Forum Replies Created
-
AuthorPosts
-
-
2025-09-22 at 7:37 pm #50780
Wah Wah Lwin
ParticipantAccording to the article by Muhiyaddin R, et al., six general findings revealed real-life scenarios faced by physicians who experience challenges using EMRs in healthcare settings. Although the article did not mention whether EMRs are recorded in real time, the consequences that contribute to physician burnout are equally affecting such as poor quality of care, career dissatisfaction, poor system design, heavy workload/overtime, and alert fatigue.
I had a conversation with a physician working in a private healthcare setting and he explained the situation of the EMR system at his workplace. Since the EMR system requires real-time data entry, it is quite challenging for physicians to manage both EMR recording and patient consultations at the same time. This negatively impacts the quality of care, as the physician must record patient health conditions, history, notes, and clinical findings in the database during the consultation itself. This creates stress for the physician, who struggles to focus fully on the patient while managing database entry.
Moreover, physicians must complete EMR tasks during the consultation in order for other departments (such as nursing, laboratory, or pharmacy) to proceed with the next steps such as blood tests, medications, or follow-up appointments. The system does not allow these steps to move forward unless the physician completes the record. This increases workload and fatigue in addition to consultation duties, and in the long run, may harm both patient-doctor relationships and the quality of care.To reduce such negative consequences:
• The EMR system should be designed with a user-friendly approach, making it less complicated and more time-saving. It should prioritize key data variables and remove unnecessary information. This requires careful planning and involvement of IT and technical experts during the design phase.
• Advocacy and pilot testing should include a proper feedback mechanism so users can share practical, and meaningful input. IT and technical expert teams should act on this feedback to refine and adjust the EMR before full implementation. Feedback without action is ineffective, as EMR systems cannot succeed through a top-down approach alone. All healthcare providers should be actively involved during advocacy and piloting.
• If EMRs are implemented, consultation times should be adjusted in the initial phase,, to allow physicians to become familiar with the system. For example, if physicians previously made consultation with 20 patients per day, the number should be reduced/adjusted to ensure that both consultation quality and EMR recording can be managed without stress. After the initial phase, the system should be re-evaluated by physicians, who should provide feedback on whether the adjustment should continue. In addition, evaluations should be conducted periodically to improve the system over time.
• The EMR system should be flexible by categorizing data into what must be recorded in real time and what can be entered later. This would reduce overtime and help address alert fatigue. -
2025-09-20 at 12:46 pm #50746
Wah Wah Lwin
ParticipantHi Heik Htar! Thank you for your interesting case on cyberattack exploiting Fortra’s GoAnywhere MFT, affecting 4.5 million people. In addition to your preventive measures, we may consider implementing strong multifactor-authentication and zero-trust principles, to enforce strict access control and security, as well as simulation exercises to IT team/staff members.
-
2025-09-18 at 10:18 pm #50700
Wah Wah Lwin
ParticipantBased on insights and several definitions of eHealth on the paper “What is eHealth (6)?”, I would describe it as “The innovative use of digital technologies, guided by a networked and global perspective, to improve the well-being of individuals and communities/population at local, regional and global levels. It integrates personal health monitoring (supporting individuals to manage their well-being), effective communication among health care providers, and the collection and use of health data to support better outcomes in research, policy, and healthcare practices. It aims to enhance efficacy, effectiveness, and efficiency in health systems.”
-
2025-09-18 at 3:24 pm #50696
Wah Wah Lwin
ParticipantHi Kevin! Thanks for sharing this interesting case. A data breach affecting 5.4 million people is huge. In addition to the preventive measures you mentioned, we could also consider strict policy measures on incident response planning, including ransomware attack detection and recovery procedures. Moreover, conducting simulation exercises with real-world scenarios during staff training could strengthen cybersecurity awareness.
-
2025-09-17 at 10:04 pm #50652
Wah Wah Lwin
ParticipantIn addition to Jenny and Thiha’s points, I think Multifactor authentication, which protects data with multiple layers, could be applied to prevent such attacks. Also, strict policy for data privacy and protection should be well in-place and providing training to responsible staff to comply with data standards, data accountability and governance is important.
-
2025-09-17 at 9:49 pm #50650
Wah Wah Lwin
ParticipantThanks Jenny for your interesting and recent story of cyberattack. That was shocking, but I’ve heard that it happens often in those kinds of cyberattack, especially with identity theft. In addition to your points, I think they should strictly follow law enforcement regulations: comply with the country’s privacy laws and data protection standards. Also, staff awareness regarding cybersecurity must be well established.
-
2025-09-17 at 9:21 pm #50645
Wah Wah Lwin
ParticipantIn public health settings, I think COVID-19 data is one of ‘big data’, as the characteristics of data fits into 5Vs:
1.Volume: data provides large numbers of patients’ records such as demography, lab testings, treatments, vaccinations, social-economic, patients-related families’ health history records, etc. The more patients recorded, the bigger size of the data.
2. Velocity: real-time data or daily data reported to public health authorities and different organizations including WHO regarding COVID-19 updates.
3. Variety: Data provides different kinds of data including structured (eg. lab results), unstructured (eg. contact tracing, patient’s records, etc.)
4. Value: the data provides meaningful insights to health authorities to better respond outbreak in targeted areas, as well as strategy to prevent outbreak, and early diagnosis for the outbreak.
5. Veracity: the data can provide the health care providers/health authorities to make better decisions on disease outbreak response.Outside health-care settings, I think social media data such as Youtube, Instagram, Twitter, Facebook as well as Banking systems can be considered as big-data as it fits with 5Vs (at minimum), characteristics of ‘big-data’.
-
2025-09-16 at 3:02 pm #50549
Wah Wah Lwin
ParticipantHi Thiha!
Your case looks interesting, and I would say there was a very huge financial and reputational loss from the attack by UHC. It was over $3 billion in financial loss and 190 million data records stolen!! And yes, as your justifications, it was the lack of two-factor authentication, allowing the attackers to execute a ransomware attack. In addition to your preventive measures, I think the system could also be enhanced by regular cybersecurity audits, in addition to a real-time monitoring system, so that any abnormal activities could be promptly detected and immediate actions taken. In addition to the employees’ cybersecurity awareness, the responsible staff should be well-trained with real-case scenarios so that they could be well-prepared for any potential attacks, as well as minimizing the risk of financial and reputational loss by UHC. -
2025-09-16 at 2:34 pm #50548
Wah Wah Lwin
ParticipantHi Ko Aung!
Your case study is very interesting, and I think you have already provided strong justifications and preventive measures regarding the Heartbleed threat. I would just like to add a few additional points. For example, implementing multi-factor authentication can help minimize data loss or damage to the system. A real-time monitoring system, in addition to regular vulnerability scanning and penetration testing, would allow the system to immediately detect abnormal intrusions. Finally, conducting simulation exercises for organizational staff/IT staff would help them be better prepared for potential attacks and reduce the overall cost of an incident.
-
2025-09-15 at 9:46 pm #50537
Wah Wah Lwin
ParticipantBrief introduction about health informatics project
In my previous organization, we implemented a malaria elimination project under the Regional Artemisinin-Resistance Initiative (RAI3E), in close collaboration with PR-DDC Thailand. The project aimed to accelerate the elimination of Plasmodium falciparum malaria in the Greater Mekong Subregion by achieving high coverage of key interventions through area-based micro-stratification and targeting high-risk areas. The goal was to eliminate local transmission of P. falciparum cases by 2023 and all malaria by 2024. Additional focus was placed on active P. falciparum foci and high-burden provinces, which accounted for most malaria cases, as well as on nine temporary shelters along the Thailand–Myanmar border, to intensify elimination efforts.
This project was funded by the Global Fund through PR-DDC Thailand. As part of the initiative, the organization introduced an online malaria case reporting system using the ‘MIS’ application, integrated with the National Malaria Information System (MIS) managed by the Bureau of Vector Borne Diseases (BVBD). The MIS provides real-time, geo-located data on malaria cases and vector information, enabling timely analysis and response by public health officials at all levels. At our organization, we recorded all malaria screening cases, including both positive and negative results on a daily basis and synchronized them with the national MIS. Any positive cases were reported to the national system within 24 hours. This system replaced paper-based reporting, ensuring faster data transmission and strengthening Thailand’s malaria elimination strategy.
How can this health informatics project help to improve the current practices?
This project contributes to malaria elimination by reducing costs, improving user satisfaction, and achieving superior outcomes:
Cost: The system reduces expenses related to human resources for data collection and storage, as well as paper costs compared to traditional paper-based reporting. It also accelerates reporting and streamlines workflows, helping governments and agencies avoid the high costs of uncontrolled outbreaks and epidemics. The automated functions in the MIS minimize expenses linked to delayed outbreak detection and response. For example, when we reported a P. falciparum positive case within 24 hours to the national MIS, national officials could immediately detect the location, geography, and case classification (imported, indigenous, etc.), allowing them to take prompt and effective action.User Satisfaction: The project delivers real-time or near real-time data, which builds trust and usability for organizations and decision-makers at BVBD, PR-DDC, and MOPH. It reduces workload through automation and synchronization with the national MIS, where reported data can be easily shared, stored, analyzed, and monitored. In addition, it strengthens preparedness for outbreak management and disease prevention.
Superior Outcomes: By providing real-time data to the national MIS, health authorities can respond to outbreaks more rapidly and improve public health outcomes through faster data analysis and timely interventions.
Are there any challenges or difficulties in implementing the project?
Challenges in implementing the project include:
1.Poor internet access in some remote areas, which prevented real-time data reporting. Instead, cases had to be entered into the system once internet became available, often requiring front-line health workers to work overtime or outside regular hours.
2.Because malaria cases must be notified within 24 hours, front-line health workers experienced work–life imbalance due to the urgency of reporting.
3.Delayed IT support when system errors occurred at the project level, which caused interruptions and delayed reporting.
4.staff turnover, which slowed project progress since training new staff to become familiar with the system required additional time and resources.
5.At times, data synchronization issues between the project-level system and the national MIS led to missing or delayed reports, causing reporting discrepancies. -
2025-09-09 at 11:23 pm #50425
Wah Wah Lwin
ParticipantPossible ways the attacker could use to conduct security attack:
Unauthorized access to servers via:
1. Physical means: An attacker could try to gain access by physically entering the server room or data center. If there is no proper security measures such as locks, surveillance, or restricted entry, the attacker could tamper with the equipment, and steal storage devices.
2. User accounts:If we use weak passwords such as using personal data, name, simple and logical words, or share their login credentials, the attackers can easily break in and misuse the system. Phishing attacks or stolen login details can also give outsiders the same level of access as authorized users.
3. Software vulnerabilities: Outdated software or unpatched applications often leave holes in the system that attackers can exploit. Hackers may take advantage of bugs, or misconfigurations to insert malicious code, and spread malware.
4. Weakness of the system: If the system is poorly designed or lacks strong security controls, the attackers can exploit those weaknesses. For example, insufficient encryption, lack of network firewalls, etc. -
2025-09-09 at 3:19 pm #50414
Wah Wah Lwin
ParticipantQ1: Why would you choose cloud server, rather than physical server?
I would choose a cloud server rather than a physical server because it offers several advantages that are particularly important in the hospital setting.
1. Mobility: Patients can conveniently use a web-based application to make doctor appointments from any location where the cloud service is supported. This helps reduce waiting time, improves accessibility, and makes health services more efficient. On the other side, healthcare providers can check, and monitor patients’ data through the app from anywhere, which ensures better continuity of care.
2. Scalability: As the number of patients or services increases, cloud servers allow the system to be expanded quickly without the need to invest in additional physical infrastructure.
3. Data security: Protecting patient information is a top priority in any hospital. Cloud servers offer reliable data protection through encrypted storage, routine backups, and disaster recovery systems. This minimizes the risk of losing sensitive health records and ensures compliance with data protection standards.
4. Cost savings: Compared to physical servers, cloud services reduce the need for heavy investment in IT infrastructure, equipment, and server space. The hospital can save on hardware purchases, and electricity.
5. Maintenance and support: With cloud servers, maintenance responsibilities are handled by the service provider. This reduces the burden on the hospital’s IT staff and ensures timely updates, technical support, and troubleshooting.Q2: What kind of cloud computing service model would be most appropriate (SaaS, PaaS, IaaS)? Why?
In my opinion, the SaaS model would be the most suitable choice for the given scenario. Since the hospital has only one IT officer, it would be difficult to handle all the responsibilities that come with maintaining applications, servers, and infrastructure. By using SaaS, the cloud service provider will take full responsibility for managing the application, data, runtime, middleware, servers, storage, and networking. This reduces the technical burden on the hospital and allows the IT officer to focus on supporting daily operations rather than struggling with complex maintenance tasks.
-
2025-09-02 at 11:09 pm #50274
Wah Wah Lwin
ParticipantInformation technology has become an essential part of outbreak management, but its true value shows when it is adapted to local realities/contexts. During the COVID-19 response in refugee camps, I witnessed how health informatics could make a meaningful difference despite many challenges. Camps were overcrowded, people moved frequently, electricity and internet were unreliable and much of the response relied on trained camp-based assistants such as medics and community health workers. To address these challenges, we developed a Health Information System (HIS) for our team/organization (including managers, HIS/database officers, M&E, lab, nurses, community outreach) tailored specifically to this setting.
Outbreak Detection: With no reliable online platforms, community health workers recorded symptoms and case information on paper, which were later entered into the HIS whenever connectivity was available. The system was not sophisticated but it allowed us to detect unusual clusters of fever or respiratory illness quickly and act before situations escalated.
Response: The HIS also helped us allocate scarce resources more effectively. By tracking suspected and confirmed cases across camp zones, we could prioritize where to send test kits, open isolation areas, or reinforce protective measures. Sharing this same data with partners and authorities improved coordination and reduced duplication, ensuring more consistent and timely responses. By doing so, this helped us avoid problems of fragmentation such as duplicated or inconsistent data, communication gap, and delays in response. Using the same data across partners also made coordination and collaboration smoother.
Control: Just as importantly, the information proved useful for the communities themselves. When clusters were identified, community health workers used the data to deliver targeted health messages in affected areas. This built trust and encouraged adherence to preventive measures, an essential factor in such fragile environments.
From this experience, I learned that health informatics is about having systems which can be integrated, interoperable, sharing, collaborative, and representative that can turn information into effective action. In refugee camps, a locally designed HIS combined with the dedication of community health workers became one of our most effective system for COVID-19 detection, response, and control.
-
2025-09-01 at 11:16 pm #50272
Wah Wah Lwin
ParticipantWith an academic background in human health and health policy, along with professional experience in monitoring, evaluation, and learning, I have public health knowledge in both communicable and non-communicable diseases. In particular, I have worked extensively with communicable diseases such as HIV/TB, malaria, and COVID-19, and developed adequate skills in disease response and prevention. In addition, I have adequate knowledge of data and statistics, as well as in areas of data handling, security, and communication. However, I need to strengthen my knowledge and skills in IT and information science to effectively integrate my expertise and generate actionable insights for decision makers/policymakers in responding to public health threats. Since my role is limited to management, I need to expand my capacity in organizational behavior, human resources, and communication, particularly in collaborating with experts in epidemiology/public health officials, IT, web development, and in engaging stakeholders/targeted audiences. These competencies are essential for advancing public health informatics, as effective and efficient responses to health threats at individual, national, and global levels also depend on them. We can see that COVID-19 pandemic clearly demonstrated the importance of such capabilities.
Last but not least, I need to deepen my understanding of the contemporary political landscape and the priorities/interests of key stakeholders, including political leaders, policymakers, and experts from clinical and public health fields, to ensure that I can provide timely, relevant information to support public health decision-making and effective responses. -
2025-08-27 at 11:20 am #50187
Wah Wah Lwin
ParticipantIf I were a hospital director or executive, I would plan to move the hospital information system to cloud computing for the following reasons. I would choose the PaaS service model as it allows us to manage our own applications and patient, doctor, and hospital operation data, while the cloud provider takes care of storage, runtime, servers, and networking. This setup reduces the risk of data loss and strengthens security.
At the same time, we would still retain control over essential hospital functions such as appointment systems, referrals, duty rosters, and patient records, etc. Another advantage is cost efficiency, cloud computing can reduce both operational and IT expenses.
However, before and during implementation, it is important to establish clear standard operating procedures, guidelines, and policies to ensure data security, protect against breaches, and provide proper maintenance. This will help the system remain sustainable, secure, and cost-effective in the long run for the hospital. -
2025-08-21 at 9:19 pm #50088
Wah Wah Lwin
ParticipantIn my experience, the most common cyber threats I’ve come across at work are phishing emails. They usually look like official messages and try to trick people into clicking a link or sharing sensitive information. Luckily, my organization provides regular training on cybersecurity awareness which has helped me and my colleagues spot suspicious emails right away. The best practice we follow is to report them as phishing to IT so they can take action. Over time, this became a habit and reduced the risk of anyone falling for them.
I also had a personal experience with a cyberattack. One day during a meeting, I suddenly received five SMS messages from my bank, each a few minutes apart, showing money being withdrawn through Apple Pay. I realized immediately that my account had been hacked. I contacted the bank right away, reported the unauthorized withdrawals, and had my account deactivated. I also changed my Apple account password and removed my banking details.
That incident made me much more cautious about data protection. Since then, I always check privacy policies before sharing personal information, make sure my computer and apps are updated, and regularly change my passwords. These small but consistent actions give me more confidence that I’m protecting my information.
From these experiences, I’ve learned that cyber threats can happen anywhere, at work or in daily life but quick action and preventive habits make a big difference. Awareness, training, and personal vigilance are the best defenses, and they’re practices I believe everyone can benefit from.
-
2025-08-15 at 12:28 pm #49993
Wah Wah Lwin
ParticipantHi everyone! I am Wah Wah Lwin from Myanmar, and you can call me Wah Wah for short. I obtained my bachelor degree in Medicine, a postgraduate diploma in Research Studies, and master degree in Public Policy with Health specialization. My work background has been mainly focused on Monitoring and Evaluation for over a decade in NGO settings, with an emphasis on HIV prevention and malaria elimination program in Myanmar, and also malaria elimination program in Thailand (Thai-Myanmar borders) with PR-DDC, and higher education for One Health in the Southeast Asia region. I believe this BHI program will enhance my skills in information management and support my career growth in the future. So, I am truly looking forward to learning and sharing experiences with all of you!
-
2025-08-14 at 11:52 am #49990
Wah Wah Lwin
ParticipantIf I were to build a medical app for patients and doctors as part of the hospital system or workflow, I would choose to build a LAN client/server application for the following reasons.
Firstly, we need to think about the importance of information sharing, particularly in terms of data security and confidentiality. Sensitive patient information, such as patient IDs, medical records, and treatment histories, should be kept confidential and only accessed by authorized medical persons. Thus, these data should comply with strict confidentiality rules. Meanwhile, general information (outside patients medical records by doctors) can be accessed by those involved in the hospital system or workflow. A LAN client/server app keeps the data within the hospital network, which can reduce the risk of breaches.In addition, a hierarchy of information and role-based access, implemented through a relational database system fits well with hospital operation system. This ensures patient data remains accurate, consistent, and better coordinated across the hospital.
Secondly, a LAN client/server application has a relatively lower installation cost, yet offers high-speed components and fast, stable communication (often faster and more reliable than web-based applications). It also provides a secure operating environment for hospital system. However, regular network maintenance and data backups, carried out by IT professionals are essential to protect all patient records and prevent data loss or breaches.
Finally, standard operating procedures/data security protocols should be firmly in place as part of the hospital system. By considering a LAN client/server application integrated with a relational database, the hospital can improve workflow efficiency, protect sensitive information, and deliver faster, more reliable services to patients. This not only improves data security but also improves medical outcomes through better information sharing, monitoring, and analysis.
Please feel free to respond my thoughts!
-
2025-08-06 at 3:16 pm #49934
Wah Wah Lwin
ParticipantBased from my working experience from previous (Non-Profit) organization, I ‘d like to discuss the following points from the Information System (IS). Recently, I worked for Southeast Asia One Health University Network, where the network is comprised of eight universities networks from Southeast Asia member countries. As a network, we support One Health higher education to strengthen professional capacity in addressing emerging diseases both nationally and regionally. To achieve this goal, each component of the IS framework plays an important role. While IS was in place, some components still needed improvement to achieve better outcomes. If we breakdown IS components from the highest to the lowest priority:
1. People: Although the network involved academics and professionals from various fields, there were gaps in capacity and knowledge, particularly in IT-related skills. Even though hardware and software were available, not everyone could use them effectively. Language was also a challenge, participants had different levels of proficiency, and many relied solely on local languages (e.g. Khmer, Bahasa, Laos, etc.). To address this, training should be provided in both technical areas and translating into local languages to help reduce communication barriers.
2. Data: Although the network collected both quantitative and qualitative data, much of it was not effectively turned into useful information. This was due to inconsistent data collection practices, low data quality, and the lack of standardized data management protocols across the university network. Data collection methods also varied. For example, some teams used paper-based tools in resource-limited settings, while others used digital tools with limited data security. To improve this, clear data collection guidelines should be introduced, along with regular monitoring and supervision to ensure reliable data that can be used to inform decision-making.
3. Process: Even though protocols were in place to manage collected data, we were not able to fully utilize it to create impactful insights. The procedures and technical capacity differed among university networks. To solve this, it is important to apply common protocols and procedures across the network so that the data collected can be turned into meaningful information for decision-makers and the wider public.
4. Software: Each university network used different softwares (e.g. Microsoft, One Drive, Google Drive, Box, Jotform, Canva, etc.), depending on their preferences. This created problems when working together, as inconsistent systems made collaboration less efficient. For instance, during the COVID-19 response, it was difficult to obtain real-time data on activities led by different university networks because of the lack of a unified reporting system. To improve future responses, we need to considers to streamline systems to support collaboration and allow faster and more accurate information sharing.
5. Hardware: Although the university networks face fewer problems with hardware compared to other IS components, we should consider upgrading performance and durability to ensure cost-effectiveness.
-
2025-09-23 at 2:41 pm #50790
Wah Wah Lwin
ParticipantHi Jenny! I like your example and ref: for accuracy check on smartwatches :), Indeed, wearable devices make individuals to value the cost of their health!
-
2025-09-21 at 6:13 pm #50774
Wah Wah Lwin
ParticipantHi Jenny!
Thanks for sharing! I think we should consider sustainable approach for WAH system for the long-run as the WAH is more user-friendly and comprehensive to track health programs, which will be beneficial for the health services.
-
2025-09-18 at 9:45 pm #50698
Wah Wah Lwin
ParticipantThank you for sharing your real-world practice in clinical settings. The challenge of transforming data to analysis and insightful impacts is quite big in your practice, especially when there is no standardized criteria to capture the data. And, yes, it’s definitely the issue of interoperability within the setting. Without it and lack of data management procedures could not provide actionable results, and support for decision making (superior outcomes).
-
2025-09-17 at 9:30 pm #50647
Wah Wah Lwin
ParticipantOh! it’s good to know Mio. Thanks for sharing.
-
2025-09-16 at 9:57 pm #50559
Wah Wah Lwin
ParticipantAgreed! Nowadays, “Zhapian” is threatening people from Myanmar and neighbouring countries: Thailand, Cambodia, Laos. In Thailand, many people regardless of age, educational status, gender, have been affected and have lost millions of Baht via different mobile banking systems. Right now, the BOT (Bank of Thailand) is trying to address the cyberattack issues by strictly monitoring and taking actions to strengthen the security of the banking system, such as suspending suspicious banking accounts. However, because this concerns national data security/data security of banking systems, a proper and strategic approach is needed to tackle such a major issue for the country in order to minimize the negative impact on the banking systems and users.
-
2025-09-16 at 9:28 pm #50557
Wah Wah Lwin
ParticipantHi Thiha! Thanks for sharing your experience. I also had similar experiences with the colleagues who were resistant to change, which was very challenging for us to proceed with the new system. So, I could see how effort you had to make for the change, and it did take sometime. Also, language barrier was one of the big challenges, particularly when dealing with the system, and technology.
-
2025-09-12 at 6:29 pm #50503
Wah Wah Lwin
ParticipantHi Ko Aung! Thank you so much for sharing your knowledge on this matter. It’s great to know that different kinds of cyberattack by category.
-
2025-09-09 at 12:44 pm #50411
Wah Wah Lwin
ParticipantHi Jenny! It’s very interesting and seems very practical to manage TB cases at national level by integrating TB information. As you mentioned, all TB service providers registered via the system, which is essential for the national level to continuously monitor the case load and treatment status. Also, TB dashboard provides current trends at multiple levels, which will support future planning, monitoring and decision-making for continuum of care, to prevent/minimize of MDR-TB occurrence. Similar to the Philippines, TB incidence rate in Myanmar is increasing due to several factors including political instability, resource limited settings, deteriorating socio-economic status. But, based on the current situation in MM, it would be very challenging to develop such kind of integrated TB information system at national level. So yeah, it’s great to know that the Philippines is practicing such a good system to tackle TB burden in the country 🙂
-
2025-09-09 at 12:26 pm #50410
Wah Wah Lwin
ParticipantHi Mio! It’s impressive of your experience in applying Python. Though, I have been in M&E fields for a decade, I have never applied nor have adequate knowledge on Python 😀
It’s a popular tool in MM, for data and M&E field, that I have to upgrade my knowledge on it. -
2025-09-08 at 9:42 pm #50401
Wah Wah Lwin
ParticipantHi Phyoe! Thanks for sharing. Although I have been away from DHIS2 for quite a long time, I am curious to know that DHIS2 is still utilized in Myanmar. In saying DHIS2, I suppose it will be focused on ATM (HIV/AIDS, TB, Malaria). Also, it’s curious to know how far it has gone with the impact of DHIS2, as it was initiated in early 2017.
-
2025-09-05 at 10:09 pm #50326
Wah Wah Lwin
ParticipantHi Hteik Htar!
Thanks for sharing your experience with case investigations and management by using KOBO application. We did also utilize KOBO app in malaria case screening, early diagnosis and follow-up by training camp-based attendants. The app is easy to use, and monitor via the system, as well as case reporting purposes. But sadly, we did stop using KOBO app for malaria case detection and management as we shifted to use the app instructed by national malaria team, to streamline the system.
-
2025-08-28 at 1:56 pm #50212
Wah Wah Lwin
ParticipantHi Yin! Glad to know you!
-
2025-08-28 at 1:40 pm #50211
Wah Wah Lwin
ParticipantI like your strategy to gradually move to cloud computing since it would take significant time to move paper records to the cloud computing, as well as capacity of the Human Resources matter. Also I agree with your point on using PaaS service model in minimizing workloads on server management and security. Strict and strong policies on handling this system should be in place for smooth transition as well.
-
2025-08-27 at 10:59 am #50186
Wah Wah Lwin
ParticipantHi Aung!
Thanks for your f/u questions on my experience on this personal cyberattack. Regarding your question, this issue was happened 3 years ago, and I am not so sure what was the root cause of this issue, as some people also had the same experience with the payment (with Apple account) at that time, particularly with the specific banking (Kasikorn bank). So, I think it could be the security issue of mobile banking system, coz Apple devices are designed to be highly secured as far as I am aware of.
-
2025-08-23 at 8:51 am #50111
Wah Wah Lwin
ParticipantHi Hteik Htar!
Thanks for sharing your experience!
-
2025-08-23 at 8:50 am #50110
Wah Wah Lwin
ParticipantHi Soe!
Thanks for sharing your experience. -
2025-08-21 at 9:22 pm #50089
Wah Wah Lwin
ParticipantHi Siriluk! Thanks for sharing your experiences. And, good to know about DRP to prevent cyberattacks in the future. And yet, I think the plan that fits with the contexts is essential for IT system, to protect the valuable data from the organization/companies.
-
2025-08-19 at 10:49 am #50073
Wah Wah Lwin
ParticipantHi Siriluk!
Thank you so much for sharing your ideas. I think that sounds contemporary, particularly in high, and middle income countries. For patients those have basic technological knowledge, it’s a great approach for hospital settings. On the other hand, for those who do not have enough tech knowledge, may be from the hospital operation team, should consider clients’ awareness regarding application. Otherwise, hospital operating side might face challenges, such as consultation, appointments issues. However, if we could consider those risks and how to address them during the design phase of app development, it’s a great benefit for the clients 🙂
-
2025-08-17 at 4:35 pm #50010
Wah Wah Lwin
ParticipantHi Jenny! Thanks for sharing current practices in the Philippines. It’s good to know!
Yep, in terms of patients’ feasibility and service delivery by the hospital system, I also view that mobile app is convenient and satisfactory for the patients. Also, service providers can communicate with the patients effectively. As you mentioned, although this app might not be able to provide significantly impact on patients’ outcomes (due to ethical standards, patients’ data confidentiality, etc.), it might enhance the patients-hospital relationships and trust, which is important for hospital settings. On the other hand, since this approach might have higher cost to install, it’s good to consider several factors (including cost, technicians, maintenance, data security, etc.) for the long-term operation. -
2025-08-17 at 4:14 pm #50009
Wah Wah Lwin
ParticipantNice to know you!
-
2025-08-17 at 4:14 pm #50008
Wah Wah Lwin
ParticipantNice to know you, Jenny!
-
2025-08-17 at 4:13 pm #50007
Wah Wah Lwin
ParticipantNice to know you, Ko Aung!
-
2025-08-17 at 4:13 pm #50006
Wah Wah Lwin
ParticipantNice to know you, William!
-
2025-08-17 at 4:11 pm #50005
Wah Wah Lwin
ParticipantNice to know you, Nang Phyoe!
-
2025-08-17 at 4:11 pm #50004
Wah Wah Lwin
Participantnice to know you, Hteik Htar!
-
2025-08-09 at 8:39 pm #49959
Wah Wah Lwin
ParticipantI agree with your points. From your experience sharing ,I could say that all components of IS are highly related to human’s expertise (technical ability) and continuous oversights, to operate the system smoothly and with minimal errors.
-
2025-08-06 at 3:26 pm #49935
Wah Wah Lwin
ParticipantI agree with your points while we are talking about IS in Myanmar. Particularly, data quality issue is one of the most problematic issues in PHC referral and IS. Although the assigned staffs are provided series of training, we frequently encounter man-made errors/ignorance overtimes. This could lead to wrong/misinformation to the authorities who are directly involved in the decision making process.
-
-
AuthorPosts