SlideShare uma empresa Scribd logo
1 de 6
Woods Hole: Principles of mobile computing
2006 September 26th. Copies available from http://www.handheldsfordoctors.com/guru/lectures/05.09.26.htm.

Ali Abdulla Al-Ubaydli Scholarship for Mobile Medical Computing
www.handheldsfordoctors.com/scholarship

NLM Mobile
www.nlm.nih.gov/mobile

NOTES:

Mobile computing?
   ●    Handheld computer: a small mobile device that is part of your computing toolbox

   ●    Forget Palm, Pocket PC

   ●    Forget PDA and smartphone

   ●    Forget the fancy

           Fingerprints, photos and phones*

* Aziz et al. quot;Handheld computers and the 21st century surgical team: a pilot study.quot;BMC Medical Informatics
and Decision Making 2005, 5:28. http://www.biomedcentral.com/1472-6947/5/28

NOTES:

Great for personal use
  * For the first time, IT departments are behind the clinicians in adoption

  * Schedule, of course

  * Personal notes

  * Personal textbooks

       o Personal Digital Educators*

       o NLM mobile

* Cimino et al. quot;Personal digital educators.quot; N Engl J Med. 2005 Mar 3;352(9):860-2.
http://content.nejm.org/cgi/content/full/352/9/860

NOTES:

Internal medicine department in large teaching hopsital in USA
In the beginning:

- Senior asks IT department what the best available device is
- Junior doctor tells medical students that handheld computers essential for their studies

Investment

- $150,000

- 60 devices, WiFi

- UpToDate site license

Result

- 40 unopened boxes

- few residents and no medical students aware of UpToDate

NOTES:

The wrong way to fly
NOTES:

The Wright way to fly
A handheld computer is good for storing and displaying information that is the size of your hand, not your arm

  * x-ray images vs x-ray reports

  * complete medical records vs blood results and jobs lists

Result - search more textbooks in your hand than an entire bookshelf full of books

NOTES:

Advantages of handheld computers
Perhaps the best computer ever designed for clinicians

  * Mobility

  * Synchronization

  * Beaming

NOTES:

Databases
There are many ways of storing your data

- Memo Pad / Notes

- Spreadsheets

- Simple databases
- Bespoke databases

NOTES:

Memo Pad / Notes
Fast and simple

But... limited

NOTES:

Spreadsheets
- Excel To Go or Pocket Excel

- Easy and great for calculations

- But problems with security, error checking, synchronization and relational data.

NOTES:

Database software
- Everything is a database – quite right too!

- Software like HanDBase makes it easy to get started. http://www.ddhsoftware.com/handbase.html

  -eg surgical logbook http://www.handheldsfordoctors.com/learn/organisation/surgicallogbook.htm

Bespoke databases

- Allow advanced user interface

- Expensive and require computer expertise

NOTES:

Security
NOTES:

Five steps to analyse security systems
“Beyond Fear” by Bruce Schneier. Springer; 1 edition (July 28, 2003).

Recommended software is TealLock Corporate edition (www.tealpoint.com) for Palm Powered devices and
SafeGuard PDA (www.utimaco.com) for Pocket PCs. Both allow numeric keypads for passwords and encryption
of specific files (eg HanDBase files).

Five steps to analyse security systems
1 - What assets are you trying to protect?
2 - What are the risks to those assets?
3 - How well does the security solution mitigate those risks?
4 - What other risks does the security solution cause?
5 - What costs and trade-offs does the security solution impose?
NHS Information Authority Security Toolkit
The toolkit is available from Tom Lillywhite tom.lillywhite@nhsia.nhs.uk, version 3.0 has just been released. A
good (ie short) introduction to the UK Government's Risk Analysis and Management Method (CRAMM) is
available at http://www.gammassl.co.uk/topics/hot5.html.

Risk Analysis
Risk is normally defined as the chance or likelihood of damage or loss. In CRAMM this definition is extended to
include the impact of damage or loss. That is, it is a function of two separate components, the likelihood that an
unwanted incident will occur and the impact that could result from the incident.

Risk Analysis involves identifying and assessing risks to data and the information system and network which
support it. Typical risks include:

•   data being lost, destroyed or wiped

•   data being corrupted

•   data being disclosed without authority

•   data being interfered in various ways during transmission.

The processes involved in risk analysis are identifying assets, valuing the assets, threats and vulnerabilities, and
then calculating the risk.

1. Assets – Physical assets; End user services; Software assets; Data assets

2. Threat and vulnerabilities

        •Masquerading of User Identity (by insiders; by contracted service providers; by outsiders)
        •Unauthorised use of an application
      • Introduction of damaging or disruptive software
      • Misuse of system resources
      • Communications infiltration; interception; manipulation; failure
      • Repudiation
      • Embedding of malicious code
      • Accidental mis-routing
      • Technical failure of host; storage facility; print facility
      • Technical failure of network distribution component; gateway; management or operation host;
         interface; service
      • Power failure
      • Air conditioning failure
      • Application software failure
      • Operations error
      • Maintenance error (software; hardware)
      • User error
      • Fire; water damage; natural disaster
      • Staff shortage
      • Theft by insiders; outsiders
      • Willful damage by insiders; outsiders
      • Terrorism
3. Countermeasures
Training users
    •    Palm OS Simulator - http://www.palmos.com/dev/tools/simulator/

    •    MS Windows Mobile Emulator -
         http://www.microsoft.com/downloads/details.aspx?FamilyId=4953D34D-692F-4C87-AC69-
         CB235DBDAD1D&displaylang=en

    •    Palm Graffiti Alphabet printout – http://www.palmone.com/us/products/input/graffiti2_alphabet.pdf

NHS Lanarkshire nurses
Hospital Emergency Care Teams

- Hospital at night has 2 specially trained Nurses + 5 medics

- Team manages all sick patients in the hospital. No JHOs.

- Nurses triage all calls, structured clinical assessments, IV cann, bloods inc ABG, ECGs, male cath, prescribe O2

Hector

- Very detailed activity data

- Ability to generate hand-over registers + reports

- Reference info at the bedside

- 24/7 availability, fast interaction, security

- Printed clinical assessments at the bedside

NOTES:

NLM Mobile
http://www.nlm.nih.gov/mobile

me@mo.md
Further reading
•   Open source handheld computer software – see
    http://freedomsoftware.info/content/view/31/45/#software_yates. Part of “Free Software for Busy People” by
    Mohammad Al-Ubaydli. Idiopathic Publishing, 2005. Entire book is available free online at
    http://freedomsoftware.info/content/section/1/45/.

•   Pharmaceutical references at ePocrates (www.epocrates.com) and MedHand (www.medhand.com).

•   HanDBase tutorials at http://www.ddhsoftware.com/support.html

•   QEH hematology department – chapter 12 of “Handheld computers for doctors” and as a paper: Mohammad
    Al-Ubaydli, Laura Deans: Introduction Of Handheld Computers Into The Haematology Department Of A
    District General Hospital. The Internet Journal of Pediatrics and Neonatology. 2003. Volume 3 Number 1.
    http://www.mo.md/id155.htm

•   QEH family practice – chapter 13 of “Handheld computers for doctors”. We discussed with the GPs instances
    when the practice's reliance on paperwork was most irritating to the doctors. Three areas became apparent: 1 -
    The personal development plan; 2 - Tracking of expenses; 3 - The cataloguing of useful clinical literature.
    http://www.handheldsfordoctors.com/book/text/chapter13.htm

•   QEH internal medicine department – chapater 14 of “Handheld computers for doctors”. Like many hospitals
    in the UK, this one has been trying to cope with the reduction in junior doctors' hours. Reducing hours means
    increasing reliance on the shift system; more shifts mean more handovers; and handovers carry with them the
    risk of reducing continuity of care. The consultants asked whether handhelds could assist in providing this
    continuity.
    http://www.handheldsfordoctors.com/book/text/chapter14.htm

•   Beyond Fear, by Bruce Schneier. Springer, 2003. A security book that manages to be entertaining bedtime
    reading. The five-step process of analysing a security situation is well worth remembering.
    http://www.schneier.com/

•   Security Engineering: A Guide to Building Dependable Distributed Systems, by Ross Anderson. John Wiley
    & Sons Ltd, 2001. Excellent textbook on all aspects of security peppered with hilarious anecdotes. Chapter 3
    on passwords and chapter 8 on the BMA security model are particularly useful for clinicians.
    http://www.cl.cam.ac.uk/~rja14/book.html

•   DatePak allows you to share calendars with the rest of your team.
    http://www.handheldsfordoctors.com/learn/organisation/datepak.htm

•   RepliGo is good for storing read-only documents on a handheld computer. This is ideal for local guidelines
    and protocols.
    http://www.handheldsfordoctors.com/learn/ebooks/repligo.htm

•   Offline web browsers allow you to download a website for later reading on your handheld computer. The
    commercial iSilo is available for Palm Powered and Pocket PC devices (www.isilo.com) while Plucker is
    freely available for Palm Powered devices (www.plkr.org).

•   Software – http://www.handango.com

Mais conteúdo relacionado

Destaque

Mid winter housing conference presentation.mathoda feb 10 2011
Mid winter housing conference presentation.mathoda feb 10 2011Mid winter housing conference presentation.mathoda feb 10 2011
Mid winter housing conference presentation.mathoda feb 10 2011rayman mathoda
 
Life Priority Presentation
Life Priority PresentationLife Priority Presentation
Life Priority Presentationrobmtchl
 
Life Prioirties Presentation
Life Prioirties PresentationLife Prioirties Presentation
Life Prioirties Presentationrobmtchl
 
App prizes value deck for apps
App prizes   value deck for appsApp prizes   value deck for apps
App prizes value deck for appsAppPrizes Inc
 
App prizes Telaxo value deck
App prizes   Telaxo value deckApp prizes   Telaxo value deck
App prizes Telaxo value deckAppPrizes Inc
 
Yahoo! presentatsioon
Yahoo! presentatsioonYahoo! presentatsioon
Yahoo! presentatsioontotukene19
 
Life Needs Analysis
Life Needs Analysis Life Needs Analysis
Life Needs Analysis robmtchl
 
AppPrizes Developer Deck
AppPrizes Developer DeckAppPrizes Developer Deck
AppPrizes Developer DeckAppPrizes Inc
 
AppPrizes for Developers
AppPrizes for DevelopersAppPrizes for Developers
AppPrizes for DevelopersAppPrizes Inc
 
RI/SHS Presentation
RI/SHS PresentationRI/SHS Presentation
RI/SHS Presentationguest9cdac5
 
shoubhik_Resume_latest
shoubhik_Resume_latestshoubhik_Resume_latest
shoubhik_Resume_latestShoubhik Ghosh
 
Android Architecture
Android ArchitectureAndroid Architecture
Android Architecturedeepakshare
 

Destaque (13)

Mid winter housing conference presentation.mathoda feb 10 2011
Mid winter housing conference presentation.mathoda feb 10 2011Mid winter housing conference presentation.mathoda feb 10 2011
Mid winter housing conference presentation.mathoda feb 10 2011
 
Life Priority Presentation
Life Priority PresentationLife Priority Presentation
Life Priority Presentation
 
Life Prioirties Presentation
Life Prioirties PresentationLife Prioirties Presentation
Life Prioirties Presentation
 
App prizes value deck for apps
App prizes   value deck for appsApp prizes   value deck for apps
App prizes value deck for apps
 
App prizes Telaxo value deck
App prizes   Telaxo value deckApp prizes   Telaxo value deck
App prizes Telaxo value deck
 
Yahoo! presentatsioon
Yahoo! presentatsioonYahoo! presentatsioon
Yahoo! presentatsioon
 
Life Needs Analysis
Life Needs Analysis Life Needs Analysis
Life Needs Analysis
 
AppPrizes Developer Deck
AppPrizes Developer DeckAppPrizes Developer Deck
AppPrizes Developer Deck
 
AppPrizes for Developers
AppPrizes for DevelopersAppPrizes for Developers
AppPrizes for Developers
 
RI/SHS Presentation
RI/SHS PresentationRI/SHS Presentation
RI/SHS Presentation
 
M U D R A S
M U D R A SM U D R A S
M U D R A S
 
shoubhik_Resume_latest
shoubhik_Resume_latestshoubhik_Resume_latest
shoubhik_Resume_latest
 
Android Architecture
Android ArchitectureAndroid Architecture
Android Architecture
 

Semelhante a 06.09.26.Handout

IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET Journal
 
Mobile Device Mgmt Healthcare Whitepaper
Mobile Device Mgmt Healthcare WhitepaperMobile Device Mgmt Healthcare Whitepaper
Mobile Device Mgmt Healthcare WhitepaperJames A. Morin
 
Ijricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjripublishers Ijri
 
Cyber neurology in the digital era
Cyber neurology in the digital eraCyber neurology in the digital era
Cyber neurology in the digital erawebzforu
 
“Detection of Diseases using Machine Learning”
“Detection of Diseases using Machine Learning”“Detection of Diseases using Machine Learning”
“Detection of Diseases using Machine Learning”IRJET Journal
 
Information technology in health care management
Information technology in health care managementInformation technology in health care management
Information technology in health care managementmohamedmoosa2
 
IRJET- A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
IRJET-  	  A Survey on-Security for using Pervasive Healthcare Monitoring Sys...IRJET-  	  A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
IRJET- A Survey on-Security for using Pervasive Healthcare Monitoring Sys...IRJET Journal
 
Security and ethical issues of mobile device technology
Security and ethical issues of mobile device technologySecurity and ethical issues of mobile device technology
Security and ethical issues of mobile device technologyErik R. Ranschaert, MD, PhD
 
Article Detail 7 - Domestic Preparedness
Article Detail 7 - Domestic PreparednessArticle Detail 7 - Domestic Preparedness
Article Detail 7 - Domestic PreparednessDiana Hopkins
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET Journal
 

Semelhante a 06.09.26.Handout (20)

04.01.26.Handout
04.01.26.Handout04.01.26.Handout
04.01.26.Handout
 
03.11.11.Handout
03.11.11.Handout03.11.11.Handout
03.11.11.Handout
 
04.12.09.Handout
04.12.09.Handout04.12.09.Handout
04.12.09.Handout
 
06.06.01.Handout
06.06.01.Handout06.06.01.Handout
06.06.01.Handout
 
06.06.01.Handout
06.06.01.Handout06.06.01.Handout
06.06.01.Handout
 
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
 
06.09.26
06.09.2606.09.26
06.09.26
 
Mobile Device Mgmt Healthcare Whitepaper
Mobile Device Mgmt Healthcare WhitepaperMobile Device Mgmt Healthcare Whitepaper
Mobile Device Mgmt Healthcare Whitepaper
 
Ijricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individuality
 
Cyber neurology in the digital era
Cyber neurology in the digital eraCyber neurology in the digital era
Cyber neurology in the digital era
 
06.12.07
06.12.0706.12.07
06.12.07
 
“Detection of Diseases using Machine Learning”
“Detection of Diseases using Machine Learning”“Detection of Diseases using Machine Learning”
“Detection of Diseases using Machine Learning”
 
Information technology in health care management
Information technology in health care managementInformation technology in health care management
Information technology in health care management
 
IRJET- A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
IRJET-  	  A Survey on-Security for using Pervasive Healthcare Monitoring Sys...IRJET-  	  A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
IRJET- A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
 
Mis
MisMis
Mis
 
Security and ethical issues of mobile device technology
Security and ethical issues of mobile device technologySecurity and ethical issues of mobile device technology
Security and ethical issues of mobile device technology
 
COMPUTERINNURSINGARTICLE.docx
COMPUTERINNURSINGARTICLE.docxCOMPUTERINNURSINGARTICLE.docx
COMPUTERINNURSINGARTICLE.docx
 
Article Detail 7 - Domestic Preparedness
Article Detail 7 - Domestic PreparednessArticle Detail 7 - Domestic Preparedness
Article Detail 7 - Domestic Preparedness
 
07.05.20
07.05.2007.05.20
07.05.20
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
 

Mais de Mohammad Al-Ubaydli

Review of Data Security, Consent and Opt-Outs
Review of Data Security, Consent and Opt-OutsReview of Data Security, Consent and Opt-Outs
Review of Data Security, Consent and Opt-OutsMohammad Al-Ubaydli
 
Profit with purpose businesses: Mission alignment paper
Profit with purpose businesses: Mission alignment paperProfit with purpose businesses: Mission alignment paper
Profit with purpose businesses: Mission alignment paperMohammad Al-Ubaydli
 
Using a Shared Electronic Patient Record to Develop and Assess e-Consultation...
Using a Shared Electronic Patient Record to Develop and Assess e-Consultation...Using a Shared Electronic Patient Record to Develop and Assess e-Consultation...
Using a Shared Electronic Patient Record to Develop and Assess e-Consultation...Mohammad Al-Ubaydli
 
Patient-controlled medical records
Patient-controlled medical recordsPatient-controlled medical records
Patient-controlled medical recordsMohammad Al-Ubaydli
 
Personal health records presentation at Cambridge Refresh
Personal health records presentation at Cambridge RefreshPersonal health records presentation at Cambridge Refresh
Personal health records presentation at Cambridge RefreshMohammad Al-Ubaydli
 
Meeting healthcare challenges: what are the challenges and what is the role o...
Meeting healthcare challenges: what are the challenges and what is the role o...Meeting healthcare challenges: what are the challenges and what is the role o...
Meeting healthcare challenges: what are the challenges and what is the role o...Mohammad Al-Ubaydli
 
Screenshots of Patients Know Best product
Screenshots of Patients Know Best productScreenshots of Patients Know Best product
Screenshots of Patients Know Best productMohammad Al-Ubaydli
 
Long Term Conditions: Long Term Conditions What’s wrong and what do we need?
Long Term Conditions: Long Term Conditions  What’s wrong and what do we need?Long Term Conditions: Long Term Conditions  What’s wrong and what do we need?
Long Term Conditions: Long Term Conditions What’s wrong and what do we need?Mohammad Al-Ubaydli
 
Evolving the Management of Patient Care in the Home
Evolving the Management of Patient  Care in the HomeEvolving the Management of Patient  Care in the Home
Evolving the Management of Patient Care in the HomeMohammad Al-Ubaydli
 
Home health care & long-term conditions: How to succeed with personal health ...
Home health care & long-term conditions: How to succeed with personal health ...Home health care & long-term conditions: How to succeed with personal health ...
Home health care & long-term conditions: How to succeed with personal health ...Mohammad Al-Ubaydli
 
Direct-to-consumer genomics offerings
Direct-to-consumer genomics offeringsDirect-to-consumer genomics offerings
Direct-to-consumer genomics offeringsMohammad Al-Ubaydli
 
Al-Madrasa for Art student artwork 18 July 2009
Al-Madrasa for Art student artwork 18 July 2009Al-Madrasa for Art student artwork 18 July 2009
Al-Madrasa for Art student artwork 18 July 2009Mohammad Al-Ubaydli
 
Transformation In Chronic Disease Management Through Technology: Improving Pr...
Transformation In Chronic Disease Management Through Technology: Improving Pr...Transformation In Chronic Disease Management Through Technology: Improving Pr...
Transformation In Chronic Disease Management Through Technology: Improving Pr...Mohammad Al-Ubaydli
 
Working with patients online: tips for the real world
Working with patients online: tips for the real worldWorking with patients online: tips for the real world
Working with patients online: tips for the real worldMohammad Al-Ubaydli
 

Mais de Mohammad Al-Ubaydli (20)

Review of Data Security, Consent and Opt-Outs
Review of Data Security, Consent and Opt-OutsReview of Data Security, Consent and Opt-Outs
Review of Data Security, Consent and Opt-Outs
 
Profit with purpose businesses: Mission alignment paper
Profit with purpose businesses: Mission alignment paperProfit with purpose businesses: Mission alignment paper
Profit with purpose businesses: Mission alignment paper
 
Using a Shared Electronic Patient Record to Develop and Assess e-Consultation...
Using a Shared Electronic Patient Record to Develop and Assess e-Consultation...Using a Shared Electronic Patient Record to Develop and Assess e-Consultation...
Using a Shared Electronic Patient Record to Develop and Assess e-Consultation...
 
Patient-controlled medical records
Patient-controlled medical recordsPatient-controlled medical records
Patient-controlled medical records
 
Know thy health
Know thy healthKnow thy health
Know thy health
 
2009.05.19.health2020 at rsm
2009.05.19.health2020 at rsm2009.05.19.health2020 at rsm
2009.05.19.health2020 at rsm
 
Personal health records presentation at Cambridge Refresh
Personal health records presentation at Cambridge RefreshPersonal health records presentation at Cambridge Refresh
Personal health records presentation at Cambridge Refresh
 
Meeting healthcare challenges: what are the challenges and what is the role o...
Meeting healthcare challenges: what are the challenges and what is the role o...Meeting healthcare challenges: what are the challenges and what is the role o...
Meeting healthcare challenges: what are the challenges and what is the role o...
 
Screenshots of Patients Know Best product
Screenshots of Patients Know Best productScreenshots of Patients Know Best product
Screenshots of Patients Know Best product
 
Long Term Conditions: Long Term Conditions What’s wrong and what do we need?
Long Term Conditions: Long Term Conditions  What’s wrong and what do we need?Long Term Conditions: Long Term Conditions  What’s wrong and what do we need?
Long Term Conditions: Long Term Conditions What’s wrong and what do we need?
 
Evolving the Management of Patient Care in the Home
Evolving the Management of Patient  Care in the HomeEvolving the Management of Patient  Care in the Home
Evolving the Management of Patient Care in the Home
 
Home health care & long-term conditions: How to succeed with personal health ...
Home health care & long-term conditions: How to succeed with personal health ...Home health care & long-term conditions: How to succeed with personal health ...
Home health care & long-term conditions: How to succeed with personal health ...
 
Cloud computing in healthcare
Cloud computing in healthcareCloud computing in healthcare
Cloud computing in healthcare
 
Value Of Communities
Value Of CommunitiesValue Of Communities
Value Of Communities
 
Direct-to-consumer genomics offerings
Direct-to-consumer genomics offeringsDirect-to-consumer genomics offerings
Direct-to-consumer genomics offerings
 
Al-Madrasa for Art student artwork 18 July 2009
Al-Madrasa for Art student artwork 18 July 2009Al-Madrasa for Art student artwork 18 July 2009
Al-Madrasa for Art student artwork 18 July 2009
 
Know Thy Health
Know Thy HealthKnow Thy Health
Know Thy Health
 
Transformation In Chronic Disease Management Through Technology: Improving Pr...
Transformation In Chronic Disease Management Through Technology: Improving Pr...Transformation In Chronic Disease Management Through Technology: Improving Pr...
Transformation In Chronic Disease Management Through Technology: Improving Pr...
 
Working with patients online: tips for the real world
Working with patients online: tips for the real worldWorking with patients online: tips for the real world
Working with patients online: tips for the real world
 
NHS Number Programme
NHS Number ProgrammeNHS Number Programme
NHS Number Programme
 

Último

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Último (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 

06.09.26.Handout

  • 1. Woods Hole: Principles of mobile computing 2006 September 26th. Copies available from http://www.handheldsfordoctors.com/guru/lectures/05.09.26.htm. Ali Abdulla Al-Ubaydli Scholarship for Mobile Medical Computing www.handheldsfordoctors.com/scholarship NLM Mobile www.nlm.nih.gov/mobile NOTES: Mobile computing? ● Handheld computer: a small mobile device that is part of your computing toolbox ● Forget Palm, Pocket PC ● Forget PDA and smartphone ● Forget the fancy  Fingerprints, photos and phones* * Aziz et al. quot;Handheld computers and the 21st century surgical team: a pilot study.quot;BMC Medical Informatics and Decision Making 2005, 5:28. http://www.biomedcentral.com/1472-6947/5/28 NOTES: Great for personal use * For the first time, IT departments are behind the clinicians in adoption * Schedule, of course * Personal notes * Personal textbooks o Personal Digital Educators* o NLM mobile * Cimino et al. quot;Personal digital educators.quot; N Engl J Med. 2005 Mar 3;352(9):860-2. http://content.nejm.org/cgi/content/full/352/9/860 NOTES: Internal medicine department in large teaching hopsital in USA In the beginning: - Senior asks IT department what the best available device is
  • 2. - Junior doctor tells medical students that handheld computers essential for their studies Investment - $150,000 - 60 devices, WiFi - UpToDate site license Result - 40 unopened boxes - few residents and no medical students aware of UpToDate NOTES: The wrong way to fly NOTES: The Wright way to fly A handheld computer is good for storing and displaying information that is the size of your hand, not your arm * x-ray images vs x-ray reports * complete medical records vs blood results and jobs lists Result - search more textbooks in your hand than an entire bookshelf full of books NOTES: Advantages of handheld computers Perhaps the best computer ever designed for clinicians * Mobility * Synchronization * Beaming NOTES: Databases There are many ways of storing your data - Memo Pad / Notes - Spreadsheets - Simple databases
  • 3. - Bespoke databases NOTES: Memo Pad / Notes Fast and simple But... limited NOTES: Spreadsheets - Excel To Go or Pocket Excel - Easy and great for calculations - But problems with security, error checking, synchronization and relational data. NOTES: Database software - Everything is a database – quite right too! - Software like HanDBase makes it easy to get started. http://www.ddhsoftware.com/handbase.html -eg surgical logbook http://www.handheldsfordoctors.com/learn/organisation/surgicallogbook.htm Bespoke databases - Allow advanced user interface - Expensive and require computer expertise NOTES: Security NOTES: Five steps to analyse security systems “Beyond Fear” by Bruce Schneier. Springer; 1 edition (July 28, 2003). Recommended software is TealLock Corporate edition (www.tealpoint.com) for Palm Powered devices and SafeGuard PDA (www.utimaco.com) for Pocket PCs. Both allow numeric keypads for passwords and encryption of specific files (eg HanDBase files). Five steps to analyse security systems 1 - What assets are you trying to protect? 2 - What are the risks to those assets? 3 - How well does the security solution mitigate those risks? 4 - What other risks does the security solution cause? 5 - What costs and trade-offs does the security solution impose?
  • 4. NHS Information Authority Security Toolkit The toolkit is available from Tom Lillywhite tom.lillywhite@nhsia.nhs.uk, version 3.0 has just been released. A good (ie short) introduction to the UK Government's Risk Analysis and Management Method (CRAMM) is available at http://www.gammassl.co.uk/topics/hot5.html. Risk Analysis Risk is normally defined as the chance or likelihood of damage or loss. In CRAMM this definition is extended to include the impact of damage or loss. That is, it is a function of two separate components, the likelihood that an unwanted incident will occur and the impact that could result from the incident. Risk Analysis involves identifying and assessing risks to data and the information system and network which support it. Typical risks include: • data being lost, destroyed or wiped • data being corrupted • data being disclosed without authority • data being interfered in various ways during transmission. The processes involved in risk analysis are identifying assets, valuing the assets, threats and vulnerabilities, and then calculating the risk. 1. Assets – Physical assets; End user services; Software assets; Data assets 2. Threat and vulnerabilities •Masquerading of User Identity (by insiders; by contracted service providers; by outsiders) •Unauthorised use of an application • Introduction of damaging or disruptive software • Misuse of system resources • Communications infiltration; interception; manipulation; failure • Repudiation • Embedding of malicious code • Accidental mis-routing • Technical failure of host; storage facility; print facility • Technical failure of network distribution component; gateway; management or operation host; interface; service • Power failure • Air conditioning failure • Application software failure • Operations error • Maintenance error (software; hardware) • User error • Fire; water damage; natural disaster • Staff shortage • Theft by insiders; outsiders • Willful damage by insiders; outsiders • Terrorism 3. Countermeasures
  • 5. Training users • Palm OS Simulator - http://www.palmos.com/dev/tools/simulator/ • MS Windows Mobile Emulator - http://www.microsoft.com/downloads/details.aspx?FamilyId=4953D34D-692F-4C87-AC69- CB235DBDAD1D&displaylang=en • Palm Graffiti Alphabet printout – http://www.palmone.com/us/products/input/graffiti2_alphabet.pdf NHS Lanarkshire nurses Hospital Emergency Care Teams - Hospital at night has 2 specially trained Nurses + 5 medics - Team manages all sick patients in the hospital. No JHOs. - Nurses triage all calls, structured clinical assessments, IV cann, bloods inc ABG, ECGs, male cath, prescribe O2 Hector - Very detailed activity data - Ability to generate hand-over registers + reports - Reference info at the bedside - 24/7 availability, fast interaction, security - Printed clinical assessments at the bedside NOTES: NLM Mobile http://www.nlm.nih.gov/mobile me@mo.md
  • 6. Further reading • Open source handheld computer software – see http://freedomsoftware.info/content/view/31/45/#software_yates. Part of “Free Software for Busy People” by Mohammad Al-Ubaydli. Idiopathic Publishing, 2005. Entire book is available free online at http://freedomsoftware.info/content/section/1/45/. • Pharmaceutical references at ePocrates (www.epocrates.com) and MedHand (www.medhand.com). • HanDBase tutorials at http://www.ddhsoftware.com/support.html • QEH hematology department – chapter 12 of “Handheld computers for doctors” and as a paper: Mohammad Al-Ubaydli, Laura Deans: Introduction Of Handheld Computers Into The Haematology Department Of A District General Hospital. The Internet Journal of Pediatrics and Neonatology. 2003. Volume 3 Number 1. http://www.mo.md/id155.htm • QEH family practice – chapter 13 of “Handheld computers for doctors”. We discussed with the GPs instances when the practice's reliance on paperwork was most irritating to the doctors. Three areas became apparent: 1 - The personal development plan; 2 - Tracking of expenses; 3 - The cataloguing of useful clinical literature. http://www.handheldsfordoctors.com/book/text/chapter13.htm • QEH internal medicine department – chapater 14 of “Handheld computers for doctors”. Like many hospitals in the UK, this one has been trying to cope with the reduction in junior doctors' hours. Reducing hours means increasing reliance on the shift system; more shifts mean more handovers; and handovers carry with them the risk of reducing continuity of care. The consultants asked whether handhelds could assist in providing this continuity. http://www.handheldsfordoctors.com/book/text/chapter14.htm • Beyond Fear, by Bruce Schneier. Springer, 2003. A security book that manages to be entertaining bedtime reading. The five-step process of analysing a security situation is well worth remembering. http://www.schneier.com/ • Security Engineering: A Guide to Building Dependable Distributed Systems, by Ross Anderson. John Wiley & Sons Ltd, 2001. Excellent textbook on all aspects of security peppered with hilarious anecdotes. Chapter 3 on passwords and chapter 8 on the BMA security model are particularly useful for clinicians. http://www.cl.cam.ac.uk/~rja14/book.html • DatePak allows you to share calendars with the rest of your team. http://www.handheldsfordoctors.com/learn/organisation/datepak.htm • RepliGo is good for storing read-only documents on a handheld computer. This is ideal for local guidelines and protocols. http://www.handheldsfordoctors.com/learn/ebooks/repligo.htm • Offline web browsers allow you to download a website for later reading on your handheld computer. The commercial iSilo is available for Palm Powered and Pocket PC devices (www.isilo.com) while Plucker is freely available for Palm Powered devices (www.plkr.org). • Software – http://www.handango.com