Human Technology Interface Flashcards

1
Q

plays a critical role in modern nursing, allowing nurses to interact with various technologies like Electronic Health Records (EHRs), clinical decision support systems, and communication tools.

A

HTI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is the interaction between humans and technological systems

A

HTI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

benefits of HTI

A

Efficient data entry, improved communication, access to information, decision-making support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Problems of HTI in Nursing

A

Complex interfaces
Information overload
System downtime
Usability issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Difficult to navigate and learn, leading to errors and frustration.

A

Complex interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Large amounts of data can be overwhelming, hindering efficient care delivery

A

Information overload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Disruptions can significantly impact workflow and patient care.

A

System downtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Systems may not be designed with the specific needs of nurses in mind, leading to inefficiencies.

A

Usability issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Improving HTI in Nursing

A

USER-CENTERED DESIGN
STANDARDIZED INTERFACES
TRAINING AND SUPPORT
VOICE RECOGNITION AND OTHER ASSISTIVE TECHNOLOGIES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Design systems that are intuitive and user-friendly for nurses.

A

USER-CENTERED DESIGN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Consistent interfaces across different systems reduce confusion and errors.

A

STANDARDIZED INTERFACES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Provide comprehensive training on using technology and ongoing support to address issues

A

TRAINING AND SUPPORT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explore and implement technologies that promote hands-free interaction.

A

VOICE RECOGNITION AND OTHER ASSISTIVE TECHNOLOGIES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

can automate routine tasks and provide real-time decision support.

A

Artificial Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

can collect valuable patient data and monitor health trends.

A

Wearable Technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

can be used for training and simulations, enhancing learning and skill development.

A

Virtual Reality & Augmented Reality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Importance of Security:

A

Protecting sensitive patient data from unauthorized access, use, disclosure, disruption, modification, or destruction (HIPAA compliance).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Threats to Security

A

Hacking, malware, phishing attacks, insider threats, accidental data loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Malicious attempts to gain unauthorized access to data or systems.

20
Q

Malicious software designed to harm a system, such as viruses, worms, and ransomware.

21
Q

Deceptive emails or messages designed to trick users into revealing sensitive information.

A

Phishing attacks

22
Q

Unintentional loss of data due to human error, hardware or software failures, or natural disasters.

A

Accidental data loss

23
Q

Malicious activities by individuals with authorized access to data or systems.

A

Insider threats

24
Q

Types of Malware

A

Ransomware
Spyware
Adware
Worms
Trojan
Botnets

25
Q

a type of cryptovirological malware that permanently block access to the victim’s personal data unless a ransom is paid.

A

Ransomware

26
Q

malicious software that enters a user’s computer, gathers data from the device and user, and sends it to third parties without their consent.

27
Q

the term used for various pop-up advertisements that show up on your computer or mobile device

28
Q

a type of malware that can automatically propagate or self-replicate without human interaction, enabling its spread to other computers across a network

29
Q

a type of malware that downloads onto a computer disguised as a legitimate program

30
Q

a group of computers which have been infected by malware and have come under the control of a malicious actor.

31
Q

scrambles data, making it unreadable without a decryption key

A

Encryption

32
Q

act as gatekeepers, controlling network traffic and preventing unauthorized access.

33
Q

restricts access to data and systems based on specific permissions for each user and system

A

Access control

34
Q

Data Back-Up and Recover

A

ensures data can be restored in case of any incident

35
Q

Transforming data into a scrambled form unreadable without a decryption key.

A

Encryption

36
Q

Security systems that control incoming and outgoing network traffic based on defined rules.

37
Q

Granting access to authorized users and systems based on specific permissions

A

Access Control

38
Q

Regularly backing up data and having a reliable recovery plan in place.

A

Data Back-Up and Recovery

39
Q

is crucial for ensuring data security

A

Verifying user identity

40
Q

utilizes various methods, like passwords and biometrics, to confirm user identity before granting access.

A

Multi-factor authentication (MFA)

41
Q

allows users to access multiple systems with one login, reducing the risk of relying on weak passwords or forgetting login credentials.

A

Single sign-on (SSO)

42
Q

Requiring multiple forms of verification, such as passwords, tokens, or biometrics (e.g., fingerprints), to access systems.

A

Multi-factor Authentication (MFA)

43
Q

Allows users to access multiple systems with a single login, reducing the risk of password fatigue and unauthorized access.

A

Single sign-on (SSO)

44
Q

TOP 10 Cyber Security Threats for 2030

A

1.Supply chain compromise of software dependencies
2.Advanced disinformation campaigns
3.Rise of digital surveillance authoritarianism/loss of privacy
4.Human error and exploited legacy systems within cyber-physical ecosystems
5.Targeted attacks enhanced by smart device data
6.Lack of analysis and control of space-based infrastructure and objects
7.Rise of advanced hybrid threats
8.Skills shortage
9.Cross-border ICT service providers as a single point of failure
10.Artificial intelligence abuse

45
Q

Security Tools and Best Practices

A
  1. REGULARLY UPDATE SOFTWARE AND SYSTEMS WITH SECURITY PATCHES.
  2. IMPLEMENT STRONG PASSWORD POLICIES AND ENFORCE PASSWORD CHANGES.
  3. EDUCATE AND TRAIN ALL STAFF ON CYBERSECURITY BEST PRACTICES, INCLUDING RECOGNIZING AND RESPONDING TO PHISHING ATTACKS.
  4. EMPLOY DATA ENCRYPTION AND ACCESS CONTROL MEASURES.
  5. CONDUCT REGULAR SECURITY AUDITS AND VULNERABILITY ASSESSMENTS.