LECTURES AT THE SCHOOL OF nURSING 202223 - Copy.pptx
1. `Content
• Computer Network
• Computer security
• Specialty Applications of Computer and
Information Technology
Nursing Informatics and Telemedicine
2. Computer Network
Introduction
A telecommunications network that allows computers to
exchange data.
Physical connection between computing devices using
either cable media or wireless media.
An example of computer network is the internet.
•DEFINITION
Interconnection of two or more computers to communicate and
share available resources.
Collection of computing devices that are connected in
various ways in order to communicate and share resources
3. Components of Computer Network
Host; (PC, laptops, handhelds)two or more
computers
Routers and Switches
Cables
Protocols
Network Interface Card
Applications (Network Services)
Humans and service Agents
Operating System Software
4. Components of Data Communication
Message
Sender
Receiver
Transmission medium
Protocol
Data Flow Commmunication
Simplex: information is sent in one direction only, also known as
unidirectional
Half duplex : data can be transmitted in both directions on a signal
carrier, but not at the same time.
Full duplex: data can be transmitted in both directions on a signal
carrier at the same time. For example, on a local area network with a
technology that has full-duplex transmission, one workstation can be
sending data on the line while another workstation is receiving data.
5. Terminologies of Computer Network
Nodes (workstations)”:a host computer
Server: A computer that facilitates "the sharing of data"
software" and hardware - resources (e.g. "printers"
modems etc,) on the network“
Non dedicated server: computer that works as a
workstation as well as a server
Dedicated server: a computer reserved for server's job and
its only job is to help workstations access data, software
and hardware resources. It does not double-up as a
workstation and such a server is known as dedicated
server.
Network Interface Unit(NIU): A network interface unit is
an interpreter that helps to establish communication
between the server and workstations.
6. Benefits of Computer Network
The network provided to the users can be divided into two categories
a. Sharing
b. Connectivity
Resourcesthatareshared
Hardware: printer, hard disk etc
Software: sharing reduces the cost of software installation,
saves space on hard disk.
Other benefits include
Increased speed
Reduced cost
Improved security
Centralized software managements
Electronic mail
Flexible access
7. Applications of Computer Network
Marketing and sales: use to collect, exchange and analyze data relating to
customers need and product development cycle
Financial services: application that deals credit history, investment services,
electronic fund transfer, automatic pay checks deposit
Manufacturing: used in manufacturing process itself. Two applications that
use networks to provide essential services are computer-assisted design
(CAD) and computer-assisted manufacturing (CAM)both allows multiple
users work on a project simultaneously
Electronic messaging
Directory services: Directory services allow lists of files to be stored in
a central location to speed worldwide search operations.
Information services: Network information services include bulletin
boards and data banks. A World Wide Web site offering the technical
specifications for a new product is an information service.
Teleconferencing: Teleconferencing allows conferences to occur
without the participants being in the same place.
Cellular telephone
8. • Applications of Computer Network
• Cable television
• Resource sharing
• Instant messaging
• Parrallel computing
• Interaction with other users using dynamic
web pages
9. History of Computer Networks
19th
Century was the age of Steam Engine
The Switching 60’s
Telephone network is the dominating communication network.
Used circuit switching
Packet switching: The first packet switching network;IMP (Interface message processor) was
installed at UCLA
• 1972:
ARPAnet is now consistent of 15 nodes, its the first host-to-host protocol
NCP (Network Control Protocol) enables applications to be written
First e-mail program; TCP/IP replacing NCP as the standard host protocol for ARPAnet
• 1990 :
E-mail, this is a key component of the web
HTML, HTTP, web server and a web browser is developed in the early 90’s
93: web browsers with GUI.
95: Web commerce
20th
Century was information gathering, processing and distribution
• 2000 The rest now is history
10. Classification of Computer Network
Network are classified based on factors such as
Geographical Span
Inter connectivity
Administration
Architecture
Classification according to Geographical Span and size
Personal Area Networks (PANs)
Local Area Networks (LANs)
Metropolitan Area Networks (MANs)
Wide Area Networks (WANs)
Campus Area Network(CANs)
11. Personal Area Network
used for communication among computer and different
information technological devices close to one person.
is a network organized around an individual person.
Consists of a mobile computer, a cell phone or personal
digital assistant. PAN enables the communication among
these devices.
Used for communication among personal devices
themselves for connecting to a digital level network and
internet.
Constructed using wireless or cables
Example are Bluetooth enables devices, connection
btw laptops, computers, mobiles, and PDAs and it
could extends to 10metres.
12. Local Area Network
LAN connects computers and devices in a limited
geographical area.
Easy to design and troubleshoot
Exchange of information and sharing of resources issimple.
In LAN all machines are connected to a single cable.
Topologies such as star, tree, bus, and ring can be used
in LAN
It is usually a privately owned network.
Each computer or device on the network is a node.
Wired LANs are most likely based on Ethernet
technology.
13. • Metropolitan Area Network
It is in between LAN & WAN technology that covers the entire
city.
It uses similar technology as LAN.
MAN is a large computer network that usually spans a city
or a large campus.
A MAN is optimized for a larger geographical area than in
LAN.
A MAN might be owned and operated by a single
organization, but used by many individuals and
organizations.
A MAN often acts as a high speed network to allow sharing
of regional resources.
A MAN typically covers an area of between 5 and 50 km
diameter. Example is Telephone company network that
provides a high speed DSL to customers and cable TV
network.
14. Wide Area Network
•WAN is a computer network that covers a large geographic
area such as a city, country, or spans even whole of the
world.
A WAN is two or more LANs connected together. The
LANs can be many miles apart.
A WAN uses a communications channel that combines many
types of media such as telephone lines, cables, and air waves.
A WAN often makes use of transmission facilities provided by
common carriers, such as telephone companies.
The world popular WAN is the internet.
15. Campus Area Network
The campus area network is made up of an
interconnection of LAN with limited
geographical area.
Network equipment's such as switches, routers and
the transmission media i.e. optical fibre etc are
almost entirely owned by the campus owner.
17. area
covered
Design
and
mainte
nance
Easy Not easy Not easy
Commun
ication
mediu
m
Coaxial
cable
PSTN or
satelli
te
links
Coaxial
cables,
PSTN,
optical
fibre,
cables,
wireless
Bandwidth Low High moderate
Data
rates(sp
eed)
High Low moderate
DISTINGUISH BETWEEN
LAN,WAN,MAN
18. Networking type by Architecture
•The architecture of a network is a logical
design that determines how the devices in
the network communicate.
•The commonly used architectures for
computer networks are:
•Client-server architecture
•Peer-to-peer architecture
•Hybrid architecture
19. Client-Server Architecture
The devices communicate to other devices through a central
computer referred to as a server which control access to the data
and database software.
The server is a terminal with high processing power, which
provides services like security and administration of the network.
The client is a terminal that accesses the resources available on
a server.
Nodes are called clients.
Local area network(LAN) is based on client server network
relationship.
A client-server network is one in which all available network
resources such as files, directories, applications and shared devices,
are centrally managed and hosted and then are accessed by
client.
20. Peer to Peer Architecture
No specific distinction exists between a
client and a server.
Any node can provide a service as well as
send a request for a service.
Allows sharing of resources, data, and users.
Each node on the network has full control over
the network resources because all nodes are
equal. Each node controls its own resources.
Most modern OS allow P2PN
21. Hybrid Architecture
A hybrid, in general, is a composition of two
different types of elements.
A hybrid network architecture is created to get
the benefits of both, the peer-to-peer and the
client-server architectures, in a network.
22. Type of Server
Web server: A web server delivers web pages to clients using the HTTP or
HTTPS protocol.
•File server: A file server stores data documents such as Microsoft Word, Excel, and
PowerPoint files. The file server typically offers permission capabilities so that you
can control who can access what files.
•Print server: A print server is used to share printers with network clients and queue
print jobs while they are waiting to be printed.
•DHCP server: A DHCP server is responsible for handing out IP addresses to clients
on the network so that you do not need to run around to each client and manually
configure an IP address.
•DNS server: A DNS server is responsible for translating fully qualified domain
names such as www.gleneclarke.com to its IP address.
•Proxy server: A proxy server is responsible for sending requests to the Internet on
behalf of the user.
•Mail server: A mail server is responsible for sending and receiving email for users
within the company.
Authentication server: An authentication server stores all of the usernames and
passwords for the network in a database, and is responsible for verifying the
username and password of the users when they log onto the network
23. Network Topology
It is the pattern of interconnection of nodes in a network.
It determines the manner in which information is
exchanged within the network, network performance,
network size and collision detection.
The different types of network topologies that can be
used to set up a network are:
Bus Topology
Star Topology
Ring Topology
Mesh Topology
Tree Topology
Hybrid Topology
24. Bus Topology
Single transmission medium onto which various nodes
are attached.
It is the popular topology for data network.
Normally coaxial cable is used.
– Advantages
• Easy to setup
• Small amount of wire
– Disadvantages
• Slow
• Easy to crash
25. Star Topology
• Connects nodes over a network using a central control unit called the hub;
i.e all nodes connect to a hub.
Packets are sent to the hub while the hub sends packet to destination.
You can easily add nodes to a star-based network by attaching the required
nodes to the hub.
Setting up a star topology requires a lot of
cabling because all the nodes have to
connect to the hub.
– Advantages
• Easy to setup
• One cable can not crash network
– Disadvantages
• One hub crashing downs entire
network
• Uses lots of cable
26. Ring Topology
Connects the nodes on a network through a point- to-point
connection in a circle.
Data is accepted from one neighboring node transmitted to other
through a token.
Data travels in one direction therefore nodes wait for tokens to
send.
If one of the nodes on the network stops, the entire network
stops.
– Advantages
• Time to send data is known
• No data collisions
– Disadvantages
• Slow
• Lots of cable
27. Mesh Topology
Each node is connected to more than one node and all the
computer connected together.
This provide an alternate route mechanism. Internet is a
mesh network.
• Advantages
Data will always be delivered
Excellent for long distance networking.
Supports back-up and rerouting.
Used in large internetworking environments with stars,
rings and buses as nodes .
– Disadvantages
Lots of cable
Hard to setup
28. Tree Topology
The tree topology is created where the nodes
are connected in a hierarchical manner.
In tree topology, the device at the root is referred
to as the parent for all the other nodes or devices
in the network.
The nodes below a parent node are reffered to as
child nodes.
29. Hybrid Topology
The hybrid topology can be a combination of
two or more basic topologies, such as bus, ring,
star, mesh, or tree.
Hybrid networks combine more than two
topologies, which, in turn, enable you to get
advantages of the constituent topologies
30. Internetwork/Internet
What is internet
•A network of networks, joining many government,
university and private computers together and providing
an infrastructure for the use of E-mail, bulletin boards,
file archives, hypertext documents, databases and other
computational resources
• The vast collection of computer networks which form
and act as a single huge network for transport of data
and messages across distances which can be anywhere
from the same office to anywhere in the world.
• The largest network of networks in the world.
• Uses TCP/IP protocols and packet switching .
• Runs on any communications substrate.
31. Brief History About the Internet
• 1968 - DARPA (Defense Advanced Research Projects Agency) contracts with BBN
(Bolt, Beranek & Newman) to create ARPAnet
• 1970 - First five nodes:
– UCLA
– Stanford
– UC Santa Barbara
– U of Utah, and
– BBN
• 1974 - TCP specification by Vint Cerf
• 1984 – On January 1, the Internet with its 1000 hosts converts en masse to using
TCP/IP for its messaging
The Creation of the Internet
• The creation of the Internet solved the following challenges:
– Basically inventing digital networking as we know it
– Survivability of an infrastructure to send / receive high-speed electronic
messages
– Reliability of computer messaging
32. Advantages of Internet
The Internet provides opportunities galore, and can be used for a variety of things;
It is an online correspondence system. With you can send and receive instant
electronic messages.
Access Information: The Internet is a virtual treasure trove of information.
Shopping where you can conduct your transaction.
Online Chat: there are many ‘chat rooms’ on the web that can be accessed to
meet new people, make new friends.
Downloading Software: This is one of the most happening and fun things to do
via the Internet. You can download innumerable, games, music, videos, movies
etc.
Video calls and web conferencing
Online services
Online education
33. Disadvantages of Internet
Leakages and theft of personal information
Spam mail
virus
Addiction to Internet: Some people spend a great
amount of time on the Internet. This affects their social
interactions
Pornography
Access to wrong information
Obesity and other health issues
• Identity theft, hacking, and cheating. ...
• Affects focus and patience.
34. Computer Security
Computer security basically is the protection of computer systems and
information from harm, theft, and unauthorized use. It is the process of
preventing and detecting unauthorized use of your computer system.
Computer facilities are physically protected for three reasons:
• To prevent theft of or damage to the hardware
• To prevent theft of or damage to the information
• To prevent disruption of service
Components that could be secured
1. Hardware: physical part of the computer, like the system memory and disk
drive.
2. Firmware: permanent software that runs the processes of the computer and
is mostly invisible to the user,
3. Software: programming that offers services to the user and administrator.
The operating system, word processor, computer games, and Internet
browser are all examples of software commonly found on a computer.
35. Information Security
• Practices intended to keep data secure from unauthorized access or
alterations when it's being stored and when it's being transmitted
• Ways of securing data
• Backing-up files on removable external disks periodically so that if
the computer crushes you have something to restore from.
• Keeping backup copies of files in a different location and making
about 3 generations of backup.
• Saving work frequently
• Avoiding viruses.
• Restricting access to the computer room. Access could be only
through codes, voice recognition etc.
• Installing fire alarms
• Lining computer rooms with fire resistant material
• Placing the computer room in upper floors of a building to avoid
buglers.
• Having a security guard overnight
36. • Computer Security
• A User ID is a string of characters that are typed at the
log on prompt dialogue box to identify a particular
user. E.g. ICDL30
• A password is a secret code that a user enters after
typing the User ID. This code gives the user
permission to access the system.
Computer Viruses
• These are man-made harmful programs.
• They are man’s attempts to sabotage data and they are created
merely to disturb the normal functioning of a computer system.
37. How Computer Viruses Spread
• The exchange of infected storage devices
• Infected E-mail attachments.
Anti Virus measure
• Do not open an e-mail attachment of unknown origin,
• Use virus scanning software to clean your disks,
• Install reputable anti-virus software on your computer, e.g.
Quick heal etc
38. Data Privacy
Data is information that has been translated into a form that is
efficient for movement or processing.
Data is information that is built into the computer system by the
organisation
Data privacy involves the safeguarding of data from unauthorised
access. It can be achieved by:
• Use of passwords
• Periodic changing of passwords
• Access controls/rights (which include read only access where changes are not
permitted; write access- which gives the right to change contents of a file;
execute access- which gives the right to execute a program, but not to read or
change the program code). Access Controls can be applied to both file or to
individual fields within a record.
• Use of secure software:- to keep the computer system locked when not in use.
• Secure Operating Systems will not allow you to log on if the username and
password are not recognized by the server.
• Encryption:- protects data during storage and transmission by applying a
formula to the data to make it unreadable.
39. Software Privacy
copying, reproduction, use, or manufacture of software
products
Software piracy harms everyone in the software
community
i. Piracy results in higher prices for duly licensed users
ii. Piracy reduces level of support
iii. Delays in the funding and development of new
products, causing the overall selection of software to
suffer.
40. Types of Software piracy
Softlifting :This form of piracy occurs when extra copies of a
program are made within an organization for employees to use. It
also includes "Disk swapping" among friends and associates.
Hard disk loading: Dealers load unauthorized copies of software
onto the hard disks of the computers they offer for sale, as an
incentive for an end user
Counterfeiting : This is the illegal duplication and sale of
copyrighted software, often in a form designed to make the product
appear legitimate
Online : This form of piracy occurs when copyrighted
software is downloaded to users connected through a modem
to an electronic bulletin board or the Internet without the
express permission of the copyright owner.
41. Cyber Attack
What is a Cyber Attack?
A cyber attack is an assault launched by cybercriminals using
one or more computers against a single or multiple computers or
networks.
A cyber attack can maliciously disable computers, steal data, or
use a breached computer as a launch point for other attacks.
Cybercriminals use a variety of methods to launch a cyber attack, including
malware, phishing, ransomware, denial of service, among other methods.
Cyber attacks aim to disable, disrupt, destroy or control computer systems or
to alter, block, delete, manipulate or steal the data held within these systems.
42. Reason for Cyber Attacks
1. Disrupting a business’ continuity:
2. Information theft and manipulating data
3. Creating chaos and fear by disrupting critical
infrastructure
4. Financial loss to the target
5. Achieving a state’s military objectives
6. Demanding ransom
7. Damaging the reputation of target
8. Propagating religious or political beliefs:
43. Types of attacks
i. Denial of service- this is an attack used to restrict the user’s
access to the system resources by flooding the server with
useless traffic
ii. Malware attack-This is a malicious program that disrupts
or damages the computer. There are four main types of
malware namely Keylogger, virus, worms, trojan.
iii. Man in the middle
iv. Phishing
v. Eavesdropping:
vi. SQL injection
vii. Password attack
viii.Social engineering
ix. Zero day exploit
x. Website defacement
44. Steps for preventing cyber attacks
• Install top security antivirus software and endpoint protection
• Outsource protection needs to a cybersecurity firm
• Set online safety guidelines
• Protect employee information and store data securely
• Encrypt data when sharing or uploading online
• Teach employees about online safety
• Create complex passwords or use passphrases
• Perform a regular audit of your cyber protection procedures
• Scan and monitor networks to prevent breaches
• Establish mutual cyber security policies with business partners
45. SPECIALITY APPLICATIONS OF COMPUTER AND INFORMATION
TECHNOLOGY
• NURSING INFORMATICS(Definition)
Informatics is defined as computer science + information
science.
The “science and practice (that) integrates nursing, its
information and knowledge, with management of information
and communication technologies to promote the health of
people, families, and communities worldwide.
The application of computer technology to all fields of nursing
—nursing service, nurse education, and nursing research.
Nursing informatics is a combination of nursing science,
information science, and computer science to manage and
process nursing data, information and knowledge to facilitate
the delivery of health care.
•(Graves and Corcoran(1989)
46. Goals of Nursing Informatics
• To improve the health of people and
communities while reducing costs.
• Optimizes information management and
communication.
• Establishing effective administrative system in
managing and delivering educational
experiences.
• Promoting nursing research through enhanced
management of medical data.
47. APPLICATION OF NURSING INFORMATICS
• Nursing Informatics can be applied to all areas
of nursing practice which include;
Clinical Practice,
Administration
Education
Research
48. • Point-of-Care Systems and Clinical Information Systems
Work lists to remind staff of planned nursing interventions.
Electronic Medical Record (EMR) and Computer- Based Patient Record
(CPR)Monitoring devices that record vital signs and other measurements
directly into the client record (electronic medical record)
Computer - generated nursing care plans ,critical pathways.
Automatic billing for supplies or procedures with nursing
documentation
Reminders and prompts that appear during documentation to ensure
comprehensive charting
• Nursing Administration
E-mail for improved communication
Automated staff scheduling
Cost analysis and finding trends for budget purposes
Quality assurance and outcomes analysis
49. Nursing Education
Computerized record-keeping
Computerized-assisted instruction
Interactive video technology
Distance Learning-Web based courses and degree
programs
Internet resources-CEU's and formal nursing
courses and degree programs
Presentation software for preparing slides and
handouts-PowerPoint and MS Word
• Nursing Research
Computerized literature searching-CINAHL, HINARI,
Medline and Web sources
50. BENEFITS OF NURSING
INFORMATICS
Electronic Medical Records(EMR )benefits
Decision support software
shared data;
centralized control;
improved data integrity;
improved data security, and database systems;
flexible conceptual design.
More easily archived
Standardized and customized reportinh
Legible
More accurate patient data, less chance of error
Document set maintained
51. DISADVANTAGES
Complex conceptual design process
Need for multiple external databases
Need to hire database-related employees
High DBMS acquisition costs
A more complex programmer environment
Potentially catastrophic program failures
A longer running time for individual
applications
Highly dependent DBMS operations
Increased costs to startup, maintain, train, and upgrade
Computer literacy required-fear of computers
Confidentiality, privacy and security difficult
to guarantee
52. HEALTH CARE EDUCATION
• Definition
• “A process aimed at encouraging people to want to be healthy,
to know how to stay healthy, to do what they can individually
and collectively to maintain health and to seek help when
needed”
• Health education and Behaviour
The behaviours to be adopted or modified may be that of
individuals, groups (such as families, health professionals,
organizations or institutions) or entire community.
Strategies designed to influence the behaviour of individuals
or groups will vary greatly depending upon the specific
disease (or health problem) concerned.
Health education can help to increase knowledge and to
reinforce desired behaviour patterns
53. AIMS AND OBJECTIVES
To encourage people to adopt and sustain a
health promoting life style and practices.
To promote the proper use of health services
available to them.
To arouse interest, provide new knowledge,
improve skill and change attitudes in
making rational decisions to solve their
own problems.
To stimulate individual and community self-
reliance and participation to achieve health
development through individual and
community involvement.
54. EXAMPLES OF HEALTH
EDUCATION ACTIVITIES
Lectures
Courses
Seminars
Webinars
Workshops
Classes
• CHARACTERISTICS OF HEALTH EDUCATION
STRATEGIES
Participation of the target population
Completion of a community needs assessments to identify
community capacity, resources, priorities, and needs.
Planned learning activities that increase participants'
knowledge and skills.
Implementation of programs with integrated, well-planned
curricula and materials that take place in a setting convenient
for participants.
55. APPROACH TO HEALTH CARE
EDUCATION
Regulatory approach
Service approach
Health education approach
Primary health care approach
• Regulatory Approach
It is either directly or indirectly by governmental intervention designed to
alter the human behaviour.
No govt. can pass legislation to eat a balanced diet or not to smoke. The
congress defeat in 1977 elections is due to enforcement of sterilization
campaign in 1976.
• Service Approach
This approach was tried by Basic Health Services in 1960’s.
It aimed at providing all the health services needed by the people at their
door steps but this approach proved a failure because it was not based on
felt-needs of the people.
56. Health Education Approach
People must be educated through planned learning
experiences what to do and to be informed, educated
and encouraged to make their own choice for healthy
life.
Problems like cessation of smoking, use of safe water
supply, fertility control can be solved by health
education.
Health education should be started among
children and young population.
• Primary Heath Care Approach
• This is a new approach started from the people
with their full participation and active
involvement in the planning and delivery of health
services.
57. PRINCIPLE OF HEALTH EDUCATION
1)Credibility – is the degree to which the message to be communicated is perceived as
trustworthy by the receiver.
2)Interest – the message should be to the interest of receiver.
3)Participation - People have a right and duty to participate individually and
collectively in the planning and implementation of the health care.
4)Motivation :the fundamental desire that awakens learning is called motivation.
•5)Comprehension :In health education we must know the level of understanding,
education and literacy of people to whom the teaching is directed.
•6)Reinforcement :If the message is repeated in different way the people can remember
it.
7) Learning by doing: Learning is an action - process; not a “memorizing” one.
8) Known to unknown: In health education work, we must proceed“from the simple to
the more complicated;” “from the easy to more difficult”; and “from the known to
the unknown”.
9) Setting an example - The health educator should set a good example in the things
he is teaching.
10)Good human relations - Sharing of information, ideas and feelings happen
most easily between people who have a good relationship.
11) Feed Back - The health educator can modify the elements of the system
(e.g., message, channels) in the light of feedback from his audience.
58. TELEMEDICINE
• Definition
A tool for enhancing health care, public health, and
health education delivery and support, using
electronic communication and information.
Definition by WHO
• Delivery of healthcare services, where distance is a
critical factor, by all healthcare professionals using
information and communication technology for
exchange of valid information for diagnosis,
treatment and prevention of diseases and injuries,
research and evaluation, and for continuing
education of healthcare providers, all in the
interests of advancing the health of individuals and
their communities.
59. OBJECTIVES
To provide specialized medical
advice
To monitor patient condition
To guide other medical staff about
treatment procedure
Share patient data among institutions
for research purpose
60. TYPES OF TELEMEDICINE
Interactive telemedicine services
Tele Specialization
Specialist and primary care consultations
Store-and-forward telemedicine
Remote monitoring
Imaging services
• ECG Machine
•
61. Types of Technology
2 types
Store and forward
For non –
emergency
situations
Teleradiography, tel
eradiopathy &
teledermatolgy
Two-way interactive
television
Video-conferencing.
Almost equivalent to a
face to face ‘real time’
consultation
62. BENEFITS OF TELEMEDICINE TO PATIENT
• Access to specialized health care services to under-
served rural, semi-urban and remote areas
• Early diagnosis and treatment
• Access to expertise of Medical Specialists
• Reduced physician’s fees and cost of medicine
• Reduced visits to specialty hospitals
• Reduced travel expenses
• Early detection of disease
• Reduced burden of morbidity
63. CHALLENGES OF TELEMEDICINE
• Patients' fear and unfamiliarity
• Financial unavailability
• Lack of basic amenities
• Literacy rate and diversity in languages
• Quality aspect
• Government Support
• Perspective of medical practitioners
• Low bandwidth
• Unstable electricity supply
• Cost of equipment and setup