Computer Science
CS 699 SEU Cloud Vulnerabilities Related to Cyber Security in Health Sector Paper

CS 699

Saudi electronic university

CS

Question Description

I’m trying to learn for my Computer Science class and I’m stuck. Can you help?

Abstract

Introduction

I need an introduction talking about Current health care and expected future of health care when using IOT & AI with technology

literature review

First section: talking about associated risk like data, connectivity, and vulnerability of hardware for example nowadays they are having a new computer with a process chip or nano chips on the humans body that might heat or have batteries in them what risks will be associated to that?

second section: Data different dimensions

- Subsections of data:

1) Data transmission - From human body to device and from device to data storage

2) Data Storage

3) Data redundancy (duplication)

4) Data Accuracy

5) Data transparency

6) Data Privacy

Third section: Connectivity:

5G and new technologies how is it expanding and what will happen in future for security of communication channel

Fourth section: Vulnerability of hardware

1) if its process heating example battery

2) if the device can be hacked

3) security of data or data protection

Fifth section: Cost

From health sector (public and private) side and from the patient side for example who is going to pay for the devices and their maintenance

Methodology

is going to be quantitative this is a suggestion to get more information on how the methodology is needed

Research Design : Qualitative, Quantitative, and Mixed Methods Approaches / J.W. Creswell.

Book Depository Handbook of Mixed Methods in Social & Behavioral Research : Abbas

I need a survey at least 3 question for each section and subsection (survey) with reference to what paper where these question have been formulated.

Research Results and Discussions

Finally Conclusion and future works

Note: You can add images and figures if applicable with reference

citation is important at least after 2 sentences

kindly include all references

Finally, I need to to have a contribution related to this topic.

Attached is also a template to follow kindly note:

- I need the journals and a presentation related to this topic.

- Reference must ONLY be from journal articles published in well publishers’ databases; IEEE, Springer, Elsevier, Wiley, and Taylor & Francis. and recent from year 2017 least old.

After the paper is done I need a presentation representing the paper

The deliverable are:

1) Paper following the attached template

2) Survey

3) Presentation

4 mins ago

Unformatted Attachment Preview

SAUDI ELECTRONIC UNIVERSITY College of Computing & Informatics MSIS Capstone Project – CS699 Final Report Presented by: Student Reg# Student Name Project Advisor Date Table of Contents Contents Table of Figures..............................................................................................................................3 List of Tables ..................................................................................................................................4 Declaration......................................................................................................................................5 Acknowledgements ........................................................................................................................6 Revision History .............................................................................................................................7 Abstract ...........................................................................................................................................8 1. Introduction (Normally Chapter 1) ........................................................................................9 2. Literature review (Normally 1 to 3 chapters as needed) ....................................................10 3. Methods and the materials (Normally 1 chapter) ...............................................................11 4. Research results and discussions – The Body (Normally 1 to 3 chapters) ........................12 5. Conclusions and Future Work (Normally 1 chapter) .........................................................14 References .....................................................................................................................................15 A. Appendices if needed .............................................................................................................16 A.1 Appendix A ..................................................................................................................................... 16 A.2 Appendix B ..................................................................................................................................... 17 Table of Figures Figure 1: Figure 1 Caption .............................................................Error! Bookmark not defined. List of Tables No table of figures entries found. Declaration AZ Acknowledgements AZ Revision History AZ Abstract An abstract is a short informative summary that briefly describes the problem, summarizes the main argument, the research methods and procedures and lists the main findings and conclusions. Remember to keep it brief, normally an abstract must not exceeding 500 words in the case of a thesis and 300 words in the case of a dissertation. This summary must appear in the front of the dissertation or thesis following the table of content and must end with a list of not more than ten key words. 1. Introduction (Normally Chapter 1) Our dissertation or thesis will start with an introduction. Here you should introduce the reader to the topic, telling the reader precisely what you are going to do and why it is worth doing. The introduction is usually a summary of the project proposal and its objectives explaining what you are interested in and why and in general sense how you intend to study your topic, specifying your objective. It prepares the reader for the scientific argumentation and evaluation of the information and findings. 2. Literature review (Normally 1 to 3 chapters as needed) The literature review chapter(s) is an important part of your dissertation or thesis and it takes a lot of work and time to complete. It identifies the research that already has been completed in your topic area and provides an analysis of all current information relevant to the topic. A literature review should demonstrate that you have read broadly in your field and that you understand the important and analyzed the literature relevant to the topic. It is important for the student to note that it is essential to complete most of the literature study before proceeding to the final planning and execution of the research. The reason for this is that the student often neglects literature study. They start collecting data only to find out during the literature study that their methodology and questions have critical weaknesses. This has a negative effect on the study of the final product. Each section should be concluded with a summary of the principles found in the literature that are applicable to the study. 3. Methods and the materials (Normally 1 chapter) The research methodology will explain to your reader the methods you used to gather the information and data for your paper to answer your research question, almost like a recipe. This chapter is regarded as the core of the dissertation or thesis as an error or weakness in this explanation can invalidate the findings, dooming the study as a whole. This chapter is often scrutinized very critically by other scientists, and weigh heavily in examining. • Start the chapter with a clear explanation of the methodology that will be used to solve the problem. • Provide a detailed description of the components of the methodology. • Describe what the methods are all about and how you have executed the methodology. It should be clear why you choose to use this specific methodology for answering your research question 4. Research results and discussions – The Body (Normally 1 to 3 chapters) This component also known as “the body” of the dissertation or thesis, consists of the final results of the research, your analysis of them and your sub - conclusion. You should keep the body of your dissertation or thesis simple. Your findings can be anything from data from archives, results from an experiment or answers to questions. To present the massive volume of data collected in an ordered manner, the data must be put in writing. Arrange the data into tables and figures and arrange it in such a way that the specific groups of data correspond. The body of your dissertation or thesis will be divided into chapters and the chapters will be divided into sections and sub-sections. You do not want to “loose” your reader so you need to structure the body of the dissertation or theses carefully. You should make it as logical, cumulative and simple as possible. The conclusion must be motivated, and where applicable, based on a sound statistical analysis of the data. If there are different views of the concept it must be clearly stated by means of logical reasoning to indicate why one view is preferred to another. Conclusions and findings must always be clear on which facts and/or published literature the conclusions and findings are based. 5. Implementation (Normally 1 chapter) Clear and detailed implementation and the possibility for reproduction of the same results for future researchers. 6. Conclusions and Future Work (Normally 1 chapter with 2 subsections) In the final chapter all the loose ends are tied up and you must tell your reader what you have discovered in each phase of the research process and the worth of it. Here you give an overview of the research process clearly formulate your findings and conclusions regarding the research problem, sub-problems or hypothesis. References List of References in APA style A.Appendices if needed A.1 Appendix A AZ A.2 Appendix B AZ ...
Purchase answer to see full attachment
Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

Final Answer

Attached.

Survey Query
Abstract
What are the threats facing healthcare and what are the impacts?
How crime and impact evolved as technology has evolves?
What are the opportunities and threats to managing the crime given its long consistency and
sequence of escalating?
Introduction
Why has the health sector been a major target for professional hackers?
How is the system responding to a continuous attack by attackers at all levels?
What has not worked, what might, or what will never work in cybersecurity and healthcare
information systems?
Literature Review
How will crime mutate and emerge in the healthcare system in the post-digital era especially
from 2020-2030?
Are there structural and architectural changes that can be customized for the health sector?
What would be the role do developers, health facilities, government institutions, and general
public play in cybercrime propagation and management?
Methods
Which are the best parameters and metrics to reflect the status of healthcare cloud intrusion?

How does the data relate to other sectors and industries locally and internationally?
How does the business environment influence data collecting procedure, quantity, and quality?
Results
Is there a significant difference between the internal and external environments on vulnerability?
Is there a significant between a hosted information system and those not hosted by any third
party?
Is there a significant difference between the nature and frequency of attacks between different
categories of institutions?
Implementation
How does the system used by institutions contribute or limit intrusion based on level and brand?
How do management strategy and brand quality hinder or promote security?
What is the best possible approach to counter the observed trend?
Conclusion
What are the key findings and possible solutions to future risks?
What are the inadequacies of current data about future demands?
How healthcare system protocols do relates between brands, regions, data, application, and
consumers?


SAUDI ELECTRONIC UNIVERSITY
College of Computing & Informatics

MSIS Capstone Project – CS699
Final Report



Presented by:

Student Reg#

Student Name

Project Advisor



Date
Table of Contents

Acknowledgements ........................................................................................................................4
Revision History (150 words) ........................................................................................................5
Abstract ...........................................................................................................................................6
1. Introduction ..............................................................................................................................7
2. Literature review .....................................................................................................................8
3. Methods and the materials ....................................................................................................12
4. Research results and discussions ..........................................................................................14
5. Implementation ......................................................................................................................15
6. Conclusions and Future Work ..............................................................................................16
References .....................................................................................................................................17

Declaration
AZ

Acknowledgements
AZ

Revision History (150 words)
Gadgets used in modern technology are highly advanced and advanced to meet consumer need
on use, portability, and compatibility to other devices and software. In 2003, Harris’s product
(GPGPU), led to development OS and programs with high speed and supported parallel
processing and request level parallelism. Through programming computers capacity was
transformed within a short time leading to IoT explosion in 2003-10. Developers have
customized their products to provide a broad scope of use through the flexibility of
configurations. Outputs can be in any required form and programs are designed aligned to use to
facilitate at least all significant types. The scope of hardware used is many as and advanced as
disciplines and industries. Due to their capacity in data management and other capabilities based
on IoT& AI, digital devices make significant resources to people and in all sectors. One of the
significant challenge that society encounter today is on IoT enhanced crimes denoted as cybercrime.

Abstract
The document addresses the issue of IoT, Cloud, Cybercrime, and Healthcare data. Report on
cases of data hacking attempts and frequency are quite alarming. Influential credible, and reliable
institutions like Microsoft, McAfee, and UPMC are concerned. Advocacy for the aggression of
efficiency and effective strategy on active and pro-active remedies is a necessity if figures are to
be checked. Worse to the situation is the significance of perpetrators of the vice and level of
attack. Notable on the reports is the involvement of the State’s propagated warfare through IoT.
As technology advances, quality of life improves through better services and means of
production. Equally the good side digitalization has injected potential threats and crimes that
require extreme countermeasures. Notable as a negative item of IoT and AI is the transformation
of cybercrime from social problems to the technological weapon by States and organized
Multinational gangs.

1. Introduction
As IoT support big data technology, a lot of cases of breach and attack have been reported since
2015. In a discussion on challenges of IoMT by Rashu, the CIO in UPMC and other three high
profile personalities on IT industry issues that raise concerns are revealed. According to the
panel cybercrimes escalated by 300% in the healthcare sector for the year 2015-16. Garret a
specialist in cybersecurity on healthcare institution, in 2015 research he discovered on few
institutions focused on the matter as required. Garret’s findings showed that 16% of participants
had developed security system, 41% were in the process, while 43% had not. (Center for
Connected Medicine, 2018).
Use of IoMT in healthcare according to GE vice-president recorded 325%, and 80% of world
institution are connected today. The growth rate in use contrast escalation of crime and budget
allocated manage the situation (CCM, 2018). Nabeel Mishah and others, in 2019, researched the
use of e-Service on the healthcare system in seven regions within Saudi Arabia. Like many other
region adoption, integration, and use of EHR, HIS, EMR, EPR, and other remote and
personalized devices is well established. Results on security-related issues create significant
concerns over the credibility and reliability of the healthcare data in the region (Mishah,
AlBukhari, AlMutairi & Mohreq, 2019).
The research will focus on establishing credibility and reliability of healthcare data managed
through IoT to the current state of cybersecurity state and resources used as a remedy.
Qualitative and quantitative data will be collected through a literature review of recent research
findings and further enhanced by primary data that will be collected from health facilities and IT
institutions. The concerns over security and quality of data has been and is a significant issue.
Using sample data collected the state of vulnerability, and its significance will be establishe

2. Literature review
The acronym IoT is short of the phrase ‘Internet of Things’. IoT in non-technical terms refers to
computers and other digital devices with installed software that enhance with a capacity to
perceive and execute tasks (James, 2017). Any gadget that can sense its internal and external
environment with the limited intervention of man and really on technology developed on
principles of GPGPUs. An essential device on the criteria is a system designed through hardware
and software. For a broad scope in use in terms of services and region, the system requires the
internet for connectivity (Margolis Center, 2019). Example of a basic system includes computer
used to store data in healthcare to complex machines like CT scan. However, technology
addressed in this paper will be a system that integrates all three ingredients; hardware, software,
and internet. Internet is a significant factor in this research because it facilitates data sharing
(Enisa, 2015).
One of the characteristics of tech and digitalization is its characteristic high frequency in change
accompanied by advancement. Resources required for digital technology can be categorized into
three. The first resource in the digital world is the gadget which is highly advanced in use and
compatibility. The scope of hardware used is many as and advanced as disciplines and industries.
The second requirement on digitalization process is software. Software refers to instructions
generated in computer language by programmers or developer. The third component of digital
tech is the internet, and it facilitates the connectivity of gadgets and data sharing (JCCCVideo,
2016)
Gadgets used in modern technology are highly advanced and advanced to meet consumer need
on use, portability, and compatibility to other devices and software. Data input has been
enhanced further through digital accessories and programs that automate the process of capturing

information (TEDx Talks, 2016). The software once stored in hardware it displayed through the
output to the user as a program. The program installed has three significant roles in tech
applications use, input pathway, processing data, and display results. Current technological
development has achieved extreme potential in value addition (James, 2017). Transformation to
current and continuing tech is a product of enhanced capacity of capacity through AI (Artificial
Intelligence) and ML (Machine Learning). The ideology has taken time to become a reality;
“When wireless is perfectly applied the whole earth will be converted into a huge brain, which in
fact it is, all things being, ……….. A man will be able to carry one in his vest pocket. (Nikola
Tesla, 1926)”. Alan Turing in 1950 “It can also be maintained that it is best to provide the
machine with the best sense organs that money can buy, and then teach it to understand and
speak English ” (United Nations Social Enterprise Facility, 2015, p.2). Karl Steinbuch in 1966
said, “In a few decades, computers will be interwoven into almost every industrial product”
(United Nations Social Enterprise Facility, 2015, p.3).
Cybercrime entails illegal access and use of online data or services through internet enhanced
protocols. In healthcare, IoT has been advanced on three major fronts, service delivery,
communication, and data management. The scope of use is diverse, but it occurs in all levels,
primary and secondary healthcare and private and public sector. On treatment, tech is applied in
the standard or chronic case, significant and minor procedure, and by trained professional and
also by individual patients (James, 2017). IoT applications are used in public healthcare
empowerment through information sharing. Research conducted by BioMed Central on health
support for Cardiac patients indicated 65% preferred emails, while 36% were for videos, and
39% searched on websites (EPHA, 2017).

IoT is used on treatment through advanced equipment and tools CT scans, remote health
monitoring, and radio-therapy. Implants are used to monitor ...

Joelda (10841)
UT Austin

Anonymous
Top quality work from this tutor! I’ll be back!

Anonymous
Heard about Studypool for a while and finally tried it. Glad I did caus this was really helpful.

Anonymous
Thank you! Reasonably priced given the quality

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4