Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
16 Cards in this Set
- Front
- Back
Confidentiality |
Condition in which information is shared or released in a controlled way - HIPAA defines it as ePHI is not available or dissclosed to unauthorized persons |
|
Security |
A number of measures that organizations implement to protect . This includes efforts not only to maintain the confidentiality but also to maintaine integrity and access to the information |
|
Privacy |
An individuals desire to limit disclosure of personal information |
|
Moore's Law |
The number of transistors on an integrated Circut doubles every two years (allows computers to do billions of calulations per second) |
|
FLOP |
Floating-Point Operations per second unit of how fast computers calculate (a giga-FLOP is a billion calcuations) |
|
RISC and CISC |
Reduces Instructions Sets Computer- reduces clock cycle per insturction (more instructions shorter time to run them - all instructions usu same length (longer more RAM, but Complex Instruction Sets Computer - less instructions more time to do them (variable lenghth |
|
Public/Private Key encryption |
Public - the encyption key widely distributed so can be sent in non-secure fashion. The decrypt key is secret and only held by the receipient |
|
HIPPA Breechs |
Over 500 - media and and HHS sec needs to be notified, Affected individuals need to be notified in 60 days. |
|
RFID |
Radio frequency Identification - is technology for identifying a physical object or person using small chip - not a security thing |
|
IDPS NAC DLP |
IDPS - Intrusion Detection and prvention system NAC - network access control DLP - data leakage protection |
|
Hick-Hyman Law Key-stroke level model |
Expresses users response time as a function of the number of options they have to pick from RT= a+b*Log2n with n as number of options
Key-stroke level model - time to find and hoan in on and clik item - used to find when there is a hot key option |
|
Usabilty Evaluation 3 catagories of evaluation |
Testing: 1. Coaching 2 Thinking out loud 3 Eye tracking/click tracking 4. performance Inspection: 1. cognicitve walk through 2. Herustics Inquiry: 1Field observation 2. Focus group 3. Surveys 4. Usage logs |
|
Neilsen 10 prinicples of usability |
1. System status should be visiable
2. Match between terms used and "real world terms used in the dicipline 3. User control and freedom: Users often choose system functions by mistake and will need a clearly marked "emergency exit" to leave Support undo and redo. |
|
Neilsen 10 prinicples of usability |
4. Consistency and standards: Users should not have to wonder whether different words, situations, or actions mean the same thing. 5. Error prevention: Even better than good error messages is a careful design that prevents a problem from occurring in the first place. E |
|
Neilsen 10 prinicples of usability 6-9 |
6. Recognition rather than recall: Minimize the user's memory load by making objects, actions, and options visible - dont make them memorize sequences 7. Short cuts and accelerators for novices and experts 8. Dialogue should be minimal |
|
Neilsen 10 prinicples of usability 9-10 |
9. Help users recognize, diagnose, and recover from errors: Error messages should be expressed in plain language (no codes), precisely indicate the problem, and constructively suggest a solution. 10. Help and documentation: Even though it is better if the system can be used without documentation, it may be necessary to provide help and documentation. |