Term
The four phases of an information system life cycle (in order) are _______. |
|
Definition
needs assessment, system selection, implementation, and maintenance |
|
|
Term
The letter or brief document that is the initial contact sent to vendors that explains the institution's plans for purchasing and installing an information system is the _____________. |
|
Definition
Request for Information (RFI) |
|
|
Term
After the initial contact with vendors and evaluation of responses, the next step in the system selection process is to prepare the formal document that describes the requirements of a potential information system. This document is called the _____________. |
|
Definition
Request for Proposal (RFP) |
|
|
Term
The phase of the life cycle that is often initiated when a deficit in the current method of manual or automated information handling is recognized as the _________. |
|
Definition
|
|
Term
The phase of the life cycle that includes the purchase of a new information system is the ________. |
|
Definition
|
|
Term
The selection and implementation of an information system occurs through a well-defined process called the __________. |
|
Definition
Life cycle of an information system |
|
|
Term
Which of the following is a company that designs, develops, sells, and supports systems? |
|
Definition
Information systems vendor |
|
|
Term
Which is NOT a quality of an effective consultant? |
|
Definition
Ability to manage results |
|
|
Term
What is the purpose of a needs assessment? |
|
Definition
To analyze the needs of the organization. |
|
|
Term
What is the starting point when performing a needs assessment? |
|
Definition
Gaining a thorough understanding of how information is currently collected and processed. |
|
|
Term
The timeline is established in what phase of the life cycle? |
|
Definition
|
|
Term
A copy of the software where programming changes are initially made during implementation is the _____. |
|
Definition
|
|
Term
__________ is software that mimics the actual information system using fictitious clients to ensure that features work as desired. |
|
Definition
|
|
Term
A system is installed during the __________ phase. |
|
Definition
|
|
Term
Who usually provides round-the clock support of an information system by phone? |
|
Definition
|
|
Term
What is the key element for successful system implementation? |
|
Definition
|
|
Term
The following hardware considerations must be addressed during the implementation phase: ______. |
|
Definition
task of workstation device, hardware location, printer options, and network requirements |
|
|
Term
The first task of an implementation committee is to ________. |
|
Definition
|
|
Term
Who determines the implementation strategy? |
|
Definition
The implementation committee |
|
|
Term
Maintenance of an information system includes all of the following except __________. |
|
Definition
|
|
Term
A level of personnel who perform similar functions is |
|
Definition
|
|
Term
Training class content should address the following area(s) _____. |
|
Definition
Training class should address both computer-related policies and human factors and basic computer literacy and workflow. |
|
|
Term
An area or areas of need to be addressed during the development and implementation of a training plan is/are |
|
Definition
|
|
Term
An advantage to using super users for system training is that __________. |
|
Definition
Super users may be available on all shifts. Super users do not leave after the initial training is complete. Super users have a specialized knowledge of both the system and clinical areas. |
|
|
Term
What is the most important factor in maintaining the proper use of an information system? |
|
Definition
|
|
Term
No training should occur on client units or with live client information except for _________. |
|
Definition
|
|
Term
Some training issues include determining responsibility for costs, staffing, trainer selection and chain of command, realism in training, confidentiality, how to handle system updates, what to do with the employee who fails to develop computer skills, and how to best meet the __________. |
|
Definition
Training needs of students |
|
|
Term
Text communications produced by the computer to warn the user that information is missing or improperly constructed are ____________. |
|
Definition
|
|
Term
A(n)__________ is a collection of simulated client data assemble and stored for instructional purposes in a database separate from live client data. |
|
Definition
|
|
Term
Which of the following is an issue related to training? |
|
Definition
Regulatory changes Failing students System updates |
|
|
Term
______ is a state of mind, a specific place, freedom from intrusion, or control over the exposure of self or of personal information. |
|
Definition
|
|
Term
The sharing of private information in a situation in which a relationship has been established for the purpose of treatment, or delivery of services, with the tacit understanding that this information will remain protected is ________. |
|
Definition
|
|
Term
Individuals who have an average, or above average, knowledge of computer technology and who dislike rules and restrictions are called ______. |
|
Definition
|
|
Term
The destruction of computer equipment or records or the disruption of normal system operation is known as ______. |
|
Definition
|
|
Term
____________ are eliberately written programs that use a host computer to spread and reproduce themselves without the knowledge of the person(s) operating the computer. |
|
Definition
|
|
Term
Which of the following is a mechanism that logs a user off the system after a specified period of inactivity on their terminal or computer? |
|
Definition
|
|
Term
The ability to use a health enterprise's information system from outside locations such as a physician's office is known as ___________. |
|
Definition
|
|
Term
Using appropriate password selection techniques, which of the following would make the best password for a nurse? |
|
Definition
Use a combination of upper- and lowercase letters, numbers, and symbols |
|
|
Term
__________ is a combination of hardware and software that forms a barrier between systems, or different parts of a single system to protect those systems from unauthorized access. |
|
Definition
|
|
Term
System security invovles protection against _________. |
|
Definition
Deliberate attacks Errors and omissions Disasters and viruses |
|
|
Term
An electronic version of the client data found in the traditional paper medical record is the __________. |
|
Definition
Electronic Medical Record (EMR) |
|
|
Term
An automated patient record designed to enhance and support patient care through the availability of complete and accurate data as well as bodies of knowledge and other aids to care providers is the _____. |
|
Definition
Computer-Based Patient Record (CPR). |
|
|
Term
The components that provide the mechanism by which patient records are created, used, stored, and retrieved is the _______. |
|
Definition
Computer-Based Patient Record System (CPRS). |
|
|
Term
Which of the following is not one of the twelve major characteristics of the CPR as identified by the Institute of Medicine? |
|
Definition
Eliminates direct entry of client data by physicians |
|
|
Term
Which of the following is a basic component of the Electronic Medical Record (EMR) |
|
Definition
Clinical messaging and email Data repository Clinical documentation |
|
|
Term
Examples of structured data are _______. |
|
Definition
Laboratory results from an automated laboratory information system |
|
|
Term
The difference between the electronic medical record (EMR) and the computerized patient record (CPR) is _______. |
|
Definition
The EMR is a component of the CPR.
The difference between the electronic medical record (EMR) and the computerized patient record (CPR) is the EMR is a component of the CPR |
|
|
Term
Which of the following statements best reflects acceptance of the International Classification for Nursing Practice (ICNP®) as a standard for nursing terminology? |
|
Definition
Present nursing classification systems map it to a very high degree. |
|
|
Term
Which of the following statements about the Personal Health Record are true? |
|
Definition
It provides more comprehensive health information than is presently found in physician records. It is a lifelong tool for managing relevant health information. It allows individuals to more effectively manage their own health |
|
|
Term
Problems associated with the Personal Health Record include: |
|
Definition
|
|
Term
Although not passed into law, which of the following (also known as the Medical Records Confidentiality Act) was a significant piece of legislation because it attempted to establish the role of health care providers in the protection of client information; fix conditions for the inspection, copying, and disclosure of protected information; and institute legal protection for health related information? |
|
Definition
|
|
Term
The accrediting body that focuses on the improvement of rehabilitative services to people with disabilities and others in need of rehabilitation is the _________. |
|
Definition
Commission on Accreditation of Rehabilitation Facilities (CARF) |
|
|
Term
Which of the following provides protection of federally managed records, such as those of Medicare and Medicaid, and mandates that federal agencies develop, implement and disclose their plans for maintaining the security of stored data? |
|
Definition
|
|
Term
The ___________ impacts all aspects of health information management including privacy and security of patient records, coding and reimbursement. |
|
Definition
Health Insurance Portability and Accountability Act (HIPAA) |
|
|
Term
Which of the following is not an objective for HIPAA? |
|
Definition
To increase the paper work associated with processing health care transaction |
|
|
Term
The mission of which of the following accrediting bodies focuses on the improvement of the quality of care delivered to the public, the develop standards of quality in conjunction with health professionals, and encourage organizations to meet or exceed these standards through the accreditation process? |
|
Definition
Joint Commission for Accreditation of Healthcare Organizations (JCAHO) |
|
|
Term
Information systems and the design of automated documentation must incorporate safeguards for ________. |
|
Definition
Information systems and the design of automated documentation must incorporate safeguards for both information privacy and quality of care. |
|
|
Term
Which of the following is renowned for focusing upon the quality and safety in the delivery of healthcare. |
|
Definition
The Agency for Healthcare Research and Quality (AHRQ) |
|
|
Term
Which of the following is the most notable piece of legislation to address health record privacy and confidentiality? |
|
Definition
The Health Insurance Portability and Accountability Act (HIPPA) |
|
|
Term
All electronic insurance claims submitted by healthcare providers must meet standards set forth by ______. |
|
Definition
The Health Insurance Portability and Accountability Act (HIPPA) |
|
|
Term
Telehealth differs from telemedicine in that _____. |
|
Definition
Telehealth encompasses telemedicine, but is a broader term that emphasizes the provision of information to health care providers and consumers. |
|
|
Term
______ is the use of telecommunications and computer technology for the delivery of nursing care. |
|
Definition
|
|
Term
___________ is used to carry out telehealth applications and implies that people at different locations have audio, and possibly video, contact. |
|
Definition
|
|
Term
A synchronous, or real-time, encounter that uses a specially equipped personal computer with telephone line hook-up to allow people to meet face-to-face and/or view papers and images simultaneously is called ______________. |
|
Definition
Desktop Videoconferencing (DTV) |
|
|
Term
Which of the following is an example of a low-tech telehealth application? |
|
Definition
A home glucose-monitoring program that uses a touch-tone phone to report glucose results. |
|
|
Term
Which of the following can be used as a tool to facilitate the delivery of telehealth services? |
|
Definition
Teleconferencing Videoconferencing |
|
|
Term
Which of the following are issues associated with the practice of telehealth and telenursing? |
|
Definition
Lack of reimbursement Patient privacy and confidentiality Licensure and liability |
|
|
Term
Which of the following might be considered to be advantages associated with the delivery of healthcare services via telehealth? |
|
Definition
Increased access to populations who otherwise would have to travel great distances for care. Decreased time and costs associated with travel. The ability for consumers who are "on the road" to receive services from their regular providers. |
|
|
Term
What factors should be considered when establishing a telehealth link? |
|
Definition
Infrastructure Cost Equipment |
|
|
Term
Which of the following strategies help to ensure successful teleconferences? |
|
Definition
Start on time Scheduling sessions in advance Providing an agenda |
|
|
Term
Four Phases of Information Systems Life Cycle |
|
Definition
Needs Assessment System Selection Implementation Maintenance |
|
|
Term
|
Definition
begins with recognition that current system not meeting needs of clinicians and/or IT Form steering committee Develop common vision Create rough-cut timeline and assign responsibilities Analyze current system Determine requirements: user needs, and technical needs Assign weights to each criterion to reflect relative importance Phase concludes with a decision to proceed or not |
|
|
Term
|
Definition
obtain as much info as practical about potential software solutions and providers Input from users, unbiased IT experts, trade groups such as HIMSS and AHIMA, conferences, and reliable sources on web RFI Analyze RFI helps eliminate non-contenders RFP/RFQ site visits concludes with contract negotiations and supplier selection |
|
|
Term
RFI (Request For Information) |
|
Definition
sent to prospective vendors/suppliers company history number of installed sites hardware and software architecture and technologies integration with other clinical and admin systems user support future software development plans |
|
|
Term
RFP/RFQ(Request for Proposal/Quotation) |
|
Definition
invitation to suppliers to submit a bid sent to short list of qualified vendors detailed system specs and priorities pricing |
|
|
Term
|
Definition
appoint project manager representatives from IT, affected units, and SW vendor characteristics: good communicator, efficient time management, results-oriented, open to new challenges, team player |
|
|
Term
|
Definition
develop detail project schedule and communicate to all determine what needs to be done, by whom, by when and in what sequence |
|
|
Term
|
Definition
actually should be done in system selection phase networking: data throughput, transfer rates, wired, wireless, servers, storage etc workstations and mobile devices |
|
|
Term
|
Definition
simulate system use with fictitious patient data ensure system works as designed discover problems before they arise in the environment |
|
|
Term
|
Definition
24-7 user support no backsliding: looking for excuses to go back before the installation extra staff on hand to ensure no issues with patient care |
|
|
Term
|
Definition
deploy full SW capabilities in one unit only debug, then rollout to all units |
|
|
Term
|
Definition
start with limited SW capabilities for all units add SW functionality incrementally |
|
|
Term
|
Definition
run new and old systems simultaneously cut over to new system when ready |
|
|
Term
|
Definition
Implement full feature set across all units |
|
|
Term
Performance Measurement (Implementation Phase) |
|
Definition
cost schedule meeting user needs |
|
|
Term
Dealing with the unexpected (Implementation Phase) |
|
Definition
changes in scope contingency funds 'crashing' the schedule: behind, add resources to keep up |
|
|
Term
How to Fail at IT Project Management |
|
Definition
Don't include stakeholders in planning the project Don't have backup plans When problems occur, shoot the messenger Never admit the project is failing Over-manage the people Ignore one or more goals of scope, quality, cost, and schedule |
|
|
Term
|
Definition
User Feedback Requests for System Changes: failures, bug fixes, functional enhancements and new capabilities Approval system to accept, reject, or defer change requests: problem severity, benefits of proposed enhancements, resources required to implement |
|
|
Term
Information systems Training |
|
Definition
Definition 19 a structured approach to providing users with the knowledge needed to use an information system in a clinical setting set specific goals for improving capabilities, knowledge, skills, competencies and task performance crucial to the ultimate success of system often badly under-budgeted |
|
|
Term
Elements of a Successful IS Training Plan |
|
Definition
training tailored to each group of users conducted in a location removed from the work area free of work-related interruptions each person has their own computer for hands-on experience instruction occurs near to the go live date appropriate selection of training methods and instructors |
|
|
Term
|
Definition
classroom style engage and create active participants group activities enhance attention and learning costly limit on # of ppl |
|
|
Term
Technology-based Training |
|
Definition
computer-based application or we-based interface self-aced flexible schedule nobody to ask Qs |
|
|
Term
|
Definition
appropriate for short sessions subject to interruptions may or may not be able to reach all the ppl who need training |
|
|
Term
blended approach training |
|
Definition
maximizes retention covers multiple learning styles |
|
|
Term
|
Definition
know technology but may not know work processes may not be skilled at training |
|
|
Term
HR Training Department Trainers |
|
Definition
have training expertise but usually not knowledgeable of work processes or IT |
|
|
Term
|
Definition
understand workflow and information system have regular job responsibilities that limit time availability |
|
|
Term
|
Definition
know technology but no unit work processes usually skilled trainers |
|
|
Term
supervisory staff as trainers |
|
Definition
may not have training expertise, workflow knowledge, or information systems background |
|
|
Term
|
Definition
protect information systems from unauthorized access, use, disclosure, disruption, modification, or destruction while keeping info readily available to those who need it Everyone's Responsibility |
|
|
Term
|
Definition
right of a pt to control what info is collected and how it's used |
|
|
Term
|
Definition
responsibility of providers to disclose info only on a need to know basis |
|
|
Term
|
Definition
authorization (signed by pt) to share info based on an understanding of how it will be used |
|
|
Term
Consequences f Poor Information Security |
|
Definition
HIPAA and CMS compliance Joint Commission accreditation Loss of consumer confidence Financial and legal liability Lost productivity |
|
|
Term
Sources of Information Security Threats |
|
Definition
Malware: viruses, spyware, key loggers, tojans, worms etc Phishing and Spoofing: bank account info, and email from a friend System penetration Unauthorized Users Sabotage Poor password Management |
|
|
Term
|
Definition
restricted access to computers, servers etc |
|
|
Term
Antivirus and spyware detection SW |
|
Definition
identify then block, quarantine, or delete malicious SW apps ideally intercept problems before they infect keep virus and spyware definitions up to date with automatic daily downloads |
|
|
Term
|
Definition
used to verify that someone is who they claim to be smart cards and passkeys biometric devices (fingerprint reader, retina scan) |
|
|
Term
|
Definition
each user assigned a unique username and password minimum 8, preferably 12 characters combination upper/lower case letters, numbers, and special characters different passwords for each SW app change them frequently ironically, some of these practices lead to less security |
|
|
Term
|
Definition
security measures to prevent unauthorized access in and out of a network combination of SW and HW evaluate data access requests based on origin, destination, and data type deny requests that don't meet allowable limits |
|
|
Term
|
Definition
restricted access policies by unit, job level etc employee hiring and termination non-employee access privileges help desk precautions |
|
|
Term
|
Definition
legal record of pt healthcare information in digital form one or more encounters within a single organization structured and unstructured data exams, diagnoses, treatments, care plans, vitals, interventions, progress notes, test results, outcomes etc... |
|
|
Term
Electronic Health Record (EHR) |
|
Definition
longitudinal record of pt health information generated by one or more encounters in any healthcare delivery setting consolidation of EMRs from all sources necessary for NHIN (National Health Information Network) |
|
|
Term
Personal Health Record (PHR) |
|
Definition
Initiated and maintained by an individual allergies, meds, illnesses, hospitalizations, surgeries, vaccinations, lab test results, family history etc... |
|
|
Term
Electronic Pt Record (EPR) |
|
Definition
overarching term encompassing EHRs and EMRs |
|
|
Term
Computerized Pt Record (CPR) |
|
Definition
generic term used by IOM usage declining |
|
|
Term
Status of EHR and NHIN in USA |
|
Definition
No country has fully-functional EHR, US lags behind President Bush's Executive Order called for NHIN by 2014, Obama extended it to 2015 Holding back progress?: technical standards for document storage and data transfer, clinical vocabulary standardization, cost/benefit inequities among parties involved, perceived security and confidentiality concerns |
|
|
Term
Information Systems and HIPAA |
|
Definition
ensure security and privacy of health information prevent fraud and abuse Others: improve efficiency of healthcare delivery simplify exchange of data between healthcare entities reduce paperwork associated with processing healthcare transactions |
|
|
Term
Protected Health Information (PHI) |
|
Definition
Any information about status, provision, or payment for healthcare that can be linked to an individual: demographic data, past, present or future physical or mental health problems, provision of healthcare, past, present or future payment Allowable Uses: investigations by health oversight agencies, law enforcement and judicial proceedings, coroners and funeral directors, organ/tissue donation and transplants, qualified research, national security, worker's compensation investigation |
|
|
Term
Information Systems and Accreditation |
|
Definition
on-site audits to verify compliance Factors: information security, user trainng, timely data transmission, systems integration and interoperability, outcome reporting ofr improved care, research, financial and legal records, and decision support, record retention, disaster and recovery planning |
|
|
Term
Information Systems and Reimbursement |
|
Definition
Documentation, documentation, documentation Failure to demonstrate need for a service will result in denial of payment Information systems can use prompts and required fields to compel entry of necessary information |
|
|
Term
|
Definition
use of telecommunication technologies to exchange healthcare information and/or deliver services to patients Range of applications: Simple- telephone help line at the hospital Complex- remote roboics (tele-surgery) Clinical and Non-clinical use: monitor compliance, diagnostic evals, educaiton, build a community, transmit data and/or images |
|
|
Term
Modes of Telehealth Communication |
|
Definition
voice, data, video, still images landline phone, cellular, wired and wireless internet, point-to-point telephone, computer, handheld device, monitoring equipment |
|
|
Term
|
Definition
increased the geographic reach of healthcare providers fewer facility visits for chronically ill patients easier access to expert advice lower cost |
|
|
Term
Obstacles to Telehealth Implementation |
|
Definition
lack of acceptance by healthcare providers and patients licensing and regulatory issues, especially across state lines reimbursement for services cost of equipment, network connectivity, and training |
|
|
Term
|
Definition
range of technologies from devices that monitor vital signs to surveillance cameras used primarily for patients with chronic diseases issues with proper usage of equipment and compliance |
|
|
Term
|
Definition
performing surgery from a remote location integrates robotics, telecommunication, information systems |
|
|