2.50
Hdl Handle:
http://hdl.handle.net/10755/150893
Type:
Presentation
Title:
Internet Health Intervention Incorporated within Clinical Health Records
Abstract:
Internet Health Intervention Incorporated within Clinical Health Records
Conference Sponsor:Sigma Theta Tau International
Conference Year:2011
Author:Hong, OiSaeng, PhD, RN
P.I. Institution Name:University of California, San Francisco
Title:Professor
[2nd International Nursing Research Conference for the World Academy of Nursing Science - Symposium Presentation] The use of computers and computer networks has penetrated modern-day life,
including the health field, where the electronic health record systems, health
intervention, research databases, etc. provide premium examples of the benefits
of modern technology. In particular, internet-based health interventions became
the dominant user interface for various working population including
firefighters. However, these great technological advancements also open the
door to certain great risks. With considerable ubiquity of information
technology in clinical practice and health intervention, health professionals
must bear a great responsibility in adequately protecting the confidentiality
and integrity of sensitive clients' health information. This presentation
will introduce various security measures implemented in an ongoing
internet-based health intervention project where the electronic clinical health
records are incorporated and used to provide tailored intervention. A few
considerations for information security include installing firewalls at key
points along the data transfer pathways and transferring the data between the
networked computers using specific file transfer software, Secure FTP protocol.
Repository Posting Date:
26-Oct-2011
Date of Publication:
17-Oct-2011
Sponsors:
Sigma Theta Tau International

Full metadata record

DC FieldValue Language
dc.typePresentationen_GB
dc.titleInternet Health Intervention Incorporated within Clinical Health Recordsen_GB
dc.identifier.urihttp://hdl.handle.net/10755/150893-
dc.description.abstract<table><tr><td colspan="2" class="item-title">Internet Health Intervention Incorporated within Clinical Health Records</td></tr><tr class="item-sponsor"><td class="label">Conference Sponsor:</td><td class="value">Sigma Theta Tau International</td></tr><tr class="item-year"><td class="label">Conference Year:</td><td class="value">2011</td></tr><tr class="item-author"><td class="label">Author:</td><td class="value">Hong, OiSaeng, PhD, RN</td></tr><tr class="item-institute"><td class="label">P.I. Institution Name:</td><td class="value">University of California, San Francisco</td></tr><tr class="item-author-title"><td class="label">Title:</td><td class="value">Professor</td></tr><tr class="item-email"><td class="label">Email:</td><td class="value">oisaeng.hong@nursing.ucsf.edu</td></tr><tr><td colspan="2" class="item-abstract">[2nd International Nursing Research Conference for the World Academy of Nursing Science - Symposium Presentation] The use of computers and computer networks has penetrated modern-day life, <br/>including the health field, where the electronic health record systems, health <br/>intervention, research databases, etc. provide premium examples of the benefits <br/>of modern technology. In particular, internet-based health interventions became <br/>the dominant user interface for various working population including <br/>firefighters. However, these great technological advancements also open the <br/>door to certain great risks. With considerable ubiquity of information <br/>technology in clinical practice and health intervention, health professionals <br/>must bear a great responsibility in adequately protecting the confidentiality <br/>and integrity of sensitive clients' health information. This presentation <br/>will introduce various security measures implemented in an ongoing <br/>internet-based health intervention project where the electronic clinical health <br/>records are incorporated and used to provide tailored intervention. A few <br/>considerations for information security include installing firewalls at key <br/>points along the data transfer pathways and transferring the data between the <br/>networked computers using specific file transfer software, Secure FTP protocol.</td></tr></table>en_GB
dc.date.available2011-10-26T10:45:49Z-
dc.date.issued2011-10-17en_GB
dc.date.accessioned2011-10-26T10:45:49Z-
dc.description.sponsorshipSigma Theta Tau Internationalen_GB
All Items in this repository are protected by copyright, with all rights reserved, unless otherwise indicated.