Skip to main content

Home/ ITGS News/ Contents contributed and discussions participated by Elisavet M

Contents contributed and discussions participated by Elisavet M

Elisavet M

In Haiti, Practicing Medicine From Afar - 0 views

  •  
    (NOT FINISHED) After the devastation of Haiti's earthquake, impoverishment plagued the millions of patients, in dire need for medical assistance and resources. The "low tech" equipment failed to meet the needs of the population, so tele medicine is being adapted.
  •  
    Medical facilities in Haiti are in essence trying to integrate satellite connection and internet service (along with increased bandwidth) in order to greatly expand the distribution and administering of medical services. Donated by the other organizations in Miami, the Haitian hospitals are now given the opportunity to form intercommunication via a wireless regional network system (internet service provided by neighboring countries, such as the Dominican Republic). One of the primary stakeholders, the patient and injured Haitian individuals required to maintain necessary medical help from the American doctors and medical professionals (other primary stakeholder). Such IT systems, enable the patients suffering from the devastating results of the earthquake to retrieve an increased amount of help and attention from doctors and other medical health professionals in other parts of the world, specifically recruiting medical help centralized in the United States. The adapted procedures of tele health already in American hospitals, including the use of internet messaging, x rays, scans, and medical reports all enable doctors to obtain confrontation and collaboration with Haitian patients on accurate and more reliable grounds. The scenario included in the article is Health, and the main theme is"medical information administration and marketing sales" for this pertains to telemedicine as a branched off aspect. In regards to the social and ethical considerations, the issue of the digital divide and equality of access is greatly highlighted in the article; telemedicine linked medical services found in another nation, to the needy Haitian population thus diminishing global boundaries placed up by the differences in development and advancement in certain regions of the globe. The digital divide that took control over Haitian lives( due to the catastrophic events of the earthquake) eliminated sources of internet connection, hardware and available software equipment to run teleme
Elisavet M

An Unforeseen Complication of Electronic Medical Records - 0 views

  •  
    This article focuses specifically upon the negative implications that surface with the installation and adaptation of electronic medical records (EMR) for medical professionals targeting specifically the level of doctor/patient relationships. The author, a medical specialist within a facility, talks about his experience with the proven efficiency of the EMR system's effective retrieval of patient medical history and advanced medical database, but further accentuates emphasis on the system's flawed influence upon medical professional and patient relations. One of the primary stakeholders, the medical doctors and physicians complain that the system itself places limitations upon doctors' interactions with patients during the time of consultation (a critical part of constructing medical diagnoses); the author places emphasis upon the way he had to consistently go back and forth from the patient to the computer, in order to type in the retrieved information gained from the conversation. The act of going back and forth between patient and technological system (EMR) discouraged and urged the patient into silence, thus limiting conversation with the doctor, due to the lack of complete face to face, non interrupted evaluation and reflection of medical symptoms, history, prior experiences from the perspective of the patient. Thus, the second primary stakeholder, the patient himself, feels that he or she is not properly or fully being examined; more importantly this places the patient into the position of feeling less significant, as if his/her perspective doesn't truly matter when in reality it is the patient's responsibility to be clear and coherent with the medical professional, to help navigate the doctor into generating the correct diagnosis that will help save patient lives. The IT system involved is the EMR (electronic medical record) system that operated with the help of dozens of computer terminals that were positioned in individual workstations (hardware com
  •  
    (continuation) component) and worked on the same networking service. The software programming that came with the system helped improve the retrieval and sharing of patient medical history, organization of data, efficiency and flexibility of keying in and updating medical information etc. In connection to the scenario of Health, the limiting influence forced upon doctor/patient relationships sourced from the integration of EMR systems targets a flaw in the advantage of having instant connection to patient medical information. Not only are doctors forced to focus on correctly typing in the necessary information, thus avoiding or diminishing patient relations, but the great magnitude of medical information stored and available in EMR systems, "can push some doctors into what one EMR expert refers to as "cognitive overload" while trying to balance patient input with medical history data on the spot. Furthermore, the system's software tool, such as the fee-for-service payment system, which helps tabulate symptoms while simultaneously facilitating the billing process, continues to discourage doctors from executing patient consultation. One major issue that surfaces is reliability; the EMR system itself consists of hardware and software components that transition the doctor's attention from the patient directly onto the transferring of information into the system while in the mode of confrontation. The correspondence of data with the real world comes into significance, as the data may become unreliable due to the fact that it may be entered incorrectly (the doctor may have been focusing more upon data transmission, rather than what the patient actually stated), and additionally the use of EMR systems increase the risk of data becoming outdated, for it is solely up to the doctor's skills and attention that medical history, symptoms, side effects of the patient be kept at a steady consistency once entered into the system. Thus, although physicians and he
Elisavet M

Tomorrow's Technology and You - 0 views

  •  
    The website enables the reader to look over an extensive amount of the significant content found in chapter 13, E-commerce within the textbook, Tomorrow's Technology and You.
Elisavet M

Data Security Laws Seem Likely, So Consumers and Businesses Vie to Shape Them - 0 views

  •  
    During 2005, political organizations advocated for strict laws implementing data security enforcement, as rising concerns stemmed out of alarming statistical studies and research, revealing identity theft, credit card frauds and hacking as emerging and terrorizing practices overtaking much of the internet realm. This article introduces the beginning of the rise in public awareness, as technology strongly began to redirect the business world into another more digital phase. It was during that year, the primary stakeholders, also known as the businesses ( participants of e-commerce that stored, verified and utilized private consumer data), vocalized their needs clarifying their desire for the creation of constraints in regards to the consequences or negative implications of passing certain bills (for data security). The past exemplifies the various influences the introduction of data security measures, passed by the government legislatures, had upon newly initiated businesses; among the most significant implications discussed were: the need to build a secure database for reliable storage of clientele digital data with the utilization of particular software as well as improving business organizational structure in order to maximize the rate of security notifications towards consumers based on a foundation of rigid security standards. Far from the adaptation to such implications, the political crisis of establishing solid ground for a new set of security data policies and standards became an overwhelming process for politicians, congress members in conjunction with consumer and data privacy groups that rivaled in attaining the responsibilities of passing the needed laws. The politicians (stakeholders, holding the role of administering governmental legislation to stabilize data security breaches), came into opposition with the concerns of many members of advocacy groups (stakeholders, holding the responsibility of supervising and publicly navigating the direction of th
  •  
    continuation: the adjusted standards enforced by politicians). The problem of adhering to the instruction of newly created laws motioning businesses to appoint data security officers, draft policies, to comply with policies and procedures involving giving access to files in business databases for the Federal Trade Commission to check comes into collision with what most online businesses want to go through the process of doing. However, with the issue of security surfacing future consumer problems, as security breaches become major forces threatening the safe entering of digitally encrypted information (such as credit card codes), many companies become increasingly aware of the needed adherence to the strict security data laws, in order to continue profiting financially in order to keep the rate of consumer trust and payment increasing.
Elisavet M

Offshore Outsourcing's Next New Wave: How High? - 1 views

  •  
    The emergence of Business process outsourcing has transfigured the ways in which companies in developed nations, expand their services globally to businesses in developing nations. Although the cost for labor to support the extension of company engagement in third world countries is acknowledged as being relatively low (a beneficial advantage to most established business corporations), it has come to the attention of the participants (Businesses of developed countries) that it is of major importance to fully recognize the boundaries of business practices, culture, and level of intellectuality and experience within the hired portion of developing nation populace. Companies of information technology services, such as Dell, have come to form heightened concern about such global barriers, having attempted to transition call center labor in India and then deciding upon the withdrawal of such communication employment (due to the lack of consideration of business and cultural differences that impact business results). Based upon the data provided by NASSCOM (Indian software and services trade association), the conclusions drawn positively indicate that Business offshore processing has an overwhelming potential to grow in the next couple of years; although there is much room needed for consistent business growth (developing businesses, such as BPO in India, must rise at least 30 percent), the progression lies mainly upon the driving increase of skillful and educated information technology workers within India. The stakeholders, Information technology businesses in developed nations, surely stand by their statement supporting the increased use of qualified employers in the business environment of developing nations' companies (considered to also be additional stakeholders), for this will lower the cost involved in the off shoring process. The main social and ethical considerations lie upon reliability of developing nations'
  •  
    My entire post was not posted on diigo, so here is the continuation: business functions, as developed countries' companies increasingly form reliance and trust upon the promise of the elevating skilled labor class, for it is a major component that supports the foundation of software and hardware services and networks on a globally connected basis. The reliability built within the business partnerships and bonds established in two differing cultural environments, is founded upon the agreement of mutual advancement and progress in regards to the establishment of skill by developing nations' employees. Although, the system of globalization and cultural diversity surface the obstacle of continuous intellectual and business development for developing nations, it is the gesture of surpassing cultural and business ideology that will truly trial both stakeholders involved.
Elisavet M

TECHNOLOGY; Companies in Radio Tag Business Broaden Legal Dispute - 0 views

  •  
    Discussion about the agreement to integrate the new process of product tracking in company supply chains (RFID technology), continues to widely expand and challenge the business mentality as it has become reinforced by major companies such as Wal Mart and the Defense Department. A dispute transpired between two alliance companies, Symbol (a leader in bar code systems) and Intermec, as both were unable to consider possessing concurrence upon licensing proposals for RFID technology usefulness. Initially, Intermec Technologies, accused Symbol of infringement transgressions in regards to six Intermec patents that were being sold by Symbol; such products included the utilization of RFID technology, an investment that was supported upon by both business partnerships. Such accusations had been followed after Symbol had also charged Intermec for infringing patents including Wi-Fi technology. The issue of integrity as well as reliability resurfaces in this particular case, directly conveying the disadvantages of business collaboration, that must embed mutuality in justly managing shared information, equality of confidentiality and a clear understanding about each businesses' ideas and plans for profit purposes. It is significant to have fluidity in exchanging perspectives, in order to establish a solid foundation of trust that stands as a promise to future investments and processes.
Madeline Brownstone

TOPIC: Net Neutrality-Issues of censorship or equality of access and the digital divide - 20 views

started by Madeline Brownstone on 21 Oct 10 no follow-up yet
  • Elisavet M
     
    After having read "Military Taps Social Networking Skills" (Rubayeth's post), I came to realize that engaging and connecting through the medium of social networking reveals as an advantageous benefactor; for instance, the youth composing the army, such as lieutenants as well as soldiers, enter the military already knowledgeable about working digital networks and use the skills acquired from prior experiences with the internet to assist the process of important operations. Although the social networking skills come in handy, there is also another rising problem that surfaces: the overall procedure of sending messages through established networks to soldiers on missions, can become misinterpreted or flawed, thus leading to the failure of an operation. I believe the most essential component embedded within this entire process, need to be proper communication via social networking; if the data sent is not received properly, there are high consequences to pay, especially when in the case of controlling and securing people's lives. Although the process of using social networking as a vital military mechanism indicates the beneficial impact of using social networking (skills acquired make humanity "computer literate"), it is the way in which we conduct this system that leads to a pivotal point of success.
Elisavet M

"China defends internet censorship" - 3 views

  •  
    Chinese government refuses to fully admit the extent of internet censorship enforced within the country, expanding beyond the realm of securing internet browsing in order to prevent pornographic sites and other inappropriate or harmful content. Government officials state that political enforcement for internet censorship, does not suppress the human rights of individual expression on the internet. However, many organizations and groups do argue that Chinese efforts to regulate the data being seen is aimed upon preventing perspectives of the public to be heard through the web.
Elisavet M

"Virtual Reality tackles tough questions" - 1 views

  •  
    Scientists in Barcelona have constructed a technological device, enabling users to engage and "live" within a virtual reality; this digital world however, is bound by the oppressive and devastating human conditions experienced by the victimized individuals of physical and verbal maltreatment. The device, although it may conjure ethical realizations within the user's mind, also poses as an ethical dilemma for it brings the cruel severity of the downtrodden and exploited people into visual and mental display terrorizing the emotional stability of the participants.
  •  
    Technological breakthroughs in decoding the human mind have blossomed ever since the invention of a device through which users are immersed within a virtual reality, to live and experience the trauma and distressing scenarios of people victimized by physical as well as emotional abuse. Developed by a team of Spanish scientists, this device is breaking down the mind's irrational judgement in relation to discriminatory or wrongful perceptions against others. The user of the device, once transported into the anguished lives of the virtual characters, comes face to face with the agony of living through abusive violence, and begins to form a clearer impression about the effects of such experiences upon the lifestyle, behavior and well being of any victim. In doing so, the participant ultimately widens the boundaries of his mental state of thought, and begins to appreciate and acknowledge the peace given by a happy life rid of gnawing internal complications. However, in engaging with such a virtual reality the user becomes an unshielded target of bitter misery, felt and illustrated by the depictions seen through the device. The software that is included in this article is the technological device that offers an entrance into the virtual world for the user. The stakeholders within this article are the users of the device, whose mental and emotional stability is controlled by the virtual reality developed by the scientists. The scientists hold the success of the entire experiment in the palm of their hands, and really are the source of the effect upon human behavior. One has to take into consideration the physical and psychological considerations (in "Health" scenario) of technology on the user of this particular device; although this device does help others modify their morality as they expand their considerations for the factors that have made people what they are today. The device however, does inflict the same trauma and terror depicted by the gestures and movements
1 - 10 of 10
Showing 20 items per page