Skip to main content

Home/ ITGS News/ Contents contributed and discussions participated by Carmen M

Contents contributed and discussions participated by Carmen M

Carmen M

Telemedicine in wound care. - 1 views

  •  
    After hurricane Karl hit and practically flooded all of Veracruz, Mexico, many people were left wounded. This article talks about three specific patients who had "hard to heal ulcers" or the stakeholders. Along with the patients, the other stakeholders in this case were the specialists reviewing the information sent to them and the people present in the same location as the4 patient. These patients were taken to PEMEX General Hospital in Veracruz. Pictures were taken using digital cameras and were small enough to be sent to through email to specialists in Mexico City. There, they analyzed the high quality pictures and were able to give a diagnostic. An issue could be security since these files are being sent through regular email as clearly stated in the article " small enough to be sent via regular email ". If there isnt a specific network that these health centers are using it might not be delivered without having someone have looked at it before. The IT system(s) in this case were the digital camera used to take pictures of the patients injuries. The computer was also another system as well as cameras used for video conferencing. By having been able use telemedicine, it saved the energy of the patients having to go to another state just to be treated.
Carmen M

Electronic health records work getting done, but questions remain - 1 views

  •  
    Over the past two years, there has been work being done regarding installing EHR across all health cares. Massachussetts is curently the state that is the most advanced regarding electronic health records. In Massachusetts eHealth Institute was the institute designated to work on taking your paper health records and transforming them to digital records that can be accessed at any time and quickly. The main issues presented here were the amount of money being spent on this project and physicians not knowing how to use an electronic health record, or simply refusing to use it. To enforce the use of EHR's, those in charge of this project clearly stated that physicians will face consequences if failure to use EHR's. They will not get paid as much as a physician who is using EHR's. Thus, forcing physicians to train themselves to use these electronic records.
Carmen M

Home Office Data Security: Protect Customer Info - And Your Small Business - 0 views

  •  
    This article talks about Data security regarding information kept in a computer. The stakeholders in this case are the employee and the customer. The IT system is, like previously mentioned, a computer. The issue regarding the system is reliability. If you have a customers information such as credit card numbers and other personal data, then security and reliability definitely come up as an issue. Computers are prone to get viruses which could wipe out all the information stored on your hardrive. Hackers and other spyware can also be another concern. Your customer is trusting you with their information. The article also proposes a solution. The solution would be to have two separate computers, one for personal uses and the other for work. That way, eliminating visiting websites that might have viruses.
Carmen M

'Offshoring' advice upsets firms - 1 views

  •  
    This short article talks about how leaders of the chamber commerce (An association of businesspersons and merchants for the promotion of commercial interests in the community)(answers.com) has recommended businesses in the UK to engage in offshoring, meaning taking their businesses outside. However, some greatly resented this and stated that it was "betraying" and "killing british skills"(Luckock). Members of the chamber commerce said that this could expand the business, and make it more competitive. The primary stakeholders in this case would be, the business owners, memebers of the chamber commerce, and the people that would be given the jobs due to offshoring. This is directly connected to business and employment. The companies owned by the men that dont want to go "offshore" are the business, while employment would be all the jobs that would be offered to those who need it if only the owners would agree to it. Lastly, while it does not say what IT would be used, it wont be technology that would be very complex. Especially, if you're sending these jobs offshore to certain countries whose people might not be exposed to all the technology that we have.
Carmen M

RFID security, data protection and privacy, health and safety issues - 0 views

  •  
    This was a rather long but interesting article to read regarding RFID. It starts out by stating what RFID is and how it is being planned on being introduced across many stores. What made this article informative was that it discussed not only the first thing that comes to mind when we hear this, privacy and security, but also possible health and environmental issues. Security was a big issue discussed. Concerns that came up was who would manage the information picked up by RFID's? Can this be used to track people? Can personal items or documents integrated with RFID track a specific person? Would they know? To what extent does this violate privacy? Are there laws to prevent any form of privacy violation? The article also stated people might have a choice whether or not to use the RFID and what would be the other option. Another issue stated was a health issue. Since this uses radio frequency waves, can this pose any damage to lets say tissue cells? The hypothesis was that no because it uses different kinds of waves than other technologies. However, this technology is too early in its stage to know for sure. Another concern was the disposal of this technology. What effect would it have on the environment. Again, it was too early to determine for sure.
Madeline Brownstone

TOPIC: Net Neutrality-Issues of censorship or equality of access and the digital divide - 20 views

started by Madeline Brownstone on 21 Oct 10 no follow-up yet
  • Carmen M
     
    I read Elisavet's post on censorship of China. The article said how censorship originally started out with the intention to block pornography and other "harmful" sites. However, many critics claim that this was just an excuse and that the real reason for censorship was because the ruling political party wanted to maintain its authority over society. Liu, the person that was interviewed and is in charge of internet affairs, claims that the U.S does something similar with the NY Times. Like Noreen stated "information has always been on our finger tips", and we haven't faced serious censorship problems like other countries have. For the most part we are able to obtain information about anything.
Carmen M

Facebook fraud a 'major issue' | Technology | guardian.co.uk - 6 views

  •  
    People's face book accounts are being hacked by others alarming all the users about their security.
  •  
    This article meets the requirements for ITGS. This article talked about how face book accounts were being hacked by others and not just for the fun of it but fraud has arisen from this. One hacker signed onto a students account telling her friends that "she was "stranded" in another country"(Halliday), and needed large amounts of money. The stakeholders in this case are all 500 million users of face book, because they may be at risk of getting hacked. Social and ethical issues that have come up due to the hackings are Surveillance, Security, and people and machines. I think surveillance is definitely one because now that the owners or the ones in charge of facebook are aware of the issue, they will set up programs that will detect any unusual activity from the users. People will be informed where their account is being accessed from and if there is any suspicious activity. Security was definitely an issue because now hackers are using the identities of others to obtain what they want. People and machines is another social ethical issue. While the owner of an account might not be at risk physically, or at risk at all, the person friends may be. They would be attacked by asking them to give money, obtain secret information about the user, or simply cyber bullied. If anything this probably ties into business, although its not legal business, but there is one person making money.
1 - 7 of 7
Showing 20 items per page