SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Woods Hole: Principles of mobile computing
2006 September 26th. Copies available from http://www.handheldsfordoctors.com/guru/lectures/05.09.26.htm.

Ali Abdulla Al-Ubaydli Scholarship for Mobile Medical Computing
www.handheldsfordoctors.com/scholarship

NLM Mobile
www.nlm.nih.gov/mobile

NOTES:

Mobile computing?
   ●    Handheld computer: a small mobile device that is part of your computing toolbox

   ●    Forget Palm, Pocket PC

   ●    Forget PDA and smartphone

   ●    Forget the fancy

           Fingerprints, photos and phones*

* Aziz et al. quot;Handheld computers and the 21st century surgical team: a pilot study.quot;BMC Medical Informatics
and Decision Making 2005, 5:28. http://www.biomedcentral.com/1472-6947/5/28

NOTES:

Great for personal use
  * For the first time, IT departments are behind the clinicians in adoption

  * Schedule, of course

  * Personal notes

  * Personal textbooks

       o Personal Digital Educators*

       o NLM mobile

* Cimino et al. quot;Personal digital educators.quot; N Engl J Med. 2005 Mar 3;352(9):860-2.
http://content.nejm.org/cgi/content/full/352/9/860

NOTES:

Internal medicine department in large teaching hopsital in USA
In the beginning:

- Senior asks IT department what the best available device is
- Junior doctor tells medical students that handheld computers essential for their studies

Investment

- $150,000

- 60 devices, WiFi

- UpToDate site license

Result

- 40 unopened boxes

- few residents and no medical students aware of UpToDate

NOTES:

The wrong way to fly
NOTES:

The Wright way to fly
A handheld computer is good for storing and displaying information that is the size of your hand, not your arm

  * x-ray images vs x-ray reports

  * complete medical records vs blood results and jobs lists

Result - search more textbooks in your hand than an entire bookshelf full of books

NOTES:

Advantages of handheld computers
Perhaps the best computer ever designed for clinicians

  * Mobility

  * Synchronization

  * Beaming

NOTES:

Databases
There are many ways of storing your data

- Memo Pad / Notes

- Spreadsheets

- Simple databases
- Bespoke databases

NOTES:

Memo Pad / Notes
Fast and simple

But... limited

NOTES:

Spreadsheets
- Excel To Go or Pocket Excel

- Easy and great for calculations

- But problems with security, error checking, synchronization and relational data.

NOTES:

Database software
- Everything is a database – quite right too!

- Software like HanDBase makes it easy to get started. http://www.ddhsoftware.com/handbase.html

  -eg surgical logbook http://www.handheldsfordoctors.com/learn/organisation/surgicallogbook.htm

Bespoke databases

- Allow advanced user interface

- Expensive and require computer expertise

NOTES:

Security
NOTES:

Five steps to analyse security systems
“Beyond Fear” by Bruce Schneier. Springer; 1 edition (July 28, 2003).

Recommended software is TealLock Corporate edition (www.tealpoint.com) for Palm Powered devices and
SafeGuard PDA (www.utimaco.com) for Pocket PCs. Both allow numeric keypads for passwords and
encryption of specific files (eg HanDBase files).
Five steps to analyse security systems
1 - What assets are you trying to protect?
2 - What are the risks to those assets?
3 - How well does the security solution mitigate those risks?
4 - What other risks does the security solution cause?
5 - What costs and trade-offs does the security solution impose?

NHS Information Authority Security Toolkit
The toolkit is available from Tom Lillywhite tom.lillywhite@nhsia.nhs.uk, version 3.0 has just been released. A
good (ie short) introduction to the UK Government's Risk Analysis and Management Method (CRAMM) is
available at http://www.gammassl.co.uk/topics/hot5.html.

Risk Analysis
Risk is normally defined as the chance or likelihood of damage or loss. In CRAMM this definition is extended
to include the impact of damage or loss. That is, it is a function of two separate components, the likelihood that
an unwanted incident will occur and the impact that could result from the incident.

Risk Analysis involves identifying and assessing risks to data and the information system and network which
support it. Typical risks include:

•   data being lost, destroyed or wiped

•   data being corrupted

•   data being disclosed without authority

•   data being interfered in various ways during transmission.

The processes involved in risk analysis are identifying assets, valuing the assets, threats and vulnerabilities, and
then calculating the risk.

1. Assets – Physical assets; End user services; Software assets; Data assets

2. Threat and vulnerabilities

        •   Masquerading of User Identity (by insiders; by contracted service providers; by outsiders)
        •   Unauthorised use of an application
        •   Introduction of damaging or disruptive software
        •   Misuse of system resources
        •   Communications infiltration; interception; manipulation; failure
        •   Repudiation
        •   Embedding of malicious code
        •   Accidental mis-routing
        •   Technical failure of host; storage facility; print facility
        •   Technical failure of network distribution component; gateway; management or operation host;
            interface; service
        •   Power failure
        •   Air conditioning failure
        •   Application software failure
        •   Operations error
        •   Maintenance error (software; hardware)
        •   User error
Fire; water damage; natural disaster
         •
      • Staff shortage
      • Theft by insiders; outsiders
      • Willful damage by insiders; outsiders
      • Terrorism
3. Countermeasures

Training users
    •    Palm OS Simulator - http://www.palmos.com/dev/tools/simulator/

    •    MS Windows Mobile Emulator -
         http://www.microsoft.com/downloads/details.aspx?FamilyId=4953D34D-692F-4C87-AC69-
         CB235DBDAD1D&displaylang=en

    •    Palm Graffiti Alphabet printout – http://www.palmone.com/us/products/input/graffiti2_alphabet.pdf

NHS Lanarkshire nurses
Hospital Emergency Care Teams

- Hospital at night has 2 specially trained Nurses + 5 medics

- Team manages all sick patients in the hospital. No JHOs.

- Nurses triage all calls, structured clinical assessments, IV cann, bloods inc ABG, ECGs, male cath, prescribe
O2

Hector

- Very detailed activity data

- Ability to generate hand-over registers + reports

- Reference info at the bedside

- 24/7 availability, fast interaction, security

- Printed clinical assessments at the bedside

NOTES:

NLM Mobile
http://www.nlm.nih.gov/mobile

me@mo.md
Further reading
•   Open source handheld computer software – see
    http://freedomsoftware.info/content/view/31/45/#software_yates. Part of “Free Software for Busy People” by
    Mohammad Al-Ubaydli. Idiopathic Publishing, 2005. Entire book is available free online at
    http://freedomsoftware.info/content/section/1/45/.

•   Pharmaceutical references at ePocrates (www.epocrates.com) and MedHand (www.medhand.com).

•   HanDBase tutorials at http://www.ddhsoftware.com/support.html

•   QEH hematology department – chapter 12 of “Handheld computers for doctors” and as a paper: Mohammad
    Al-Ubaydli, Laura Deans: Introduction Of Handheld Computers Into The Haematology Department Of A
    District General Hospital. The Internet Journal of Pediatrics and Neonatology. 2003. Volume 3 Number 1.
    http://www.mo.md/id155.htm

•   QEH family practice – chapter 13 of “Handheld computers for doctors”. We discussed with the GPs instances
    when the practice's reliance on paperwork was most irritating to the doctors. Three areas became apparent: 1
    - The personal development plan; 2 - Tracking of expenses; 3 - The cataloguing of useful clinical literature.
    http://www.handheldsfordoctors.com/book/text/chapter13.htm

•   QEH internal medicine department – chapater 14 of “Handheld computers for doctors”. Like many hospitals
    in the UK, this one has been trying to cope with the reduction in junior doctors' hours. Reducing hours means
    increasing reliance on the shift system; more shifts mean more handovers; and handovers carry with them the
    risk of reducing continuity of care. The consultants asked whether handhelds could assist in providing this
    continuity.
    http://www.handheldsfordoctors.com/book/text/chapter14.htm

•   Beyond Fear, by Bruce Schneier. Springer, 2003. A security book that manages to be entertaining bedtime
    reading. The five-step process of analysing a security situation is well worth remembering.
    http://www.schneier.com/

•   Security Engineering: A Guide to Building Dependable Distributed Systems, by Ross Anderson. John Wiley
    & Sons Ltd, 2001. Excellent textbook on all aspects of security peppered with hilarious anecdotes. Chapter 3
    on passwords and chapter 8 on the BMA security model are particularly useful for clinicians.
    http://www.cl.cam.ac.uk/~rja14/book.html

•   DatePak allows you to share calendars with the rest of your team.
    http://www.handheldsfordoctors.com/learn/organisation/datepak.htm

•   RepliGo is good for storing read-only documents on a handheld computer. This is ideal for local guidelines
    and protocols.
    http://www.handheldsfordoctors.com/learn/ebooks/repligo.htm

•   Offline web browsers allow you to download a website for later reading on your handheld computer. The
    commercial iSilo is available for Palm Powered and Pocket PC devices (www.isilo.com) while Plucker is
    freely available for Palm Powered devices (www.plkr.org).

•   Software – http://www.handango.com

Weitere ähnliche Inhalte

Andere mochten auch

Presentazione megamind
Presentazione megamindPresentazione megamind
Presentazione megamindRodolfo Misasi
 
Techstars Boulder Webinar - Aug 2016
Techstars Boulder Webinar - Aug 2016Techstars Boulder Webinar - Aug 2016
Techstars Boulder Webinar - Aug 2016Natty Zola
 
Bmn pepelandsin romed2
Bmn pepelandsin romed2Bmn pepelandsin romed2
Bmn pepelandsin romed2Rodolfo Misasi
 
Technical Writing Samples
Technical Writing SamplesTechnical Writing Samples
Technical Writing SamplesRon_Shafer
 
Ccube promozioni 2010 2
Ccube promozioni 2010 2Ccube promozioni 2010 2
Ccube promozioni 2010 2Rodolfo Misasi
 
Visual Design for Presentations
Visual Design for PresentationsVisual Design for Presentations
Visual Design for PresentationsOmar Sosa-Tzec
 
Exploration of Rhetorical Appeals, Operations and Figures in UI/UX Design
Exploration of Rhetorical Appeals, Operations and Figures in UI/UX DesignExploration of Rhetorical Appeals, Operations and Figures in UI/UX Design
Exploration of Rhetorical Appeals, Operations and Figures in UI/UX DesignOmar Sosa-Tzec
 

Andere mochten auch (8)

Presentazione megamind
Presentazione megamindPresentazione megamind
Presentazione megamind
 
Techstars Boulder Webinar - Aug 2016
Techstars Boulder Webinar - Aug 2016Techstars Boulder Webinar - Aug 2016
Techstars Boulder Webinar - Aug 2016
 
Bmn pepelandsin romed2
Bmn pepelandsin romed2Bmn pepelandsin romed2
Bmn pepelandsin romed2
 
Technical Writing Samples
Technical Writing SamplesTechnical Writing Samples
Technical Writing Samples
 
Ccube promozioni 2010 2
Ccube promozioni 2010 2Ccube promozioni 2010 2
Ccube promozioni 2010 2
 
Visual Design for Presentations
Visual Design for PresentationsVisual Design for Presentations
Visual Design for Presentations
 
Exploration of Rhetorical Appeals, Operations and Figures in UI/UX Design
Exploration of Rhetorical Appeals, Operations and Figures in UI/UX DesignExploration of Rhetorical Appeals, Operations and Figures in UI/UX Design
Exploration of Rhetorical Appeals, Operations and Figures in UI/UX Design
 
Consumer Experience
Consumer ExperienceConsumer Experience
Consumer Experience
 

Ähnlich wie 06.09.26.Handout

Ähnlich wie 06.09.26.Handout (20)

04.01.26.Handout
04.01.26.Handout04.01.26.Handout
04.01.26.Handout
 
03.11.11.Handout
03.11.11.Handout03.11.11.Handout
03.11.11.Handout
 
06.06.01.Handout
06.06.01.Handout06.06.01.Handout
06.06.01.Handout
 
06.06.01.Handout
06.06.01.Handout06.06.01.Handout
06.06.01.Handout
 
04.12.09.Handout
04.12.09.Handout04.12.09.Handout
04.12.09.Handout
 
Cyber neurology in the digital era
Cyber neurology in the digital eraCyber neurology in the digital era
Cyber neurology in the digital era
 
Adequate directions for use "In the Age of AI and Watson"
Adequate directions for use "In the Age of AI and Watson"Adequate directions for use "In the Age of AI and Watson"
Adequate directions for use "In the Age of AI and Watson"
 
Securing IoT medical devices
Securing IoT medical devicesSecuring IoT medical devices
Securing IoT medical devices
 
06.12.07
06.12.0706.12.07
06.12.07
 
Mis
MisMis
Mis
 
07.05.20
07.05.2007.05.20
07.05.20
 
06.09.26
06.09.2606.09.26
06.09.26
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
PACE-IT: Common Network Security Issues
PACE-IT: Common Network Security IssuesPACE-IT: Common Network Security Issues
PACE-IT: Common Network Security Issues
 
Security and ethical issues of mobile device technology
Security and ethical issues of mobile device technologySecurity and ethical issues of mobile device technology
Security and ethical issues of mobile device technology
 
How Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityHow Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and Security
 
Information technology in health care management
Information technology in health care managementInformation technology in health care management
Information technology in health care management
 
Mobile Device Mgmt Healthcare Whitepaper
Mobile Device Mgmt Healthcare WhitepaperMobile Device Mgmt Healthcare Whitepaper
Mobile Device Mgmt Healthcare Whitepaper
 
05.09.13.Handout
05.09.13.Handout05.09.13.Handout
05.09.13.Handout
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
 

Mehr von Mohammad Al-Ubaydli

Review of Data Security, Consent and Opt-Outs
Review of Data Security, Consent and Opt-OutsReview of Data Security, Consent and Opt-Outs
Review of Data Security, Consent and Opt-OutsMohammad Al-Ubaydli
 
Profit with purpose businesses: Mission alignment paper
Profit with purpose businesses: Mission alignment paperProfit with purpose businesses: Mission alignment paper
Profit with purpose businesses: Mission alignment paperMohammad Al-Ubaydli
 
Using a Shared Electronic Patient Record to Develop and Assess e-Consultation...
Using a Shared Electronic Patient Record to Develop and Assess e-Consultation...Using a Shared Electronic Patient Record to Develop and Assess e-Consultation...
Using a Shared Electronic Patient Record to Develop and Assess e-Consultation...Mohammad Al-Ubaydli
 
Patient-controlled medical records
Patient-controlled medical recordsPatient-controlled medical records
Patient-controlled medical recordsMohammad Al-Ubaydli
 
Personal health records presentation at Cambridge Refresh
Personal health records presentation at Cambridge RefreshPersonal health records presentation at Cambridge Refresh
Personal health records presentation at Cambridge RefreshMohammad Al-Ubaydli
 
Meeting healthcare challenges: what are the challenges and what is the role o...
Meeting healthcare challenges: what are the challenges and what is the role o...Meeting healthcare challenges: what are the challenges and what is the role o...
Meeting healthcare challenges: what are the challenges and what is the role o...Mohammad Al-Ubaydli
 
Screenshots of Patients Know Best product
Screenshots of Patients Know Best productScreenshots of Patients Know Best product
Screenshots of Patients Know Best productMohammad Al-Ubaydli
 
Long Term Conditions: Long Term Conditions What’s wrong and what do we need?
Long Term Conditions: Long Term Conditions  What’s wrong and what do we need?Long Term Conditions: Long Term Conditions  What’s wrong and what do we need?
Long Term Conditions: Long Term Conditions What’s wrong and what do we need?Mohammad Al-Ubaydli
 
Evolving the Management of Patient Care in the Home
Evolving the Management of Patient  Care in the HomeEvolving the Management of Patient  Care in the Home
Evolving the Management of Patient Care in the HomeMohammad Al-Ubaydli
 
Home health care & long-term conditions: How to succeed with personal health ...
Home health care & long-term conditions: How to succeed with personal health ...Home health care & long-term conditions: How to succeed with personal health ...
Home health care & long-term conditions: How to succeed with personal health ...Mohammad Al-Ubaydli
 
Direct-to-consumer genomics offerings
Direct-to-consumer genomics offeringsDirect-to-consumer genomics offerings
Direct-to-consumer genomics offeringsMohammad Al-Ubaydli
 
Al-Madrasa for Art student artwork 18 July 2009
Al-Madrasa for Art student artwork 18 July 2009Al-Madrasa for Art student artwork 18 July 2009
Al-Madrasa for Art student artwork 18 July 2009Mohammad Al-Ubaydli
 
Transformation In Chronic Disease Management Through Technology: Improving Pr...
Transformation In Chronic Disease Management Through Technology: Improving Pr...Transformation In Chronic Disease Management Through Technology: Improving Pr...
Transformation In Chronic Disease Management Through Technology: Improving Pr...Mohammad Al-Ubaydli
 
Working with patients online: tips for the real world
Working with patients online: tips for the real worldWorking with patients online: tips for the real world
Working with patients online: tips for the real worldMohammad Al-Ubaydli
 

Mehr von Mohammad Al-Ubaydli (20)

Review of Data Security, Consent and Opt-Outs
Review of Data Security, Consent and Opt-OutsReview of Data Security, Consent and Opt-Outs
Review of Data Security, Consent and Opt-Outs
 
Profit with purpose businesses: Mission alignment paper
Profit with purpose businesses: Mission alignment paperProfit with purpose businesses: Mission alignment paper
Profit with purpose businesses: Mission alignment paper
 
Using a Shared Electronic Patient Record to Develop and Assess e-Consultation...
Using a Shared Electronic Patient Record to Develop and Assess e-Consultation...Using a Shared Electronic Patient Record to Develop and Assess e-Consultation...
Using a Shared Electronic Patient Record to Develop and Assess e-Consultation...
 
Patient-controlled medical records
Patient-controlled medical recordsPatient-controlled medical records
Patient-controlled medical records
 
Know thy health
Know thy healthKnow thy health
Know thy health
 
2009.05.19.health2020 at rsm
2009.05.19.health2020 at rsm2009.05.19.health2020 at rsm
2009.05.19.health2020 at rsm
 
Personal health records presentation at Cambridge Refresh
Personal health records presentation at Cambridge RefreshPersonal health records presentation at Cambridge Refresh
Personal health records presentation at Cambridge Refresh
 
Meeting healthcare challenges: what are the challenges and what is the role o...
Meeting healthcare challenges: what are the challenges and what is the role o...Meeting healthcare challenges: what are the challenges and what is the role o...
Meeting healthcare challenges: what are the challenges and what is the role o...
 
Screenshots of Patients Know Best product
Screenshots of Patients Know Best productScreenshots of Patients Know Best product
Screenshots of Patients Know Best product
 
Long Term Conditions: Long Term Conditions What’s wrong and what do we need?
Long Term Conditions: Long Term Conditions  What’s wrong and what do we need?Long Term Conditions: Long Term Conditions  What’s wrong and what do we need?
Long Term Conditions: Long Term Conditions What’s wrong and what do we need?
 
Evolving the Management of Patient Care in the Home
Evolving the Management of Patient  Care in the HomeEvolving the Management of Patient  Care in the Home
Evolving the Management of Patient Care in the Home
 
Home health care & long-term conditions: How to succeed with personal health ...
Home health care & long-term conditions: How to succeed with personal health ...Home health care & long-term conditions: How to succeed with personal health ...
Home health care & long-term conditions: How to succeed with personal health ...
 
Cloud computing in healthcare
Cloud computing in healthcareCloud computing in healthcare
Cloud computing in healthcare
 
Value Of Communities
Value Of CommunitiesValue Of Communities
Value Of Communities
 
Direct-to-consumer genomics offerings
Direct-to-consumer genomics offeringsDirect-to-consumer genomics offerings
Direct-to-consumer genomics offerings
 
Al-Madrasa for Art student artwork 18 July 2009
Al-Madrasa for Art student artwork 18 July 2009Al-Madrasa for Art student artwork 18 July 2009
Al-Madrasa for Art student artwork 18 July 2009
 
Know Thy Health
Know Thy HealthKnow Thy Health
Know Thy Health
 
Transformation In Chronic Disease Management Through Technology: Improving Pr...
Transformation In Chronic Disease Management Through Technology: Improving Pr...Transformation In Chronic Disease Management Through Technology: Improving Pr...
Transformation In Chronic Disease Management Through Technology: Improving Pr...
 
Working with patients online: tips for the real world
Working with patients online: tips for the real worldWorking with patients online: tips for the real world
Working with patients online: tips for the real world
 
NHS Number Programme
NHS Number ProgrammeNHS Number Programme
NHS Number Programme
 

Kürzlich hochgeladen

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Kürzlich hochgeladen (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

06.09.26.Handout

  • 1. Woods Hole: Principles of mobile computing 2006 September 26th. Copies available from http://www.handheldsfordoctors.com/guru/lectures/05.09.26.htm. Ali Abdulla Al-Ubaydli Scholarship for Mobile Medical Computing www.handheldsfordoctors.com/scholarship NLM Mobile www.nlm.nih.gov/mobile NOTES: Mobile computing? ● Handheld computer: a small mobile device that is part of your computing toolbox ● Forget Palm, Pocket PC ● Forget PDA and smartphone ● Forget the fancy  Fingerprints, photos and phones* * Aziz et al. quot;Handheld computers and the 21st century surgical team: a pilot study.quot;BMC Medical Informatics and Decision Making 2005, 5:28. http://www.biomedcentral.com/1472-6947/5/28 NOTES: Great for personal use * For the first time, IT departments are behind the clinicians in adoption * Schedule, of course * Personal notes * Personal textbooks o Personal Digital Educators* o NLM mobile * Cimino et al. quot;Personal digital educators.quot; N Engl J Med. 2005 Mar 3;352(9):860-2. http://content.nejm.org/cgi/content/full/352/9/860 NOTES: Internal medicine department in large teaching hopsital in USA In the beginning: - Senior asks IT department what the best available device is
  • 2. - Junior doctor tells medical students that handheld computers essential for their studies Investment - $150,000 - 60 devices, WiFi - UpToDate site license Result - 40 unopened boxes - few residents and no medical students aware of UpToDate NOTES: The wrong way to fly NOTES: The Wright way to fly A handheld computer is good for storing and displaying information that is the size of your hand, not your arm * x-ray images vs x-ray reports * complete medical records vs blood results and jobs lists Result - search more textbooks in your hand than an entire bookshelf full of books NOTES: Advantages of handheld computers Perhaps the best computer ever designed for clinicians * Mobility * Synchronization * Beaming NOTES: Databases There are many ways of storing your data - Memo Pad / Notes - Spreadsheets - Simple databases
  • 3. - Bespoke databases NOTES: Memo Pad / Notes Fast and simple But... limited NOTES: Spreadsheets - Excel To Go or Pocket Excel - Easy and great for calculations - But problems with security, error checking, synchronization and relational data. NOTES: Database software - Everything is a database – quite right too! - Software like HanDBase makes it easy to get started. http://www.ddhsoftware.com/handbase.html -eg surgical logbook http://www.handheldsfordoctors.com/learn/organisation/surgicallogbook.htm Bespoke databases - Allow advanced user interface - Expensive and require computer expertise NOTES: Security NOTES: Five steps to analyse security systems “Beyond Fear” by Bruce Schneier. Springer; 1 edition (July 28, 2003). Recommended software is TealLock Corporate edition (www.tealpoint.com) for Palm Powered devices and SafeGuard PDA (www.utimaco.com) for Pocket PCs. Both allow numeric keypads for passwords and encryption of specific files (eg HanDBase files).
  • 4. Five steps to analyse security systems 1 - What assets are you trying to protect? 2 - What are the risks to those assets? 3 - How well does the security solution mitigate those risks? 4 - What other risks does the security solution cause? 5 - What costs and trade-offs does the security solution impose? NHS Information Authority Security Toolkit The toolkit is available from Tom Lillywhite tom.lillywhite@nhsia.nhs.uk, version 3.0 has just been released. A good (ie short) introduction to the UK Government's Risk Analysis and Management Method (CRAMM) is available at http://www.gammassl.co.uk/topics/hot5.html. Risk Analysis Risk is normally defined as the chance or likelihood of damage or loss. In CRAMM this definition is extended to include the impact of damage or loss. That is, it is a function of two separate components, the likelihood that an unwanted incident will occur and the impact that could result from the incident. Risk Analysis involves identifying and assessing risks to data and the information system and network which support it. Typical risks include: • data being lost, destroyed or wiped • data being corrupted • data being disclosed without authority • data being interfered in various ways during transmission. The processes involved in risk analysis are identifying assets, valuing the assets, threats and vulnerabilities, and then calculating the risk. 1. Assets – Physical assets; End user services; Software assets; Data assets 2. Threat and vulnerabilities • Masquerading of User Identity (by insiders; by contracted service providers; by outsiders) • Unauthorised use of an application • Introduction of damaging or disruptive software • Misuse of system resources • Communications infiltration; interception; manipulation; failure • Repudiation • Embedding of malicious code • Accidental mis-routing • Technical failure of host; storage facility; print facility • Technical failure of network distribution component; gateway; management or operation host; interface; service • Power failure • Air conditioning failure • Application software failure • Operations error • Maintenance error (software; hardware) • User error
  • 5. Fire; water damage; natural disaster • • Staff shortage • Theft by insiders; outsiders • Willful damage by insiders; outsiders • Terrorism 3. Countermeasures Training users • Palm OS Simulator - http://www.palmos.com/dev/tools/simulator/ • MS Windows Mobile Emulator - http://www.microsoft.com/downloads/details.aspx?FamilyId=4953D34D-692F-4C87-AC69- CB235DBDAD1D&displaylang=en • Palm Graffiti Alphabet printout – http://www.palmone.com/us/products/input/graffiti2_alphabet.pdf NHS Lanarkshire nurses Hospital Emergency Care Teams - Hospital at night has 2 specially trained Nurses + 5 medics - Team manages all sick patients in the hospital. No JHOs. - Nurses triage all calls, structured clinical assessments, IV cann, bloods inc ABG, ECGs, male cath, prescribe O2 Hector - Very detailed activity data - Ability to generate hand-over registers + reports - Reference info at the bedside - 24/7 availability, fast interaction, security - Printed clinical assessments at the bedside NOTES: NLM Mobile http://www.nlm.nih.gov/mobile me@mo.md
  • 6. Further reading • Open source handheld computer software – see http://freedomsoftware.info/content/view/31/45/#software_yates. Part of “Free Software for Busy People” by Mohammad Al-Ubaydli. Idiopathic Publishing, 2005. Entire book is available free online at http://freedomsoftware.info/content/section/1/45/. • Pharmaceutical references at ePocrates (www.epocrates.com) and MedHand (www.medhand.com). • HanDBase tutorials at http://www.ddhsoftware.com/support.html • QEH hematology department – chapter 12 of “Handheld computers for doctors” and as a paper: Mohammad Al-Ubaydli, Laura Deans: Introduction Of Handheld Computers Into The Haematology Department Of A District General Hospital. The Internet Journal of Pediatrics and Neonatology. 2003. Volume 3 Number 1. http://www.mo.md/id155.htm • QEH family practice – chapter 13 of “Handheld computers for doctors”. We discussed with the GPs instances when the practice's reliance on paperwork was most irritating to the doctors. Three areas became apparent: 1 - The personal development plan; 2 - Tracking of expenses; 3 - The cataloguing of useful clinical literature. http://www.handheldsfordoctors.com/book/text/chapter13.htm • QEH internal medicine department – chapater 14 of “Handheld computers for doctors”. Like many hospitals in the UK, this one has been trying to cope with the reduction in junior doctors' hours. Reducing hours means increasing reliance on the shift system; more shifts mean more handovers; and handovers carry with them the risk of reducing continuity of care. The consultants asked whether handhelds could assist in providing this continuity. http://www.handheldsfordoctors.com/book/text/chapter14.htm • Beyond Fear, by Bruce Schneier. Springer, 2003. A security book that manages to be entertaining bedtime reading. The five-step process of analysing a security situation is well worth remembering. http://www.schneier.com/ • Security Engineering: A Guide to Building Dependable Distributed Systems, by Ross Anderson. John Wiley & Sons Ltd, 2001. Excellent textbook on all aspects of security peppered with hilarious anecdotes. Chapter 3 on passwords and chapter 8 on the BMA security model are particularly useful for clinicians. http://www.cl.cam.ac.uk/~rja14/book.html • DatePak allows you to share calendars with the rest of your team. http://www.handheldsfordoctors.com/learn/organisation/datepak.htm • RepliGo is good for storing read-only documents on a handheld computer. This is ideal for local guidelines and protocols. http://www.handheldsfordoctors.com/learn/ebooks/repligo.htm • Offline web browsers allow you to download a website for later reading on your handheld computer. The commercial iSilo is available for Palm Powered and Pocket PC devices (www.isilo.com) while Plucker is freely available for Palm Powered devices (www.plkr.org). • Software – http://www.handango.com