Technology in physician Education

Author(s):  
Michelle LaBrunda ◽  
Jose A. Cortes

How physicians are trained has been heavily influenced by the advent of the technology era. Technology has progressed faster than society has been able to integrate it. The same is true within schools of medicine and residency training programs. Many technological advances are available to medical educators, and the goal is to make educators aware of the possible educational tools. Traditionally, medicine has been a learn-by-doing discipline. This is becoming less and less acceptable in modern society, and new training methods are being sought, developed and implemented. Some of the modalities available to medical educators include intranet, hand-helds, virtual reality, computerized charting, computerized access to information and electronic monitoring student education. Technological advances in medical education have their uses, but there are also many drawbacks, including hardware limitations, computer failure, security issues, patient confidentiality issues, property rights, maintenance and poor attitude of those required to implement new learning systems.

2011 ◽  
pp. 980-994
Author(s):  
Michelle LaBrunda

How physicians are trained has been heavily influenced by the advent of the technology era. Technology has progressed faster than society has been able to integrate it. The same is true within schools of medicine and residency training programs. Many technological advances are available to medical educators, and the goal is to make educators aware of the possible educational tools. Traditionally, medicine has been a learn-by-doing discipline. This is becoming less and less acceptable in modern society, and new training methods are being sought, developed and implemented. Some of the modalities available to medical educators include intranet, hand-helds, virtual reality, computerized charting, computerized access to information and electronic monitoring student education. Technological advances in medical education have their uses, but there are also many drawbacks, including hardware limitations, computer failure, security issues, patient confidentiality issues, property rights, maintenance and poor attitude of those required to implement new learning systems.


2021 ◽  
Vol 16 (2) ◽  
pp. 529-548
Author(s):  
Anja Zlatović ◽  

The fear of death and the myth of immortality are themes long present in various narratives, whether literary or visual. Science fiction as a genre offers us many venues for new explorations of this idea. Mind uploading is one of them. This fictional technique, related to cloning, is performed when the mind and consciousness of a person are transferred to another biological body or machine with the help of technology. In this way, a person continues their social life through their brain functions. This paper looks at four separate recent screen narratives – the movies Self/less, Transcendence, and Replicas, and the episode “Be Right Back” of the TV show Black Mirror. With the help of Tzvetan Todorov’s structural analysis, we find clauses that are present in all of the plots and see what ideas and topics they share. The paper also uses the idea of anthropological reading of science fiction and therefore uses scientific research to analyze these themes. By looking at anthropological findings of immortality, mortality, death in modern society, and digital techniques, we see how the analyzed narratives portray a unique mixture of fear of and longing for all the mentioned processes and ideas. Finally, this paper shows how science fiction could possibly reflect reality – both through presenting thoughts of society and inspiring future technological advances and ideas (in this case, the quest for immortality). While humans are still far from achieving eternal life, the mentioned screen narratives portray the growing stream of ideas that deal with mind uploading in the age of the internet and social media.


2017 ◽  
Vol 5 (1) ◽  
pp. 230-238
Author(s):  
Sayantan Gupta

The technology of Quantum Green Computing has been discussed in this paper. It also discusses the need of the many implementation techniques and approaches in relation with Fog-Cloud Computing. Moreover, we would like to introduce the latest algorithms like Stack Algorithm, Address Algorithm and many others which will help in the analysis of Green-Quantum Computing Technology in the modern society and would create a technological revolution. With the Internet of Things rising in the modern world time, new security issues have also been developed. So, our proposed Model the Fog-Things Model will help us to determine the security issues and indeed secure the entire IoT network.


2016 ◽  
Vol 21 (4) ◽  
Author(s):  
NARAYAN SUNNY ◽  
GUPTA VIKAS

Engines are common devices which are important sources of power to run several devices in modern society. Many of these engines are very complex and need high levels of technological advances for smooth operations. This papers focuses on the identification, design and construction of a Stirling engine which can be easily manufactured without any special tooling or exotic materials. The underlying theory of the device is also presented and discussed with future recommendations to improve the current design.


2020 ◽  
pp. 1575-1586
Author(s):  
Somasundaram R ◽  
Mythili Thirugnanam

The fields of computer science and electronics have merged to result into one of the most notable technological advances in the form of realization of the Internet of Things. The market for healthcare services has increased exponentially at the same time security flaws could pose serious threats to the health and safety of patients using wearable technologies and RFID. The volume and sensitivity of data traversing the IoT environment makes dangerous to messages and data could be intercepted and manipulated while in transit. This scenario must absolutely respect the confidentiality and privacy of patient's medical information. Therefore, this chapter presents various security issues or vulnerabilities with respect to attacks and various situations how information will be attacked by the attacker in healthcare IoT. The working principle of healthcare IoT also discussed. The chapter concludes the performance of various attacks based on the past work. In the future this work can be extended to introduce a novel mechanism to resolve various security issues in healthcare IoT.


Author(s):  
A. N. Cormack ◽  
A. Tilocca

Biomaterials for repairing and regenerating parts of the human body play a key role in contemporary medicine, and have an increasing impact in modern society. Given the importance of orthopaedic medicine (bone is the second most replaced organ after blood), bioactive glasses and ceramics represent a key reference to guide technological advances in this field. Their established role in current biomedical applications has already led many research groups worldwide to look into their structural properties, with a view to identifying the molecular basis of their biological activity. As the efforts directed towards this crucial and exciting direction continue to increase, it is now timely to review the situation, in order to guide future investigations on structure–bioactivity relationships. In this introductory article, the field is reviewed, to provide an appropriate context for the contributions to this Theme Issue.


Author(s):  
Abdul Samad Abdoll Aziz ◽  
Shahidra Abdul Khalil ◽  
Abdul Karim Ali

Banishment (taghrib) is one of the many punishments prescribed under Islamic criminal law. It serves as a type of punishment under hudud imposed on unmarried persons for committing adultery and those who commits robbery. It also serves as a type of punishment under takzir. In its early implementation, the offender will be banished to other districts which aimed to isolate them from crime factors. At present, banishment is deemed no longer effective as the offender can still communicate with their criminal counterparts via telephone and internet as a result of technological advances. This resulted in the punishment not being able to achieve preventative objectives due to supervision issues. The purpose of this article is to review the continuity of its implementation in modern times. Using comparative methods, comparisons were made with provisions of the same elements in the Prevention of Criminal Act 1959 (POCA). The findings show that the advancement in science and technology has made implementation of this punishment become practical. This was achived through the application of electronic monitoring devices (EMD) to monitor the offenders. As a result, the issues regarding supervison on the offenders which remain setback to the effectiveness of the punishment have been resolved. Hence, the implementation of taghrib remain relevant and not obsolete. In addition, reports show that banishment managed to curb the spread of crime and prevent recidivisme among offenders.


2021 ◽  
Vol 7 (1) ◽  
pp. 67-81
Author(s):  
Miguel Pereira

Democracy’s resilience is being put to the test by the 21st century. The impactof globalisation and digitalisation has disenfranchised many but so have traditional democratic practices. In an era of constant and immediate communication, with society embracing technological advances while struggling to cope with its inadvertent effects, democracy is still tethered to traditional practices that limit citizens’ roles to casting their ballots every few years. However, theory is now being put to the test and experiments with digital democracy are popping up across the globe. In this article, we cover three participative democracy instruments, namely the European Citizens Initiative, e-Voting and e-Participatory Budgeting, delving into their potential and identifying their limitations, in the context of the European Union. We also cover the unforeseen threats to democracy posed by information security issues and social media.


2019 ◽  
Vol 15 (1) ◽  
pp. 29-33
Author(s):  
Marina Bulgackova ◽  

The transformation of the demand structure and the level of competition head new trends in a modern society, which cause a significant influence to all subjects of the market economy including forestry. In this connection, security issues gain theoretical and practical relevance. Competitive advantages of forestry relate to different types of security including finance, defense and industry, food, environment, investments. The Article describes characteristics of the above mentioned types of security and facilitates linkages between them and forestry both in conjunction and separately. The practical aspect of economic security of forestry is represented by the analysis of statistics on wildfires, reforestation, as well as a number of identified forestry crimes.


Author(s):  
Emily Muthard Stelzer ◽  
William J. Salter

The military training community is developing methods and tools to support distributed simulation-based training, technological advances that enhance coordination from different geographical locations and reducing funding and resource requirements. As the training community evolves to conduct distributed training exercises frequently, there is a strong need to simultaneously shape and design the methods and procedures that will be used for these training events. In this paper, we describe traditional after-action review processes and roles and identify challenges to the extension of these approaches to distributed training environments. Two specific challenges are highlighted and discussed: the increased burden on the instructor to integrate performance and mission information across geographic locations, and the redefinition of instructor roles and task responsibilities in the distributed training environment. Finally, we discuss the implication of these challenges in developing training methods and in designing the technologies to support these procedures.


Sign in / Sign up

Export Citation Format

Share Document