Data Management and Health Care Technology Flashcards
Health Information Technology (HIT) Healthit.gove 2017
HIT-the application of information processing involving both computer hardware and software that deals with the storage, retrieval, sharing, and use of hc information, data, & knowledge for communication and decision making
Data management & HC technology
A. Data standards B. Data management C. Data analysis, application, and transformation D. Hardware, software and peripherals
Metadata and semantic representation
Metadata: set of data that describes and gives information about other data (author, date created, file size) Semantic representation: relates to the meaning of language or logic. It pertains to the meaning or interpretation of a work or sign a. nomenclatures b. terminologies c. destination/final stop d. interoperability
Standardized Nomenclatures
Nomenclatures are terminologies or naming conventions (especially in science) Technical standards
Standardized Terminologies
ANA Recognized: 1. Interface terminologies a. Clinical Care Classifications (CCC) b. International Classification for Nsg Prac (ICNP) c. North Am Nursing Dx Assoc-Int’l (NANDA-I) d. Nursing interventions classification sys (NIC) e. Nursing outcomes classification sys (NOC) f. Omaha system g. PeriOperative Nursing Dataset (PNDS) h. Nursing Minimum Data Set (NMDS) I. Nursing Mgmt Minimum Data Set (NMMDS) 2. Multidisciplinary Terminologies: a. ABC Codes b. SNOMED CT c. Logistical obsv ident names & codes (LOINC) 3. Administrative Terminologies a. CPT b. ICD (9 & 10) c. HCPCS
Technical Standards
Health Level 7 (HL7) Fast Healthcare Interoperability Resources (FHIR) International Organization for Standardization (ISO)
Data Communication Standards
- Am National Standards Institute (ANSI) x12 2. Am Society for Testing Materials ( ASTM31) 3. Inst of Electrical & Electronic Engineers (IEEE) a. 802.11-1997 4. Fast Healthcare Interoperability Resources (FHIR) 5. Digital Images & Communication in Medicine (DICOM) 6. Natl Council of RX Drug Programs (NCPDP) 7. Logical Obsv Ident Names & Codes (LOINC) 8. Intl Standard Org (ISO) 9. Health Level 7 (HL&)
Data Management
Database types, integration, and data warehousing a. enterprise data warehouse (EDW) Data archiving concepts and principles Backup process Downtime and disaster recovery Patient-generated data (iWatch, fitbit etc) Cerner Millenium is example of relational database
Data Analysis, Application, Transformation
- Metastructures: data, information, knowledge, wisdom 2. Querying and reporting from databases (data mining) 3. Data analytics (Big Data) 4. Data representation 5. Patient safety, quality and risk management
Data Analysis, Application, Tansformation
Querying and reporting from databases (ex: SQL, SAS) AND OR NOT
Big Data
- Large volume of data too difficult to process using standard database techniques 2. Characteristics: volume, variety, velocity, variability 3. Analysis requires Hadoop, Mongo (not SQL)
Data Representation
Selecting appropriate depiction of the data (ex: graphs, charts, images, reports) Histograms Dashboard-real-time displays
Dashboard:
Current real-time display of key metrics
Patient Safety, Quality, Risk Management (Proactive approach)
- Core measures 2. Patient satisfaction surveys 3. Root cause analysis 4. Close call events, QSEN, TQM, Six Sigma, LEAN, Value Stream Mapping-futility/wastefullness 5. Failure Mode Effect Analysis (FMEA)
Root Cause Analysis (RCA) (Retrospective approach)
Structured retrospective method to analyze adverse events ID Underlying problems that increase the likelihood of errors Uses a systems approach
Failure Mode Effect Analysis (Proactive Approach)
* A systematic proactive method to evaluate a process to identify where and how it might fail *Aimed at prevention of tragedy *Does not require previous bad experience or close call *Makes system more robust
Hardware Overview
- Legacy Systems 2. Technical Specifications 3. Devices (biometrics, monitoring, barcode scanners, dispensing cabinets, IV pumps, auto disp cabinets) 4. Storage 5. Networks 6. Platforms 7. CPU 8. Protocols
Legacy systems
In computing, a legacy system is an old method, technology, computer system, or application program, “of, relating to, or being a previous or outdated computer system,” yet still in use. Often referencing a system as “legacy” means that it paved the way for the standards that would follow it.
Hardware-Technology Specs
- Platform (i.e. 6.0) 2. Server Designation: (i.e. File Server, Background job server, Transaction server) 3. Requirements: (i.e. 2 Ghz+ dual-core processors, 64-bit, SAN attached etc)
Hardware Device Strategy
Device types appropriate clinical scenario: Input Output Storage Wireless CPU (executes machine instructions) Communicates with I/O and storage
Hardware Input Device PRS
Personal Response System (handheld device with keypad) Used for input/voting, assessment, attendance, discussion, experimentation
Hardware-Wireless Solutions
Wireless mobile transmission of ECGs Digital visual enhancement & touch screen capabilities Automatic access to historical data Used in patient monitoring, cardiology, and OB
Output Mechanisms
Monitors Printers Microfilm/Microfiche Digital Images Magnetic Media (tape, floppy disk) Optical (CD-ROM, DVD, etc) Voice
Hardware Processor
CPU- Central processing unit: hardware brains of the computer Carries out instructions of computer program Controls of I/O operation
Hardware Storage
RAM-Random access memory ROM-Read only memory Solid State, Disks, Virtual Magnetic Disk Storage (diskettes, hard disk drives) Optical Disk Storage (laser disk, CD-ROM, CD-RW, DVD) Magnetic Tape
Considerations for Hardware Choices
Cost-initial and replacement Durability Infection Control Human factors-footprint size, weight, visibility Electrical, telecom, network solutions Facility/Setting structure and support
Networks
Topology Local Area Wide Area Internet Access
Network Topologies
- Tree, 2. Star-centralized 3. Ring-like a xmas light set, if one goes down they all go down 4. Bus-all connected to one hub. If one goes down, they all go down.
Local Area Networks
Network cable Network Interface card/wireless radio Router Gateway Protocols-ethernet, token ring
Protocols
An agreed-upon format for transmitting data between two devices: a. TCP/IP-transmission control protocol/Internet protocol (ports 0-1023) b. FTP-file transfer protocol (ports 20&21): upload/download files from distant servers c. SMTP-simple mail transfer protocol (465) d. SMS-short message service e. HTTP-hypertext transmission protocol f. VOIP-voice over internet protocol
Client/Server Computing
Peet to peer architecture Acts like a server Server (Zulily)—–>Client (purchaser)
File/Server Architecture
Application server: Google docs Thin clients
Health Information Exchange (HIE)
Promote interoperability CommonWell Immunization Registry
Communication Link Types
*Twisted Pairs *Coaxial cables *Fiber optics *Microwave transmission *Satelite transmission *MODEM
Classifications of computers
*Supercomputer *Mainframe-server *Desktop *Laptop/Notebook *Tablet computer *Smart phone
Software categories
*Operating system *Applications & utilities (i.e. eClipboard, McAfee) *Programming languages & development tools (JAVA, C++, Python)
Operating system functions
*Manage the computer’s resources *Establish a user interface between the application s/w and h/w *Execute and provide services for applications software
Operating system functions
*Manage the computer’s resources *Establish a user interface between the application s/w and h/w *Execute and provide services for applications software
Various operating systems
*DOS, OS/2, UNIX (AIX, Solaris), AS-400, Mac OS X *VM or virtual machine (>1 OS on a computer) *Windows 95, 98, 2000, Vista, Windows CE, NT, XP, Vista, 7, 8, 8.1, 10 *Linux (Ubuntu-type of Linux)
Software Applications
*Commercial off the shelf vs in-house *Types of applications: a. Databases, e-mail, graphics b. Statistics, utilities, tools c. Tracking & scheduling d. Integrated packages “suite”
Languages & development tools
*Assembly, Machine, C++, JAVA, NET, Visual Basic *Levels of programming languages (low-high or generations)
Software generations
*First-machine language *Second- (2GL) assembly languages *Third (3GL) high-level language a. COBOL, FORTRAN, BASIC, Pascal, C *Fourth- (4GL) Very high-level languages a. tools, report generators b. power builder, HTML, XML Fifth (5GL)-Natual languages a. Problem-solving, knowledge-based, artificial intelligence, b. PROLOG
Communication Technologies
*. Collaborative tools (SharePoint, WebEx, Skype, Wiki, Blogs, Slack * Encryption * Wireless connectivity (Bluetooth) * Radio frequency identification (RFID) * Voice over internet protocol (VOIP) * Tokens
Social Media-changing communication
*Web-based and mobile technologies for interactive discussions based on Web2.0 *Collaborative projects, blogs-Wikipedia, twitter *Content communities-YouTube *Social networking sites-Facebook, *Blogs, picture-sharing, wall postings, email, instant messaging, music-sharing, crowdsourcing, voice over IP
Healthcare technology trends
- Devices: wearable, swallowed, implantable 2. Mobile devices, barcode scanners 3. Social media apps 4. Robots, biometrics 5. Nanotechnology 6. Telehealth 7. Clinical simulation in education 8. Genomic informatics 9. Consumer health 10. Analytics & population health 11. 3D printing 12. Virtual reality 13. Internet of things
Describe some less commonly used peripherals.
Some less commonly used peripherals include:
Light pen: A light pen can highlight information and send data to the computer by touching a specially designed monitor that recognizes the pen.
Touch screens: Touch screens allow the user to physically tap the screen with their finger or a plastic pen device in order to make choices.
Optical character recognition (OCR): OCR allows data to be read by a special device directly from the source. This technology is used in grocery store checkouts and standardized test grading. A similar form of input reader is the magnetic-ink character recognition (MICR). Banks use MICR to read the routing and account numbers of checks.
Computer enhanced imaging: Computer enhanced imaging is of particular importance to the medical field. Two examples include CAT scans (computerized axial tomography) and MRI (magnetic resonance imaging).
Discuss generating reports to identify trends and respond to quality measures: Control chart.
The control chart is similar to the run chart, but it has a mean line (the average of the data points) as well as upper and lower control limit lines, based on normal distribution. With any process, there is some normal variation (common cause or random variation) so the line values may vary; however, when the line crosses the control limits, this suggests that there is a specific cause (special cause variation) that requires investigation. The control limits are usually set at 2-3 standard deviations from the mean. Thus, the line shows the normal variations and excessive variations. The control chart can include horizontal lines, indicating each standard deviation for more precise information, dividing the graph into zones. Zone C is 1 standard deviation from the mean; zone B is 2 standard deviations from the mean; and zone A is 3 standard deviations from the mean. Positive values are above the mean line, and negative values are below. The data can be analyzed for specific trending, depending on the number of data points in each zone.
Explain the things that can go wrong with disaster recovery planning.
Many things can go wrong with a disaster recovery plan after a disaster. Unfortunately, many organizations fail to provide adequate support for operating under extreme situations. Some common areas that are sometimes found to be deficient include:
- Documentation: Critical documents should be stored in several locations (both digitally and in paper format).
- Equipment: As new equipment is purchased, it needs to be added to the plan.
- Data storage: Design the plan to allow quick recovery of critical information without needing to open an archive (or recover a database).
- Keeping the plan updated: Failing to keep the plan updated and failing to test the plan are two very common errors. Plans should be updated frequently and tested after each update
Define the term: electronic health record (EHR) and discuss its related guidelines.
The Healthcare Information and Management Systems Society (HIMSS) define the electronic health record (EHR) as a “secure, real-time, point-of-care, patient-centric information resource for clinicians.” HIMSS has also published a series of guidelines for EHR known as the HIMSS Electronic Health Record Definitional Model. According to the model, the EHR should record and manage information for both the short- and long-term. The EHR should be the healthcare professional’s main resource when taking care of patients. Evidence-based care can be planned using the EHR on both the individual and community level. Another important job of the EHR is its use in continuous quality improvement, performance anagement, risk management, utilization review, and resource-planning. The EHR aids in the billing process as well. Finally, the EHR is a boon to evidence-based research, clinical research, and public health reporting. Since it is computerized, clinicians are assured that the EHR information is up to date and relevant for patients and research protocols.
Discuss data representation: Binary code.
Data representation can be verbal (e.g., spoken/written representations), analog (e.g., television, radio, telephone, recorded), or digital (e.g., coded). Analog representation uses continuous waveform signals varying in intensity. Computerized representation of data uses codes (usually numeric), such as the binary code (base 2) to represent values. The binary code is comprised of strings of 1s and 0s with Is stored in magnetized areas of disks and 0s stored in nonmagnetized areas; thus, 1 represents “on,” and 0 represents “off.” Each representation (0 or 1) is referred to as a bit (binary digit). Data are converted into bits for digital transmission:
- 8 bits = 1 byte (can represent 256 characters).
- 1,000 b5d:es = 1 kilob)d:e.
- 1 million bytes = 1 megabyte.
- 1 billion bytes = 1 gigabyte.
- 1 trillion bytes = 1 terab5d:e.
The coding scheme is the pattern of 0s and 1s used to represent characters. For coding of English and European languages, the most common binary coding scheme is that of the American Standard Code for Information Interchange.
Describe read only memory (ROM) and random access memory (RAM).
Read only memory (ROM) and random access memory (RAM) are the two types of memory accessed in a computer. Read only memory (ROM) is a permanent type of memory that is preprogrammed and never written to (or replaced) by computer instructions. The advantage of ROM is that it cannot be changed (or erased) and will not be lost when the computer is turned off. Programming that is necessary for start up and other functions (such as those that must occur repeatedly and quickly) are generally stored in ROM.
Random access memory (RAM) is the computer’s working memory used for data storage. RAM stores the application programs that allow user controlled tasks to be carried out by the CPU. RAM may be stored on computer chips, the computer’s hard drive, floppy disks, or CD/DVDs (or any combination thereof). RAM is what most users think of when they store information on a computer.
Explain data presentation: Dashboard.
A dashboard (also called a digital dashboard), like the dashboard in a car, is an easy-to-read computer program that integrates a variety of performance measures or key indicators into one display (usually with graphs or charts) to provide an overview of an organization. It can include data regarding patient satisfaction, infection rates, financial status, or any other measurement that is important to assess performance. The dashboard provides a running picture of the status of a department or organization at any point in time and may be updated as needed—daily, weekly, or monthly. An organization-wide dashboard provides numerous benefits:
- Broad involvement of all departments
- A consistent and easy to understand visual representation of data
- Identification of negative findings or trends so that they can be corrected
- Availability of detailed reports
- Effective measurements that demonstrate the degree of efficiency
- Assistance with making informed decisions
Describe the three major parts of a data warehouse and the storage of data.
There are three major parts of a data warehouse:
- Infrastructure: The infrastructure (sometimes referred to as the technology perspective] refers to the hardware and software used in the system.
- Data: Data are diagram representations of the structures that send and store information and how they relate to one another.
- Process: Process is defined by how information gets from one place to another or how it is dealt with.
Most data warehouses use the Codd rules of normalization, which breaks data down into a table in order to show the relationships between the various parts. Two widely used designs are:
- Dimensional: The dimensional approach breaks data down into numerical facts and reference information. Dimensionally based databases are easy to use and operate quickly. However, their structures are difficult to modify.
- Normalized: The normalized approach saves information in the “third normal form” and groups the information into tables according to their subjects. These databases can be slow and difficult to use.
Describe the terms: decision support systems, expert systems, artificial intelligence systems, and natural language systems.
Healthcare facilities may utilize a number of different systems:
- Decision Support Systems
- Help people make judgments.
- Take all available data for a problem, generate results, implement the results in a simulation, and choose the optimum solution.
- Often used to make staffing decisions.
- Expert Systems
- Similar to decision support systems, but using logic derived from specific task experts.
- Operate using “If, then” type logic drawing from a database of knowledge in the problem area.
- Artificial Intelligence Systems
- Work using a model of human reasoning processes.
- Use the rules of inference such as “If A>B and B>C, then A must be greater than C.”
- Attempt to find new ways to represent abstract ideas.
- Actually learn by trial and error.
- Natural Language Systems
- Understand and process information in human language rather than programming language.
- Enable speech and handwriting recognition.
Discuss types of data: Qualitative, quantitative, primary, and secondary data.
Both qualitative and quantitative data are used for analysis, but the focus is quite different:
Qualitative data—Data are described verbally or graphically, and the results are subjective, depending on observers to provide information. Interviews may be used as a tool to gather information, and the researcher’s interpretation of data is important Gathering these data can be time-intensive and usually cannot be generalized to a large population. This information gathering is often useful at the beginning of the design process for data collection.
Quantitative data—Data are described in terms of numbers within a statistical format. This information gathering is done after the design of data collection is outlined, usually in later stages. Tools may include surveys, questionnaires, or other methods of obtaining numerical data. The researcher’s role is objective.
Primary data—Original data are collected for a particular purpose.
Secondary data—Data were originally collected for another purpose.
Discuss telecommunications: Radio-frequency identification.
Radio-frequency identification (RFID) is an automatic system for identification that employs embedded digital memory chips with unique codes to track patients, medical devices, medications, and staff. A chip can carry multiple types of data, such as expiration dates, patient’s allergies, and blood types. A chip/tag may, for example, be embedded in the identification bracelet of the patient, and all medications for the patient are tagged with the same chip. Chips have the ability to both read and write data, so they are more flexible than bar coding. The data on the chips can be read by sensors from a distance or through materials, such as clothes, although tags do not apply or read well on metal or in fluids. There are two types of RFID:
- Active: Continuous signals are transmitted between the chips and sensors.
- Passive: Signals are transmitted when in proximity to a sensor.
Thus, a passive system may be adequate for administration of medications, but an active system would be needed to track movements of staff, equipment, or patients.
Describe the three major classes of computers.
There are three major classes of computers:
- Analog: Analog computers measure specific continuous data and do not break the information down any further, They may measure temperature, pressure, heart rate, voltage, or current, The fetal monitor is one example of an analog computer used by nurses.
- Digital: Digital computers use binary code to represent datal This is the most common type of computer used at home and in businesses, Networked computers also communicate using binary code.
- Hybrid: Hybrid computers have elements of both analog and digital computersa These computers are produced and used for highly specific tasks which are often based on physics and engineering, The ECG and EEG are two Wpes of hybrid computers, They take analog inputs (brain waves in the case of the EEG) and transcribe them into binary data so that they can be studied and compared using a digital computer,
Outline the three classification systems used in nursing informatics: NANDA-I, Nursing Interventions Classification, and Nursing Outcomes Classification systems.
Outlined below are three classification systems used in nursing informatics:
-
NANDA-I (North American Diagnosis Association-International)
- There are 167 classified diagnoses defined and characterized in this system.
-
Nursing Interventions Classification (NIC)
- There are 514 treatments performed by nurses.
- System also provides links to NANDA diagnoses.
- System is categorized by 44 specialty practice areas.
-
Nursing Outcomes Classification (NOC)
- Provides expected outcomes for patients, caregivers, family members, and community members for 330 disease states.
- System includes definitions, indicators, measurement tools, and references.
Using these in designing information systems ensures that terms and conditions follow established standards that can be compared across a wide swath of healthcare organizations. Consistent information is also helpful when publishing results.
Discuss the personal health records: Patient use.
The personal health record (PHR) presents an opportunity for patient use, allowing patients to participate in their own health care in a number of ways:
- Data entry: Most PHRs allow patients to enter some types of data, although this varies. A typical data entry includes personal and family health history, use of complementary therapy, and health behaviors (e.g., diet, exercise). Some also allow entry of health data, such as blood pressure readings, daily blood sugar, and weight.
- Delegation: PHRs usually allow the patient to assign a delegate or proxy (e.g., caregiver, immediate family member) to access the PHR. In most systems, parents can access information for a child until age 13; the child may assign a parent as proxy after that age, although selected information (e.g., sexual history, treatment) may be blocked.
- Messaging: Many systems allow patients to send secure messages to health care providers, in some cases routing them through a triage team.