Ch 4: Online Connectivity & Security for Nursing Informatics

About This Chapter

This chapter evaluates topics pertaining to online connectivity and security in nursing informatics. Review these convenient lessons and self-assessments at any time to boost your nursing informatics knowledge and get ready for upcoming exams.

Online Connectivity & Security for Nursing Informatics - Chapter Summary

This collection of bite-sized lessons examines the importance of online connectivity and security in nursing informatics. Taught by expert instructors, these lessons evaluate various search engines and Internet collaboration platforms that are used in healthcare settings, as well as data breach and computer security threat topics. Following each lesson is a short quiz to help you reinforce your understanding of the material. Work through the chapter at your own pace, and submit questions to our instructors if you need any help. You can use any computer or mobile device to study, and the chapter is available to access at any time that fits your schedule. By the end of the chapter, you should be able to:

  • Describe the role of HIPAA and PIH in medical technology
  • Use search engines for online research
  • Recognize Internet collaboration platforms
  • Differentiate between Intranet and Extranet
  • Evaluate several security policy frameworks
  • Assess healthcare data breaches
  • Understand how individuals and organizations can prevent computer security threats

8 Lessons in Chapter 4: Online Connectivity & Security for Nursing Informatics
Test your knowledge with a 30-question chapter practice test
Using Search Engines for Online Research

1. Using Search Engines for Online Research

The Internet can be a resource that saves you time, but if you don't know how to use it properly, it can be a frustrating experience. In this lesson, you will learn about how to properly find supporting materials online with research tips and tricks.

Internet Collaboration: Second Life, VOIP, Video Conferencing, Virtual Reality & Telepresence

2. Internet Collaboration: Second Life, VOIP, Video Conferencing, Virtual Reality & Telepresence

Today, individuals and businesses are collaborating and interacting online from dispersed locations. Many technologies make it possible to communicate, learn, conduct business, and socialize with people from anywhere in the world. This lesson will discuss various Internet collaboration tools and virtual reality concepts.

Intranet and Extranet: Comparing Information and Data Dissemination

3. Intranet and Extranet: Comparing Information and Data Dissemination

Organizations rely upon intranets and extranets to share information, communicate with employees, suppliers and customers, and enable collaboration on projects. This lesson explains how intranets and extranets work. It introduces the topics of virtual private networks, tunneling and firewalls.

What Is a Security Policy? - Definition, Examples & Framework

4. What Is a Security Policy? - Definition, Examples & Framework

In the IT world, we protect an organization by having a strong, well-defined security policy. In this lesson, we'll examine how to create an effective policy that protects assets, employees, and data.

Data Breaches in Healthcare

5. Data Breaches in Healthcare

More and more, data breaches are starting to happen to healthcare records as often as financial records. This lesson explains why that could be more dangerous for consumers.

Computer Security & Threat Prevention for Individuals & Organizations

6. Computer Security & Threat Prevention for Individuals & Organizations

Computer security and threat prevention is essential for individuals and organizations. Effective security measures can reduce errors, fraud, and losses. This lesson will explore unintentional threats and intentional threats. Various security measures and defenses will be explored, including encryption, firewalls, anti-virus, anti-spyware, passwords, back-ups, and biometric security.

The Role of HIPAA & PHI When Using Technology

7. The Role of HIPAA & PHI When Using Technology

You will have heard about HIPAA, if you are employed by a healthcare facility, a health insurance company or any company that may see medical records because of the services they provide. Your daily work is affected by HIPAA rules of privacy and security. Let's learn about HIPAA.

Required Assignments Reminder

8. Required Assignments Reminder

Sorry for the interruption to your course progress! We wanted to make sure you knew this course has a written assignment requirement in order to be completed. Read on to learn where to find these assignments and how to submit them.

Chapter Practice Exam
Test your knowledge of this chapter with a 30 question practice chapter exam.
Not Taken
Practice Final Exam
Test your knowledge of the entire course with a 50 question practice final exam.
Not Taken

Earning College Credit

Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Support