Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave
Challenges Faced By Small Businesses in Setting Up an E-Commerce Website

The Purpose of The Research

What Are Small Businesses Awareness Of The Challenges Influencing The Setting Up An e-Commerce Website?

What Can Small Businesses Do To Operate Effectively After Knowing The Challenges Associated With Setting Up An e-Commerce Website?

The term Internet of Things (IoT) was first introduced in the year 1999 in the Global Standard and within a short span of time the technology has found its place in several sectors in which one of the most surprising was healthcare (Singh, & Singh, 2015). The use of the technology in the healthcare sector came as a surprise as the most significant feature was interconnectivity which it provided with its use. The main components of the technology consist of “sensors and actuators” which is the hardware part of the technology, while the software part consist of the computing devices which are used as storage devices while the output devices helps in comparative analysis (Singh, & Singh, 2015). The complete package provides an appealing prospective in which the technology can be used facilitate healthcare services which includes mobile accessories to monitor constant development of the patient, invention of healthcare monitory devices which can be used in smart cities where patients can self-monitor their health (Bakar, Ramli, & Hassan, 2019). However, similar to other sectors, the risk of breaches are also accompanied with the extended danger to the personal information regarding personal and medical condition can be hacked through cyber-attacks. The sensitive subject of risk and its management are overlooked due to benefit directed use of the technology which pose a huge risk of the personal and medical information being accessed by the hackers.

The technologically-driven society and the prevalent trend of being enthusiastically through mobile devices which are used for self-monitor and are given the permission not merely to monitor but to store the data which it detects and to send notification of any form of abnormal reaction in the body to the patient. The technology has been mostly used in monitoring patients with chronic diseases and in the field of early detection of life-risk disease. Moreover, these equipment are equipped to send reminder notification for medication which also implies that they are connected with prescriptions sent over the technology. Hence, any hackers with the past medical information can purchase or order medicine illegally or can even access the active account of the patient if they can hack the information and can change the quantity of the medicine consumed (Chacko, & Hayajneh, 2018). Despite the risk, the healthcare organization have been observed to be willing to use the devices and the latest trend in the technological involvement is considered to be posing more risk than any other previous devices. Bring Your Own Device (BYOD) is the current trend in which the patients are allowed to purchase their own device that leads to devices of different range and control mechanism into the organization and most importantly connection to their data storage in the organization as well (Zakaria, et al., 2019). The hackers are provider with wider band width and the various devices in the organization at a single point of time helps in staying in the shadow.

The devices which are connected with organization for treatment process should be encrypted with unique codes which can be changed and verified by the organization and the patient as well for any form of past information to be accessed. The encryption will provide the barrier which would keep the patient’s details safe from hackers.

References

Bakar, N., Ramli, M., & Hassan, N. H. (2019). The internet of things in healthcare: Anoverview, challenges and model plan for security risks management process. The Internet of Things in Healthcare: Anoverview, Challenges and Model Plan for Security Risks Management Process, 15, 1st ser. doi:http://doi.org/10.11591/ijeecs.v15.i1.pp414-420

Chacko, Anil & Hayajneh, Thaier. (2018). Security and Privacy Issues with IoT in Healthcare.

EAI Endorsed Transactions on Pervasive Health and Technology. 4. 155079. 10.4108/eai.13-7-2018.155079.  

Singh, S., & Singh, N. (2015, October). Internet of Things (IoT): Security challenges, business opportunities & reference architecture for E-commerce. In 2015 International Conference on Green Computing and Internet of Things (ICGCIoT) (pp. 1577-1581). Ieee.

Zakaria, H., Bakar, N. A. A., Hassan, N. H., & Yaacob, S. (2019). IoT security risk management model for secured practice in healthcare environment. Procedia Computer Science, 161, 1241-1248.

support
close