solution impose

ldquoBeyond Fearrdquo Bruce Schneier Springer

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Fives steps1 What assets are you trying to protect

2 What are the risks to those assets

3 How well does the security solution mitigate those risks

4 What other risks does the security solution cause

5 What costs and trade-offs does the security solution impose

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Encryption

Scenario 2

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash home PC

ndash work PC

ndash secretarys PC

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The five selected winners will each receive $1000 Scholarship

Mentoring and one-on-one tutorials with me

Publication of your work in the Mobile Medical Computing Reviews journal

Press campaigns by Epocrates and me

One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics

Principles ofmobile medical computing

MohammadAl-Ubaydlimemomd

Page 2: 06.09.26

Principles ofmobile medical computing

Introductions Mobile computing basics Advantages of the medium Databases Ensuring security Scholarship how to win $1000

Learn these two URLs wwwnlmnihgovmobile wwwhandheldsfordoctorscomscholarship

Introductions

How many of you own a PDA have beamed want to start a

PDA project

Mobile computing basics

Personal Digital Assistantsndash Handheld computer a small mobile device that is

part of your computing toolbox

ndash Forget Palm Pocket PC

ndash Forget PDA and smartphone

Just think about the possibilities of a mobile clinical computer

Great for personal use

For the first time IT departments are behind the clinicians in adoptionndash Schedule of course

ndash Personal notes

ndash Personal textbooks Personal Digital Educators NLM mobile eg Clinical Methods

Personal digital educators Cimino et al N Engl J Med 2005 Mar 3352(9)860-2

Why it is here to stay

Handheld computers become smartphones and every clinician is already carrying a phonendash Aziz et al (PMID 16109177) gave smartphones to

surgeons and improved responsiveness to nurses

No charge left behindndash Moulton et al (PMID 16385275) gave handheld

computers to trauma surgeons and increases charge capture

Advantages of handheld computers

Perhaps the best computer ever designed for cliniciansndash Mobility

ndash Synchronization

ndash Beaming

What would you wish you could do

Pt 50 year old Native American female co cough and chest painndash Productive cough for 37 but chest pain 124 ago

PMHndash HTN (capsule half green half blue-green)

ndash TB while pregnant but Rx and duration

ndash Liver biopsy hemachromatosis at other hospital

ndash Allergy to Bufferin

PE well-developed well-nourished female in moderate respiratory distress ndash Vital pulse 90 RR 22 1003 F BP 150100

ndash Rales and rhonchi in the left upper chest

ndash Tender palpable liver edge

What would you wish you could do

Labsndash Chem7 (serum) Glucose 100 (70-105)

ndash Chem7 (plasma) Glucose 150 (75-110)

ndash CBC Hgb 15 (120-158) Hct 45 (424-480) WBC 11000 (3540-9060) platelets 145000 (165000-415000)

ndash Fingerstick blood sugar was 80

ndash Urinalysis showed protein of 1+ and glucose of 0

ndash Blood culture was positive for MRSA

ndash ECG - NSR 74BPM Axis -30 degrees ST segment 2mm elevated and T-waves down in I L V5 and V6

ndash CXR Left upper lobe infiltrate LVH

What would you wish you could do

Txndash Nitroglycerin sublingual tablet with relief of pain

ndash ceftriaxone for pneumonia

ndash admitted to the CCU for monitoring

ndash then enteric-coated aspirin

Nurse found that the patient was caring for elderly fatherndash concerned that she would no longer be able to manage caring for herself

and him

ndash Consider antidepressant and a social work consult

Medical student concerned about MRSA in pt with pneumonia and recent MIndash Literature search

Databases

There are many ways of storing your data Memo Pad Notes Spreadsheets Simple databases Bespoke databases

Memo Pad Notes

Fast and simple But limited

Spreadsheets

Excel To Go or Pocket Excel Easy and great for calculations But problems with security error checking

synchronization and relational data

Databases

Everything is a database ndash quite right too

Software like HanDBase makes it easy to get startedndash eg surgical logbook

Bespoke databasesndash Allow advanced user

interface

ndash Expensive and require computer expertise

Security

Five steps to analyse security systems

1What assets are you trying to protect

2What are the risks to those assets

3How well does the security solution mitigate those risks

4What other risks does the security solution cause

5What costs and trade-offs does the security solution impose

ldquoBeyond Fearrdquo Bruce Schneier Springer

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Fives steps1 What assets are you trying to protect

2 What are the risks to those assets

3 How well does the security solution mitigate those risks

4 What other risks does the security solution cause

5 What costs and trade-offs does the security solution impose

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Encryption

Scenario 2

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash home PC

ndash work PC

ndash secretarys PC

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The five selected winners will each receive $1000 Scholarship

Mentoring and one-on-one tutorials with me

Publication of your work in the Mobile Medical Computing Reviews journal

Press campaigns by Epocrates and me

One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics

Principles ofmobile medical computing

MohammadAl-Ubaydlimemomd

Page 3: 06.09.26

Introductions

How many of you own a PDA have beamed want to start a

PDA project

Mobile computing basics

Personal Digital Assistantsndash Handheld computer a small mobile device that is

part of your computing toolbox

ndash Forget Palm Pocket PC

ndash Forget PDA and smartphone

Just think about the possibilities of a mobile clinical computer

Great for personal use

For the first time IT departments are behind the clinicians in adoptionndash Schedule of course

ndash Personal notes

ndash Personal textbooks Personal Digital Educators NLM mobile eg Clinical Methods

Personal digital educators Cimino et al N Engl J Med 2005 Mar 3352(9)860-2

Why it is here to stay

Handheld computers become smartphones and every clinician is already carrying a phonendash Aziz et al (PMID 16109177) gave smartphones to

surgeons and improved responsiveness to nurses

No charge left behindndash Moulton et al (PMID 16385275) gave handheld

computers to trauma surgeons and increases charge capture

Advantages of handheld computers

Perhaps the best computer ever designed for cliniciansndash Mobility

ndash Synchronization

ndash Beaming

What would you wish you could do

Pt 50 year old Native American female co cough and chest painndash Productive cough for 37 but chest pain 124 ago

PMHndash HTN (capsule half green half blue-green)

ndash TB while pregnant but Rx and duration

ndash Liver biopsy hemachromatosis at other hospital

ndash Allergy to Bufferin

PE well-developed well-nourished female in moderate respiratory distress ndash Vital pulse 90 RR 22 1003 F BP 150100

ndash Rales and rhonchi in the left upper chest

ndash Tender palpable liver edge

What would you wish you could do

Labsndash Chem7 (serum) Glucose 100 (70-105)

ndash Chem7 (plasma) Glucose 150 (75-110)

ndash CBC Hgb 15 (120-158) Hct 45 (424-480) WBC 11000 (3540-9060) platelets 145000 (165000-415000)

ndash Fingerstick blood sugar was 80

ndash Urinalysis showed protein of 1+ and glucose of 0

ndash Blood culture was positive for MRSA

ndash ECG - NSR 74BPM Axis -30 degrees ST segment 2mm elevated and T-waves down in I L V5 and V6

ndash CXR Left upper lobe infiltrate LVH

What would you wish you could do

Txndash Nitroglycerin sublingual tablet with relief of pain

ndash ceftriaxone for pneumonia

ndash admitted to the CCU for monitoring

ndash then enteric-coated aspirin

Nurse found that the patient was caring for elderly fatherndash concerned that she would no longer be able to manage caring for herself

and him

ndash Consider antidepressant and a social work consult

Medical student concerned about MRSA in pt with pneumonia and recent MIndash Literature search

Databases

There are many ways of storing your data Memo Pad Notes Spreadsheets Simple databases Bespoke databases

Memo Pad Notes

Fast and simple But limited

Spreadsheets

Excel To Go or Pocket Excel Easy and great for calculations But problems with security error checking

synchronization and relational data

Databases

Everything is a database ndash quite right too

Software like HanDBase makes it easy to get startedndash eg surgical logbook

Bespoke databasesndash Allow advanced user

interface

ndash Expensive and require computer expertise

Security

Five steps to analyse security systems

1What assets are you trying to protect

2What are the risks to those assets

3How well does the security solution mitigate those risks

4What other risks does the security solution cause

5What costs and trade-offs does the security solution impose

ldquoBeyond Fearrdquo Bruce Schneier Springer

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Fives steps1 What assets are you trying to protect

2 What are the risks to those assets

3 How well does the security solution mitigate those risks

4 What other risks does the security solution cause

5 What costs and trade-offs does the security solution impose

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Encryption

Scenario 2

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash home PC

ndash work PC

ndash secretarys PC

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The five selected winners will each receive $1000 Scholarship

Mentoring and one-on-one tutorials with me

Publication of your work in the Mobile Medical Computing Reviews journal

Press campaigns by Epocrates and me

One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics

Principles ofmobile medical computing

MohammadAl-Ubaydlimemomd

Page 4: 06.09.26

Mobile computing basics

Personal Digital Assistantsndash Handheld computer a small mobile device that is

part of your computing toolbox

ndash Forget Palm Pocket PC

ndash Forget PDA and smartphone

Just think about the possibilities of a mobile clinical computer

Great for personal use

For the first time IT departments are behind the clinicians in adoptionndash Schedule of course

ndash Personal notes

ndash Personal textbooks Personal Digital Educators NLM mobile eg Clinical Methods

Personal digital educators Cimino et al N Engl J Med 2005 Mar 3352(9)860-2

Why it is here to stay

Handheld computers become smartphones and every clinician is already carrying a phonendash Aziz et al (PMID 16109177) gave smartphones to

surgeons and improved responsiveness to nurses

No charge left behindndash Moulton et al (PMID 16385275) gave handheld

computers to trauma surgeons and increases charge capture

Advantages of handheld computers

Perhaps the best computer ever designed for cliniciansndash Mobility

ndash Synchronization

ndash Beaming

What would you wish you could do

Pt 50 year old Native American female co cough and chest painndash Productive cough for 37 but chest pain 124 ago

PMHndash HTN (capsule half green half blue-green)

ndash TB while pregnant but Rx and duration

ndash Liver biopsy hemachromatosis at other hospital

ndash Allergy to Bufferin

PE well-developed well-nourished female in moderate respiratory distress ndash Vital pulse 90 RR 22 1003 F BP 150100

ndash Rales and rhonchi in the left upper chest

ndash Tender palpable liver edge

What would you wish you could do

Labsndash Chem7 (serum) Glucose 100 (70-105)

ndash Chem7 (plasma) Glucose 150 (75-110)

ndash CBC Hgb 15 (120-158) Hct 45 (424-480) WBC 11000 (3540-9060) platelets 145000 (165000-415000)

ndash Fingerstick blood sugar was 80

ndash Urinalysis showed protein of 1+ and glucose of 0

ndash Blood culture was positive for MRSA

ndash ECG - NSR 74BPM Axis -30 degrees ST segment 2mm elevated and T-waves down in I L V5 and V6

ndash CXR Left upper lobe infiltrate LVH

What would you wish you could do

Txndash Nitroglycerin sublingual tablet with relief of pain

ndash ceftriaxone for pneumonia

ndash admitted to the CCU for monitoring

ndash then enteric-coated aspirin

Nurse found that the patient was caring for elderly fatherndash concerned that she would no longer be able to manage caring for herself

and him

ndash Consider antidepressant and a social work consult

Medical student concerned about MRSA in pt with pneumonia and recent MIndash Literature search

Databases

There are many ways of storing your data Memo Pad Notes Spreadsheets Simple databases Bespoke databases

Memo Pad Notes

Fast and simple But limited

Spreadsheets

Excel To Go or Pocket Excel Easy and great for calculations But problems with security error checking

synchronization and relational data

Databases

Everything is a database ndash quite right too

Software like HanDBase makes it easy to get startedndash eg surgical logbook

Bespoke databasesndash Allow advanced user

interface

ndash Expensive and require computer expertise

Security

Five steps to analyse security systems

1What assets are you trying to protect

2What are the risks to those assets

3How well does the security solution mitigate those risks

4What other risks does the security solution cause

5What costs and trade-offs does the security solution impose

ldquoBeyond Fearrdquo Bruce Schneier Springer

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Fives steps1 What assets are you trying to protect

2 What are the risks to those assets

3 How well does the security solution mitigate those risks

4 What other risks does the security solution cause

5 What costs and trade-offs does the security solution impose

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Encryption

Scenario 2

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash home PC

ndash work PC

ndash secretarys PC

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The five selected winners will each receive $1000 Scholarship

Mentoring and one-on-one tutorials with me

Publication of your work in the Mobile Medical Computing Reviews journal

Press campaigns by Epocrates and me

One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics

Principles ofmobile medical computing

MohammadAl-Ubaydlimemomd

Page 5: 06.09.26

Great for personal use

For the first time IT departments are behind the clinicians in adoptionndash Schedule of course

ndash Personal notes

ndash Personal textbooks Personal Digital Educators NLM mobile eg Clinical Methods

Personal digital educators Cimino et al N Engl J Med 2005 Mar 3352(9)860-2

Why it is here to stay

Handheld computers become smartphones and every clinician is already carrying a phonendash Aziz et al (PMID 16109177) gave smartphones to

surgeons and improved responsiveness to nurses

No charge left behindndash Moulton et al (PMID 16385275) gave handheld

computers to trauma surgeons and increases charge capture

Advantages of handheld computers

Perhaps the best computer ever designed for cliniciansndash Mobility

ndash Synchronization

ndash Beaming

What would you wish you could do

Pt 50 year old Native American female co cough and chest painndash Productive cough for 37 but chest pain 124 ago

PMHndash HTN (capsule half green half blue-green)

ndash TB while pregnant but Rx and duration

ndash Liver biopsy hemachromatosis at other hospital

ndash Allergy to Bufferin

PE well-developed well-nourished female in moderate respiratory distress ndash Vital pulse 90 RR 22 1003 F BP 150100

ndash Rales and rhonchi in the left upper chest

ndash Tender palpable liver edge

What would you wish you could do

Labsndash Chem7 (serum) Glucose 100 (70-105)

ndash Chem7 (plasma) Glucose 150 (75-110)

ndash CBC Hgb 15 (120-158) Hct 45 (424-480) WBC 11000 (3540-9060) platelets 145000 (165000-415000)

ndash Fingerstick blood sugar was 80

ndash Urinalysis showed protein of 1+ and glucose of 0

ndash Blood culture was positive for MRSA

ndash ECG - NSR 74BPM Axis -30 degrees ST segment 2mm elevated and T-waves down in I L V5 and V6

ndash CXR Left upper lobe infiltrate LVH

What would you wish you could do

Txndash Nitroglycerin sublingual tablet with relief of pain

ndash ceftriaxone for pneumonia

ndash admitted to the CCU for monitoring

ndash then enteric-coated aspirin

Nurse found that the patient was caring for elderly fatherndash concerned that she would no longer be able to manage caring for herself

and him

ndash Consider antidepressant and a social work consult

Medical student concerned about MRSA in pt with pneumonia and recent MIndash Literature search

Databases

There are many ways of storing your data Memo Pad Notes Spreadsheets Simple databases Bespoke databases

Memo Pad Notes

Fast and simple But limited

Spreadsheets

Excel To Go or Pocket Excel Easy and great for calculations But problems with security error checking

synchronization and relational data

Databases

Everything is a database ndash quite right too

Software like HanDBase makes it easy to get startedndash eg surgical logbook

Bespoke databasesndash Allow advanced user

interface

ndash Expensive and require computer expertise

Security

Five steps to analyse security systems

1What assets are you trying to protect

2What are the risks to those assets

3How well does the security solution mitigate those risks

4What other risks does the security solution cause

5What costs and trade-offs does the security solution impose

ldquoBeyond Fearrdquo Bruce Schneier Springer

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Fives steps1 What assets are you trying to protect

2 What are the risks to those assets

3 How well does the security solution mitigate those risks

4 What other risks does the security solution cause

5 What costs and trade-offs does the security solution impose

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Encryption

Scenario 2

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash home PC

ndash work PC

ndash secretarys PC

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The five selected winners will each receive $1000 Scholarship

Mentoring and one-on-one tutorials with me

Publication of your work in the Mobile Medical Computing Reviews journal

Press campaigns by Epocrates and me

One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics

Principles ofmobile medical computing

MohammadAl-Ubaydlimemomd

Page 6: 06.09.26

Why it is here to stay

Handheld computers become smartphones and every clinician is already carrying a phonendash Aziz et al (PMID 16109177) gave smartphones to

surgeons and improved responsiveness to nurses

No charge left behindndash Moulton et al (PMID 16385275) gave handheld

computers to trauma surgeons and increases charge capture

Advantages of handheld computers

Perhaps the best computer ever designed for cliniciansndash Mobility

ndash Synchronization

ndash Beaming

What would you wish you could do

Pt 50 year old Native American female co cough and chest painndash Productive cough for 37 but chest pain 124 ago

PMHndash HTN (capsule half green half blue-green)

ndash TB while pregnant but Rx and duration

ndash Liver biopsy hemachromatosis at other hospital

ndash Allergy to Bufferin

PE well-developed well-nourished female in moderate respiratory distress ndash Vital pulse 90 RR 22 1003 F BP 150100

ndash Rales and rhonchi in the left upper chest

ndash Tender palpable liver edge

What would you wish you could do

Labsndash Chem7 (serum) Glucose 100 (70-105)

ndash Chem7 (plasma) Glucose 150 (75-110)

ndash CBC Hgb 15 (120-158) Hct 45 (424-480) WBC 11000 (3540-9060) platelets 145000 (165000-415000)

ndash Fingerstick blood sugar was 80

ndash Urinalysis showed protein of 1+ and glucose of 0

ndash Blood culture was positive for MRSA

ndash ECG - NSR 74BPM Axis -30 degrees ST segment 2mm elevated and T-waves down in I L V5 and V6

ndash CXR Left upper lobe infiltrate LVH

What would you wish you could do

Txndash Nitroglycerin sublingual tablet with relief of pain

ndash ceftriaxone for pneumonia

ndash admitted to the CCU for monitoring

ndash then enteric-coated aspirin

Nurse found that the patient was caring for elderly fatherndash concerned that she would no longer be able to manage caring for herself

and him

ndash Consider antidepressant and a social work consult

Medical student concerned about MRSA in pt with pneumonia and recent MIndash Literature search

Databases

There are many ways of storing your data Memo Pad Notes Spreadsheets Simple databases Bespoke databases

Memo Pad Notes

Fast and simple But limited

Spreadsheets

Excel To Go or Pocket Excel Easy and great for calculations But problems with security error checking

synchronization and relational data

Databases

Everything is a database ndash quite right too

Software like HanDBase makes it easy to get startedndash eg surgical logbook

Bespoke databasesndash Allow advanced user

interface

ndash Expensive and require computer expertise

Security

Five steps to analyse security systems

1What assets are you trying to protect

2What are the risks to those assets

3How well does the security solution mitigate those risks

4What other risks does the security solution cause

5What costs and trade-offs does the security solution impose

ldquoBeyond Fearrdquo Bruce Schneier Springer

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Fives steps1 What assets are you trying to protect

2 What are the risks to those assets

3 How well does the security solution mitigate those risks

4 What other risks does the security solution cause

5 What costs and trade-offs does the security solution impose

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Encryption

Scenario 2

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash home PC

ndash work PC

ndash secretarys PC

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The five selected winners will each receive $1000 Scholarship

Mentoring and one-on-one tutorials with me

Publication of your work in the Mobile Medical Computing Reviews journal

Press campaigns by Epocrates and me

One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics

Principles ofmobile medical computing

MohammadAl-Ubaydlimemomd

Page 7: 06.09.26

Advantages of handheld computers

Perhaps the best computer ever designed for cliniciansndash Mobility

ndash Synchronization

ndash Beaming

What would you wish you could do

Pt 50 year old Native American female co cough and chest painndash Productive cough for 37 but chest pain 124 ago

PMHndash HTN (capsule half green half blue-green)

ndash TB while pregnant but Rx and duration

ndash Liver biopsy hemachromatosis at other hospital

ndash Allergy to Bufferin

PE well-developed well-nourished female in moderate respiratory distress ndash Vital pulse 90 RR 22 1003 F BP 150100

ndash Rales and rhonchi in the left upper chest

ndash Tender palpable liver edge

What would you wish you could do

Labsndash Chem7 (serum) Glucose 100 (70-105)

ndash Chem7 (plasma) Glucose 150 (75-110)

ndash CBC Hgb 15 (120-158) Hct 45 (424-480) WBC 11000 (3540-9060) platelets 145000 (165000-415000)

ndash Fingerstick blood sugar was 80

ndash Urinalysis showed protein of 1+ and glucose of 0

ndash Blood culture was positive for MRSA

ndash ECG - NSR 74BPM Axis -30 degrees ST segment 2mm elevated and T-waves down in I L V5 and V6

ndash CXR Left upper lobe infiltrate LVH

What would you wish you could do

Txndash Nitroglycerin sublingual tablet with relief of pain

ndash ceftriaxone for pneumonia

ndash admitted to the CCU for monitoring

ndash then enteric-coated aspirin

Nurse found that the patient was caring for elderly fatherndash concerned that she would no longer be able to manage caring for herself

and him

ndash Consider antidepressant and a social work consult

Medical student concerned about MRSA in pt with pneumonia and recent MIndash Literature search

Databases

There are many ways of storing your data Memo Pad Notes Spreadsheets Simple databases Bespoke databases

Memo Pad Notes

Fast and simple But limited

Spreadsheets

Excel To Go or Pocket Excel Easy and great for calculations But problems with security error checking

synchronization and relational data

Databases

Everything is a database ndash quite right too

Software like HanDBase makes it easy to get startedndash eg surgical logbook

Bespoke databasesndash Allow advanced user

interface

ndash Expensive and require computer expertise

Security

Five steps to analyse security systems

1What assets are you trying to protect

2What are the risks to those assets

3How well does the security solution mitigate those risks

4What other risks does the security solution cause

5What costs and trade-offs does the security solution impose

ldquoBeyond Fearrdquo Bruce Schneier Springer

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Fives steps1 What assets are you trying to protect

2 What are the risks to those assets

3 How well does the security solution mitigate those risks

4 What other risks does the security solution cause

5 What costs and trade-offs does the security solution impose

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Encryption

Scenario 2

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash home PC

ndash work PC

ndash secretarys PC

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The five selected winners will each receive $1000 Scholarship

Mentoring and one-on-one tutorials with me

Publication of your work in the Mobile Medical Computing Reviews journal

Press campaigns by Epocrates and me

One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics

Principles ofmobile medical computing

MohammadAl-Ubaydlimemomd

Page 8: 06.09.26

What would you wish you could do

Pt 50 year old Native American female co cough and chest painndash Productive cough for 37 but chest pain 124 ago

PMHndash HTN (capsule half green half blue-green)

ndash TB while pregnant but Rx and duration

ndash Liver biopsy hemachromatosis at other hospital

ndash Allergy to Bufferin

PE well-developed well-nourished female in moderate respiratory distress ndash Vital pulse 90 RR 22 1003 F BP 150100

ndash Rales and rhonchi in the left upper chest

ndash Tender palpable liver edge

What would you wish you could do

Labsndash Chem7 (serum) Glucose 100 (70-105)

ndash Chem7 (plasma) Glucose 150 (75-110)

ndash CBC Hgb 15 (120-158) Hct 45 (424-480) WBC 11000 (3540-9060) platelets 145000 (165000-415000)

ndash Fingerstick blood sugar was 80

ndash Urinalysis showed protein of 1+ and glucose of 0

ndash Blood culture was positive for MRSA

ndash ECG - NSR 74BPM Axis -30 degrees ST segment 2mm elevated and T-waves down in I L V5 and V6

ndash CXR Left upper lobe infiltrate LVH

What would you wish you could do

Txndash Nitroglycerin sublingual tablet with relief of pain

ndash ceftriaxone for pneumonia

ndash admitted to the CCU for monitoring

ndash then enteric-coated aspirin

Nurse found that the patient was caring for elderly fatherndash concerned that she would no longer be able to manage caring for herself

and him

ndash Consider antidepressant and a social work consult

Medical student concerned about MRSA in pt with pneumonia and recent MIndash Literature search

Databases

There are many ways of storing your data Memo Pad Notes Spreadsheets Simple databases Bespoke databases

Memo Pad Notes

Fast and simple But limited

Spreadsheets

Excel To Go or Pocket Excel Easy and great for calculations But problems with security error checking

synchronization and relational data

Databases

Everything is a database ndash quite right too

Software like HanDBase makes it easy to get startedndash eg surgical logbook

Bespoke databasesndash Allow advanced user

interface

ndash Expensive and require computer expertise

Security

Five steps to analyse security systems

1What assets are you trying to protect

2What are the risks to those assets

3How well does the security solution mitigate those risks

4What other risks does the security solution cause

5What costs and trade-offs does the security solution impose

ldquoBeyond Fearrdquo Bruce Schneier Springer

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Fives steps1 What assets are you trying to protect

2 What are the risks to those assets

3 How well does the security solution mitigate those risks

4 What other risks does the security solution cause

5 What costs and trade-offs does the security solution impose

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Encryption

Scenario 2

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash home PC

ndash work PC

ndash secretarys PC

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The five selected winners will each receive $1000 Scholarship

Mentoring and one-on-one tutorials with me

Publication of your work in the Mobile Medical Computing Reviews journal

Press campaigns by Epocrates and me

One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics

Principles ofmobile medical computing

MohammadAl-Ubaydlimemomd

Page 9: 06.09.26

What would you wish you could do

Labsndash Chem7 (serum) Glucose 100 (70-105)

ndash Chem7 (plasma) Glucose 150 (75-110)

ndash CBC Hgb 15 (120-158) Hct 45 (424-480) WBC 11000 (3540-9060) platelets 145000 (165000-415000)

ndash Fingerstick blood sugar was 80

ndash Urinalysis showed protein of 1+ and glucose of 0

ndash Blood culture was positive for MRSA

ndash ECG - NSR 74BPM Axis -30 degrees ST segment 2mm elevated and T-waves down in I L V5 and V6

ndash CXR Left upper lobe infiltrate LVH

What would you wish you could do

Txndash Nitroglycerin sublingual tablet with relief of pain

ndash ceftriaxone for pneumonia

ndash admitted to the CCU for monitoring

ndash then enteric-coated aspirin

Nurse found that the patient was caring for elderly fatherndash concerned that she would no longer be able to manage caring for herself

and him

ndash Consider antidepressant and a social work consult

Medical student concerned about MRSA in pt with pneumonia and recent MIndash Literature search

Databases

There are many ways of storing your data Memo Pad Notes Spreadsheets Simple databases Bespoke databases

Memo Pad Notes

Fast and simple But limited

Spreadsheets

Excel To Go or Pocket Excel Easy and great for calculations But problems with security error checking

synchronization and relational data

Databases

Everything is a database ndash quite right too

Software like HanDBase makes it easy to get startedndash eg surgical logbook

Bespoke databasesndash Allow advanced user

interface

ndash Expensive and require computer expertise

Security

Five steps to analyse security systems

1What assets are you trying to protect

2What are the risks to those assets

3How well does the security solution mitigate those risks

4What other risks does the security solution cause

5What costs and trade-offs does the security solution impose

ldquoBeyond Fearrdquo Bruce Schneier Springer

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Fives steps1 What assets are you trying to protect

2 What are the risks to those assets

3 How well does the security solution mitigate those risks

4 What other risks does the security solution cause

5 What costs and trade-offs does the security solution impose

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Encryption

Scenario 2

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash home PC

ndash work PC

ndash secretarys PC

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The five selected winners will each receive $1000 Scholarship

Mentoring and one-on-one tutorials with me

Publication of your work in the Mobile Medical Computing Reviews journal

Press campaigns by Epocrates and me

One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics

Principles ofmobile medical computing

MohammadAl-Ubaydlimemomd

Page 10: 06.09.26

What would you wish you could do

Txndash Nitroglycerin sublingual tablet with relief of pain

ndash ceftriaxone for pneumonia

ndash admitted to the CCU for monitoring

ndash then enteric-coated aspirin

Nurse found that the patient was caring for elderly fatherndash concerned that she would no longer be able to manage caring for herself

and him

ndash Consider antidepressant and a social work consult

Medical student concerned about MRSA in pt with pneumonia and recent MIndash Literature search

Databases

There are many ways of storing your data Memo Pad Notes Spreadsheets Simple databases Bespoke databases

Memo Pad Notes

Fast and simple But limited

Spreadsheets

Excel To Go or Pocket Excel Easy and great for calculations But problems with security error checking

synchronization and relational data

Databases

Everything is a database ndash quite right too

Software like HanDBase makes it easy to get startedndash eg surgical logbook

Bespoke databasesndash Allow advanced user

interface

ndash Expensive and require computer expertise

Security

Five steps to analyse security systems

1What assets are you trying to protect

2What are the risks to those assets

3How well does the security solution mitigate those risks

4What other risks does the security solution cause

5What costs and trade-offs does the security solution impose

ldquoBeyond Fearrdquo Bruce Schneier Springer

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Fives steps1 What assets are you trying to protect

2 What are the risks to those assets

3 How well does the security solution mitigate those risks

4 What other risks does the security solution cause

5 What costs and trade-offs does the security solution impose

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Encryption

Scenario 2

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash home PC

ndash work PC

ndash secretarys PC

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The five selected winners will each receive $1000 Scholarship

Mentoring and one-on-one tutorials with me

Publication of your work in the Mobile Medical Computing Reviews journal

Press campaigns by Epocrates and me

One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics

Principles ofmobile medical computing

MohammadAl-Ubaydlimemomd

Page 11: 06.09.26

Databases

There are many ways of storing your data Memo Pad Notes Spreadsheets Simple databases Bespoke databases

Memo Pad Notes

Fast and simple But limited

Spreadsheets

Excel To Go or Pocket Excel Easy and great for calculations But problems with security error checking

synchronization and relational data

Databases

Everything is a database ndash quite right too

Software like HanDBase makes it easy to get startedndash eg surgical logbook

Bespoke databasesndash Allow advanced user

interface

ndash Expensive and require computer expertise

Security

Five steps to analyse security systems

1What assets are you trying to protect

2What are the risks to those assets

3How well does the security solution mitigate those risks

4What other risks does the security solution cause

5What costs and trade-offs does the security solution impose

ldquoBeyond Fearrdquo Bruce Schneier Springer

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Fives steps1 What assets are you trying to protect

2 What are the risks to those assets

3 How well does the security solution mitigate those risks

4 What other risks does the security solution cause

5 What costs and trade-offs does the security solution impose

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Encryption

Scenario 2

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash home PC

ndash work PC

ndash secretarys PC

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The five selected winners will each receive $1000 Scholarship

Mentoring and one-on-one tutorials with me

Publication of your work in the Mobile Medical Computing Reviews journal

Press campaigns by Epocrates and me

One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics

Principles ofmobile medical computing

MohammadAl-Ubaydlimemomd

Page 12: 06.09.26

Memo Pad Notes

Fast and simple But limited

Spreadsheets

Excel To Go or Pocket Excel Easy and great for calculations But problems with security error checking

synchronization and relational data

Databases

Everything is a database ndash quite right too

Software like HanDBase makes it easy to get startedndash eg surgical logbook

Bespoke databasesndash Allow advanced user

interface

ndash Expensive and require computer expertise

Security

Five steps to analyse security systems

1What assets are you trying to protect

2What are the risks to those assets

3How well does the security solution mitigate those risks

4What other risks does the security solution cause

5What costs and trade-offs does the security solution impose

ldquoBeyond Fearrdquo Bruce Schneier Springer

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Fives steps1 What assets are you trying to protect

2 What are the risks to those assets

3 How well does the security solution mitigate those risks

4 What other risks does the security solution cause

5 What costs and trade-offs does the security solution impose

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Encryption

Scenario 2

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash home PC

ndash work PC

ndash secretarys PC

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The five selected winners will each receive $1000 Scholarship

Mentoring and one-on-one tutorials with me

Publication of your work in the Mobile Medical Computing Reviews journal

Press campaigns by Epocrates and me

One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics

Principles ofmobile medical computing

MohammadAl-Ubaydlimemomd

Page 13: 06.09.26

Spreadsheets

Excel To Go or Pocket Excel Easy and great for calculations But problems with security error checking

synchronization and relational data

Databases

Everything is a database ndash quite right too

Software like HanDBase makes it easy to get startedndash eg surgical logbook

Bespoke databasesndash Allow advanced user

interface

ndash Expensive and require computer expertise

Security

Five steps to analyse security systems

1What assets are you trying to protect

2What are the risks to those assets

3How well does the security solution mitigate those risks

4What other risks does the security solution cause

5What costs and trade-offs does the security solution impose

ldquoBeyond Fearrdquo Bruce Schneier Springer

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Fives steps1 What assets are you trying to protect

2 What are the risks to those assets

3 How well does the security solution mitigate those risks

4 What other risks does the security solution cause

5 What costs and trade-offs does the security solution impose

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Encryption

Scenario 2

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash home PC

ndash work PC

ndash secretarys PC

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The five selected winners will each receive $1000 Scholarship

Mentoring and one-on-one tutorials with me

Publication of your work in the Mobile Medical Computing Reviews journal

Press campaigns by Epocrates and me

One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics

Principles ofmobile medical computing

MohammadAl-Ubaydlimemomd

Page 14: 06.09.26

Databases

Everything is a database ndash quite right too

Software like HanDBase makes it easy to get startedndash eg surgical logbook

Bespoke databasesndash Allow advanced user

interface

ndash Expensive and require computer expertise

Security

Five steps to analyse security systems

1What assets are you trying to protect

2What are the risks to those assets

3How well does the security solution mitigate those risks

4What other risks does the security solution cause

5What costs and trade-offs does the security solution impose

ldquoBeyond Fearrdquo Bruce Schneier Springer

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Fives steps1 What assets are you trying to protect

2 What are the risks to those assets

3 How well does the security solution mitigate those risks

4 What other risks does the security solution cause

5 What costs and trade-offs does the security solution impose

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Encryption

Scenario 2

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash home PC

ndash work PC

ndash secretarys PC

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The five selected winners will each receive $1000 Scholarship

Mentoring and one-on-one tutorials with me

Publication of your work in the Mobile Medical Computing Reviews journal

Press campaigns by Epocrates and me

One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics

Principles ofmobile medical computing

MohammadAl-Ubaydlimemomd

Page 15: 06.09.26

Security

Five steps to analyse security systems

1What assets are you trying to protect

2What are the risks to those assets

3How well does the security solution mitigate those risks

4What other risks does the security solution cause

5What costs and trade-offs does the security solution impose

ldquoBeyond Fearrdquo Bruce Schneier Springer

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Fives steps1 What assets are you trying to protect

2 What are the risks to those assets

3 How well does the security solution mitigate those risks

4 What other risks does the security solution cause

5 What costs and trade-offs does the security solution impose

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Encryption

Scenario 2

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash home PC

ndash work PC

ndash secretarys PC

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The five selected winners will each receive $1000 Scholarship

Mentoring and one-on-one tutorials with me

Publication of your work in the Mobile Medical Computing Reviews journal

Press campaigns by Epocrates and me

One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics

Principles ofmobile medical computing

MohammadAl-Ubaydlimemomd

Page 16: 06.09.26

Five steps to analyse security systems

1What assets are you trying to protect

2What are the risks to those assets

3How well does the security solution mitigate those risks

4What other risks does the security solution cause

5What costs and trade-offs does the security solution impose

ldquoBeyond Fearrdquo Bruce Schneier Springer

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Fives steps1 What assets are you trying to protect

2 What are the risks to those assets

3 How well does the security solution mitigate those risks

4 What other risks does the security solution cause

5 What costs and trade-offs does the security solution impose

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Encryption

Scenario 2

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash home PC

ndash work PC

ndash secretarys PC

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The five selected winners will each receive $1000 Scholarship

Mentoring and one-on-one tutorials with me

Publication of your work in the Mobile Medical Computing Reviews journal

Press campaigns by Epocrates and me

One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics

Principles ofmobile medical computing

MohammadAl-Ubaydlimemomd

Page 17: 06.09.26

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Fives steps1 What assets are you trying to protect

2 What are the risks to those assets

3 How well does the security solution mitigate those risks

4 What other risks does the security solution cause

5 What costs and trade-offs does the security solution impose

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Encryption

Scenario 2

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash home PC

ndash work PC

ndash secretarys PC

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The five selected winners will each receive $1000 Scholarship

Mentoring and one-on-one tutorials with me

Publication of your work in the Mobile Medical Computing Reviews journal

Press campaigns by Epocrates and me

One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics

Principles ofmobile medical computing

MohammadAl-Ubaydlimemomd

Page 18: 06.09.26

Scenario 1

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Encryption

Scenario 2

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash home PC

ndash work PC

ndash secretarys PC

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The five selected winners will each receive $1000 Scholarship

Mentoring and one-on-one tutorials with me

Publication of your work in the Mobile Medical Computing Reviews journal

Press campaigns by Epocrates and me

One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics

Principles ofmobile medical computing

MohammadAl-Ubaydlimemomd

Page 19: 06.09.26

Scenario 2

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash home PC

ndash work PC

ndash secretarys PC

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The five selected winners will each receive $1000 Scholarship

Mentoring and one-on-one tutorials with me

Publication of your work in the Mobile Medical Computing Reviews journal

Press campaigns by Epocrates and me

One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics

Principles ofmobile medical computing

MohammadAl-Ubaydlimemomd

Page 20: 06.09.26

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The five selected winners will each receive $1000 Scholarship

Mentoring and one-on-one tutorials with me

Publication of your work in the Mobile Medical Computing Reviews journal

Press campaigns by Epocrates and me

One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics

Principles ofmobile medical computing

MohammadAl-Ubaydlimemomd

Page 21: 06.09.26

Scenario 3

One handheld computer storingndash appointments (clinics and personal)

ndash addresses (ward phone numbers computer passwords)

ndash tasks (including name of the patient)

ndash memos (lecture notes patient summaries)

Synchronise withndash MAU SAU PCs

ndash sever PC

ndash other PDAs

ndash home PCs

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The five selected winners will each receive $1000 Scholarship

Mentoring and one-on-one tutorials with me

Publication of your work in the Mobile Medical Computing Reviews journal

Press campaigns by Epocrates and me

One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics

Principles ofmobile medical computing

MohammadAl-Ubaydlimemomd

Page 22: 06.09.26

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The five selected winners will each receive $1000 Scholarship

Mentoring and one-on-one tutorials with me

Publication of your work in the Mobile Medical Computing Reviews journal

Press campaigns by Epocrates and me

One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics

Principles ofmobile medical computing

MohammadAl-Ubaydlimemomd

Page 23: 06.09.26

The Ali Abdulla Al-UbaydliScholarships for Mobile Medical Computing

The five selected winners will each receive $1000 Scholarship

Mentoring and one-on-one tutorials with me

Publication of your work in the Mobile Medical Computing Reviews journal

Press campaigns by Epocrates and me

One year free subscription to Epocrates Essentials all-in-one mobile reference to drugs diseases and diagnostics

Principles ofmobile medical computing

MohammadAl-Ubaydlimemomd

Page 24: 06.09.26

Principles ofmobile medical computing

MohammadAl-Ubaydlimemomd