Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction to Information and Computer Science Internet and the World Wide Web Lecture d This material (Comp4_Unit2d) was developed by Oregon Health.

Similar presentations


Presentation on theme: "Introduction to Information and Computer Science Internet and the World Wide Web Lecture d This material (Comp4_Unit2d) was developed by Oregon Health."— Presentation transcript:

1 Introduction to Information and Computer Science Internet and the World Wide Web Lecture d This material (Comp4_Unit2d) was developed by Oregon Health and Science University, funded by the Department of Health and Human Services, Office of the National Coordinator for Health Information Technology under Award Number IU24OC000015

2 Internet and the World Wide Web Learning Objectives Define the Internet and how to connect to it (Lecture a and b) Define the World Wide Web and how to access it (Lecture a and b) Write effective search queries for Internet search engines, filter the results and evaluate credibility of information (Lecture b) Discuss security and privacy concerns on the Internet (Lecture c) Describe ethical issues for the Internet (Lecture c and d) Explore online healthcare applications and associated security and privacy issues including HIPAA (Lecture d) 2 Health IT Workforce Curriculum Version 3.0/Spring 2012 Introduction to Computer and Information Science Internet and the World Wide Web Lecture d

3 Ethical considerations of the Internet Sharing Internet connection with neighbors Should neighbors have the ability to pool together, lease an Internet connection from an ISP, and pay for one shared connection? Downloading software from the Internet Should license “key generator” sites be allowed to operate? Should people be able to download pirated software from the Internet? Pirating software is a copyright infringement; selling unauthorized copies of commercial software (usually at a very low price) Health IT Workforce Curriculum Version 3.0/Spring 2012 3 Introduction to Computer and Information Science Internet and the World Wide Web Lecture d

4 Ethical considerations of the Internet (continued) Downloading music and movies from the Internet Should people be able to download music without paying for it? Should people be able to download movies without paying for them? Health IT Workforce Curriculum Version 3.0/Spring 2012 4 Introduction to Computer and Information Science Internet and the World Wide Web Lecture d

5 Ethical considerations of the Internet (continued) Copyright infringement What are the ethical concerns for buying/using college research papers found online? Should students or students be allowed to do this? If a student purchases a paper, is it copyright infringement? Is it plagiarism? Health IT Workforce Curriculum Version 3.0/Spring 2012 5 Introduction to Computer and Information Science Internet and the World Wide Web Lecture d

6 Ethical considerations of the Internet (continued) Internet Databases Should companies be able to gather information about surfing habits and sell this to marketing companies? Should the government have surfing, banking, and credit card history at its disposal? Health IT Workforce Curriculum Version 3.0/Spring 2012 6 Introduction to Computer and Information Science Internet and the World Wide Web Lecture d

7 Ethical considerations of the Internet (continued) Truth or lies? Should companies or people be able to post false information in blogs, consumer ratings, etc.? What is a lie and who defines it? What problems do you see in implementing this type of law? Health IT Workforce Curriculum Version 3.0/Spring 2012 7 Introduction to Computer and Information Science Internet and the World Wide Web Lecture d

8 Ethical considerations of the Internet (continued) Examples of subjective Internet information Rating of doctors on www.healthgrades.comwww.healthgrades.com –No system of checks and balances to ensure that posted information is correct Sarah Palin incorrectly summarized colonial American Paul Revere’s ride, and her supporters changed Wikipedia to reflect her views –Wikipedia was forced to lock the page to prevent changes to the information posted there Health IT Workforce Curriculum Version 3.0/Spring 2012 8 Introduction to Computer and Information Science Internet and the World Wide Web Lecture d

9 Everyone is Online Today Information overload When debit cards emerged, many people refused to use them because of privacy and security concerns People today are very comfortable with online banking and are comfortable conducting business over the Internet Social networking sites facilitate sharing People are comfortable sharing personal information in online communities even though this subjects them to privacy invasion Posting birth date, mother’s maiden name, etc. may enable an attacker to impersonate individual Health IT Workforce Curriculum Version 3.0/Spring 2012 9 Introduction to Computer and Information Science Internet and the World Wide Web Lecture d

10 What is Privacy? Most privacy law revolves around privacy between a person and the government According to Wikipedia, “The law of privacy regulates the type of information which may be collected and how this information may be used and stored.” (Wikipedia, 2010) Privacy relates to people Health IT Workforce Curriculum Version 3.0/Spring 2012 10 Introduction to Computer and Information Science Internet and the World Wide Web Lecture d

11 What is Confidentiality? Not the same as privacy According to Wikipedia, “Confidentiality is commonly applied to conversations between doctors and patients. Legal protections prevent physicians from revealing certain discussions with patients, even under oath in court. The rule only applies to secrets shared between physician and patient during the course of providing medical care.” (Wikipedia, 2010) Confidentiality relates to data Health IT Workforce Curriculum Version 3.0/Spring 2012 11 Introduction to Computer and Information Science Internet and the World Wide Web Lecture d

12 Federal Rules Emerge HIPAA (Health Insurance Portability and Accountability Act) enacted in 1996 by federal government HIPAA requires that the following abide by privacy and security standards: Healthcare providers Health insurance companies Care clearinghouses (organizations that translate claims data into and out of HIPAA-standard format) Health IT Workforce Curriculum Version 3.0/Spring 2012 12 Introduction to Computer and Information Science Internet and the World Wide Web Lecture d

13 HIPAA and Privacy Privacy Rule HIPAA requires those covered by the act to provide patients a “Notice of Privacy Practices” when care is first provided The Privacy Rule covers paper and electronic private health information Security Rule Covers administrative, physical, and technical data safeguards that secure electronic health record data Health IT Workforce Curriculum Version 3.0/Spring 2012 13 Introduction to Computer and Information Science Internet and the World Wide Web Lecture d

14 Free Online PHR Systems Readily Available PHRs maintained by individuals Some PHRs not covered by HIPAA rules Resources: Microsoft HealthVault - www.healthvault.com/www.healthvault.com/ WebMD Health Manager - http://www.webmd.com/phr http://www.webmd.com/phr Health IT Workforce Curriculum Version 3.0/Spring 2012 14 Introduction to Computer and Information Science Internet and the World Wide Web Lecture d

15 EHRs Used by Healthcare Providers EHRs maintained by healthcare providers EHRs covered by HIPAA rules EHRs use centralized database systems to integrate patient intake, medical care, pharmacy, billing, etc. into one system Departments/entities may not be in same physical location, so patient data must travel over the Internet People can view their own health record, taking ownership of its contents, ensuring accuracy Health IT Workforce Curriculum Version 3.0/Spring 2012 15 Introduction to Computer and Information Science Internet and the World Wide Web Lecture d

16 EHR Security Q & A How is data sent over the Internet? Sent in an encrypted, secure manner over the Internet Is data safe? Much depends on each organization’s physical record and network security practices No data is 100% secure against theft or misuse Who can view health records? Only those who need to know or view the contents of health record should be able to view it Patient must authorize all other access Health IT Workforce Curriculum Version 3.0/Spring 2012 16 Introduction to Computer and Information Science Internet and the World Wide Web Lecture d

17 Internet and World Wide Web Summary – Lecture d Ethical considerations related to the Internet include the use of Internet sharing; the use of pirated software and media; and copyright infringement Information posted on the Internet may not be accurate and should be viewed with skepticism until validated by a trusted third party Privacy relates to people; confidentiality relates to data HIPAA enacted in 1996 by the federal government and introduced the privacy and security rules Health IT Workforce Curriculum Version 3.0/Spring 2012 17 Introduction to Computer and Information Science Internet and the World Wide Web Lecture d

18 Internet and World Wide Web Summary – Lecture d (continued) EHRs are maintained by healthcare providers and are subject to HIPAA regulations PHRs are maintained by individuals and often are not subject to HIPAA regulations Health IT Workforce Curriculum Version 3.0/Spring 2012 18 Introduction to Computer and Information Science Internet and the World Wide Web Lecture d

19 Internet and World Wide Web Summary The Internet is a global system of interconnected networks The World Wide Web functions within the Internet and consists of HTML Web pages and linked documents stored on Web servers Internet communications are standardized around the IP protocol An IP address can be leased from an ISP Health IT Workforce Curriculum Version 3.0/Spring 2012 19 Introduction to Computer and Information Science Internet and the World Wide Web Lecture d

20 Internet and World Wide Web Summary (continued) The Internet relies on DNS to translate or resolve a domain name to an IP address Computers connect to the Internet through the services provided by ISPs ISPs provide access to the Internet via dial-up, broadband, Wi-Fi, satellite, and 3G connections Health IT Workforce Curriculum Version 3.0/Spring 2012 20 Introduction to Computer and Information Science Internet and the World Wide Web Lecture d

21 Internet and World Wide Web Summary (continued) Devices connect to the Internet through an interconnected network of ISPs ISP fees include the use of their equipment to connect a network to the Internet ISPs provide IP addresses and DNS services to subscribers People use search engines to locate content on Web pages through the use of search engines Health IT Workforce Curriculum Version 3.0/Spring 2012 21 Introduction to Computer and Information Science Internet and the World Wide Web Lecture d

22 Internet and World Wide Web Summary (continued) Search terms can include Boolean operators to augment or limit search engine results –Double quotes limits search engine results Search engine results are influenced by search terms and payments to search providers by vendors Health IT Workforce Curriculum Version 3.0/Spring 2012 22 Introduction to Computer and Information Science Internet and the World Wide Web Lecture d

23 Internet and World Wide Web Summary (continued) Internet security is important because if personal information is compromised, terrible financial and deeply personal losses may happen Hackers attack routers, switches, and computers to view confidential data and cause financial ruin Applying critical updates promptly is the easiest and best way to protect data AV software works to recognize patterns and stop computer attacks Health IT Workforce Curriculum Version 3.0/Spring 2012 23 Introduction to Computer and Information Science Internet and the World Wide Web Lecture d

24 Internet and World Wide Web Summary (continued) Individuals may protect data by turning on a firewall, managing cookies, and password-protecting devices with user accounts Individuals should never use publicly-accessible computers to conduct personal business Attackers use Trojans, viruses, worms, and phishing to trick people into revealing confidential information Internet use often involves ethical considerations such as the use of pirated software Health IT Workforce Curriculum Version 3.0/Spring 2012 24 Introduction to Computer and Information Science Internet and the World Wide Web Lecture d

25 Internet and World Wide Web References – Lecture d References Confidentiality. Wikipedia [free encyclopedia on the Internet]. 2010 July 10; [cited 12 July 2010]; Available from: http://en.wikipedia.org/wiki/Confidentiality. http://en.wikipedia.org/wiki/Confidentiality Privacy law. Wikipedia [free encyclopedia on the Internet]. 2010 June 28; [cited 12 July 2010]; Available from: http://en.wikipedia.org/wiki/Privacy_law.. http://en.wikipedia.org/wiki/Privacy_law Health Insurance Portability and Accountability Act. Wikipedia [free encyclopedia on the Internet]. 2010 July 06; [cited 12 July 2010]; Available from: http://en.wikipedia.org/wiki/Hipaa.http://en.wikipedia.org/wiki/Hipaa VistA. Wikipedia [free encyclopedia on the Internet]. 2010 June 16; [cited 30 June 2010]; Available from: http://en.wikipedia.org/wiki/VistA. http://en.wikipedia.org/wiki/VistA Health IT Workforce Curriculum Version 3.0/Spring 2012 25 Introduction to Computer and Information Science Internet and the World Wide Web Lecture d


Download ppt "Introduction to Information and Computer Science Internet and the World Wide Web Lecture d This material (Comp4_Unit2d) was developed by Oregon Health."

Similar presentations


Ads by Google