2. • Difference between data, information, and knowledge.
• Definition of data integrity
• Different storage media for data
• Threats to information quality, availability, and
confidentiality.
• Definition the internet and world wide web.
• the process required to access both the internet and
world wide web.
• the services available on the internet and world wide
web.
Out lines
3. Learning objective
At the end of this lecture , the student will be able to :
• Describe the difference between data , information ,
and knowledge.
• Define data integrity and its relevance for health care.
• Explain different storage media for data.
• Describe threats to information quality , availability ,
and confidentiality.
• Define the internet and world wide web.
• Identify the process required to access both the
internet and world wide web.
• Discuss services available on the internet and world
wide web.
4. data
• The facts of the world “ a description of the
world .
• We can perceive this data with our senses and
then the brain can process this.
• Data is always correct.
• Example, take yourself . You me be 5ft tall ,
have brown hair and blue eyes . All of this is
data , whether this is written down
somewhere or not.
5. • Captured data and knowledge.
• Massage with meaning.
• Data with relevance.
• Information captures data at a single point.
• Information can be wrong and can be lost.
• Example , if I take a picture for you , the
photograph is information . But what you like
is data .
information
6. • Knowledge is what we know.
• As the map of the world we build inside our
brain. This map that we base our decisions.
• Is information processed in the mind of
individual. It can be gathered through
‘’experience or study’’
• There are two sources that the brain uses to
build this knowledge ‘’ information and data ‘’
knowledge
7. • Is the maintenance of , and the assurance of
the accuracy and consistency of data over its
entire life-cycle. And is a critical aspect to the
design, implementation and usage of any
system which stores, processes, or retrieves
data.
• Data integrity aims to prevent unintentional
changes to information.
Data integrity
8. • The importance of data integrity , a
component of data security , is especially
impactful when it comes to handling medical
records and patient information .
• Electronic data can be impacted because of a
storage , retrieval or processing operation ,
including malicious intent, unexpected
hardware failure , or human error.
• Organization must keep data free from
corruption , being modified or disclosed
without proper authorization.
9. • Some of the ways to ensure data privacy:
• Data encryption, which will convert the data
into unreadable code.
• Data backup, which is the process of copying
and archiving data for retrieval in case of loss.
• Data validation, which means a process is in
place to ensure that the data is correct when
accessed.
10. • Storage keeps data, information and instructions
for use in the future.
• Primary storage or RAM : hold data and
programs instructions for processing the data. It
also holds the processed information before it is
output. Everything disappears when the electrical
power is turned off.
• Secondary storage : holds data and programs
even after the power is turned off. Disks such as
floppy disks, hard disks, and optical disks are used
to store programs and data.
The different storage media for data
11.
12. 1. Hard drive : the primary device that the
computer used to store information. Most
computers com with one or two hard drives,
called div C and drive D , located inside the
computer case.
2. Zip disks: store 100-250 MB of data , an
external zip drive can be moved from one
computer to anther. Due to the large capacity
and mobility of the drive, they are gaining
popularity as storage and backup mediums.
14. 4- cartridge tapes:
These are magnetic tapes similar to cassette
tapes used as a storage and backup device.
Backup and retrieval of stored information is
slower with tapes because the information is
stored sequentially .the advantage of tape
cassettes is that they can be purchased with
large storage capacities 1-4GB’s allowing the
entire contents of the hard drive to easy fit on
one tape.
15. 5-USB/Flash drive ( jump/ thumb drive):
• Is a plug and play portable storage device that
uses flash memory and is lightweight enough
to attach to key chain, can be used in place in
a floppy disk, zip disk or CD. Its capacities
ranging from 8 MB to 2GB.
6-floppy disk: is also known as diskettes . There
are very slow compared to hard disks or CD-
ROMs, and hold relatively small amount of data
1.44 Mbytes.
16. • Threats to information quality ,
availability , confidentiality
1- Power failure/loss.
2- Network Infrastructure failures or errors.
3- Technological Obsolescence:
• Outdated Hardware
• Outdated application software
• Outdated system software
• Obsolete network equipment
17. 4- Hardware failures or errors.
5- Software failures or errors.
6-Deviations in quality of service.
7- Operational issues
8- Malware attacks (Malicious virus, Worm, Trojan
horses, Spyware and Adware)
9- Unauthorized use of a health information
application.
10- Social Engineering attacks.
11- Technical failure.
12- Deliberate acts of Theft (including theft of
equipment or data)
13- Misuse of system resources.
18. 14- Acts of Human Error or Failure:
• Entry of erroneous data by staff.
• Accidental deletion or modification of data by
staff.
• Accidental misrouting by staff.
• Confidential information being sent to the
wrong recipient.
• Storage of data/ classified information in
unprotected Areas by staff.
19. What is the Internet?
• The internet is the largest computer network
in the world, connecting millions of
computers. A network is a group of two or
more computer systems linked together.
20. The World Wide Web (WWW)
• When most people think of the internet, the first thing
they think about is the World Wide Web. Nowadays,
the terms "internet" and "World Wide Web" are often
used interchangeably—but they're actually not the
same thing.
• The internet is the physical network of computers all
over the world.
• The World Wide Web is a virtual network of web sites
connected by hyperlinks (or "links"). Web sites are
stored on servers on the internet, so the World Wide
Web is a part of the internet.
21. Connecting to the internet
• you need three basic things to connect to the
Internet:
1. A connection method.
2. An Internet Service Provider (ISP).
3. A web browser .
22. Internet Connection Methods
1. Dial-up: Dial-up is a method that uses a
telephone line, which you connect to a phone
jack, just as you would connect your telephone
to the wall. Dial-up is the slowest connection
method and it requires your computer to have a
dial-up modem.
23. 2. Broadband: Broadband is a high-speed
connection method which can utilize cable, DSL,
or satellite. Each of these methods requires
different types of hardware.
3. Fiber-optic: Fiber-optic communication
transmits data by sending pulses of light through
ultra-thin optical fiber. Because light travels so
quickly, this technology can transmit Internet
data at super-fast speeds.
24. • Internet Service Provider (ISP): Internet Service Providers are
companies that connect you to the Internet . ISPs are available
on a local, state, and national level. Large communication
companies control access to the main lines of the Internet
structure. They, in turn, supply Internet access to the smaller
ISPs, who pass this along to the consumer. Not all ISPs offer all
methods of connection to the Internet. Make sure the ISP you
select offers service that corresponds to your connection
method and hardware.
25. • Web Browser: You’ll need to have a web browser installed on
your computer. This is a software program that allows you to
view web pages and navigate the Internet. Microsoft’s Internet
Explorer is probably the most commonly used web browser. It
often comes pre-installed when you purchase a computer that
has a Microsoft Windows operating system.
• There are other free web browsers available, including
Mozilla’s very popular Firefox web browser and Apple’s Safari.
You can have more than one browser installed on your
computer.
26. The services available on the internet
and world wide web
• Communication services:
1- electronic mail :used to send electronic
massage over the internet.
2-telnet: used to log on to a remote computer
that is attached to internet.
3-newsgroup: offers a forum for people to
discuss topics of common interests.
27. 4- internet relay chat (IRC): allows the people
from all over the world to communicate in real
time.
5- mailing lists: used to organize group of
internet users to share common information
through e-mail.
6-internet telephony (volP): Allows the internet
users to talk across internet to any PC equipped
to receive the call.
7- instant messaging: offers real time chat
between individuals and group of people . Eg,
yahoo messenger , MSN messenger.
28. • Information retrieval service:
1- file transfer protocol (FTP): enable the users
to transfer files.
2- archive: it’s updated database of public FTP
sites and their content. It helps to search a file
by its name.
3-gopher: used to search, retrieve, and display
documents on remote sites.
4-very easy rodent oriented net wide index to
computer achieved (VERONICA): is gopher
based resource. It allows access to the
information resource stored on gopher’s servers.
29. • Web services: allow exchange of information
between applications on the web. Using web
services, applications can easily interact with
each other.
• World wide web: it offers a way to access
documents speed over the several servers
over the internet. These documents may
contain texts, graphics, audio, video,
hyperlinks. The hyperlinks allow the users to
navigate between the documents.