Patient Safety/Data/Ethics Flashcards

1
Q

What are common data communication protocols in healthcare?

A

DICOM, HL7, TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What dose DICOM stand for?

A

digital imaging and communication in medicine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How are data organized in DICOM?

A

DICOM groups information into structures called datasets. Each dataset consists of a group of data elements.
Each data element consists of a tag (what is it), a value representation (format, e.g., string, double), a value length (e.g., how many bits), and the value itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is HL7?

A

Health Level 7 - international standards for transfer of clinical and administrative data between software applications used by various providers. HL7 primarily used to pull patient demographic data from patient information system (e.g., EPIC), to the Radiation Oncology Information System (ROIS) (e.g., MOSAIQ/ARIA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is TCP/IP?

A

Transmission control protocol/internet protocol.
used to interconnect network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 4 layers of abstraction in the TCP/IP system?

A

1) Physical (ethernet) 2) Network (IP) 3) Transport (IP) 4) Application (DICOM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does the TCP/IP establish a connection between client and server?

A

3-way handshake:
1) client requests a connection to server - SYN packet
2) server acknowledges receipt SYN-ACK packet
3) client responds to validate the connection - ACK packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are safety mechanisms to verify data are accurately transferred between systems after initial validation and commissioning?

A

1) transaction logging on both sender and receiver side
2) mechanism to compare sender and receiver logs
3) mechanism to verify uptime
4) end-to-end testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 5 types of DICOM-RT files?

A

image (CT)
RT structure
RT plan
RT dose
treatment record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Draw the DICOM-RT diagram thing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some key points of the 2019 Intersociety Conference Statement of Professionalism?

A

1) All members feel valued and respected
2) foster collaborative and inclusive culture
3) non-discrimination or harassment
4) freedom from harassment, qualified freedom of speech
5) advocate for those who cannot advocate for themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some important principles for a medical code of professional behavior/ethics?

A
  1. beneficence (uphold patient’s best interests)
  2. provide the best quality of care possible
  3. protect safety, privacy, and confidentiality of patients and research participants
  4. act with integrity
  5. strive to be impartial and be transparent about conflicts of interest
  6. be open, collegial, and respectful to other medical professionals
  7. always be learning (striving to improve)
  8. always operate within the limits of your knowledge, skills, and available resources
  9. adhere to legal and regulatory requirements
  10. be just and fair in the allocation of scarce medical resources
  11. be professionally responsible for your actions (or inactions)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a logic gate?

A

a physical or idealized device that does boolean/logical operations on single or multiple binary inputs to produce a single binary output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 5 logic gates?

A

And - if both/all inputs are 1, output is 1
Or - if one of all inputs is 1, output is 1
Nand - opposite of and - 0 if all inputs are 1 but 1 otherwise
Nor - opposite of or (0 if any of inputs is 1, 1 otherwise)
Xor - this or that but not both
xnor - either both 0 or both 1, but nothing in between

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How are logic gates created in the real world?

A

diodes or transistors acting as switches. Most in modern times are MOSFETs (metal oxide semiconductor field effect transistors)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does FLOPS stand for?

A

Floating Point Operations Per Second - measure of computing speed

17
Q

What are floating point operations?

A

floating point operations are mathematical functions that use approximations of real numbers, similar to scientific notation. The approximation consists of the significant (the number), a base, and an exponent (eg., x10^9).

floating point numbers require less memory than the full number for very small and very large numbers, and so floating point operations are faster than the full number algebra, but they are approximations so the introduce uncertainty into the operation too.

18
Q

What are the requirements for being listed as a co-author on a paper?

A

1) substantial contributions to conception, design, data collection, analysis, or interpretation
2) drafting the work or revising it critically for publication
3) final approval of the version to be published
4) agreement to be accountable for all aspects of the work

19
Q

What are the 3 components of FMEA?

A

Occurrence (how likely is it to happen), severity (how bad is it if it does happen) and detectability (how likely is it to be detected if it does happen)

20
Q

What are the 3 most common failure modes in IMRT delivery?

A

1) incorrect interpretation of tumor or normal tissue (from imaging)
2) contouring error (wrong organ/site/expansion)
3) linac hardware failure

21
Q

What is PACS?

A

Picture Archiving and Communication System

22
Q

What does HIPAA require data be protected against?

A

unintentional access (password protected/encrypted) and unintentional destruction (off-site backup, like iron mountain)

23
Q

What type of information is protected under HIPAA?

A

any information that is uniquely identifiable (name, address, phone number, SS#, etc.)