Domain 3: Enterprise Information Systems Flashcards

1
Q

Examples of technical security controls at the network level

A

Firewalls
IDPS (intrusion detection and prevention systems)
NAC (network access control)
VPN (virtual private networks)
DLP (data leakage protection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When does public media and secretary of HHS need to be notified about a breach?

A

If > 500 records are breached

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

45 CFR 164.308 (a)(1) stipulates that entities

A

Conduct or review a security risk analysis per 45 CFR 164.308 (a)(1) and implement security updates as necessary and correct identified security deficiencies as part of its risk management process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Formula for # of connection required using point-to-point interfaces?

A

N*(N-1)/2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does Hick-Hyman Law state?

A

User response time (RT) is a function of # of possible responses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Fitts Law state?

A

Time it takes to track to an object with a cursor is a function of distance traveled (D) and width of the target (W)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk of maintaining a software product is transferred from the institution to the vendor by means of a?

A

Service Level Agreement (SLA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does Application Service Provider (ASP) model refer to?

A

Business that provides computer services over the internet. Benefit of ASP model is that heavy computing is performed off-site by vendor so investment in data center is not needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Norman’s Theory of Action

A

Human Information Processing theory. Separates each mental activity cycle into seven inter-related stages

  1. Forming the target
  2. Forming the intention
  3. Specifying an action
  4. Executing the action
  5. Perceiving the state of the world
  6. Interpreting the state of the world
  7. Evaluating the outcome
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is external representations

A

Example of external cognition, which is using external elements to help us make decisions. Use of the external element must change the cognitive task in some way.

Examples: Use of pen and paper to help with complex math; use of hand-drawn sketches to assist with brainstorming; graphical visualization of lab result to understand trends.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is distributed cognition?

A

Cognitive model focused on multiple people in a “cognitive system” collaborating to accomplish a shared goal.

Examples: crew working together to operate a ship; team of healthcare providers working together to care for a patient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3 categories of cognitive theories

A
  1. Human Information Processing
  2. External Cognition
  3. Distributed Cognition
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Difference between Application Service Provider (ASP) and Software as a Service (Saas)

A

In ASP model, user is given access to virtual or physical computer

In SaaS model, user access is provided via web-based application that connects with vendor’s central database via API. Instead of running 1000 instances of app, vendor only needs to run one instance. Multitenancy is term used when multiple users share the same software instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Protected health information is to be sent from a secure system to one that is less secure. The most appropriate action to take is:

A

De-identify and re-identify using assigned codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A covered entity may assign a code or other means of record identification to allow information de-identified under this section to be re-identified by the covered entity, provided that:

A

(1) Derivation. The code or other means of record identification is not derived from or related to information about the individual and is not otherwise capable of being translated so as to identify the individual; and

(2) Security. The covered entity does not use or disclose the code or other means of record identification for any other purpose, and does not disclose the mechanism for re-identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A Limited Data Set, which is exception to the Privacy Rule requirement allows PHI to be used for:

A
  • Health care operations
  • Research
  • Public health

When data use agreement is established between entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is heuristic evaluation within the discipline of human computer interaction (HCI)?

A

Type of usability evaluation that is performed by experts and does not typically involve system users. HE compares an application or system to a small set of well-tested design principles.

18
Q

What does event, problem and incident refer to in the Information Technology Infrastructure Library (ITIL) framework for IT service management (ITSM)

A

”Event” - Change of state that has significance for the management of a configuration item (CI) or IT service. Event management is therefore the basis for operational monitoring and control.

“Problem” - underlying cause of one or more incidents. Problem management involves root cause analysis to determine and resolve the underlying causes of incidents, and proactive activities to detect and prevent future problems/incidents.

“Incident” - unplanned interruption to an IT service, or reduction in the quality of an IT service, or a failure of a CI that has not yet impacted an IT service (for example failure of one disk from a mirror set).

19
Q

What is a covered entity under HIPAA?

A
  • Health care provider
  • Health plan
  • Health care clearinghouse
20
Q

Benefits of blockchain in healthcare

A
  • Decentralized management
  • Immutable audit trail
  • Data provenance (allows legitimacy of records to be verified)
  • Robustness/availability
  • Security/privacy
21
Q

5 Limitations of blockchain

A
  • Interoperability
  • Security and privacy
  • Immutability (doesn’t auger well with “right to be forgotten”)
  • Scalability
  • Engaging patients (e.g. elderly/young)
22
Q

What is GOMS

A

Predictive Models of HCI
- Goal
- Operator
- Method
- Selection

Used to benchmark/compare efficiency of interfaces and estimate cost savings associated with increased user performance

23
Q

What are Buxton’s Three-State Model of Graphical Input

A
  • Description of the states and transitions involved in using a mouse
  1. Out of range <—-lift or put down mouse—> 1. Tracking <—-depress or release button—> 2. Dragging
24
Q

What is discount usability engineering?

A

Method of HCI evaluation that is easier/cheaper as described by Jakob Nielsen.

5+ testers form testing & inspection
- Modified think-aloud
- Heuristic evaluation
- Low fidelity prototypes

25
Q

3 steps of NIST 2012 recommended standard for testing, validation of EHR usability

A
  1. EHR application analysis
  2. EHR user interface expert review
    - 2 person heuristic review
    - Clinical SME review
  3. User Interface validation test
    - Performance measurement (TASK COMPLETION and associated metrics)
    - Post test interview
26
Q

3 layers of situational awareness

A

Level 1: Perception
Level 2: Comprehension
Level 3: Projection (of future states and events)

27
Q

What does Uninterruptible Power Supplies (UPS) do?

A
  • Provide 30 minute of backup power for data center using storage batteries
  • Batteries should be replaced every 3-5 years
28
Q

Network devices in order of increasing complexity

A

Hub < Bridge < Switch < Router

29
Q

How many notes contain high risk copying error per Hammond study

A

1 in10

30
Q

How many stages are in the HIMSS Analytics EMR Adoption Model

A

8 (Stage 0 —> Stage 7)

31
Q

Two organizations that accredit hospitals

A

Joint Commission & DNV (Det Norske Veritas)

32
Q

3 main purpose of signature per AHIMA e-HIM Workgroup

A
  1. Intent
  2. Identity
  3. Integrity
33
Q

How is IT operation and infrastructure work stratified per Information Technology Infrastructure Library (ITIL)

A

Portfolio –> Services –> Processes –> Procedures

34
Q

Who published SAFER Guides on EHR Safety and how are the 9 guides organized into 3 broad groups?

A

AHRQ & ONC

  1. Foundational Guide
  2. Infrastructure Guides
  3. Clinical Process Guides
35
Q

What are 3 categories of usability evaluation?

A
  1. Usability Testing
  2. Usability Inspection
  3. Usability Inquiry
36
Q

4 Examples of usability testing

A
  • Coaching
  • Thinking aloud
  • Eye/click tracking
  • Performance measurement
37
Q

Examples of usability inspection

A
  • Cognitive walkthrough
  • Heuristic evaluation
38
Q

Examples of usability inquiry

A
  • Field observation
  • Focus groups/interviews
  • Surveys (e.g. NASA Task Load Index)
  • Usage logs
39
Q

What is a Rootkit?

A
  • Programs that grant total control of your system to a malicious party.
  • Often, they operate at a level even closer to the machine than the operating system, making detection nearly impossible in some cases.
40
Q

What is a botnet?

A
  • Installs a program called a “bot” that can be remotely commanded to perform specific tasks, such as sending email spam, participating in denial-of-service attacks and serving up pornography.
41
Q

What is a worm?

A

Self-replicating program that can spread from one computer to another