filter options on this panel are the patient name or
the handling of already completed transports. At the
bottom of the panel there is again a button to return
to the transport list and update it with the specified
options to match the selected filters. The “Back”
button switches to the first options panel.
5 CONCLUSIONS
It is not trivial to develop both a useful and usable
mobile application. The general idea to use a J2SE
Virtual Machine was abandoned, due to lack of
compatibility. The server communication could not
be done trough the available methods. This made it
necessary to build a relay to forward the inquiries to
the server. That made it possible to convert the result
to a string which is sent as a byte stream. Due to this
sensible data, encryption was necessary. Primarily
the WPA encryption is used, which is secure and is
supported by the PDA’s hardware. Additionally, the
data is encrypted by the application. After a
comparison the AES implementation of the ACME
Laboratories was deemed the optimal choice. Due to
the fact that it is the new standard algorithm for
symmetric data encryption, the algorithm can be
graded as secure. The user interface of the PDA
client also caused some troubles. It is not possible to
build a slightly more complicated interface when
using the default layout managers. It was necessary
to program a custom interface to fit all our needs
within an adequate time. Another problem was that
the PDA had a different window handling. It is not
possible to receive any window events within a Java
application and that must also be considered.
Another big problem on the PDA, which is not an
issue on the PC, is the scrolling of complicated
interfaces. The scrolling time is much too long
because a simple scroll request required a few
seconds of time to perform. Everything had to be
optimized to save as much computing time as
possible. However, some of the challenges of
migrating desktop applications to mobile technology
are the limited screen size and the originality of the
technologies that need to work together correctly for
a useful and usable solution. In conclusion, the PDA
prototype can reduce the time needed for transports
and the end-users were able to use the PDA similarly
to their non-mobile interfaces.
REFERENCES
Brightsidefactory (2008), Bright Side Framework
Overview. Online available: http://www.bs-
factory.org/components/remotingDoc/architecture.htm
l, last access: 2008-06-10
Bruno, E. J. (2005) NetBeans 4.1 & Eclipse 3.1 -
Development platforms for J2SE, J2EE, J2ME. Dr
Dobbs Journal, 30, 8, 14-23.
Freebeans (2008), Mysaifu JVM. Online available:
http://www2s.biglobe.ne.jp/~dat/java/project/jvm/inde
x_en.html, last access: 2008-06-10
Gale, M. E. & Gale, D. R. (2000) DICOM modality
worklist: An essential component in a PACS
environment. J of Digital Imaging, 13, 3, 101-108.
Holzinger, A. (2005) Usability Engineering for Software
Developers. Comm of the ACM, 48, 1, 71-74.
Holzinger, A. & Errath, M. (2007) Mobile computer Web-
application design in medicine: research based
guidelines. Universal Access in the Information
Society International Journal, 6, 1, 31-41.
Holzinger, A., Sammer, P. & Hofmann-Wellenhof, R.
(2006) Mobile Computing in Medicine: Designing
Mobile Questionnaires for Elderly and Partially
Sighted People. Springer LNCS 4061. Berlin, New
York, 732-739.
Holzinger, A., Searle, G. & Nischelwitzer, A. (2007) On
some Aspects of Improving Mobile Applications for
the Elderly. Springer LNCS 4554. Berlin, Heidelberg,
New York, 923-932.
Knyziak, T. & Winiecki, W. (2005) The new prospects of
distributed measurement systems using Java (TM) 2
Micro Edition mobile phone. Computer Standards &
Interfaces, 28, 2, 183-193.
Miller, A. (2004) PDA security concerns. Network
Security, 2004, 7, 8-10.
Mupparapu, M. & Arora, S. (2004) Wireless networking
for the dental office: current wireless standards and
security protocols. J Contemp Dent Pract, 5, 4, 155-
162.
Nischelwitzer, A., Pintoffl, K., Loss, C. & Holzinger, A.
(2007) Design and Development of a Mobile Medical
Application for the Management of Chronic Diseases.
In: Springer LNCS 4799. Heidelberg, Berlin, New
York, 119–132.
Salomaa, A., Rozenberg, G. & Brauer, W. (1996) Public-
Key Cryptography.
Sims, B. (2004) Moving from liability to viability.
Hospitals, health plans and physician practices can
outsmart hackers with policy, a comprehensive
security infrastructure and wireless monitoring.
Health
Management Technology, 25, 2, 32-35.
Sun (2004), Object Serialization Stream Protocol.
http://java.sun.com/j2se/1.5.0/docs/guide/serialization/
spec/protocol.html, last access: 2008-06-10
Sun (2008), CLDC HotSpot™ Virtual Machine.
http://java.sun.com/j2me/docs/pdf/CLDC-
HI_whitepaper-February_2005.pdf, 2008-06-10
Weippl, E., Holzinger, A. & Tjoa, A. M. (2006) Security
aspects of ubiquitous computing in health care.
Springer Elektrotechnik & Informationstechnik, e&i,
123, 4, 156-162.
WORK LISTS FOR THE TRANSPORT OF PATIENTS - A Case for Mobile Applications in Health Care
459