Suelette Dreyfus

Last updated

Suelette Dreyfus
NationalityAustralian
Occupation(s)Researcher, journalist, writer
Notable work Underground

Suelette Dreyfus is an Australian technology researcher, journalist, and academic. She is a lecturer in the Department of Computing and Information Systems at the University of Melbourne, [1] [ failed verification ] as well as the principal researcher on the impact of digital technologies on whistleblowing as a form of freedom of expression. [2] Her research includes information systems, [3] [4] [5] digital security, privacy, and the impact of technology on whistleblowing, [6] [7] health informatics [8] and e-education.

Contents

Career

Dreyfus' work in e-health [9] [10] has focused on the patient information experience in the health system and the role of technology in error incident reporting in hospital settings. [11] [12] She has co-invented prototypes in information design for pathology reports with the aim of allowing doctors to improve communication with patients and families regarding the status of their diseases in progressive and chronic illnesses such as diabetes. [13] [14]

Her research in education has focused on using social media to teach foreign language to English-speaking primary school students, particularly for difficult languages that require more hours of practice such as Asian languages. [15]

Dreyfus has written on the importance of protecting Freedom of Information access (FOI), the problems of information asymmetry and "tool asymmetry" between the individual citizen and the state, and the trend of "security clearance creep". [16] She was a member of the WikiLeaks advisory board. [17]

Her essays have also appeared in The Conversation, discussing the importance of protecting public access to strong encryption, the need for legal protections for whistleblowers, and the security paradox of legislation enforcing retention of metadata for two years for everyone in Australia. [18] [19] [20]

Underground

German cover from Underground (2011) Underground Book Cover german 290px.jpg
German cover from Underground (2011)

She is the author of the 1997 book Underground: Hacking, Madness and Obsession on the Electronic Frontier. The book describes the exploits of a group of Australian, American, and British hackers during the late 1980s and early 1990s, among them Julian Assange who is credited as a researcher for the book. [21] Dreyfus released it in e-version in 2001 for free.

Dreyfus was an Associate Producer and interview subject for the documentary In the Realm of the Hackers , inspired by Underground, in 2003. [22] [ better source needed ]

Related Research Articles

<span class="mw-page-title-main">Health informatics</span> Computational approaches to health care

Health informatics is the study and implementation of computer structures and algorithms to improve communication, understanding, and management of medical information. It can be viewed as branch of engineering and applied science.

Medical privacy, or health privacy, is the practice of maintaining the security and confidentiality of patient records. It involves both the conversational discretion of health care providers and the security of medical records. The terms can also refer to the physical privacy of patients from other patients and providers while in a medical facility, and to modesty in medical settings. Modern concerns include the degree of disclosure to insurance companies, employers, and other third parties. The advent of electronic medical records (EMR) and patient care management systems (PCMS) have raised new concerns about privacy, balanced with efforts to reduce duplication of services and medical errors.

<span class="mw-page-title-main">Medical record</span> Medical term

The terms medical record, health record and medical chart are used somewhat interchangeably to describe the systematic documentation of a single patient's medical history and care across time within one particular health care provider's jurisdiction. A medical record includes a variety of types of "notes" entered over time by healthcare professionals, recording observations and administration of drugs and therapies, orders for the administration of drugs and therapies, test results, X-rays, reports, etc. The maintenance of complete and accurate medical records is a requirement of health care providers and is generally enforced as a licensing or certification prerequisite.

<span class="mw-page-title-main">Electronic health record</span> Digital collection of patient and population electronically stored health information

An electronic health record (EHR) is the systematized collection of patient and population electronically stored health information in a digital format. These records can be shared across different health care settings. Records are shared through network-connected, enterprise-wide information systems or other information networks and exchanges. EHRs may include a range of data, including demographics, medical history, medication and allergies, immunization status, laboratory test results, radiology images, vital signs, personal statistics like age and weight, and billing information.

Computerized physician order entry (CPOE), sometimes referred to as computerized provider order entry or computerized provider order management (CPOM), is a process of electronic entry of medical practitioner instructions for the treatment of patients under his or her care.

A clinical decision support system (CDSS) is a health information technology that provides clinicians, staff, patients, and other individuals with knowledge and person-specific information to help health and health care. CDSS encompasses a variety of tools to enhance decision-making in the clinical workflow. These tools include computerized alerts and reminders to care providers and patients, clinical guidelines, condition-specific order sets, focused patient data reports and summaries, documentation templates, diagnostic support, and contextually relevant reference information, among other tools. CDSSs constitute a major topic in artificial intelligence in medicine.

A personal health record (PHR) is a health record where health data and other information related to the care of a patient is maintained by the patient. This stands in contrast to the more widely used electronic medical record, which is operated by institutions and contains data entered by clinicians to support insurance claims. The intention of a PHR is to provide a complete and accurate summary of an individual's medical history which is accessible online. The health data on a PHR might include patient-reported outcome data, lab results, and data from devices such as wireless electronic weighing scales or from a smartphone.

Chris Goggans is an American hacker, a founding member of the Legion of Doom group, and a former editor of Phrack magazine. He is known as an expert in security as well as for his statements on hacker ethics and responsibility.

Health technology is defined by the World Health Organization as the "application of organized knowledge and skills in the form of devices, medicines, vaccines, procedures, and systems developed to solve a health problem and improve quality of lives". This includes pharmaceuticals, devices, procedures, and organizational systems used in the healthcare industry, as well as computer-supported information systems. In the United States, these technologies involve standardized physical objects, as well as traditional and designed social means and methods to treat or care for patients.

Nahshon Even-Chaim, aka Phoenix, was the first major computer hacker to be convicted in Australia. He was one of the most highly skilled members of a computer hacking group called The Realm, based in Melbourne, Australia, from the late 1980s until his arrest by the Australian Federal Police in early 1990. His targets centred on defense and nuclear weapons research networks.

Patient safety is a discipline that emphasizes safety in health care through the prevention, reduction, reporting and analysis of error and other types of unnecessary harm that often lead to adverse patient events. The frequency and magnitude of avoidable adverse events, often known as patient safety incidents, experienced by patients was not well known until the 1990s, when multiple countries reported significant numbers of patients harmed and killed by medical errors. Recognizing that healthcare errors impact 1 in every 10 patients around the world, the World Health Organization (WHO) calls patient safety an endemic concern. Indeed, patient safety has emerged as a distinct healthcare discipline supported by an immature yet developing scientific framework. There is a significant transdisciplinary body of theoretical and research literature that informs the science of patient safety with mobile health apps being a growing area of research.

<i>In the Realm of the Hackers</i> 2003 Australian film

In The Realm of the Hackers is a 2003 Australian documentary directed by Kevin Anderson about the prominent hacker community, centered in Melbourne, Australia in the late 1980s until early 1990. The storyline is centered on the Australian teenagers going by the hacker names "Electron" and "Phoenix", who were members of an elite computer hacking group called 'The Realm' and hacked into some of the most secure computer networks in the world, including those of the US Naval Research Laboratory, Lawrence Livermore National Laboratory, a government lab charged with the security of the US nuclear stockpile, and NASA. The film runs for 55 minutes and was inspired by the book Underground, by Melbourne-based writer and academic Suelette Dreyfus.

The WANK Worm and the OILZ Worm were computer worms that attacked DEC VMS computers in 1989 over the DECnet. They were written in DIGITAL Command Language.

In computer security, the Zardoz list, more formally known as the Security-Digest list, was a famous semi-private full disclosure mailing list run by Neil Gorsuch from 1989 through 1991. It identified weaknesses in systems and gave directions on where to find them. Zardoz is most notable for its status as a perennial target for computer hackers, who sought archives of the list for information on undisclosed software vulnerabilities.

Health information technology (HIT) is health technology, particularly information technology, applied to health and health care. It supports health information management across computerized systems and the secure exchange of health information between consumers, providers, payers, and quality monitors. Based on a 2008 report on a small series of studies conducted at four sites that provide ambulatory care – three U.S. medical centers and one in the Netherlands, the use of electronic health records (EHRs) was viewed as the most promising tool for improving the overall quality, safety and efficiency of the health delivery system.

Barcode technology in healthcare is the use of optical machine-readable representation of data in a hospital or healthcare setting.

Clinical point of care (POC) is the point in time when clinicians deliver healthcare products and services to patients at the time of care.

Medical data, including patients' identity information, health status, disease diagnosis and treatment, and biogenetic information, not only involve patients' privacy but also have a special sensitivity and important value, which may bring physical and mental distress and property loss to patients and even negatively affect social stability and national security once leaked. However, the development and application of medical AI must rely on a large amount of medical data for algorithm training, and the larger and more diverse the amount of data, the more accurate the results of its analysis and prediction will be. However, the application of big data technologies such as data collection, analysis and processing, cloud storage, and information sharing has increased the risk of data leakage. In the United States, the rate of such breaches has increased over time, with 176 million records breached by the end of 2017. There have been 245 data breaches of 10,000 or more records, 68 breaches of the healthcare data of 100,000 or more individuals, 25 breaches that affected more than half a million individuals, and 10 breaches of the personal and protected health information of more than 1 million individuals.

Health data is any data "related to health conditions, reproductive outcomes, causes of death, and quality of life" for an individual or population. Health data includes clinical metrics along with environmental, socioeconomic, and behavioral information pertinent to health and wellness. A plurality of health data are collected and used when individuals interact with health care systems. This data, collected by health care providers, typically includes a record of services received, conditions of those services, and clinical outcomes or information concerning those services. Historically, most health data has been sourced from this framework. The advent of eHealth and advances in health information technology, however, have expanded the collection and use of health data—but have also engendered new security, privacy, and ethical concerns. The increasing collection and use of health data by patients is a major component of digital health.

References

  1. "Suelette Dreyfus: School of Computing and Information Systems, The University of Melbourne". cis.unimelb.edu.au. Archived from the original on 13 November 2019. Retrieved 13 November 2019.
  2. Brown, AJ, Vanderkerckhov, W, Dreyfus, S (2014). ‘The relationship between transparency, whistleblowing and public trust’. Research Handbook on Transparency, Edward Elgar, Cheltenham UK
  3. Lederman RM, Dreyfus S, Matchan J E, Knott JC, Milton S. Electronic error-reporting systems: A case study into the impact on nurse reporting of medical errors. Nursing Outlook. Mosby. 2013, Vol. 61, Issue 6, pp. 417 - 426.
  4. Pang, F. R Sharma, R Lederman, S Dreyfus (2011). "Organisational Culture and Organisational Impacts of Information Systems: A Review of the Empirical Literature". Proceedings of 21st Australasian Conference on Information Systems, Brisbane, Australia.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  5. Peng F, Kurnia S, Lederman RM, Dreyfus S. Information Systems and Hospital Work: A structuralist investigation. Proceedings of the 16th PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS. Association for Information Systems. 2012.
  6. Miceli MP, Dreyfus S, Near JP. Outsider 'whistleblowers': Conceptualizing and distinguishing 'bell-ringing' behavior. International Handbook on Whistleblowing Research. Edward Elgar Publishing Ltd. 2014. Editors: Brown AJ, Lewis D, Moberly RE, Vandekerckhove W.
  7. Bosua R, Milton S, Dreyfus S, Lederman R. Going public: Researching external whistleblowing in a new media age. International Handbook on Whistleblowing Research. Edward Elgar Publishing Ltd. 2014. Editors: Brown AJ, Lewis D, Moberly RE, Vandekerckhove W.
  8. Lederman R, Kurnia S, Peng F, Dreyfus S (2015). "Tick a box, any box: A case study on the unintended consequences of system misuse in a hospital emergency department". Journal of Information Technology Teaching Cases. 5 (2): 74–83. doi:10.1057/jittc.2015.13. S2CID   110123206.
  9. Kee, K., Knott, J.C., Dreyfus, S., Lederman, R., Milton, S, Joe, K. 2012. "One hundred tasks an hour: An observational study of emergency department consultant activities". Emergency Medicine Australasia, Vol 24 (3) pp 294–302. Retrieved 11 June 2012
  10. Lederman R, Dreyfus S. Managing Health Information Delivery Processes for Better Medical Decision Making. DSS 2.0 - Supporting Decision Making with New Technologies. IOS Press. 2014, Vol. 261.
  11. Smith S, Lederman R, Monagle P, Alzougool BM, Naish L, Dreyfus S. Individually tailored client-focused reports for ubiquitous devices: An experimental analysis. 23rd Australasian Conference on Information Systems. Australasian Conference on Information Systems ACIS. 2012.
  12. Lederman RM, Dreyfus S, Matchan J E, Knott JC, Milton S. Electronic error-reporting systems: A case study into the impact on nurse reporting of medical errors. Nursing Outlook. Mosby. 2013, Vol. 61, Issue 6, pp. 417 - 426.
  13. Lederman, R and Dreyfus, S. (2014). ‘Tailoring Patient Information To Encourage Patient Engagement’. ECIS e-Health Workshop Tel Aviv University
  14. Dreyfus, S., Lederman, R., Smith P., Monagle, P. (2011) "Customising pathology report design for patient use". Electronic Journal of Health Informatics. Vol 6, No. 2.
  15. Slaughter, Y, Hajek, J, Smith, W, Chang, S, Dreyfus, S. (2015). ‘The online delivery of language programs: Bridging the divide in languages education.’ AFMLTA 20th National Languages Conference. Melbourne
  16. "Resurrect FOI & end security clearance creep to restore trust". The Mandarin. 21 August 2015. Retrieved 13 November 2019.
  17. "Exposed: Wikileaks' secrets". Wired UK. ISSN   1357-0978 . Retrieved 13 March 2022.
  18. Dreyfus, S and Chang, S (2016). ‘FBI vs Apple: giving up security and privacy could hurt us all’. The Conversation. 24 Feb.
  19. Dreyfus, S (2016). ‘Governments undermining encryption will do more harm than good’. The Conversation. 13 Jan.
  20. Dreyfus, S (2015). ‘The security paradox: individual privacy versus digital driftnets’. The Conversation. 30 March.
  21. "Suelette Dreyfus speaks on Julian Assange e Wikileaks". Cyber Security 360. 19 June 2018. Retrieved 13 November 2019.
  22. "Suelette Dreyfus". IMDb.