Ch 6,7,8,9,10 Flashcards
What is the most important task that an administrator can oversee and engage in?
Data mining
These are knowledge workers who harness information and knowledge at their fingertips to facilitate the practice of their clinicians, improve patient care and advance disciplinary science
Astute informatics
CIS
Clinical information system
SDLC
System development life cycle
Rad
Rapid application development
OOSD
Object-oriented system development
DSDM
Dynamic system development method
This is a way to deliver efficient and effective information systems that fit with the strategic business plan of an organization
SDLC- systems development life cycle
This is one of the oldest methods and depicts a waterfall effect, that is the output from each previous phase flows into or becomes the initial input for the next phase
Waterfall model
Many projects are broken down into 6 phases:
Feasibility Analysis Design Implement Test Maintain
This is used to determine whether the project should be initiated and supported
Feasibility
TELOS strategy
Technological and systems, economic, legal, operational, and schedule feasibility
What does the TELOS strategy do?
Addresses the issues of technological capabilities including the expertise or infrastructure to complete the project
During this phase of a project the requirements of a system are tested out from a detailed study of the business needs of the organization.
Analysis
This phase of a project focuses on high and low level design and interface and data design.
Design
During this phase of a project the designs are brought to life through the programming code.
Implement
During this phase of a project it is broken down into 5 layers: individual programming modules, integration, volume, system as a whole, and beta testing
Test
During this phase of a project the system has been finalized from a testing phase and it must be? This could be supported through software changes.
Maintained
This approach is linear and progresses sequentially
Waterfall approach
When should the waterfall approach be used?
For simple projects when the requirements are well known and stable from the outset (most projects do not remain static)
What is RAD (rapid application development) known as?
Rapid prototyping
This provides a fast way to add functionality through prototyping and user testing and why is it used?
Rapid prototyping, because it is easier for users to examine prototypes than actual documentation
The ____ approach uses informal communication, repurposes components, and typically follows a fast paced schedule.
RAD approach (rapid application development)
This model blends the SDLC logic with object oriented modeling and programming power. It makes an effort to represent real world objects by modeling the real world entities or things.
OOSD- object oriented systems development
This allows objects to inherit characteristics or attributes from parent classes, which fosters object reuse resulting in less coding
Class hierarchy
The object oriented programming languages of ___ and ___ promote software repurposing and reuse
C+++ and java
This is a highly iterative and incremental approach with a high level of user input and involvement. It requires repetitive examination that enhances detail and improves accuracy.
DSDM- dynamic system development model
The DSDM has 3 phases
Preproject
Project life cycle
Post project
In this phase of the DSDM model, the buy in or commitment is established and funding is secured
Pre-project
In this phase of the DSDM the project life cycle begins and includes 5 steps: feasibility, business studies, functional model iteration, design and build iteration, and implementation
The second phase, project life cycle
In the 3rd phase of the DSDM model the team verifies that the system is functioning properly
Post project phase
Because the DSDM model is seen as ______, the post project phase is seen as ongoing development and any of the deliverables can be refined.
Iterative
What does MoSCoW stand for
Must have, should have, could have, would have
This principle states that 80% of a project. Comes from 20% of the system requirements, therefor the 20% of requirements must be the crucial requirements or those with the highest priority
Pareto principle
These tools promote adherence to the SDLC process since they automate several required tasks; this provides standardization and thoroughness in the total systems development method and also reduce cost, development time, while enriching the quality of the product
CASE- computer aided software engineering tools
CASE tools can be described as what?
Upper or lower
These CASE tools support the analysis and design phases, and the ___ support implementation
Upper case, lower case
This contains information about the system: models, data definitions, and references linking models together
Repository
This supports structured and object oriented design?
Visible analyst (a CASE tool)
This supports solely object oriented design?
Rational Rose (a Case tool)
What advantages do the CASE tools have?
Decreasing development time and producing more flexible systems
What downsides are there to CASE tools?
They can be difficult to tailor or customize and use with existing systems
With ____, any programmer can implement, modify, apply, reconstruct, and restructure the rich libraries of source codes available from proven, well tested products.
OOS (open source software)
FLOSS
Free/libre open source software
The ability to share information across organizations will remain paramount under the HITECH act.
Interoperability
6 important elements of health care that influence the development and implementation of information systems:
The stakes of life and death
Health care information is highly personal
Health care is highly influenced by regulation and competition
Health care is professionally driven hierarchical
Health care is multidisciplinary
Health care information systems implementation is complex
These systems collect, process, and distribute patient centered data to aid in managing and providing care
Information systems
This identifies resources, patterns, and variances in care to prevent costly complications related to chronic conditions to enhance the overall outcomes for patients with chronic illnesses
CASE management information systems
Once a trend is discovered case management systems provide ___ ____ promoting preventative care
Decision support
This is a set of care guidelines that outline the course of treatment and the recommended interventions that should be implemented to achieve optimal results
Care plan
Using a ____ plan of care, these systems can present clinicians with treatment protocols to maximize patient outcomes and support best practice
Standard
_____ care decreases the costs of care for patients with chronic illnesses and supports a better quality of life
Preventive
CASE management systems are being integrated with electronic records and the information collected by these systems is processed in a way that helps to what?
Reduce risks
Ensure quality
Decrease costs
_____ systems promote integration among health care providers and between providers and patients
Communication
Examples of communication systems:
Call lights Wireless phones Pagers Emails Instant messaging
These systems enhance administrative tasks within health care organizations and support the management of healthcare within the organization
Core business systems
These aim to provide direct patient care
Clinical information systems
There are four common core business systems:
ADT (admission, discharge, transfer)
Financial systems
Acuity systems
Scheduling systems
What systems provide the backbone structure for the other types of clinical and business systems?
ADT (admission, discharge, and transfer)
These manage the expenses and revenues for providing health care.
Financial systems
These systems monitor the range of patient types within a health care organization using specific indicators.
Acuity systems
These systems coordinate staff, services, equipment and allocation of patient beds. Frequently integrated with the other types of core business systems.
Scheduling systems
These are one of the most important systems in use today, they automate the way that orders have traditionally been initiated for patients, that is, clinicians place orders using these systems instead of creating traditional handwritten transciptions onto paper
Order entry systems
This provides decision support and automated alert functionality that was unavailable with paper based orders
Computerized physician order entry systems
These systems focus on collecting data and disseminating information related to direct care.
Patient care information systems
4 most commonly encountered systems in health care:
Clinical documentation systems
Pharmacy information systems
Laboratory information systems
Radiology information systems
What else is clinical documentation systems known as?
Clinical information systems
Clinical information systems are what?
Patient centered: meaning they contain observations, interventions, and outcomes noted by the care team
What systems were some of the first used in clinical information systems after the financial systems?
Laboratory information systems
RIS
Radiology information systems
PACS
Picture archiving and communication systems
These can nimbly cross organizational boundaries, include an enterprise wide mater patient index (MPI)
Managed care information systems
Many healthcare organizations aggregate data in a ___ ____ for the purpose of mining the data to discover new relationships and to build organizations knowledge
Data warehouse (DW)
These are structured or organized collections of data that are typically the main component of an information system
Databases
What is the most basic element of a database system?
The data
Raw facts that can consist of unorganized text, graphics, sound, or video
Data
Data that has been processed and has meaning
Information
Databases consist of ___ and ____
Fields (columns) and records (rows)
A ___ represents a table and each field within the table becomes an attribute of that entity
Entity
This diagram specifies the relationship among the entities in the data base
Entity relationship diagram
RDMS
Relational database management system that manages data u
This is the product of collaboration when sharing an understanding of information promotes learning from past experiences to make better future decisions
Knowledge exchange
Who has the most responsibility for completing a project?
Stakeholder
This is the hardware and software that defines the interface, anytime a human uses technology (type of hardware or software that enables and supports the interaction)
Human technology interface
Examples of human technology interfaces:
Bar code identification cards Cards to log into ehr's Access meds from administration system Defibrillator PAC pumps Telephones and pagers
How do human technology interfaces present information?
Texts Numbers Pictures Icons Sound
What are 3 reasons cited for mortality in children at children’s hospital in Pittsburgh after Computer based provider order entry (CPOE)?
CPOE changed the workflow for the ER (before cpoe orders written via radio link while child in transport to ER
- Entering orders took as many as ten clicks and took as long as two minutes and screens often froze
- When a team changed its work flow to accommodate CPOE, face to face contact among team members diminished
This term means when technology was not well matched to the users and the context of care.
Human technology interaction
3 axioms have evolved for developing effective human computer interactions
- Users must be an early and continuos focus during interface design
- Design process should be iterative, allowing for evaluation and correction of identical problems
- Formal evaluation should take place using rigorous experimental or quality evaluation methods
Rubin uses a term to describe the process of designing products so that users can carry out the tasks needed to achieve their goals with minimal effort and maximal efficiency, the end user is always emphasized with this process.
User-centered design
This examines how a task must be accomplished, they describe the tasks in terms of inputs needed for tasks, outputs, and any constraints on actors choices in carrying out the task
Task analysis
This starts by identifying through interviews or questionnaires, the particular task and its typicality and frequency
Cognitive task analysis
This was developed specifically for the analysis of complex, high-technology work domains, such as nuclear power plants, intensive care units, and ER’s where workers needed considerable flexibility in responding to external demands
Cognitive work analysis (CWA)
A complete CWA calls for 5 types of analysis:
Work domain Control tasks Strategies Social-organization Worker competencies
What are Norman’s principles?
Use knowledge in the world and in the head Simplify structure of tasks Make things visible Get mappings right Exploit power of constraints Design for error Standardize
Users need to be able to see how to use technology to accomplish a goal (which buttons to push), if this is accomplished the. The designers did.?
Bridged the gulf of execution
Users also need to see the effects of their actions on technology, if successful the designer has?
Bridged the gulf of evaluation
This term is used to describe how environmental facts (order of light switches or variables ina physiologic monitoring display) are accurately depicted by the information presentation.
Mapping
Clinicians have problem detection time by mapping physiologic variables onto objects that have meaningful shapes
Situational awareness
Auditory tones have been combined as ______ to represent relationships among data elements, such as relationship of systolic and diastolic blood pressure
Earcons
What is one of the highest accolades that an interface can say they have achieved?
That its transparent
When does an interface become transparent?
So easy to use users no longer think about it but only about the tasks at hand
This is a term that denotes the ease with which people can use an interface to achieve a particular goal
Usability
When are focus groups used?
At the start of the design process, can help them understand the users response to potential interface designs
This is when evaluators assess a paper mock up, working prototype, or completed interface by observing the steps users are likely to take to use the interface to accomplish typical tasks.
Cognitive walk through
This has become the most popular of what are called discount usability evaluation methods
Heuristic evaluation
What’s the objective of heuristic evaluations?
Detect problems early in the design process
Why are heuristic methods called discount?
Typically easy to do and involve fewer than ten experts and are less expensive
This is when end users evaluate a prototype in the actual work settings just before its general release
Field study
Who proposed the FITT (fit between individuals, tasks, and technology)?
Ammenwerth, iller, Mahler 2006
What does the FITT model do?
Suggests that each of these factors be considered in designing and evaluating human technology interface (fit between individuals, tasks, and technology)
What’s it called when healthcare organizations linked together to facilitate communication and operations within and outside the facility?
Network
What are the three main areas of secure network information?
Confidentiality
Availability
Integrity
This term means watching over someone’s back as that person is working, which is a major way to compromise confidentiality
Shoulder surfing
This refers to network information being accessible when needed
Availability
How do organizations protect the availability of their networks?
Accessibility policy
Acceptable use policy
3 areas of authentication:
Passwords
ID cards
Biometrics
What is the largest benefit of a computer network?
The ability to share information
What is the greatest cause of problems with security breaches?
Human error
What is the most common type of data breach?
Criminal attack
This is software used to guess network passwords
Brute force attacks
This means searching for and exploiting software vulnerabilities
Zero day attacks
This is a very small file written to the hard device of a computer whose user is surfing the internet.
Cookie
This is a threat to corporate security, it is the manipulation of a relationship based on one’s position in an organization
Social engineering
This person could be a disgruntled employee or recently fired one whose rights of access to the corporate network has not yet been removed
Malicious insider
This can either be hardware or software or a combination of both that examines all incoming messages or traffic to the network
Firewall
These prevent users from directly accessing the internet, they must first request passage from the server
Proxy servers
These are both hardware of software that allow an organization to monitor who is using the network and which files the user has accessed
Intrusion detection systems
EPHI
Electronic protected heath information
These devices are basic interface portals that do not keep secure information stored on them
Thin clients
This infiltrates a network and can collect easily accessible data
Malware
These are necessary evils that pose security risks?
Network accessibility and network availability