The Remote Control Operated Nightmare: Bill Gates Arizona-The New African Village
11-22-2017
Discussion Post Unit 7 Directions:
Response from: Miss. Bayo Elizabeth Cary, AA, BA, MLIS
- Evaluating the Use of IoT technology With Health Care
Health care
information systems have advanced greatly over the last decade. Just recently,
the term, "Internet of things" (IoT) has been introduced and defined
as "a user-friendly technology that allows everything to be connected and
also allows effective communication between the connected 'things."'
(Rajput et. al., 2016). In the health care industry, IoT is being deployed to
advance health care security applications that will allow data to be accessed
via mobile devices and the cloud.
Part I:
·
Discuss some of the:
·
IoT Strategies;
·
Technologies; and
·
Methods-
you would
recommend that the organization implement in improve overall patience care,
lower overall health care costs, and provide a higher level of security of PII
data.
Part 2:
Explain how
you would approach a recommendation that attempts to discourage or reject the
use of some of these strategies, as having an imbalance between the benefits of
the tool and the risks to the information assets of the patient and
organization by their use.
Response
from: Miss. Bayo Elizabeth Cary, AA, BA, MLIS
According to IDC,
the installed base of the IoT will grow to about 212
billion globally
by the end of 2020.
(Schwartz, 2016, p. 1)
The Biggest Lie Ever-IoT is An
Improvement-Everything Computer Controlled-Who Has the Remote?
Smart
buildings around the country are now much more efficient and secure, thanks to
sensors that monitor temperature, electricity, video surveillance and more.
Manufacturers can ensure better quality control as a result of thousands of
sensors measuring machine operating data and part quality. Retailers can
provide better customer service, thanks to smart shelves that can detect low
inventory and smart shopping carts that can direct customers to the right
aisles based on their digital shopping lists. Hospitals and doctors’ offices
can improve patient care by using remote monitoring for everything from heart
rate to blood sugar levels.
(Schwartz,
2016, p. 1)
I live in an
apartment, that was renovated. The entire building is high-tech. The room
temperature, and the hot-water heater, even the elevator, and the hallway, and
lobby lighting-not just the electric, are on a computer grid. The apartment, is
a remote-control nightmare.
The NSA in the apartment above me-illegally
STALKING me, and, who are threatening-my-life, use a remote control, and alter
everything in my living space, all day, and all night, to make me, as
uncomfortable, as the possibly can. The rooms, are always to hot. I turn the
air down, the remote is used, to turn the air, back up. The sink water, is
never hot enough. I need to wash my dishes, and the was water is Luke-warm. I fall
asleep at night, the thermostat, set, at a comfortable 45 degrees, Fahrenheit,
and I wake up, and it is a hot, sticky 71 degrees. I hate the computerized building.
IoT Strategies: How the World Could Be
Too Connected:
The general premise, behind: IoT, is to
connect-everything (Mitchell, 2014, p. 13). The more connections, the more
access to information there is, and the more opportunities, for data
information loss, and security breaches. Healthcare Information, should not be
handled, online, on processed through computer systems. There are endemic
risks, pertaining to IoT connectivity. One, can not reasonably expect, privacy
rights, to be maintained. There are too many, security, and privacy violations,
associated, with maintaining: private, personal, confidential information-in
the form, of data, and computerized information. A computer, is designed as a
matrix interface-information, comes on, and off the computer with ease. A
computer, was never designed, to maintain the privacy, of any information.
IoT Convergence of New Technologies:
Internet Connective Devices:
Healthcare information-in my personal-opinion,
is of a more personal nature, than a visa credit card, or an order from
Amazon.com. When making decisions, about what needs to be maintained, as a
private, and personal conversation, people need to be realistic, about what can
be kept private, and, what was never designed, to secure data. The conversations,
online, and in stores, about: improved security for computers, new encryption
devices, software that will automatically preview data, and inspect communications-are
all a dishonest distraction, from the truth-your data, will never be safe
enough. The more devices you connect, the more WiFi bandwidth, and the longer
the distance, of the bandwidth-the more room, for: “hackers,” and other IT
professionals.
IoT Methods: How the Uncontrolled
Spread of Filth-Will Infect the Planet:
IoT, is in some ways, and interesting
idea, for applications, that require: high data speeds, and larger bandwidths,
to transmit, dense graphics, and images. The Methods, and the marketing plan,
for IoT Intl-is to: “push products,” that people may not normally be interested
in, to gain exponential financial rewards (Mitchell, 2014, p. 12-16). Most of the
time, high-return investments, are high-risk investments, like: cigarette
industry, or child porn- on the: “black market.”
There will always be concern, for
violations, and for abuses. Peodiphilles-post, the most disgusting, offensive,
scary, crazy videos to YouTube, imaginable. The FBI-hardly ever prosecute a
case-although, they do complain, once-in-a-blue-moon. The Internet, is widely
uncontrolled. US, and Intl laws, hardly touch, what is uploaded, and shared
online. In the end, when the risks, of sharing healthcare information online,
are weighed against, a simple file cabinet, in the corner, of a small, “private”
obscure medical office-I think it better, to avoid computers.
References
Mitchell, Robert, L. (2014). Internet of Things. Computerworld.
Vol. 48, No. 7. p. 12-16. Retrieved from www.computerworld.com
Schwartz, Karen. (2016). Making
Sense of the Internet of Things with Converged Infrastructure. Windows IT Pro
(Online). Penton Media, Inc., Penton Business Media, Inc. p. 1-3. Retrieved
from http://library.capella.edu/login?url=https://search.proquest.com/docview/17750972
82?accountid=27965
Comments
Post a Comment