Case Study – Ethics and Technology Recent advances in computing systems have led to many applications that support humans through advanced technologies. One of the most exciting applications is a remote health monitoring system

MIT111 Describe the ethical standards concerning the health data using external references and credible sources, including Australian government guidelines or International Ethics Standards.

Case Study – Ethics and Technology
Recent advances in computing systems have led to many applications that support humans through advanced technologies. One of the most exciting applications is a remote health monitoring system that provides care for patients at home. These applications typically use highly sensitive sensor devices to monitor the patients and transmit their health data securely to the hospital for monitoring by medical professionals. Such a system can help avoid expensive hospital costs and save a fortune for many.
You are a new technology manager at the WinMore Hospital (WMH), Canberra, Australia. WMH plans to roll out medical-support-at-home (MSAH) service in 2023. The plan was brought forward due to the shortage of doctors, which has put great pressure on hospital resources. The managers at WHM are thrilled that they can care for more patients at a reduced resource/cost.
Complete the following tasks:

Perform risk analysis of MSAH in consideration of the current threat landscape in health data management (e.g., is it secure to transmit the personal health data over the Internet? If not, why not?).Describe and justify available security standards in health data monitoring.Describe the ethical standards concerning the health data using external references and credible sources, including Australian government guidelines or International Ethics Btandards.
a) Search and describe appropriate ethical standards and frameworks including the ACS code of ethics within an IT environment.to follow.
b) Are there conflicting standards across countries? If so, how do we overcome such challenges?Consider and recommend future technologies.
a) How can we secure the smart sensors from being hijacked (into an army of botnets)?
b) Discuss the ethical concerns in the age of ubiquitous computing.Write a summary and conclusion at the end of your research report.Write an introduction at the beginning of your research report.Complete the checklist on the next page.

CLAIM YOUR 30% OFF TODAY

X
Don`t copy text!
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
???? Hi, how can I help?