HSCI 391 `

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What are the Wireless networking benefits

Provides Mobility • Two or more computers can establish a connection and share/ transfer information or files

HERTz

RAM CPU mother board

Memory

RAM vs ROM - Short term vs Long term • Information is stored in each depending on need/retrieval

Hard drive performance

RPM • Seek time - milliseconds, how long it take to find information on drive • Transfer rate - how fast information can be moved per sec. • Read/Write speed - how fast information can be read from drive or written to

Anonymity

Removing identifying information • names • addresses • etc.. • EX: Research studies

Open Source Licensing

no cost • Is developed by a community of programmers, and the program source code is available.

Public Domain

no restriction no condition

what is a open source

open source code

Credible source must have

screening or peer review • CCO- Credentials, Content, & Organization

Buffer size

small amount of ram on hard drive storing information that is accessed frequently for faster retrieval ahead of time.

• Adware

software littered with ads to offset cost of being free/at the expense of computer performance

Data base segmentation

splitting up that information (personal infor, test, data , result ) to different users have different levels of acess to patients infor

what is software

that is computer program

what is the TJC

the Joint Commision it certifies and accredits organization must adopt strategies to protect medical information

Burst speed

transfer rate of very small amounts of data, can be very fast

What is a Share ware

try it before you buy it a free trial

Spyware

usually software the has advertising and collect data, and changes computer configuration files

What is Encrypt

when something is leaving you have to encrypt it to secure it

What is professional ethics

written by the government bodies of professional trade association Example: The American Medical Association AMA code of ethics, must promise not to violate the code

What are the Data Security Methods

• Anonymity • Encryption • Authentication Methods • Database segmentation • Transaction Auditing

CPU

• Central Processing Unit • small silicone chip • interprets instructions • How many times a second it can execute instructions, i.e. clock speed • The processing of a set of instructions is called a CPU cycle • Units Hertz

Optical Storage

• Compact Disc CD, Digital Video Disc (DVD) • Uses laser beams to store and retrieve information form a disk, hard disks magnetic storage

Computer Viruses

• Computer Viruses are programs • replicate by themselves • Destroy computer hardware or data

Anecdotal Data

• Data that are derived from stories or testimonials • No peer-review • no scientific methodology is consistently used for the collection and analysis of the data • Often used to advertise products or services - often ones with questionable efficacy

Two amendments that imply privacy

• Fourth: protection against government search and seizure • Fifth: protection against self-incrimination • Ultimately individuals are responsible for their own privacy

•Seconday source

• Newspapers • Websites • TV/Radio • Magazines • Empirical data is interpreted and communicated by reporter, not the original researcher

Hard drive

• Not portable* • Store and deliver tremendous amounts of information • SSDs • RPMs - rate at which the platter spins

Back up strategies

• Should be geographically separated from the computer being backed up • Should always be redundant • Should be regularly, and on a timely schedule • Online back up methods - "Cloud storage?"

Healthcare Operation

• Upon consent you may share PHI with other business entities for Quality Assessment Planning, Licensing and Audits, and Health care teaching

Inches

monitor

Monitors

CRT - Cathode ray tube • big, bulky, creates lots of heat, high energy consumption • LCD - Liquid crystal display • energy efficient, lighter, cost effective

Freeware

(very similar to Public Domain) • Usually no cost is involved, but may have ads • Often there is a license agreement with conditions • General purpose: promotional product

Failures of "Logical Reasoning"

Fear • Arrogance • Misplaced/Misguided evaluation of our sources • We all think we are logical and rational! • Over estimate our own knowledge

Legally binding agreements satisfy five elements

-common intent -offer- acceptance -legal capacity -consideration

computer storage

8 bits = 1 bytes

Web Page

A Document on the web

Web site

A collection of Documents

Web Server

A computer which contains one or more websites

Search Engine

A website which allows you to search other websites

primary source

Academic/Scientific Journal • Conference proceedings • The person who did the experiment or study

What is contractual agreement

Agreement between two individuals, in which the agreement is considered legally binding

what is WEP (Wired Equivalent Privacy)

An encryption key (a series of letters and numbers) is assigned to the wireless router and to each computer on the network • The longer the key (amount of characters), the stronger the protection

Encryption

An encryption program used to convert documents in to a secret code

HON code

Authority: websites should provide qualifications of authors • Complementary: Information should be designed to support, not replace medical care from healthcare providers • Confidentiality: The privacy of site visitors must be respected and protected • Attribution: Websites must cite the sources and dates of valid medical information being provided. • Justifiability: Health claims must be balanced and objective and based on referenced scientific information • Transparency: Website authors must be accessible by providing contact information including email and address etc. • Financial Disclosure: sources of funding for research and website hosting must be disclosed, together with potential conflicts of interest on the part website authors • Advertising must be indicated and readily distinguished from website content

What is Wpa2 (Wi-Fi Protected Access 2)

Better protection then WPA • Older computers/routers may be limited to WEP

What is WPA (Wi-Fi Protected Access)

Better protection then WEP • WAP-PSK (Pre-Shared Key): a static key is assigned to the router • WAP-TKIP (Temporal Key Integrity Protocol): it automatically changes the keys at preset time intervals

issues affecting accuracy

Bias - author overlooks arguments not in their favor • Fraud - lies, inaccuracies, wrong citations • Poor reporting

Media

CDS

Email Etiquettes "professional setting"

Check email often • Always include a subject heading • Be brief • Be specific: answer any questions asked etc. • Use proper English • Avoid proliferation: multiple recipients CC vs BCC, who do not need to be on the email list • Dont use emoticons �

Intellectual Property what are they

Copyright Law-when something is writteen • Patent Law- invention ideass drug chemicals • Trademark Law- labels logod brands • Trade secret Law- coca cola recepy

Empirical Data

Data collected by scientific method • Results and conclusions can be stated to a statistical certainty • Bias is recognized and minimized • Results are reviewed/ critiqued by peers and then published so hat they can be subjected to the scrutiny of the scientific community • published in legitimate scientific, academic, and medical journals

What is the purpose of risk analysis?

Design appropriate personal screening analysis for personnel • Identify what data to backup and how • Decide whether and how to use encryption • Address what data must be authenticated to maintain data integrity • Determine the appropriate manor of protecting health information transmissions

Assessing Credentials

Did the author identify their credentials? • Are their credentials & experience relevant to the material? • Has the person been published in a peer-review publication? • Can you determine what degrees/certifications the individual holds and from what university • Does the person claim a degree from a degree mill

Assessing Content

Do the views agree or disagree with current beliefs on the subject • If the author disagrees with current thinking, does he/she present a scientific basis for their opinion • Are statistics cited? • Are "facts" based on scientific research or are they based on anecdotal evidence or testimonials? • Is anything being sold on the website? • Is there a conspiracy theory? • Look up citations to studies?

Whhat type of printers are there

Dot Matrix • Inkjet • Laser

RPM

Hard drive

What are the cause of loss Data

Hardware failure • Physical disaster • Accidental erasure or modification

What is HIPAA

Health Insurance Portability and Accountability Act Data sharing ,privacy and security of personl health information protects privacy conduct risk assesment to identify potential hazards

Research Health on the Internet

Huge amount of information • Barriers regarding the access and use of information • Locating the one key piece of information • Determining whether the info is valid

Health on the Net (HON)

Non-government organization (NGO) crated in 1995 to guide lay person or non medical users and medical practitioners to useful and reliable online medical and health information help

Assessing Organization

Is the web site a personal web site or one belonging to a larger organization? • Web servers can usually be identified based on their URL: • COM (facebook.com) commercial website • ORG (apta.org) non-profit organization • EDU (csun.edu) Education institution • NET (netscape.net) Network service provider • GOV (senate.gov) government branch or agency

Inkjet

Liquid ink • forms images by spraying the in in small precise dots • Ink is expensive • Reasonable quality printing • Designed for relatively low printing duty cycles

Duty Cycle

Maximum number of pages that can be printed per month

Who protects the medical information

Medical Information Bureau (MIB) • owned by member insurance companies • collected info from insurer about medical histories • insurance companies report back to MIB

Dot Pitch / PPI

Monitors produce and image by assembling a set of very tiny dots together, which each have one primary color, to produce and image. • Measured in mm and is the distance between 2 dots of the same color (.2mm to .4mm) the distance between 2 pixels we need it to be .25 or less

Higher PPI/ lower Dot Pitch, Better?

More pixels means more heat • More energy to power • Max resolution of the human eye is 477PPI • Current max resolution of a Monitor is 440PPI • Iphone 326/401ppi

Unauthorized access

Origin of the Problem: Most windows machines have a default public shared folder on each computer Consequences: Any user on the network has access to the SHARED folder Protection against unauthorized access requires: SHARED folder should be encrypted, and require authentication for access.

Authentication methods

Password or passphase • Biometric authentication • Finger print • Facial recognition • Retinal scanning

Computer Virus Transmission

Sharing infected drives/discs between computers • Internet (email / *surfing the web) • USB Drive demonstration • BadBIOS via sound!

What does confidentiality consist of

Specific legal protections • contractual agreements • Laws governing professional conduct • Specialized legislation governing particular industries (example: HIPAA)

Properties of Printers

Speed - pages per minute (PPM) • Quality - Dots per inch (DPI)

Computer Memory: RAM

Speed - store and deliver to data to the CPU to determine what to do with it • Data only there when powered on • Limited in size compared to Hard Drive storage

Motherboard Performance

Speed at which it can transfer data • How much data it can transfer at one time Front Side Bus speed is equivalent to the processor • How many times per second information can be transferred, approx. = Hertz

Software Licensing

When you purchase a software, you purchase the right to use the software (license) •You are not purchasing the ownership of the software •Commercial Licensing: software license agreement (SLA) •Contract between user and software developer •In return of your payment, you are allowed to use the program under certain conditions •EX: only install on one computer

Dot Matrix

Works using a series of pins arranged in matrix. In order to form a printed character, certain pins selectively and rapidly protrude and poke through a ribbon to form an image on the paper behind the ribbon, much like a typewriter Multiple copies of a document can be made at one time, airline tickets • Pros: single pass, multicopy , inexpensive ribbon ink • Cos: noisy, slow, low quality printing black and white

What are the type of viruses that we can have

Worms • usually found in malware, generally reduces computer performance • Trojan • are programs that give access or open holes in a computer for another person to access later. • Bots: roam through networks and report back information or keep track of stats

Phising

emails sent to users claiming they are from your back etc.. asking you to login by clicking a link in the email... link is not actually bank site • collects usernames and passwords

What is a Non-disclosure agreement

contact between two legal parties specifically protects sensitive information purpose to not disclose intentional or unintentionally to some one else

Every what time do you need to BACK UP your information

every time you edit something and you should show every revision

CPU Performance: Multicores

The number of cores • 2-16 cores • multicore, usually slower clock speed but overall better performance* • faster a cpu operates the more heat single cords has more better speed because it does not split the info

Shareware

The user has the ability to try it for (free trail period) before buy it

Transaction Auditing

Used after a security breach to identify how the problem occurred • It consist of software the run in the background of the computer system and records every user that enters the system • Does not prevent security breaches

laser

Uses a dry toner, which is has a very fine powder • Pros: very high duty cycles, excellent reliability in demanding environments, low cost per page, very fast printing • Cons: expensive, and large

What are the TPO Activities

Treatment Activity- covers referrals , written electronic and verval communication • Payment Activity- Billing payment • Healthcare Operations Activity- This is what is covered when you consent! The facility my use PHI without further permission.

what is data inout

USB

What are the Wireess networking vulnerability

Unauthorized access to wireless-enabled computers and mobile devices • Interception of authorized data through wireless transmission

URL

Universal Resource Locator

Payment Activity

Upon consent you may share PHI with business entities involved with BILLING and PAYMENT for medical services rendered • Disability income insurance, worker's compensation, credit card insurance not HIPAA protected, require further authorization from patient to share

Treatment Activities

Upon consent, you may share PHI with other health professionals who are or maybe involved in the care of the patient • covers written, electronic and verbal communication. • Covers referrals

what is a hardware

a physical device that you can see computer processor perpheral device

what is a freeware

ads no cost resell it yourself

What is consent

and signing the Acknowledgement of Receipt, the patient grants the right for the practice to use PHI for CERTAIN COVERED ACTIVITIES without further written permission. pacent grants the right of activity

Public Domain

few or no conditions • no cost

BYTES

hard drive RAM

What type of computer do you want

hard drive- pictures memory- whhhen you have alot of tabs open CPU- one use one tab open

What is privacy

information I have that i do not share

What is confidentiality about data

information that i have shared with someone with expectation that they dont share it with anyone else

catphising

is when a fraudster fabricates an identity and tricks someone via cyber communication into phony emotional or romantic relationship - usually for financial gain to the scammer.

Why do we have computer in health care

it is easy access and distribution

Browser Hickjaker

makes your browser open to a specific URL or wont let you surf because keeps popping up with ads etc.


Set pelajaran terkait

Yale ~ Science of Well-Being ~ Quiz 3

View Set