Clinical Informatics Board Review (Mankowitz) Flashcards
Equation for RRR
ARR / Risk in Control Group
What is process mining?
Method of workflow analysis involving review of event log of an information system to see how various tasks are carried out.
What is a value stream map and when is it used?
- AKA end-to-end system map
- Shows all inputs, throughputs and outputs of a process
- Helps identify waste
Difference between bit vs byte vs hexadecimal vs kilobyte vs megabyte
- Bit = binary digit
- Byte = 8 bits
- Hexadecimal = base 16
8 bits can be represented as 2-digit hex number - Kilobyte = 1024 bytes
- Megabyte = 1024 kilobytes
Difference between FORTRAN and BASIC
FORTRAN
- Compiled language that needs to be passed through complier to convert source code to machine code.
- ENTIRE PROGRAM needs to be complete before comiler can begin.
BASIC
- Interpreted language that is passed through an interpreter
- Each line of program can be translated
What does a control structure refer to in programming?
Linguistic mechanisms that programmers use to tell a computer what to do (e.g. if/then/else block)
What does a loop refer to in programming?
Executes code over and over until a certain condition is met (e.g. for/next loop, while loop)
Iteration = each time the loop is run
4 parts of the cycle in Spiral Model of software depvelopment
- Analysis
- Evaluation
- Development
- Planning
What is rapid application development (RAD)
- Like spiral, attempts to reduce project risk by breaking project into smaller chunks
- Adheres to strict timelines (timeboxes). If there are delays, requirements are reduced to fit the timebox.
Difference between slicing and dicing
Slicing = looking at subsection of data when ONE of the dimensions is held constant
Dicing = looking at subsection of data when >1 dimensions are held constant
What is an OLAP cube
Online analytic processing (OLAP) cube is used to gather business intelligence
2 types of firewalls
- Packet filter - inspects packet to ensure it is coming from an acceptable source but does not inspect the contents of the packet
- Stateful inspection - inspects source + content of the packet. Bidirectional so helps prevent users from disseminating PHI
What is Network Address Translation
Process by which computers in a private network are able to share a public-facing address without divulging their local address. Usually done by router, but many firewalls also incorporate this functionality.
What is tinyint in SQL?
Whole number between -127 and +129
2^8 (256) possibilities –> can be stored in 8 bites (one byte)
What is unsigned int in SQL?
Whole numbers between 0 and 4,294,967,295 –> 2^32 different possibilities –> requires 4 bytes
Terms for each component of floating point numbers
Ex) 3.5015 x 10^2
3.5015 = mantissa/significand
10 = base
2 = exponent
What is the goal and 3 stages of data mining
Goal: Look for patterns or relationships among different variables and work backward to see if causation exists
- Exploration
- Model building
- Deployment
2 ways to meet HIPAA Privacy Rule
- Expert determination method - standard met when expert deems that risk of identifying an individual is very small based on population as a whole and availability of public databases
- Safe Harbor method (MORE COMMON) - data considered de-identifid when all 18 identifiers are removed
What is A/B testing
User testing that involves prototyping 2 different interfaces for the same task or series of tasks.
Participants randomly assigned to A or B prototype and usability testing team records outcomes for each.
What is BATNA
Best Alternative To a Negotiated Agreement = fallback options when negotiating
Pruitt’s model of conflict management
Stratified by degree of assertiveness and cooperativeness
- Problem Solving (we both win)
- Yielding (I lose - you win)
- Contending (I win - you lose)
- Inaction (we both lose)
Rahim’s model of conflict management
- Integrating (we both win)
- Obliging (I lose - you win)
- Dominating (I win - you lose)
- Avoiding (we both lose)
What does satisficing refer to in decision making?
Research is conducted only until an acceptability threshold is met. Less information needed to make decision compared to maximizer.
Kotter’s 8 steps to manage change
- Create a sense of urgency
- Create a guiding coalition
- Develop a vision and strategy
- Communicate the vision
- Empower employees
- Generate short term wins
- Consolidate gains to produce more change
- Institutionalize new approaches