Ethics, Privacy, and Security Flashcards

1
Q

It is the application of the principles of ethics to the domain of health informatics.

A

Health Informatics Ethics (HIE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three main aspects of health informatics?

A
  1. Healthcare
  2. Informatics
  3. Software Information System
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It involves the ethical behavior required of anyone handling data and information, as prescribed by the International Medical Informatics Association.

It covers seven principles; privacy, openness, security, access, legitimate infringement, least intrusive alternatives, and accountability.

A

Informatics Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Activities should be carried out with the best interests of the society in mind. Developers should be mindful of the social impacts of software systems.

This includes disclosing any threats or known defects in software.

A

Software Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It covers autonomy, beneficence, and non-maleficence.

A

General Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

It is defined as either allowing individuals to make their own decisions in response to a particular societal context or as an idea that no one human person does not have authority nor should have power over another human person.

A

Autonomy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

These two principles are respectively defined as “do good” and “do no harm”.

A

Beneficence and non-maleficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the seven principles that Informatics Ethics covers?

A
  1. Privacy
  2. Openness
  3. Security
  4. Access
  5. Infringement
  6. Least Intrusion
  7. Accountability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Enumeration:

Levels of security in a hospital information system

A
  • Physical safeguards
  • Administrative safeguards
  • Technical safeguards
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Enumeration:

Give key functions of the technological security tools

A
  • Availability
  • Accountability
  • Perimeter Identification
  • Controlling Access
  • Comprehensibility and Control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Enumeration:

Key steps in laboratory information flow for a hospital patient (Part 1)

A
  • Register patient
  • Order test
  • Collect sample
  • Receive sample
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Enumeration:

Key steps in laboratory information flow for a hospital patient (Part 2)

A
  • Run sample
  • Review results
  • release results
  • report results
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

it is often used interchangeably, but they are not synonymous.

A

Privacy, Confidentiality, Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or False

Privacy and confidentiality are often used interchangeably, but they are synonymous.

A

False - NOT SYNONYMOUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False

Privacy generally applies to individuals and their aversion to eavesdropping.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False

Confidentiality is more closely related to the unintended disclosure of information.

A

True

15
Q

True or False

Privacy and Confidentiality protections also benefit public health when people are not afraid to disclose personal information, they are more inclined to seek our professional assistance and it will diminish the risk of increasing untreated illnesses and spreading infectious diseases.

A

True