Skip to main content

Home/ Groups/ ITGS News
nicholas n

U.S. Tries Open-Source Model for Health Data Systems - NYTimes.com - 1 views

  •  
    This article is about the idea of putting all existing medical records into electronic form. This would cut the costs needed for storage of such information, this would also increase how fast a medical official can access the records of a sick patient. However, as listed in Strand 1, there are many positive and negative social/ethical issues. One such issue is security. By making the records digitized and put into the hospital database, people without the proper authorization would not be able to gain access to the data. This can also coincide with authenticity. The information that relates to the patient should be accessible by the patient. The patient would need to be able to get through the encryption of the data. Another social/ethical issue would be the equality of access, this would allow only certain people the ability to look at the data. Even with these positive social/ethical issues there are some negative issue. One negative issue would be integrity. There are people who can hack the encryption of this data and tamper with it. This would cause the data to be different in other places and a breach in security. This would be a great help to organizing data. Using a paper file system, the doctor would have to go through a lot of papers and cabinets to find the patient's medical history. By using a paper file cabinet documents are more likely to go missing or get mixed up with another patient's records. However, by using a database this data is much more organized. There is a smaller chance of losing the patient's data, by using back-ups the data could be easily restored. There is also a much smaller change or mixing up multiple patient's data. If the wrong data was use for the wrong person, the person may not have the correct medical treatment they need. With databases the information is much more organized. The patient's data can be found very fast, compared to a paper file system (this could take more than an hour depending on the amount of patients).
  •  
    Continued...The hardware involved with creating databases in the health industry would be a DBMS Engine. This is also known as a Database Managing System. This takes the logical request from DBMS subsystems and converts them to physical equivalents. This also requires interactive processing. This replaces batch processing. This allows users to interact with data through terminals and view values online in real time. By having real time the doctors can give the patients what they need at the moment the patient needs it. The stakeholders in this specific case would be the hospitals adapting the database managing system and the patients whose information is stored in this database. If the database is tampered and there are not back-ups the patient would not have his/her medical history. This could cause the patient to be on a delay for an operation that is extremely important to their life. This could also place a lawsuit on the hospital.
Noreen C

U.S. Tries Open-Source Model for Health Data Systems - NYTimes.com - 1 views

  • easily and securely share information
  • A fancy electronic patient record, unconnected, is just an expensive way to capture data.
  • Getting many different health care providers and suppliers of specialized software to agree on how to do that is no simple task.
  • ...2 more annotations...
  • The solution the group agreed to is essentially Internet-based e-mail and public key encryption technology, tailored for health care.
  • For health care technology companies, the data-sharing standards, experts say, should stimulate the market for electronic health records and allow them to focus their efforts on making their individual offerings more affordable and easier to use.
  •  
    This article is primarily about setting standards and protocols so that an electronic health records could world easily and securely for many health care providers and suppliers. The reason the introduction of an EHR hasn't worked before, is that there were no data-sharing standards, which would ensure that the data is transmitted securely across the internet. These standards are also in accordance of many of the interests of all of the health providers and stakeholders involved, which was a major problem previously. Without the issue of connecting the EHR from provider to provider, then the records would be a "fancy...way to capture data," and it's full potential would never be recognized. However, these new standards and protocols, filled with secure transactions based on encryptions, have made the introduction of an electronic health record possible. There are many benefits to the use of an EHR, including productivity and financial improvement for the companies and the employees. For example, doctors/nurses no longer need to spend time pulling a patient's file, or writing the details of the visit afterwards. There are also fewer repetitive tasks, and improved communication between doctor and nurse, or doctor and another doctor. Quality of care may also improve because doctors have quick access to a patient's information, there is better monitoring and discovery of chronic illnesses, and doctors can return phone calls/ provide medication refills immediately. Also, in general, the electronic charts allow for a more efficient office, which leads to a less stressful environment and more attention on the patients' care rather than searching for their charts. This can only be done through the introduction of an EHR, leading to easier queries, instant reorganization, and file management that could be transmitted to both the patient and any other doctors. This minimizes the ambiguity of not having tests results from one doctor, and allows all doctors treating a p
  •  
    patient to see all of the patient's history. This is important in having a correct diagnosis and treatment. However, there are also some drawbacks. Initially, doctors who chose to engage in the implementation of a EHR, see some decreases in productivity. This is because entering information and learning how to use the software takes some time. Some doctors also do not have the money to invest in such software and accompanying hardware to, and others no not want to because they are accustomed to their hand-written charts. There are also some security issues, leading to greater privacy issues. The EHR maintains very personal data about a patient, and if the records are breached, then the privacy of the patient may be put at risk. There is also the issue of interoperability, which was brought up in the article. Many of the companies in different countries wishing to engage in the implementation of EHR have different standards involving the usage. This could harm the usage of an international EHR.
Carmen M

Electronic health records work getting done, but questions remain - 1 views

  •  
    Over the past two years, there has been work being done regarding installing EHR across all health cares. Massachussetts is curently the state that is the most advanced regarding electronic health records. In Massachusetts eHealth Institute was the institute designated to work on taking your paper health records and transforming them to digital records that can be accessed at any time and quickly. The main issues presented here were the amount of money being spent on this project and physicians not knowing how to use an electronic health record, or simply refusing to use it. To enforce the use of EHR's, those in charge of this project clearly stated that physicians will face consequences if failure to use EHR's. They will not get paid as much as a physician who is using EHR's. Thus, forcing physicians to train themselves to use these electronic records.
Yuval S

New rules issued on electronic health records - 1 views

  •  
    This news article talks about the new rules that are focused around EHR. The situation is that despite the push toward "electronic health records by Washington, the transition toward EHR still has a long way to go." Last year, the American Medical Association estimated that there were over 800,000 physicians in the U.S., said Practice Fusion, which offers a free Web-based system to doctors. But only 6.3 percent of them said they had a fully functional electronic medical records system in place. There was and attempt to resolve this by these rules. The government is hoping to clarify the conditions under which doctors and hospitals can collect payments by investing in electronic health records, or EHR, for the next few years. Calling the rules a "significant milestone," General Electric said they include important changes that make the objectives for incentive payments more realistic for medical providers. The exact rules that are going into place are: "One of the rules, issued by the Centers for Medicare & Medicaid Services, defines the "meaningful use" objectives that medical professionals must meet to qualify for the payments. The goal of this rule is to provide greater flexibility by offering a menu of different objectives and procedures that providers can choose from to qualify. The other rule, issued by the Office of the National Coordinator for Health Information Technology, defines the standards that must be met by EHR technology so medical providers are confident that the equipment they use will actually perform all the required functions."
Alex F

Can Barack Obama ensure all Americans have electronic health records by 2014? | Society... - 0 views

  • Personal health records are a concept enabling customers to gather their information from different providers (perhaps their primary and secondary care providers, for example) and store them in one place.
    • Alex F
       
      this is how health records are used, and how useful they would be when customers go to different providers and that way information can be passed on.
  • Portability and Accountability Act of 1996 which is meant to govern the security and privacy of EHRs.
    • Alex F
       
      this is historical information
  • Privacy
    • Alex F
       
      issue/ concern
  • ...5 more annotations...
  • health information exchanges, and the DHHS has already commissioned 15 contractors to work on trial implementations of prototype architectures.
  • 2007, according to research from George Washington University, 20-25% of outpatients were being served by some form of electronic health records (EHR) in the US
  • "meaningful use": the practical deployment of these records for e-prescribing, laboratory exchange and quality measurement
  • The American Medical Association says it is fully behind Connecting for Health.
  • Google and Microsoft have also endorsed Connecting for Health, a consortium that provided one of the original prototype architectures for the NHIE (and unconnected to the NHS IT organisation of the same name).
Elisavet M

Tomorrow's Technology and You - 0 views

  •  
    The website enables the reader to look over an extensive amount of the significant content found in chapter 13, E-commerce within the textbook, Tomorrow's Technology and You.
Madeline Brownstone

YouTube - How to Make Custom Overlays for IntelliKeys USB - 0 views

  •  
    Many useful videos on assistive devices for using IT 
Joel Lubi

Google Extends Security Reward Program - 0 views

  •  
    The article is about an interesting method that Google is using to improve its security over time. Hackers (Crackers) are often despised by many online businesses and cause major problems. However, Google has managed to turn the problem into a solution by offering rewards to hackers who are able to exploit the system and report the exploits to Google. With the given information, Google can improve its services to be more secure. Specifically, this article notes the success of the solution and Google's intentions of expanding the program to its web services. This is an ideal solution because all stakeholders benefit. Hackers are paid, Google can improve its services, and users can feel more secure about using Google's services.
Mohammad A

"1986 Privacy Law Is Outrun by the Web" - 0 views

  •  
    This article is about privacy issues within the Internet. As web services have improved, aspects such as spreadsheets, e-mail services and photography applications, the topic of privacy has now been "removed". The internet has been the leading factor in many issues with privacy. One of the main examples mentioned is the site WikiLeaks, which is entirely based upon a hacker who exposes the truth about everything and anything. Julian Assange is one of the leading activists who promotes free speech within the world to expose privacy. The IT system involved within this scenario is basically the data transfer through networks and servers online. The people who are being affected by this issue are those who's personal information is leaked (in any way, whether through WikiLeaks due to a political scandal or through hackers obtaining their information). Thus certain security measures are to be taken to prevent unwelcome access to personal and private information. For example, encryption is now one of the most famous and useful methods of preventing hackers from entering databases and other online servers. An encryption key allows for the safe keeping of personal information.
Yuval S

NAEA Deployed CipherOptics Advanced IPSec Network Encryption Solution - 0 views

  •  
    Cipheroptics give data security and network encryption solutions to security enterprises, financial institutions, health care, and government agencies. NAEA (North American Energy Alliance) utilized Cipheropitics to protect their data, using encryption. Dominick Birolin, the network engineer for NAEA, states that the company was "looking for a solution that could protect our critical cyber assets and meet our unique deployment requirements when we found CipherOptics." They chose this over others because CipherOptics offers security solutions for high performance networks. In addition to that, "the company's wire-speed encryption appliances are able to secure any network without changing the underlying infrastructure or application performance." Encryption works: initially by the business putting the sensitive data in plaintext. Plaintext is the normal, readable digital text. The business, using Cipheroptics, then converts the text into ciphertext. This text is made in a way that it can only be read by someone who has the key to put it back into plaintext and make it readable. The business holds the private key, which enables them to encrypt, and keep private, the data while still managing to access it when necessary.
Ram Bhadra

A TV-Internet Marriage Awaits Blessings of All Parties - 0 views

  •  
    This article speaks about the merger of internet tv(Google TV) and cable companies. The internet TVs work on the basis of an Ethernet connection or a built-in wifi card. It then communicates with the router and connects the television to the internet. This gives the internet the capability to run apps such as Youtube, Netflix, Flickr, Yahoo and so on. These apps are either programed in the television by default or can be downloaded by the app store that the manufacturer of the television has available. In this the television communicates with the home/work network which sends signals to the service provider's center which then sends signals to the satellites which help transmit data from the internet to the television. The reason it would be important for network providers to make services available for the sole purpose of these televisions is that then the cable providers can give their subscribers a wider range of channels and other viewing options since it can then collect data from all its centers around the world and send it the television.
Saida K

How to make sure your smartphone payments are secure - 0 views

  •  
    This news article specifies the considerations of using a cellphone to make secure payments. In order to make secure transactions using one's cellphone, a certain procedure must take place. Of course, the mobile phone must have access to the internet, and will go to any website of their choice in which they find something they want to buy, or to simply pay a bill. Also, this can be done using an "application" such as PayPal. PayPal is technically more secure considering that a consumer would only have to write they're credit card information in one place. But with so many people using it, it becomes easier for hackers to access this data, especially with vast quantities of money in the savings. Afterwards, no matter which way you started a transaction, encryptions are always used to transform the that so that only the consumer and business company can read the transaction with the decryption. One possible stakeholder is the consumer whom is indeed effected by making payments using their mobile devices. It's only been recently that they began trusting the internet using a computer, but using the internet via cellphone is a new change that must take time to adjust to. But they are effected since hackers can easily take their money. Plus a third party, can occur during the process of the transaction while the consumer is using another window, and might not notice that they're information is not only going to the business itself. These are all issues of security.
Carmen M

Home Office Data Security: Protect Customer Info - And Your Small Business - 0 views

  •  
    This article talks about Data security regarding information kept in a computer. The stakeholders in this case are the employee and the customer. The IT system is, like previously mentioned, a computer. The issue regarding the system is reliability. If you have a customers information such as credit card numbers and other personal data, then security and reliability definitely come up as an issue. Computers are prone to get viruses which could wipe out all the information stored on your hardrive. Hackers and other spyware can also be another concern. Your customer is trusting you with their information. The article also proposes a solution. The solution would be to have two separate computers, one for personal uses and the other for work. That way, eliminating visiting websites that might have viruses.
Mariam B

Cisco Security Exec Cheers on Android's Security Flaws - 0 views

  •  
    This article discusses the security flaw that is present in the current mobile device, Android. The Android is easily able to download applications onto the phone, however certain applications may contain Trojan horses and other malicious malware. This impacts businesses and employment because large companies allow their employees to use the Android during work in order to record, send and transmit important information. However with lack of security, certain applications may have the ability to leak sensitive and private company information to others. This impacts the stakeholders: which includes the company whose information is being leaked and the employee that is using the device to store their data and send files to one another. Due to the lack of security that is enabled on the applications and the phone, certain applications make it harmful to store private company data. This becomes an issue of security because the applications are not secure and therefore the phone cannot be used for business purposes because the lack of security causes a threat on privacy as well. Solutions to this are a closed application approval process which is what apple does with its application- each one is viewed in order to see if it is secure. This step should be taken with the applications that are on the Android as well in order to make it more secure.
Ariel A

Skype security and privacy concerns - 1 views

  •  
    Skype is a software that enables online free instant messaging, video chatting and voice calling to anyone else that has Skype. Skype is a great resource for world conversations. The issue that Skype has are both security and privacy reasons. Skype is currently in the hands of ebay. Ebay is a well known site that allows people to buy items online and it some what reliable. The information that one would need to register in order to be a member of ebay and now Skype, one would need to place information stating, "Full name, User ID, Email address, Street address, State, City, ZIP code, Phone number, Country, Company, Password, Secondary phone number, Gender, Shipping information (including name, street address, city, state, ZIP), Bidding history on an item, Items for sale, Feedback left about the user, Bidding history, Prices paid for items, Feedback rating, Chat room and bulletin board posts" According to Ms.Brownstone in order for someone to find the identify of someone's personal information one would need the date of birth, and Zip code. What Ebay requires one to give out information is far more than what is necessary. One would question if they are really that reliable of a site. Skype claims that its reliable but we have to verification of evidence that it is indeed reliable. The security reasons behind Skype is that according to what i read, "Skype is an insistently closed program." This can affect the stakeholders which are the users of Skype to know if its a really secure website.
Rubayeth M

Data Security Is No Long an Option - 0 views

  •  
    - In this article, "Data Security Is No Longer an Option," written by Eve Tahmincioglu is stating that the issues that concern Groogle. Groogle is a company which is a small online travel site that can supply the same to others from this site. (Scott Larsen, IT Director for the company, Groogle.) Jon Clay (product marketing manager for Trend Micro) will help get Tokyo based security software that will help this small business result in to a faster growing business. They will require a set of requirements that will be met by 95%. The upgrades made by the security measures have increased sales. Looking on from other companies, they have seen what is known as the virtual private network which sends encrypted data one location to the other without others looking at it. This is possible because of the firewalls and he spyware filtering programs that help keep out unknown individuals. At the end they came down to a decision that says they will upgrade to an intrusion detecting system that will cost around $25,000 to $125,000. Even though they will be enhancing their system there will be one problem which is the idea of making the computer adapt to the changes.
Michael M

Video of purported PlayStation Phone hits Web | The Digital Home - CNET News - 0 views

  •  
    There is supposedly a new telephone that supports the Sony game playing experience coming out, running under the Android OS, found under the website Cnet.com. The main stakeholders here are those who look forward to a gaming telephone, so basically it can run from kids to adults that look for a phone with all this phones capabilities. This development will change the life of gamers who can now take a system that can work as a psp and a phone at the same, and also an mp3 player, picture taker, and other big upgrades to the psp, play station portable. The biggest impact is the development of a new Android phone. This phone combines game play and a cell phone all in one, and the quality of game play is much higher than all phones that have come out so far, which begs questions to be asked, will the phone, which runs under Android, have problems with battery time? Will it be able to have such good game play and be able to function as a fully functional phone, without lag time? If this phone fully functions as a gaming system and a phone, then there will definitely be success to the Android Company, and Sony as well, these two companies will thrive from the money that they will make. Since the phone functions as a computer, its processor is required to be high, especially since it will be playing video games, and the RAM must also be high. The processor and RAM, or random access memory, both define the speed and capability of this cell phone/gaming system. It all comes down to the specs and the scrutiny of the stakeholders, those who will be using this cell phone
  •  
    I liked my own work XD
nicholas n

BlackBerry denies India email access deal as struggle continues | Technology | guardian... - 0 views

  •  
    This is a news report that RIM(research in motion ) I denying claims that India is now able to access the messages that many send through RIM secure network. This access includes company messages. However RIM refutes these claims and states they don't have access to any of this information. This is one part of a greater story India's government is not the only government that had problems with RIM due to lack of equality of service and the fact that RIM has the best encryption on their messages. There are many stakeholders such as RIM who are running a business that desires to make a profit and realize on their reputation on security, any company that uses blackberry service. The government that wants to have access to the messages to protect their national security, and finally the average consumer that loves using blackberry for their everyday lives. for the primary stakeholder which is RIM social and ethical issues are security, and reliability and integrity. Security refers to the protection of the blackberries encrypted network. The reliability and security concerns RIM's reputation for their secure networks. the primary scenario in this case is business and employment from various points of view, and the IT system is the blackberry cell phones.
« First ‹ Previous 81 - 100 of 570 Next › Last »
Showing 20 items per page