LAB Flashcards

1
Q

any system that captures, stores, manages or transmits information related to
the health of individuals or the activities of organisations that work within the
health sector.

A

Health Information Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

incorporates things such as

A

district level routine information systems,
○ disease surveillance systems, and
○ also includes laboratory information systems,
○ hospital patient administration systems (PAS) and
○ human resource management information systems (HRMIS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

comprise data collected at
regular intervals at public, private, and community-level health facilities and
institution

A

●District Level Routine Information System statistics are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the continuous, systematic collection,
analysis and interpretation of health-related data needed for the planning,
implementation, and evaluation of public health practice.

A

Disease Surveillance Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

computer software that processes,
stores and manages data from all stages of medical processes and tests

A

Laboratory Information Systems –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

developed out of the
automation of administrative paperwork in healthcare organisations,
particularly hospitals, and are one of the core components of a hospital’s IT
infrastructure

A

Hospital Patient Administration Systems (PAS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a
centralized repository of employee master data from the human resource
management group. A system that stores, processes and manages employee
data, such as names, addresses, etc.

A

Human Resource Management Information Systems (HRMIS) –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is an integrated effort to collect, process, report and use health
information and knowledge

A

Health Information Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a health system requires reliable health statistics that
are disaggregated by sex, age and socioeconomic characteristics

A

all levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

decisions informed by evidence contribute to more
efficient resource allocation

A

policy level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

information about the quality and effectiveness of
services can contribute to better outcomes

A

delivery level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

health information resources system

A

inputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

indicators, data sources, data management

A

processses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

information products , dissemination and use

A

outputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

These include the legislative, regulatory and planning frameworks required for a fully functioning health
information system, and the resources that are required for such a system to be functional.

A

Health Information Systems Resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A core set of indicators and related targets is the basis for a health information system plan and strategy.
Indicators need to encompass determinants of health; health system inputs, outputs and outcomes; and
health statu

A

Indicators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

These can be divided into two main categories; (1) population-based approaches (censuses, civil
registration and population surveys) and (2) institution-based data (individual records, service records
and resource records).

A

Data Sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

covers all aspects of data handling from collection, storage,
quality-assurance and flow, to processing, compilation and analysis

A

data management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Data must be transformed into information that will become the basis
for evidence and knowledge to shape health action

A

Information Products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

value of health information is enhanced by making it readily
accessible to decision-makers and by providing incentives for, or
otherwise facilitating, information use

A

Dissemination and Use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Consists of all organizations, people and actions whose
primary intent is to promote, restore or maintain health

A

health system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Improving health and health equity

A

Health system goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

oute from inputs to health outcomes

A

Health system goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

system building blocks of health system

A

service delivery, health frameworks, information, medical products, financing, leadership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
overall goals of health system
improved health responsiveness social and financial risk protection improved efficiency
26
underlying premises of PHIS
Improved health Better measurement Network to galvanize partners
27
Increase availability and use of timely, reliable health information in countries and globally through shared agreement
goal phis
28
Create a harmonized framework for the Philippines' health information system Strengthen country health information system improve access to and use of health information
Objective of PHIS
29
Health Information System Comprehensive Approach
public health data hospital data health accounts census vital statistics survey data regulation data administrative data
30
ACTIVITIES UNDERTAKEN OF PHIS
Establishment of Philippine Health Information Network (PHIN) ● Customization of Health Metric Network (HMN) assessment tool ● Central office inventory of existing ISs ● NEC started integration of Disease Surveillance System
31
ACTIVITIES UNDERTAKEN
Draft framework for ISs technical integration ● Development of the Knowledge Management (KM) for Health Strategy ● KM tool kits defined and started development ● Health portal (interactive website
32
Philippine Health Information Network
● DOH FNRI ● DILG ● WHO ● NSO ● NSCB ● PCHRD ● UPCM
33
BFAD, Drug testing
● Regulatory –
34
Hospital operation, Blood Bank, Filariasis, Malaria, disease registries, surveillance systems..
Service delivery
35
PRISM
Performance of Routine Information System Management
36
raises the important question of
whether an information system is appropriately designed to work
37
acts as a reality check for assessing whether the organizational mechanisms are in place for producing the desired results.
PRISM framework
38
influencing RHIS performance are multiple. ● Motivating the members of an organization remains a challenge despite giving them training on data collection registers and reporting forms
Behavioral Determinants
39
are often confused with behavioral determinants, especially related to RHIS knowledge and skills. ● Technical determinants are defined as those factors that are related to information technology or need special know‐how, such as software development for data processing and analysis, development of indicators, designing data collection forms, and procedural manuals
technical determinants
40
reemphasizes RHIS processes and makes the determinants an essential part of the framework
PRISM Framework
41
prism framework parts
inputs, process, outputs, outcomes, impact
42
any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
computer security risk
43
Computer security risks
hackers crackers script kiddies corporate spies unethical employer cyberextortion cyberterrorists
43
Information transmitted ..............
has a higher degree of security risk than information kept on an organization’s premises
43
Web site that evaluates your computer to check for Internet and e-mail vulnerabilities
online security service
43
affects the computer negatively by altering the way the computer works
virus
44
copies itself repeatedly, using up resources and shuttinh down the computer network
worm
45
a malicious program that hides within or looks like a legitimate program
trojan horse
46
program that hides in a computer and allow someone from a remote location to take full control
rootkit
47
infected computer has
slow operating system less memory files being corrupted files being deleted screen displays unusual message or image
48
hardware and/or software that protects a network’s resources from intrusion
firewall
49
analyzes all network traffic assess system vulnerabilities identifies any unauthorized intrusions
intrusion detection software
50
vulnerable computer that is set up to entice an intruder to break into it
honeypot
51
is the use of computer or network without permission
unauthorized access
52
is the use of computer or its data for illegal; or unapproved activities
unauthorized use
53
who can access a computer, when they can access it, and what actions they can take
Access controls
54
CAPTCHA
Completely Automated Public Turing test to tell Computers and Humans Apart
55
any item that you must carry to gain access to a computer or computer facility
possessed object
56
authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
biometric device
57
is the act of stealing computer equipment
hardware theft
58
act of defacing or destroying computer equipment
hardware vandalism
59
steals software media intentionally erases programs illegally copies a program illegally registers a program
software theft
60
occurs when someone steals personal or confidential information
Information theft
61
a process of converting readable data into unreadable characters to prevent unauthorized access
encryption
62
is the prolonged malfunction of a computer
System Failure
63
factors can lead to system failure
–Aging hardware –Natural disasters –Electrical power problems *Noise, undervoltages, and overvoltages –Errors in computer programs
64
Two ways to protect from system failures
surge protectors and uninterruptable power supplies (UPS
65
Health Concerns of Computer Use
Repetitive strain injury (RSI) –Carpal tunnel syndrome (CTS) –Computer vision syndrome (CVS)
66
applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace
Ergonomics
67
viewing angle
20 degree
68
viewing distance
18 to 28 inches
68
elbows
90 degree
69
keyboard height
23 to 28 inches
70
adjustable chair
4 to 5 legs for stability
71
feet
flat on floor
72
occurs when the computer consumes someone’s entire social life
Computer Addiction
72
 craves computer time  overjoy when at the computer  unable to stop computer activity  irritable when not at the computer  neglects family and friends  problems at work or school
computer addiction
72
guidelines that govern the use of computers and information systems
computer ethics
72
not all information in the web is correct
information accuracy
72
the rights to which creators are entitled for their work
 Intellectual property rights
72
written guideline that helps determine whether a specific computer is ethical or unethical. written guideline that helps determine whether a specific computer is ethical or unethical.
IT CONDUCT of CODE
73
protects any tangible form of expression
copyright
73
reducing the electricity and environmental waste while using a computer
green computing
74
* do not leave the computer running overnight * recycle paper * recycle toner cartridges * use paperless methods of communicate
ways to keep green computing
74
right of individuals and companies to deny or restrict the collection and use of information about them
 INFORMATION PRIVACY
75
huge databases store data online important to safeguard your information
INFORMATION PRIVACY
75
small text file that a web server stores on the computer
cookie
76
unsolicited email message
SPAM
77
send an official looking email that attempts to obtain personal and financial information
phishing
78
attempts to obtain personal and financial info through spoofing
pharming
79
WEBISITES USE COOKIES FOR:
allow for personalization store users’ password assist with online shopping track how often users visit a site target advertisement