2. Introduction
2003
2009
2011
2012
M.D. (First-Class Honors) (Ramathibodi)
M.S. in Health Informatics (U of MN)
Ph.D. in Health Informatics (U of MN)
Certified HL7 CDA Specialist
• Deputy Executive Director for Informatics (CIO/CMIO)
Chakri Naruebodindra Medical Institute
• Lecturer, Department of Community Medicine
Faculty of Medicine Ramathibodi Hospital
Mahidol University
nawanan.the@mahidol.ac.th
SlideShare.net/Nawanan
http://groups.google.com/group/ThaiHealthIT
3. Social Media & Social Networks
Image Source: http://michaelcarusi.com/2012/01/01/when-you-should-not-become-a-social-media-manager/
4. Social Media
• “A group of Internet-based applications that build
on ideological and technological foundations of
Web 2.0, and that allow the creation and
exchange of user-generated content” (Andreas
Kaplan & Michael Haenlein)
Kaplan Andreas M., Haenlein Michael (2010). "Users of the world, unite! The
challenges and opportunities of social media". Business Horizons 53 (1). p. 61.
5. Types of Social Media & Examples
•
•
•
•
•
•
•
Collaborative projects (Wikipedia)
Blogs & microblogs (Twitter)
Social news networking sites (Digg)
Content communities (YouTube)
Social networking sites (Facebook)
Virtual game-worlds (World of Warcraft)
Virtual social worlds (Second Life)
Kaplan Andreas M., Haenlein Michael (2010). "Users of the world, unite! The
challenges and opportunities of social media". Business Horizons 53 (1). p. 61.
6. Second Life: A Virtual Community
Image source: http://secondlife.com/whatis
7. Some Common Social Media Today
Use of brands, logos, trademarks, or tradenames do not imply endorsement or affiliation
8. The Age of User-Generated Content
Time’s Person
of the Year 2006:
You
9. Thailand Internet User Profile (2013)
• สํานักงานพัฒนาธุรกรรม
ทางอิเล็กทรอนิกส์
(องค์การมหาชน)
(สพธอ. หรือ ETDA)
http://www.etda.or.th/internetuserprofile2013/TH_InternetUserProfile2013.pdf
16. Maslow's Hierarchy of Needs
Image Source: http://en.wikipedia.org/wiki/Maslow's_hierarchy_of_needs
17. Why People Use Social Media?
•
•
•
•
To seek & to share information/knowledge
To seek & to share valued opinion
To seek & to give friendship/relationship
To seek & to give mental support, respect, love,
acceptance
• In simplest terms: To “socialize”
21. Why People Use Social Media in Healthcare?
• To seek & to share health information/knowledge
– Information asymmetry in healthcare
– Information could be general or personalized
• To seek & to share health-related valued opinion
• To seek & to give friendship/relationship
• To seek & to give mental support, respect, love,
acceptance during medical journeys
• In simplest terms: To “socialize”
22. Meet E-Patient Dave
• Richard Davies deBronkart Jr.
• Cancer survivor & blogger
• Found proper cancer treatment
through online social network after
diagnosis
• Activist for participatory medicine &
patient engagement through
information technology
http://www.epatientdave.com/
24. Consumer Health Informatics
• Patients as consumers of healthcare &
health information
• Patient’s health literacy
• Patient’s access to health information
• Patient engagement & empowerment
through IT
• Patients as partner in health care
25. Personal Health Records
• “An electronic application through which individuals can
access, manage and share their health information, and that
of others for whom they are authorized, in a private, secure,
and confidential environment.” (Markle Foundation, 2003)
Personal Health
Records (PHRs)
accessible by
patients at home
Electronic Health Records
(EHRs) in hospitals
27. But then again...There are Risks of Social Media
• Blurring lines between personal & professional
lives
• Work-life balance
• Inappropriate & unprofessional conduct
• Privacy risks
• False/misleading information
31. Social Network Case Study #2
Source: Drama-addict.com
Disclaimer (นพ.นวนรรน):
นําเสนอเป็นกรณีศึกษาเพื่อการเรียนรู้
เรื่อง Social Media เท่านั้น ไม่มี
เจตนาลบหลู่ ดูหมิ่น หรือทําให้ผู้ใด
เสียหาย โปรดใช้วิจารณญาณในการ
อ่านเนื้อหา
32. Social Network Case Study #3
• ปรากฏภาพถ่ายเอกซเรย์สมองของนักการเมือง
ชื่อดังที่มารับการรักษาในโรงพยาบาลแห่งหนึ่ง ใน
Line ของบุคลากรทางการแพทย์บางกลุ่ม ที่ไม่ได้มี
หน้าที่ในการรักษาผู้ป่วยโดยตรง
33. A U.S. Case Study on Patient Privacy
http://usatoday30.usatoday.com/life/people/2007-10-10-clooney_N.htm
44. Need for Strong Password Policy
So, two informaticians walk into a
bar...
The bouncer says, "What's the
password."
One says, "Password?"
The bouncer lets them in.
Credits: @RossMartin & AMIA (2012)
45. Recommended Password Policy
Length
8 characters or more (to slow down brute-force attacks)
Complexity
Consists of 3 of 4 categories of characters
Uppercase letters
Lowercase letters
Numbers
Symbols
46. Recommended Password Policy
No meaning (“Dictionary Attacks”)
Not simple patterns (12345678, 11111111)
Not easy to guess (birthday, family names, etc.)
(to prevent unknown & known persons from
guessing)
47. Recommended Password Policy
Expiration
6-8 months
Different password for each account. Create
variations to help remember. If not possible,
have different sets of accounts for differing
security needs (e.g., bank accounts vs. social
media sites)
Personal opinion. No legal responsibility assumed.
48. Technique to Remember Passwords
One easy & secure way: password mnemonic
Think of a full sentence that you can remember
Ideally the sentence should have 8 or more words,
with numbers and symbols
Use first character of each word as password
Sentence: I love reading all 7 Harry Potter books!
Password: Ilra7HPb!
Easy to remember, but hard to guess!
Personal opinion. No legal responsibility assumed.
50. Signs of a Phishing Attack
Poor grammar
Lots of typos
Trying very hard to convince you to open
attachment, click on link, or reply without
enough detail
May appear to be from known person (rely on
trust & innocence)
51. Ways to Protect against Phishing
Don’t be too trusting of people
Always be suspicious & alert
An e-mail with your friend’s name & info doesn’t have to come from
him/her
Look for signs of phishing attacks
Don’t open attachments unless you expect them
Scan for viruses before opening attachments
Don’t click links in e-mail. Directly type in browser using known &
trusted URLs
Especially cautioned if ask for passwords, bank accounts, credit card
numbers, social security numbers, etc.
68. สรุป
• Social media เป็น trend ของสังคมในปัจจุบันที่ปฏิเสธไม่ได้
• Social media ใน healthcare และ nursing เป็นทั้งโอกาส
และภัยคุกคาม
• องค์กรควรมีนโยบายด้าน Social media และ Security &
privacy รวมทั้งมีการอบรม สร้างความตระหนัก และบังคับใช้
• บุคคลควรตระหนักถึงความเสี่ยงในการใช้ Social media อยู่
เสมอ และใช้อย่างระมัดระวัง รับผิดชอบ และมีจริยธรรม
69. More Information
• ข้อแนะนําในการใช้งาน Social Media
– http://www.etda.or.th/etda_website/app/webroot/files/1
/files/Guidelines.pdf
• แนวปฏิบัติในการใช้บริการสื่อสังคมออนไลน์
– http://www.etda.or.th/etda_website/content/1191.html
• Thailand Internet User Profile 2013
– http://www.etda.or.th/internetuserprofile2013/TH_Intern
etUserProfile2013.pdf