Term
Four Phases of Information Systems Life Cycle |
|
Definition
Needs Assessment System Selection Implementation Maintenance |
|
|
Term
|
Definition
begins with recognition that current system not meeting needs of clinicians and/or IT Form steering committee Develop common vision Create rough-cut timeline and assign responsibilities Analyze current system Determine requirements: user needs, and technical needs Assign weights to each criterion to reflect relative importance Phase concludes with a decision to proceed or not |
|
|
Term
|
Definition
obtain as much info as practical about potential software solutions and providers Input from users, unbiased IT experts, trade groups such as HIMSS and AHIMA, conferences, and reliable sources on web RFI Analyze RFI helps eliminate non-contenders RFP/RFQ site visits concludes with contract negotiations and supplier selection |
|
|
Term
RFI (Request For Information) |
|
Definition
sent to prospective vendors/suppliers company history number of installed sites hardware and software architecture and technologies integration with other clinical and admin systems user support future software development plans |
|
|
Term
RFP/RFQ(Request for Proposal/Quotation) |
|
Definition
invitation to suppliers to submit a bid sent to short list of qualified vendors detailed system specs and priorities pricing |
|
|
Term
|
Definition
appoint project manager representatives from IT, affected units, and SW vendor characteristics: good communicator, efficient time management, results-oriented, open to new challenges, team player |
|
|
Term
|
Definition
develop detail project schedule and communicate to all determine what needs to be done, by whom, by when and in what sequence |
|
|
Term
|
Definition
actually should be done in system selection phase networking: data throughput, transfer rates, wired, wireless, servers, storage etc workstations and mobile devices |
|
|
Term
|
Definition
simulate system use with fictitious patient data ensure system works as designed discover problems before they arise in the environment |
|
|
Term
|
Definition
24-7 user support no backsliding: looking for excuses to go back before the installation extra staff on hand to ensure no issues with patient care |
|
|
Term
|
Definition
deploy full SW capabilities in one unit only debug, then rollout to all units |
|
|
Term
|
Definition
start with limited SW capabilities for all units add SW functionality incrementally |
|
|
Term
|
Definition
run new and old systems simultaneously cut over to new system when ready |
|
|
Term
|
Definition
Implement full feature set across all units |
|
|
Term
Performance Measurement (Implementation Phase) |
|
Definition
cost schedule meeting user needs |
|
|
Term
Dealing with the unexpected (Implementation Phase) |
|
Definition
changes in scope contingency funds 'crashing' the schedule: behind, add resources to keep up |
|
|
Term
How to Fail at IT Project Management |
|
Definition
Don't include stakeholders in planning the project Don't have backup plans When problems occur, shoot the messenger Never admit the project is failing Over-manage the people Ignore one or more goals of scope, quality, cost, and schedule |
|
|
Term
|
Definition
User Feedback Requests for System Changes: failures, bug fixes, functional enhancements and new capabilities Approval system to accept, reject, or defer change requests: problem severity, benefits of proposed enhancements, resources required to implement |
|
|
Term
Information systems Training |
|
Definition
a structured approach to providing users with the knowledge needed to use an information system in a clinical setting set specific goals for improving capabilities, knowledge, skills, competencies and task performance crucial to the ultimate success of system often badly under-budgeted |
|
|
Term
Elements of a Successful IS Training Plan |
|
Definition
training tailored to each group of users conducted in a location removed from the work area free of work-related interruptions each person has their own computer for hands-on experience instruction occurs near to the go live date appropriate selection of training methods and instructors |
|
|
Term
|
Definition
classroom style engage and create active participants group activities enhance attention and learning costly limit on # of ppl |
|
|
Term
Technology-based Training |
|
Definition
computer-based application or we-based interface self-aced flexible schedule nobody to ask Qs |
|
|
Term
|
Definition
appropriate for short sessions subject to interruptions may or may not be able to reach all the ppl who need training |
|
|
Term
blended approach training |
|
Definition
maximizes retention covers multiple learning styles |
|
|
Term
|
Definition
know technology but may not know work processes may not be skilled at training |
|
|
Term
HR Training Department Trainers |
|
Definition
have training expertise but usually not knowledgeable of work processes or IT |
|
|
Term
|
Definition
understand workflow and information system have regular job responsibilities that limit time availability |
|
|
Term
|
Definition
know technology but no unit work processes usually skilled trainers |
|
|
Term
supervisory staff as trainers |
|
Definition
may not have training expertise, workflow knowledge, or information systems background |
|
|
Term
|
Definition
protect information systems from unauthorized access, use, disclosure, disruption, modification, or destruction while keeping info readily available to those who need it Everyone's Responsibility |
|
|
Term
|
Definition
right of a pt to control what info is collected and how it's used |
|
|
Term
|
Definition
responsibility of providers to disclose info only on a need to know basis |
|
|
Term
|
Definition
authorization (signed by pt) to share info based on an understanding of how it will be used |
|
|
Term
Consequences f Poor Information Security |
|
Definition
HIPAA and CMS compliance Joint Commission accreditation Loss of consumer confidence Financial and legal liability Lost productivity |
|
|
Term
Sources of Information Security Threats |
|
Definition
Malware: viruses, spyware, key loggers, tojans, worms etc Phishing and Spoofing: bank account info, and email from a friend System penetration Unauthorized Users Sabotage Poor password Management |
|
|
Term
|
Definition
restricted access to computers, servers etc |
|
|
Term
Antivirus and spyware detection SW |
|
Definition
identify then block, quarantine, or delete malicious SW apps ideally intercept problems before they infect keep virus and spyware definitions up to date with automatic daily downloads |
|
|
Term
|
Definition
used to verify that someone is who they claim to be smart cards and passkeys biometric devices (fingerprint reader, retina scan) |
|
|
Term
|
Definition
each user assigned a unique username and password minimum 8, preferably 12 characters combination upper/lower case letters, numbers, and special characters different passwords for each SW app change them frequently ironically, some of these practices lead to less security |
|
|
Term
|
Definition
security measures to prevent unauthorized access in and out of a network combination of SW and HW evaluate data access requests based on origin, destination, and data type deny requests that don't meet allowable limits |
|
|
Term
|
Definition
restricted access policies by unit, job level etc employee hiring and termination non-employee access privileges help desk precautions |
|
|
Term
|
Definition
legal record of pt healthcare information in digital form one or more encounters within a single organization structured and unstructured data exams, diagnoses, treatments, care plans, vitals, interventions, progress notes, test results, outcomes etc... |
|
|
Term
Electronic Health Record (EHR) |
|
Definition
longitudinal record of pt health information generated by one or more encounters in any healthcare delivery setting consolidation of EMRs from all sources necessary for NHIN (National Health Information Network) |
|
|
Term
Personal Health Record (PHR) |
|
Definition
Initiated and maintained by an individual allergies, meds, illnesses, hospitalizations, surgeries, vaccinations, lab test results, family history etc... |
|
|
Term
Electronic Pt Record (EPR) |
|
Definition
overarching term encompassing EHRs and EMRs |
|
|
Term
Computerized Pt Record (CPR) |
|
Definition
generic term used by IOM usage declining |
|
|
Term
Status of EHR and NHIN in USA |
|
Definition
No country has fully-functional EHR, US lags behind President Bush's Executive Order called for NHIN by 2014, Obama extended it to 2015 Holding back progress?: technical standards for document storage and data transfer, clinical vocabulary standardization, cost/benefit inequities among parties involved, perceived security and confidentiality concerns |
|
|
Term
Information Systems and HIPAA |
|
Definition
ensure security and privacy of health information prevent fraud and abuse Others: improve efficiency of healthcare delivery simplify exchange of data between healthcare entities reduce paperwork associated with processing healthcare transactions |
|
|
Term
Protected Health Information (PHI) |
|
Definition
Any information about status, provision, or payment for healthcare that can be linked to an individual: demographic data, past, present or future physical or mental health problems, provision of healthcare, past, present or future payment Allowable Uses: investigations by health oversight agencies, law enforcement and judicial proceedings, coroners and funeral directors, organ/tissue donation and transplants, qualified research, national security, worker's compensation investigation |
|
|
Term
Information Systems and Accreditation |
|
Definition
on-site audits to verify compliance Factors: information security, user trainng, timely data transmission, systems integration and interoperability, outcome reporting ofr improved care, research, financial and legal records, and decision support, record retention, disaster and recovery planning |
|
|
Term
Information Systems and Reimbursement |
|
Definition
Documentation, documentation, documentation Failure to demonstrate need for a service will result in denial of payment Information systems can use prompts and required fields to compel entry of necessary information |
|
|
Term
|
Definition
use of telecommunication technologies to exchange healthcare information and/or deliver services to patients Range of applications: Simple- telephone help line at the hospital Complex- remote roboics (tele-surgery) Clinical and Non-clinical use: monitor compliance, diagnostic evals, educaiton, build a community, transmit data and/or images |
|
|
Term
Modes of Telehealth Communication |
|
Definition
voice, data, video, still images landline phone, cellular, wired and wireless internet, point-to-point telephone, computer, handheld device, monitoring equipment |
|
|
Term
|
Definition
increased the geographic reach of healthcare providers fewer facility visits for chronically ill patients easier access to expert advice lower cost |
|
|
Term
Obstacles to Telehealth Implementation |
|
Definition
lack of acceptance by healthcare providers and patients licensing and regulatory issues, especially across state lines reimbursement for services cost of equipment, network connectivity, and training |
|
|
Term
|
Definition
range of technologies from devices that monitor vital signs to surveillance cameras used primarily for patients with chronic diseases issues with proper usage of equipment and compliance |
|
|
Term
|
Definition
performing surgery from a remote location integrates robotics, telecommunication, information systems |
|
|