Skip to main content

Home/ ITGS News/ Contents contributed and discussions participated by Mariam B

Contents contributed and discussions participated by Mariam B

Mariam B

In Haiti, Practicing Medicine From Afar - 0 views

  •  
    This article deals with how telemedicine was used following the earthquake that occurred in Haiti in order to provide medical care to patents and individuals. The stakeholders in this scenario include the patients and doctors in Haiti and the doctors/hospitals in the U.S. They are able to use satellite technology and wireless internet, in order to bridge the gap between both areas and provide people with access to medical care. Satellite technology is used to communicate between doctors in the U.S with clinics in Haiti. This provides real time service to patients, where the doctor is providing a consultation and diagnosis immediately to the patient. This technology also allows doctors in the U.S to perform surgeries since the satellite technology is able to support telemedicine because it provides a high amount of bandwidth. Additionally, in Haiti they are using high speed wireless internet throughout certain regions. The radio system is used in extreme cases where more advanced technology is not available, but still allows doctors from two areas to communicate with one another. Images and messages during consultations are sent through a secured network, so the data of the patients is kept private. Obvious benefits of using this technology include that people are able to get access to medical care and this decreases the digital divide and globalization. This is because people are able to get more care and consultation through using this IT technology, which would not have been available without telemedicine. However, some issues still arise despite these benefits in medical care. This includes the security of information and privacy of the patients. In this case, the article states that the internet messages are secured so that there is not privacy breach. This must be done using encryption technology so that people are not discouraged from using telemedicine and so that no private patient information is leaked or seen by unwanted users.
Mariam B

Kenya's Telemedicine - 0 views

  •  
    This is a video I found online which relates to our case study. It deals with telemedicine in Kenya and how it has greatly helped clinics and patients in receiving medical care simply through the use of a camera, scanner, and computer.
Mariam B

Privacy Issue Complicates Push to Link Medical Data - 1 views

  •  
    This article deals with the use of electronic health records in order to record medical information of patients. Congress wishes to pass a bill to enforce the use of electronic health records, however issues regarding the privacy of patients and information stored on these databases have arose. Electronic health records are used to record personal patient information such as name, age, address along with health sicknesses and symptoms. This also allows doctors to send e-prescriptions to the patient. However the computerization of health records triggers obvious privacy issues which prevent many hospitals to completely switch to using these electronic databases. Stakeholders of this technology include the patients whose medical information is being stored and sent on the databases, the hospitals and doctors that use the databases to track and send prescriptions to their patients, along with policy makers such as Congress and President Obama who promote the use of electronic health databases. The major stakeholder is the patient, whose private information is at risk by using these databases. Doctors can also use the electronic databases to send prescriptions to their patients for medicines or further appointments. Patient databases include sensitive personal information that may be at risk of being hacked or seen by an unauthorized user. In the article, solutions to these privacy issues have been proposed such as increased spending and investments in order to create solutions to privacy issues. Measures can be taken to safeguard medical information such as using encryption technology to secure private information that is sent online or kept on the hospital's computer database. This encryption would prevent unauthorized users from accessing and using patient information. However, in cases where this encryption technology fails to protect patient information, policies have been created that the patient must be notified if their personal information has been h
  •  
    continued: have been created that the patient must be notified if their personal information has been hacked or seen by an outsider. Other policies have been enforced that give patients the ability to control and prevent hospitals from sending private information for research without their permission. These policies help prevent private patient information from being seen by unwanted individuals.
Mariam B

Cisco Security Exec Cheers on Android's Security Flaws - 0 views

  •  
    This article discusses the security flaw that is present in the current mobile device, Android. The Android is easily able to download applications onto the phone, however certain applications may contain Trojan horses and other malicious malware. This impacts businesses and employment because large companies allow their employees to use the Android during work in order to record, send and transmit important information. However with lack of security, certain applications may have the ability to leak sensitive and private company information to others. This impacts the stakeholders: which includes the company whose information is being leaked and the employee that is using the device to store their data and send files to one another. Due to the lack of security that is enabled on the applications and the phone, certain applications make it harmful to store private company data. This becomes an issue of security because the applications are not secure and therefore the phone cannot be used for business purposes because the lack of security causes a threat on privacy as well. Solutions to this are a closed application approval process which is what apple does with its application- each one is viewed in order to see if it is secure. This step should be taken with the applications that are on the Android as well in order to make it more secure.
Mariam B

Intel and J.P. Morgan Chase to Expand Indian Operations - 1 views

  •  
    Intel is a company that develops processing technologies such as chips that are put into computer hardware. However recently they have decided to outsource certain necessary business operation to India instead of in the US. Additionally Intel has agreed with an investment banker named Morgan Chase, to invest about 1 billion of the company's money into this plan. Intel already has many of it's workers in India however wants to expand the business by increasing its workers within the company. Workers will be needed to help expand the company a long with workers both qualified and graduates due to the increased opportunities and positions. The reasoning as to why Intel continues to offshore work to India is because they are able to find high quality workers and can get work done at cheaper/lower costs. The organization affected mainly is Intel who is able to make a profit through investing in the workforce in India. Additionally the people who are in India that are given the jobs are able to benefit because more jobs are becoming available. The negative side to this is that, they are not paid as much as Intel workers in the US. Additionally another stakeholder is the U.S government itself that frowns upon the idea of offshoring jobs due to the knowledge that by doing this, job oppertunities available to Americans will decrease. The social and ethical issues and impacts of these are related to globalization and its impacts on both the country (India) and the United States. Although workers are given jobs the pay that they receive is not as much as a worker in the U.S would. This is done for the economic benefit of the country Intel itself, allowing them to create a greater profit by off shoring jobs to India. However those who are highly qualified and trained are able to find a job at Intel that matches their level of training. Thus they become employed if they need money. A positive impact to globalization is getting rid of the digital divide in a sense because fr
Mariam B

Another Day, Another RFID Trial-Debate about using RFID on DVDs - 0 views

  •  
    This article discusses the issue of individual security and invasion of ones privacy through the use of RFID tags. With RFID tags on almost ever retail item, customers who are main stake holders, are questioning the motives of these tracking codes. A major item that is being tracked is a DVD from when it is first put into its cover and sent to the store, till the costumer purchases it. However the question remains, What is the purpose of this? Is it necessary to track how the costumer uses the items that they buy? Other stake holders include the large business corporations such as Walmart, who use these RFID codes to profit from studying the purchases and trends in other stores and areas. Additionally another stakeholder that is seen as a threat is the government who may eventually be able to spy or track down individuals based on these RFID codes on the items that they purchase. This issue relates to business and employment because companies are able to economically profit through this even though the individual privacy remains a threat. These RFID tags allow businesses to profit because they can use the codes to efficiently organize the purchasing of stock and selling of items. The RFID can be considered a network that allows the hardware which is the actual code to work. Without the network tracking and creating the code, the device is unable to function. Although the customer is able to open the wrapper such as in the case of buying a DVD and throw it away, the thought still remains of what will happen in the future with these tags? There is constant dispute and consideration on how the alternate user who is the customer that purchases these items, may become a victim of privacy invasion.
Madeline Brownstone

TOPIC: Net Neutrality-Issues of censorship or equality of access and the digital divide - 20 views

started by Madeline Brownstone on 21 Oct 10 no follow-up yet
  • Mariam B
     
    I read Elisavet's post on an article regarding the censorship of certain internet sites by the Chinese government. I agree with the concept of internet censorship limiting human rights and freedom of expression. Not only are the people limited in terms of what information they are exposed to and have knowledge about, but are unable to express themselves. The internet is supposed to be a network with no central control, so preventing access to certain web pages or specific information, creates unnecessary control implemented and given to government officials. If the same information is available upon request in other countries, it should be allowed to be seen to people in China as well.
Mariam B

How Obama tapped into Social Networks' Power - 0 views

  •  
    The benefit of social networking allowed a medium of communication, in order to spread and advertise the campaign of Obama. The widespread usage of facebook, myspace, and other popular social networking websites by users was used to promote Obama during the election. He was able to gain many supporters through advertising on these social networks. Rather then excessively spending money on campaigning, it allowed a easy medium of spreading knowledge. Often times a lot of money is spent on president campaigns, and the emergence of social networks as a tool in the campaign helped increase Obama's supporters-significantly increasing his votes.
Mariam B

How Good Software makes us Stupid - 1 views

  •  
    This article discusses the drawbacks of using digital technology as a mode of acquiring knowledge. Although many believe that the emergence of digital technology allows individuals to increase their knowledge through the use of navigation devices and laptops, studies show how our intellectual capacity of storing and memorizing information is suddenly decreasing due to our dependancy on such devices.
  •  
    Within our current society, individuals are very dependent on their digital devices in order to provide them with knowledge. However, studies prove that the more reliant we become on this technology our ability to calculate, process, and store information decreases. We resort to our laptops, cellphones, and navigational system devices in order to find out how to get to a certain location or to quickly gain some information about a certain topic. This article investigates the social and ethical concerns involving people and machines: individuals are able to access knowledge, gain answers to their questions, and fulfill their curiosity using digital devices. This is beneficial in the way that we able to expand our knowledge on a variety of separate topics in a generally fast and efficient way. However a drawback that is triggered through the continuous use of this technology is the dependancy on using it as the only mode of gaining information. Traditional means of reading a newspaper or book have been abandoned and many individuals have resorted to search engines on the internet. This alternately limits our in-depth knowledge on a focused subject. The stake holders in this case are taxi driver who would usually memorize highways and routes to various places within a city have adopted to using their GPS as a easy guide to reach their destination. Additionally students, parents, and many organizations also often just use their digital devices such as the GPS, cellphones and their laptops to get quick answers. This article explores the use of IT in the process of teaching and learning. We are using our digital devices to learn from online forums and research from search engines like google. Individuals immediately turn to technology to search up the answer to a question that they have. Additionally it concerns the idea of mapping virtual globes through the use of GPS, taxi cab drivers are able to locate the destination that the passenger wants to arrive at.
1 - 9 of 9
Showing 20 items per page