Ch 6,7,8,9,10 Flashcards

(132 cards)

1
Q

What is the most important task that an administrator can oversee and engage in?

A

Data mining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

These are knowledge workers who harness information and knowledge at their fingertips to facilitate the practice of their clinicians, improve patient care and advance disciplinary science

A

Astute informatics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIS

A

Clinical information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SDLC

A

System development life cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Rad

A

Rapid application development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

OOSD

A

Object-oriented system development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DSDM

A

Dynamic system development method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This is a way to deliver efficient and effective information systems that fit with the strategic business plan of an organization

A

SDLC- systems development life cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is one of the oldest methods and depicts a waterfall effect, that is the output from each previous phase flows into or becomes the initial input for the next phase

A

Waterfall model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Many projects are broken down into 6 phases:

A
Feasibility
Analysis
Design
Implement
Test
Maintain
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This is used to determine whether the project should be initiated and supported

A

Feasibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TELOS strategy

A

Technological and systems, economic, legal, operational, and schedule feasibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the TELOS strategy do?

A

Addresses the issues of technological capabilities including the expertise or infrastructure to complete the project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

During this phase of a project the requirements of a system are tested out from a detailed study of the business needs of the organization.

A

Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This phase of a project focuses on high and low level design and interface and data design.

A

Design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

During this phase of a project the designs are brought to life through the programming code.

A

Implement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

During this phase of a project it is broken down into 5 layers: individual programming modules, integration, volume, system as a whole, and beta testing

A

Test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

During this phase of a project the system has been finalized from a testing phase and it must be? This could be supported through software changes.

A

Maintained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This approach is linear and progresses sequentially

A

Waterfall approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When should the waterfall approach be used?

A

For simple projects when the requirements are well known and stable from the outset (most projects do not remain static)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is RAD (rapid application development) known as?

A

Rapid prototyping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

This provides a fast way to add functionality through prototyping and user testing and why is it used?

A

Rapid prototyping, because it is easier for users to examine prototypes than actual documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The ____ approach uses informal communication, repurposes components, and typically follows a fast paced schedule.

A

RAD approach (rapid application development)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

This model blends the SDLC logic with object oriented modeling and programming power. It makes an effort to represent real world objects by modeling the real world entities or things.

A

OOSD- object oriented systems development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
This allows objects to inherit characteristics or attributes from parent classes, which fosters object reuse resulting in less coding
Class hierarchy
26
The object oriented programming languages of ___ and ___ promote software repurposing and reuse
C+++ and java
27
This is a highly iterative and incremental approach with a high level of user input and involvement. It requires repetitive examination that enhances detail and improves accuracy.
DSDM- dynamic system development model
28
The DSDM has 3 phases
Preproject Project life cycle Post project
29
In this phase of the DSDM model, the buy in or commitment is established and funding is secured
Pre-project
30
In this phase of the DSDM the project life cycle begins and includes 5 steps: feasibility, business studies, functional model iteration, design and build iteration, and implementation
The second phase, project life cycle
31
In the 3rd phase of the DSDM model the team verifies that the system is functioning properly
Post project phase
32
Because the DSDM model is seen as ______, the post project phase is seen as ongoing development and any of the deliverables can be refined.
Iterative
33
What does MoSCoW stand for
Must have, should have, could have, would have
34
This principle states that 80% of a project. Comes from 20% of the system requirements, therefor the 20% of requirements must be the crucial requirements or those with the highest priority
Pareto principle
35
These tools promote adherence to the SDLC process since they automate several required tasks; this provides standardization and thoroughness in the total systems development method and also reduce cost, development time, while enriching the quality of the product
CASE- computer aided software engineering tools
36
CASE tools can be described as what?
Upper or lower
37
These CASE tools support the analysis and design phases, and the ___ support implementation
Upper case, lower case
38
This contains information about the system: models, data definitions, and references linking models together
Repository
39
This supports structured and object oriented design?
Visible analyst (a CASE tool)
40
This supports solely object oriented design?
Rational Rose (a Case tool)
41
What advantages do the CASE tools have?
Decreasing development time and producing more flexible systems
42
What downsides are there to CASE tools?
They can be difficult to tailor or customize and use with existing systems
43
With ____, any programmer can implement, modify, apply, reconstruct, and restructure the rich libraries of source codes available from proven, well tested products.
OOS (open source software)
44
FLOSS
Free/libre open source software
45
The ability to share information across organizations will remain paramount under the HITECH act.
Interoperability
46
6 important elements of health care that influence the development and implementation of information systems:
The stakes of life and death Health care information is highly personal Health care is highly influenced by regulation and competition Health care is professionally driven hierarchical Health care is multidisciplinary Health care information systems implementation is complex
47
These systems collect, process, and distribute patient centered data to aid in managing and providing care
Information systems
48
This identifies resources, patterns, and variances in care to prevent costly complications related to chronic conditions to enhance the overall outcomes for patients with chronic illnesses
CASE management information systems
49
Once a trend is discovered case management systems provide ___ ____ promoting preventative care
Decision support
50
This is a set of care guidelines that outline the course of treatment and the recommended interventions that should be implemented to achieve optimal results
Care plan
51
Using a ____ plan of care, these systems can present clinicians with treatment protocols to maximize patient outcomes and support best practice
Standard
52
_____ care decreases the costs of care for patients with chronic illnesses and supports a better quality of life
Preventive
53
CASE management systems are being integrated with electronic records and the information collected by these systems is processed in a way that helps to what?
Reduce risks Ensure quality Decrease costs
54
_____ systems promote integration among health care providers and between providers and patients
Communication
55
Examples of communication systems:
``` Call lights Wireless phones Pagers Emails Instant messaging ```
56
These systems enhance administrative tasks within health care organizations and support the management of healthcare within the organization
Core business systems
57
These aim to provide direct patient care
Clinical information systems
58
There are four common core business systems:
ADT (admission, discharge, transfer) Financial systems Acuity systems Scheduling systems
59
What systems provide the backbone structure for the other types of clinical and business systems?
ADT (admission, discharge, and transfer)
60
These manage the expenses and revenues for providing health care.
Financial systems
61
These systems monitor the range of patient types within a health care organization using specific indicators.
Acuity systems
62
These systems coordinate staff, services, equipment and allocation of patient beds. Frequently integrated with the other types of core business systems.
Scheduling systems
63
These are one of the most important systems in use today, they automate the way that orders have traditionally been initiated for patients, that is, clinicians place orders using these systems instead of creating traditional handwritten transciptions onto paper
Order entry systems
64
This provides decision support and automated alert functionality that was unavailable with paper based orders
Computerized physician order entry systems
65
These systems focus on collecting data and disseminating information related to direct care.
Patient care information systems
66
4 most commonly encountered systems in health care:
Clinical documentation systems Pharmacy information systems Laboratory information systems Radiology information systems
67
What else is clinical documentation systems known as?
Clinical information systems
68
Clinical information systems are what?
Patient centered: meaning they contain observations, interventions, and outcomes noted by the care team
69
What systems were some of the first used in clinical information systems after the financial systems?
Laboratory information systems
70
RIS
Radiology information systems
71
PACS
Picture archiving and communication systems
72
These can nimbly cross organizational boundaries, include an enterprise wide mater patient index (MPI)
Managed care information systems
73
Many healthcare organizations aggregate data in a ___ ____ for the purpose of mining the data to discover new relationships and to build organizations knowledge
Data warehouse (DW)
74
These are structured or organized collections of data that are typically the main component of an information system
Databases
75
What is the most basic element of a database system?
The data
76
Raw facts that can consist of unorganized text, graphics, sound, or video
Data
77
Data that has been processed and has meaning
Information
78
Databases consist of ___ and ____
Fields (columns) and records (rows)
79
A ___ represents a table and each field within the table becomes an attribute of that entity
Entity
80
This diagram specifies the relationship among the entities in the data base
Entity relationship diagram
81
RDMS
Relational database management system that manages data u
82
This is the product of collaboration when sharing an understanding of information promotes learning from past experiences to make better future decisions
Knowledge exchange
83
Who has the most responsibility for completing a project?
Stakeholder
84
This is the hardware and software that defines the interface, anytime a human uses technology (type of hardware or software that enables and supports the interaction)
Human technology interface
85
Examples of human technology interfaces:
``` Bar code identification cards Cards to log into ehr's Access meds from administration system Defibrillator PAC pumps Telephones and pagers ```
86
How do human technology interfaces present information?
``` Texts Numbers Pictures Icons Sound ```
87
What are 3 reasons cited for mortality in children at children's hospital in Pittsburgh after Computer based provider order entry (CPOE)?
CPOE changed the workflow for the ER (before cpoe orders written via radio link while child in transport to ER 2. Entering orders took as many as ten clicks and took as long as two minutes and screens often froze 3. When a team changed its work flow to accommodate CPOE, face to face contact among team members diminished
88
This term means when technology was not well matched to the users and the context of care.
Human technology interaction
89
3 axioms have evolved for developing effective human computer interactions
1. Users must be an early and continuos focus during interface design 2. Design process should be iterative, allowing for evaluation and correction of identical problems 3. Formal evaluation should take place using rigorous experimental or quality evaluation methods
90
Rubin uses a term to describe the process of designing products so that users can carry out the tasks needed to achieve their goals with minimal effort and maximal efficiency, the end user is always emphasized with this process.
User-centered design
91
This examines how a task must be accomplished, they describe the tasks in terms of inputs needed for tasks, outputs, and any constraints on actors choices in carrying out the task
Task analysis
92
This starts by identifying through interviews or questionnaires, the particular task and its typicality and frequency
Cognitive task analysis
93
This was developed specifically for the analysis of complex, high-technology work domains, such as nuclear power plants, intensive care units, and ER's where workers needed considerable flexibility in responding to external demands
Cognitive work analysis (CWA)
94
A complete CWA calls for 5 types of analysis:
``` Work domain Control tasks Strategies Social-organization Worker competencies ```
95
What are Norman's principles?
``` Use knowledge in the world and in the head Simplify structure of tasks Make things visible Get mappings right Exploit power of constraints Design for error Standardize ```
96
Users need to be able to see how to use technology to accomplish a goal (which buttons to push), if this is accomplished the. The designers did.?
Bridged the gulf of execution
97
Users also need to see the effects of their actions on technology, if successful the designer has?
Bridged the gulf of evaluation
98
This term is used to describe how environmental facts (order of light switches or variables ina physiologic monitoring display) are accurately depicted by the information presentation.
Mapping
99
Clinicians have problem detection time by mapping physiologic variables onto objects that have meaningful shapes
Situational awareness
100
Auditory tones have been combined as ______ to represent relationships among data elements, such as relationship of systolic and diastolic blood pressure
Earcons
101
What is one of the highest accolades that an interface can say they have achieved?
That its transparent
102
When does an interface become transparent?
So easy to use users no longer think about it but only about the tasks at hand
103
This is a term that denotes the ease with which people can use an interface to achieve a particular goal
Usability
104
When are focus groups used?
At the start of the design process, can help them understand the users response to potential interface designs
105
This is when evaluators assess a paper mock up, working prototype, or completed interface by observing the steps users are likely to take to use the interface to accomplish typical tasks.
Cognitive walk through
106
This has become the most popular of what are called discount usability evaluation methods
Heuristic evaluation
107
What's the objective of heuristic evaluations?
Detect problems early in the design process
108
Why are heuristic methods called discount?
Typically easy to do and involve fewer than ten experts and are less expensive
109
This is when end users evaluate a prototype in the actual work settings just before its general release
Field study
110
Who proposed the FITT (fit between individuals, tasks, and technology)?
Ammenwerth, iller, Mahler 2006
111
What does the FITT model do?
Suggests that each of these factors be considered in designing and evaluating human technology interface (fit between individuals, tasks, and technology)
112
What's it called when healthcare organizations linked together to facilitate communication and operations within and outside the facility?
Network
113
What are the three main areas of secure network information?
Confidentiality Availability Integrity
114
This term means watching over someone's back as that person is working, which is a major way to compromise confidentiality
Shoulder surfing
115
This refers to network information being accessible when needed
Availability
116
How do organizations protect the availability of their networks?
Accessibility policy | Acceptable use policy
117
3 areas of authentication:
Passwords ID cards Biometrics
118
What is the largest benefit of a computer network?
The ability to share information
119
What is the greatest cause of problems with security breaches?
Human error
120
What is the most common type of data breach?
Criminal attack
121
This is software used to guess network passwords
Brute force attacks
122
This means searching for and exploiting software vulnerabilities
Zero day attacks
123
This is a very small file written to the hard device of a computer whose user is surfing the internet.
Cookie
124
This is a threat to corporate security, it is the manipulation of a relationship based on one's position in an organization
Social engineering
125
This person could be a disgruntled employee or recently fired one whose rights of access to the corporate network has not yet been removed
Malicious insider
126
This can either be hardware or software or a combination of both that examines all incoming messages or traffic to the network
Firewall
127
These prevent users from directly accessing the internet, they must first request passage from the server
Proxy servers
128
These are both hardware of software that allow an organization to monitor who is using the network and which files the user has accessed
Intrusion detection systems
129
EPHI
Electronic protected heath information
130
These devices are basic interface portals that do not keep secure information stored on them
Thin clients
131
This infiltrates a network and can collect easily accessible data
Malware
132
These are necessary evils that pose security risks?
Network accessibility and network availability