You are on page 1of 27

NCM 110: INFORMATICS NURSING

MANAGEMENT

KARITSAKESIAH A. ARCEO,UKRN, HAAD RN/SN, RN


Course Instructor
Nursing Informatics
Agenda: Objectives
❖ The Internet, World Wide Web,
Internet Terms and Protocols At the end of the discussion, the students
➢ Intranet, Extranet, Virtual Private will be able to:
Networks ❖ Discuss the different Internet
➢ Internet Search Engines, Web terminologies
Browsers ❖ Discuss professional nursing use of
email in the workplace and the
❖ Social and Professional Networking differences between social and
professional networking.
❖ Class Presentation Requirements ❖ Discuss how to use social media
safely.
Networks
➔ Refers to the connection of two or more
computers, which allows the computers
to communicate.

Networking has progressed to the point


where not only computers in an
organization are connected to each
other but also institutions are connected
to a worldwide network known as the
Internet.

★ The Internet is, as its last three letters indicate, a network.


INTERNET
★ A vast network that connects computers all
over the world.

★ People can share information and


communicate from anywhere with an Internet
connection.

★ Works through a series of networks that connect devices around the world
through telephone lines.

★ Users are provided access to the Internet by Internet service providers.

★ The widespread use of mobile broadband and Wi-Fi in the 21st century has
allowed this connection to be wireless.
Healthcare depends on communication
❖ Communication between the nurse and the
patient. How do you think is
❖ Communication about organizational issues
❖ Communication with the public. the internet being
used in the healthcare
setting?
Network Connection essentials
❖ LAN or local area network is a network confined
to a small area such as a building or groups of
buildings.
❖ MAN or metropolitan area
network is a network that
encompasses a city or town

❖ CAN or campus area network is a network that


encompasses a defined geographic area, such as
a college campus.
❖ WAN or wide area network is a network
that encompasses a large geographical
area.
types of networks for Internet use
❖ Intranet
❖ Extranet
❖ Virtual Private Network (VPN)

Intranet
➔ a private network within an organization,
which allows users of an organization to
share information.

➔ it may include features similar to the


Internet, such as e-mail, mailing lists, and
user groups.
types of networks for Internet use
Extranet
➔ is an extension of an intranet with
added security features.

➔ it provides accessibility to the intranet


to a specific group of outsiders, often
business partners.

➔ Access requires a valid user- name


and password.
types of networks for Internet use
Virtual Private Network (VPN) ➔ They can also be used for patient
➔ allows an organization to communicate
confidentially.
portals or places where patients
can renew prescriptions, make
➔ is an intranet with an extra layer of appointments, and send
security that operates as an extranet. messages.
➔ provides access to patient data to
authorized users who are not physically
present in the healthcare setting such as
allowing a physician or nurse practitioner
at home to see a patient's electronic
health record (EHR).
Internet Protocol (IP) ADDRESS
❖ To make it possible for each
computer on the Internet to be
electronically located, each has an
IP address, even the one you use to
connect to the Internet at home.

❖ There are four sets of numbers


separated by periods or dots in an ❖ Each set of numbers can
IP address (Figure 3-4). range from 0 to 255.
The World Wide Web
❖ This organization "tries to
❖ The World Wide Web is a network
enforce compatibility and
within the Internet that allows
agreement among industry
hypertext documents to be
members in the adoption of new
accessed using software known as
standards defined by the W3C.
a web browser.

❖ The web is "governed" and


maintained by the World Wide
Web Consortium (W3C).
Web Browsers
❖ A tool enabling users to
retrieve and display files
from the Internet.
Universal Resource Locator (URL)
❖ All web documents have a URL (pronounced
"Earl").

❖ The URL usually begins with http or https.

❖ A final "s" in a website's URL beginning letters


(https:/) indicates the website is secure.
Online Security
❖ A perceptive user can prevent most security
issues.

What happens when there is an online security issue in the hospital?

❖ Computer Malware
➢ Botnet, Phishing and
Pharming,
Computer Viruses, Adware and
Spyware
Computer Malware
❖ Refers to all forms of computer software
designed by criminals, specifically to
damage or disrupt a computer system,
often for a profit.

❖ The criminals use two techniques


for the malware attacks:
➢ Social engineering
➢ Drive-by- download
Social Engineering Drive-by Download
❖ Tricks the victims into downloading and ❖ Drive-by-download occurs when the
installing malware. web page design includes the malware.

For example: For example:


Receiving an e-mail message asking you to
Opening the web page triggers the
view a video or an "alert" that your video
software is out of date with instructions to
download and installation of the
click to update. malware.
The false "video update" click installs the It is possible for malware to hide in
malware. advertisements of reputable
websites
Botnet
❖ Also known as “zombie army” is a
growing malware threat.

It is a group of computers connected to


the Internet that, unbeknownst to their
owners, have software installed on their
computers to forward items such as
spam or viruses to other Internet
computers.
Phishing and Pharming ❖ Are older forms of web scams, and both
try to get an individual to reveal
personal information such as a bank
Phishing account number or a social security
number.
➔ the victim received an e-mail
message with a web address
hyperlink in it.
➔ with instructions to go to this website
to confirm an account or perform
some other task that will involve
revealing personal information.

Although the hyperlink text in the message


looks authentic, clicking it will take a user to
a website that is not the one seen in the URL
in the message, although it may be a mirror
image of the real one.
Email Scam
Phishing and Pharming
Pharming
➔ Results when an attacker
infiltrates a domain name server
and changes the routing for
addresses.

Thus, when users of that domain name server enter an URL for
apharmed site, they are"pharmed" to the evil site. It results from
inadequate security for the domain name server.
Computer Viruses
❖ A computer virus is a small software
program.

❖ The design of the program is to execute


and replicate itself without your
knowledge.

Before the widespread use of the Internet, a


disk inserted into the computer's drive usually
introduced them. They can corrupt or delete data on
your computer or use your e-mail
Today, computer viruses usually arrive from program to send themselves to
the Internet, with an e-mail attachment, a everyone in your address book or
greeting card, or an audio or video file. even erase your hard drive.
Adware and Spyware
Adware and spyware are neither a virus nor
spam.

Adware
Adware is software that is often a legitimate
revenue source for companies that offer free This software is not malicious, but just
software. randomly displays paid advertisements when
the program is used.
In this mode, depending on the vendor, most or
all of the features are enabled, but pop-up
advertisements appear when you use the It does not track your habits or
program. provide personal information to a
third party but is a legitimate
Paying to register the software will remove the source of income to those who
advertisements. provide free software.
Adware and Spyware
Spyware
Spyware, in contrast to adware, tracks your web
surfing to tailor advertisements for you.

Some adware unfortunately is spywares


Downloading and installing peer-to-peer
file-swapping products, such as those allowing
users to swap music files, are a common way to
infect computers.
Sometimes, a licensing agreement, which few of us read before clicking "Accept,"
informs users of the spyware installation with the program, although this
information is usually in obtuse, hard-to-read legalese or misleading double-edged
statements.
Protection against Malware
❖ The first line of protection
Take the following steps as protection against malware
is to be careful of sites (Umstead, 2013, February 25):
whose reputations are
unknown. ★ Avoid password reuse.
❖ Downloading a file that you
find in an open web search is ★ Use strong passwords.
always problematic.
★ Use antivirus software and keep it updated.
❖ If you really must download
the file, scan the file with ★ Avoid getting too personal with the
your antivirus program public on social networking sites (e.g.,
before installing or executing do not share the following: your phone
it. number, physical address, etc)
Protection against Malware
Take the following steps as protection against malware (Umstead, 2013, February 25):

★ Do not open e-mail from ★ Avoid believing you are invulnerable to


strangers. malware-robot computers attack randomly.
★ Do not open e-mail attachments
you were not expecting to
receive.
★ Always keep your antimalware
software updated.

★ Always download the latest operating


system and software updates.
Many of the updates fix security holes.
Protection against Malware
FIREWALL For networks such as those in healthcare
agencies, the network administrator sets
the limits.
A firewall for computers is like a firewall in a
building; it acts to block destructive forces.

Computer firewalls work closely with a router pro-


gram to filter the traffic both coming into and, for
many firewalls, going out of a network or a private
computer.

The difficulty comes with deciding what to accept,


that is, what level of security to set.
References:
Encyclopædia Britannica, inc. (2023, January 9). Internet. Encyclopædia Britannica.
https://www.britannica.com/technology/Internet

Sewell, J. (2016). Informatics and Nursing: Opportunities and Challenges (5th ed.). Wolters Kluwer

You might also like