-
Wachirawit Supasa replied to the topic Week 2 Case study 6 Third-party vendor error exposes data of 19K patients (Pongsakorn) in the forum Week 2 Assignment : Peer review Case Study 4 years, 2 months ago
Thank you for your report. The consequence of exposing sensitive to data is unmeasurable and the hospital should enforce more on privacy policy.
-
Wachirawit Supasa replied to the topic Week 2 Case study 6 : Third-party vendor error exposes data of 19K patients for 2 months (Sila) in the forum Week 2 Assignment : Peer review Case Study 4 years, 2 months ago
I agree with you. And I would like to add a prevention method: by testing the system before it goes online.
-
Wachirawit Supasa replied to the topic Week 2 Case study 5 : Employee error exposed data of 16,000 Blue Cross patients (Ornpicha) in the forum Week 2 Assignment : Peer review Case Study 4 years, 2 months ago
I agree with your idea. Human error is the most causative network security breach. The hospital should enforce more on the policy.
-
Wachirawit Supasa replied to the topic Week 2 Case Study – Grays Harbor Data Breach (Naphat) in the forum Week 2 Assignment : Peer review Case Study 4 years, 2 months ago
I think backing up data on the internal server could also be a target too since Randsomeware can encrypt the drive if it operates on the same network. I suggest that backing up to the cloud system would be more beneficial.
-
Wachirawit Supasa replied to the topic Week 2 Case study 1: New York provider's misconfigured database (Khaing Zin) in the forum Week 2 Assignment : Peer review Case Study 4 years, 2 months ago
I agree with you and I’d like to add a prevention method. By using an internal registration number such as Radiology Number instead of Hospital Number. For example, when the patients came to the radiology department they will be assigned with these numbers that associate with Hospital Number. If this data breach happens again due to other…[Read more]
-
Wachirawit Supasa replied to the topic Week 2 Case study 4 : Grays Harbor Data Breach (Saravalee) in the forum Week 2 Assignment : Peer review Case Study 4 years, 2 months ago
I agree with your idea and would like to share some ideas about prevention. We know that hacker demands its ransome by encrypting all data. The hospital should consider implementing back up system such as cloud service which they can revert all changes to original data.
-
Wachirawit Supasa replied to the topic Topic 3 What is eHealth? in the forum Week 3 : Roles of Information Systems in Public health Practices I 4 years, 2 months ago
I think the definition of eHealth should be the electronic system that empowering health management in which three major distinctive disciplines (Health mobility, Health interaction, and Health Data) have intersected.
-
Wachirawit Supasa replied to the topic Topic 2 Big data in health in the forum Week 3 : Roles of Information Systems in Public health Practices I 4 years, 2 months ago
I considered Human Genomic Data as Big Data and It would be fit in 7V Catagories.
1. Volume – Because everyone has different DNA, if we sequencing all of the DNA base pairs, it will take about 200 gigabytes of data and that came from a single human individual alone. Try sequencing all Thailand population, it would take space in the database about…[Read more]
-
Wachirawit Supasa replied to the topic Topic 1 Significance of health informatics in the forum Week 3 : Roles of Information Systems in Public health Practices I 4 years, 3 months ago
1. I was an intern at a laboratory in the provincial hospital and they use Laboratory Information System that can integrate with HOSxp. However, it only sent out the lab result so we need a physician to interpret the result and record it into the Hospital Information System.
2. It can improve current practice by sending information digitally…[Read more]
-
Wachirawit Supasa started the topic Week 2 Case Study 2 – Two phishing attacks on Minnesota DHS (Wachirawit) in the forum Week 2 Assignment : Peer review Case Study 4 years, 3 months ago
Two phishing attacks on Minnesota DHS breach 21,000 patient records
Provide a brief description of the story.
Two Minnesota Department of Human Services employees fell for phishing email results in leaking 21,000 patients records that contain identifiable information. While this incident has been hidden from IT department, it occurred for m…[Read more]
-
Wachirawit Supasa replied to the topic Topic 1 Computer networking in the forum Week 2 : Principle of Biomedical and Health Informatics II 4 years, 3 months ago
I completely forgot about cost. Thank you krub arjarn.
-
Wachirawit Supasa replied to the topic Topic 1 Computer networking in the forum Week 2 : Principle of Biomedical and Health Informatics II 4 years, 3 months ago
To provide information to the executive board, I would like to describe in the following idea.
1. Cloud server has more reliability because this webserver portal has to connect from many clients at the same time so we expected high demand for input and output that will cause conventional server overload easily but utilized cloud server will…[Read more]
-
Wachirawit Supasa replied to the topic Topic 3 What is enterprise-wide information? in the forum Week 1 : Principle of Biomedical and Health Informatics I 4 years, 3 months ago
I agree. We should keep data interoperability in mind.
-
Wachirawit Supasa replied to the topic Topic 1 Introduction to PHI in the forum Week 1 : Principle of Biomedical and Health Informatics I 4 years, 3 months ago
Coming from laboratory sciences has given us a good principle knowledge.
-
Wachirawit Supasa replied to the topic Topic 3 What is enterprise-wide information? in the forum Week 1 : Principle of Biomedical and Health Informatics I 4 years, 3 months ago
Basically Enterprise Architecture involved everyone who came across it. We are all stakeholders in the system and we need people with their opinion. If I have an opportunity to create EA, I will form a group consisting of these people.
1. Health Informatician: designing, planning, and be a leader in overall EA.
2. Medical Practitioner or personnel…[Read more] -
Wachirawit Supasa replied to the topic Topic 2 Why do we need EA? in the forum Week 1 : Principle of Biomedical and Health Informatics I 4 years, 3 months ago
If there’s no Enterprise Architecture implement at the provincial or national level, it will create a lot of incompatible information. For example, let’s start at the smallest scale: each hospital needs to send data containing the number of patients per disease to the provincial public health authority. While there’s no standard framework for…[Read more]
-
Wachirawit Supasa replied to the topic Topic 1 Introduction to PHI in the forum Week 1 : Principle of Biomedical and Health Informatics I 4 years, 3 months ago
My background is Medical Technologist who works in Laboratory. In order to pursue a career in Public Health Informatician, I must gain knowledge in many disciplines including Information Technology, Computer Sciences, Public Health Knowledge, Biostatistics, Regulations (Laws and Ethics), Management, and Leadership. All of which, I find them…[Read more]
-
Wachirawit Supasa changed their profile picture 4 years, 3 months ago
-
Wachirawit Supasa replied to the topic What will you do? Why? in the forum Week 3: Computer Security 4 years, 4 months ago
I will suspect it as the malware advertisement because the website cannot access user data through a web browser unless we chose to so the website cannot tell how many viruses have infected our computer.
Initially, I will copy the website URL and report it to internet browser developers such as Google, Microsoft, and Apple which will prevent…[Read more] -
Wachirawit Supasa replied to the topic Has your own computer or computer system at your workplace ? in the forum Week 3: Computer Security 4 years, 4 months ago
Although I never encountered computers that have been attacked by a virus or malware in my workplace, I’ve read some about attacking from online news.
1. Malware that attacks those computers is a kind of malware called Ransomware.
2. If attacked by this malware, it will result in encrypting all data in the computers which need a password to…[Read more]
- Load More