Ch 6,7,8,9,10 Flashcards

1
Q

What is the most important task that an administrator can oversee and engage in?

A

Data mining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

These are knowledge workers who harness information and knowledge at their fingertips to facilitate the practice of their clinicians, improve patient care and advance disciplinary science

A

Astute informatics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIS

A

Clinical information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SDLC

A

System development life cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Rad

A

Rapid application development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

OOSD

A

Object-oriented system development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DSDM

A

Dynamic system development method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This is a way to deliver efficient and effective information systems that fit with the strategic business plan of an organization

A

SDLC- systems development life cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is one of the oldest methods and depicts a waterfall effect, that is the output from each previous phase flows into or becomes the initial input for the next phase

A

Waterfall model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Many projects are broken down into 6 phases:

A
Feasibility
Analysis
Design
Implement
Test
Maintain
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This is used to determine whether the project should be initiated and supported

A

Feasibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TELOS strategy

A

Technological and systems, economic, legal, operational, and schedule feasibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the TELOS strategy do?

A

Addresses the issues of technological capabilities including the expertise or infrastructure to complete the project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

During this phase of a project the requirements of a system are tested out from a detailed study of the business needs of the organization.

A

Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This phase of a project focuses on high and low level design and interface and data design.

A

Design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

During this phase of a project the designs are brought to life through the programming code.

A

Implement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

During this phase of a project it is broken down into 5 layers: individual programming modules, integration, volume, system as a whole, and beta testing

A

Test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

During this phase of a project the system has been finalized from a testing phase and it must be? This could be supported through software changes.

A

Maintained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This approach is linear and progresses sequentially

A

Waterfall approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When should the waterfall approach be used?

A

For simple projects when the requirements are well known and stable from the outset (most projects do not remain static)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is RAD (rapid application development) known as?

A

Rapid prototyping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

This provides a fast way to add functionality through prototyping and user testing and why is it used?

A

Rapid prototyping, because it is easier for users to examine prototypes than actual documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The ____ approach uses informal communication, repurposes components, and typically follows a fast paced schedule.

A

RAD approach (rapid application development)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

This model blends the SDLC logic with object oriented modeling and programming power. It makes an effort to represent real world objects by modeling the real world entities or things.

A

OOSD- object oriented systems development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

This allows objects to inherit characteristics or attributes from parent classes, which fosters object reuse resulting in less coding

A

Class hierarchy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The object oriented programming languages of ___ and ___ promote software repurposing and reuse

A

C+++ and java

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

This is a highly iterative and incremental approach with a high level of user input and involvement. It requires repetitive examination that enhances detail and improves accuracy.

A

DSDM- dynamic system development model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The DSDM has 3 phases

A

Preproject
Project life cycle
Post project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

In this phase of the DSDM model, the buy in or commitment is established and funding is secured

A

Pre-project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

In this phase of the DSDM the project life cycle begins and includes 5 steps: feasibility, business studies, functional model iteration, design and build iteration, and implementation

A

The second phase, project life cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

In the 3rd phase of the DSDM model the team verifies that the system is functioning properly

A

Post project phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Because the DSDM model is seen as ______, the post project phase is seen as ongoing development and any of the deliverables can be refined.

A

Iterative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What does MoSCoW stand for

A

Must have, should have, could have, would have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

This principle states that 80% of a project. Comes from 20% of the system requirements, therefor the 20% of requirements must be the crucial requirements or those with the highest priority

A

Pareto principle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

These tools promote adherence to the SDLC process since they automate several required tasks; this provides standardization and thoroughness in the total systems development method and also reduce cost, development time, while enriching the quality of the product

A

CASE- computer aided software engineering tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

CASE tools can be described as what?

A

Upper or lower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

These CASE tools support the analysis and design phases, and the ___ support implementation

A

Upper case, lower case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

This contains information about the system: models, data definitions, and references linking models together

A

Repository

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

This supports structured and object oriented design?

A

Visible analyst (a CASE tool)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

This supports solely object oriented design?

A

Rational Rose (a Case tool)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What advantages do the CASE tools have?

A

Decreasing development time and producing more flexible systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What downsides are there to CASE tools?

A

They can be difficult to tailor or customize and use with existing systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

With ____, any programmer can implement, modify, apply, reconstruct, and restructure the rich libraries of source codes available from proven, well tested products.

A

OOS (open source software)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

FLOSS

A

Free/libre open source software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

The ability to share information across organizations will remain paramount under the HITECH act.

A

Interoperability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

6 important elements of health care that influence the development and implementation of information systems:

A

The stakes of life and death
Health care information is highly personal
Health care is highly influenced by regulation and competition
Health care is professionally driven hierarchical
Health care is multidisciplinary
Health care information systems implementation is complex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

These systems collect, process, and distribute patient centered data to aid in managing and providing care

A

Information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

This identifies resources, patterns, and variances in care to prevent costly complications related to chronic conditions to enhance the overall outcomes for patients with chronic illnesses

A

CASE management information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Once a trend is discovered case management systems provide ___ ____ promoting preventative care

A

Decision support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

This is a set of care guidelines that outline the course of treatment and the recommended interventions that should be implemented to achieve optimal results

A

Care plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Using a ____ plan of care, these systems can present clinicians with treatment protocols to maximize patient outcomes and support best practice

A

Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

_____ care decreases the costs of care for patients with chronic illnesses and supports a better quality of life

A

Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

CASE management systems are being integrated with electronic records and the information collected by these systems is processed in a way that helps to what?

A

Reduce risks
Ensure quality
Decrease costs

54
Q

_____ systems promote integration among health care providers and between providers and patients

A

Communication

55
Q

Examples of communication systems:

A
Call lights
Wireless phones
Pagers
Emails 
Instant messaging
56
Q

These systems enhance administrative tasks within health care organizations and support the management of healthcare within the organization

A

Core business systems

57
Q

These aim to provide direct patient care

A

Clinical information systems

58
Q

There are four common core business systems:

A

ADT (admission, discharge, transfer)
Financial systems
Acuity systems
Scheduling systems

59
Q

What systems provide the backbone structure for the other types of clinical and business systems?

A

ADT (admission, discharge, and transfer)

60
Q

These manage the expenses and revenues for providing health care.

A

Financial systems

61
Q

These systems monitor the range of patient types within a health care organization using specific indicators.

A

Acuity systems

62
Q

These systems coordinate staff, services, equipment and allocation of patient beds. Frequently integrated with the other types of core business systems.

A

Scheduling systems

63
Q

These are one of the most important systems in use today, they automate the way that orders have traditionally been initiated for patients, that is, clinicians place orders using these systems instead of creating traditional handwritten transciptions onto paper

A

Order entry systems

64
Q

This provides decision support and automated alert functionality that was unavailable with paper based orders

A

Computerized physician order entry systems

65
Q

These systems focus on collecting data and disseminating information related to direct care.

A

Patient care information systems

66
Q

4 most commonly encountered systems in health care:

A

Clinical documentation systems
Pharmacy information systems
Laboratory information systems
Radiology information systems

67
Q

What else is clinical documentation systems known as?

A

Clinical information systems

68
Q

Clinical information systems are what?

A

Patient centered: meaning they contain observations, interventions, and outcomes noted by the care team

69
Q

What systems were some of the first used in clinical information systems after the financial systems?

A

Laboratory information systems

70
Q

RIS

A

Radiology information systems

71
Q

PACS

A

Picture archiving and communication systems

72
Q

These can nimbly cross organizational boundaries, include an enterprise wide mater patient index (MPI)

A

Managed care information systems

73
Q

Many healthcare organizations aggregate data in a ___ ____ for the purpose of mining the data to discover new relationships and to build organizations knowledge

A

Data warehouse (DW)

74
Q

These are structured or organized collections of data that are typically the main component of an information system

A

Databases

75
Q

What is the most basic element of a database system?

A

The data

76
Q

Raw facts that can consist of unorganized text, graphics, sound, or video

A

Data

77
Q

Data that has been processed and has meaning

A

Information

78
Q

Databases consist of ___ and ____

A

Fields (columns) and records (rows)

79
Q

A ___ represents a table and each field within the table becomes an attribute of that entity

A

Entity

80
Q

This diagram specifies the relationship among the entities in the data base

A

Entity relationship diagram

81
Q

RDMS

A

Relational database management system that manages data u

82
Q

This is the product of collaboration when sharing an understanding of information promotes learning from past experiences to make better future decisions

A

Knowledge exchange

83
Q

Who has the most responsibility for completing a project?

A

Stakeholder

84
Q

This is the hardware and software that defines the interface, anytime a human uses technology (type of hardware or software that enables and supports the interaction)

A

Human technology interface

85
Q

Examples of human technology interfaces:

A
Bar code identification cards
Cards to log into ehr's
Access meds from administration system
Defibrillator
PAC pumps
Telephones and pagers
86
Q

How do human technology interfaces present information?

A
Texts
Numbers
Pictures
Icons 
Sound
87
Q

What are 3 reasons cited for mortality in children at children’s hospital in Pittsburgh after Computer based provider order entry (CPOE)?

A

CPOE changed the workflow for the ER (before cpoe orders written via radio link while child in transport to ER

  1. Entering orders took as many as ten clicks and took as long as two minutes and screens often froze
  2. When a team changed its work flow to accommodate CPOE, face to face contact among team members diminished
88
Q

This term means when technology was not well matched to the users and the context of care.

A

Human technology interaction

89
Q

3 axioms have evolved for developing effective human computer interactions

A
  1. Users must be an early and continuos focus during interface design
  2. Design process should be iterative, allowing for evaluation and correction of identical problems
  3. Formal evaluation should take place using rigorous experimental or quality evaluation methods
90
Q

Rubin uses a term to describe the process of designing products so that users can carry out the tasks needed to achieve their goals with minimal effort and maximal efficiency, the end user is always emphasized with this process.

A

User-centered design

91
Q

This examines how a task must be accomplished, they describe the tasks in terms of inputs needed for tasks, outputs, and any constraints on actors choices in carrying out the task

A

Task analysis

92
Q

This starts by identifying through interviews or questionnaires, the particular task and its typicality and frequency

A

Cognitive task analysis

93
Q

This was developed specifically for the analysis of complex, high-technology work domains, such as nuclear power plants, intensive care units, and ER’s where workers needed considerable flexibility in responding to external demands

A

Cognitive work analysis (CWA)

94
Q

A complete CWA calls for 5 types of analysis:

A
Work domain
Control tasks
Strategies
Social-organization
Worker competencies
95
Q

What are Norman’s principles?

A
Use knowledge in the world and in the head
Simplify structure of tasks 
Make things visible
Get mappings right
Exploit power of constraints 
Design for error
Standardize
96
Q

Users need to be able to see how to use technology to accomplish a goal (which buttons to push), if this is accomplished the. The designers did.?

A

Bridged the gulf of execution

97
Q

Users also need to see the effects of their actions on technology, if successful the designer has?

A

Bridged the gulf of evaluation

98
Q

This term is used to describe how environmental facts (order of light switches or variables ina physiologic monitoring display) are accurately depicted by the information presentation.

A

Mapping

99
Q

Clinicians have problem detection time by mapping physiologic variables onto objects that have meaningful shapes

A

Situational awareness

100
Q

Auditory tones have been combined as ______ to represent relationships among data elements, such as relationship of systolic and diastolic blood pressure

A

Earcons

101
Q

What is one of the highest accolades that an interface can say they have achieved?

A

That its transparent

102
Q

When does an interface become transparent?

A

So easy to use users no longer think about it but only about the tasks at hand

103
Q

This is a term that denotes the ease with which people can use an interface to achieve a particular goal

A

Usability

104
Q

When are focus groups used?

A

At the start of the design process, can help them understand the users response to potential interface designs

105
Q

This is when evaluators assess a paper mock up, working prototype, or completed interface by observing the steps users are likely to take to use the interface to accomplish typical tasks.

A

Cognitive walk through

106
Q

This has become the most popular of what are called discount usability evaluation methods

A

Heuristic evaluation

107
Q

What’s the objective of heuristic evaluations?

A

Detect problems early in the design process

108
Q

Why are heuristic methods called discount?

A

Typically easy to do and involve fewer than ten experts and are less expensive

109
Q

This is when end users evaluate a prototype in the actual work settings just before its general release

A

Field study

110
Q

Who proposed the FITT (fit between individuals, tasks, and technology)?

A

Ammenwerth, iller, Mahler 2006

111
Q

What does the FITT model do?

A

Suggests that each of these factors be considered in designing and evaluating human technology interface (fit between individuals, tasks, and technology)

112
Q

What’s it called when healthcare organizations linked together to facilitate communication and operations within and outside the facility?

A

Network

113
Q

What are the three main areas of secure network information?

A

Confidentiality
Availability
Integrity

114
Q

This term means watching over someone’s back as that person is working, which is a major way to compromise confidentiality

A

Shoulder surfing

115
Q

This refers to network information being accessible when needed

A

Availability

116
Q

How do organizations protect the availability of their networks?

A

Accessibility policy

Acceptable use policy

117
Q

3 areas of authentication:

A

Passwords
ID cards
Biometrics

118
Q

What is the largest benefit of a computer network?

A

The ability to share information

119
Q

What is the greatest cause of problems with security breaches?

A

Human error

120
Q

What is the most common type of data breach?

A

Criminal attack

121
Q

This is software used to guess network passwords

A

Brute force attacks

122
Q

This means searching for and exploiting software vulnerabilities

A

Zero day attacks

123
Q

This is a very small file written to the hard device of a computer whose user is surfing the internet.

A

Cookie

124
Q

This is a threat to corporate security, it is the manipulation of a relationship based on one’s position in an organization

A

Social engineering

125
Q

This person could be a disgruntled employee or recently fired one whose rights of access to the corporate network has not yet been removed

A

Malicious insider

126
Q

This can either be hardware or software or a combination of both that examines all incoming messages or traffic to the network

A

Firewall

127
Q

These prevent users from directly accessing the internet, they must first request passage from the server

A

Proxy servers

128
Q

These are both hardware of software that allow an organization to monitor who is using the network and which files the user has accessed

A

Intrusion detection systems

129
Q

EPHI

A

Electronic protected heath information

130
Q

These devices are basic interface portals that do not keep secure information stored on them

A

Thin clients

131
Q

This infiltrates a network and can collect easily accessible data

A

Malware

132
Q

These are necessary evils that pose security risks?

A

Network accessibility and network availability