Authors: Tatjana Welzer, Marko Hölbl’, Ana Habjanič, Boštjan Brumen, Marjan Družovec
Introduction
The improper usage of information technology has become a big problem in the medical field. Securing information assets is a fundamental part of proper information technology usage and thus, critical towards protecting users against harms. As a result of this, many educational programs were developed to educate the medical staff and try to limit this problem.
Motivation for choosing the article
There is no doubt that information management plays an important role in all life aspects today . With great increase in communication technology there is real need to improve data and information management process. So ,I feel great interest when browsing articles about informatics and I found this article which talks about interesting and important topic that attracted me to choose it.
Summary of the article
With the extensive use of information technology now there is a great need of information security which should include fast and secure information processing, data gathering , decision support applications and data mining .To cope with that we need to have well educated staff who can deal properly with all of these considerations. In the health care field there is a clear need for nurses to learn about information technology (IT) and information security (IS). They are usually deal with huge number of information that obtained from the patients which need to be secured and safe and to achieve this they have to be trained in a proper way . So, to reach this goal a project called NICE– Nursing Informatics and Computer aided Education was established at the end of the 1990 's in which information technology (IT) and information security (IS) can be addressed and taught. The project partners came from Austria, France, Greece, Italy, and Slovenia. The team members were
References: 1-Welzer,T., Hölbl,M., Habjanič.A., Brumen,B.,and Družovec,M.,2007,in IFIP International Federation for Information Processing, Volume 232, New Approaches for Security, Privacy and Trust in Complex Environments, eds.Venter,H.,Eloff,M.,Labuschagne,L.,Eloff,j.,von Solms,R.,(Bosten:Springer),pp 479-484 2-Siddharth Kalla (Jun 18, 2009). Statistical Significance And Sample Size. Retrieved Mar 22, 2013 from Explorable.com: http://explorable.com/statistical-significance-sample-size 3- Al Barrak , A. Introduction To Medical Informatics [PDF document]. Retrieved from Lecture Notes Web site: http://www.ksums.net/files/3rd/Medical%20informatics/1%20st%20semester/