Lesson 7 Flashcards

1
Q

crucial role of nursing informatics in healthcare, focusing on two key areas:

A

Human-Technology Interaction (HTI) and Electronic Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

plays a critical role in modern nursing, allowing nurses to interact with various
technologies like Electronic Health Records (EHRs), clinical decision support systems,
and communication tools. Fosters efficient data entry, improves
communication with patients and colleagues, provides access to crucial information,
and assists in clinical decision-making.

A

Human-Technology Interaction (HTI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

__________ is the interaction between humans and technological systems.

A

Human Technology Interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Difficult to navigate and learn, leading to errors and
frustration.

A

Complex interfaces:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Large amounts of data can be overwhelming, hindering
efficient care delivery.

A

Information overload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Disruptions can significantly impact workflow and patient
care.

A

System downtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Systems may not be designed with the specific needs of
nurses in mind, leading to inefficiencies.

A

Usability issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Design systems that are intuitive and user-friendly
for nurses.

A

USER-CENTERED DESIGN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Consistent interfaces across different systems
reduce confusion and errors.

A

STANDARDIZED INTERFACES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Provide comprehensive training on using technology
and ongoing support to address issues.

A

TRAINING AND SUPPORT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explore and implement technologies that promote hands-free interaction.

A

VOICE RECOGNITION AND OTHER ASSISTIVE TECHNOLOGIES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AI-powered systems can
automate routine tasks
and provide real-time
decision support.

A

Artificial Intelligence:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

can collect valuable patient data and monitor health trends.

A

Wearable Technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

can be used for training and simulations, enhancing learning and skill development.

A

Virtual Reality & Augmented Reality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

T or F : Ensuring electronic security is not paramount in healthcare

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Protecting sensitive patient data from unauthorized access, use,
disclosure, disruption, modification, or destruction (HIPAA compliance).

A

Importance of Security

17
Q

Various threats can compromise electronic security. Hacking involves malicious
attempts to gain unauthorized access to data or systems. Malware like viruses, worms,
and ransomware can harm systems and steal data. Phishing attacks use deception to
trick users into revealing sensitive information. Insider threats involve individuals with
authorized access using their privileges for malicious purposes. Finally, accidental data
loss can occur due to various factors, highlighting the importance of backups and
recovery plans.

A

Threats to Security

18
Q

Malicious attempts to gain unauthorized access to data or systems.

19
Q

Malicious software designed to harm a system, such as viruses, worms, and ransomware.

20
Q

Deceptive emails or messages designed to trick users into
revealing sensitive information.

A

Phishing attacks

21
Q

Malicious activities by individuals with authorized access to data or
systems.

A

Insider threats

22
Q

Unintentional loss of data due to human error, hardware or
software failures, or natural disasters.

A

Accidental data loss

23
Q

A type of cryptovirological malware that permanently block access
to the victim’s personal data unless a ransom is paid.

A

Ransomware

24
Q

Malicious software that enters a user’s computer, gathers data from the device and user, and sends it to third parties without their consent.

25
Q

The term used for various pop-up advertisements that show up on your computer or mobile device

26
Q

A type of malware that can automatically propagate or self-replicate without human interaction, enabling its spread to other computers across a
network.

27
Q

A type of malware that downloads onto a computer disguised as a
legitimate program.

28
Q

A group of computers which have been infected by malware and have come under the control of a malicious actor.

29
Q

Transforming data into a scrambled form unreadable without a decryption key.

A

Encryption

30
Q

Security systems that control incoming and outgoing network traffic based on defined rules.

31
Q

Granting access to authorized users and systems based on
specific permissions.

A

Access Control

32
Q

Regularly backing up data and having a reliable recovery plan in place.

A

Data Back-Up and Recovery

33
Q

Requiring multiple forms of verification, such as passwords, tokens, or biometrics (e.g., fingerprints), to access systems.

A

Multi-factor Authentication (MFA)

34
Q

Allows users to access multiple systems with a single login,
reducing the risk of password fatigue and unauthorized access.

A

Single sign-on (SSO)

35
Q

TOP 10 Cyber Security Threats for 2030

A

1.Supply chain compromise of software dependencies
2.Advanced disinformation campaigns
3.Rise of digital surveillance authoritarianism/loss of privacy
4.Human error and exploited legacy systems within cyber-physical ecosystems
5.Targeted attacks enhanced by smart device data
6.Lack of analysis and control of space-based infrastructure and objects
7.Rise of advanced hybrid threats
8.Skills shortage
9.Cross-border ICT service providers as a single point of failure
10.Artificial intelligence abuse

36
Q

Security Tools and Best Practices

A
  1. REGULARLY UPDATE SOFTWARE AND SYSTEMS WITH SECURITY
    PATCHES.
  2. IMPLEMENT STRONG PASSWORD POLICIES AND ENFORCE PASSWORD
    CHANGES.
  3. EDUCATE AND TRAIN ALL STAFF ON CYBERSECURITY BEST PRACTICES,
    INCLUDING RECOGNIZING AND RESPONDING TO PHISHING ATTACKS.
  4. EMPLOY DATA ENCRYPTION AND ACCESS CONTROL MEASURES.
  5. CONDUCT REGULAR SECURITY AUDITS AND VULNERABILITY
    ASSESSMENTS.