Data Standards Data Transformation Devices and Integration What is that? How does that work?
100
What is NANDA / NIC / NOC?
In nursing school, you likely learned about these ANA recognized terminologies and data elements. You also may have been encouraged to use these to develop your nursing care plans. These three recognized standards cover nursing diagnoses, nursing interventions, and nursing outcomes.
100
Who is the information sender?
Informatics is very much about effective communication. A message must be transferred from this person to the next person. For example, the person giving shift report is communicating information and representing this role.
100
What are software applications (e.g., hardware vs. software)?
We love our smart devices but these hardware devices alone are not enough! We also need this supplemental tool to ensure that we can use these hardware devices.
100
What is middleware?
This type of 'ware resides between operating systems and other complimentary applications.
100
What is encryption?
This technical safeguard stores and transmits electronic PHI in a format that is unreadable to the human eye.
200
What is Rx Norm?
This ONC HIT recommended clinical vocabulary standard offers normalized drug names that link to commonly used vocabularies such as Micromedex and Multum.
200
What is data mining?
The use of electronic records of patient data has made secondary data analyses easier. The data exists in an excel format and this minimizes the need for data entry. With such data, insights about health outcomes can be determined with the appropriate methods and tools. Yet to do so requires a step by trained researchers and statisticians. This step is called...
200
What is cloud computing?
Amazon is not just for Prime membership to buy your gifts anymore. Now, we can host software programs and apps on their Web Services account. The use of Amazon Web Services represents this type of computing.
200
What is confidentiality vs. privacy?
As a patient, there is certain information you may be willing to share or not share with your health care team. The health care team must respect your wishes and also hold any information you share within the laws of HIPAA. These two concepts introduced are often interchanged however there are differences in their meaning.
200
What is a firewall?
This security measure is a requirement of health care organizations in order to protect the electronic PHI's integrity. This can be in either a hardware or software format and is used to prevent harmful or inappropriate data from entering or leaving a network.
300
What is SNOMED CT?
This vocabulary standard is a requirement for electronic exchange of health information and interoperability specifications. This standard is owned and operated by the International Health Terminology Standards Development Organization (IHTSDO).
300
Who is the information receiver?
Patients tend to get information overload when not presented in the right format. When information is being delivered to patients, they assume this role.
300
What is a client-server based architecture?
The traditional model of hosting electronic health record systems and other clinical applications is known as this. There are data centers to house the back ups in case of a failure to ensure the security of the electronic PHI.
300
What is an API (application programming interface)?
These three letters are essential to health care data exchange. This acronym represents specification for how data can be exchanged and used across software applications.
300
What are interfaces?
Do you ever wonder why some data moves in one direction but not bi-directionally between electronic information systems? Well, specifications indicate how these specialists design these tools that will ultimately help us toward interoperability.
400
What is ICD - 10?
This standard upgraded codes and was a federal requirement to be completed by October 1st, 2015.
400
What is wisdom (e.g., DIKW hierarchy)?
The application of this concept in the Data, Information, Knowledge and Wisdom hierarchy is often referred to as 'intuition' in nursing practice, where you just 'know' something is about to happen to a patient. However, this 'intuition' is influenced by past experiences, patterns of behavior and expert level nursing skills.
400
What is interoperability?
This has likely been the most popular word of the year that is often difficult for non-HIT'ers to pronounce. On a serious note, this past year has shown significant advances in bringing organizations and vendors together in an effort to share data. This concepts holds the hope for being able to achieve this goal over the next 10 years.
400
What is HL-7 and FHIR?
This international standards organization has provided protocols for data exchange for decades. Most recently, this organization has formed a more nimble and flexible interoperability standard that is being tested by leading vendors and organizations.
400
What is authentication?
This process verifies users upon log in to electronic systems. A nurse who logs into the system will go through this process to verify his/her credentials and identity as defined by the system.
500
What is the Clinical Care Classification (CCC) System?
Virginia Saba is well known as a pioneer in Nursing Informatics. What is not as well known is the ANA recognized terminology that she developed that also has discrete data elements for diagnoses, interventions and outcomes.
500
What is data representation?
The charge nurse expresses to the informatics team how she would love to be able to see all of the rooms at a glance to know which are filled, which are open, which are pending discharge, and which need to be cleaned. The concept being represented in her request to the informatics team is not for new data but this...
500
What is a needs assessment?
A vendor approaches a health care organization with the desire to incorporate apple watches into a physician practice. The informatics nurse asks several questions about infection control, screen visibility, and data integration. These are just a few of the questions essential to appropriately conduct this type of evaluation.
500
What is Read Only Memory (e.g., RAM vs. ROM)?
This method of data storage is preferred over its alternative acronym. This method of data storage only allows for reading of the data storage. However, using this method, the data is not easily altered or reprogrammed. The alternative method is more volatile.
500
What is RFID (radio frequency identification)?
Various consumer goods stores (such as Walmart) use this technology for inventory. Some health care organizations have adopted this technology to track devices. Future uses of this technology is anticipated.






Data Management and Health Care Technology

Press F11 for full screen mode



Limited time offer: Membership 25% off


Clone | Edit | Download / Play Offline