Podcast
Questions and Answers
What does HIS stand for?
What does HIS stand for?
Healthcare Information System
What are the three major stages of Lewin's Change Management Model?
What are the three major stages of Lewin's Change Management Model?
Unfreeze, Change, Refreeze
The "Unfreeze" stage of Lewin's Change Management Model involves convincing the target groups that the new way is better than the old way.
The "Unfreeze" stage of Lewin's Change Management Model involves convincing the target groups that the new way is better than the old way.
True
The "Refreeze" stage of Lewin's Change Management Model involves establishing the change as a new habit, so that it now becomes a new standard
The "Refreeze" stage of Lewin's Change Management Model involves establishing the change as a new habit, so that it now becomes a new standard
Signup and view all the answers
Which of the following are considered to be user groups in Rogers' Diffusion of Innovation?
Which of the following are considered to be user groups in Rogers' Diffusion of Innovation?
Signup and view all the answers
What is the name of the group in Rogers' Diffusion of Innovation that comprises 2.5% of the population and are considered to be the risk-takers who are the first to use an innovation?
What is the name of the group in Rogers' Diffusion of Innovation that comprises 2.5% of the population and are considered to be the risk-takers who are the first to use an innovation?
Signup and view all the answers
What is the name of the group in Rogers' Diffusion of Innovation that comprises 34% of the population and adopt an innovation after a varying degree of time that is significantly longer than the innovators and early adopters?
What is the name of the group in Rogers' Diffusion of Innovation that comprises 34% of the population and adopt an innovation after a varying degree of time that is significantly longer than the innovators and early adopters?
Signup and view all the answers
What is the name of the group in Rogers' Diffusion of Innovation that comprises 34% of the population and adopt an innovation after the average participant, approaching it with a high degree of skepticism?
What is the name of the group in Rogers' Diffusion of Innovation that comprises 34% of the population and adopt an innovation after the average participant, approaching it with a high degree of skepticism?
Signup and view all the answers
What is the name of the group in Rogers' Diffusion of Innovation that comprises 16% of the population and are suspicious of innovation and change?
What is the name of the group in Rogers' Diffusion of Innovation that comprises 16% of the population and are suspicious of innovation and change?
Signup and view all the answers
The promises of clinical informatics systems include improved efficiency and improving the health care of older adults
The promises of clinical informatics systems include improved efficiency and improving the health care of older adults
Signup and view all the answers
Challenges in clinical informatics include poor usability of health IT and failure to design health IT for human factors to prevent errors
Challenges in clinical informatics include poor usability of health IT and failure to design health IT for human factors to prevent errors
Signup and view all the answers
True healthcare interoperability involves only people, processes, and systems, all supported by a drive to deliver better healthcare
True healthcare interoperability involves only people, processes, and systems, all supported by a drive to deliver better healthcare
Signup and view all the answers
What are the three major functions of security in HIS that are designed to protect three major issues?
What are the three major functions of security in HIS that are designed to protect three major issues?
Signup and view all the answers
Confidentiality in HIS refers to ensuring that information is only being seen or used by people who are not authorized to access it.
Confidentiality in HIS refers to ensuring that information is only being seen or used by people who are not authorized to access it.
Signup and view all the answers
Integrity in HIS means preventing any authorized user from changing the information, and tracking the changes made by authorized users.
Integrity in HIS means preventing any authorized user from changing the information, and tracking the changes made by authorized users.
Signup and view all the answers
Availability in HIS means making sure that information will be available when authorized users need it.
Availability in HIS means making sure that information will be available when authorized users need it.
Signup and view all the answers
Security threats in HIS include natural disasters, such as earthquakes, floods, and inside attacks by malicious employees.
Security threats in HIS include natural disasters, such as earthquakes, floods, and inside attacks by malicious employees.
Signup and view all the answers
Security threats in HIS include accidental viewing from an authorized person to some confidential or sensitive patient data
Security threats in HIS include accidental viewing from an authorized person to some confidential or sensitive patient data
Signup and view all the answers
Security threats in HIS include malicious damage to private medical records or HIS equipment, and risk of transferring patient data to internal media, such as CDs or USB flash drives.
Security threats in HIS include malicious damage to private medical records or HIS equipment, and risk of transferring patient data to internal media, such as CDs or USB flash drives.
Signup and view all the answers
User impersonation or identity theft is the legal use of someone else's personal identifying information, such as username and password, in order to log into someone's HIS account.
User impersonation or identity theft is the legal use of someone else's personal identifying information, such as username and password, in order to log into someone's HIS account.
Signup and view all the answers
What are some ways to steal someone's identity? (Select all that apply)
What are some ways to steal someone's identity? (Select all that apply)
Signup and view all the answers
Malware, or malicious software, is any computer program designed to infiltrate and destroy computers without the user's consent, or gathering information about the computer users without permission.
Malware, or malicious software, is any computer program designed to infiltrate and destroy computers without the user's consent, or gathering information about the computer users without permission.
Signup and view all the answers
What are some types of Malware? (Select all that apply)
What are some types of Malware? (Select all that apply)
Signup and view all the answers
A virus is a program that spreads by attaching itself to a legitimate software, document, or e-mail attachment, and can be transmitted through e-mails or downloaded files, but not be present on CDs, DVDs, USB-drives, or any other soil of digital media.
A virus is a program that spreads by attaching itself to a legitimate software, document, or e-mail attachment, and can be transmitted through e-mails or downloaded files, but not be present on CDs, DVDs, USB-drives, or any other soil of digital media.
Signup and view all the answers
A worm is a program that propagates across computers, usually by creating copies of itself in each computer without being activated by the user, to the extent it causes the computer to crash.
A worm is a program that propagates across computers, usually by creating copies of itself in each computer without being activated by the user, to the extent it causes the computer to crash.
Signup and view all the answers
A Trojan Horse is a destructive program disguised as a game, utility, or application, which, when run, does something harmful to the computer system while appearing to do something useful, such as deleting files or formatting the hard disk.
A Trojan Horse is a destructive program disguised as a game, utility, or application, which, when run, does something harmful to the computer system while appearing to do something useful, such as deleting files or formatting the hard disk.
Signup and view all the answers
A key logger is a small program that monitors every keystroke you enter on your keyboard, and stealing private information such as usernames and passwords.
A key logger is a small program that monitors every keystroke you enter on your keyboard, and stealing private information such as usernames and passwords.
Signup and view all the answers
An electronic health record (EHR) is a digital version of a patient's paper chart, and EHRs are real-time, patient-centered records that make information available rapidly and securely to authorized users, but the EHR does not contain the personal, medical, and treatment histories of patients.
An electronic health record (EHR) is a digital version of a patient's paper chart, and EHRs are real-time, patient-centered records that make information available rapidly and securely to authorized users, but the EHR does not contain the personal, medical, and treatment histories of patients.
Signup and view all the answers
EHR data "can be created, managed, and consulted by authorized clinicians and staff across more than one healthcare organization."
EHR data "can be created, managed, and consulted by authorized clinicians and staff across more than one healthcare organization."
Signup and view all the answers
The Swiss cheese model states that errors result from a cascade of events, with each layer of protection having its own flaws; adding new slices of cheese, or minimizing safety gaps will increase the probability of errors.
The Swiss cheese model states that errors result from a cascade of events, with each layer of protection having its own flaws; adding new slices of cheese, or minimizing safety gaps will increase the probability of errors.
Signup and view all the answers
Human sources of error include slip: correct action is known but an incorrect action is taken; rule-based error: good rule applied in the wrong situation; knowledge-based error: lacking knowledge needed to determine appropriate action; commission: doing something wrong; and omission: failing to do the right thing.
Human sources of error include slip: correct action is known but an incorrect action is taken; rule-based error: good rule applied in the wrong situation; knowledge-based error: lacking knowledge needed to determine appropriate action; commission: doing something wrong; and omission: failing to do the right thing.
Signup and view all the answers
Data entry in electronic records must be done in standardized formats for data to be easily re-used in the future.
Data entry in electronic records must be done in standardized formats for data to be easily re-used in the future.
Signup and view all the answers
Achieving the appropriate data context depends solely on computer systems.
Achieving the appropriate data context depends solely on computer systems.
Signup and view all the answers
What are some causes of unplanned EHR downtimes? (Select all that apply)
What are some causes of unplanned EHR downtimes? (Select all that apply)
Signup and view all the answers
The information age has not led to revolutionary changes in the delivery of health care.
The information age has not led to revolutionary changes in the delivery of health care.
Signup and view all the answers
Patient engagement is a set of reciprocal tasks performed by patients and HCPs in a collaborative effort to promote and support passive patient involvement in their own health care.
Patient engagement is a set of reciprocal tasks performed by patients and HCPs in a collaborative effort to promote and support passive patient involvement in their own health care.
Signup and view all the answers
Patient empowerment is maximizing the number of opportunities made available to patients to endow them with a better sense of control over their own health care.
Patient empowerment is maximizing the number of opportunities made available to patients to endow them with a better sense of control over their own health care.
Signup and view all the answers
Shared decision-making is most effective when patients are fully aware of the risks, benefits, and their own preferences, and is not becoming more valuable in the management of chronic disease.
Shared decision-making is most effective when patients are fully aware of the risks, benefits, and their own preferences, and is not becoming more valuable in the management of chronic disease.
Signup and view all the answers
Patients are empowered by efforts that help them engage in the planning of their care, and modern technology cannot help bridge the gap between isolated patients and HCPs.
Patients are empowered by efforts that help them engage in the planning of their care, and modern technology cannot help bridge the gap between isolated patients and HCPs.
Signup and view all the answers
Health literacy is the "degree to which individuals can obtain, process, and understand the basic health information and services they need to make appropriate health decisions", and patients with high levels of health literacy may be at a serious disadvantage
Health literacy is the "degree to which individuals can obtain, process, and understand the basic health information and services they need to make appropriate health decisions", and patients with high levels of health literacy may be at a serious disadvantage
Signup and view all the answers
Healthcare information online should not be evaluated.
Healthcare information online should not be evaluated.
Signup and view all the answers
What are the four dimensions for assessing the effectiveness of websites from the perspective of the patient? (Select all that apply)
What are the four dimensions for assessing the effectiveness of websites from the perspective of the patient? (Select all that apply)
Signup and view all the answers
Five "Cs" of website certification include credibility, currency, content, construction, and clarity, and patients should only be directed to a website that has been thoroughly evaluated and deemed trustworthy by HCPs.
Five "Cs" of website certification include credibility, currency, content, construction, and clarity, and patients should only be directed to a website that has been thoroughly evaluated and deemed trustworthy by HCPs.
Signup and view all the answers
Challenges associated with tools used to facilitate patient engagement include taking too much time to learn, not being able to help HCPs, and being likely to be prohibited in healthcare organizations.
Challenges associated with tools used to facilitate patient engagement include taking too much time to learn, not being able to help HCPs, and being likely to be prohibited in healthcare organizations.
Signup and view all the answers
The use of social networks by patients is not useful in facilitating self-care in terms of supporting diagnoses, managing conditions, monitoring treatments, and preventing disease.
The use of social networks by patients is not useful in facilitating self-care in terms of supporting diagnoses, managing conditions, monitoring treatments, and preventing disease.
Signup and view all the answers
Wearables have great potential for improving diet and exercise monitoring and adherence, but not for collecting information on activity, sleep, or to log dietary intake.
Wearables have great potential for improving diet and exercise monitoring and adherence, but not for collecting information on activity, sleep, or to log dietary intake.
Signup and view all the answers
Wearables may have greater appeal for niche audiences who are concerned about monitoring these physical parameters but not for general audiences.
Wearables may have greater appeal for niche audiences who are concerned about monitoring these physical parameters but not for general audiences.
Signup and view all the answers
The Markle Foundation defines a PHR (Personal Health Record) as “An electronic application through which individuals can access, manage, and share their health information, and that of others for whom they are authorized, in a private, secure, and confidential environment.
The Markle Foundation defines a PHR (Personal Health Record) as “An electronic application through which individuals can access, manage, and share their health information, and that of others for whom they are authorized, in a private, secure, and confidential environment.
Signup and view all the answers
HCPs may import healthcare data to PHR, but patients should not be the only individuals who have access to maintain information, manage, and make decisions based on their own health information.
HCPs may import healthcare data to PHR, but patients should not be the only individuals who have access to maintain information, manage, and make decisions based on their own health information.
Signup and view all the answers
Virtual intensive care units (vICUs) use technology to leverage the expertise and knowledge of experienced ICU HCPs to perform virtual rounds and critically ill patient management, but not for remote monitoring and management that can be used for those who need chronic disease and/or post-acute care management at home.
Virtual intensive care units (vICUs) use technology to leverage the expertise and knowledge of experienced ICU HCPs to perform virtual rounds and critically ill patient management, but not for remote monitoring and management that can be used for those who need chronic disease and/or post-acute care management at home.
Signup and view all the answers
Remote monitoring and management may involve the use of noninvasive sensors, wearable garment systems, or implanted devices.
Remote monitoring and management may involve the use of noninvasive sensors, wearable garment systems, or implanted devices.
Signup and view all the answers
Pseudonymity allows subjects in a data base to be tracked across time while at the same time remaining nameless.
Pseudonymity allows subjects in a data base to be tracked across time while at the same time remaining nameless.
Signup and view all the answers
Equality and justice in healthcare ethics suggest that we have the right to be treated equally, and Members of society ought to treat their fellow members unequally, without discrimination.
Equality and justice in healthcare ethics suggest that we have the right to be treated equally, and Members of society ought to treat their fellow members unequally, without discrimination.
Signup and view all the answers
Beneficence in healthcare ethics suggests that we have a duty to advance the good of others, and a member of society does not seek just his or her own good, but the general good and advancement of the society as a whole.
Beneficence in healthcare ethics suggests that we have a duty to advance the good of others, and a member of society does not seek just his or her own good, but the general good and advancement of the society as a whole.
Signup and view all the answers
Autonomy in healthcare ethics suggests that we have the right to self-determination, and members of society ought to be given independence in making decisions and judgments.
Autonomy in healthcare ethics suggests that we have the right to self-determination, and members of society ought to be given independence in making decisions and judgments.
Signup and view all the answers
Openness in informatics ethics involves data collection about any person must be done transparently.
Openness in informatics ethics involves data collection about any person must be done transparently.
Signup and view all the answers
Security in informatics ethics requires that data collected must be protected, and once data is collected, it must be safeguarded against unauthorized access by other parties, but data does not need to be protected against manipulation, both malicious and unintentional.
Security in informatics ethics requires that data collected must be protected, and once data is collected, it must be safeguarded against unauthorized access by other parties, but data does not need to be protected against manipulation, both malicious and unintentional.
Signup and view all the answers
Access in informatics ethics involves everyone having the right to deny access and correct their own Electronic Health Record (HER) data.
Access in informatics ethics involves everyone having the right to deny access and correct their own Electronic Health Record (HER) data.
Signup and view all the answers
Public software engineering ethics requires that activities be conducted in the best interest of the society in mind, and Developers should be aware of social impacts of software systems, and the process of developing these systems as well as eventual usage of such systems, but do not need to disclose any dangers or known defects in software.
Public software engineering ethics requires that activities be conducted in the best interest of the society in mind, and Developers should be aware of social impacts of software systems, and the process of developing these systems as well as eventual usage of such systems, but do not need to disclose any dangers or known defects in software.
Signup and view all the answers
Client and employer software engineering ethics involve activities being done in the best interests of clients and employers, and Developers are obliged to have the interests of their clients in mind, while balancing their duties to the public.
Client and employer software engineering ethics involve activities being done in the best interests of clients and employers, and Developers are obliged to have the interests of their clients in mind, while balancing their duties to the public.
Signup and view all the answers
Telehealth is the process of using technological communication systems in the assessment and management of patients., and its goal is to reduce the provision of healthcare services to locations and populations in need of those services..
Telehealth is the process of using technological communication systems in the assessment and management of patients., and its goal is to reduce the provision of healthcare services to locations and populations in need of those services..
Signup and view all the answers
Telemedicine refers to the practice of health care delivery, diagnosis, consultation, treatment, and transfer of medicinal data.
Telemedicine refers to the practice of health care delivery, diagnosis, consultation, treatment, and transfer of medicinal data.
Signup and view all the answers
Telemedicine encompasses a range of specific medical activities including tele-consulting among clinicians, specialty telemedicine applications, and tele-homecare but does not include remote diagnosis
Telemedicine encompasses a range of specific medical activities including tele-consulting among clinicians, specialty telemedicine applications, and tele-homecare but does not include remote diagnosis
Signup and view all the answers
Telenursing is a form of telehealth where nursing practice is delivered via telecommunications, and uses telecommunications technology in nursing to reduce patient care.
Telenursing is a form of telehealth where nursing practice is delivered via telecommunications, and uses telecommunications technology in nursing to reduce patient care.
Signup and view all the answers
The history of telehealth includes the Telecommunications era which was characterized by television and broadcast technologies, the Digital era, which was characterized by integrated computerized information that could transmit voice and video data at higher speeds., and the Internet era, which was characterized by video-conferencing, remote access to patient data and information, and rapid communication between patients and providers.
The history of telehealth includes the Telecommunications era which was characterized by television and broadcast technologies, the Digital era, which was characterized by integrated computerized information that could transmit voice and video data at higher speeds., and the Internet era, which was characterized by video-conferencing, remote access to patient data and information, and rapid communication between patients and providers.
Signup and view all the answers
Factors influencing the development of telehealth include an aging population, with the needs of aging healthcare consumers having a limited impact on the development of telehealth systems outside institutional walls, and cost containments, which focus on healthcare services in high-cost settings rather than on reducing the duplication and inappropriate prescriptions.
Factors influencing the development of telehealth include an aging population, with the needs of aging healthcare consumers having a limited impact on the development of telehealth systems outside institutional walls, and cost containments, which focus on healthcare services in high-cost settings rather than on reducing the duplication and inappropriate prescriptions.
Signup and view all the answers
Factors influencing the development of telehealth include access, with demand increasing for equitable access to healthcare services for inhabitants of isolated geographic areas. There has also been a decrease in technology, with ever more powerful technologies and communications band-widths are becoming unavailable at decreasing costs.
Factors influencing the development of telehealth include access, with demand increasing for equitable access to healthcare services for inhabitants of isolated geographic areas. There has also been a decrease in technology, with ever more powerful technologies and communications band-widths are becoming unavailable at decreasing costs.
Signup and view all the answers
Factors influencing the development of telehealth include demand with the increasing consumer demand for wellness and health information of all kinds having a limited impact on the growth of the Internet and the World Wide Web.
Factors influencing the development of telehealth include demand with the increasing consumer demand for wellness and health information of all kinds having a limited impact on the growth of the Internet and the World Wide Web.
Signup and view all the answers
Factors influencing the development of telehealth include an information explosion with the exponential increase in medical and health information having limited impact on the development of better information management systems. The need for faster and more efficient electronic access, and better on-line research networks has waned.
Factors influencing the development of telehealth include an information explosion with the exponential increase in medical and health information having limited impact on the development of better information management systems. The need for faster and more efficient electronic access, and better on-line research networks has waned.
Signup and view all the answers
Telehealth application components include input, which is a device or means to capture, process, and store content. The throughput component of telehealth applications refers to content and a means to transfer or exchange the content, communications, and network technologies of all kinds and their associated software, and output refers to means for receiving, storing, and displaying the content.
Telehealth application components include input, which is a device or means to capture, process, and store content. The throughput component of telehealth applications refers to content and a means to transfer or exchange the content, communications, and network technologies of all kinds and their associated software, and output refers to means for receiving, storing, and displaying the content.
Signup and view all the answers
MHealth benefits for HCPs include better diagnostics and treatment, monitoring of reaction to drugs and treatment, and instantaneous suggestions and advice to patients, and mHealth benefits for informal caregivers include remote monitoring, access to real-time and long-term trends of healthcare parameters.
MHealth benefits for HCPs include better diagnostics and treatment, monitoring of reaction to drugs and treatment, and instantaneous suggestions and advice to patients, and mHealth benefits for informal caregivers include remote monitoring, access to real-time and long-term trends of healthcare parameters.
Signup and view all the answers
MHealth benefits for researchers include smaller and less relevant databases of patient records.
MHealth benefits for researchers include smaller and less relevant databases of patient records.
Signup and view all the answers
Most health-related apps are dedicated to health and wellness monitoring and management, and an example of a popular mHealth app is MyPlate, which helps users keep track of their meals, exercise, and weight.
Most health-related apps are dedicated to health and wellness monitoring and management, and an example of a popular mHealth app is MyPlate, which helps users keep track of their meals, exercise, and weight.
Signup and view all the answers
FDA regulation of mobile medical applications focuses solely on apps that affect a specific disease.
FDA regulation of mobile medical applications focuses solely on apps that affect a specific disease.
Signup and view all the answers
The FDA limits regulatory reach based on the intended use for mobile medical apps, and only a few mHealth apps have FDA approval.
The FDA limits regulatory reach based on the intended use for mobile medical apps, and only a few mHealth apps have FDA approval.
Signup and view all the answers
Benefits of ergonomics include reducing costs, improving productivity, improving product quality, and increasing employee engagement, but not creating a better company safety culture.
Benefits of ergonomics include reducing costs, improving productivity, improving product quality, and increasing employee engagement, but not creating a better company safety culture.
Signup and view all the answers
Keyboard use tips include using a light touch on the keys, keeping your wrists in neutral., keeping your elbows at a 90° angle, letting your shoulders relax, and using wrist rests while typing.
Keyboard use tips include using a light touch on the keys, keeping your wrists in neutral., keeping your elbows at a 90° angle, letting your shoulders relax, and using wrist rests while typing.
Signup and view all the answers
Tips to reduce the risk of computer eye strain include facing your computer screen directly, placing the center of the screen at a 15 degree down angle from your eyes, and adjusting the position of your display to prevent reflections on your screen.
Tips to reduce the risk of computer eye strain include facing your computer screen directly, placing the center of the screen at a 15 degree down angle from your eyes, and adjusting the position of your display to prevent reflections on your screen.
Signup and view all the answers
Tips to reduce the risk of computer eye strain include placing the monitor as close to your screen as possible while maintaining the ability to read and taking a 20 second break every 20 minutes and looking at something at least 20 feet away.
Tips to reduce the risk of computer eye strain include placing the monitor as close to your screen as possible while maintaining the ability to read and taking a 20 second break every 20 minutes and looking at something at least 20 feet away.
Signup and view all the answers
Study Notes
Healthcare Information System (HIS)
- A healthcare information system (HIS) manages, catalogs, maintains, transmits, and compares significant amounts of data and information.
- HIS uses electronic medical records that are effectively stored and efficiently retrieved to guarantee secure access to a central database containing all medical data.
Change Management Theories in Nursing Informatics
- Unfreezing: The process of making it possible for people to let go of an old pattern that was counterproductive. An example is moving from paper-based to electronic documentation.
- Moving stage: The plan change is implemented, and change target groups are convinced that the new way is better than the old. This involves changing thoughts, feelings, behaviors, or all three.
- Refreezing: Establishing the change as a new habit or standard operating procedure. Rewards, support, and champion leadership are important during this stage.
Rogers' Diffusion of Innovation
- People are categorized into five groups based on their response to change and how innovations are accepted:
- Innovators: First to use the innovation (2.5% of the population). Risk-takers.
- Early adopters: Influential, opinion leaders, and role models (13.5% of the population).
- Early majority: Adopt after a significant delay compared to innovators and early adopters, often influenced by peer pressure (34% of the population).
- Late majority: Adopt with skepticism after the majority has adopted the innovation (34% of the population).
- Laggards: Suspicious of innovation and change; most resistant (16% of the population).
Need for Health Information Management
- Promises of clinical informatics systems: Improved efficiency, better care for older adults.
- Challenges in clinical informatics: Lack of system interoperability, poor usability of health IT, failure to design health IT for human factors to prevent errors. Examples include fragmented record-keeping systems leading to duplicate chemotherapy doses, inaccessible drug dose orders for nurses, and errors in heparin infusion orders causing intracerebral hemorrhage.
HIS Modules
- A healthcare information system (HIS) has various modules: administrative, financial, client registration, payroll, human resources, quality assurance, scheduling, risk management, contract management, clinical information, monitoring, nursing information, laboratory, pharmacy, order entry, radiology, and other ancillary systems.
Use of PHI in Marketing, Fundraising, and Research
- Authorization must be given before using protected health information (PHI) in marketing.
- PHI can be used for research if it's reviewed by an institutional review board (IRB), informed consent forms are provided, and care isn't contingent on authorization for research.
Methods for Controlling Access to HIS Data
- Biometric scans: Technologies analyzing human characteristics (fingerprints, eye retinas, irises, voice, facial, and hand measurements) to authenticate users.
- Biometric devices: Consist of a reader/scanner, software, and a database storing biometric data for comparison.
- Text: Username and password access; usernames can be any chosen name, and passwords can be simple "secret words" of both letters and numbers.
- Tokens: Small devices (like key fobs) that provide a unique number each time, requiring a PIN code to authorize the user for access to the HIS and use of the system.
- Smart card: Credit card-sized devices with microchips for storing and processing large amounts of secured patient data. The card is inserted into a reader.
- Barcode: A special identification code with vertical bars of different widths for quick HIS login. The code is read by an optical scanner using a laser beam.
Security in HIS
- Confidentiality: Information accessible only by authorized personnel.
- Integrity: Preventing unauthorized changes and tracking authorized changes.
- Availability: Ensuring information is accessible when needed by authorized users.
Security Threats
- Natural disasters (earthquakes, floods).
- Inside attacks (malicious employees).
- Outside attacks (hackers, viruses).
- Equipment failure (computers, printers).
- Software failure.
- Accidental viewing by unauthorized personnel.
- Unauthorized or uncontrolled access from outside.
- Malicious damage to medical records or equipment.
- Risk of data transfer to external media.
User Impersonation or Identity Theft
- The illegal use of someone else's personal identifying information (username and password) to log into an HIS account.
- Methods for stealing an identity include searching trash, shoulder surfing, and social engineering.
Malware
- Malware (malicious software) infiltrates and damages computers without user consent. This includes viruses, worms, Trojan horses, keyloggers, and spyware.
Electronic Health Record (EHR)
- An EHR is a digital version of a patient's paper chart, offering real-time access to patient-centered records for authorized users.
- EHRs contain personal, medical, and treatment histories of patients and are used and accessed by authorized clinicians and staff across multiple healthcare organizations.
Patient Safety at the Point of Care
- Most errors stem from deficiencies in care systems.
- Reason's Swiss cheese model illustrates that errors occur when risks (risks of error) pass through gaps in protective barriers. The probability of errors is lowered by adding new barriers.
- Human sources of error include slips (taking an incorrect action when the correct one is known), rule-based errors (applying a valid rule in the wrong situation), knowledge-based errors (lack of the needed knowledge to determine the appropriate action), commission (doing something wrong), and omission (failing to do the right thing).
Documentation in Electronic Records
- Data entry must occur in standardized formats for easier reuse in the future.
- Achieving appropriate data context depends on computer systems and nursing workflows and practices.
Implications of EHR Downtime
- Downtime is the period when all or part of health IT is unavailable.
- Planned downtime is scheduled for upgrades and maintenance.
- Unplanned downtime results from system failures, power outages, or natural disasters.
- Downtime can disrupt patient care.
Digital Patient Engagement & Empowerment
- Information age led to revolutionary changes in healthcare delivery.
- Healthcare professionals (HCPs) developed new methods for patient engagement promotion, and empowerment.
- Patient engagement involves reciprocal tasks performed by patients and HCPs, to support active patient involvement in their health care.
- Patient empowerment maximizes opportunities for patients to gain control over their healthcare.
- Modern technology bridges the gap between isolated patients and HCPs (healthcare providers).
- Health literacy is the degree individuals can obtain, process, and understand basic health information, needing appropriate health decisions. Low health literacy can be a serious disadvantage for patients.
- Evaluating electronic healthcare-related information from a website perspective includes accessibility, content, marketing, and technology considerations.
- Five 'Cs': credibility, currency, content, construction, and clarity. Thorough evaluation of websites by HCPs is vital.
- Tools include wearables, personal health records (PHR), facilitating self-care, managing conditions, supporting diagnoses, and preventing diseases through virtual support groups.
mHealth Benefits (Mobile Health Applications)
- For healthcare professionals (HCPs): Better diagnostics and treatment, treatment monitoring, and instant support/advice
- For patients: Remote monitoring of parameters, access to trends over time
- For researchers: Larger, more relevant databases of patient records
mHealth Apps for Consumers
- Apps focus on fitness, wellness, health and diet tracking, exercise management. Relies on user input.
mHealth Challenges
- FDA regulation of a subset of mHealth apps; concerns about apps that could act as/affect medical devices. Few apps have FDA approval.
Benefits of Ergonomics
- Ergonomics improves costs, productivity, product quality, employee engagement, and company safety culture.
Computer and Visual Ergonomics
- For reducing computer eye strain, face the screen directly with the top of the screen at or slightly below eye level.
- Position the center of the screen at a 15-degree downward angle.
- Position the monitor to minimize reflections.
- Maintain a minimum distance of 20 inches.
- Take 20-second breaks every 20 minutes and look at something 20 feet away. Use a document holder.
Telehealth, Telemedicine, & Tele-nursing
- Telehealth: Utilizing technological communication systems for assessing and managing patients to expand the provision of healthcare services. The goal is to provide healthcare to areas that are in need of those services.
- Telemedicine: Practice of healthcare delivery, diagnosis, consultation, treatment, transfer of medical data, and education of patients using interactive audio, visual, and data communications. This includes tele-consulting among clinicians.
- Telenursing: A form of telehealth where nursing practice is delivered via telecommunications. Used to enhance patient care.
- History of Telehealth: Telecommunications era (1970s–1980s), Digital era (late 1980s), Internet era (1990s–present).
- Factors influencing the development of telehealth: Aging population needs, cost reduction, providing equitable access to isolated geographic areas, and technology development.
Components of Telehealth Applications
- Input: Devices/means to capture, process, store audio, visual or digital images, tracings, and alpha-numeric data.
- Throughput: Content transfer/exchange through telecommunications and associated software.
- Output: Methods for receiving, storing, and displaying content, like video monitors, computer files, and recorders.
Pseudonymity
- Subjects in databases are tracked over time while remaining nameless (e.g., patient X, patient W).
- Patient identifiers (names, addresses, etc.) are replaced with pseudonyms to protect privacy.
General Ethics/Fundamental Ethical Principles
- Equality and Justice: Equal treatment and no discrimination.
- Beneficence: Duty to advance the good of others. Seeking the good of society.
- Autonomy: Right to self-determination; Independence in making decisions.
Informatics Ethics
- Openness: Data collection about individuals needs transparency by informing users about the data being collected and what it will be used for.
- Security: Data is protected from unauthorized access by other parties and will be safeguarded against manipulation and any other issues.
- Access: Every person has the right to access their own electronic health records (EHR) data.
Software Engineering Ethics
- Public: Developer activities should be done in the best interests of the public regarding social impacts of software systems, disclosures of dangerous risks/defects in systems.
- Client and employer: Developer activities should be aligned in the best interest of clients and employers while balancing duties to the public; be forthright about limitations and qualifications and maintain privacy and confidentiality related to client information.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers key concepts related to Healthcare Information Systems (HIS) and Change Management Theories in Nursing Informatics. Understand the processes involved in transitioning from traditional to electronic documentation and explore Rogers' Diffusion of Innovation framework. Test your knowledge on these essential topics for effective healthcare management.