Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Final Study Guide NR599, Exams of Health sciences

The document covers various topics related to healthcare informatics, including ethical decision making, bioethical standards, telehealth, medical applications, cybersecurity, HIPAA, ICD-10 coding, workflow design, and more. It emphasizes the importance of considering workflow before implementing technology and the need for workflow analysis and redesign. The document also discusses the American Recovery and Reinvestment Act (ARRA) and the Medicare Access and CHIP Reauthorization Act of 2015 (MACRA) and their impact on healthcare. It concludes with a discussion of clinical transformation, events, information systems, and Lean and Six Sigma methodologies.

Typology: Exams

2021/2022

Available from 02/26/2022

nathandoctor
nathandoctor 🇺🇸

4.1

(14)

697 documents

1 / 54

Toggle sidebar

Related documents


Partial preview of the text

Download Final Study Guide NR599 and more Exams Health sciences in PDF only on Docsity! Final study guide NR599. ● Ethical decision making ○ When making choices about ethical issues based on the standards of right vs wrong. ○ It requires a systematic framework for addressing the complex and often controversial moral questions. ● Bioethical standards ○ The study of healthcare ethics ○ Bioethics takes on relevant ethical problems seen by healthcare providers in relation to care ● Telehealth ○ wide range of health services that are delivered by telecommunications ready tools, such as telephone, videophone, and computer ○ is needed to help fill the nursing shortage allowing nursing to see more patients quicker, as well as the aging population ○ Telecommunication technologies used to deliver health-related services or to connect patients and healthcare providers to maximize patients’ health status. ○ A relatively new term in the medical/nursing vocabulary, referring to a wide range of health services that are delivered by telecommunications-ready tools such as the telephone, videophone, and computer. ● Medical Applications ○ Software developed for medical purposes, including home medical monitoring system, medical databases for healthcare professionals, etc. ● Medical Devices ○ is any device intended to be used for medical purposes ● FDA Oversight for Medical Devices ● Privacy ○ An important issue related to personal information ○ Restricted access of patient information or data ● Confidentiality ○ To ensure that all personal information is protected by ensuring that limited access is only given to those who are authorized to view that information. ■ Protecting privacy of personal information or data ● Cybersecurity ○ the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this. ○ With the expansion of technology. Facilities are taken more precautions to prevent cyber attacks. With the move towards advancing cybersecurity is important, technology continues to grow. Final study guide NR599. ○ Ensure all systems are adequately protected and patients remain safe from harm ○ NI are frequently called on to evaluate the safety and effectiveness of new devices and software. ● Computer-aided translators ○ is a form of language translation in which a human translator uses computer hardware to support and facilitate the translation process. ● HIPPA ○ was established in the U.S. in 1996 to protect an individual's personal health care information. ○ Signed by Pres. Bill Clinton ○ Healthcare institutions are required to meet all standards and comply with the appropriate security measures in order to safeguard patient data. ○ Four parts to HIPAA's Administrative Simplification ■ Electronic transactions and code sets standards requirements. ■ Privacy requirements. ■ Security requirements. ■ National identifier requirements. ● ICD-10 Coding ○ An alphanumeric code used by doctors, health insurance companies, and public health agencies across the world to represent diagnoses. ○ The system offers accurate and up-to-date procedure codes to improve health care cost and ensure fair reimbursement policies ○ The current codes specifically help healthcare providers to identify patients in need of immediate disease management and to tailor effective disease management programs. ■ Similarly ICD and CPT coding go together ● Is a medical code set that is used to report medical, surgical, and diagnostic procedures and services to entities such as physicians, health insurance companies and accreditation organizations. ● Evaluation and Management Coding ○ Is a medical coding process in support of medical billing ○ Practicing health care providers in the United States must use E/M coding to be reimbursed by Medicare, Medicaid programs, or private insurance for patient encounters. ● Reimbursement Coding Final study guide NR599. ○ Avoiding complications that may result in readmissions ○ Create alerts about drug-drug interactions ○ Drug allergy contraindications ● CDS challenging healthcare ○ Alarm fatigue ○ Clinical burnout ○ Occur with poorly implemented CDS features ○ Financial burden ● Workflow Design ○ Used to describe the action or execution of a series of tasks in a prescribed sequence ○ Progression of steps (tasks, events, interactions) that constitute a work process ○ In a sequential workflow, each step depends on the occurrence of the previous step; in a parallel workflow, two or more steps can occur concurrently. ○ Nursing informatics is uniquely positioned to engage in the analysis and redesign of processes and tasks surrounding the use of technology. ● Changes in workflow, poor system design and usability issues, lack of understanding about these systems and their capabilities, user errors and system errors, and lack of defined protocols can all lead to process breakdowns and errors. McGonigle Chapter 13 ● EHR and information systems provide POC decision support to prevent medical errors to save lives and money ● Workflow must be considered before implementing technology or it can be more dangerous ○ Computerized provider order entry (CPOE) focuses on considering the workflow ● Barriers to implement technology: cost & length of time to incorporate it, frequent upgrades interrupting the workflow ● American Recovery and Reinvestment Act (ARRA)- used financial incentives to implement Meaningful Use (MU) rules and regulations ○ Stage 1: data capturing and sharing ○ Stage 2: advanced clinical processes ○ Stage 3: improve outcomes ● Medicare Access and CHIP Reauthorization Act of 2015 (MACRA) took over and created a quality payment program (QPP) to replace Medicare reporting programs Final study guide NR599. ○ Merit Based Incentive Payment (MIPS or Alternative Payment Models (APM) to allow clinicians to choose what suites their needs the best, simplify process for achievement, align with Health IT Certification criteria, emphasize interoperability, information exchange, security measures, and patient access to information, reduce number of measures, and exempt clinicians from reporting if EHR is not applicable to their practice ● Hospitals have small profit margins so they need to work smarter and not harder with the help of technology to keep the margins from getting smaller ○ Workflow analysis needs to be done as well as working in optimization (moving conditions past their current state into a more effective method of performing. ● More research is needed in the area of financial implications of workflow inefficiencies and their impact on patient care ○ This is hard due to lack of standardized terminology in this area ● Workflow redesign- one of the fundamental skills sets that make up the discipline of an informatics nurse ● Process owners: those that directly engage in the workflow to be analyzed and redesigned ● Six Sigma or Lean Departments: efficient and effective delivery of care ○ Key underpinning is the removal of waste ● Variation: when workers perform the same function in different ways- should be eliminated when possible ● Involve operational staff when possible to ensure the buy-in of staff ● To move from current state to future state gap analysis is necessary-- zeros in on the major areas most affected by the change ● Chapter 13 Workflow and Beyond Meaningful Use ○ Alternative Payment Models (APM)’s ■ The Reauthorization Act of 2015 (MACRA) reformed Medicare payments by making changes that created a quality payment program (QPP) to replace the hodgepodge system of Medicare reporting programs. ■ The MACRA QPP has two paths—merit-based payment system (MIPS) or alternative payment models (APMs)—that will be in effect through 2021 and beyond. ■ The APMs are not just incentives, but fundamental changes in how we pay for health care in the United States. It is these models, particularly those dealing with total cost of care, that have the potential to fundamentally alter the value we receive from health care. ○ Clinical transformation Final study guide NR599. ■ The complete alteration of the clinical environment; widespread change accompanies transformational activities, and clinical transformation implies that the manner in which work is carried out and the outcomes achieved are completely different from the prior state, which is not always true in the case of simply implementing technology. ■ Technology can be used to launch or in conjunction with a clinical transformation initiative; however, the implementation of technology alone is not justifiably transformational ability. Therefore, this term should be used cautiously to describe redesign efforts. ○ Events ■ Occurrences that might be significant to other objects in a system or to external agents ■ for example, creating a laboratory request is an example of a healthcare event in a laboratory application. ■ An event is defined and could be a triggering event for the task or workflow; a task or workflow can have several triggering events. ○ Information systems ■ The manual and/or automated components of system of users or people, recorded data, and actions used to process the data into information for a user, group of users, or an organization. ○ Lean ■ Lean and Six Sigma are a complementary combination of activities that focus on doing the right steps and actions (Lean) and doing them right the first time ○ Medical home models ■ An information technology platform that enables the seamless exchange of important patient information among many providers in a healthcare system. ■ Typically the primary care physician (medical home) initiates the collection of patient data, coordinates the care of the patient, and helps to maintain the accuracy of such data. ■ Other care providers access the information and add to it as they provide services to patients. ○ Medicare Access and CHIP Reauthorization Act of 2015 (MACRA) ■ An act that reformed Medicare payment by making changes that created a quality payment program (QPP) to replace the hodgepodge system of Medicare reporting programs. Final study guide NR599. variability in processes O Workflow/Work process Final study guide NR599. ■ A progression of steps (tasks, events, and interactions) that constitute a work process; involve two or more persons; and create or add value to the organization’s activities. ■ In a sequential workflow, each step depends on the occurrence of the previous step; in a parallel workflow, two or more steps can occur concurrently. ■ The term “workflow” is sometimes used interchangeably with “process” or “process flow,” particularly in the context of implementations. ■ A sequence of connected steps in the work of a person or team of people—that is, the process or flow of work within an organization; a virtual illustration of the “real” work or steps (flow) that workers enact to complete their tasks (work). ■ The purpose of examining and redesigning workflow is to streamline the work process by removing any unnecessary steps that do not add value or might even hinder the flow of work. ○ Workflow analysis ■ Not an optional part of clinical implementations, but rather a necessity for safe patient care fostered by technology. ■ The ultimate goal of workflow analysis is not to “pave the cow path,” but rather to create a future-state solution that maximizes the use of technology and eliminates non– value-added activities. ■ Although many tools and methods can be used to accomplish workflow redesign, the best method is the one that complements the organization and supports the work of clinicians. McBride, S., & Tietze, M. (2018). ● Chapter 6 Computers in Health Care ○ application software ■ generally has a purpose or function specific to its use (e.g., accounting/financial applications ○ Database ■ are defined as a large collection of data organized for rapid search and retrieval ○ hardware ○ hardware configuration Final study guide NR599. ■ Various system settings that allow for computers or other hardware to work ○ human factors ■ the field of study focused on understanding human elements of systems, in which ‘systems’ may be defined as software, medical devices, computer technology, and organizations ○ network typology ■ Network topology is the arrangement of the elements of a communication network. ■ Network topology can describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial field busses and computer networks. ● Tree network ○ one builds off the switch and connects a switch to switch, and this configuration works using the Internet. ■ Expansion is available with this network ● Star network ○ Typically connected via a switch or hub, with a limited number of computers on the network ● Ring network ○ set up in a circular configuration with the signals transmitting around the ring until the envelope containing the data, or package of information, finds the designated address. ○ Difficult to add to a computer ○ When one computer goes down the whole network goes down ● Bus network ○ Bus configurations are dependent on the total length of the network and the distance the computers are spaced within the network. ○ Total distance, number of computers, and spacing are relevant to the efficiency with a bus configuration. ■ Various networks have pros and cons depending on the configuration. ○ programming languages ■ is a mechanism for transforming information into a computer in the form of machine code, which instructs the computer to do some type of task ■ First generation Final study guide NR599. ○ Usability ■ The degree to which something is able or fit to be used ● Chapter 19 Clinical Decision Support System ○ CDS: provides clinicians, staff, patients, or other individuals with knowledge and person-specific information, intelligently filtered or presented at appropriate times to enhance healthcare ○ Successful implementation is done using leadership, executive support, and interprofessional teams representing stakeholders most impacted by changes to workflow ○ Five rights framework: right information (what), right person (who), right CDS information format (how), right channel (where), right point in the workflow (when) ○ Key strategy within HITECH and MU act ○ Primary goal of CDS is to leverage data and the scientific evidence to help guide appropriate decision making ○ Predictive vs prescriptive analytics ■ Predictive: take available data and apply logic or algorithm to calculate the likelihood of an event (falls risk tool) ■ Prescriptive: lead the clinician on a defined pathway to address the identified issue (hundreds of data points to give a weighted sepsis score- trigger a sepsis guideline order set) ○ Qualitative evaluation strategy after implementing CDS program may include focus groups or surveys-- Quantitative measures include flow charts and may be used to report back to leadership ○ CDS teams must design and deploy CDSS’s so they are most helpful for their purposes as EHR directly from the vendor do not automatically capture certain information to find trends and suggest interventions ■ Finding common ground terminology is important as what one thing means to IT staff is something totally different from a doctor or even different to the nurse ■ The team must work together, as clinicians can have unrealistic expectation for the capability of technology/computer, and the informatics team needs to know what is important to the front line staff ○ The most important issue with regard to liability/legal concerns is whether CDS tools are well designed and well implemented, but clinicians are held to the same level of accountability with the EHR as with the paper-based record- alerts should be clinically relevant ■ Also recommended that a stronger government Final study guide NR599. regulation of CDS and the development of clinical practice guidelines ○ Challenges to implementing CDS Final study guide NR599. ■ Timing of when to receive alerts within provider workflow ■ Speed and ease of access to alerts ■ Autonomy desired by clinician related to how much control end users have over their response to CDS (whether the CDS alert is a hard stop preventing them from moving forward in the EHR until alert is addressed & whether it takes significant effort to override WEEK SIX READING/ KEY POINTS ● McGonigle Chapter 18 Telenursing and remote access telehealth ○ Telehealth: wide range of health services that are delivered by telecommunications ready tools, such as telephone, videophone, and computer ○ Foundation of knowledge model and home telehealth ■ Knowledge acquisition: receiving information from telehealth device such as vital signs taken in home and patients response to customized questions- information goes to remote server and accessed by telehealth nurse ■ Knowledge processing: take vital signs, subjective data, with pt history to get picture of the clinical situation ■ Knowledge generation: uses nursing skills & knowledge along with information from the patient to decide the best course of action to take and acts on the data. The nurse will reflect upon the situation to see if any more information needs to be gathered or if the physician needs to be consulted regarding tx plan. Additional questions may be asked if needed. ■ Knowledge dissemination: may include calling the doctor,obtaining change in med order, calling pt to notify of the change, education, continued monitoring ○ Allow easier and faster access to patients conditions ex. Pt’s response to medications in hours rather than in days ○ Telehealth is needed to help fill the nursing shortage allowing nursing to see more patients quicker, as well as the aging population (⅘ 50+ years old live with at least one chronic disease or condition). The amount of chronic conditions and number of people affected by chronic conditions is expected to continue rising-- ⅓ of people of all ages have limited ability to go to school or live independently due to chronic conditions ○ The U.S healthcare system spends $1.4 trillion each year on conventional medical care and will increase in the coming decades-- one solution is to Final study guide NR599. ■ There are several different constructs for managing projects of the magnitude and scope of an EHR implementation, but SDLC follows a very specific group of activities defined within each phase, thus further defining the project steps and requirements ■ During the implementation phase, policies and procedures are written to define the workflows, training materials are developed, and testing is completed ■ The actual implementation, or “go-live,” occurs at a point and time that is usually supported by the builders, developers, and superusers for a specific time period ○ Innovators ■ Innovators on average account for about 2.5% of the organization’s population and may include nursing informaticists, champions, and superusers ■ They embrace the technology and understand the potential of the EHR and the ability to expand the infrastructure with new innovations to further improve safety and quality of patient care, as well as the clinician experience ■ They seek to help define the system and are often testers involved in the design of the workflows ■ Innovators often are innovators in other areas of their lives ■ Innovators constantly push for advanced functionality of the system, pushing the limits of the system and creatively thinking of ways to improve existing workflows and functionality. ○ Interoperability ■ Interoperability describes the extent to which systems and devices can exchange data and interpret that shared data ■ Interoperability is becoming more prominent and more robust in its use, due to advancement of standards, such as FHIR, and application program interface (API), which easily link data between multiple sources. ■ Systems can work together synergistically to enhance health information management, as well as reduce redundancy or data collection, allowing for aggregation of data for analytics and reporting ■ Among systems is what makes it possible to have different applications within an organization and also allows sharing of data between organizations, providers, or other stakeholders ○ Laggards Final study guide NR599. ■ They are the most resistant to the use of anything new, resisting change of any type ■ They express concern about patient safety and may talk about changing jobs or leaving the workforce altogether rather than adjust to the new methods ■ Laggards need a lot of support from superusers as well as direction from management to use the system ■ They are concerned about their own ability to use the EHR, as well as experience a feeling of loss of control in the many changes that are occurring ○ point-of-care technology ■ Encompasses the devices and systems that support health- care professionals in their daily activities of monitoring patients, caring for them, and documenting their health progress ○ Rogers’s Diffusion of Innovations model ■ Rogers proposes that four main elements influence the spread of a new idea ● the innovation itself ● communication channels ● time ● social system ■ This process relies heavily on human capital ● McBride Chapter 10 Evaluation methods and strategies for EHR ● McBride Chapter 16 Telehealth and mobile health WEEK SEVEN READING/ KEY POINTS ● McGonigle Chapter 5 Ethical Applications of Informatics ○ Alternatives ■ Having a choice between two or more options available ○ Anti Principlism ■ Theory that comes with expansion of technological changes in recent years and the rise in ethical dilemmas that occur due to changes ■ Those against principlism include those who claim that its principles do not represent a theoretical approach ○ Applications (Apps) ■ Software used on a mobile device. ○ Autonomy ■ The right a person has to choose for him or herself Final study guide NR599. ○ Beneficence ■ Actions performed that benefit the welfare of others ○ Bioethics ■ The study of healthcare ethics ■ Bioethics takes on relevant ethical problems seen by healthcare providers in relation to care ○ Bioinformatics ■ The use of science (computer, information and cognitive) in relation to the human genome. ■ An interdisciplinary science that applies computer and information sciences to solve biological problems. ○ Care ethics ■ An ethical approach to solving moral dilemmas in healthcare that is based on relationships and interactions or caring for others ○ Casuist approach ■ An approach to ethical decision making that grew out of the concern for methods of examining ethical dilemmas ■ Casuistry is a specific ethical reasoning method that analyzes the facts of a case in a sound, logical, and ordered or structured manner. ○ Confidentiality ■ To ensure that all personal information is protected by ensuring that limited access is only given to those who are authorized to view that information. ○ Consequences ■ Outcome resulted in ones decision making ○ Courage ■ having the strength to face difficulty ○ Decision making ■ Outcome of our intellectual processing ○ Decision support ■ Recommendations for interventions based on computerized care protocols. ■ The decision support recommendations may include such items as additional screenings, medication interactions, or drug and dosage monitoring. ○ Duty ■ One’s feeling of being obligated to carry out specific tasks based on one’s rank ○ Ethical decision making Final study guide NR599. ■ A ideal toward which we should strive that provides for the full development of our humanity. ■ Attitude that enables us to be and to act in ways that develop our highest potential ■ examples are honesty, courage, compassion and fairness. They become characteristics of a person ■ The virtuous person is the ethical person. ○ Virtue ethics ■ Theory that suggests individuals use power to bring about human benefit ■ Consider the needs of others and the responsibility to meet those needs. ○ Wisdom ■ Knowledge applied in a practical way or translated into actions ■ Use of knowledge and experience to heighten common sense and insight so as to exercise sound judgment in practical matters ● McGonigle Chapter 8 Legislative Aspects of Nursing Informatics: HITECH and HIPAA ○ Access ■ The ability to retrieve data ○ Agency for Healthcare Research and Quality ■ An US agency that supports research initiatives ○ American National Standards Institute ■ An organization that promotes consensus on norms and guidelines related to the assessment of health agencies ○ Centers for Medicare and Medicaid Services ■ The largest health insurer in the US, particularly for home healthcare services and for the elderly in relation to healthcare services. ○ Certified EHR technology ■ An electronic health record (EHR) that meets specific governmental standards for the type of record involved ■ The standards that are meant to be met are set by federal regulations ○ Civil monetary penalties ■ Fines laid out by the Social Security Act ■ In which the Secretary of Health and Human Services can use for many types of non adherent conduct. ○ Compliance ■ Correctly following the rules ○ Confidentiality Final study guide NR599. ■ Protecting privacy of personal information or data ○ Enterprise integration ■ Electronically linking healthcare providers and plans to improve electronic exchange and use of health information among all of those involved in care. ○ Entities ■ Distinct and independent existence ○ Gramm-Leach-Bliley Act ■ Federal legislation in the United States that controls how financial institutions handle the private information they collect from individuals ○ Health disparities ■ The health status differences between different groups of people, especially minorities and nonminorities. ■ The gap between the different people is an ongoing problem even with the advances in technology and healthcare practices ○ Health Insurance Portability and Accountability Act ■ Law signed by Pres. B. Clinton in addressing the need for standards to regulate and safeguard health information and making provisions for health insurance coverage for employed persons who change jobs. ○ Health Level Seven ■ A Standards developing organization that is committed to developing standard terminologies for information technology that support interoperability of healthcare information management systems ○ Healthcare-associated infections ■ Infections that patients acquire while being treated in a healthcare facility ○ International Standards Organization ■ A nongovernmental group that connects and bridges the public and private sectors to develop and publish international standards that assimilate the latest expert knowledge ■ The goal being to provide practical tools for tracking economic, environmental, and societal challenges ○ National Institute of Standards and Technology ■ A nonregulatory federal agency within the U.S. Department of Commerce that was founded in 1901 ■ Its mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, Final study guide NR599. and technology in ways that enhance economic security and improve the quality of life. ○ Office of Civil Rights ■ Part of the U.S. Department of Health and Human Services and responsible for enforcing the Health Insurance Portability and Accountability Act. ■ It provides significant information and guidance to clinicians who must comply with the Privacy and Security Rules. ■ It has been tracking complaints and investigating violations since 2003. ○ Office of the National Coordinator for Health Information Technology ■ An office within the U.S. Department of Health and Human Services that was established through the HITECH Act. ■ The ONC is headed by the national coordinator, who is responsible for overseeing the development of a nationwide health information technology infrastructure that supports the use and exchange of information. ○ Open Systems Interconnection ■ A model of standardization for communications in a network developed to ensure that various programs would work efficiently with one another. ○ Policies ■ Basic principles that guide behavior and performance and are enforced. ○ Protected health information ■ Any and all information about a person’s health that is tied to any type of personal identification. ○ Qualified electronic health record ■ An electronic record containing health-related information on an individual, which consists of the individual’s demographic and clinical health information, including medical history and a list of health problems, and supports entry of physician orders. ■ A qualified electronic health record can capture and query information relevant to healthcare quality and exchange electronic health information with and assimilate such information from other sources to provide support for clinical decision making. ○ Sarbanes-Oxley Act ■ Legislation that was put in place to protect shareholders as well as the public from deceptive accounting practices in organizations. Final study guide NR599. ■ A tool commonly used by organizations to protect their corporate networks when they are attached to the Internet. ■ A firewall can be either hardware or software, or a combination of the two. It examines all incoming messages or traffic to the network. ■ The firewall can be set up to allow only messages from known senders into the corporate network; it can also be set up to look at outgoing information from the corporate network. ○ Flash drives ■ Small, removable storage devices. ○ Hackers ■ Computer-savvy individuals most commonly thought of as malicious people who hack, or break, through security to steal or alter data and information ○ Integrity ■ Quality and accuracy ■ People have confidence that the information they are provided is, in fact, true. ○ Intrusion detection devices ■ hardware and software that allow groups to monitor who is using its network and which files that user has accessed. ○ Intrusion detection system ■ Method of security that uses both hardware and software detection devices as a system that can be set up to monitor a single computer or network. ○ Jump drives ■ Small, removable storage devices. ○ Malicious code ■ Software that includes spyware, viruses and worms ○ Malicious insiders ■ Insiders who sabotage or add malicious code or gets into systems to cause damage or to steal data and information. ○ Malware ■ A malicious program or software that infects a device and is intended to steal information, take control or destroy data, information, or the device. ○ Mask ■ Method that a proxy server uses to protect the identity of a corporation’s employees while they are surfing the World Wide Web ■ The proxy server keeps track of which employees are using which masks and directs the traffic appropriately. Final study guide NR599. O Negligent insider Final study guide NR599. ■ Someone is a good but careless employee who unintentionally exposes a network to security vulnerabilities by ignoring or forgetting about proper security procedures ○ Network ■ Connections of computers that can be local or organizationally based, joined together into a local area network, on a wider area scope ○ Network accessibility ■ The ability of the network to be accessed by the right user to obtain what that person needs when he or she needs it ○ Network availability ■ The state in which network information is accessible when needed. ○ Network security ■ The specific precautions taken to ensure that the integrity of a network is safe from unauthorized entry and that the data and information stored on the network are accessible only by authorized users ○ Phishing ■ An attempt to steal information by manipulating the recipient of an e-mail or phone call to provide passwords or other private information. ○ Proxy server ■ Hardware security tool to help protect an organization against security breaches. ○ Ransomware ■ A specific type of malware that cripples the computer network until a ransom is paid by the organization whose network was compromised. ○ Scareware ■ An e-mail designed to scare the user into believing that their computer has been infected ■ The hacker seeks to gain remote access to the computer to “fix” it. ○ Secure information ■ Information that is protected from error, unauthorized access, and other threats that can compromise its integrity and safety ○ Security breaches ■ security violations ○ Shoulder surfing ■ Watching over someone’s back as he or she is working on a computer ○ Social engineering Final study guide NR599. breaches ■ And ensuring that nurses are accountable for their actions related to patient health information Final study guide NR599. ○ Telehealth ■ Telecommunication technologies used to deliver health-related services or to connect patients and healthcare providers to maximize patients’ health status. ■ A relatively new term in the medical/nursing vocabulary, referring to a wide range of health services that are delivered by telecommunications-ready tools such as the telephone, videophone, and computer. ○ Texting ■ Used on mobile device and is an area that will allow for more vulnerability of sharing the knowledge of patient information ○ Transactions ■ an exchange or interaction between people ■ Discussing the use of electronic transactions or billing or coding used to share or input information ○ ubiquitous computing ■ Is a concept in software engineering and computer science where computing is made to appear anytime and everywhere. ■ In contrast to desktop computing, ubiquitous computing can occur using any device, in any location, and in any format ○ Vulnerabilities ■ State of being exposed to the possibility of being attacked or harmed, either physically or emotionally. ■ Security breaches are related to vulnerabilities created by human errors ● McBride Chapter 27 "Big Data" and Advanced Analytics ○ advanced analytics ■ Is a part of data science that uses high-level methods and tools to focus on projecting future trends, events, and behaviors ■ Can improve healthcare costs and help shape the reform of clinical patient care ○ big data ■ Serves to provide solutions in public health, such as the ability to predict future healthcare needs of a population or infectious disease outbreaks ■ May also be used to improve disease detection by providing comprehensive information, trends, and comparisons that result in increased accuracy for initial diagnoses. Final study guide NR599. ■ This could result in reduced medical errors such as those resulting from misdiagnosis or omissions of care. ○ cognitive computing ■ Big data and cognitive computing analyses of data can deliver information in “real time” to clinicians. ■ describes technology platforms that, broadly speaking, are based on the scientific disciplines of artificial intelligence and signal processing. ■ technology can rapidly analyze large masses of data, generate insights not attainable by traditional analytics, and produce “actionable responses” based on evidence ■ cognitive systems can utilize big data to think and learn, thus processing information much faster than a human while identifying patterns, trends, and evidence-based solutions. ○ data mining ■ has been defined as mining data and information from large databases and is often associated with machine learning or advanced analytics techniques ■ is also defined as a method in computer science that is used to discover patterns and trends within large data sets. ■ Data-mining techniques contain many specialized classifications and subclassifications involving various methods that intersect with artificial intelligence, machine learning, statistics, and database systems ○ data scientist ■ to describe the competencies required as “part hacker, part analyst, part communicator” ■ is focused on using analytics to solve problems, and the data scientist has the competencies to understand how to “fish out answers to important business questions from today’s tsunami of unstructured information” ○ machine learning ■ defined as “the science and technology of systems that learn from data” ● These systems present challenges with adoption and implementation of technology that require nursing expertise and leadership given the impact on clinical and operational workflows often managed by nursing ○ unstructured data Final study guide NR599. ■ If a mistake occurs, another transaction is posted that corrects the problem, leaving the mistake and the correction permanently recorded for full transparency. ■ Blockchain for business and healthcare differs from the original blockchain technology in four key areas: ● Identity over anonymity ○ Identity was kept a secret but now identify is known by there is a specific name that goes with each business that is only known by the business. ● Selective endorsement over proof of work ○ Transactions are endorsement, not needed to be kept because identity is known ● Assets over cryptocurrency ○ Assets of all types are kept, while with bitcoin only asset tracked is cryptocurrency ● Speed and scale ○ The original could only handle a small amount, the new transactions are made to transform various amounts at top speed. ○ cloud computing ■ creates a set of vulnerabilities ■ is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. ■ The term is generally used to describe data centers available to many users over the Internet. ○ cloud health ○ cognitive security systems ■ is the application of AI technologies patterned on human thought processes to detect threats and protect physical and digital systems. ■ Such attacks, sometimes referred to as cognitive hacking, are designed to affect people's behaviors in a way that serves the attacker's purpose. ○ data breaches ■ Is the intentional or unintentional release of secure or private/confidential information to an untrusted environment. ■ Can be caused by human error. WEEK EIGHT READING/ KEY POINTS Final study guide NR599. ● McGonigle: Chapter 14 The Electronic Health Record and Clinical Informatics ○ Administrative processes ■ The processes used by administration, such as the electronic scheduling, billing, and claims management systems including electronic scheduling for inpatient and outpatient visits and procedures, electronic insurance eligibility validation, claim authorization and prior approval, identification of possible research study participants, and drug recall support. ○ American Recovery and Reinvestment Act of 2009 (ARRA) ■ An economic stimulus package enacted in February 2009 that was intended to create jobs and promote investment and consumer spending during the recession. ■ Also referred to as the Stimulus or Recovery Act ○ Connectivity ■ Ability to hook up to the electronic resources necessary to meet the user’s needs. The ability to use computer networks to link to people and resources. ■ The unbiased transmission or transport of Internet Protocol packets between two endpoints. ○ Decision support ■ Recommendations for interventions based on computerized care protocols. The decision support recommendations may include such items as additional screenings, medication interactions, or drug and dosage monitoring. ○ Electronic communication ■ Exchange of information, electronically ○ Electronic health records ■ Computer-based data warehouses or repositories of information regarding the health status of a client ■ They are the systematic documentation of a client’s health status and health care in a secured digital format, meaning that they can be processed, stored, transmitted, and accessed by authorized interdisciplinary professionals for the purpose of supporting efficiency. ○ Health Information Technology for Economic and Clinical Health Act of 2009 (HITECH) ■ Under this act, healthcare organizations can qualify for financial incentives based on the level of meaningful use achieved ■ the HITECH Act specifically incentivizes health organizations and providers to become “meaningful users.” Final study guide NR599. ○ Interoperability Final study guide NR599. address to fully realize the potential of the information technology (IT) infrastructure implemented under the Health Information Technology for Economic and Clinical Health (HITECH) Act and to Final study guide NR599. capitalize on subsequent development, including global expansion of standards ■ are the rules by which data are described and recorded ■ In order to share, exchange, and understand data, we must standardize the format as well as the meaning ○ de facto standards ■ Is a custom or convention that has achieved a dominant position by public acceptance or market forces ○ Digital Imaging and Communications in Medicine ■ Is the standard for the communication and management of medical imaging information and related data ○ government-mandated standards ■ Standards that are decided and accepted by the government ○ Health Level 7 ■ A not-for-profit, American National Standards Institute ● a set of international standards for transfer of clinical and administrative data between software applications used by various healthcare providers ● These standards focus on the application layer, which is "layer 7" in the OSI model ○ health information service provider (HISP) ■ Is an accredited network service operator that enables nationwide clinical data exchange using Direct Secure Messaging ○ ICD-9-CM ■ is the official system of assigning codes to diagnoses and procedures associated with hospital utilization in the United States ■ Consists of: a tabular list containing a numerical list of the disease code numbers; an alphabetical index to the disease entries ○ ICD-10-CM ■ Is the standard transaction code set for diagnostic purposes under the Health Insurance Portability and Accountability Act (HIPAA) ■ It is used to track health care statistics/disease burden, quality outcomes, mortality statistics and billing Final study guide NR599. ○ Institute of Electrical and Electronics Engineers (IEEE) Final study guide NR599. ■ It can also be used in personal health records applications ○ Systematized Nomenclature of Medicine (SNOMED) ■ Is a systematic, computer-processable collection of medical terms, in human and veterinary medicine ■ Provides codes, terms, synonyms and definitions which cover anatomy, diseases, findings, procedures, microorganisms, substances, etc. ○ Unified Medical Language System (UMLS) ■ is a set of files and software that brings together many health and biomedical vocabularies and standards to enable interoperability between computer systems ○ X12 ■ Messaging standards developed to transmit data between two entities referred to as “trading partners” in the HIPAA legislation ● McBride Chapter 18 Data Management and Analytics: The Foundations for Improvement ○ Foundations of improvement: data management, analytics, and measures ○ Master data management: coordination of people, practices, and automation ○ Data warehouse: retrospective store of data set up to report trends, offer comparisons, and provide strategic analysis ■ Does not change with time ■ Maintains aggregate and detail level data ■ Centralizes data collection for the intended purpose & provides data marts within the infrastructure ● Data mart: subsection of the data warehouse that stores data for a very specific intended purpose ○ Clinical or operational data: Accumulates clinical and operational data from many systems to assist clinicians in managing patient care at the point of care ■ Expected to shift and change with time ○ When designing a data-analysis strategy the analyst needs to determine what it is that is needed for analysis ■ Measurement theory: conceptual foundation of all scientific decisions- basis for all evidenced based practice ● The goal of measurement is to accurately evaluate a phenomenon of interest and reduce concepts to operational definitions with numeric values Final study guide NR599. ■ Levels of measurement- nominal, ordinal, interval, and ratio data-- once classified the level of measurement specifies which statistical operation can be properly used ● Nominal: numbers assigned represent an objects membership in one of a set of mutually exclusive, exhaustive, and unorderable categories (categorical data) ● Ordinal: numbers assigned represent an objects membership in one of a set of mutually exclusive and exhaustive categories that can be ordered according to the amount of the attribute possessed (categorical data) ● Interval: numbers assigned represent an objects membership in one of a set of mutually exclusive and exhaustive categories that can be ordered and are equally spaced regarding the magnitude of the attribute under consideration (continuous variable or scale) ● Ratio: same as the interval, but also the distance from an absolute zero point is known (continuous variable or scale) ○ Operationalizing a measure: outlines precisely how a measure will be constructed ■ Variable: quantity that may assume any set of values (gender-m or f) ■ Dependent variable: outcome of interest ■ Independent variable: related to the dependent variable of interest or may be an intervention that is manipulated in a study ■ Intervention: process measure that impacts the outcome measure ○ Quality of data ■ May take into consideration: consistency of data, completeness, conformity to standard, accuracy, duplication, and overall integrity ○ A data exploration analysis provides a variety of visual and numerical summaries of data and can be performed by all cases, a subject of cases, or separately for groups of cases ■ To perform an analysis the analyst screens the data, examines the data file for outliers, and checks assumptions one might have relating to the data ○ Data transformation: requires manipulation of the original data to answer the questions of interest ■ Collapse data into age groups, deriving an outcome from source data such as mapping discharge status Final study guide NR599. codes to a mortality measure of yes or no
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved