280 likes | 509 Views
Biometric Identification. By: Molly Murphy, RN. Objectives. Describe Biometric Identification. Provide examples of Biometric Identification. Review Hardware used in this trend. Explore Software used in this trend. Evaluate Usability. Evaluate Information System used in this trend.
E N D
Biometric Identification By: Molly Murphy, RN
Objectives Describe Biometric Identification. Provide examples of Biometric Identification. Review Hardware used in this trend. Explore Software used in this trend. Evaluate Usability. Evaluate Information System used in this trend.
Objectives Describe advantages/disadvantages in this trend. Describe legal/ethical issues related to this trend. Explore informatics competencies needed Discuss the role of the informatics nurse specialist using this trend
What is Biometric Identification? Personal Identification Physical Characteristics identified Use of Technical Devices Software Programs
Examples Fingerprinting Retinal Scanning Iris Scanning Voice Recognition Scent Recognition Hand Geometry DNA testing
Airport Security Iris Scanning for check-in passengers First used in 2002 Location: Schiphol Airport, Amsterdam (Lyon, 2008).
Hardware used in this trend… Hand Geometry Devices Fingerprint Recognition Devices Retinal Scanners Iris Scanners Voice Recognition Devices Electronic Nose Devices DNA testing devices and laboratory services
Iris Scanning Devices Digital Image is obtained Color, Pattern, and Position of the Iris are Identified
Software used in this trend… Application Software: Example: Biometric Service Provider (BSP) Software Development Kit Operating System Software: Example: Microsoft Windows
Operating System Software Microsoft Windows: Numerous Capabilities and Functions Hardware and Software Management • Application Interface • Processor Management Memory Capabilities User Interface
Usability Axiom 1 Meets Criteria User was key during interface design Axiom 2 Meets Criteria Minimal steps required Axiom 3 Meets Criteria Formal Evaluation took place during software design
Information System used Electronic Medical Records (EMR) • NextGen Healthcare • Numerous features *Prebuilt templates *Specialty Specific *Image management *Email Capabilities ("Nextgen healthcare," 2010)
Evaluation of NextGen Healthcare Clinical Information System Used by Numerous Members of the Care Team Workstation Configuration Workgroup for Electronic Data Exchange International Statistical and Classification of Diseases and Related Health Problems Certainly recommended for use in this trend
Advantages Accurate Patient Identification Improved Patient Safety Quick and Simple to Use Concurrent Use with other Healthcare Trends Integrated use of Technology
Disadvantages Inability to use with dysfunction of parts Requires continuous power source for operation Requires interaction with information system Potential for error
Ethical/Legal Issues Potential Violation of Privacy Rights Potential Fraud and/or Stolen Identity (B, 2010).
Informatics Competencies Ability to demonstrate proper usage of: • Hardware Devices • Software: *Application Software *Operating System Software • Information System *Electronic Medical Record
Function and Responsibility of the Informatics Nurse using this Trend Serve as an expert in using trend. Provide education to staff using trend. Evaluate staff competencies. Assist in policy and procedure.
In Summary… Biometric Identification is a growing trend It involves: • Patient Identification • Hardware Devices • Software Programs • Information Systems
References Anglin, M.R. (9, September 2010). What is biometric identification?. Retrieved from http://www.wisegeek.com/what-is-biometric-identification.htm B, D. (2010, September 3). Biometric identification: ethical issues. Retrieved from http://www.brighthub.com/computing/enterprise-security/articles/85687.aspx .
References Corey, K. (2009). Product review - nextgenemr. Retrieved from http://www.theprogressivephysician.com/reviews/product-review-nextgen-emr.htm Korotkaya, Z. (2003). Biometric person authentication: odor. Unpublished manuscript, Department of Information Technology, Lappeenranta University of Technology, Retrieved from http://www2.it.lut.fi/kurssit/03-04/010970000/seminars/Korotkaya.pdf
References Lyon, David. (2008). Biometrics, identification, and surveillance. Bioethics, 22(9), Retrieved from http://onlinelibrary.wiley.com.ezaccess.libraries.psu.edu/doi/10.1111/j.1467-8519.2008.00697.x/full doi: 10.1111/j.1467-8519.2008.00697.x McGonigle, D., & Mastrian, K. (2009). Nursing Informatics and the Foundation of Knowledge. Sudbury, MA: Jones and Bartlett.
References National Science and Technology Council, Committee on Technology. (2006). Hand Geometry Retrieved from http://www.biometrics.gov/Documents/HandGeometry.pdf National Science and Technology Council, Committee on Technology. (2006). Iris recognition Retrieved from http://www.biometrics.gov/Documents/IrisRec.pdf
References Nextgen healthcare. (2010). Retrieved from http://www.nextgen.com/Products/ambulatory/EHR/EHR.aspx Questbiometrics, Initials. (n.d.). Dna as a biometric identifier. Retrieved from http://www.questbiometrics.com/article-1-biometrics-articles.html
References Ruest, D, & Ruest, N. (2008). Microsoft window server 2008: the complete reference. Retrieved from http://books.google.com/books?id=qjtSlr75suYC&pg=PA18&lpg=PA18&dq=microsoft+windows+usability&source=bl&ots=6t9PFHERcs&sig=OjRLKEMQ4wDQLUesD5mIjwnvsTQ&hl=en&ei=FHzgTMH7JYP58AbH0o0W&sa=X&oi=book_result&ct=result&resnum=9&ved=0CEwQ6AEwCDgK#v=onepage&q=microsoft%20windows%20usability&f=false
References Workgroup for electronic data interchange. (2004). Retrieved from http://www.wedi.org/public/articles/details.shtml (9, March 2007). Voice recognition. Retrieved from http://www.globalsecurity.org/security/systems/biometrics-voice.htm