Health 2.0 trends and threads: Ultrabook™ based services to minimize risks and maximize benefits of web 2.0 for end users Pavel Kubů M.D. Intel World Ahead.

Slides:



Advertisements
Similar presentations
Health 2.0 trends and threads
Advertisements

Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Identity Theft Identity theft occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information. Individuals.
1 Identity Theft and Phishing: What You Need to Know.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
What is identity theft, and how can you protect yourself from it?
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Antonio Lara. Founded: 1852; Roots in banking dating to before the Civil War  PNC has grown into one of the leading financial services organizations.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Internet Fraud By: Noelle Woodman.
Scams Stevie's Scam School videos
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Company LOGO Internet Safety A Community Approach.
Internet Fraud By Jessica Habermehl &Ally Erwine Period 9.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crimes.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
Scams & Schemes Common Sense Media.
ICT in Banking.
UNIT VII – Personal Financial Literacy Consumer Protection & Fraud.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
End User Cyber Security Awareness Training. Who should complete this training This training is required for all individuals that owns a computer, mobile.
Chapter 9-Section 1 Resolving Credit Problems. Disputing Charges—Credit Card Statement  Disputing Charges—the process of informing a credit card company.
The Risks of Identity Theft IDENTITY THEFT VICTIMS COULD: Have any and all of their financial accounts invaded and emptied Be asked to repay debts they.
Keep It Safe. Homework (Passport page 42) How’s It Going?
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Common Scams Lewis Collantine & Clare Cunningham Thurrock Trading Standards 8 th September 2015.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
By: Asfa Khan and Huda Mukhtar
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Principles of Marketing
INTRODUCTION & QUESTIONS.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
1.7.2.G1 © Family Economics & Financial Education – Revised May 2005 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Mobile Money 1/37 Fiserv Mobile Money Staff Education © 2010 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. All trademarks.
Protecting Your Identity From Fraud Clarissa Goins, VP Compliance Karen Osterhoudt, VP Operations.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Cyber Crime in the Real Estate Industry
Fraud Protection.
Scams & Schemes Common Sense Media.
Fraud protection.
Learn how to protect yourself against common attacks
A Project on CYBER SECURITY
Internet Fraud By (NAMES).
Information Security Session October 24, 2005
Internet Safety Vocabulary
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Health 2.0 trends and threads: Ultrabook™ based services to minimize risks and maximize benefits of web 2.0 for end users Pavel Kubů M.D. Intel World Ahead Program, Healthcare and Education

Web 2.0 is changing patient – care giver relationship

Critical mass is networking online

The wisdom of crowds: The more people who take part in a social network, the greater the value they create. Source: Health 2.0 It’s up to you, Council for Public Health and Health Care for the Minister of Health, Welfare and Sport, Hague 2010

Example: Home based primary care (HBPC) in the VA INTEL DOING ETHNOGRAPHIC STUDY OF HBPC TO HELP THEM SCALE QUALITY,COORDINATED CARE TO MORE VETS BY IMPLEMENTING HEALTH I.T. TOOLS IN THEIR WORKFLOW. Patients with complex, chronic, disabling disease--too sick for the clinic! Av age 76 years old, 8 chronic conditions Care delivered in the home by inter- disciplinary team 24% reduction in total cost of care 63% reduction in hospital days 87% reduction in nursing home days

Threads of Virtual World Source: 2011 Internet Crime Report, Internet Crime Compliant Center

Auto - Auction Fraud Source: 2011 Internet Crime Report, Internet Crime Compliant Center In fraudulent vehicle sales, criminals attempt to sell vehicles they do not own. Criminals create an attractive deal by advertising vehicles for sale at prices below book value. Often the sellers claim they must sell the vehicle because they are moving for work or being deployed for the military. Because of the alleged pending move, criminals refuse to meet in person or allow inspection of the vehicle, and they often attempt to rush the sale. To make the deal appear legitimate, the criminal instructs the victim to send full or partial payment to a third-party agent via a wire transfer payment service and to fax their payment receipt to the seller as proof of payment. The criminal pockets the payment but does not deliver the vehicle.

Romance Scams Source: 2011 Internet Crime Report, Internet Crime Compliant Center Victims believe they are “dating” someone decent and honest. However, the online contact is often a criminal with a well-rehearsed script that scammers use repeatedly and successfully. Scammers search chat rooms, dating sites, and social networking sites looking for victims. Although the principal group of victims is over 40 years old, divorced or widowed, disabled and often elderly, all demographics are at risk. Scammers use poetry, flowers and other gifts to reel in victims, while declaring “undying love.” These criminals also use stories of severe life circumstances, tragedies, family deaths, personal injuries or other hardships to keep their victims concerned and involved in their schemes. They also ask victims to send money to help overcome alleged financial hardships.

Work from Home Scams Consumers continue to lose money from work-from-home scams that cyber criminals use to move stolen funds. Regrettably, due to their participation, these individuals may face criminal charges. Organized cyber criminals recruit their victims through newspaper ads, online employment services, unsolicited s or “spam,” and social networking sites advertising work-from- home “opportunities.” Participating with a legitimate business, the consumer becomes a “mule” for criminals who use the consumer’s or other victim’s accounts to steal and launder money. In addition, the scammers may compromise the victim’s own identity or accounts. Source: 2011 Internet Crime Report, Internet Crime Compliant Center

Loan Intimidation Scams In these scams, a caller claims that the victim is delinquent in a payday loan and must repay the loan to avoid legal consequences. The callers purport to be representatives of the FBI, Federal Legislative Department, various law firms or other legitimate-sounding agencies. They claim to be collecting debts for various companies. One of the most insidious aspects of this scam is that the callers have accurate information about the victims, including Social Security numbers, dates of birth, addresses, employer information, bank account numbers, and names and telephone numbers of relatives and friends. The method by which the fraudsters obtained the personal information is unclear, but victims often relay that they had completed online applications for other loans or credit cards before the calls began. The fraudsters relentlessly call the victims’ homes, cell phones and places of employment. They refuse to provide the victims any details of the alleged payday loans and become abusive when questioned. The callers threaten victims with legal actions, arrests, and in some cases physical violence if they refuse to pay. In many cases, the callers even resort to harassment of the victims’ relatives, friends and employers. Source: 2011 Internet Crime Report, Internet Crime Compliant Center

FBI Impersonation Scams The names of various government agencies and high-ranking government officials have been used in spam attacks in an attempt to defraud consumers. Government agencies do not send unsolicited s. Complaints related to spam s purportedly sent from the FBI continued to be reported with high frequency to IC3. In 2011, IC3 received about 39 complaints per day of this type. Source: 2011 Internet Crime Report, Internet Crime Compliant Center

2B+ Worldwide Internet Users 2B+ Source: worldometers.com 247,000,000,000 s Sent Every Day 247,000,000,000 2B Videos Viewed per Day 2B 2.5B Images Uploaded to Facebook per Month 2.5B Source: joaogeraldes.wordpress.com/2010/09/05/31-infographic-explores-internet-facts-figures-history-statistics/

Processor/HardwareProcessor/Hardware UserExperience Software (OS, Apps) UserExperience ProcessorH/W USER EXPERIENCE

“Don’t be encumbered by history. Go and create something wonderful.” — Robert Noyce

We Know How to Transform Experiences Multi-media CD ROM 1995 UncompromisedMobility Ultra Thin Ultra Responsive Ultra Secure Ultra Connected Ultrabook™

Projected Features The Ultrabook™ Beyond Thin and Light PERFORMANCE SECURERESPONSIVE POWER / BATTERY LIFE

Intel® Quick Sync Video TECHNOLOGY MEDIA Other brands and names are the property of their respective owners. Ultrabook™ devices deliver outstanding media experiences

Intel ® Smart Response Technology Intel ® Smart Response Technology Enabling SSD-like performance with HDD capacity Content continuously updated while the notebook is asleep! Intel ® Smart Connect Technology Intel ® Smart Connect Technology Intel ® Rapid Start Technology Intel ® Rapid Start Technology ~7 seconds to wake from hibernate! No need to shut down the PC – Days, not hours of battery life.

PCs are Stolen Frequently with Sensitive Data - Dell-Ponemon study People are storing more and more personal data on their laptops “ ” 200,000 laptops lost or stolen every year at European airports 12,000 laptops lost or stolen every week at US airports”

Security and Trust Built In Intel ® Identity Protection Technology Intel ® Identity Protection Technology Intel ® Anti-Theft Technology Intel ® Anti-Theft Technology

200K laptops lost or stolen every year at European airports/12K laptops lost or stolen every week at US airports 2 A path to building a Service for end user… Security is top concern for PC users 1 ID theft is lead consumer and business concern, followed by Malware 3 Users spend over 4 hours per month viewing online video on a PC 5 Online video market $6.9B in 2014 (46% CAGR) 6 600K Facebook* IDs compromised every day 4 Intel® IDENTITY PROTECTIONIntel® INSIDER™ Worldwide 30 million apps (not app updates) are downloaded each day 7 1. Source: Intel market research “Voice of the Customer” - global customer survey 2. Source: Dell-Ponemon Study 3. Source: Intel Market Research Voice of the Customer Survey 4. Source: The Guardian, October Source: Screen Digest

Enabling the Ultrabook™ Experience for Ageing population