Tag Archives: internet

The Hiring Process & Social Media

Social media has blossomed in the past few years beyond what many could have imagined. Today, it seems that many people engage others on the internet and social media without regard to their own personal privacy. Additionally, according to Jones and Behling (2010), privacy settings within social media applications tend to be complex, which inhibits their effective use by privacy-minded users. The result is an open and rich source of personal data, the problem of which is context.

I view social media as personal advertising where, unless specifically stated in the terms of service, the information posted by others is considered to have entered the public domain; others may view social media in the light of property rights where, although many people might not lock their front door, the invitation to invade the space is not assumed (Rosen, 2009). Regardless of personal views, information seekers need to be mindful of three things: 1) the terms of service for using the application resources, 2) the privacy policy in effect for using the application resources, and 3) the context of entries and the audience each entry is meant to reach (Jones & Behling, 2010; Rosen, 2009). Considering that the personal data made available on social media applications is not typical of allowable employment interview scenarios, employers need to be mindful that searching out this information may lead to unethical and illegal hiring practices (Fallon & McConnell, 2007; Jones & Behling, 2010; Rosen, 2009). Still, employers use social media to further vet applicants (Jones & Behling, 2010). Another consideration along similar lines is the use of generic web-based searches that could uncover similar information (Rosen, 2009).

In the case study provided by Coutu (2007), Virginia performed an internet search on Mimi and know suffers the problem that one cannot unknow knowledge. Additionally, Virginia know feels ethically compelled to share this information with Fred, the CEO. While this information would not be pertinent in the hiring process of a line employee, staff employees require more scrutiny, especially those that are being vetted for significant leadership positions. Rosen (2009) states, “employers do have broader discretion if such behavior would damage a company, hurt business interests, or be inconsistent with business needs” (para. 15). With this in mind, I tend to consider the paradigm of privacy practices when confronted with public officials and celebrities. A public head of a company or division might not have the same expectations of privacy afforded to a typical job applicant, but this would be a question for lawyers, as Mimi alludes to in the case study.

Basing the decision to investigate Mimi via Google on the general welfare of the organization, I would recommend allowing Mimi to defend her position in order to minimize bias and assumption. Two questions could be asked of Mimi that may allow her to mitigate concerns stemming from the search: 1) Regardless of any past pretenses, do you feel that you can represent this company appropriately if faced with issues regarding international politics? 2) Do you have any concerns about operating effectively within a political environment, such as China? Asking these questions, however, assume that the legal ramifications have been assessed and that they have been deemed appropriate for these particular circumstances. Ultimately, however, the decision lies with Fred to formulate a team that he feels can further the goals of the organization. He may consider the search results inconsequential and hire Mimi regardless of these findings, which would also be appropriate.

References

Coutu, D. (2007). We Googled you. Harvard Business Review, 85(6), 37-41.

Fallon, L. F. & McConnell, C. R. (2007). Human resource management in health care: principles and practice. Sudbury, MA: Jones & Bartlett.

Jones, C. & Behling, S. (2010). Uncharted waters: Using social networks in hiring decisions. Issues in Information Systems, 11(1), 589-595.

Rosen, L. (2009, September 15). Caution! – Using search engines, MySpace or Facebook for hiring decisions may be hazardous to your business. Retrieved from http://www.esrcheck.com/articles/Caution-Using-Search-Engines-MySpace-or-Facebook-for-Hiring-Decisions-May-Be-Hazardous-to-Your-Business.php

Hacking Cyberterrorism

Although not particular to cyberterrorism, for this discussion I have chosen hacking as a type, or means, of cyberterrorism. Hacking covers virus loading and denial of service attacks, also. In order to carry out a cyberterrorism attack, it must be based on some sort of hacking. First, however, we must agree on the definitions of hacking and cyberterrorism. US Legal, a website dedicated to providing legal reference, broadly defines hacking as “intentionally accesses a computer without authorization or exceeds authorized access” (Computer hacking law & legal definition, n.d., para 1). Cyberterrorism is, according to Denning (2006):

…[H]ighly damaging computer-based attacks or threats of attack by non-state actors against information systems when conducted to intimidate or coerce governments or societies in pursuit of goals that are political or social. It is the convergence of terrorism with cyberspace, where cyberspace becomes the means of conducting the terrorist act. Rather than committing acts of violence against persons or physical property, the cyberterrorist commits acts of destruction or disruption against digital property. (p. 124)

Arguably, in order to use a computer system to do any of the above, it involves hacking, but without hacking, there can be no cyber- component to cyberterrorism, which leaves mere terrorism. Fortunately, using these definitions, there has never been a cyberterrorism attack ever in history (Brunst, 2008; Conway, 2011). Brunst (2008) goes further using the term terrorism to include the planning (and, even pre-planning) phases of an event. I disagree with this tact in scholarship. Brunst fails to provide the distinction between cybercrime and cyberterrorism. Thinking simply, having a Facebook account in order for ease of communication does not amount to meeting for coffee. Messaging a friend on Facebook and organizing a meeting does not constitute meeting for coffee. The act of two or more persons meeting for coffee is a conventional one, however it was planned. This is the same with terrorism. I argue that, although much planning and radicalization can occur using computer networking (e.g. Facebook, MySpace, general information websites, et al.), any terroristic act that stems from such organization would still be considered conventional terrorism unless the act, itself, is described as being technological in nature (Conway, 2011).

There is potential for a cyber-attack to generate fear, economic impact, and the loss of life. This is why we concentrate on security measures to ensure difficulty in accessing systems without proper credentialing, rapid identification and response to active intrusions and threats, and recovery techniques to identify and repair data, networks, and nodes that were involved. For this reason, networks are designed with human redundancy. Human redundancy, as Clarke (2005) explains, integrates human decision points within a technological operational structure in order to detect, indicate, explain, and correct an error. Additionally, infrastructure, a commonly regarded target by the experts, tends to be resilient by its own nature making cyber-attacks inefficient and ineffectual (Conway, 2011; Lewis, 2002; Wilson, 2005)

References

Brunst, P. W. (2008). Use of the internet by terrorists: A threat analysis. Responses to Cyber Terrorism, 34(1), 34–60.

Clarke, D. M. (2005). Human redundancy in complex, hazardous systems: A theoretical framework. Safety Science, 43(9), 655-677. doi:10.1016/j.ssci.2005.05.003

Computer hacking law & legal definition. (n.d.). US Legal. Retrieved from http://definitions.uslegal.com/c/computer-hacking/

Conway, M. (2011). Against cyberterrorism: Why cyber-based terrorist attacks are unlikely to occur. Communications of the ACM, 54(2), 26-28. doi:10.1145/1897816.1897829

Denning, D. (2006). A view of cyberterrorism five years later. In K. E. Himma (Ed.), Internet security: hacking, counterhacking, and society (pp. 123-139). Sudbury, MA: Jones and Bartlett.

Lewis, J. A. (2002, December). Assessing the risks of cyber terrorism, cyber war and other cyber threats. Washington, DC: Center for Strategic and International Studies. Retrieved from http://www.steptoe.com/publications/231a.pdf

Wilson, C. (2005, April 1). Computer attack and cyberterrorism: Vulnerabilities and policy issues for Congress (CRS Congressional report No. RL32114). Retrieved from http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA444799&Location=U2&doc=GetTRDoc.pdf

Cyberterrorism vs. WMD

Perhaps in an Orwellian society where computers are independant and there is very little human-to-computer interaction could a cyberterrorist cause such an impact as to be equal with a weapon of mass destruction. This is not true, however, regarding the technology of today. According to James Lewis (2002) from the Center for Strategic and International Studies, “cyber attacks are less effective and less disruptive than physical attacks. Their only advantage is that they are cheaper and easier to carry out than a physical attack” (p. 2). Studies of the implementation of efforts to reduce the effectiveness of infrastructure during war show a resiliency that is poorly respected. Redundant systems in conjunction with a focused human response provides mitigation to reduce the impact of disruptive efforts on infrastructure (Wilson, 2005). It seems the more important the system, the larger and focalized the response.

The northeast blackout of 2003 provides a decent case study, although the cause was a systems failure and not related to terrorism. According to the article by Minkle (2008), within an hour and a half, 50-million subscribers lost power in eight states and parts of Canada for a few days, yet it only contributed to about 11 deaths within the affected area. While the impact was significant, geographically, it was more or less a nuisance for most people.

References

Lewis, J. A. (2002, December). Assessing the risks of cyber terrorism, cyber war and other cyber threats. Washington, DC: Center for Strategic and International Studies. Retrieved from http://www.steptoe.com/publications/231a.pdf

Minkle, J. R. (2008, August 13). The 2003 northeast blackout — five years later. Scientific American. Retrieved from http://www.scientificamerican.com/

Wilson, C. (2005, April 1). Computer attack and cyberterrorism: Vulnerabilities and policy issues for Congress (CRS Congressional report No. RL32114). Retrieved from http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA444799&Location=U2&doc=GetTRDoc.pdf

Using Intelligence in ePCR Database Design

The intelligence of a database design begins with the intelligent approach in which the developer focuses on the particular need the database is to fulfill. It is especially important to constrain, or specialize, a database used in health care, else the database can quickly grow beyond the bounds of efficiency. Efficiency can be found directly from table design, and it can be further achieved with business rules and logic. Designing a database for storing patients’ medical records also has some risk of increasing the likelihood of medical errors and statistical incongruities if done improperly; therefore, a qualified database administrator should be consulted (Campbell, 2004; McGlynn, Damberg, Kerr, & Brook, 1998). However, a preliminary needs assessment can be accomplished by asking a few simple questions: Who? What? Where? Why?

Who needs to use the database? For whom is the data useful? By identifying the scope, or domain, of each database user, the developer can gain a sense of which data points are important (McGlynn et al., 1998; Thede, 2002). For instance, in health care, a purely diagnostic database should efficiently offer comparative differential diagnoses to aid a physician in caring for patients; however, a database of this type will not offer much to the administrative arm of the practice. By understanding the relationship between physician diagnosis and billing, relational techniques can serve to ensure greater accuracy in billing procedures.

What data needs to be stored and retrieved? By listing the specific data to be stored, the developer has an opportunity to optimize the storage methods by creating an efficient and normal relational table foundation (Kent, 1983; Sen, 2009). A patient care reporting database, for instance, must be able to store patient identifying information, or demographics. Depending on the specific needs of the practice, demographic data can usually be stored in a single table. Other relational tables could be used to store references between the patient demographic record and pertinent medical information, thereby minimizing duplication (Thede, 2002).

From where does the data need to be accessed? Does this database require authentication for use on a local area network or a complex security policy for wide area network access (Campbell, 2004; McGlynn et al., 1998)? More importantly, however, is portability of the data. If the data is going to be replicated in a large composite database, the data needs to meet the specifications of the repository. This is often achieved by the publication of a template, or a clear set of directives on how data is to be formatted before transmitting data to the repository. An example of this is the Medicare electronic records requirements set forth in the Health Insurance Portability and Accountability Act (HIPAA) of 1996. By accounting for common templates in the design phase, the developer can avoid having to parse data prior to transmitting the data over the network.

Why are we storing the data? Today, it is very common to store data if merely for purposes of recording an interaction, such as a patient contact. However, it is important to understand how the data will be used in the future. Will the data need to be immediately accessible, such as in emergency or critical care areas, or could the data be compiled and batch processed during times of off-peak network load, such as in billing or logistics. Could paper reporting fulfill the immediate need better? If so, should the data on the paper report be entered in a database later? Regarding transcription, it is important to be knowledgeable about the available technology for creating scanned images, portable electronic documents, and the use of optical character recognition in order to properly prepare for the storage of each.

By answering the who, what, where, and why of the database needs assessment, we ultimately answer the question of how to design and implement the database. As an example, in order to design an ambulance run form, we must take into consideration demographics, the history of present illness (or, the reason for the ambulance request), past and pertinent medical history, including, but not limited to: medications, past medical problems and surgeries, and allergies to medications and environment. It is also important to store the assessment, care, and outcome, as well as the disposition of the incident and the destination facility. Additionally, medical standards, such as diagnostic codes, medications, protocols, and algorithms, could be stored in reference tables for preventing redundancy within the data model (Kent, 1983; McGlynn et al., 1988; Sen, 2009, Thede, 2002). Ambulances are mobile; therefore, network access is an important consideration when designing an electronic ambulance patient care reporting database. For this type of database schema, I would recommend using a small, efficient database locally with a mechanism in place to replicate the data to the larger repository when the network is accessible.

Another challenge in creating a database is learning how not to store information. Information is made of of data, but only data should be stored (Collins, 2009). Programming logic can be used to synthesize data into information and, further, into knowledge. Many database designers mistakenly store information, or even knowledge, quickly inflating the size of the database and decreasing its efficiency and normalcy (Kent, 1983; Sen, 2009).

In conclusion, developing an electronic patient care reporting database for a physician practice has some inherent risk if done poorly; however, a knowledgeable member of the office team can highlight the project requirements by performing the needs analysis.

References

Campbell, R. J. (2004). Database design: What HIM professionals need to know. Perspectives in Health Information Management, 1(6), 1-15. Retrieved from http://www.ncbi.nlm.nih.gov/

Collins, K. (2009). Managing information technology. Exploring Business (pp. 122-130). Retrieved from http://www.web-books.com/

Health Insurance Portability and Accountability Act (HIPAA) of 1996, P.L.104-191. (1996).

Kent, W. (1983). A simple guide to five normal forms in relational database theory. Communications of the ACM, 26(2), 120-125. Retrieved from http://www.bkent.net/Doc/ simple5.htm

McGlynn, E. A., Damberg, C. L., Kerr, E. A., & Brook, R. H. (1998). Health information systems: design issues and analytical applications. Retrieved from http://www.rand.org/pubs/monograph_reports/2007/MR967.pdf

Sen, A. (2009, May 7). Facts and fallacies about first normal form. Retrieved from http://www.simple-talk.com/sql/learn-sql-server/facts-and-fallacies-about-first-normal-form/

Thede, L. Q. (2002). Understanding databases. In S. P. Englebardt & R. Nelson, Health care informatics: an interdisciplinary approach (pp. 55-80). St. Louis, MO: Mosby.

Implementing an EMR system

Electronic records streamline the flow of many of the components of patient care. EMRs and ePCRs are very useful in lowering costs, simplifying business processes, and increasing patient safety, as well as overall efficiency, if implemented correctly (Smith, 2003).

Currently, I work as a critical care paramedic providing patient care in acute settings, whether prehospital of interfacility. Within this capacity, I also teach classes to other health care providers, including first responders, emergency medical technicians, paramedics, nurses, physicians, and allied health personnel. I am familiar with the concepts of electronic patient care reporting (ePCR) and the importance and utility of electronic medical records (EMR); however, the only means of electronic reporting available in my capacity as a paramedic is poorly developed ePCR software coupled with intermittent network connectivity, so I still choose to utilize paper reporting. My part-time job with a local municipal ambulance provider relies on a widely available third-party ePCR system that seems to work well. I do utilize this ePCR system when working for this provider.

I have also gained experience with information technology and object-oriented programming concepts while developing platform-independent, client-server distributive applications designed for the internet and intranets. I also have experience with Windows and Unix/Linux platforms.

References

Smith, P. D. (2003). Implementing an EMR system: One clinic’s experience. Family Practice Management, 10(5), 37-42. Retrieved from http://www.aafp.org/fpm/2003/0500/p37.html

Examples of Pseudoscientific Claims on the Internet

The advent of the internet gives rise to the proliferation of information. At first glance, this is a great medium of our time. The unfortunate truth is that there is a less-than-desirable side to the internet. One of the main achievements of the internet is the ability of everyone to publish their own ideas or collections of others ideas on websites. Sometimes, these websites do not portray the truth of the matter. Using standards set forth by Shermer (2002), I will examine two websites, which make extraordinary claims, for clues to the validity of their claims, or lack thereof. Though, the websites mentioned herein were specifically chosen as pseudoscientific, I will search for the modicum of truth that is sure to be inherent in all claims of this nature.

Paul Ingraham, a registered massage therapist in Vancouver, Canada, claims that stretching prior to exercise is all but useless (n.d.). For $14.95, he will show you why. In his web-based article, formatted to appear as a peer-reviewed and published manuscript, Ingraham starts by citing an article in the same commercial magazine that pays him for submissions. Below this are two quotes from reader feedback. This is hardly scientific reference. The article moves on to cover the subject material in the authors words while continuing to cite “plentiful research” (para. 6), of which many conclude limited findings, and “evidence” (para. 7), which he immediately qualifies as “at least a really convincing physiological rationale” (para. 7).

Shermer’s (2002) fallacies can be used to identify this website as less credible than the author intends. Shermer’s first fallacy, “theory influences observation” (p. 46) is an obvious consideration. Ingraham is a massage therapist and his view is certainly biased by his occupation. A quick glance at the provided reference list will show a collection of literature selected to support Ingraham’s (n.d.) claim. Shermer’s fourth fallacy, “anecdotes do not make a science” (p. 48), can be applied as Ingraham uses anecdotes throughout his article to support his claim. Finally, the whole format of Ingraham’s self-published article, suggesting that his work was peer-reviewed and published in an academic journal, brings to light Shermer’s fifth fallacy, “scientific language does not make a science” (p. 49). With three of Shermer’s 25 fallacies shown to be pertinent considerations, Ingraham must be viewed with skepticism at the very least.

A website published by the Discovery Institute, Center for Science and Culture (n.d.), makes the claim that the year 2012 marks the end of the world, at least as we know it. This website uses strong language and bold statements throughout. This would certainly be an application of Shermer’s (2002) sixth fallacy, “bold statements do not make claims true” (p. 49). Additionally, this website uses references to religions and philosophies, tying them with coincidental occurrences throughout time as a means of justification for the claim. This alone creates skepticism using almost all of Shermer’s fallacies of thought.

Can stretching be detrimental to the athlete? Might there be better ways to prepare for strenuous activities? Certainly. It is unfortunate that this author does not take the time to do appropriate research. Further, it could be stated that his representation of the facts is fraudulent. Although he may have some standing in his claim, he does a disservice to himself by the methods he employs to make a convincing argument (Ingraham, n.d.).

The same cannot be said for the 2012 prophecies (Discovery Institute, Center for Science and Culture, n.d.). These prophecies lack proof until the prophecies are fulfilled. There are just no scientific means available to observe and study this prophecy as it has yet to occur, and though science may be able to explain whatever catastrophe might happen that day, the prophecy itself is beyond the realm of science.

References

Discovery Institute, Center for Science and Culture. (n.d.). Explaining the science of Intelligent Design. Retrieved from http://www.intelligentdesign.org/

Kehne, J. (2006). December 21 2012, The official Website for 122112 Information. Retrieved October 10, 2009, from http://www.december212012.com/

Shermer, M. (2002). Why people believe weird things. New York: Henry Holt and Company.

Ingraham, P. (n.d.). Stretching for trigger points. Retrieved from http://saveyourself.ca/articles/stretching-for-tps.php

Merit Badges in Punditry and Blogging

Everyone’s a pundit! Actually, I guess anyone who has a weblog, or “blog”, of some type can be an expert these days. I see them on the news all the time, “Larry Marshall, author of the internet blog ‘Who Cares’, what do you think of this situation?”

“Well, Bob, in my blog I have written…”, the rest can be filled in by imagination.

Some of these bloggers might actually have education or experience relating to the topic, but I find that many do not; certainly not to any degree of expertise. When questioned regarding their expert standing, they invariably seem to respond with, “I have been authoring my blog for over ‘x’ years!”

Perhaps, the Cub Scouts will offer merit badges in punditry and blogging.

However, not all blogs are full of pedantic ego fulfillment. Well, even some that are have their place in the 21st century scramble to “let somebody know something… anything!” Typically, one cannot falter fact. Blogs, podcasts, vodcasts (etc.) that report facts are becoming commonplace and finding importance to a variety of people. Examples of these are the CDC podcasts. Great expert medical information in a convenient podcast package. With this media, however, the more opinion added, the more debated the positions.

In the online community, there are a number of experts who tend to set the stage for a debate or commentary. Then, there are ostensibly a number of anti-experts. These ‘anti-experts’ seem to have the knowledge and skill of the experts, but perhaps, not the education or the standing. What these anti-experts do have is cynicism, altruism and an uncanny ability to think outside of the expertly regarded box. The only thing these dodgers need is a soapbox.

The internet is a great forum for anyone to be heard by anyone who will listen. It can only be imagined, then, that everyone with an internet voice will want to speak. This will certainly provide for an array of views on a single topic and an opportunity for arguments to be raised in defense of certain views. Though this forum allows a debate between experts, anti-experts and laymen, many times the debate falters and the parties lose their ambition to continue providing evidence. This can lead to information that is not truly tried and tested, and though someone may provide a great argument, they could still be dead wrong.

Remember! Not everything you read on the internet is true.

With all of that being said, for reliable truth in journalism, The Onion! http://www.theonion.com

Professional Networks – The Internet, EMS, & Social Media

In the emergency medical service arena, there are a number of online networks designed to provide support for EMS personnel. Most of these networks are listservs or discussion groups aimed at bolstering education and best current practices.

I first started in EMS as a route to become a firefighter, but after working for a short time as an EMT, I decided that I enjoyed the practice of medicine much more than fire suppression. It was about this time that I formed a goal to be the best that I could be in this industry. There is an inherent problem with this: most in EMS feel that they are the best at what they do. I had to figure out a benchmark to compare myself to.

Searching the internet, I found a small group of EMTs, paramedics and physicians who promoted teaching as learning. This group also debated best practices constantly. Most importantly, all were welcome to contribute. Partaking in many discussions over the years has broadened my knowledge and has made me keenly aware of many of the problems facing EMS that I was going to have to deal with. This group has helped me to grow as an EMT, motivated me through my education as a paramedic and instilled in me some of the virtues of being an effective educator and a mentor within the EMS community. This same group has helped turn inexperienced and insecure providers into authors, consultants, researchers, managers, and educators. These truly were the best and the brightest in the field. Many of group participants were only known to me by their email address or the initials with which they signed their posts, but now, after meeting and forming in-person relationships, I count many of them among my friends and colleagues.

This only outlines one of my professional networks. I truly understand the value of professional networking, and I have promoted this within the educational environment in the past. Networking among colleagues, whether professionally or academically, encourages teamwork and collaboration. It also encourages a healthy competitive nature in the participants which translates to more overall growth. In the academic arena, students are able to rely on other students’ expertise in some areas while, at the same time, providing expertise in others.

The new online social networking venues (LinkedIn, Facebook, MySpace, et al.) appear to be replacing the listservs of old. These applications provide the user a broader, more personal sense of their social and professional network. Opening one’s self up to your colleagues in this manner can only encourage more personal growth and professionalism.