Lecture 2 Flashcards

You may prefer our related Brainscape-certified flashcards:
0
Q

Define Medical Information Systems

A

The sets of formal arrangements by which the facts concerning the health or health care of individual patients are stored and processed in the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Importance of data in health care practice

A

Patience encounter;

  1. Unique patients I.D
  2. Laboratory tests and imaging
  3. Results correlated with clinical data
  4. Referral system
  5. Treatments modalities
  6. Reminders and alarm
  7. Insurance processing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Trends in Computers

A
  1. Thin client computing- computers with minimal or no disk space. Loads software and data to the server.
  2. Grid computing- combination of computer resources from multiple sites doing a common task. Used for research purposes.
  3. Cloud computing- software is maintained by an external party and exchange of information happens on the internet.
  4. Smart phones- mobile device with functions almost the same approximation as with a desktop computers. Advantages, extensive integration with communication functions and portability.
  5. RAID- redundant array of inexpensive disks., allows storage of high amount of data. One drive function as a backup drive.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Enumerate Data Quality Dimension

A
  1. Accuracy
  2. Completeness
  3. Currency
  4. Volatility
  5. Timelines
  6. Consistency
  7. Accessibility
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Importance of Information Security in Biomedicine

A

“DRIC”
Disclosure of sensitive genetic information
Research dealing with genetic profile of real patients
Informed consent of gene therapy trial
Confidentiality in genetic counseling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Enumerates Security Measures

A
  1. Basic cryptography
  2. Authentication
  3. Authorization
  4. Accountability of changes of protected information
  5. Integrity of protected information
  6. Non- repudiation of protected information
  7. Confidentiality of protected information
  8. Access monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly