Saturday, July 13, 2013

Emerging Technologies


You are a junior staff member assigned to the chief information security officer’s (CISO) team in a major medical center. The medical center’s senior leadership recently reviewed plans for changes to the center’s facilities and found that risks associated with the adoption of several new or emerging technologies had not been addressed. To address this planning gap, the hospital’s chief operating officer (COO) has given the CISO two weeks to provide a quick-look evaluation of the risks associated with two of the planned expansion areas that may pose technology problems:
moving one or more clinical IT support functions (including both fixed and mobile devices for end users) into a grid and/or cloud computing environment
including intelligent building capabilities (sensors, tracking devices, and the associated IT systems) in a new medical office building housing doctor’s offices, clinics, and outpatient services (e.g., labs for blood tests, physical therapy facilities)
For this assignment, research and write a short case study (three pages) using one or more articles from the CISO’s emerging technologies reading list. In your case study, you must discuss one of the listed technology problems (a or b above) and include a discussion of the potential risks associated with the technologies discussed in your chosen article. Your case study must also answer the question, how can these technologies be secured? You have one week to complete your paper.
Remember to cite your sources in APA format and use only authoritative/scholarly sources such as journal articles, books, government documents, and other industry publications (e.g., trade journals or magazines for health care or security professionals). The title page and list of references are not included in the required page count.CLICK HERE TO ORDER THIS ESSAY!!!!
CISO’s Emerging Technologies Reading List*
Hlousek, M. (2008). Problem frames for intelligent building services: A suitability study. Proceedings of the 3rd International Workshop on Applications and Advances of Problem Frames 2008 (IWAAPF 08), 40–43. doi: 10.1145/1370811.1370819
Jackson, B. A., & Frelinger, D. R. (2009). Emerging threats and security planning: How should we decide what hypothetical threats to worry about? Retrieved from http://www.rand.org/pubs/occasional_papers/2009/RAND_OP256.pdf
Klingbeil, L., & Wark, T. (2008). A wireless sensor network for real-time indoor localisation and motion monitoring. Proceedings of the 2008 International Conference on Information Processing in Sensor Networks, 39–50. doi: 10.1109/IPSN.2008.15
Michael, K., McNamee, A., & Michael, M. G. (2006). The emerging ethics of humancentric GPS tracking and monitoring. Proceedings of the International Conference on Mobile Business (ICMB’06), 1–10. doi: 10.1109/ICMB.2006.43
Moran, S., & Nakata, K. (2010). Ubiquitous monitoring in the office: Salient perceptions of data collection devices. Proceedings of the IEEE International Conference on Social Computing / IEEE International Conference on Privacy, Security, Risk and Trust, 494–499. doi: 10.1109/SocialCom.2010.78
Stell, A., Sinnott, R., & Jiang, J. (2009). A clinical grid infrastructure supporting adverse hypotensive event prediction. Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, 508–513. doi: 10.1109/CCGRID.2009.43
Varandas, L. C., Vaidya, B., & Rodrigues, J. J. (2010). mTracker: A mobile tracking application for pervasive environment. Proceedings of the 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, 962–967. doi: 10.1109/WAINA.2010.164
Yusof, A. M., Rusli, M. E., & Yusof, Y. (2006). Kids finder through Bluetooth technology. Proceedings of the 2006 International Conference on Digital Telecommunications (ICDT ’06), 1–6. doi: 10.1109/ICDT.2006.46
* Unless otherwise noted, the articles in the CISO’s Reading List are available from the IEEE Computer Society Digital Library via UMUC’s online library.

No comments:

Post a Comment