Lesson 7 Flashcards
crucial role of nursing informatics in healthcare, focusing on two key areas:
Human-Technology Interaction (HTI) and Electronic Security
plays a critical role in modern nursing, allowing nurses to interact with various
technologies like Electronic Health Records (EHRs), clinical decision support systems,
and communication tools. Fosters efficient data entry, improves
communication with patients and colleagues, provides access to crucial information,
and assists in clinical decision-making.
Human-Technology Interaction (HTI)
__________ is the interaction between humans and technological systems.
Human Technology Interaction
Difficult to navigate and learn, leading to errors and
frustration.
Complex interfaces:
Large amounts of data can be overwhelming, hindering
efficient care delivery.
Information overload
Disruptions can significantly impact workflow and patient
care.
System downtime
Systems may not be designed with the specific needs of
nurses in mind, leading to inefficiencies.
Usability issues
Design systems that are intuitive and user-friendly
for nurses.
USER-CENTERED DESIGN
Consistent interfaces across different systems
reduce confusion and errors.
STANDARDIZED INTERFACES
Provide comprehensive training on using technology
and ongoing support to address issues.
TRAINING AND SUPPORT
Explore and implement technologies that promote hands-free interaction.
VOICE RECOGNITION AND OTHER ASSISTIVE TECHNOLOGIES
AI-powered systems can
automate routine tasks
and provide real-time
decision support.
Artificial Intelligence:
can collect valuable patient data and monitor health trends.
Wearable Technologies
can be used for training and simulations, enhancing learning and skill development.
Virtual Reality & Augmented Reality
T or F : Ensuring electronic security is not paramount in healthcare
False
Protecting sensitive patient data from unauthorized access, use,
disclosure, disruption, modification, or destruction (HIPAA compliance).
Importance of Security
Various threats can compromise electronic security. Hacking involves malicious
attempts to gain unauthorized access to data or systems. Malware like viruses, worms,
and ransomware can harm systems and steal data. Phishing attacks use deception to
trick users into revealing sensitive information. Insider threats involve individuals with
authorized access using their privileges for malicious purposes. Finally, accidental data
loss can occur due to various factors, highlighting the importance of backups and
recovery plans.
Threats to Security
Malicious attempts to gain unauthorized access to data or systems.
Hacking
Malicious software designed to harm a system, such as viruses, worms, and ransomware.
Malware
Deceptive emails or messages designed to trick users into
revealing sensitive information.
Phishing attacks
Malicious activities by individuals with authorized access to data or
systems.
Insider threats
Unintentional loss of data due to human error, hardware or
software failures, or natural disasters.
Accidental data loss
A type of cryptovirological malware that permanently block access
to the victim’s personal data unless a ransom is paid.
Ransomware
Malicious software that enters a user’s computer, gathers data from the device and user, and sends it to third parties without their consent.
Spyware
The term used for various pop-up advertisements that show up on your computer or mobile device
Adware
A type of malware that can automatically propagate or self-replicate without human interaction, enabling its spread to other computers across a
network.
Worms
A type of malware that downloads onto a computer disguised as a
legitimate program.
Trojan
A group of computers which have been infected by malware and have come under the control of a malicious actor.
Botnets
Transforming data into a scrambled form unreadable without a decryption key.
Encryption
Security systems that control incoming and outgoing network traffic based on defined rules.
Firewalls
Granting access to authorized users and systems based on
specific permissions.
Access Control
Regularly backing up data and having a reliable recovery plan in place.
Data Back-Up and Recovery
Requiring multiple forms of verification, such as passwords, tokens, or biometrics (e.g., fingerprints), to access systems.
Multi-factor Authentication (MFA)
Allows users to access multiple systems with a single login,
reducing the risk of password fatigue and unauthorized access.
Single sign-on (SSO)
TOP 10 Cyber Security Threats for 2030
1.Supply chain compromise of software dependencies
2.Advanced disinformation campaigns
3.Rise of digital surveillance authoritarianism/loss of privacy
4.Human error and exploited legacy systems within cyber-physical ecosystems
5.Targeted attacks enhanced by smart device data
6.Lack of analysis and control of space-based infrastructure and objects
7.Rise of advanced hybrid threats
8.Skills shortage
9.Cross-border ICT service providers as a single point of failure
10.Artificial intelligence abuse
Security Tools and Best Practices
- REGULARLY UPDATE SOFTWARE AND SYSTEMS WITH SECURITY
PATCHES. - IMPLEMENT STRONG PASSWORD POLICIES AND ENFORCE PASSWORD
CHANGES. - EDUCATE AND TRAIN ALL STAFF ON CYBERSECURITY BEST PRACTICES,
INCLUDING RECOGNIZING AND RESPONDING TO PHISHING ATTACKS. - EMPLOY DATA ENCRYPTION AND ACCESS CONTROL MEASURES.
- CONDUCT REGULAR SECURITY AUDITS AND VULNERABILITY
ASSESSMENTS.