scholarly journals Electronic patient medical records: Agility in the management of medical-expert information in the aeronautical health boards

2021 ◽  
Vol 11 (3) ◽  
pp. 206-212
Author(s):  
Patrícia Mesquita Vilas Boas ◽  
Adriana Geórgia Davim Bastos ◽  
Walter Kischinhevsky

The Electronic Patient Record (EPR) is already a reality in the practice of many offices, diagnostic centers and hospitals. The Federal Council of Medicine (FCM) regulated its use, through FCM Resolution n° 1,821/2007 In the Health Boards (HB) of the COMAER, agencies responsible for doing the medical-expert examinations of the military force, the paper record is still the rule. There is no automatic sharing of information between HB. In this context, it is perceived the need for the implementation of the unified EPR for the COMAER HB, because it speeds up the sharing of medical-expert information of the military and allows the military to carry out their health inspections in different locations, not interfering in the planning of missions so peculiar to the force, saving time and costs, speeding up the release of the results and control of inspections. The research thus consists of the qualitative approach, with exploratory objective and bibliographic procedure, carried out in the Scielo and Google Scholar databases, based on the discussion in ten articles, in addition to the FCM Resolutions. It was noted that the perspective that EPR has direct advantages for the Institution, however, requires an abrupt cultural change to the model that is made today, to provide a greater speed among the HB, even if in the transition phase, it is chosen to use in parallel in paper and Information and Communication Technologies. Therefore, the implementation of EPR in HB can provide both multidisciplinary teams and users of COMAER HB, a more efficient medical-expert assistance by promoting information sharing and agility in the performance of Health Inspections.

Author(s):  
Susan T Jackson ◽  
Rhys Crilley ◽  
Ilan Manor ◽  
Catherine Baker ◽  
Modupe Oshikoya ◽  
...  

Abstract Scholars of international relations frequently explore how states normalize the use of military force through processes of militarization, yet few have analyzed how new information and communication technologies impact on these processes. The essays in this forum address this gap, and consider the political significance of new technologies, new actors, and new practices that shape “Militarization 2.0” and normalize political violence in the digital age. The authors in this forum rely, to varying degrees, on common militarized tropes and dichotomies (such as authenticity, belonging, and (de)humanizing framings) that are key to militarization, including those devices that rest on gender, race/ethnicity, and heteronormativity. Moving beyond a military-centered approach to militarization, the authors’ questions cover ministries of foreign affairs; the embodied performances of celebrity leaders and insurgency groups; arms producers, the military video game industry, and private military and security companies; and violence entrepreneurs. The forum closes with reflections from Cynthia Enloe.


2017 ◽  
Vol 5 ◽  
pp. 802-806 ◽  
Author(s):  
Teodor Savov ◽  
Valentina Terzieva ◽  
Katia Todorova ◽  
Petia Kademova-Katzarova

The information and communication technologies (ICT) have penetrated into almost all areas of human life. They have a dual impact on education – increase learning efficiency and train students actively to use innovations. We assess this impact by examining teachers’ experience with innovative tools in Bulgarian schools. In an anonymous online survey, we investigate their opinions on the issues related to technology integration in contemporary classrooms. The research shows that educators appreciate the benefits of technology implementation in the teaching-learning process, but they need a single structured system encompassing all technological resources and tools. This work proposes a conception for a smart classroom – an innovative learning environment that can establish and control suitable conditions for education as well as to impact the instructional process directly.


2021 ◽  
pp. 446-462
Author(s):  
Mika Kerttunen

Essential to states organizing and regulating civil-military relations, the author analyses the actual and potential role and tasks that the defence sector and armed forces can take up in national cybersecurity policy and strategy. After identifying competences and capabilities that the defence sector could employ for national cybersecurity, the chapter identifies generic roles, from being an independent actor to being another integrated stakeholder, for the defence sector and the armed forces. The author notices how inclusion of the defence sector into national cybersecurity updates the concerns of the ‘military-industrial complex’ influencing not only cybersecurity policy but also how information and communication technologies are to be used in a society. Therefore, the chapter ultimately encourages states to implement strong political control in order to avoid unnecessary securitization and militarization of information technology and cyber development policies, misuse of public mandate and funds, and, ultimately, abuses of power by any elite.


2014 ◽  
pp. 57-70
Author(s):  
Ana-Cristina Ionescu

The realities of our world are imperatively legitimated by the complex relationship between media, technology, and society. Whether we deal with old or new Information and Communication Technologies (ICTs), the content of the message delivered by the media assumes a fundamental role. The adherence of a large number of individuals to a common idea facilitates the formation of media-enabled personalities and communities within the virtual space. The emergence of Web 2.0 solves the tension from the ‘90s, when the public opinion decomposed into an amalgam of informal opinions of private individuals not entirely convinced by the formal ones, issued by publicistically effective but one-way communication media. While today the Internet provides the most inclusive forum of public deliberation, where communication is negotiated between cyber-women and cyber-men with equal rights, healed of the social diseases of the outer world, an important gap in our knowledge is whether Web 2.0 reflects our existing reality or whether it constructs a new environment, one that is devoid of the old biases. I would like to fill this gap in information, by exploring whether virtual communities represent a continuation, by technical means, of the pre-existing, face-to-face, geographic, stereotyped interactions, or whether they enabled the establishment of substantially different structures with their own intrinsic features and dynamics, where women have access to and control information.


Author(s):  
Scott Musman ◽  
Michael R. Grimaila

Virtually all modern organizations have embedded information and communication technologies into their core processes as a means to increase operational efficiency, improve decision quality, and reduce operational costs. However, this dependence can place the organizational mission at risk when an incident occurs that compromises a cyber resource critical to the success of the organizational mission. In this paper, the authors examine the challenges of developing and maintaining a mission-wide understanding of organizational mission risk within military environments. Specifically, they examine the concept of mission assurance, discuss various factors which must be taken into account when describing military missions, analyze the four primary types of representations used to capture mission-to-cyber relationships, and highlight the complexities of documenting cyber dependencies for the purpose of achieving mission assurance.


Author(s):  
Md. Abdullah Al Harun Khan Chowdhury

In Bangladesh, transport sectors are developing rapidly to meet the increasing demand for transporting passengers and freight inside and outside the country. But there is not such development in railway transport system. The Bangladesh Railway transport system is still using an old technology to monitor and control signalling, scheduling, operations etc. This paper describes various problems in the existing systems and also solutions have been provided considering the existing railway transport systems of Bangladesh. A new system has been developed to control and monitor the total railway transport system from remote locations. While designing the system, various sensors and actuators have been introduced and also Information and Communication Technologies (ICTs) have been applied in the field of railway transport. So a Machatronics aspect of system has been designed to ensure a collision free, safe and efficient operation and management of railway transport system. This system is not only for monitoring and controlling of railway transport but also ensures efficient asset management. As a result face-to-face accidents, cross-road accidents and accidents due to railway line displacements or breakage can be avoided and there will be no loss of assets and valuable human lives.


2020 ◽  
Vol 26 (3) ◽  
pp. 39-42
Author(s):  
Mihaela Anamaria Bostan-Pop ◽  
Romana Oancea

AbstractConsidering that the level of cyber threats is constantly increasing, a necessary demand emerges from organizations and corporations worldwide to protect their networks against possible cyber-attacks. In the future all malicious actions that occur in cyberspace will continue to alter the way we approach the security of an entire network. The article presents the most stringent need concerning the technical specialization of future officers, highlighting the knowledge entailed in order to better understand the complexity of a mission that takes place in virtual space. Undoubtedly, modern battlefield incorporates a virtual component where nearly all weapons systems rely upon information and communication technologies in order to connect and achieve operational level. The demand for future cyber defence specialists in the military domain reached a high level all over the world, and there will be a challenging process to be able to create a highly skilled workforce to fight against a large scale of malicious activities that have impact upon the national security system.


Author(s):  
Roman Titov

The article studies the specificity of formation of the concept of the information and communication sphere of international relations related to public legitimation of the use of military force. The relations between military and political subjects and the civil society, emerging in this process, are defined by the author as international military and civil relations. The research object is the international military and civil relations discourse formed by the participants for the purpose of organization, preparation and use of military force. The research subject is the peculiarity of its formation at the present stage. The author gives special attention to the issues of information activities of the military policy subjects on the Internet, noting the leading role of electronic media and social networks. The scientific novelty of the research consists in the application of the discourse approach to the analysis of the information activities of military and political subjects. Based on the current understanding of a discourse, the author considers it in terms of the reproduction of ideas in the public conscience. Being a component of the military and political discourse, the international military and civil relations discourse has some peculiarities determined by its purpose, the subjects, producing it, and the specificity of its formation at the present stage. The author suggests considering the international military and civil relations discourse as a developing in time communicative event with different levels of representation which are in constant conceptual connection. The textual level is represented by official documents and statements of heads of states and their coalitions. The contextual level - by discussions, debates and negotiations in Mass Media. The pre-contextual level is represented by feelings, emotions and conditions contained in the public mind and manifested in social networks users’ posts. The author arrives at the conclusion that the international military and civil relations discourse is used as a means of political influence reflecting the ideology and worldview of the subjects producing it.   


Sensors ◽  
2019 ◽  
Vol 19 (13) ◽  
pp. 2901 ◽  
Author(s):  
Hossain ◽  
Georges ◽  
Rondeau ◽  
Divoux

There are all sort of indications that Internet usage will go only upwards, resulting in an increase in energy consumption and CO2 emissions. At the same time, a significant amount of this carbon footprint corresponds to the information and communication technologies (ICT) sector, with around one third being due to networking. In this paper we have approached the problem of green networking from the point of view of sustainability. Here, alongside energy-aware routing, we have also introduced pollution-aware routing with environmental metrics like carbon emission factor and non-renewable energy usage percentage. We have proposed an algorithm based on these three candidate-metrics. Our algorithm provides optimum data and control planes for three different metrics which regulate the usage of different routers and adapt the bandwidth of the links while giving the traffic demand requirements utmost priority. We have made a comparison between these three metrics in order to show their impact on greening routing. The results show that for a particular scenario, our pollution-aware routing algorithm can reduce 36% and 20% of CO2 emissions compared to shortest path first and energy-based solutions, respectively.


Author(s):  
José Manuel Saiz-Alvarez ◽  
Guillermo Calleja Leal

This chapter discusses how the adoption of best practices to increase cybersecurity in business affects the cultural value of the company. Primarily focused on the European Union, the chapter defines and analyzes both the impact of cyber security on the global business conducted in the European Union, and its relation to cloud computing. A brief analysis of the ISO27000 family of standards is made, to finally analyze the relationship between cybersecurity, cultural change and best practices in IT-based business. Businesses are facing now the Third Industrial Revolution characterized by real-time communications through Information and Communication Technologies, where fighting against cybercrime is essential to have safer and more reliable IT-based systems, given the negative effects emanated from cyber insecurity.


Sign in / Sign up

Export Citation Format

Share Document