Info-finals-2

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Second area of authentication is something other computers, subsequently tying up

the user has, such as an identification (ID) bandwidth and incapacitating networks.
card
Something a user is biometrics baiting, which is when a malware-infected
Something a user knows is a password USB flash drive is left in a public area, thus
KEY - interoperability tricking the finder into loading it to identify
its owner
Blockchain is a digital database containing a SCAREWARE - which is when the scam email
record of transactions, maintained across reports that the user has been hacked and
several computers linked in a network, that tricks him or her into giving the hacker
can be simultaneously used and shared remote access to the computer to “fix” it
within a large, decentralized publicly spear phishing, which is a more specifically
accessible network. targeted scheme whereby the attacker
Lockchain takes advantage of contact information
chainblock provided in an organization’s directory and
tailors the scam email to a specific person
black hat (i.e., malicious) hackers (also phishing, which is an attempt to steal
called crackers) information by manipulating the recipient
Hackers as outsiders of an email or phone call to provide
ethical hackers (i.e., white hat hackers) passwords or other private information
hackers skilled at looking for and closing
network security vulnerabilities social engineering, which is the
manipulation of a relationship based on
Spyware and adware are normally one’s position (or pretend position) in an
controlled in a corporate network by organization
limiting the functions of the browsers used Effective educational programming must be
to surf the internet. instituted and mandated for all personnel to
Ransomware which is malicious code that ensure safe computing practices associated
blocks the organization from using its with remote locations and remote access
computer systems until a ransom is paid to Remote access must be restricted to
the hacker company-owned and company-configured
Antivirus A computer program that is computers and devices.
designed to recognize and neutralize Separation of privileges is a common
computer viruses, which are malicious security tool, which means that no single
codes that replicate over and over and employee should be able to complete a task
eventually take over the computer’s that could cause a critical event without the
memory and interfere with its normal knowledge of another employee
functioning.
malicious code Software that includes antivirus
spyware, adware, ransomware, viruses, firewall can be hardware or software or a
worms, and Trojan horses. Malware, or combination of both and is used to examine
malicious code, that infiltrates a network all incoming messages or traffic to the
can collect easily accessible data network.
proxy server keeps track of which
Code employees are using which masks and
cookie is a very small file written to the hard directs the traffic appropriately
drive of a computer whose user is surfing Adware most common security threats
the internet
Spyware that does steal user IDs and Malware, or malicious code, that infiltrates
passwords contains malicious code that is a network can collect easily accessible data.
normally hidden in a seemingly. Software that includes spyware, adware,
Worms A form of malicious code. A self- ransomware, viruses, worms, and Trojan
replicating computer program that uses a horses
network to send multiple copies of itself to
electronic protected health information work domain analysis describes the
(EPHI) via a wireless laptop connection functions of the system and identifies the
during a home visit, or a physician might information that users need to accomplish
use a smartphone to get specific patient their task goals.
information related to a prescription refill in control task analysis investigates the control
response to a patient request structures through which the user interacts
with or controls the system.
The virtual desktop interface (VDI) allows strategies looks at how work is actually
the user to have a computer for which the done by users to facilitate the design of
operating system, applications, and data are appropriate human–computer dialogues
located and accessed on a central server, social–organizational analysis identifies the
instead of on the local desktop responsibilities of various users (e.g.,
Cloud desktop doctors, nurses, clerks, or therapists) so that
Desktop cloud the system can support collaboration,
communication, and a viable organizational
human–technology interface The hardware structure
and software through which the user
interacts with any technology (e.g., worker competencies analysis identifies
computers, patient monitors, or design constraints related to the users
telephones). themselves
how the user will interact with it, the user strategies looks at how work is actually
interface (UI) done by users to facilitate the design of
user experience (UX) is the user’s appropriate human–computer dialogues
experience from interacting with an object, Coding
product, or service. Mining
Human interface
mapping is used to describe how
ecological interface design (EID) is an environmental facts (e.g., the order of light
approach to interface design that was switches or variables in a physiologic
introduced explicitly for multifaceted, monitoring display) are accurately depicted
complex sociotechnical, real-time, and by the information presentation.
dynamic systems; it has been applied in processing Acting on something by taking it
many fields, including health care. through established procedures to convert
how the user will interact with it, the user it from one form to another. Examples
interface (UI) include the processing of information into
user experience (UX) is the user’s data and the processing of a credit
experience from interacting with an object, application to get a loan.
product, or service. accessibility Ease of accessing the
… information and knowledge needed to
Task analysis examines how a task must be deliver care or manage a health service; the
accomplished extent to which a system is usable by as
Cognitive analysis many users as possible. The right user must
Cognitive task analysis usually starts by be able to obtain the right information at
identifying, through interviews or the right time and at the right format.
questionnaires, the particular task and its Viability
typicality and frequency.
 can be used to develop training Usability is a term that denotes the ease
programs. with which people can use an interface to
achieve a particular goal.
Cognitive work analysis (CWA) includes five types of  Typical usability indicators include ease
analysis: (1) work domain, (2) control tasks, (3) of use, ease of learning, satisfaction
strategies, (4) social–organizational, and (5) worker with using, efficiency of use, error
competencies. tolerance, and fit of the system to the
task
Cognitive walkthrough , evaluators assess a individual and group differences and
paper mock-up, working prototype, or disparities in health status
completed interface by observing the steps  five key domains for the SDOH:
users are likely to take to use the interface 1. Economic Stability,
to accomplish typical tasks 2. Education,
focus groups can help the designer better 3. Health and Health Care,
understand users’ responses to potential 4. Neighborhood and Built
interface designs and to content that might Environment, and
be included in the interface. 5. Social and Community Context”
heuristic evaluation has become the most
popular of what are called “discount Institute of Medicine’s (IOM) noted how the
usability evaluation” methods technology (defined broadly) used often
 to detect problems early in the design does not fit well with human characteristics.
process, when they can be most easily hospital information system (HIS) An
and economically corrected. information system intended to manage the
clinical, financial, and administrative needs
field study, end users evaluate a prototype of the hospital;
in the actual work setting just before its Health Electronic Record (HER)
general release computerized provider order entry (CPOE),
Formal usability tests typically use either for example, helps us to focus more
experimental or observational studies of specifically on workflow impacts.
actual users using the interface to …
accomplish real-world tasks Clinical transformation is the complete
health information exchange (HIE) requires alteration of the clinical environment;
the nursing informaticist to visualize how therefore, this term should be used
patients move through the entire cautiously to describe redesign efforts
continuum of care and not just a specific Health Transformation
patient care area. Optimization is the process of moving
American Health Information Management conditions past their current state and into
Association (AHIMA) collaborated with the more efficient and effective methods of
Health Professions Network and the performing tasks.
Employment and Training Administration to  act, process, or methodology of
create a graphic depiction of competencies making something (as a design, system,
necessary for EHR interaction or decision) as fully perfect, functional,
or effective as possible.
Office of the National Coordinator for
Health Information Technology (ONC) Upgrading
released an interoperability road map to Transformation
promote ease of access and use of Process upgrading
electronic healthcare data Process improvement When the process is
National Institute of Standards and addressed alone
Technology (NIST) A nonregulatory federal
agency within the U.S. Department of Process design
Commerce that was founded in 1901; its Process Decision
mission is to promote U.S. innovation and Process Map A typical output of workflow
industrial competitiveness by advancing analysis is a visual depiction of the process,
measurement science, standards, and Process Flow the term workflow is used
technology in ways that enhance economic interchangeably with process or process
security and improve the quality of life. flows,
social determinants of health (SDOH) The Task actions that are value added and
economic and social conditions in relation necessary
to their diffusion and distribution among
the population that actually influence
Variation occurs when workers perform the
same function in different ways
Workflow analysis is not an optional part of Disparity
clinical implementations but rather is a Gap
necessity for safe patient care supported by …
technology. Discrepancy This technology check ensures
 The ultimate goal of workflow that the five rights of medication
analysis is to create a future-state administration are met
solution that maximizes the use of Process analysis Breaking down the work
technology and eliminates non– process into a sequential series of steps that
value-added activities. can be examined and assessed to improve
Efficient Little waste effectiveness and efficiency; explains how
Effective suggests that the process or end work takes place or gets done or how it can
product is in the most desirable state be done.
Updated Gap analysis zeroes in on the major areas
Quality most affected by the change, 280 CHAPTER
… 13 Achieving Excellence by Managing
Multiplayer applicability Workflow and Initiating Quality Projects
Gap Analysis zeroes in on the major areas namely, technology
most affected by the change, Achieving Variation analysis
Excellence by Managing Workflow and
Initiating Quality Projects namely, Waste analysis
technology Response
Clinical Practice Guidelines Informal or Change management plan Every workflow
formal rules guiding principle redesign effort should begin with a change
… management plan
Health information system implementation Change agent Technology implementations
is complex, with important implications for represent a significant change for clinicians,
learning and adaptation. as does the workflow redesign that
One area of practice that is particularly accompanies adoption of technology
susceptible to inadequate preparation is the
ability to facilitate process analysis.
Process Owners are those persons who The three main areas of secure network information
directly engage in the workflow to be are confidentiality, availability, and integrity
analyzed and redesigned Availability refers to network information
Workflow owner being accessible when needed
… The last area of information security is
value-added step is one that ultimately integrity. Employees need to have
brings the process closer to completion or confidence that the information they are
changes the product or service for the reading is true
better confidentiality policy should clearly define
non– value-added step does not alter the which data are confidential and how those
outcome of a process or product. data should be handled
Non-Added accessibility policy covers issues associated
Garbage with protecting the key hardware elements
… of the computer network and the
Waste is classified as unnecessary activities procedures to follow in case of a major
or an excess of products used to perform electrical or internet outage.
tasks
Surplus Validation
Unused Authentication A process that serves to prove who is
Variation in workflow is considered the accessing the system.
enemy of all good processes and therefore certification is a program “designed to test the
should be eliminated when possible. knowledge, skills, and abilities required to perform a
particular job, and, upon successfully passing a
certification exam, to represent a declaration of a
particular individual’s professional competence Acuity systems monitor the range of patient types
Verification within a healthcare organization using specific
Actual users Participants were asked their preferences indicators.
for a number of design characteristics, such as display Financial systems manage the expenses and revenue
color, menu buttons, text, photo size, icon metaphor, for providing health care.
and layout, by selecting on a computer screen their Scheduling systems coordinate staff, services,
preferences for each item from two or three options. equipment, and allocation of patient beds
Operability
Interoperability is defined as the “[a]bility of a system Laboratory information systems (IS) were perhaps
or a product to work with other systems or products some of the first CISs ever used in health care
without special effort on the part of the customer. The final type of patient care support system
Case Management Information System identify commonly found within health care is the radiology
resources, patterns, and variances in care to prevent information system (RIS) found in radiology
costly complications related to chronic conditions and departments
to enhance the overall outcomes for patients with Clinical documentation systems, also known as
chronic illness.. “clinical information systems,” are the most
 case management systems commonly used type of patient care support system
provide decision support that within healthcare organizations. CISs are designed to
promotes preventive care collect patient data in real time
Pharmacy information systems also have become
care plan is an evidence-based set of care guidelines mainstream patient care support systems.
that outline the course of treatment and the
recommended interventions that should be data mining A process of utilizing software to sort
implemented to achieve optimal results, through data to discover patterns and ascertain or
Foundational interoperability defines the establish relationships
requirements necessary between systems to Data Mart- represents a large database in which the
communicate data data used by one of the units or a division of a
Organizational interoperability refers to shared trust healthcare system are stored and maintained.
and consistency of policies and social and legal Database is a structured or organized collection of
meanings to facilitate seamless workflows between data that is typically the main component of an IS.
organizations. Data Query
Semantic interoperability is more complex and refers field study - the end users evaluate a prototype in the
to consistency of clinical terminology and shared actual work setting just before its general release
meanings.
structural interoperability defines syntax and format Feasibility used to determine whether the project
to facilitate data exchange should be initiated and supported.
Viability
Decision support entails the use of computer Practicability
reminders and alerts to improve the diagnosis and
care of a patient, including screening for correct drug rapid prototyping, also known as rapid application
selection and dosing, screening for medication development (RAD), provides a fast way to add
interactions with other medications, preventive functionality through prototyping and user testing. It
health reminders in such areas as vaccinations, health is easier for users to examine an actual prototype
risk screening and detection, and clinical guidelines than documentation
for patient disease treatment object-oriented systems development (OOSD) model
Communication systems promote interaction among blends SDLC logic with object-oriented modeling and
healthcare providers and between providers and programming power (Stair & Reynolds, 2016). Object-
patients and are designed to be HIPAA compliant. oriented modeling represents real-world objects by
Admission, discharge, and transfer (ADT) systems modeling the real-world entities or things
provide the backbone structure for the other types of dynamic system development method (DSDM) is a
clinical and business systems and, when automated, highly iterative and incremental approach with a high
provide opportunities for health information level of user input and involvement
exchange leading to care coordination
SDLC, is an ongoing development with a life cycle. facilitate teamwork and relationships across the
SDLC is a way to deliver efficient and effective continuum of care.
information systems (ISs) that fit with the strategic Management & Leadership Revolutionary leadership
business plan, which stems from the mission, of the that drives, empowers, and executes the
organization transformation of health care
Information Technology Smart, people-centered,
Health Insurance Portability and Accountability Act affordable technologies that are universal, useable,
(HIPAA) useful, and standards based.
HITECH Health Information Technology for Economic
and Clinical Health Act
Voice and video recordings (client interviews
and observations, diagnostic procedures, and
In the project manager role, the INS is responsible for
the planning and implementation of informatics ultrasounds)
projects. Voice-to-text files (voice recognition for
consultant role provides expert advice, opinions, and documentation)
recommendations based on his or her area of Medical devices (infusion pumps, ventilators,
expertise and hemodynamic monitors)
product developer role participates in the design, Telehomecare monitoring (for use in diabetes
production, and marketing of new informatics and other chronic disease management)
solutions
entrepreneur role combine their passion, skills, and
knowledge to develop marketable business ideas by
analyzing nursing information needs and developing
and marketing solutions.

A certificate program “is an educational or training


program that is used to teach learning objectives and
assess whether those objectives were achieved by the
student”
certification is a program “designed to test the
knowledge, skills, and abilities required to perform a
particular job, and, upon successfully passing a
certification exam, to represent a declaration of a
particular individual’s professional competence”
Permit

Nursing Informatics - the specialty that integrates


nursing science with multiple information and
analytical sciences to identify, define, manage, and
communicate data, information, knowledge and
wisdom in nursing practice
The conceptual framework underpinning the science
and practice of NI centers on the core concepts of
data, information, knowledge, and wisdom, also
known as the DIKW paradigm
DIKW paradigm - Not exclusive in nursing
AI is the field that deals with the conception,
development, and implementation of informatics
tools based on intelligent technologies
expert systems which implement knowledge
automatically without human intervention

Communication & Collaboration Standardized,


person-centered, technology-enabled processes to

You might also like