Data Management Flashcards
refers to the use of computers to store, access, and secure patient information.
Data Management
This is the information that is not required on a daily basis by the typical system user, but is used by management to make decisions
Data Warehouse
n effective data warehouse as has the following characteristics
Subject - oriented
Time - variant
Non- volatile
Integrated
This refers to the fact that all events or objects that are the same are linked in a traceable manner.
Subject - oriented
This is the ability to look at how information changes as a function of time.
Time - Variant
This means that once information is recorded, it can never be deleted or manipulated in a manner that could cause its loss.
Non-volatile
This refers to the fact that information from all areas of the enterprise is placed into the same database for the sake of analysis.
Integrated
There are three major parts of a data warehouse:
Infrastructure
Data
Process
(sometimes referred to as the technology perspective) refers to the hardware and software used in the system.
The infrastructure
are diagram representations of the structures that send and store information and how they relate to one another.
Data
defined by how information gets from one place to another or how it is dealt with.
Process
Most data warehouses use ______________ of normalization.
Codd Rules
breaks data down into a table in order to show the relationships between the various parts.
Codd Rules
breaks data down into numerical facts and reference information.
Dimensional
easy to use and operate quickly
Dimensionally based databases
saves information in the “third normal form” and groups the information into tables according to their subjects.
Normalized
These databases can be slow and difficult to use.
Normalized based databases
There are four types of data warehouses that have evolved
Offline operation databases
Offline data warehouse
Real-time data warehouse
Integrated data warehouse
are simply copies of the operation system saved to a separate location or partition on the server.
Offline operation databases
creates a regular copy of the operational system used in a report-orientated system.
Offline data warehouse
Similar to offline data warehouses except that they are constantly updated.
Real-time data warehouse
updated with information, processes it, and returns the results to the central system for use in daily activities.
integrated data warehouse
There are basically four types of health care–related data
Medical/clinical data
Knowledge- based data
Comparison data
Aggregate data
This information is patient-specific and includes information regarding the patient, diagnosis, treatment, laboratory findings, consultations, care plans, physician orders, informed consent, and advance directives.
Medical/clinical data
This information includes methods to ensure that staff is provided training, support, research, library services or other access to information, and good practice guidelines.
Knowledge- based data
These data may relate to internal comparisons or external comparisons to benchmarks or best-practice guidelines.
Comparison data
These data include pharmacy transactions, required reports, demographic information, financial information, hazard and safety practices, and any data not included in the clinical record.
Aggregate Data
used for analysis
Qualitative and Quantitative data
Data are described verbally or graphically, and the results are subjective, depending on observers to provide information.
Qualitative Data
Data are described in terms of numbers within a statistical format.
Quantitative data
This information gathering is done after the design of data collection is outlined, usually in later stages.
Quantitative data
Original data are collected for a particular purpose.
Primary data
Data were originally collected for another purpose.
Secondary data
There are several common methods that preserve data integrity
Staff education
system checks
data verification
minimization of fraudulent information
assigned to data that an organization collects.
Attributes
two important pieces of information that must be assigned to attributes
Name and Domain
usually used to represent the count of something, are those that have a specific value and cannot be further quantified.
Discrete data
One of the first steps to ensuring adequate data is to
do a requirement analysis
describes how information is accumulated, stored, accessed, and linked within the information system. In designing the system, it is important to know how it will be used.
A physical database design
There are three factors to consider in a physical database design
Queries
updates
performance
essential so as not to inflate a database
Eliminating Redundancy
is the procedure used to eliminate redundancy and problems and to ensure that information is available from the database through querying.
Eliminating redundancy
The earliest type, are organized in a tree or parent–child formation with one piece of information connected to many (one-to-many), but in descending order only (not many-to-one).
Hierarchical databases
are appropriate only for simple structures (e.g., lists of e-mail addresses or telephone numbers) and have limited use in health care.
Hierarchical databases
Help people make judgments.
Decision Support Systems
Take all available data for a problem, generate results, implement the results in a simulation, and choose the optimum solution.
Decision Support Systems
Often used to make staffing decisions
Decision Support Systems
Similar to decision support systems, but using logic derived from specific task experts.
Expert systems
Operate using “If, then” type logic drawing from a database of knowledge in the problem area.
Expert systems
Work using a model of human reasoning processes.
Artificial intelligence systems
Use the rules of inference such as “If A>B and B>C, then A must be greater than C.”
Artificial intelligence systems
Attempt to find new ways to represent abstract ideas.
Artificial intelligence systems
Actually learn by trial and error.
Artificial intelligence systems
Understand and process information in human language rather than programming language.
Natural Language Systems
Enable speech and handwriting recognition.
Natural Language Systems
Strategic information technology (IT) planning that relates the capabilities of the organization to its customers and competitors.
Management Information Systems (MIS)
Stores data for easy retrieval. As an example, MEDLINE is used to access journal articles and health information.
Bibliographic Retrieval Systems
May also be called dedicated or turnkey systems. Used only for a specific function that does not require any connectivity.
Stand alone systems
Process specific transactions and produce reports that have the same format every time.
Transaction Systems
An input of electric impulses is converted to an output of waveforms. Examples: ECG, EEG, and the non-stress test.
Physiologic Monitoring systems
an automatic process to record actions and events occurring in an information system in system log files, which contain a record of events for various components of the information system.
Logging
allows the user to collect data, analyze, save, output results, and control the type of information collected, essentially as a method of computerized research.
Data Loggers
stand-alone devices that are used to acquire data, such as temperature and humidity in a server room.
Data loggers
The following are three main threats for information stored in computerized systems
Quality
Availability
Confidentiality
Information _______ may be compromised by the alteration of files.
Quality
This tends to happen during system upgrades or the introduction of unwanted programs
Quality
may be threatened by power outages, damage to the system (or its parts), disaster or sabotage, or the system becoming overloaded.
Availability
may be compromised by personnel disobeying company policies (or procedures) or unauthorized individuals viewing printed records or computer screens.
Confidentiality
there are a number of hazards that should be taken into account and managed
Environmental and Physical safety
Control
Planning
Time restraints (Archiving)
Transfer
Maintenance
This includes exposure to dust, extreme temperature, shock (e.g., earthquakes), humidity, water, and fire.
Environmental and Physical Safety
This entails the physical and electronic access control mechanisms designed to protect the records from being erased, stolen, or altered.
Control
This is the process of creating backup copies of records and storing them in a separate location for safekeeping.
Planning
This process determines how long information must be retained according to state and federal regulations and sets up a system for destruction of obsolete records.
Time restraints (Archiving)
These are plans to salvage records before they become unusable due to either degradation or changes in computer hardware.
Transfer
This includes upkeep of the system that writes and reads the data.
Maintenance
are designed to make sure that the organization’s operations can continue to function (at some level) throughout a disaster and return to full function once the disaster is over.
Disaster Recovery Plans
Should be an ongoing process covering every conceivable scenario and involving all of the organization.
Disaster Recovery Plans
outlines ways that the organization can perform disaster recovery drills before they are actually needed.
A test plan
Lists all personnel who can be called in, alternate locations of data, and places that can be used to conduct business if the primary facility becomes unusable.
A backup plan
created to guide the organization during and right after a disaster.
An emergency plan
Some common areas in a disaster recovery plan that are sometimes found to be deficient include
Documentation
Equipment
Data Storage
Keeping the plan updated
are electronic records that are generated by health care providers and the individual patient, allowing the patient to access, record, and share health
information.
Personal health records (PHRs)
Patient-maintained paper records can include booklets, files, notebooks, medication records, and handwritten notations.
Paper/personal files
stand-alone and not connected to a particular system or electronic health record (HER)
Non-tethered PHRs
These pose more security risks than tethered PHRs and require more input from the individual to maintain accurate records.
Non-tethered PHRs
Data are tied to a particular system and EHR and are often internet-based.
Tethered PHRs
A secure patient portal is provided so the individual can access all or parts of the records, including lists of medications and laboratory results.
Tethered PHRs
Data are derived from multiple sources in a network rather than one system. This allows for more flexibility.
Net- worked PHRs
Basic principles for networked personal health records (PHRs)include
Transparency
Purpose
Consent limitations
control
quality
privacy and security
oversight
troubleshooting
presents an opportunity for patient use, allowing patients to participate in their own health care in a number of ways:
Personal Health record (PHR)