MHEALTH AND MOBILE SECURITY

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU1939
  • Access Fee: ₦5,000 ($14)
  • Pages: 51 Pages
  • Format: Microsoft Word
  • Views: 504
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Abstract This Applied Project reviews, designs and implements security for the mobile application used by the MHealth project. The result of improving security brings the project in line with Ghana Ministry of Health’s Legal and Policy Framework for Health Information and Health Data Reporting. Information security is one of the prime concerns for healthcare nowadays, because even though electronic record keeping enhances efficiency, it also poses a vulnerability of access. Security is improved in MHealth by encrypting the database mainly and implementing various user authentication techniques. This will enable the application and the project protect their data and prevent unauthorized access by attackers. Given that Ghana is now moving into a phase of electronic record keeping, this contribution will be a necessary start for the implementation of an electronic system.

MHEALTH AND MOBILE SECURITY
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU1939
  • Access Fee: ₦5,000 ($14)
  • Pages: 51 Pages
  • Format: Microsoft Word
  • Views: 504
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU1939
    Fee ₦5,000 ($14)
    No of Pages 51 Pages
    Format Microsoft Word

    Related Works

    Privacy invasion is an offence perpetrated by availability, access, and use of advanced  mobile devices when they land in the wrong hands of people who have the intention  of infringing into the space of either individuals or organizations. There have been  many incidences of infringement on people‟s privacy by exposing their personal lives ... Continue Reading
    Abstract Mobile technology is one of the most successful technologies on the African continent. Personal and professional communication as well as critical services like banking and remittances are widely made through mobile networks and platforms in Ghana. However, little is known about the security of the underlying infrastructure and devices... Continue Reading
    Abstract The 21st century has seen a world where almost everything is carried out by digital or electronic means—signalling an end to the traditional approaches. People nowadays transact businesses over the internet due to convenience and accessibility. Taking full advantage of the internet, most institutions especially the financial... Continue Reading
    Abstract With Ghana striving to reach its Millennium Development Goals, the government has employed various tactics to improve healthcare delivery in Ghana. One of these strategies involves deploying Community Health Workers to rural areas to provide residents of such areas with good healthcare. As a result, various Community Health Centers have... Continue Reading
    CHAPTER ONE INTRODUCTION 1.1   BACKGROUND TO THE STUDY A mobile phone is a device that can basically make and receive calls over a radio link while moving around a wide geographic area. (Pew Research center, 2010). It does so by connecting to a cellular network provided by a mobile phone operator, allowing access to the public telephone network.... Continue Reading
    TABLE OF CONTENTS DECLARATION APPROVAL DEDICATION ACKNOWLEDGEMENT iv LIST OF ACRONYMS vii TABLE OF CONTENTS ABSTRACT CHAPTER ONE 1 [NTRODUCTION 1 1.0 Introduction 1 1.1 Background to the study 1 1.1.1 Historical background Perspective 1 1.1.2 Theoretical perspective 2 1.1.3 Conceptual Perspective 3 1.1.4 Contextual Perspective 4 1.2 Problem... Continue Reading
    Table of Contents DECLARATION ii APPROVAL 1 DEDICATION ACKNOWLEDGEMENT v LIST OF TABLES LIST OF FIGURES x ABSTRACT CHAPTER ONE 1 1.0. Introduction 1 Li. 0. Background 1 1.1.1. Flistorical perspective 1 1.1.2 Theoretical frame work 1 1.1.3 Conceptual perspective 2 1.1.4 Contextual perspective 3 1.2. Problem statement 3 1.3. Objectives of the study... Continue Reading
    ABSTRACT Information is an important aspect of life. Vital information is the life wire or backbone of any organization. From sports statistics to the latest stock market price such facts keep people abreast of time. Computing, printing, photography and some recording are all forms of automatic information processing. In all of these processed ,... Continue Reading
    CHAPTER ONE INTRODUCTION 1.1. Background Of The Study Intelligence simply refers the collection of information of military or political value. It is common knowledge that nationsrequire intelligence about their immediate environment and that of other nations. This is necessary because, in order to guarantee their security, they need to keep track... Continue Reading
    ABSTRACT Information is an important aspect of life. Vital information is the life wire or backbone of any organization. From sports statistics to the latest stock market price such facts keep people abreast of time. Computing, printing, photography and some recording are all forms of automatic information processing. In all of these processed ,... Continue Reading
    Call Us
    whatsappWhatsApp Us