You are on page 1of 115

Project In Charge: P L Chau - Director

Information and software Industry Association


Organizers:

香港醫學會
THE HONG KONG
MEDICAL ASSOCIATION

Funded by:
› the Office of the Government Chief Information
Officer (OGCIO) ( 政府資訊科技總監辦公室 ) under the
Sector-specific Programme (SSP) scheme
Course Structure
Lesson 1 Basic Health Informatics AND
Introduction to Clinic Management System
(HKMA HKMA CMS 3.0)
Lesson 2 Basic Health Informatics
Introduction to Clinic Management System
(HKMA HKMA CMS 3.0)
Lesson 3 Free and Open Source Software
HKMA CMS 3.0 - Nurse's Perspective
Lesson 4 Free and Open Source Software
HKMA CMS 3.0 - Nurse's Perspective
Lesson 5 Safety in Handling Patient Data AND
HKMA CMS 3.0 - Doctor's Perspective
Lesson 6 Safety in Handling Patient Data AND
HKMA CMS 3.0 - Doctor's Perspective
Lesson 7 Internet Technology Update AND
HKMA CMS 3.0 - Administrator’s Perspective
Lesson 8 Internet Technology Update AND
HKMA CMS 3.0 - Administrator’s Perspective
Session 1 Basic Health Informatics

A. I.T. Basic concept review


B. Electronic medical record systems
C. ePR/eHR in Hong Kong (current HA PPI-ePR and
future eHR exchange platform)
D. Importance of data exchange standards (e.g. HL7,
DICOM)
E. Importance of Diagnosis Related Group, DRG
F. Disease classification standards and their use (ICD,
ICPC etc.)
A. I.T. Basic concept review

 Information Technology
› study, design, development, implementation,
support or management of computer-based
information system (software + hardware)
› I.T. deals with the use of computers (i.e.
hardware) and software to:
 convert, store, protect, process, transmit,
and securely retrieve information.
A. I.T. Basic concept review

Output Output
Data Information Knowledge
Management /
Process
Input Input Analysis

Storage
A. I.T. Basic concept review

Information System
Concepts / Methodologies / Theories

Software Hardware
Data /
Information

People Procedures
B. Electronic Medical Record Systems

 Electronic record means record in digital format.


 eMR is a repository of information about the
patient’s health available in digital format.
 eMR System can also be defined as eHR System
(i.e. Electronic Health Record System).
 The system is a set of components (eMR
system’s components) establishing mechanisms
to:
› generate, capture, use, store, transmit,
retrieve and manipulate an eMR.
B. Electronic Medical Record Systems

 Scope, Functions and Features


› Contains all possible health-relevant data of a
patient.
› Includes wellness, food-related and other
health related information.
› Established beyond an institutional
framework, geographically, it may cover
regional, national and global areas.
› It may be web-based.
› It may also include participation of patient in
creating the database.
B. Electronic Medical Record Systems

 The functions and features can be summarized into:


› access and manage health information and data
› by multiple settings, access new and past test results
› all orders can be computerized and manipulated by system
› system has a decision support for better clinical practices
by using reminders, prompts, and alerts
› provide electronic communication and connectivity
› allow patient to access their health records
› administrative processes support daily operation
› Reporting function generates report to all involved parties
› note that not all eMR systems have all the functions above
B. Electronic Medical Record Systems

 Application Areas
› According to scope or scale (i.e. size) of the system, it
can be implemented from small clinic to a world-wide
hospital network.
› Apart from medical centers, this kind of system is also
suitable for health care center, elderly caring center,
psychiatric hospital, birthing center…etc.
 Show Case
› Cabarrus Family Medicine in Concord, North Carolina,
a practice that has 26,000 patients across 4 clinics
with intranet-enabled eMR System.
B. Electronic Medical Record Systems
eHR e-communication framework
C. ePR / eHR in Hong Kong
 Current HA PPI-ePR and future eHR exchange
platform
 Background
› PPI – ePR  Public–Private Interface –
Electronic Patient Record Sharing Pilot Project
 HA has employed CMS (Clinical Management
System) since 1995.
 Currently, there are over million patient records
in HA’s Patient Master Index using HK ID Card
number.
 A pilot on the sharing of Electronic Patient
Records with the private sector has implemented
since April 2006.
C. ePR / eHR in Hong Kong

 Project Objectives
› Enhance collaboration between the public and
private health sectors
› Allow continuity of care for patients
› Facilitate free flow of patients between two
sectors
› Provide timely access of information
C. ePR / eHR in Hong Kong

 Project Scope
› Acceptance test of concept for all involved
parties
› Technical feasibility with security issue
› Content of patient record review with
sensitive information concern
C. ePR / eHR in Hong Kong
 Phases of the project
C. ePR / eHR in Hong Kong
 Logon and Logged On screens
C. ePR / eHR in Hong Kong
 Logon and Logged On screens
C. ePR / eHR in Hong Kong
 Current Status
› Since 2006, more than one thousand private
healthcare professional
› 40,000 patients had already enrolled in PPI-
ePR with more than 33,000 numbers of ePR
access made.
 The current concern or issue of project can be
revealed by its newsletters.
 For instance, the latest one (dated on 30 Apr
2009) has informed all registered doctors and
healthcare partners regarding a new feature has
been added to allow them easy access to most
up-to-date information from Centre for Health
Protection (CHP) of Human Swine Influenza
(H1N1).
D. Importance of Data Exchange Standards
(e.g. HL7, DICOM)

 Why needs standard for data exchange?


› There is a necessity to exchange patients’
information among medical institutes.
However, in reality, a large number of different
data formats poses many problems in the
course of their exchange among different
systems or applications.
› In order to ensure interoperability among
various systems (including telecom systems),
electronic medical data exchange standards are
created and developed.
D. Importance of Data Exchange Standards
(e.g. HL7, DICOM)

 Data Exchange Standard


› HL7 (Health Level Seven), is an all-volunteer,
not-for-profit organization involved in
development of international healthcare
standards.
 It provides a framework for exchange,
integration, sharing and retrieval of
electronic health information.
 The latest version is v2 which supports
clinical practice and management, delivery,
and evaluation of health services.
D. Importance of Data Exchange Standards
(e.g. HL7, DICOM)

 Data Exchange Standard


› DICOM (Digital Imaging and Communications
in Medicine) is a standard for handling,
storing, printing, and transmitting medical
images. It also defines file format and
communication protocol.
› Our CMS is compatible with DICOM standard,
i.e. CMS can access and handle DICOM file
format.
D. Importance of Data Exchange Standards
(e.g. HL7, DICOM)

 Data Exchange Standard


› LOINC (Logical Observation Identifiers Names and
Codes) is a database standard for identifying medical
laboratory observations.
› CDISC (Clinical Data Interchange Standards
Consortium)
 It is a non-profit organization who develops and
supports global, platform-independent data
standards that enable information system
interoperability
 to improve medical research and related areas of
healthcare.
 The preferred electronic format is XML.
E. Importance of Diagnosis Related Group

 Diagnosis Related Group (DRG) is a system to


classify hospital cases into 500 groups
(approximately).
› Purpose of this group is to develop a patient
classification system that related types of
patients treated to the resources they
consumed.
› It is because the demand of higher level of
sophistication and precision for a patient
classification, the scope of DRG had to
expand.
E. Importance of Diagnosis Related Group

 It now includes SIX DRGs, namely, Medicare,


Refined, All Patient, Severity, All Patient Refined
and International-Refined.
 Versions Revision
› DRGs were first implemented in 1980.
› There are two major versions, v25 revision
and v26 revision.
› 1 Oct 2007, v25 resequenced the groups.
› There was one main change in v26 on 1 Oct
2008, implementation of Hospital Acquired
Conditions (HAC).
E. Importance of Diagnosis Related Group

 Hong Kong current situation with DRG


› Background, the new “Pay for Performance”
(P4P) system for resources allocation on the
basis of the output and workload of hospitals.
› HKHA has adopted a casemix classification
system for resources allocation, called
Diagnosis Related Groups.
› In result, DRG mainly applies for costing &
purchasing for HKHA.
F. Disease Classification Standards

 Disease Classification Standards are the frameworks for


classifying diseases.
 Two main standards are ICD and ICPC.
› ICD means International Classification of Diseases
› ICD is a classification model for diagnostic for all
general epidemiological, health management purposes
and clinical use
› Including analysis of general health situation of
population groups and monitoring of the incidence
› Prevalence of diseases and other health problem in
relation to other variables (e.g. characteristics of
individuals affected).
› The latest revision of ICD is 10, i.e. ICD-10.
F. Disease Classification Standards

 ICPC
› It stands for International Classification of Primary
Care
› The latest edition of ICPC is second edition (ICPC-2)
› ICPC was developed to order medical concepts into
classes that have been chosen for their relevance for
family medicine.
› It classifies patient data and clinical activity in the
domains of General / Family Practice and primary care
› Taking into account the frequency distribution of
problems seen in these domains.
F. Disease Classification Standards

 Usage of ICD and ICPC


› ICPC is easy to use, simple in construct, multilingual
and multicultural.
› Codes can be mapped to ICD for comparison with
other controlled vocabularies.
› ICPC-2 classifies patient data and clinical activity in
the domains of General / Family Practice and primary
care.
› Taking into account the frequency distribution of
problems seen in these domains.
› ICPC-2 allows classification of the patient’s reason for
encounter, the problems / diagnosis managed,
interventions.
› The ordering of these data in an episode of care
structure.
F. Disease Classification Standards

 Usage of ICD and ICPC


› ICD allows morbidity and mortality data to be
systematically collected from different countries and
statistically analyzed.
› It is also used by individual countries to prepare
statistical returns.
› ICD is used to classify diseases and other health
problems recorded on many types of health and vital
records including death certificates and health records.
› ICD-9-CM (International Classification of Diseases,
Clinical Modification) is employed for our CMS.
Instructor: Louie AU (MSc (e-Commerce for Executives), BBus)
Information and Software Industry Association
louie_au@hotmail.com
Session 2 - Free & Open Source Software (FOSS)

A. Basic Concepts of Source Code and Software


B. Concepts and Advantages of FOSS
C. FOSS Licensing Concepts
D. Common Foss to Doctors
A. Basic Concepts of Source Code and Software

 Software, Program, Source Code


› Software performs specific tasks for users.
› It (or application software) comprises a set of
programs, or one single program.
› Program consists of a set of program statements or
commands which are written by human (i.e.
programmer). Those commands will instruct the
computer to carry out specific tasks.
› Commands (source code or source) need to be
translated into computer readable format (object
code or executable file).
› This translation process is called compilation or
interpretation.
A. Basic Concepts of Source Code and Software

 Sample source code of Java

/**
* The HelloWorldApp class implements an application that
* simply prints "Hello World!" to standard output.
*/

class HelloWorldApp {
public static void main(String[] args) {
System.out.println("Hello World!"); // Display the string.
}
}
B. Concepts and Advantages of FOSS

 commercial software and open source software


 Commercial software is sold and support commercially.
› proprietary software or closed software.
 FOSS – Free Software & Open Source Software
› Sometimes they are treated as one single
software type or their features are common and
interchangeable.
B. Concepts and Advantages of FOSS

 Free Speech vs Free Beer


 Free Speech
› Freedom as in the ability to do whatever you
want.
› Free software is free as in speech.
› The source code can be studied, modified, shared
and executed.
› It does not necessarily mean that the application
costs nothing in terms of money.
B. Concepts and Advantages of FOSS

 Free Speech vs Free Beer


 Free Beer
› means the application doesn’t cost anything in
terms of money.
› It does not mean that you have any rights to the
source code, modification, or sharing the
application.
› Just means you don’t have to spend any money
on it.
B. Concepts and Advantages of FOSS

 Free Software is a matter of liberty, not price. It concerns


about the freedom.
› Freedom to run / use / execute the software;
› Freedom to study how the programs (software)
works by accessing to the source code;
› Freedom to redistribute copies;
› Freedom to improve / enhance the software
(programs) and release the improvements to the
public.
B. Concepts and Advantages of FOSS

 Open Source Software may not just mean access to the


source code. Its distribution terms should also comply with
the following:
› Free Redistribution
› Source Code and compiled form
› Derived Work
› Integrity of Author’s Source Code
› No Discrimination against Persons, Groups or
Fields of Endeavor
› Distribution of License
› License Must Not Be Specific to a Product
› License Must Not Restrict Other Software
› License Must Be Technology-Neutral
B. Concepts and Advantages of FOSS

 Benefits to End Users


› cost of software itself will reduce sometimes
› free software can be chargeable
› free software means a user is free to run the
program, change the program and redistribute the
program with or without charges.
› program is free regardless of the price, because
users have freedom in using it.
› no more dependent on sole vendor, specially, on
maintenance and support; but rather by FOSS
communities and all techies.
› avoid monopoly
› end users can enjoy more innovation
B. Concepts and Advantages of FOSS

 Benefits to Developers
› more innovation and interaction in the industry, as
a result, industry grows faster technologically.
› developers learn more from other developers,
exchange and share more ideas among
developers and communities.
› intangibly, developers will gain recognition, even
being famous, through this model easier
C. FOSS Licensing Concepts

 Copyleft
› The word “copyleft” can make people thinking the
word “copyright” easily. Here, the word “left”
means the inverse of “right”.
› It is a general method for making a program or
other work free, and requiring all modified and
extended versions of the program to be free as
well.
› The simplest way to do so, put the software in the
public domain, i.e. not copyrighted.
C. FOSS Licensing Concepts

 Common OSS Licenses


› GPL – GNU General Public License
 widely used free software license
 our CMS uses this one
› en.wikipedia.org/wiki/GNU_General_Public_License
› LGPL – Lesser General Public License
› en.wikipedia.org/wiki/LGPL
› MIT – free software license originating at the MIT
en.wikipedia.org/wiki/MIT_License
C. FOSS Licensing Concepts

 Distribution of Modified Codes


› The license must allow modifications and derived
works, and must allow them to be distributed
under the same terms as the license of the
original software.
› The license may restrict source-code form being
distributed in modified form only if the license
allows the distribution of “patch files” with the
source code for the purpose of modifying the
program at build time.
› This license must explicitly permit distribution of
software built from modified source code.
D. Common FOSS to
Doctors
 OpenOffice
D. Common FOSS to
Doctors
 GIMP
D. Common FOSS to
Doctors
 ClamWin
D. Common FOSS to
Doctors
 Ubuntu
D. Common FOSS to
Doctors
 OpenEMR
D. Common FOSS to
Doctors
 Evolution
D. Common FOSS to
Doctors
 Mozilla Thunderbird
D. Common FOSS to
Doctors
 Linux Desktop
D. Common FOSS to
Doctors
 Linux Desktop
Project In Charge: P L Chau - Director
Information and software Industry Association
Instructor: Louie AU (MSc (e-Commerce for Executives), BBus)
Information and Software Industry Association
Session 3 - Safety in Handling Patient Data

A. Data Security and Safety [for patients’ data]


B. Introduction to Public Key Cryptography
C. Public Key System Examples
D. Case Study of recent news of privacy breach with group
discussion
E. Data Encryption for USB flash drives
F. Other Security Measures
A. Data Security and Safety
[for patients’ data]

 Enterprise businesses and government offices face the


certainty of losing sensitive data from a lost notebook
computer or portable storage device.
 This drives the need for a complete data protection solution
that secures data.
 Patients’ information is much more sensitive, therefore this
kind of information needs more attention on the safety and
be secured.
A. Data Security and Safety
[for patients’ data]

 There are four concerns for patients’ data:


› Confidentiality: only authorized persons are
allowed to know or gain access to the information.
› Integrity: only authorized persons are allowed to
make change to the information.
› No abuse: no misuse or abuse on those
information or data. It includes any illegal activity.
› Safety: ensure the data / information is free from
risk of being lost or stolen.
B. Introduction to Public Key Cryptography

 Protection of sensitive and important data is to HIDE the


data from the others.
 It is the practice and study of hiding information
mathematically and technically.
› Encryption, converting ordinary information
(called plaintext) into unintelligible gibberish
(called ciphertext).
› Decryption, moving from the unintelligible
ciphertext back to plaintext.
B. Introduction to Public
Key Cryptography
B. Introduction to Public Key Cryptography

 3 dimensions of cryptography (1)


› Type of operations used for transforming plaintext
to ciphertext
 Substitution
 transposition
B. Introduction to Public
Key Cryptography

 Type of operations for plaintext to ciphertext


› Substitution, one element is mapped to another
 Caesar Cipher was an early substitution cipher
 each character is shifted 3 places up
 e.g. A  D; B  E
B. Introduction to Public
Key Cryptography

 Type of operations for plaintext to ciphertext


› Transposition, rearrange all elements
› Moving small pieces of the message around
› Anagrams are a primitive transposition cipher
› The example below shows 2 letters are switched with
each other
B. Introduction to Public Key Cryptography

 3 dimensions of cryptography (2)


› The number of keys used
 conventional encryption (same keys)
 public-key encryption (different key)
› The way in which the plaintext is processed
 block cipher (file transmission)
 stream cipher (voice communication)
B. Introduction to Public Key Cryptography

 Exercise of transforming plaintext to ciphertext


 Substitution
 Using Key of 4 to transform the
following plaintext to ciphertext
 SOFTWARE
 transposition
 Using anagram to transform the
following plaintext to ciphertext
 2 letters are switched with each other
HARDWARE
 Answer: SOFTWARE  VRIWZDUH
HARDWARE  AHDRAWER
B. Introduction to Public Key Cryptography

 Public Key Cryptography (1)


› Public Key Encryption (1)
 used for confidentiality.
 very secure
 no secret shared key between sender and
receiver
B. Introduction to Public Key Cryptography

 Public Key Cryptography (2)


› Public Key Encryption (2)
 A message encrypted with a recipient’s
public key cannot be decrypted by anyone
except a possessor of the matching private
key.
 A “key” is simply a small bit of text code
that triggers the associated algorithm to
encode or decode text.
 “Key pair” (i.e. public & private keys) is
generated by encryption program.
 The public key can be made public by
posting it to a key server or can be
discriminately shared by emailing it to
receivers.
 Upon receiving the encrypted message, the
private key will decrypt it.
B. Introduction to Public
Key Cryptography
 Public Key Cryptography (3)
› Public Key Encryption (3)
B. Introduction to Public Key Cryptography

 Public Key Cryptography (4)


› Digital Signature (1)
 it relates to the issue of authenticity (prove
the identity of sender).
 A message signed with sender’s private key
can be verified by anyone who has access to
the sender’s public key.
B. Introduction to Public
Key Cryptography
 Public Key Cryptography (5)
› Digital Signature (2)
C. Public Key System Examples
 e-Cert & Smart ID

 e-Cert
› is for secure on-line identification.
› is issued by a CA, [Recognized] Certification Authority,
for the purpose of supporting a digital signature which
purports to confirm the identity.
› identify the CA issuing it.
› name or identify the person to whom it is issued.
› contain the public key of person to whom it is issued.
› be signed by a responsible officer of the CA issuing it.
› can be on HK [Smart] ID Card and/or e-Cert File Card.
› Hongkong Post is a recognized CA.
C. Public Key System Examples
 e-Cert & Smart ID

 Smart ID
› Since 23 June 2003, HKSAR Government had started
issuing Smart ID Cards to the general public.
› The card stores basic personal data and templates of
two thumbprints.
› Applications of it include immigration application, e-
Cert, Library Card and Leisure Link Self-service Kiosk.
D. Case Study of recent news of privacy breach with
group discussion

 18-4-2008 屯門兒童體能智力測驗服務中心發生失竊,涉及一個存有近
700 名病人資料的 USB 記憶體。
 截至 08 年 4 月底的過去十二個月內共有九宗遺失電子儀器引致病人資料遺
失的呈報個案。
 事件共涉及 5,988 名病人,其中 3,117 名不涉及個人資料。至於餘下的
2,871 名病人,其中 961 名( 33% )並沒有密碼保護。
 20-3-2009 九龍東醫院聯網 1 名眼科醫生遺失 1 具個人電子儲存媒體,內
有 47 名眼科手術病人的個人資料。
 11-4-2009 基督教聯合醫院一名婦產科駐院女醫生遺失了一具電子儲存媒
體,有關的電子儲存媒體未有任何密碼保護或加密的系統,有關電子儲存媒
體載有八位病人個人資料。
 4-2009 基督教聯合醫院一名眼科女醫生於月初遺失了 1 具個人電子儲存媒
體,內存工作紀錄文件,共載有 47 名眼科手術病人的個人資料。
D. Case Study of recent news of privacy breach with
group discussion

 Group discussion on
› causes
› consequences
› possible solutions
 for cases of HA staffs lost USB flash drives
E. Data Encryption for USB flash drives

 Encryption can be applied to the protection of USB flash drives.


 Password protection is another less secure mechanism.
 Password can be cracked by “guessing”, “dictionary attack”
and “brute force attack”.
 While most of encryption functions are infeasible to crack,
e.g. One-way hash function. i.e. almost impossible to find x
while H(x) = h.
E. Data Encryption for USB flash drives

 Overview of different methods (1)


› Encrypted ZIP File (www.7-zip.org)
 7-zip is open source software that offers AES-
256bit encryption to protect zip file.
 AES stands for Advanced Encryption
Standard.
 It is high compression ratio in 7z format with
LZMA compression.
 Self-extracting capability for 7z format
 It works in Windows
98/ME/NT/2000/XP/Vista. There is a port of
the command line version to Linux/Unix.
E. Data Encryption for USB flash drives
 Overview of different methods (2)
› TrueCrypt (www.truecrypt.org)
 It is a free open-source disk encryption
software.
 It creates virtual encrypted disk within a file
and mounts it as a real disk.
 It encrypts an entire partition or storage
device, like USB flash drive or hard disk.
 It can encrypt a partition or drive where
Windows is installed.
 Encryption algorithms: AES-256, Serpent,
and Twofish. Mode of operation: XTS.
 It works in Windows XP/Vista, Mac OS X and
Linux.
E. Data Encryption for USB flash drives
 Overview of different methods (3)
› FreeOTFE (www.freeotfe.org)
 It is a free, open source, “on-the-fly” transparent disk
encryption program for PCs and PDAs
 It is highly portable that allows FreeOTFE volumes to
be accessed without installing any software, and for
use with USB flash drives
 Source code freely available
 Easy to use
 Both PC & PDA versions are available
 No need to install it and ideal for use on USB memory
drives
 It supports AES, Twofish and Serpent in several
modes (CBC, LRW & XTS).
 Encrypted volumes may either be file, partition, or
even disk based.
 Hands-on Exercise
F. Other Security Measures

 Anti-virus
› Anti-virus software must be installed to whole
organization, no exception.
› It protects the organization from virus attack with
always up-to-date virus definition file.
 Firewall
› It can be hardware device or software package that
blocks unauthorized access to the organization
system(s) or network(s).
› The operation is based on a “policy” which defines
different conditions for access.
F. Other Security Measures

 Intrusion Detection
› It can be hardware device, software package or extra
function coming with a Firewall.
› It is an activity of detecting actions that attempt to
compromise the confidentiality, integrity or availability of a
resource (e.g. network, database).
 Backup
› It is an action of making copies of data so that additional
copies may be used to restore the original in case there is
a data loss.
› A backup schedule should be implemented for different
type of data, like daily, weekly and monthly backup.
› The backup copies should be placed in a safe place with a
sufficient distance (e.g. 200 m) from the premises.
F. Other Security Measures

 Security Plan Implementation


› System Identification
› Management Control
› Operation Control
› Technical Control
Instructor: Louie AU (MSc (e-Commerce for Executives), BBus)
Information and Software Industry Association
louie_au@hotmail.com
Session 4 - Internet Technology Update

A. Basic Concept of Internet


B. Current Internet Technologies
C. Web 2.0 Concepts
D. Semantic Web
E. Other Common Internet Technologies
A. Basic Concept of Internet

 Internet  International Network and network of networks


 Network  Computer network is a group of interconnected
computers.
A. Basic Concept of
Internet
A. Basic Concept of
Internet
A. Basic Concept of
Internet
A. Basic Concept of Internet
 The rapid growth of Internet users and its trend
B. Current Internet Technologies
B. Current Internet Technologies

 Database (data layer)


› It is a repository of all related information.
› It is a structured collection of records or data that
is stored in a computer system.
› Popular and latest database systems (DBMS –
database management system):
 Oracle Database 11g,
 Microsoft SQL Server 2008 and
 MySQL Enterprise (it is an open source
database system)
B. Current Internet Technologies

 Application Server (application server layer)


› It hosts programs to execute business logics and
processes for the whole system.
› Popular and latest products in the market:
 Oracle WebLogic Server 10g
 Microsoft Windows Server 2003 (it includes
functions and features provided by
application server)
 ASF Apache Tomcat 6 (it is an open source
application server)
B. Current Internet Technologies

 Web Server (web server layer)


› It is a place where all web pages are stored and
executed.
› Popular and latest products in the market:
 Microsoft Windows Web Server 2008
 ASF Apache Web Server 2.0 (it is an open
source web server)
B. Current Internet Technologies

 Internet
› is a collection of interconnected networks.
› employs some different technologies, most of them
are telecommunication technologies.
› TCP/IP
 Transmission Control Protocol / Internet
Protocol
 The latest version is 6. (i.e. TCP/IP v6)
B. Current Internet Technologies
› TCP/IP
 Protocol is a set of standard rules for data
representation, signaling, transmission, and error
detection over a communication channel.
 The IP address is a numerical identification and
logical address that is assigned to devices
participating in a computer network (Internet) for
communication.
 e.g. 202.43.220.99 (it is v4) is yahoo.com.hk
 e.g. of v6 (hexadecimal format) 
2001:0db8:85a3:0000:0000:8a2e:0370:7334
B. Current Internet Technologies
› TCP/IP Versions
B. Current Internet Technologies

 Web Browsers (Web Clients)


› It should be the most familiar part with general
users.
› The most popular browser should be:
 MS Internet Explorer, now the latest one is
IE 8
 Mozilla Firefox 3
 Apple Safari 4
B. Current Internet Technologies
 Web Browsers (Web Clients)
› HTML sample:
<html>
<body>
<p><b>This text is bold</b></p>
<p><strong>This text is strong</strong></p>
<p><big>This text is big</big></p>
<p><em>This text is emphasized</em></p>
<p><i>This text is italic</i></p>
<p><small>This text is small</small></p>
<p>This is<sub> subscript</sub> and
<sup>superscript</sup></p>
</body>
</html>
B. Current Internet Technologies

 more humanization
 more multimedia effects
 Java
› is a general purpose programming language.
› supports standalone applications, browser-based
applets, and server-side programs (servlets).
› is compiled to bytecode which can be run on any
platform that supports a Java Virtual Machine (JVM).
B. Current Internet Technologies
 Java
 multiple editions – standard edition (Java SE), enterprise edition (Java
EE) and micro edition (J2ME)
› sample code (Hello World)

/**
* The HelloWorldApp class implements an application that
* simply prints "Hello World!" to standard output.
*/
class HelloWorldApp {
public static void main(String[] args) {
System.out.println("Hello World!"); // Display the string.
}
}
B. Current Internet Technologies
 XML (Extensible Markup Language)
› to structure, store, and transport data while HTML was
designed to display data
› sample code

<?xml version="1.0"?>
<note>
<to>Tove</to>
<from>Jani</from>
<heading>Reminder</heading>
<body>Don't forget me this weekend!</body>
</note>
B. Current Internet Technologies

 AJAX (Asynchronous JavaScript And XML )


› not a new programming language, but a new technique
for creating better, faster, and more interactive web
applications
› is based on several web standards, namely, JavaScript,
XML, HTML and CSS
› sample code (please refer to class notes)
C. Web 2.0 Concepts

 2nd generation of web development and design


 PARTICIPATION, INTERACTION & CONTRIBUTION
 Web 2.0 is a model to get the public involved.
 It facilitates communication, information sharing,
interoperability, and collaboration on www.
 Examples:
› Social-networking sites focus on building online
communities of people who share interests and/or
activities;
› or who are interested in exploring the interests
and activities of others.
› e.g. www.facebook.com
C. Web 2.0 Concepts

 Examples:
› Video-sharing sites allow people to upload video
clips for sharing with the public.
 e.g. www.youtube.com
› Wikis is a website that allows the easy creation and
editing of any number of interlinked web pages.
› The collaborative encyclopedia
 e.g. www.wikipedia.org
 It is an “open to everyone” public
community that is a free encyclopedia and
anyone can edit.
C. Web 2.0 Concepts

 Examples:
 Blog (short for weblog) is a personal (not always, maybe by a
group of people)
› online journal that is (should be) frequently
updated and intended for general public
consumption
› The most latest post will be at the top of the blog.
› Individual (blogger) may not need to own a web
site, rather than acquiring blog hosting service
from providers, like yahoo (hk.myblog.yahoo.com)
C. Web 2.0 Concepts

 Examples:
› Forum usually belongs to its parent site.
› It is a public discussion platform on a particular
interested area or various areas.
› E.g. www.uwants.com & www.discuss.com.hk
› My forums: louieau.freeforums.org
D. Semantic Web

 Semantic web is sometimes classified as Web 3.0.


 It is able to describe things in a way that computers can
understand.
 It can be thought of as a Web that is highly intelligent and
sophisticated so that one needs little or no human intervention
to carry out tasks.
 Those tasks can include scheduling appointments, coordinating
activities, searching for complex documents.
D. Semantic Web

 Two standards are employed for semantic web development,


namely, XML and RDF.
 RDF stands for Resource Description Framework that is a
language for describing information and resources on the web.
 Sample code of RDF (please refer to class note)
E. Other Common Internet Technologies

 FTP, File Transfer Protocol, for exchanging files over Internet; download
and upload file to and from a [FTP] server.

 P2P / BitTorrent, is a peer-to-peer file sharing protocol used for


distributing large amounts of data.

 VPN, Virtual Private Network, is a secure, private communication tunnel


between 2 or more devices across a public network (e.g. Internet).
› To make the channel secure, the channel will be encrypted.

 SSL, Secure Sockets Layer, was developed by Netscape for transmitting


file over the Internet.
› It employs public key and private key cryptography as the
core mechanism.

 RSS, Rich Site Summary, is a format for delivering regularly changing


web content to whoever wants it.
Project In Charge: P L Chau
Director
Information and software Industry Association
Instructor: Louie AU (MSc (e-Commerce for Executives), BBus)
Information and Software Industry Association
Session 5 - Introduction to Clinic
Management System (HKMA CMS 3.0)

A. Functional Overview
B. System Requirement with Typical Clinic Setup
C. Basic Screen Design
D. Typical Workflow
A. Functional Overview
A. Functional Overview

 Patient – create, edit and search patient records


 Waiting Queue – management of patient queuing process;
displays real-time situation of waiting list.
 Appointment – calendar-style user interface for appointment
booking function
 Consultation – supports doctor’s workflow in consultation
room
 Dispensary – dispensary and payment functions
 Inventory – drug inventory control functions
 Report – generates various reports
 Admin – provides system configuration functions
 Cashbook – displays cash income and spending of a period
B. System Requirement
with Typical Clinic
Setup
B. System Requirement with Typical Clinic
Setup

 Server
› Windows XP / Vista / Server 2003 / Server 2008, Linux
› Min: Intel P4 2.8GHz, 1GB Ram, 6GB of free disk space
› Recommended: Intel Core 2 Duo 2.4GHz, 2GB RAM, 10GB of
free disk space

 Client
› Windows XP / Vista, Linux
› Min: Intel P4 2GHz, 512MB Ram, 2GB of free disk space
› Recommended: Intel Core 2 Duo 2.4GHz, 1GB RAM, 2GB of
free disk space
C. Basic Screen Design

 Demo and Hands-on Exercise


D. Typical Workflow

You might also like