Robotic
surgery is also referred to as robotic-assisted surgery. It is an automated
system that allows doctors to perform many types’ complex procedures with more
precision, flexibility as well as controls than possible in conventional
techniques. Robotic surgery is associated with minimal invasion surgery.
Invasion surgery refers to procedures performed through a tiny incision.
Most
widely applied clinical robotic surgery system includes camera arm and
mechanical arms with surgical instruments that are embedded in them. Robotic
systems are operated through surgeon controls while seated at computer systems
near console operating table. Operating console gives surgeon operators a high
definition, magnified, and three dimension views of surgical sites (Howe, &
Matsuoka, 1999).
Advantages
Robotic
surgery systems promote the enhancement of many procedures that enhances
precision, flexibility, and control during operations. Computerized operations
using surgery system helps in controlling operations procedures. Robotic
surgery system allows them to see the sites being operated better. Robotic surgery surgeons are capable of
performing an operation on delicate tissues using complex procedures that may
have been difficult or not possible using other methods. Robotic surgery makes
minimally invasive surgery easy to implement. Robotic surgery is preferred due
to fewer complications involved withi0n the sections where su9rgely is
implemented (Mayo Clinic Staff, 2016). Patients who are treated through
application of robotic surgery suffer less pain as well as less blood loss.
Automated surgical operations have high recovery time. Patients get cured
encountering very small or less noticeable scars.
Risk
Robotic
surgery may involve complex risks equal to risks associated with open surgery.
That includes dangerous infections, reactions to machines and associated
effects. Other complications include failures of computerized systems during
operations (Mayo Clinic Staff, 2016).
Social
Engineering and Intelligence Gathering
Collaborating
and social sharing tools provide possible vulnerability for hackers, intruders,
competitors and other cyber criminals an easy way to collect valuable
information such as authentication credentials. The small bits of data
collected during different instances can lead big and profitable insights
manipulation. Hackers and intruders can use data and information to hack into
computer system leading to the stealing of important data, tampering with
patient records, or disrupt health operations (Cisco, 2015).
Networking
attacks originating from social messages
Systems
are vulnerable to attacks, such as viruses, worms, phishing schemes, denial of
service attacks, and other forms of malware attacks. Such attacks and risks can
be spread through risks spread through links on text messages that can be
informed of applications updates, social media updates, mobile messages, as
well as advertisements found on social media (Manak & Stefan, 2013).
Sharing
of Confidential and Proprietary Information
Lack
of proper training about collaboration security can lead to disclosing of
sensitive information that can contribute to harm on computer systems. Lack of
clear guidelines for appropriate posting of information as well as disseminating
information may lead to compromising with privacy and confidentiality of health
data and information (Russel, 2007).
Fluctuation
of Security measures, Policies, and Practices
Information
technology security policies and standards keep on changing. It is required
that organization should formulate new policies to cover all data and
information security. Data confidentiality, integrity and accessibility
security policies should be enforced in an organization. New formulated
security procedures should be incorporated in an organization to facilitate
implementation of new security requirement. Systems should be compatible with
new technology and devices invented (Cisco, 2015).
References
Cisco (2015). Collaboration
Security. Retrieved from http://www.cisco.com/c/en/us/solutions/collateral/enterprise/cisco-on-cisco/Collaboration_Security-1.html
Howe R, & Matsuoka, Y. (1999).
Robotics for Surgery.” Annual Review Biomedical Engineering. Retrieved from
http://biomed.brown.edu/Courses/BI108/BI108_2005_Groups/04/
Manak Sood & Stefan Leichtle (2013) Essentials of Robotic Surgery. USA: Spry Publishing
Mayo Clinic Staff (2016). Robotic
Surgery. Retrieved from
http://www.mayoclinic.org/tests-procedures/robotic-surgery/basics/definition/prc-20013988
Russel A. F. (2007). Robotics in Surgery: History, Current and Future
Applications. USA: Nova Science Publishers
Sherry Roberts is the author of this paper. A senior editor at
Melda Research in nursing writing services if you need a similar paper you can place your order for already written essay.
No comments:
Post a Comment