`Content
• Computer Network
• Computer security
• Specialty Applications of Computer and
Information Technology
Nursing Informatics and Telemedicine
Computer Network
Introduction
 A telecommunications network that allows computers to
exchange data.
 Physical connection between computing devices using
either cable media or wireless media.
 An example of computer network is the internet.
•DEFINITION
 Interconnection of two or more computers to communicate and
share available resources.
 Collection of computing devices that are connected in
various ways in order to communicate and share resources
Components of Computer Network
Host; (PC, laptops, handhelds)two or more
computers
Routers and Switches
Cables
Protocols
Network Interface Card
Applications (Network Services)
Humans and service Agents
 Operating System Software
Components of Data Communication
 Message
 Sender
 Receiver
 Transmission medium
 Protocol
Data Flow Commmunication
 Simplex: information is sent in one direction only, also known as
unidirectional
 Half duplex : data can be transmitted in both directions on a signal
carrier, but not at the same time.
 Full duplex: data can be transmitted in both directions on a signal
carrier at the same time. For example, on a local area network with a
technology that has full-duplex transmission, one workstation can be
sending data on the line while another workstation is receiving data.
Terminologies of Computer Network
 Nodes (workstations)”:a host computer
 Server: A computer that facilitates "the sharing of data"
software" and hardware - resources (e.g. "printers"
modems etc,) on the network“
 Non dedicated server: computer that works as a
workstation as well as a server
 Dedicated server: a computer reserved for server's job and
its only job is to help workstations access data, software
and hardware resources. It does not double-up as a
workstation and such a server is known as dedicated
server.
 Network Interface Unit(NIU): A network interface unit is
an interpreter that helps to establish communication
between the server and workstations.
Benefits of Computer Network
 The network provided to the users can be divided into two categories
a. Sharing
b. Connectivity
 Resourcesthatareshared
 Hardware: printer, hard disk etc
 Software: sharing reduces the cost of software installation,
saves space on hard disk.
Other benefits include
 Increased speed
 Reduced cost
 Improved security
 Centralized software managements
 Electronic mail
 Flexible access
Applications of Computer Network
 Marketing and sales: use to collect, exchange and analyze data relating to
customers need and product development cycle
 Financial services: application that deals credit history, investment services,
electronic fund transfer, automatic pay checks deposit
 Manufacturing: used in manufacturing process itself. Two applications that
use networks to provide essential services are computer-assisted design
(CAD) and computer-assisted manufacturing (CAM)both allows multiple
users work on a project simultaneously
 Electronic messaging
 Directory services: Directory services allow lists of files to be stored in
a central location to speed worldwide search operations.
 Information services: Network information services include bulletin
boards and data banks. A World Wide Web site offering the technical
specifications for a new product is an information service.
 Teleconferencing: Teleconferencing allows conferences to occur
without the participants being in the same place.
 Cellular telephone
• Applications of Computer Network
• Cable television
• Resource sharing
• Instant messaging
• Parrallel computing
• Interaction with other users using dynamic
web pages
History of Computer Networks
 19th
Century was the age of Steam Engine
 The Switching 60’s
 Telephone network is the dominating communication network.
 Used circuit switching
 Packet switching: The first packet switching network;IMP (Interface message processor) was
installed at UCLA
• 1972:
 ARPAnet is now consistent of 15 nodes, its the first host-to-host protocol
 NCP (Network Control Protocol) enables applications to be written
 First e-mail program; TCP/IP replacing NCP as the standard host protocol for ARPAnet
• 1990 :
 E-mail, this is a key component of the web
 HTML, HTTP, web server and a web browser is developed in the early 90’s
 93: web browsers with GUI.
 95: Web commerce
 20th
Century was information gathering, processing and distribution
• 2000 The rest now is history
Classification of Computer Network
Network are classified based on factors such as
 Geographical Span
 Inter connectivity
 Administration
 Architecture
Classification according to Geographical Span and size
Personal Area Networks (PANs)
Local Area Networks (LANs)
Metropolitan Area Networks (MANs)
Wide Area Networks (WANs)
Campus Area Network(CANs)
Personal Area Network
 used for communication among computer and different
information technological devices close to one person.
 is a network organized around an individual person.
 Consists of a mobile computer, a cell phone or personal
digital assistant. PAN enables the communication among
these devices.
 Used for communication among personal devices
themselves for connecting to a digital level network and
internet.
 Constructed using wireless or cables
 Example are Bluetooth enables devices, connection
btw laptops, computers, mobiles, and PDAs and it
could extends to 10metres.
Local Area Network
LAN connects computers and devices in a limited
geographical area.
Easy to design and troubleshoot
Exchange of information and sharing of resources issimple.
In LAN all machines are connected to a single cable.
Topologies such as star, tree, bus, and ring can be used
in LAN
It is usually a privately owned network.
Each computer or device on the network is a node.
Wired LANs are most likely based on Ethernet
technology.
• Metropolitan Area Network
It is in between LAN & WAN technology that covers the entire
city.
It uses similar technology as LAN.
MAN is a large computer network that usually spans a city
or a large campus.
A MAN is optimized for a larger geographical area than in
LAN.
A MAN might be owned and operated by a single
organization, but used by many individuals and
organizations.
A MAN often acts as a high speed network to allow sharing
of regional resources.
A MAN typically covers an area of between 5 and 50 km
diameter. Example is Telephone company network that
provides a high speed DSL to customers and cable TV
network.
Wide Area Network
•WAN is a computer network that covers a large geographic
area such as a city, country, or spans even whole of the
world.
 A WAN is two or more LANs connected together. The
LANs can be many miles apart.
 A WAN uses a communications channel that combines many
types of media such as telephone lines, cables, and air waves.
 A WAN often makes use of transmission facilities provided by
common carriers, such as telephone companies.
 The world popular WAN is the internet.
Campus Area Network
 The campus area network is made up of an
interconnection of LAN with limited
geographical area.
 Network equipment's such as switches, routers and
the transmission media i.e. optical fibre etc are
almost entirely owned by the campus owner.
WAN
MAN
CAN
PAN
LAN
area
covered
Design
and
mainte
nance
Easy Not easy Not easy
Commun
ication
mediu
m
Coaxial
cable
PSTN or
satelli
te
links
Coaxial
cables,
PSTN,
optical
fibre,
cables,
wireless
Bandwidth Low High moderate
Data
rates(sp
eed)
High Low moderate
DISTINGUISH BETWEEN
LAN,WAN,MAN
Networking type by Architecture
•The architecture of a network is a logical
design that determines how the devices in
the network communicate.
•The commonly used architectures for
computer networks are:
•Client-server architecture
•Peer-to-peer architecture
•Hybrid architecture
Client-Server Architecture
The devices communicate to other devices through a central
computer referred to as a server which control access to the data
and database software.
The server is a terminal with high processing power, which
provides services like security and administration of the network.
The client is a terminal that accesses the resources available on
a server.
Nodes are called clients.
 Local area network(LAN) is based on client server network
relationship.
 A client-server network is one in which all available network
resources such as files, directories, applications and shared devices,
are centrally managed and hosted and then are accessed by
client.
Peer to Peer Architecture
 No specific distinction exists between a
client and a server.
 Any node can provide a service as well as
send a request for a service.
 Allows sharing of resources, data, and users.
 Each node on the network has full control over
the network resources because all nodes are
equal. Each node controls its own resources.
 Most modern OS allow P2PN
Hybrid Architecture
 A hybrid, in general, is a composition of two
different types of elements.
 A hybrid network architecture is created to get
the benefits of both, the peer-to-peer and the
client-server architectures, in a network.
Type of Server
 Web server: A web server delivers web pages to clients using the HTTP or
HTTPS protocol.
•File server: A file server stores data documents such as Microsoft Word, Excel, and
PowerPoint files. The file server typically offers permission capabilities so that you
can control who can access what files.
•Print server: A print server is used to share printers with network clients and queue
print jobs while they are waiting to be printed.
•DHCP server: A DHCP server is responsible for handing out IP addresses to clients
on the network so that you do not need to run around to each client and manually
configure an IP address.
•DNS server: A DNS server is responsible for translating fully qualified domain
names such as www.gleneclarke.com to its IP address.
•Proxy server: A proxy server is responsible for sending requests to the Internet on
behalf of the user.
•Mail server: A mail server is responsible for sending and receiving email for users
within the company.
Authentication server: An authentication server stores all of the usernames and
passwords for the network in a database, and is responsible for verifying the
username and password of the users when they log onto the network
Network Topology
It is the pattern of interconnection of nodes in a network.
It determines the manner in which information is
exchanged within the network, network performance,
network size and collision detection.
The different types of network topologies that can be
used to set up a network are:
Bus Topology
Star Topology
Ring Topology
Mesh Topology
Tree Topology
Hybrid Topology
Bus Topology
 Single transmission medium onto which various nodes
are attached.
 It is the popular topology for data network.
 Normally coaxial cable is used.
– Advantages
• Easy to setup
• Small amount of wire
– Disadvantages
• Slow
• Easy to crash
Star Topology
• Connects nodes over a network using a central control unit called the hub;
i.e all nodes connect to a hub.
 Packets are sent to the hub while the hub sends packet to destination.
 You can easily add nodes to a star-based network by attaching the required
nodes to the hub.
 Setting up a star topology requires a lot of
cabling because all the nodes have to
connect to the hub.
– Advantages
• Easy to setup
• One cable can not crash network
– Disadvantages
• One hub crashing downs entire
network
• Uses lots of cable
Ring Topology
 Connects the nodes on a network through a point- to-point
connection in a circle.
 Data is accepted from one neighboring node transmitted to other
through a token.
 Data travels in one direction therefore nodes wait for tokens to
send.
 If one of the nodes on the network stops, the entire network
stops.
– Advantages
• Time to send data is known
• No data collisions
– Disadvantages
• Slow
• Lots of cable
Mesh Topology
 Each node is connected to more than one node and all the
computer connected together.
 This provide an alternate route mechanism. Internet is a
mesh network.
• Advantages
 Data will always be delivered
 Excellent for long distance networking.
 Supports back-up and rerouting.
 Used in large internetworking environments with stars,
rings and buses as nodes .
– Disadvantages
 Lots of cable
 Hard to setup
Tree Topology
The tree topology is created where the nodes
are connected in a hierarchical manner.
In tree topology, the device at the root is referred
to as the parent for all the other nodes or devices
in the network.
The nodes below a parent node are reffered to as
child nodes.
Hybrid Topology
The hybrid topology can be a combination of
two or more basic topologies, such as bus, ring,
star, mesh, or tree.
Hybrid networks combine more than two
topologies, which, in turn, enable you to get
advantages of the constituent topologies
Internetwork/Internet
What is internet
•A network of networks, joining many government,
university and private computers together and providing
an infrastructure for the use of E-mail, bulletin boards,
file archives, hypertext documents, databases and other
computational resources
• The vast collection of computer networks which form
and act as a single huge network for transport of data
and messages across distances which can be anywhere
from the same office to anywhere in the world.
• The largest network of networks in the world.
• Uses TCP/IP protocols and packet switching .
• Runs on any communications substrate.
Brief History About the Internet
• 1968 - DARPA (Defense Advanced Research Projects Agency) contracts with BBN
(Bolt, Beranek & Newman) to create ARPAnet
• 1970 - First five nodes:
– UCLA
– Stanford
– UC Santa Barbara
– U of Utah, and
– BBN
• 1974 - TCP specification by Vint Cerf
• 1984 – On January 1, the Internet with its 1000 hosts converts en masse to using
TCP/IP for its messaging
The Creation of the Internet
• The creation of the Internet solved the following challenges:
– Basically inventing digital networking as we know it
– Survivability of an infrastructure to send / receive high-speed electronic
messages
– Reliability of computer messaging
Advantages of Internet
The Internet provides opportunities galore, and can be used for a variety of things;
 It is an online correspondence system. With you can send and receive instant
electronic messages.
 Access Information: The Internet is a virtual treasure trove of information.
 Shopping where you can conduct your transaction.
 Online Chat: there are many ‘chat rooms’ on the web that can be accessed to
meet new people, make new friends.
 Downloading Software: This is one of the most happening and fun things to do
via the Internet. You can download innumerable, games, music, videos, movies
etc.
 Video calls and web conferencing
 Online services
 Online education
Disadvantages of Internet
 Leakages and theft of personal information
 Spam mail
 virus
 Addiction to Internet: Some people spend a great
amount of time on the Internet. This affects their social
interactions
 Pornography
 Access to wrong information
 Obesity and other health issues
• Identity theft, hacking, and cheating. ...
• Affects focus and patience.
Computer Security
 Computer security basically is the protection of computer systems and
information from harm, theft, and unauthorized use. It is the process of
preventing and detecting unauthorized use of your computer system.
 Computer facilities are physically protected for three reasons:
 • To prevent theft of or damage to the hardware
 • To prevent theft of or damage to the information
 • To prevent disruption of service
Components that could be secured
1. Hardware: physical part of the computer, like the system memory and disk
drive.
2. Firmware: permanent software that runs the processes of the computer and
is mostly invisible to the user,
3. Software: programming that offers services to the user and administrator.
The operating system, word processor, computer games, and Internet
browser are all examples of software commonly found on a computer.
Information Security
• Practices intended to keep data secure from unauthorized access or
alterations when it's being stored and when it's being transmitted
• Ways of securing data
• Backing-up files on removable external disks periodically so that if
the computer crushes you have something to restore from.
• Keeping backup copies of files in a different location and making
about 3 generations of backup.
• Saving work frequently
• Avoiding viruses.
• Restricting access to the computer room. Access could be only
through codes, voice recognition etc.
• Installing fire alarms
• Lining computer rooms with fire resistant material
• Placing the computer room in upper floors of a building to avoid
buglers.
• Having a security guard overnight
• Computer Security
• A User ID is a string of characters that are typed at the
log on prompt dialogue box to identify a particular
user. E.g. ICDL30
• A password is a secret code that a user enters after
typing the User ID. This code gives the user
permission to access the system.
Computer Viruses
• These are man-made harmful programs.
• They are man’s attempts to sabotage data and they are created
merely to disturb the normal functioning of a computer system.
How Computer Viruses Spread
• The exchange of infected storage devices
• Infected E-mail attachments.
Anti Virus measure
• Do not open an e-mail attachment of unknown origin,
• Use virus scanning software to clean your disks,
• Install reputable anti-virus software on your computer, e.g.
Quick heal etc
Data Privacy
 Data is information that has been translated into a form that is
efficient for movement or processing.
 Data is information that is built into the computer system by the
organisation
Data privacy involves the safeguarding of data from unauthorised
access. It can be achieved by:
• Use of passwords
• Periodic changing of passwords
• Access controls/rights (which include read only access where changes are not
permitted; write access- which gives the right to change contents of a file;
execute access- which gives the right to execute a program, but not to read or
change the program code). Access Controls can be applied to both file or to
individual fields within a record.
• Use of secure software:- to keep the computer system locked when not in use.
• Secure Operating Systems will not allow you to log on if the username and
password are not recognized by the server.
• Encryption:- protects data during storage and transmission by applying a
formula to the data to make it unreadable.
Software Privacy
 copying, reproduction, use, or manufacture of software
products
 Software piracy harms everyone in the software
community
i. Piracy results in higher prices for duly licensed users
ii. Piracy reduces level of support
iii. Delays in the funding and development of new
products, causing the overall selection of software to
suffer.
Types of Software piracy
Softlifting :This form of piracy occurs when extra copies of a
program are made within an organization for employees to use. It
also includes "Disk swapping" among friends and associates.
Hard disk loading: Dealers load unauthorized copies of software
onto the hard disks of the computers they offer for sale, as an
incentive for an end user
Counterfeiting : This is the illegal duplication and sale of
copyrighted software, often in a form designed to make the product
appear legitimate
Online : This form of piracy occurs when copyrighted
software is downloaded to users connected through a modem
to an electronic bulletin board or the Internet without the
express permission of the copyright owner.
Cyber Attack
What is a Cyber Attack?
 A cyber attack is an assault launched by cybercriminals using
one or more computers against a single or multiple computers or
networks.
 A cyber attack can maliciously disable computers, steal data, or
use a breached computer as a launch point for other attacks.
 Cybercriminals use a variety of methods to launch a cyber attack, including
malware, phishing, ransomware, denial of service, among other methods.
 Cyber attacks aim to disable, disrupt, destroy or control computer systems or
to alter, block, delete, manipulate or steal the data held within these systems.
Reason for Cyber Attacks
1. Disrupting a business’ continuity:
2. Information theft and manipulating data
3. Creating chaos and fear by disrupting critical
infrastructure
4. Financial loss to the target
5. Achieving a state’s military objectives
6. Demanding ransom
7. Damaging the reputation of target
8. Propagating religious or political beliefs:
Types of attacks
i. Denial of service- this is an attack used to restrict the user’s
access to the system resources by flooding the server with
useless traffic
ii. Malware attack-This is a malicious program that disrupts
or damages the computer. There are four main types of
malware namely Keylogger, virus, worms, trojan.
iii. Man in the middle
iv. Phishing
v. Eavesdropping:
vi. SQL injection
vii. Password attack
viii.Social engineering
ix. Zero day exploit
x. Website defacement
Steps for preventing cyber attacks
• Install top security antivirus software and endpoint protection
• Outsource protection needs to a cybersecurity firm
• Set online safety guidelines
• Protect employee information and store data securely
• Encrypt data when sharing or uploading online
• Teach employees about online safety
• Create complex passwords or use passphrases
• Perform a regular audit of your cyber protection procedures
• Scan and monitor networks to prevent breaches
• Establish mutual cyber security policies with business partners
SPECIALITY APPLICATIONS OF COMPUTER AND INFORMATION
TECHNOLOGY
• NURSING INFORMATICS(Definition)
 Informatics is defined as computer science + information
science.
 The “science and practice (that) integrates nursing, its
information and knowledge, with management of information
and communication technologies to promote the health of
people, families, and communities worldwide.
 The application of computer technology to all fields of nursing
—nursing service, nurse education, and nursing research.
 Nursing informatics is a combination of nursing science,
information science, and computer science to manage and
process nursing data, information and knowledge to facilitate
the delivery of health care.
•(Graves and Corcoran(1989)
Goals of Nursing Informatics
• To improve the health of people and
communities while reducing costs.
• Optimizes information management and
communication.
• Establishing effective administrative system in
managing and delivering educational
experiences.
• Promoting nursing research through enhanced
management of medical data.
APPLICATION OF NURSING INFORMATICS
• Nursing Informatics can be applied to all areas
of nursing practice which include;
 Clinical Practice,
 Administration
 Education
 Research
• Point-of-Care Systems and Clinical Information Systems
 Work lists to remind staff of planned nursing interventions.
 Electronic Medical Record (EMR) and Computer- Based Patient Record
(CPR)Monitoring devices that record vital signs and other measurements
directly into the client record (electronic medical record)
 Computer - generated nursing care plans ,critical pathways.
 Automatic billing for supplies or procedures with nursing
documentation
 Reminders and prompts that appear during documentation to ensure
comprehensive charting
• Nursing Administration
 E-mail for improved communication
 Automated staff scheduling
 Cost analysis and finding trends for budget purposes
 Quality assurance and outcomes analysis
Nursing Education
Computerized record-keeping
Computerized-assisted instruction
Interactive video technology
Distance Learning-Web based courses and degree
programs
Internet resources-CEU's and formal nursing
courses and degree programs
Presentation software for preparing slides and
handouts-PowerPoint and MS Word
• Nursing Research
 Computerized literature searching-CINAHL, HINARI,
Medline and Web sources
BENEFITS OF NURSING
INFORMATICS
 Electronic Medical Records(EMR )benefits
 Decision support software
 shared data;
 centralized control;
 improved data integrity;
 improved data security, and database systems;
 flexible conceptual design.
 More easily archived
 Standardized and customized reportinh
 Legible
 More accurate patient data, less chance of error
 Document set maintained
DISADVANTAGES
 Complex conceptual design process
 Need for multiple external databases
 Need to hire database-related employees
 High DBMS acquisition costs
 A more complex programmer environment
 Potentially catastrophic program failures
 A longer running time for individual
applications
 Highly dependent DBMS operations
 Increased costs to startup, maintain, train, and upgrade
Computer literacy required-fear of computers
 Confidentiality, privacy and security difficult
to guarantee
HEALTH CARE EDUCATION
• Definition
• “A process aimed at encouraging people to want to be healthy,
to know how to stay healthy, to do what they can individually
and collectively to maintain health and to seek help when
needed”
• Health education and Behaviour
 The behaviours to be adopted or modified may be that of
individuals, groups (such as families, health professionals,
organizations or institutions) or entire community.
 Strategies designed to influence the behaviour of individuals
or groups will vary greatly depending upon the specific
disease (or health problem) concerned.
 Health education can help to increase knowledge and to
reinforce desired behaviour patterns
AIMS AND OBJECTIVES
 To encourage people to adopt and sustain a
health promoting life style and practices.
 To promote the proper use of health services
available to them.
 To arouse interest, provide new knowledge,
improve skill and change attitudes in
making rational decisions to solve their
own problems.
 To stimulate individual and community self-
reliance and participation to achieve health
development through individual and
community involvement.
EXAMPLES OF HEALTH
EDUCATION ACTIVITIES
 Lectures
 Courses
 Seminars
 Webinars
 Workshops
 Classes
• CHARACTERISTICS OF HEALTH EDUCATION
STRATEGIES
 Participation of the target population
 Completion of a community needs assessments to identify
community capacity, resources, priorities, and needs.
 Planned learning activities that increase participants'
knowledge and skills.
 Implementation of programs with integrated, well-planned
curricula and materials that take place in a setting convenient
for participants.
APPROACH TO HEALTH CARE
EDUCATION
 Regulatory approach
 Service approach
 Health education approach
 Primary health care approach
• Regulatory Approach
 It is either directly or indirectly by governmental intervention designed to
alter the human behaviour.
 No govt. can pass legislation to eat a balanced diet or not to smoke. The
congress defeat in 1977 elections is due to enforcement of sterilization
campaign in 1976.
• Service Approach
 This approach was tried by Basic Health Services in 1960’s.
 It aimed at providing all the health services needed by the people at their
door steps but this approach proved a failure because it was not based on
felt-needs of the people.
Health Education Approach
 People must be educated through planned learning
experiences what to do and to be informed, educated
and encouraged to make their own choice for healthy
life.
 Problems like cessation of smoking, use of safe water
supply, fertility control can be solved by health
education.
 Health education should be started among
children and young population.
• Primary Heath Care Approach
• This is a new approach started from the people
with their full participation and active
involvement in the planning and delivery of health
services.
PRINCIPLE OF HEALTH EDUCATION
1)Credibility – is the degree to which the message to be communicated is perceived as
trustworthy by the receiver.
2)Interest – the message should be to the interest of receiver.
3)Participation - People have a right and duty to participate individually and
collectively in the planning and implementation of the health care.
4)Motivation :the fundamental desire that awakens learning is called motivation.
•5)Comprehension :In health education we must know the level of understanding,
education and literacy of people to whom the teaching is directed.
•6)Reinforcement :If the message is repeated in different way the people can remember
it.
7) Learning by doing: Learning is an action - process; not a “memorizing” one.
8) Known to unknown: In health education work, we must proceed“from the simple to
the more complicated;” “from the easy to more difficult”; and “from the known to
the unknown”.
9) Setting an example - The health educator should set a good example in the things
he is teaching.
10)Good human relations - Sharing of information, ideas and feelings happen
most easily between people who have a good relationship.
11) Feed Back - The health educator can modify the elements of the system
(e.g., message, channels) in the light of feedback from his audience.
TELEMEDICINE
• Definition
 A tool for enhancing health care, public health, and
health education delivery and support, using
electronic communication and information.
 Definition by WHO
• Delivery of healthcare services, where distance is a
critical factor, by all healthcare professionals using
information and communication technology for
exchange of valid information for diagnosis,
treatment and prevention of diseases and injuries,
research and evaluation, and for continuing
education of healthcare providers, all in the
interests of advancing the health of individuals and
their communities.
OBJECTIVES
To provide specialized medical
advice
To monitor patient condition
To guide other medical staff about
treatment procedure
Share patient data among institutions
for research purpose
TYPES OF TELEMEDICINE
 Interactive telemedicine services
Tele Specialization
 Specialist and primary care consultations
 Store-and-forward telemedicine
 Remote monitoring
 Imaging services
• ECG Machine
•
Types of Technology
2 types
Store and forward
For non –
emergency
situations
Teleradiography, tel
eradiopathy &
teledermatolgy
Two-way interactive
television
Video-conferencing.
Almost equivalent to a
face to face ‘real time’
consultation
BENEFITS OF TELEMEDICINE TO PATIENT
• Access to specialized health care services to under-
served rural, semi-urban and remote areas
• Early diagnosis and treatment
• Access to expertise of Medical Specialists
• Reduced physician’s fees and cost of medicine
• Reduced visits to specialty hospitals
• Reduced travel expenses
• Early detection of disease
• Reduced burden of morbidity
CHALLENGES OF TELEMEDICINE
• Patients' fear and unfamiliarity
• Financial unavailability
• Lack of basic amenities
• Literacy rate and diversity in languages
• Quality aspect
• Government Support
• Perspective of medical practitioners
• Low bandwidth
• Unstable electricity supply
• Cost of equipment and setup
Thank You!

More Related Content

PDF
Computer network 1
PPTX
Unit 1_Lecture1_Evolution of Computers.pptx
PPT
Computer Networking_XII_CS_CBSE_OFKVS.ppt
PPTX
Data Communication & Network
PPT
viddu Network
PPTX
Computer Networking fundamentals
PPT
Fg c
PPTX
Computer Networking.pptx
Computer network 1
Unit 1_Lecture1_Evolution of Computers.pptx
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Data Communication & Network
viddu Network
Computer Networking fundamentals
Fg c
Computer Networking.pptx

Similar to LECTURES AT THE SCHOOL OF nURSING 202223 - Copy.pptx (20)

PPTX
Computer networks
PPT
Fundamental concepts of ComputersNetworks.ppt
PPTX
Computer network
PPTX
NETWORK AND SECURITY-Dr.Poovendran R.pptx
PPTX
COMPUTER NETWORK With it's Types and Layer
PPT
basic networking and topologies explained.ppt
PPTX
Computer Network for Class 12 CBSE Board
PPTX
Telecommunications, Internet and Wireless Technology
PPTX
Acem lan
PPTX
S5 MCE. UNIT 3 COMPUTER SCIENCE.pptx
PDF
Networking fundamentalsss
PDF
Computer network
PPT
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
PPTX
final NEtworking.pptx
PPTX
Lecture-03 - Introduction To Network.pptx
PPTX
Introduction to Network best concept about Net
PDF
Computer Network | BBA First Semester
PPTX
Networking
PPTX
Basicnetworkconcepts 140422021634-phpapp01
Computer networks
Fundamental concepts of ComputersNetworks.ppt
Computer network
NETWORK AND SECURITY-Dr.Poovendran R.pptx
COMPUTER NETWORK With it's Types and Layer
basic networking and topologies explained.ppt
Computer Network for Class 12 CBSE Board
Telecommunications, Internet and Wireless Technology
Acem lan
S5 MCE. UNIT 3 COMPUTER SCIENCE.pptx
Networking fundamentalsss
Computer network
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
final NEtworking.pptx
Lecture-03 - Introduction To Network.pptx
Introduction to Network best concept about Net
Computer Network | BBA First Semester
Networking
Basicnetworkconcepts 140422021634-phpapp01
Ad

Recently uploaded (20)

PPTX
Power Point PR B.Inggris 12 Ed. 2019.pptx
PDF
FYJC - Chemistry textbook - standard 11.
PPTX
Neurology of Systemic disease all systems
PDF
Health aspects of bilberry: A review on its general benefits
PPTX
Thinking Routines and Learning Engagements.pptx
PDF
Diabetes Mellitus , types , clinical picture, investigation and managment
PDF
Compact First Student's Book Cambridge Official
PPTX
Cite It Right: A Compact Illustration of APA 7th Edition.pptx
PDF
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...
PDF
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
PPTX
BSCE 2 NIGHT (CHAPTER 2) just cases.pptx
PDF
0520_Scheme_of_Work_(for_examination_from_2021).pdf
PPTX
2025 High Blood Pressure Guideline Slide Set.pptx
PPTX
Q2 Week 1.pptx Lesson on Kahalagahan ng Pamilya sa Edukasyon
PPTX
Diploma pharmaceutics notes..helps diploma students
PDF
Chevening Scholarship Application and Interview Preparation Guide
PPTX
Theoretical for class.pptxgshdhddhdhdhgd
PPTX
IT infrastructure and emerging technologies
PPT
hsl powerpoint resource goyloveh feb 07.ppt
PPTX
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
Power Point PR B.Inggris 12 Ed. 2019.pptx
FYJC - Chemistry textbook - standard 11.
Neurology of Systemic disease all systems
Health aspects of bilberry: A review on its general benefits
Thinking Routines and Learning Engagements.pptx
Diabetes Mellitus , types , clinical picture, investigation and managment
Compact First Student's Book Cambridge Official
Cite It Right: A Compact Illustration of APA 7th Edition.pptx
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
BSCE 2 NIGHT (CHAPTER 2) just cases.pptx
0520_Scheme_of_Work_(for_examination_from_2021).pdf
2025 High Blood Pressure Guideline Slide Set.pptx
Q2 Week 1.pptx Lesson on Kahalagahan ng Pamilya sa Edukasyon
Diploma pharmaceutics notes..helps diploma students
Chevening Scholarship Application and Interview Preparation Guide
Theoretical for class.pptxgshdhddhdhdhgd
IT infrastructure and emerging technologies
hsl powerpoint resource goyloveh feb 07.ppt
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
Ad

LECTURES AT THE SCHOOL OF nURSING 202223 - Copy.pptx

  • 1. `Content • Computer Network • Computer security • Specialty Applications of Computer and Information Technology Nursing Informatics and Telemedicine
  • 2. Computer Network Introduction  A telecommunications network that allows computers to exchange data.  Physical connection between computing devices using either cable media or wireless media.  An example of computer network is the internet. •DEFINITION  Interconnection of two or more computers to communicate and share available resources.  Collection of computing devices that are connected in various ways in order to communicate and share resources
  • 3. Components of Computer Network Host; (PC, laptops, handhelds)two or more computers Routers and Switches Cables Protocols Network Interface Card Applications (Network Services) Humans and service Agents  Operating System Software
  • 4. Components of Data Communication  Message  Sender  Receiver  Transmission medium  Protocol Data Flow Commmunication  Simplex: information is sent in one direction only, also known as unidirectional  Half duplex : data can be transmitted in both directions on a signal carrier, but not at the same time.  Full duplex: data can be transmitted in both directions on a signal carrier at the same time. For example, on a local area network with a technology that has full-duplex transmission, one workstation can be sending data on the line while another workstation is receiving data.
  • 5. Terminologies of Computer Network  Nodes (workstations)”:a host computer  Server: A computer that facilitates "the sharing of data" software" and hardware - resources (e.g. "printers" modems etc,) on the network“  Non dedicated server: computer that works as a workstation as well as a server  Dedicated server: a computer reserved for server's job and its only job is to help workstations access data, software and hardware resources. It does not double-up as a workstation and such a server is known as dedicated server.  Network Interface Unit(NIU): A network interface unit is an interpreter that helps to establish communication between the server and workstations.
  • 6. Benefits of Computer Network  The network provided to the users can be divided into two categories a. Sharing b. Connectivity  Resourcesthatareshared  Hardware: printer, hard disk etc  Software: sharing reduces the cost of software installation, saves space on hard disk. Other benefits include  Increased speed  Reduced cost  Improved security  Centralized software managements  Electronic mail  Flexible access
  • 7. Applications of Computer Network  Marketing and sales: use to collect, exchange and analyze data relating to customers need and product development cycle  Financial services: application that deals credit history, investment services, electronic fund transfer, automatic pay checks deposit  Manufacturing: used in manufacturing process itself. Two applications that use networks to provide essential services are computer-assisted design (CAD) and computer-assisted manufacturing (CAM)both allows multiple users work on a project simultaneously  Electronic messaging  Directory services: Directory services allow lists of files to be stored in a central location to speed worldwide search operations.  Information services: Network information services include bulletin boards and data banks. A World Wide Web site offering the technical specifications for a new product is an information service.  Teleconferencing: Teleconferencing allows conferences to occur without the participants being in the same place.  Cellular telephone
  • 8. • Applications of Computer Network • Cable television • Resource sharing • Instant messaging • Parrallel computing • Interaction with other users using dynamic web pages
  • 9. History of Computer Networks  19th Century was the age of Steam Engine  The Switching 60’s  Telephone network is the dominating communication network.  Used circuit switching  Packet switching: The first packet switching network;IMP (Interface message processor) was installed at UCLA • 1972:  ARPAnet is now consistent of 15 nodes, its the first host-to-host protocol  NCP (Network Control Protocol) enables applications to be written  First e-mail program; TCP/IP replacing NCP as the standard host protocol for ARPAnet • 1990 :  E-mail, this is a key component of the web  HTML, HTTP, web server and a web browser is developed in the early 90’s  93: web browsers with GUI.  95: Web commerce  20th Century was information gathering, processing and distribution • 2000 The rest now is history
  • 10. Classification of Computer Network Network are classified based on factors such as  Geographical Span  Inter connectivity  Administration  Architecture Classification according to Geographical Span and size Personal Area Networks (PANs) Local Area Networks (LANs) Metropolitan Area Networks (MANs) Wide Area Networks (WANs) Campus Area Network(CANs)
  • 11. Personal Area Network  used for communication among computer and different information technological devices close to one person.  is a network organized around an individual person.  Consists of a mobile computer, a cell phone or personal digital assistant. PAN enables the communication among these devices.  Used for communication among personal devices themselves for connecting to a digital level network and internet.  Constructed using wireless or cables  Example are Bluetooth enables devices, connection btw laptops, computers, mobiles, and PDAs and it could extends to 10metres.
  • 12. Local Area Network LAN connects computers and devices in a limited geographical area. Easy to design and troubleshoot Exchange of information and sharing of resources issimple. In LAN all machines are connected to a single cable. Topologies such as star, tree, bus, and ring can be used in LAN It is usually a privately owned network. Each computer or device on the network is a node. Wired LANs are most likely based on Ethernet technology.
  • 13. • Metropolitan Area Network It is in between LAN & WAN technology that covers the entire city. It uses similar technology as LAN. MAN is a large computer network that usually spans a city or a large campus. A MAN is optimized for a larger geographical area than in LAN. A MAN might be owned and operated by a single organization, but used by many individuals and organizations. A MAN often acts as a high speed network to allow sharing of regional resources. A MAN typically covers an area of between 5 and 50 km diameter. Example is Telephone company network that provides a high speed DSL to customers and cable TV network.
  • 14. Wide Area Network •WAN is a computer network that covers a large geographic area such as a city, country, or spans even whole of the world.  A WAN is two or more LANs connected together. The LANs can be many miles apart.  A WAN uses a communications channel that combines many types of media such as telephone lines, cables, and air waves.  A WAN often makes use of transmission facilities provided by common carriers, such as telephone companies.  The world popular WAN is the internet.
  • 15. Campus Area Network  The campus area network is made up of an interconnection of LAN with limited geographical area.  Network equipment's such as switches, routers and the transmission media i.e. optical fibre etc are almost entirely owned by the campus owner.
  • 17. area covered Design and mainte nance Easy Not easy Not easy Commun ication mediu m Coaxial cable PSTN or satelli te links Coaxial cables, PSTN, optical fibre, cables, wireless Bandwidth Low High moderate Data rates(sp eed) High Low moderate DISTINGUISH BETWEEN LAN,WAN,MAN
  • 18. Networking type by Architecture •The architecture of a network is a logical design that determines how the devices in the network communicate. •The commonly used architectures for computer networks are: •Client-server architecture •Peer-to-peer architecture •Hybrid architecture
  • 19. Client-Server Architecture The devices communicate to other devices through a central computer referred to as a server which control access to the data and database software. The server is a terminal with high processing power, which provides services like security and administration of the network. The client is a terminal that accesses the resources available on a server. Nodes are called clients.  Local area network(LAN) is based on client server network relationship.  A client-server network is one in which all available network resources such as files, directories, applications and shared devices, are centrally managed and hosted and then are accessed by client.
  • 20. Peer to Peer Architecture  No specific distinction exists between a client and a server.  Any node can provide a service as well as send a request for a service.  Allows sharing of resources, data, and users.  Each node on the network has full control over the network resources because all nodes are equal. Each node controls its own resources.  Most modern OS allow P2PN
  • 21. Hybrid Architecture  A hybrid, in general, is a composition of two different types of elements.  A hybrid network architecture is created to get the benefits of both, the peer-to-peer and the client-server architectures, in a network.
  • 22. Type of Server  Web server: A web server delivers web pages to clients using the HTTP or HTTPS protocol. •File server: A file server stores data documents such as Microsoft Word, Excel, and PowerPoint files. The file server typically offers permission capabilities so that you can control who can access what files. •Print server: A print server is used to share printers with network clients and queue print jobs while they are waiting to be printed. •DHCP server: A DHCP server is responsible for handing out IP addresses to clients on the network so that you do not need to run around to each client and manually configure an IP address. •DNS server: A DNS server is responsible for translating fully qualified domain names such as www.gleneclarke.com to its IP address. •Proxy server: A proxy server is responsible for sending requests to the Internet on behalf of the user. •Mail server: A mail server is responsible for sending and receiving email for users within the company. Authentication server: An authentication server stores all of the usernames and passwords for the network in a database, and is responsible for verifying the username and password of the users when they log onto the network
  • 23. Network Topology It is the pattern of interconnection of nodes in a network. It determines the manner in which information is exchanged within the network, network performance, network size and collision detection. The different types of network topologies that can be used to set up a network are: Bus Topology Star Topology Ring Topology Mesh Topology Tree Topology Hybrid Topology
  • 24. Bus Topology  Single transmission medium onto which various nodes are attached.  It is the popular topology for data network.  Normally coaxial cable is used. – Advantages • Easy to setup • Small amount of wire – Disadvantages • Slow • Easy to crash
  • 25. Star Topology • Connects nodes over a network using a central control unit called the hub; i.e all nodes connect to a hub.  Packets are sent to the hub while the hub sends packet to destination.  You can easily add nodes to a star-based network by attaching the required nodes to the hub.  Setting up a star topology requires a lot of cabling because all the nodes have to connect to the hub. – Advantages • Easy to setup • One cable can not crash network – Disadvantages • One hub crashing downs entire network • Uses lots of cable
  • 26. Ring Topology  Connects the nodes on a network through a point- to-point connection in a circle.  Data is accepted from one neighboring node transmitted to other through a token.  Data travels in one direction therefore nodes wait for tokens to send.  If one of the nodes on the network stops, the entire network stops. – Advantages • Time to send data is known • No data collisions – Disadvantages • Slow • Lots of cable
  • 27. Mesh Topology  Each node is connected to more than one node and all the computer connected together.  This provide an alternate route mechanism. Internet is a mesh network. • Advantages  Data will always be delivered  Excellent for long distance networking.  Supports back-up and rerouting.  Used in large internetworking environments with stars, rings and buses as nodes . – Disadvantages  Lots of cable  Hard to setup
  • 28. Tree Topology The tree topology is created where the nodes are connected in a hierarchical manner. In tree topology, the device at the root is referred to as the parent for all the other nodes or devices in the network. The nodes below a parent node are reffered to as child nodes.
  • 29. Hybrid Topology The hybrid topology can be a combination of two or more basic topologies, such as bus, ring, star, mesh, or tree. Hybrid networks combine more than two topologies, which, in turn, enable you to get advantages of the constituent topologies
  • 30. Internetwork/Internet What is internet •A network of networks, joining many government, university and private computers together and providing an infrastructure for the use of E-mail, bulletin boards, file archives, hypertext documents, databases and other computational resources • The vast collection of computer networks which form and act as a single huge network for transport of data and messages across distances which can be anywhere from the same office to anywhere in the world. • The largest network of networks in the world. • Uses TCP/IP protocols and packet switching . • Runs on any communications substrate.
  • 31. Brief History About the Internet • 1968 - DARPA (Defense Advanced Research Projects Agency) contracts with BBN (Bolt, Beranek & Newman) to create ARPAnet • 1970 - First five nodes: – UCLA – Stanford – UC Santa Barbara – U of Utah, and – BBN • 1974 - TCP specification by Vint Cerf • 1984 – On January 1, the Internet with its 1000 hosts converts en masse to using TCP/IP for its messaging The Creation of the Internet • The creation of the Internet solved the following challenges: – Basically inventing digital networking as we know it – Survivability of an infrastructure to send / receive high-speed electronic messages – Reliability of computer messaging
  • 32. Advantages of Internet The Internet provides opportunities galore, and can be used for a variety of things;  It is an online correspondence system. With you can send and receive instant electronic messages.  Access Information: The Internet is a virtual treasure trove of information.  Shopping where you can conduct your transaction.  Online Chat: there are many ‘chat rooms’ on the web that can be accessed to meet new people, make new friends.  Downloading Software: This is one of the most happening and fun things to do via the Internet. You can download innumerable, games, music, videos, movies etc.  Video calls and web conferencing  Online services  Online education
  • 33. Disadvantages of Internet  Leakages and theft of personal information  Spam mail  virus  Addiction to Internet: Some people spend a great amount of time on the Internet. This affects their social interactions  Pornography  Access to wrong information  Obesity and other health issues • Identity theft, hacking, and cheating. ... • Affects focus and patience.
  • 34. Computer Security  Computer security basically is the protection of computer systems and information from harm, theft, and unauthorized use. It is the process of preventing and detecting unauthorized use of your computer system.  Computer facilities are physically protected for three reasons:  • To prevent theft of or damage to the hardware  • To prevent theft of or damage to the information  • To prevent disruption of service Components that could be secured 1. Hardware: physical part of the computer, like the system memory and disk drive. 2. Firmware: permanent software that runs the processes of the computer and is mostly invisible to the user, 3. Software: programming that offers services to the user and administrator. The operating system, word processor, computer games, and Internet browser are all examples of software commonly found on a computer.
  • 35. Information Security • Practices intended to keep data secure from unauthorized access or alterations when it's being stored and when it's being transmitted • Ways of securing data • Backing-up files on removable external disks periodically so that if the computer crushes you have something to restore from. • Keeping backup copies of files in a different location and making about 3 generations of backup. • Saving work frequently • Avoiding viruses. • Restricting access to the computer room. Access could be only through codes, voice recognition etc. • Installing fire alarms • Lining computer rooms with fire resistant material • Placing the computer room in upper floors of a building to avoid buglers. • Having a security guard overnight
  • 36. • Computer Security • A User ID is a string of characters that are typed at the log on prompt dialogue box to identify a particular user. E.g. ICDL30 • A password is a secret code that a user enters after typing the User ID. This code gives the user permission to access the system. Computer Viruses • These are man-made harmful programs. • They are man’s attempts to sabotage data and they are created merely to disturb the normal functioning of a computer system.
  • 37. How Computer Viruses Spread • The exchange of infected storage devices • Infected E-mail attachments. Anti Virus measure • Do not open an e-mail attachment of unknown origin, • Use virus scanning software to clean your disks, • Install reputable anti-virus software on your computer, e.g. Quick heal etc
  • 38. Data Privacy  Data is information that has been translated into a form that is efficient for movement or processing.  Data is information that is built into the computer system by the organisation Data privacy involves the safeguarding of data from unauthorised access. It can be achieved by: • Use of passwords • Periodic changing of passwords • Access controls/rights (which include read only access where changes are not permitted; write access- which gives the right to change contents of a file; execute access- which gives the right to execute a program, but not to read or change the program code). Access Controls can be applied to both file or to individual fields within a record. • Use of secure software:- to keep the computer system locked when not in use. • Secure Operating Systems will not allow you to log on if the username and password are not recognized by the server. • Encryption:- protects data during storage and transmission by applying a formula to the data to make it unreadable.
  • 39. Software Privacy  copying, reproduction, use, or manufacture of software products  Software piracy harms everyone in the software community i. Piracy results in higher prices for duly licensed users ii. Piracy reduces level of support iii. Delays in the funding and development of new products, causing the overall selection of software to suffer.
  • 40. Types of Software piracy Softlifting :This form of piracy occurs when extra copies of a program are made within an organization for employees to use. It also includes "Disk swapping" among friends and associates. Hard disk loading: Dealers load unauthorized copies of software onto the hard disks of the computers they offer for sale, as an incentive for an end user Counterfeiting : This is the illegal duplication and sale of copyrighted software, often in a form designed to make the product appear legitimate Online : This form of piracy occurs when copyrighted software is downloaded to users connected through a modem to an electronic bulletin board or the Internet without the express permission of the copyright owner.
  • 41. Cyber Attack What is a Cyber Attack?  A cyber attack is an assault launched by cybercriminals using one or more computers against a single or multiple computers or networks.  A cyber attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks.  Cybercriminals use a variety of methods to launch a cyber attack, including malware, phishing, ransomware, denial of service, among other methods.  Cyber attacks aim to disable, disrupt, destroy or control computer systems or to alter, block, delete, manipulate or steal the data held within these systems.
  • 42. Reason for Cyber Attacks 1. Disrupting a business’ continuity: 2. Information theft and manipulating data 3. Creating chaos and fear by disrupting critical infrastructure 4. Financial loss to the target 5. Achieving a state’s military objectives 6. Demanding ransom 7. Damaging the reputation of target 8. Propagating religious or political beliefs:
  • 43. Types of attacks i. Denial of service- this is an attack used to restrict the user’s access to the system resources by flooding the server with useless traffic ii. Malware attack-This is a malicious program that disrupts or damages the computer. There are four main types of malware namely Keylogger, virus, worms, trojan. iii. Man in the middle iv. Phishing v. Eavesdropping: vi. SQL injection vii. Password attack viii.Social engineering ix. Zero day exploit x. Website defacement
  • 44. Steps for preventing cyber attacks • Install top security antivirus software and endpoint protection • Outsource protection needs to a cybersecurity firm • Set online safety guidelines • Protect employee information and store data securely • Encrypt data when sharing or uploading online • Teach employees about online safety • Create complex passwords or use passphrases • Perform a regular audit of your cyber protection procedures • Scan and monitor networks to prevent breaches • Establish mutual cyber security policies with business partners
  • 45. SPECIALITY APPLICATIONS OF COMPUTER AND INFORMATION TECHNOLOGY • NURSING INFORMATICS(Definition)  Informatics is defined as computer science + information science.  The “science and practice (that) integrates nursing, its information and knowledge, with management of information and communication technologies to promote the health of people, families, and communities worldwide.  The application of computer technology to all fields of nursing —nursing service, nurse education, and nursing research.  Nursing informatics is a combination of nursing science, information science, and computer science to manage and process nursing data, information and knowledge to facilitate the delivery of health care. •(Graves and Corcoran(1989)
  • 46. Goals of Nursing Informatics • To improve the health of people and communities while reducing costs. • Optimizes information management and communication. • Establishing effective administrative system in managing and delivering educational experiences. • Promoting nursing research through enhanced management of medical data.
  • 47. APPLICATION OF NURSING INFORMATICS • Nursing Informatics can be applied to all areas of nursing practice which include;  Clinical Practice,  Administration  Education  Research
  • 48. • Point-of-Care Systems and Clinical Information Systems  Work lists to remind staff of planned nursing interventions.  Electronic Medical Record (EMR) and Computer- Based Patient Record (CPR)Monitoring devices that record vital signs and other measurements directly into the client record (electronic medical record)  Computer - generated nursing care plans ,critical pathways.  Automatic billing for supplies or procedures with nursing documentation  Reminders and prompts that appear during documentation to ensure comprehensive charting • Nursing Administration  E-mail for improved communication  Automated staff scheduling  Cost analysis and finding trends for budget purposes  Quality assurance and outcomes analysis
  • 49. Nursing Education Computerized record-keeping Computerized-assisted instruction Interactive video technology Distance Learning-Web based courses and degree programs Internet resources-CEU's and formal nursing courses and degree programs Presentation software for preparing slides and handouts-PowerPoint and MS Word • Nursing Research  Computerized literature searching-CINAHL, HINARI, Medline and Web sources
  • 50. BENEFITS OF NURSING INFORMATICS  Electronic Medical Records(EMR )benefits  Decision support software  shared data;  centralized control;  improved data integrity;  improved data security, and database systems;  flexible conceptual design.  More easily archived  Standardized and customized reportinh  Legible  More accurate patient data, less chance of error  Document set maintained
  • 51. DISADVANTAGES  Complex conceptual design process  Need for multiple external databases  Need to hire database-related employees  High DBMS acquisition costs  A more complex programmer environment  Potentially catastrophic program failures  A longer running time for individual applications  Highly dependent DBMS operations  Increased costs to startup, maintain, train, and upgrade Computer literacy required-fear of computers  Confidentiality, privacy and security difficult to guarantee
  • 52. HEALTH CARE EDUCATION • Definition • “A process aimed at encouraging people to want to be healthy, to know how to stay healthy, to do what they can individually and collectively to maintain health and to seek help when needed” • Health education and Behaviour  The behaviours to be adopted or modified may be that of individuals, groups (such as families, health professionals, organizations or institutions) or entire community.  Strategies designed to influence the behaviour of individuals or groups will vary greatly depending upon the specific disease (or health problem) concerned.  Health education can help to increase knowledge and to reinforce desired behaviour patterns
  • 53. AIMS AND OBJECTIVES  To encourage people to adopt and sustain a health promoting life style and practices.  To promote the proper use of health services available to them.  To arouse interest, provide new knowledge, improve skill and change attitudes in making rational decisions to solve their own problems.  To stimulate individual and community self- reliance and participation to achieve health development through individual and community involvement.
  • 54. EXAMPLES OF HEALTH EDUCATION ACTIVITIES  Lectures  Courses  Seminars  Webinars  Workshops  Classes • CHARACTERISTICS OF HEALTH EDUCATION STRATEGIES  Participation of the target population  Completion of a community needs assessments to identify community capacity, resources, priorities, and needs.  Planned learning activities that increase participants' knowledge and skills.  Implementation of programs with integrated, well-planned curricula and materials that take place in a setting convenient for participants.
  • 55. APPROACH TO HEALTH CARE EDUCATION  Regulatory approach  Service approach  Health education approach  Primary health care approach • Regulatory Approach  It is either directly or indirectly by governmental intervention designed to alter the human behaviour.  No govt. can pass legislation to eat a balanced diet or not to smoke. The congress defeat in 1977 elections is due to enforcement of sterilization campaign in 1976. • Service Approach  This approach was tried by Basic Health Services in 1960’s.  It aimed at providing all the health services needed by the people at their door steps but this approach proved a failure because it was not based on felt-needs of the people.
  • 56. Health Education Approach  People must be educated through planned learning experiences what to do and to be informed, educated and encouraged to make their own choice for healthy life.  Problems like cessation of smoking, use of safe water supply, fertility control can be solved by health education.  Health education should be started among children and young population. • Primary Heath Care Approach • This is a new approach started from the people with their full participation and active involvement in the planning and delivery of health services.
  • 57. PRINCIPLE OF HEALTH EDUCATION 1)Credibility – is the degree to which the message to be communicated is perceived as trustworthy by the receiver. 2)Interest – the message should be to the interest of receiver. 3)Participation - People have a right and duty to participate individually and collectively in the planning and implementation of the health care. 4)Motivation :the fundamental desire that awakens learning is called motivation. •5)Comprehension :In health education we must know the level of understanding, education and literacy of people to whom the teaching is directed. •6)Reinforcement :If the message is repeated in different way the people can remember it. 7) Learning by doing: Learning is an action - process; not a “memorizing” one. 8) Known to unknown: In health education work, we must proceed“from the simple to the more complicated;” “from the easy to more difficult”; and “from the known to the unknown”. 9) Setting an example - The health educator should set a good example in the things he is teaching. 10)Good human relations - Sharing of information, ideas and feelings happen most easily between people who have a good relationship. 11) Feed Back - The health educator can modify the elements of the system (e.g., message, channels) in the light of feedback from his audience.
  • 58. TELEMEDICINE • Definition  A tool for enhancing health care, public health, and health education delivery and support, using electronic communication and information.  Definition by WHO • Delivery of healthcare services, where distance is a critical factor, by all healthcare professionals using information and communication technology for exchange of valid information for diagnosis, treatment and prevention of diseases and injuries, research and evaluation, and for continuing education of healthcare providers, all in the interests of advancing the health of individuals and their communities.
  • 59. OBJECTIVES To provide specialized medical advice To monitor patient condition To guide other medical staff about treatment procedure Share patient data among institutions for research purpose
  • 60. TYPES OF TELEMEDICINE  Interactive telemedicine services Tele Specialization  Specialist and primary care consultations  Store-and-forward telemedicine  Remote monitoring  Imaging services • ECG Machine •
  • 61. Types of Technology 2 types Store and forward For non – emergency situations Teleradiography, tel eradiopathy & teledermatolgy Two-way interactive television Video-conferencing. Almost equivalent to a face to face ‘real time’ consultation
  • 62. BENEFITS OF TELEMEDICINE TO PATIENT • Access to specialized health care services to under- served rural, semi-urban and remote areas • Early diagnosis and treatment • Access to expertise of Medical Specialists • Reduced physician’s fees and cost of medicine • Reduced visits to specialty hospitals • Reduced travel expenses • Early detection of disease • Reduced burden of morbidity
  • 63. CHALLENGES OF TELEMEDICINE • Patients' fear and unfamiliarity • Financial unavailability • Lack of basic amenities • Literacy rate and diversity in languages • Quality aspect • Government Support • Perspective of medical practitioners • Low bandwidth • Unstable electricity supply • Cost of equipment and setup