LAB Flashcards
any system that captures, stores, manages or transmits information related to
the health of individuals or the activities of organisations that work within the
health sector.
Health Information Systems
incorporates things such as
district level routine information systems,
○ disease surveillance systems, and
○ also includes laboratory information systems,
○ hospital patient administration systems (PAS) and
○ human resource management information systems (HRMIS).
comprise data collected at
regular intervals at public, private, and community-level health facilities and
institution
●District Level Routine Information System statistics are
the continuous, systematic collection,
analysis and interpretation of health-related data needed for the planning,
implementation, and evaluation of public health practice.
Disease Surveillance Systems
computer software that processes,
stores and manages data from all stages of medical processes and tests
Laboratory Information Systems –
developed out of the
automation of administrative paperwork in healthcare organisations,
particularly hospitals, and are one of the core components of a hospital’s IT
infrastructure
Hospital Patient Administration Systems (PAS)
a
centralized repository of employee master data from the human resource
management group. A system that stores, processes and manages employee
data, such as names, addresses, etc.
Human Resource Management Information Systems (HRMIS) –
is an integrated effort to collect, process, report and use health
information and knowledge
Health Information Systems
a health system requires reliable health statistics that
are disaggregated by sex, age and socioeconomic characteristics
all levels
decisions informed by evidence contribute to more
efficient resource allocation
policy level
information about the quality and effectiveness of
services can contribute to better outcomes
delivery level
health information resources system
inputs
indicators, data sources, data management
processses
information products , dissemination and use
outputs
These include the legislative, regulatory and planning frameworks required for a fully functioning health
information system, and the resources that are required for such a system to be functional.
Health Information Systems Resources
A core set of indicators and related targets is the basis for a health information system plan and strategy.
Indicators need to encompass determinants of health; health system inputs, outputs and outcomes; and
health statu
Indicators
These can be divided into two main categories; (1) population-based approaches (censuses, civil
registration and population surveys) and (2) institution-based data (individual records, service records
and resource records).
Data Sources
covers all aspects of data handling from collection, storage,
quality-assurance and flow, to processing, compilation and analysis
data management
Data must be transformed into information that will become the basis
for evidence and knowledge to shape health action
Information Products
value of health information is enhanced by making it readily
accessible to decision-makers and by providing incentives for, or
otherwise facilitating, information use
Dissemination and Use
Consists of all organizations, people and actions whose
primary intent is to promote, restore or maintain health
health system
Improving health and health equity
Health system goals
oute from inputs to health outcomes
Health system goals
system building blocks of health system
service delivery, health frameworks, information, medical products, financing, leadership
overall goals of health system
improved health
responsiveness
social and financial risk protection
improved efficiency
underlying premises of PHIS
Improved health
Better measurement
Network to galvanize partners
Increase availability and use of timely, reliable health information in
countries and globally through shared agreement
goal phis
Create a harmonized framework for the Philippines’ health
information system
Strengthen country health information system
improve access to and use of health information
Objective of PHIS
Health Information System Comprehensive Approach
public health data
hospital data
health accounts
census
vital statistics
survey data
regulation data
administrative data
ACTIVITIES UNDERTAKEN OF PHIS
Establishment of Philippine Health Information Network
(PHIN)
● Customization of Health Metric Network (HMN)
assessment tool
● Central office inventory of existing ISs
● NEC started integration of Disease Surveillance System
ACTIVITIES UNDERTAKEN
Draft framework for ISs technical integration
● Development of the Knowledge Management (KM) for
Health Strategy
● KM tool kits defined and started development
● Health portal (interactive website
Philippine Health Information Network
● DOH
FNRI
● DILG
● WHO
● NSO
● NSCB
● PCHRD
● UPCM
BFAD, Drug testing
● Regulatory –
Hospital operation, Blood Bank,
Filariasis, Malaria, disease registries, surveillance
systems..
Service delivery
PRISM
Performance of Routine Information System
Management
raises the important question of
whether an information
system is appropriately designed to work
acts as a reality check for assessing
whether the organizational mechanisms are in place for
producing the desired results.
PRISM framework
influencing RHIS performance are multiple.
● Motivating the members of an organization remains a
challenge despite giving them training on data collection
registers and reporting forms
Behavioral Determinants
are often confused with behavioral determinants,
especially related to RHIS knowledge and skills.
● Technical determinants are defined as those factors that
are related to information technology or need special
know‐how, such as software development for data
processing and analysis, development of indicators,
designing data collection forms, and procedural manuals
technical determinants
reemphasizes RHIS processes and makes the
determinants an essential part of the framework
PRISM Framework
prism framework parts
inputs, process, outputs, outcomes, impact
any event or action that
could cause a loss of or damage to computer hardware,
software, data, information, or processing capability
computer security risk
Computer security risks
hackers
crackers
script kiddies
corporate spies
unethical employer
cyberextortion
cyberterrorists
Information transmitted …………..
has a higher
degree of security risk than information kept on an
organization’s premises
Web site that evaluates
your computer to check for Internet and e-mail
vulnerabilities
online security service
affects the computer negatively by altering the way the computer works
virus
copies itself repeatedly, using up resources and shuttinh down the computer network
worm
a malicious program that hides within or looks like a legitimate program
trojan horse
program that hides in a computer and allow someone from a remote location to take full control
rootkit
infected computer has
slow operating system
less memory
files being corrupted
files being deleted
screen displays unusual message or image
hardware
and/or software that
protects a network’s
resources from intrusion
firewall
analyzes all network traffic
assess system vulnerabilities
identifies any unauthorized intrusions
intrusion detection software
vulnerable computer that is set up to entice an intruder to break into it
honeypot
is the use of computer or network without permission
unauthorized access
is the use of computer or its data for illegal; or unapproved activities
unauthorized use
who can access a computer, when they can access
it, and what actions they can take
Access controls
CAPTCHA
Completely Automated Public Turing test to tell Computers and Humans Apart
any item
that you must carry to gain
access to a computer or
computer facility
possessed object
authenticates a person’s identity
by translating a personal
characteristic into a digital code
that is compared with a digital
code in a computer
biometric device
is the act of stealing computer equipment
hardware theft
act of defacing or destroying computer equipment
hardware vandalism
steals software media
intentionally erases programs
illegally copies a program
illegally registers a program
software theft
occurs when someone steals
personal or confidential information
Information theft
a process of converting readable data
into unreadable characters to prevent unauthorized
access
encryption
is the prolonged malfunction of a computer
System Failure
factors can lead to system failure
–Aging hardware
–Natural disasters
–Electrical power problems
*Noise, undervoltages, and overvoltages
–Errors in computer programs
Two ways to protect from system failures
surge protectors and
uninterruptable power supplies (UPS
Health Concerns of Computer Use
Repetitive strain injury (RSI)
–Carpal tunnel syndrome (CTS)
–Computer vision syndrome (CVS)
applied science devoted to
incorporating comfort, efficiency, and safety into the
design of items in the workplace
Ergonomics
viewing angle
20 degree
viewing distance
18 to 28 inches
elbows
90 degree
keyboard height
23 to 28 inches
adjustable chair
4 to 5 legs for stability
feet
flat on floor
occurs when the computer consumes someone’s entire social life
Computer Addiction
craves computer time
overjoy when at the computer
unable to stop computer activity
irritable when not at the computer
neglects family and friends
problems at work or school
computer addiction
guidelines that govern the use of computers and information systems
computer ethics
not all information in the web is correct
information accuracy
the rights to which creators are entitled
for their work
Intellectual property rights
written guideline that helps determine whether
a specific computer is ethical or unethical.
written guideline that helps determine whether
a specific computer is ethical or unethical.
IT CONDUCT of CODE
protects any tangible form of expression
copyright
reducing the electricity and environmental
waste while using a computer
green computing
- do not leave the computer running
overnight - recycle paper
- recycle toner cartridges
- use paperless methods of
communicate
ways to keep green computing
right of individuals and companies to deny
or restrict the collection and use of information
about them
INFORMATION PRIVACY
huge databases store data online
important to safeguard your information
INFORMATION PRIVACY
small text file that a web server stores on the computer
cookie
unsolicited email message
SPAM
send an official looking email that attempts to obtain personal and financial information
phishing
attempts to obtain personal and financial info through spoofing
pharming
WEBISITES USE COOKIES FOR:
allow for personalization
store users’ password
assist with online shopping
track how often users visit a site
target advertisement