HIS FINALS: MODULE 5 Flashcards

1
Q

it covers issues on necessary actions and proper and improper
behaviors in the field of health care

A

health informatics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

these are among the popular sources of debate.

A

privacy and confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A program should undergo appropriate evaluation before use in clinical practice. It should perform efficiently at an acceptable ——

A

finacial and timeframe cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

it should be completed before proceeding to the implementation.

A

adequate training and instruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

they should be assigned to handle concerns regarding uses, licenses, and other concerns.

A

qualified health professional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

it should not replace functions such as decision making

A

software system applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

it is defined as the application of the principles and ethics in the domain of health informatics.

A

health information ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

it Guides the reasoning and decision-making of all people and organizations involved in health care.

A

general ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

it is defined as the idea of either allowing individuals to make their own decisions in response to a particular societal context or being free from external influence or control.

A

autonomy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

it must respect patient autonomy

A

EHR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Includes certain restrictions about access, content, and ownership of records

A

EHR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

it may defeat the purpose of the document because critical information may be modified or deleted without the knowledge of the health professional.

A

Too much pateint control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

it improve document quality because patients also verify their records.

A

limited patient access and control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

it is defined as do good

A

beneficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

it is defined to do no harm.

A

non-maleficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

it relates most significantly with the usage of stored data in the EHR syste in helath informatics

A

beneficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

it relates most significantly to how data is protected.

A

non-maleficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

it contain Data that can be utilized in groundbreaking biomedical and public health research.

A

deeply integrated EHR system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

it should be developed with consent features for researchers and scientists

A

new EHR systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

it may provide the best possible treatment data for their patient, which is further upholds beneficence.

A

consolidated clinical data from repositories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

it is also a breeding ground for varying threats like temporary outages or even total system failures resulting in the inability to performs necessary procedures or, at its worst, significant patient mortality

A

integrated data storgae in helath informatics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

it contain sensitive information about an individual; it deserves the highest level of data security.

A

medical records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

this put patients at risk and lead to a violation of non-maleficence

A

vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

it is an ethical behavior expected from an individual assigned to handle information as prescribed by the International Medical Informatics Association

A

Informatics Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

principle of informatics ethics: Everyone has the fundamental right to privacy

A

Principle of Information-Privacy and Disposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Principle of IE: Every individual should ensure that he or she has control over the collection, access, use, communication, manipulation, storage, linkage, and disposition of data about himself or herself.

A

Principle of Information - Privacy and Disposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

principle of IE: The control measures of particular data should be disclosed to the concerned individual in an appropriate and timely fashion.

A

Principle of Openness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Principle of IE: Legitimately collected data should be protected through all appropriate measures against access, use, modification or communication, manipulation, linkage, loss, degradation ad unauthorized destruction

A

Principle of Security

29
Q

Principle of IE: Authorized individuals should be given access to electronic health records and the right to correct the data concerning completeness, accuracy, and relevance.

A

Principle of Access

30
Q

Principle of IE: Authorized individuals should be given access to electronic health records and the right to correct the data concerning completeness, accuracy, and relevance.

A

Principle of Access

31
Q

Principle of IE: The right to privacy and control over personal data should be conditioned by the appropriate, legitimate and relevant datarequirement of a democratic society and by the equal rights of others

A

Principle of Legitimate Infringement

32
Q

Principle of IE: Any infringement of privacy rights should occur in the least intrusive manner and with the least amount of interference with the rights of the affected parties.

A

Principle of Least Intrusive Alternative

33
Q

Principle of IE: Any infringement must be justified to the concerned individuals I a timely and appropriate fashion

A

Principle of Accountability

34
Q

Ethical duties and responsibilities of software developers to the stakeholders (Society, institution and employees, and the profession).

A

Software Ethics

35
Q

it relies on the use of the software to store and process information.

A

Health Information Ethics

36
Q

It follows that the activities carried out by the developers might affect the end-users

A

Health information ethics

37
Q

They should ensure that completed activities serve the best interest of the institution and its employees

A

Software Ethics

38
Q

They should be straightforward about their limitations and qualifications

A

Software Ethics

39
Q

They must build products that meet the professional standards through testing and detailing unresolved issues

A

Software Ethics

40
Q

these are widely used in developed countries

A

EHR

41
Q

EHR’s advantages:

A

1) Improve the quality of care
2) Reduce cost
3) Enhance patient mobility
4) Reliable
5) Enable evidence-based medicine

42
Q

Who usually have concerns to teh transition from paper-ased to EHR

A

Low to Middle-Income Countries

43
Q

Low to middle-income countries that the following concerns challenge to transition from paper-based to EHR systems:

A

1) Privacy and confidentiality
2) Security and Data integrity
3) Availability

44
Q

it is a diagnostic report that includes the patient’s name, Social Security card number, and zip code

A

Protected Helath Information

45
Q

There are —– data elements identified by the Health Insurance Portability and Accountability Act (HIPAA)

A

18

46
Q

in healthcare settings, it refers to people’s right to control access to their personal information.

A

Privacy

47
Q

Feature where People have the authority to determine what information to share, with whom, and how

A

Privacy

48
Q

it protects the privacy of individually identifiable health information

A

HIPAA Privacy Rule

49
Q

it does not apply to the use or disclosure of “de-identified health information,”

A

HIPAA Privacy Rule

50
Q

it does not apply to the use or disclosure of “de-identified health information,”

A

HIPAA Privacy Rule

51
Q

It implies that the data do not contain protected health information (PHI)

A

de-identified helath information

52
Q

refers to the protection measures and tools that safeguard health information and health information systems from any unauthorized access to or modification of information, denial of service to authorized users, and provision of service to unauthorized users.

A

Security

53
Q

it encompasses measures to safeguard data and computed programs from undesired occurrences and exposures

A

Data security

54
Q

it covers safeguards associated with hardware, software, personnel, and enterprise-wide institutional policies

A

System Security

55
Q

it is either a tool to protect privacy or an act limiting disclosure of private matters.

A

Confidentiality

56
Q

The intent is to ensure that individual health information is used for the intended purpose only, and that patient consent is required for any disclosure.

A

confidentiality

57
Q

The intent is to ensure that individual health information is used for the intended purpose only, and that patient consent is required for any disclosure.

A

confidentiality

58
Q

it is Intertwined with privacy and security

A

confidentiality

59
Q

it is foundational to the development and adoption of health informatics standards to prevent disclosure of PHI

A

Clear articulation of privacy, security and confidentiality

60
Q

it is a sound framework with which to analyze an organization’s security management practices

A

National Institute of Standards and Technology (NIST) “Confidentiality, Integrity, and Availability Triad”

61
Q

it is a requirement that information and rograms are changed only in a specified and authorized manner.

A

Integrity

62
Q

It is a requirement that a system performs its intended function in an unimpared manner, free from deliberate or inadvertent unauthorized manupulation of teh system

A

System integrity

63
Q

It is a requirement that private or confidential information not be disclosed to unauthorized individuals

A

Confidentiality

64
Q

A requiremnet intended to ensure that systems work promptly and service is not denied to authorized users

A

Availability

65
Q

A requiremnet intended to ensure that systems work promptly and service is not denied to authorized users

A

Availability

66
Q

it is Implemented by management as organization-wide policies and procedures

A

Administrative

67
Q

these are Mechanisms in place to protect equipment, systems, and locations

A

Physical

68
Q

it is Automated processes protect software and database access and control

A

technical

69
Q

it may be prescribed or restricted by law

A

safeguards