Title: Data Systems and Issues
1Data Systems and Issues
- NCAEMSA Winter Conference 2004
- Wednesday February 18, 2004
William E. Ott, MS, Paramedic CPCS
Technologies www . cpcstech . com
2Integrated System
Data transformation and scrubbing
Data Reporting
Data Warehouse
Law Enforcement
Medical Examiner
Medical Direction
EMS
Hospitals
3Mobility PAN, LAN, WAN
802.11b
Local Area Network wLAN
Bluetooth
Personal Area Network (PAN)
Wide Area Network (WAN)
WirelessBridge
GPS
LAN
lt1Mbs
- Access
- Synchronization
- 10 Meters
WorkgroupSwitches
lt11Mbs
9.6 Kbit/s lt2Mbs
- Access
- hot spots
- LAN equivalent
- Voice
- SMS
- e-Mail
- Web browsing
- mCommerce
- Internet access
- Document transfer
- Low/high quality video
4(No Transcript)
5EMS as Information Workers
- What is involved?
- Electronic patient records
- CAD data pre and post response
- GIS data pre and post response
- System performance data
- Application of performance data to the continuing
education program - Personnel data
- System / Vehicle data
- Facility/Event preplan data
6Threats to Information Systems
- Malicious abuse
- Denial of Service and related attacks
- Virus, Worm, and Trojan attacks
- Outside Hacker attacks
- Theft of service
- Theft of information
- Poorly trained IT staff
- Not staying current with system patches,
antivirus definitions, etc.. - Not performing proper system maintenance
- Poor or no backup and contingency plans
7Threats to Productivity
- Spam
- wastes resources
- wastes time
- offensive, dangerous
- Popup ads
- wastes resources
- annoying
- Malicious use of resources
- wastes bandwidth, storage
- violates law and privacy
8Threats to Privacy / Confidentiality
- No security plan
- No security training or awareness
- Smart or Meta Tags in shared documents
- Social Engineering
- Unencrypted network
- Unencrypted e-mail
- No firewall
- No antivirus system
- Rogue wireless
- PDAs connecting to network and servers
9Some Security Options
- Virtual Private Networking (VPN)
- Active AntiVirus Screening
- Stateful packet inspection Firewalling
- Proxy servers
- Opt-in e-mail
- Database encryption
- E-mail encryption
- Network / PC security policies
- Two Factor User Authentication
- Aggressive Audit logging and review
10Sources of Threats
- Employees
- Unintentional - acting in good faith
- Intentional - disgruntled or unhappy staff
- Software errors
- Environment
- Equipment failure
- Fire, flood, earthquake
11Comprehensive Security Policy
- The policy must address
- Physical Security
- Computer hardware and software inventory
- Personnel screening and selection
- Ongoing education
- Access and control procedures
12Comprehensive Security Policy
- Must also address
- Procedures for release of information
- Disposal of data
- Data backup and recovery
- Contingency planning
- Sanctions for noncompliance
- Periodic review
13Costs of Security
- Reduced access to information.
- Increased time and effort to access information.
- Hardware and software to implement security.
- Staff time to implement and maintain security
system.
14Physical Security
- Control access to servers and network equipment.
- Locate workstations in secure area, not easily
accessible to the public. - Provide surge protection and uninterruptible
power supplies. - Provide fire alarms and fire suppression
equipment.
15Hardware Security
- Hardware should be dependable.
- Non-proprietary to allow for easy repair and
replacement. - Critical systems should be mirrored and spare
parts available for likely to fail components. - Routine maintenance and tuning should be done.
Have a service contract in place! - Maintain accurate and up to date inventory.
16Software Security
- Applications should be chosen with security in
mind. - Should have the capability of encryption for data
storage and communication. - System security software
- Firewall
- Intrusion detection
- Anti-virus
- Disk defragmenter
- Maintain accurate and up to date inventory.
17Access control
- Protect critical resources by limiting access to
authorized and authenticated users. - Specify
- who can access the information,
- how it can be accessed,
- when it can be accessed, and
- under what conditions it can be accessed
18What Are Potential Disasters?
- External
- Storms (hurricanes, tornados, floods, hail)
- Accidents (planes, trains, automobiles, hazardous
mat.) - Regional Outages (power, communications)
- Violence (civil unrest, terrorist acts,
bioterrorism) - Internal
- Hardware Failures (servers, data stores, cyber
attacks..) - Accidents (fires, water leaks, electrical)
- Violence (disgruntled employee, corp. sabotage)
19Contingency Planning
- Plan for interruption of service.
- Have alternate plan for data capture and
retrieval. (Paper?) - Have adequate security for alternate plan.
20Data Backup and Recovery
- One of the most crucial components!
- Most likely component to be ignored.
- Practice data recovery!
- Use data protection schemes such as mirroring,
RAID. - Large agencies should consider hot sites.
21Disposal of Data
- Discarded computer parts and peripherals should
be dependably erased or destroyed. - Removable media should be accounted for.
- Hardcopy printed from computerized records should
be controlled.
22System Components
Control Mechanism
Input
Output
Transformation
23Four Parallel Systems
- User system
- Data system
- Software system
- Hardware system
User
Data
Software
Hardware
24Input
- Automatic data capture
- User Assisted
- Optical Mark Reader (OMR)
- Optical Character Reader (OCR)
- Keyboard
- Voice recognition
25Transformation
- Data is collected and analyzed
- Aggregation
- Analysis
- Validation
26Output
- Reporting
- Ad hoc
- Exception reports
- Aggregate
- Publishing
- Web-based
27Control Mechanism
- Quality improvement
- Education
- Administrative policies
- Medical protocols
28Systems Architecture
- Stand-alone
- Peer network
- Mainframe-terminal
- Client-server
- Terminal-server
29Stand Alone
- Each computer functions alone.
- No connection with any other computers.
- Easy to maintain.
- File transfer by sneaker net only.
30Peer Network
- Computers connected to each other.
- Limited to file and print sharing.
- Connected via local area network.
- Share of data weakens security.
- No central control.
31Mainframe-Terminal
- May be mini-computer or mainframe.
- Commonly referred to as legacy system.
- Dumb terminals.
- All activity on main computer.
- Connected with cable.
- Normally not GUI based application.
- Not conducive to ad hoc queries and reporting.
32Client-Server
- Client are fully functional computers.
- Server may host applications.
- File sharing and printing normally done through
server. - Connected via local or wide area network.
- May be very secure.
- High cost of multiple client workstations
(purchase and maintenance)
33Terminal-Server
- New technology.
- Multiple dumb terminals connected to server.
- Applications, printing, file storage are on
server. - Connected via local or wide area network.
- Centrally maintained software.
- Low-cost network terminal.
34Clustering
- Multiple servers.
- Servers are joined and share processing.
- Service is maintained with failure of single
server. - Highly dependable with little down-time.
35Database Systems
36Schema
- Pronounced SKEE-mah.
- The organization or structure for a database.
- Often used to refer to a graphical depiction of
the database structure.
37Data Components
- Database
- Tables
- Records
- Columns
38Tables
Table Name
Primary Key
Column Names
39Table
- A collection of similar data organized in columns
and rows (records). - Concept similar to a spreadsheet.
Table
Row (Record)
Column
40Column
- Each column is a data element.
- The storage format for each column is defined
- Column names are listed at the top
Column Name
Column Data
41Data Element
- Data elements have different types
- All data in a column will be of the same type.
Column Data
42Data Element Types
- Character or text
- Numerical
- Integer
- Fixed
- Real
- Date (time)
- Binary or raw
- Memo or long
- Link
43Data Elements
- Each field has a type.
- The length of the field is set for character
fields. - Most other fields can expand to accommodate more
data.
44Data Elements
- Beware! Not all fields containing numbers
should be number fields. - Numbers that are not used in any arithmetic
should be in character fields. - Examples are Social Security numbers, telephone
numbers and any other identification number.
45Database Front-End
- Front-end the interface that the user sees to
input and manipulate data. - Front-ends are usually built using some
programming language such as - PowerBuilder
- Visual Basic
- Java
- Delphi
- Usually connect to some relational database.
46Database Back-end
- Back-end the relational database used to store
and manipulate the data. - Relational database management (RDBM)
47Relational Database
- A collection of data items organized as a set of
tables (like spreadsheets). - Tables may be linked to form new tables.
- Has rows and columns to show the relationships
between items. - Tree-like structure.
48Flat File Database
- Stores information in single file.
- Does not allow a one-to-many relationship.
- Limits the amount of data that may be input per
record.
49Desktop DB vs. RDBMS
- Desktop include
- Access
- Approach
- Filemaker Pro
- FoxPro
- All processing occurs on the standalone.
- Intended for smaller databases.
- Front-end included.
- RDBMS include
- Oracle
- Informix
- DB2
- MS SQL
- Processing occurs on the server.
- Has tools for larger databases.
- Requires front-end programming.
50One-to-Many Relationship
One Incident- Many Patients
Incident
Patient
Patient
Patient
51One-to-Many Relationship
One Patient- Many Events
Patient
52Many-to-Many Relationship
Doctor
One Patient- Many Doctors
Doctor
Doctor
One Doctor- Many Patients
53One-to-One Relationships
One Patient-One Home Address
Patient
Home Address
One Ambulance-One Defibrillator
Ambulance
Defibrillator
54Keys
- A key field should be present in each table.
- Tables are related (linked) using keys.
- A key may be made of multiple combined fields.
55Primary Keys
- Primary keys are values that uniquely identify
each record within the table. - Primary keys must always be filled in and not
duplicate any of the other values in the table.
56Foreign Keys
- Tables may contain a foreign key.
- Foreign keys are the primary key for a related
table. - Multiple records may have the same foreign key
that link them to a single record in the related
table.
57Table Relationship
Primary Key
Treatment
PatientID Treatment ID Medication Dosage Route
Foreign Key
Same value
Links the two tables
58Table Joins
- May create a new table, target, from the
source tables. - May be temporary called a query.
- May use many tables to assemble the desired data
set.
59Table Join
Tables are associated with the primary key
Note One-to-many relationship
60Relational vs. Flat File
- Flat file databases are limited to predefined
number of data occurrences. - Most desktop databases are relational, however,
some applications are designed as flat file.
61Relational vs. Flat File
Flat File Database
Relational Database
Note One-to-many relationship
62Table Join
The Patient ID is the primary key in the patient
table and the foreign key in the medication table
Note One-to-many relationship
63Table Joins
Source
Source
Target
64Table Joins
Source
Source
Target
65Reporting
66Reporting
Name Patient ID Medication Dosage Og
Oglesby OR13567 ASA 162 mg Og Oglesby
OR13567 Atropine 1.0 mg John Doe OR54321
Epinephrine 1.0 mg John Doe OR54321
Oxygen 12 l/m
67(No Transcript)