HSCI 391 `
What are the Wireless networking benefits
Provides Mobility • Two or more computers can establish a connection and share/ transfer information or files
HERTz
RAM CPU mother board
Memory
RAM vs ROM - Short term vs Long term • Information is stored in each depending on need/retrieval
Hard drive performance
RPM • Seek time - milliseconds, how long it take to find information on drive • Transfer rate - how fast information can be moved per sec. • Read/Write speed - how fast information can be read from drive or written to
Anonymity
Removing identifying information • names • addresses • etc.. • EX: Research studies
Open Source Licensing
no cost • Is developed by a community of programmers, and the program source code is available.
Public Domain
no restriction no condition
what is a open source
open source code
Credible source must have
screening or peer review • CCO- Credentials, Content, & Organization
Buffer size
small amount of ram on hard drive storing information that is accessed frequently for faster retrieval ahead of time.
• Adware
software littered with ads to offset cost of being free/at the expense of computer performance
Data base segmentation
splitting up that information (personal infor, test, data , result ) to different users have different levels of acess to patients infor
what is software
that is computer program
what is the TJC
the Joint Commision it certifies and accredits organization must adopt strategies to protect medical information
Burst speed
transfer rate of very small amounts of data, can be very fast
What is a Share ware
try it before you buy it a free trial
Spyware
usually software the has advertising and collect data, and changes computer configuration files
What is Encrypt
when something is leaving you have to encrypt it to secure it
What is professional ethics
written by the government bodies of professional trade association Example: The American Medical Association AMA code of ethics, must promise not to violate the code
What are the Data Security Methods
• Anonymity • Encryption • Authentication Methods • Database segmentation • Transaction Auditing
CPU
• Central Processing Unit • small silicone chip • interprets instructions • How many times a second it can execute instructions, i.e. clock speed • The processing of a set of instructions is called a CPU cycle • Units Hertz
Optical Storage
• Compact Disc CD, Digital Video Disc (DVD) • Uses laser beams to store and retrieve information form a disk, hard disks magnetic storage
Computer Viruses
• Computer Viruses are programs • replicate by themselves • Destroy computer hardware or data
Anecdotal Data
• Data that are derived from stories or testimonials • No peer-review • no scientific methodology is consistently used for the collection and analysis of the data • Often used to advertise products or services - often ones with questionable efficacy
Two amendments that imply privacy
• Fourth: protection against government search and seizure • Fifth: protection against self-incrimination • Ultimately individuals are responsible for their own privacy
•Seconday source
• Newspapers • Websites • TV/Radio • Magazines • Empirical data is interpreted and communicated by reporter, not the original researcher
Hard drive
• Not portable* • Store and deliver tremendous amounts of information • SSDs • RPMs - rate at which the platter spins
Back up strategies
• Should be geographically separated from the computer being backed up • Should always be redundant • Should be regularly, and on a timely schedule • Online back up methods - "Cloud storage?"
Healthcare Operation
• Upon consent you may share PHI with other business entities for Quality Assessment Planning, Licensing and Audits, and Health care teaching
Inches
monitor
Monitors
CRT - Cathode ray tube • big, bulky, creates lots of heat, high energy consumption • LCD - Liquid crystal display • energy efficient, lighter, cost effective
Freeware
(very similar to Public Domain) • Usually no cost is involved, but may have ads • Often there is a license agreement with conditions • General purpose: promotional product
Failures of "Logical Reasoning"
Fear • Arrogance • Misplaced/Misguided evaluation of our sources • We all think we are logical and rational! • Over estimate our own knowledge
Legally binding agreements satisfy five elements
-common intent -offer- acceptance -legal capacity -consideration
computer storage
8 bits = 1 bytes
Web Page
A Document on the web
Web site
A collection of Documents
Web Server
A computer which contains one or more websites
Search Engine
A website which allows you to search other websites
primary source
Academic/Scientific Journal • Conference proceedings • The person who did the experiment or study
What is contractual agreement
Agreement between two individuals, in which the agreement is considered legally binding
what is WEP (Wired Equivalent Privacy)
An encryption key (a series of letters and numbers) is assigned to the wireless router and to each computer on the network • The longer the key (amount of characters), the stronger the protection
Encryption
An encryption program used to convert documents in to a secret code
HON code
Authority: websites should provide qualifications of authors • Complementary: Information should be designed to support, not replace medical care from healthcare providers • Confidentiality: The privacy of site visitors must be respected and protected • Attribution: Websites must cite the sources and dates of valid medical information being provided. • Justifiability: Health claims must be balanced and objective and based on referenced scientific information • Transparency: Website authors must be accessible by providing contact information including email and address etc. • Financial Disclosure: sources of funding for research and website hosting must be disclosed, together with potential conflicts of interest on the part website authors • Advertising must be indicated and readily distinguished from website content
What is Wpa2 (Wi-Fi Protected Access 2)
Better protection then WPA • Older computers/routers may be limited to WEP
What is WPA (Wi-Fi Protected Access)
Better protection then WEP • WAP-PSK (Pre-Shared Key): a static key is assigned to the router • WAP-TKIP (Temporal Key Integrity Protocol): it automatically changes the keys at preset time intervals
issues affecting accuracy
Bias - author overlooks arguments not in their favor • Fraud - lies, inaccuracies, wrong citations • Poor reporting
Media
CDS
Email Etiquettes "professional setting"
Check email often • Always include a subject heading • Be brief • Be specific: answer any questions asked etc. • Use proper English • Avoid proliferation: multiple recipients CC vs BCC, who do not need to be on the email list • Dont use emoticons �
Intellectual Property what are they
Copyright Law-when something is writteen • Patent Law- invention ideass drug chemicals • Trademark Law- labels logod brands • Trade secret Law- coca cola recepy
Empirical Data
Data collected by scientific method • Results and conclusions can be stated to a statistical certainty • Bias is recognized and minimized • Results are reviewed/ critiqued by peers and then published so hat they can be subjected to the scrutiny of the scientific community • published in legitimate scientific, academic, and medical journals
What is the purpose of risk analysis?
Design appropriate personal screening analysis for personnel • Identify what data to backup and how • Decide whether and how to use encryption • Address what data must be authenticated to maintain data integrity • Determine the appropriate manor of protecting health information transmissions
Assessing Credentials
Did the author identify their credentials? • Are their credentials & experience relevant to the material? • Has the person been published in a peer-review publication? • Can you determine what degrees/certifications the individual holds and from what university • Does the person claim a degree from a degree mill
Assessing Content
Do the views agree or disagree with current beliefs on the subject • If the author disagrees with current thinking, does he/she present a scientific basis for their opinion • Are statistics cited? • Are "facts" based on scientific research or are they based on anecdotal evidence or testimonials? • Is anything being sold on the website? • Is there a conspiracy theory? • Look up citations to studies?
Whhat type of printers are there
Dot Matrix • Inkjet • Laser
RPM
Hard drive
What are the cause of loss Data
Hardware failure • Physical disaster • Accidental erasure or modification
What is HIPAA
Health Insurance Portability and Accountability Act Data sharing ,privacy and security of personl health information protects privacy conduct risk assesment to identify potential hazards
Research Health on the Internet
Huge amount of information • Barriers regarding the access and use of information • Locating the one key piece of information • Determining whether the info is valid
Health on the Net (HON)
Non-government organization (NGO) crated in 1995 to guide lay person or non medical users and medical practitioners to useful and reliable online medical and health information help
Assessing Organization
Is the web site a personal web site or one belonging to a larger organization? • Web servers can usually be identified based on their URL: • COM (facebook.com) commercial website • ORG (apta.org) non-profit organization • EDU (csun.edu) Education institution • NET (netscape.net) Network service provider • GOV (senate.gov) government branch or agency
Inkjet
Liquid ink • forms images by spraying the in in small precise dots • Ink is expensive • Reasonable quality printing • Designed for relatively low printing duty cycles
Duty Cycle
Maximum number of pages that can be printed per month
Who protects the medical information
Medical Information Bureau (MIB) • owned by member insurance companies • collected info from insurer about medical histories • insurance companies report back to MIB
Dot Pitch / PPI
Monitors produce and image by assembling a set of very tiny dots together, which each have one primary color, to produce and image. • Measured in mm and is the distance between 2 dots of the same color (.2mm to .4mm) the distance between 2 pixels we need it to be .25 or less
Higher PPI/ lower Dot Pitch, Better?
More pixels means more heat • More energy to power • Max resolution of the human eye is 477PPI • Current max resolution of a Monitor is 440PPI • Iphone 326/401ppi
Unauthorized access
Origin of the Problem: Most windows machines have a default public shared folder on each computer Consequences: Any user on the network has access to the SHARED folder Protection against unauthorized access requires: SHARED folder should be encrypted, and require authentication for access.
Authentication methods
Password or passphase • Biometric authentication • Finger print • Facial recognition • Retinal scanning
Computer Virus Transmission
Sharing infected drives/discs between computers • Internet (email / *surfing the web) • USB Drive demonstration • BadBIOS via sound!
What does confidentiality consist of
Specific legal protections • contractual agreements • Laws governing professional conduct • Specialized legislation governing particular industries (example: HIPAA)
Properties of Printers
Speed - pages per minute (PPM) • Quality - Dots per inch (DPI)
Computer Memory: RAM
Speed - store and deliver to data to the CPU to determine what to do with it • Data only there when powered on • Limited in size compared to Hard Drive storage
Motherboard Performance
Speed at which it can transfer data • How much data it can transfer at one time Front Side Bus speed is equivalent to the processor • How many times per second information can be transferred, approx. = Hertz
Software Licensing
When you purchase a software, you purchase the right to use the software (license) •You are not purchasing the ownership of the software •Commercial Licensing: software license agreement (SLA) •Contract between user and software developer •In return of your payment, you are allowed to use the program under certain conditions •EX: only install on one computer
Dot Matrix
Works using a series of pins arranged in matrix. In order to form a printed character, certain pins selectively and rapidly protrude and poke through a ribbon to form an image on the paper behind the ribbon, much like a typewriter Multiple copies of a document can be made at one time, airline tickets • Pros: single pass, multicopy , inexpensive ribbon ink • Cos: noisy, slow, low quality printing black and white
What are the type of viruses that we can have
Worms • usually found in malware, generally reduces computer performance • Trojan • are programs that give access or open holes in a computer for another person to access later. • Bots: roam through networks and report back information or keep track of stats
Phising
emails sent to users claiming they are from your back etc.. asking you to login by clicking a link in the email... link is not actually bank site • collects usernames and passwords
What is a Non-disclosure agreement
contact between two legal parties specifically protects sensitive information purpose to not disclose intentional or unintentionally to some one else
Every what time do you need to BACK UP your information
every time you edit something and you should show every revision
CPU Performance: Multicores
The number of cores • 2-16 cores • multicore, usually slower clock speed but overall better performance* • faster a cpu operates the more heat single cords has more better speed because it does not split the info
Shareware
The user has the ability to try it for (free trail period) before buy it
Transaction Auditing
Used after a security breach to identify how the problem occurred • It consist of software the run in the background of the computer system and records every user that enters the system • Does not prevent security breaches
laser
Uses a dry toner, which is has a very fine powder • Pros: very high duty cycles, excellent reliability in demanding environments, low cost per page, very fast printing • Cons: expensive, and large
What are the TPO Activities
Treatment Activity- covers referrals , written electronic and verval communication • Payment Activity- Billing payment • Healthcare Operations Activity- This is what is covered when you consent! The facility my use PHI without further permission.
what is data inout
USB
What are the Wireess networking vulnerability
Unauthorized access to wireless-enabled computers and mobile devices • Interception of authorized data through wireless transmission
URL
Universal Resource Locator
Payment Activity
Upon consent you may share PHI with business entities involved with BILLING and PAYMENT for medical services rendered • Disability income insurance, worker's compensation, credit card insurance not HIPAA protected, require further authorization from patient to share
Treatment Activities
Upon consent, you may share PHI with other health professionals who are or maybe involved in the care of the patient • covers written, electronic and verbal communication. • Covers referrals
what is a hardware
a physical device that you can see computer processor perpheral device
what is a freeware
ads no cost resell it yourself
What is consent
and signing the Acknowledgement of Receipt, the patient grants the right for the practice to use PHI for CERTAIN COVERED ACTIVITIES without further written permission. pacent grants the right of activity
Public Domain
few or no conditions • no cost
BYTES
hard drive RAM
What type of computer do you want
hard drive- pictures memory- whhhen you have alot of tabs open CPU- one use one tab open
What is privacy
information I have that i do not share
What is confidentiality about data
information that i have shared with someone with expectation that they dont share it with anyone else
catphising
is when a fraudster fabricates an identity and tricks someone via cyber communication into phony emotional or romantic relationship - usually for financial gain to the scammer.
Why do we have computer in health care
it is easy access and distribution
Browser Hickjaker
makes your browser open to a specific URL or wont let you surf because keeps popping up with ads etc.