Download Final study guide NR599 Best Exam Preparations>Chamberlain College of Nursing and more Study Guides, Projects, Research Nursing in PDF only on Docsity! Final study guide NR599 Best Exam Preparations>Chamberlain College of Nursing ● Ethical decision making ○ When making choices about ethical issues based on the standards of right vs wrong. ○ It requires a systematic framework for addressing the complex and often controversial moral questions. ● Bioethical standards ○ The study of healthcare ethics ○ Bioethics takes on relevant ethical problems seen by healthcare providers in relation to care ● Telehealth ○ wide range of health services that are delivered by telecommunications ready tools, such as telephone, videophone, and computer ○ is needed to help fill the nursing shortage allowing nursing to see more patients quicker, as well as the aging population ○ Telecommunication technologies used to deliver health-related services or to connect patients and healthcare providers to maximize patients’ health status. ○ A relatively new term in the medical/nursing vocabulary, referring to a wide range of health services that are delivered by telecommunications-ready tools such as the telephone, videophone, and computer. ● Medical Applications ○ Software developed for medical purposes, including home medical monitoring system, medical databases for healthcare professionals, etc. ● Medical Devices ○ is any device intended to be used for medical purposes ● FDA Oversight for Medical Devices ● Privacy ○ An important issue related to personal information ○ Restricted access of patient information or data ● Confidentiality ○ To ensure that all personal information is protected by ensuring that limited access is only given to those who are authorized to view that information. ■ Protecting privacy of personal information or data ● Cybersecurity ○ the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this. ○ With the expansion of technology. Facilities are taken more precautions to prevent cyber attacks. With the move towards advancing cybersecurity is important, technology continues to grow. ○ Ensuring patient safety ○ Avoiding complications that may result in readmissions ○ Create alerts about drug-drug interactions ○ Drug allergy contraindications ● CDS challenging healthcare ○ Alarm fatigue ○ Clinical burnout ○ Occur with poorly implemented CDS features ○ Financial burden ● Workflow Design ○ Used to describe the action or execution of a series of tasks in a prescribed sequence ○ Progression of steps (tasks, events, interactions) that constitute a work process ○ In a sequential workflow, each step depends on the occurrence of the previous step; in a parallel workflow, two or more steps can occur concurrently. ○ Nursing informatics is uniquely positioned to engage in the analysis and redesign of processes and tasks surrounding the use of technology. ● Changes in workflow, poor system design and usability issues, lack of understanding about these systems and their capabilities, user errors and system errors, and lack of defined protocols can all lead to process breakdowns and errors. McGonigle Chapter 13 ● EHR and information systems provide POC decision support to prevent medical errors to save lives and money ● Workflow must be considered before implementing technology or it can be more dangerous ○ Computerized provider order entry (CPOE) focuses on considering the workflow ● Barriers to implement technology: cost & length of time to incorporate it, frequent upgrades interrupting the workflow ● American Recovery and Reinvestment Act (ARRA)- used financial incentives to implement Meaningful Use (MU) rules and regulations ○ Stage 1: data capturing and sharing ○ Stage 2: advanced clinical processes ○ Stage 3: improve outcomes ● Medicare Access and CHIP Reauthorization Act of 2015 (MACRA) took over and created a quality payment program (QPP) to replace Medicare reporting programs ○ Merit Based Incentive Payment (MIPS or Alternative Payment Models (APM) to allow clinicians to choose what suites their needs the best, simplify process for achievement, align with Health IT Certification criteria, emphasize interoperability, information exchange, security measures, and patient access to information, reduce number of measures, and exempt clinicians from reporting if EHR is not applicable to their practice ● Hospitals have small profit margins so they need to work smarter and not harder with the help of technology to keep the margins from getting smaller ○ Workflow analysis needs to be done as well as working in optimization (moving conditions past their current state into a more effective method of performing. ● More research is needed in the area of financial implications of workflow inefficiencies and their impact on patient care ○ This is hard due to lack of standardized terminology in this area ● Workflow redesign- one of the fundamental skills sets that make up the discipline of an informatics nurse ● Process owners: those that directly engage in the workflow to be analyzed and redesigned ● Six Sigma or Lean Departments: efficient and effective delivery of care ○ Key underpinning is the removal of waste ● Variation: when workers perform the same function in different ways- should be eliminated when possible ● Involve operational staff when possible to ensure the buy-in of staff ● To move from current state to future state gap analysis is necessary-- zeros in on the major areas most affected by the change ● Chapter 13 Workflow and Beyond Meaningful Use ○ Alternative Payment Models (APM)’s ■ The Reauthorization Act of 2015 (MACRA) reformed Medicare payments by making changes that created a quality payment program (QPP) to replace the hodgepodge system of Medicare reporting programs. ■ The MACRA QPP has two paths—merit-based payment system (MIPS) or alternative payment models (APMs)—that will be in effect through 2021 and beyond. ■ The APMs are not just incentives, but fundamental changes in how we pay for health care in the United States. It is these models, particularly those dealing with total cost of care, that have the potential to fundamentally alter the value we receive from health care. ○ Clinical transformation ○ Workflow/Work process ■ A progression of steps (tasks, events, and interactions) that constitute a work process; involve two or more persons; and create or add value to the organization’s activities. ■ In a sequential workflow, each step depends on the occurrence of the previous step; in a parallel workflow, two or more steps can occur concurrently. ■ The term “workflow” is sometimes used interchangeably with “process” or “process flow,” particularly in the context of implementations. ■ A sequence of connected steps in the work of a person or team of people—that is, the process or flow of work within an organization; a virtual illustration of the “real” work or steps (flow) that workers enact to complete their tasks (work). ■ The purpose of examining and redesigning workflow is to streamline the work process by removing any unnecessary steps that do not add value or might even hinder the flow of work. ○ Workflow analysis ■ Not an optional part of clinical implementations, but rather a necessity for safe patient care fostered by technology. ■ The ultimate goal of workflow analysis is not to “pave the cow path,” but rather to create a future-state solution that maximizes the use of technology and eliminates non– value-added activities. ■ Although many tools and methods can be used to accomplish workflow redesign, the best method is the one that complements the organization and supports the work of clinicians. McBride, S., & Tietze, M. (2018). ● Chapter 6 Computers in Health Care ○ application software ■ generally has a purpose or function specific to its use (e.g., accounting/financial applications ○ Database ■ are defined as a large collection of data organized for rapid search and retrieval ○ hardware ○ hardware configuration ■ Various system settings that allow for computers or other hardware to work ○ human factors ■ the field of study focused on understanding human elements of systems, in which ‘systems’ may be defined as software, medical devices, computer technology, and organizations ○ network typology ■ Network topology is the arrangement of the elements of a communication network. ■ Network topology can describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial field busses and computer networks. ● Tree network ○ one builds off the switch and connects a switch to switch, and this configuration works using the Internet. ■ Expansion is available with this network ● Star network ○ Typically connected via a switch or hub, with a limited number of computers on the network ● Ring network ○ set up in a circular configuration with the signals transmitting around the ring until the envelope containing the data, or package of information, finds the designated address. ○ Difficult to add to a computer ○ When one computer goes down the whole network goes down ● Bus network ○ Bus configurations are dependent on the total length of the network and the distance the computers are spaced within the network. ○ Total distance, number of computers, and spacing are relevant to the efficiency with a bus configuration. ■ Various networks have pros and cons depending on the configuration. ○ programming languages ■ is a mechanism for transforming information into a computer in the form of machine code, which instructs the computer to do some type of task ■ First generation ○ Usability ■ The degree to which something is able or fit to be used ● Chapter 19 Clinical Decision Support System ○ CDS: provides clinicians, staff, patients, or other individuals with knowledge and person-specific information, intelligently filtered or presented at appropriate times to enhance healthcare ○ Successful implementation is done using leadership, executive support, and interprofessional teams representing stakeholders most impacted by changes to workflow ○ Five rights framework: right information (what), right person (who), right CDS information format (how), right channel (where), right point in the workflow (when) ○ Key strategy within HITECH and MU act ○ Primary goal of CDS is to leverage data and the scientific evidence to help guide appropriate decision making ○ Predictive vs prescriptive analytics ■ Predictive: take available data and apply logic or algorithm to calculate the likelihood of an event (falls risk tool) ■ Prescriptive: lead the clinician on a defined pathway to address the identified issue (hundreds of data points to give a weighted sepsis score- trigger a sepsis guideline order set) ○ Qualitative evaluation strategy after implementing CDS program may include focus groups or surveys-- Quantitative measures include flow charts and may be used to report back to leadership ○ CDS teams must design and deploy CDSS’s so they are most helpful for their purposes as EHR directly from the vendor do not automatically capture certain information to find trends and suggest interventions ■ Finding common ground terminology is important as what one thing means to IT staff is something totally different from a doctor or even different to the nurse ■ The team must work together, as clinicians can have unrealistic expectation for the capability of technology/computer, and the informatics team needs to know what is important to the front line staff ○ The most important issue with regard to liability/legal concerns is whether CDS tools are well designed and well implemented, but clinicians are held to the same level of accountability with the EHR as with the paper-based record- alerts should be clinically relevant ■ Also recommended that a stronger government regulation of CDS and the development of clinical practice guidelines ○ Challenges to implementing CDS ■ Timing of when to receive alerts within provider workflow ■ Speed and ease of access to alerts ■ Autonomy desired by clinician related to how much control end users have over their response to CDS (whether the CDS alert is a hard stop preventing them from moving forward in the EHR until alert is addressed & whether it takes significant effort to override WEEK SIX READING/ KEY POINTS ● McGonigle Chapter 18 Telenursing and remote access telehealth ○ Telehealth: wide range of health services that are delivered by telecommunications ready tools, such as telephone, videophone, and computer ○ Foundation of knowledge model and home telehealth ■ Knowledge acquisition: receiving information from telehealth device such as vital signs taken in home and patients response to customized questions- information goes to remote server and accessed by telehealth nurse ■ Knowledge processing: take vital signs, subjective data, with pt history to get picture of the clinical situation ■ Knowledge generation: uses nursing skills & knowledge along with information from the patient to decide the best course of action to take and acts on the data. The nurse will reflect upon the situation to see if any more information needs to be gathered or if the physician needs to be consulted regarding tx plan. Additional questions may be asked if needed. ■ Knowledge dissemination: may include calling the doctor,obtaining change in med order, calling pt to notify of the change, education, continued monitoring ○ Allow easier and faster access to patients conditions ex. Pt’s response to medications in hours rather than in days ○ Telehealth is needed to help fill the nursing shortage allowing nursing to see more patients quicker, as well as the aging population (⅘ 50+ years old live with at least one chronic disease or condition). The amount of chronic conditions and number of people affected by chronic conditions is expected to continue rising-- ⅓ of people of all ages have limited ability to go to school or live independently due to chronic conditions ○ The U.S healthcare system spends $1.4 trillion each year on conventional medical care and will increase in the coming decades-- one solution is to ■ There are several different constructs for managing projects of the magnitude and scope of an EHR implementation, but SDLC follows a very specific group of activities defined within each phase, thus further defining the project steps and requirements ■ During the implementation phase, policies and procedures are written to define the workflows, training materials are developed, and testing is completed ■ The actual implementation, or “go-live,” occurs at a point and time that is usually supported by the builders, developers, and superusers for a specific time period ○ Innovators ■ Innovators on average account for about 2.5% of the organization’s population and may include nursing informaticists, champions, and superusers ■ They embrace the technology and understand the potential of the EHR and the ability to expand the infrastructure with new innovations to further improve safety and quality of patient care, as well as the clinician experience ■ They seek to help define the system and are often testers involved in the design of the workflows ■ Innovators often are innovators in other areas of their lives ■ Innovators constantly push for advanced functionality of the system, pushing the limits of the system and creatively thinking of ways to improve existing workflows and functionality. ○ Interoperability ■ Interoperability describes the extent to which systems and devices can exchange data and interpret that shared data ■ Interoperability is becoming more prominent and more robust in its use, due to advancement of standards, such as FHIR, and application program interface (API), which easily link data between multiple sources. ■ Systems can work together synergistically to enhance health information management, as well as reduce redundancy or data collection, allowing for aggregation of data for analytics and reporting ■ Among systems is what makes it possible to have different applications within an organization and also allows sharing of data between organizations, providers, or other stakeholders ○ Laggards ■ They are the most resistant to the use of anything new, resisting change of any type ■ They express concern about patient safety and may talk about changing jobs or leaving the workforce altogether rather than adjust to the new methods ■ Laggards need a lot of support from superusers as well as direction from management to use the system ■ They are concerned about their own ability to use the EHR, as well as experience a feeling of loss of control in the many changes that are occurring ○ point-of-care technology ■ Encompasses the devices and systems that support health- care professionals in their daily activities of monitoring patients, caring for them, and documenting their health progress ○ Rogers’s Diffusion of Innovations model ■ Rogers proposes that four main elements influence the spread of a new idea ● the innovation itself ● communication channels ● time ● social system ■ This process relies heavily on human capital ● McBride Chapter 10 Evaluation methods and strategies for EHR ● McBride Chapter 16 Telehealth and mobile health WEEK SEVEN READING/ KEY POINTS ● McGonigle Chapter 5 Ethical Applications of Informatics ○ Alternatives ■ Having a choice between two or more options available ○ Anti Principlism ■ Theory that comes with expansion of technological changes in recent years and the rise in ethical dilemmas that occur due to changes ■ Those against principlism include those who claim that its principles do not represent a theoretical approach ○ Applications (Apps) ■ Software used on a mobile device. ○ Autonomy ■ The right a person has to choose for him or herself ○ Beneficence ■ Actions performed that benefit the welfare of others ○ Bioethics ■ The study of healthcare ethics ■ Bioethics takes on relevant ethical problems seen by healthcare providers in relation to care ○ Bioinformatics ■ The use of science (computer, information and cognitive) in relation to the human genome. ■ An interdisciplinary science that applies computer and information sciences to solve biological problems. ○ Care ethics ■ An ethical approach to solving moral dilemmas in healthcare that is based on relationships and interactions or caring for others ○ Casuist approach ■ An approach to ethical decision making that grew out of the concern for methods of examining ethical dilemmas ■ Casuistry is a specific ethical reasoning method that analyzes the facts of a case in a sound, logical, and ordered or structured manner. ○ Confidentiality ■ To ensure that all personal information is protected by ensuring that limited access is only given to those who are authorized to view that information. ○ Consequences ■ Outcome resulted in ones decision making ○ Courage ■ having the strength to face difficulty ○ Decision making ■ Outcome of our intellectual processing ○ Decision support ■ Recommendations for interventions based on computerized care protocols. ■ The decision support recommendations may include such items as additional screenings, medication interactions, or drug and dosage monitoring. ○ Duty ■ One’s feeling of being obligated to carry out specific tasks based on one’s rank ○ Ethical decision making ■ A ideal toward which we should strive that provides for the full development of our humanity. ■ Attitude that enables us to be and to act in ways that develop our highest potential ■ examples are honesty, courage, compassion and fairness. They become characteristics of a person ■ The virtuous person is the ethical person. ○ Virtue ethics ■ Theory that suggests individuals use power to bring about human benefit ■ Consider the needs of others and the responsibility to meet those needs. ○ Wisdom ■ Knowledge applied in a practical way or translated into actions ■ Use of knowledge and experience to heighten common sense and insight so as to exercise sound judgment in practical matters ● McGonigle Chapter 8 Legislative Aspects of Nursing Informatics: HITECH and HIPAA ○ Access ■ The ability to retrieve data ○ Agency for Healthcare Research and Quality ■ An US agency that supports research initiatives ○ American National Standards Institute ■ An organization that promotes consensus on norms and guidelines related to the assessment of health agencies ○ Centers for Medicare and Medicaid Services ■ The largest health insurer in the US, particularly for home healthcare services and for the elderly in relation to healthcare services. ○ Certified EHR technology ■ An electronic health record (EHR) that meets specific governmental standards for the type of record involved ■ The standards that are meant to be met are set by federal regulations ○ Civil monetary penalties ■ Fines laid out by the Social Security Act ■ In which the Secretary of Health and Human Services can use for many types of non adherent conduct. ○ Compliance ■ Correctly following the rules ○ Confidentiality ■ Protecting privacy of personal information or data ○ Enterprise integration ■ Electronically linking healthcare providers and plans to improve electronic exchange and use of health information among all of those involved in care. ○ Entities ■ Distinct and independent existence ○ Gramm-Leach-Bliley Act ■ Federal legislation in the United States that controls how financial institutions handle the private information they collect from individuals ○ Health disparities ■ The health status differences between different groups of people, especially minorities and nonminorities. ■ The gap between the different people is an ongoing problem even with the advances in technology and healthcare practices ○ Health Insurance Portability and Accountability Act ■ Law signed by Pres. B. Clinton in addressing the need for standards to regulate and safeguard health information and making provisions for health insurance coverage for employed persons who change jobs. ○ Health Level Seven ■ A Standards developing organization that is committed to developing standard terminologies for information technology that support interoperability of healthcare information management systems ○ Healthcare-associated infections ■ Infections that patients acquire while being treated in a healthcare facility ○ International Standards Organization ■ A nongovernmental group that connects and bridges the public and private sectors to develop and publish international standards that assimilate the latest expert knowledge ■ The goal being to provide practical tools for tracking economic, environmental, and societal challenges ○ National Institute of Standards and Technology ■ A nonregulatory federal agency within the U.S. Department of Commerce that was founded in 1901 ■ Its mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve the quality of life. ○ Office of Civil Rights ■ Part of the U.S. Department of Health and Human Services and responsible for enforcing the Health Insurance Portability and Accountability Act. ■ It provides significant information and guidance to clinicians who must comply with the Privacy and Security Rules. ■ It has been tracking complaints and investigating violations since 2003. ○ Office of the National Coordinator for Health Information Technology ■ An office within the U.S. Department of Health and Human Services that was established through the HITECH Act. ■ The ONC is headed by the national coordinator, who is responsible for overseeing the development of a nationwide health information technology infrastructure that supports the use and exchange of information. ○ Open Systems Interconnection ■ A model of standardization for communications in a network developed to ensure that various programs would work efficiently with one another. ○ Policies ■ Basic principles that guide behavior and performance and are enforced. ○ Protected health information ■ Any and all information about a person’s health that is tied to any type of personal identification. ○ Qualified electronic health record ■ An electronic record containing health-related information on an individual, which consists of the individual’s demographic and clinical health information, including medical history and a list of health problems, and supports entry of physician orders. ■ A qualified electronic health record can capture and query information relevant to healthcare quality and exchange electronic health information with and assimilate such information from other sources to provide support for clinical decision making. ○ Sarbanes-Oxley Act ■ Legislation that was put in place to protect shareholders as well as the public from deceptive accounting practices in organizations. ○ Standards-developing organizations ■ Someone is a good but careless employee who unintentionally exposes a network to security vulnerabilities by ignoring or forgetting about proper security procedures ○ Network ■ Connections of computers that can be local or organizationally based, joined together into a local area network, on a wider area scope ○ Network accessibility ■ The ability of the network to be accessed by the right user to obtain what that person needs when he or she needs it ○ Network availability ■ The state in which network information is accessible when needed. ○ Network security ■ The specific precautions taken to ensure that the integrity of a network is safe from unauthorized entry and that the data and information stored on the network are accessible only by authorized users ○ Phishing ■ An attempt to steal information by manipulating the recipient of an e-mail or phone call to provide passwords or other private information. ○ Proxy server ■ Hardware security tool to help protect an organization against security breaches. ○ Ransomware ■ A specific type of malware that cripples the computer network until a ransom is paid by the organization whose network was compromised. ○ Scareware ■ An e-mail designed to scare the user into believing that their computer has been infected ■ The hacker seeks to gain remote access to the computer to “fix” it. ○ Secure information ■ Information that is protected from error, unauthorized access, and other threats that can compromise its integrity and safety ○ Security breaches ■ security violations ○ Shoulder surfing ■ Watching over someone’s back as he or she is working on a computer ○ Social engineering ■ The manipulation of a relationship based on one’s position in an organization ■ For example, someone attempting to access a network may pretend to be an employee from the corporate information technology office ○ Spear phishing ■ A targeting phishing scheme that takes advantage of specific information provided in an organization’s directory ○ Spyware ■ A program that may contain malicious code that may attack or attempt to “take over” a computer. ○ Trojan horses ■ Malicious code, capable of replicating within a computer, that is hidden in data thats looks to be safe ○ Viruses ■ Malicious codes that attach to an existing program and execute its harmful script when opened ○ Worms ■ Forms of malicious code ■ Self-replicating computer programs that use a network to send multiple copies of itself to other computers ○ Zero day attack ■ A technique where a hacker searches for and exploits software vulnerabilities before the vendor is able to release a patch or a fix. ● McBride Chapter 14 Privacy and Security in a Ubiquitous Health Information Technology World ○ civil monetary penalties (CMPs) ■ authorizes the Secretary of Health and Human Services to impose civil money penalties, an assessment, and program exclusion for various forms of fraud and abuse involving the Medicare and Medicaid programs ○ Cloud ■ is internet based computing that allows client computers to access shared resources, software, and information from servers on the web/cloud. ■ The cloud technology reduces these costs for consumers and IT by improving clinical and quality outcomes for patients. ○ covered entity (CE) ■ a health plan or a healthcare clearinghouse or a healthcare provider who transmits any health information in electronic form in connection with a transaction covered by HITECH. ○ Cybersecurity ■ the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this. ■ With the expansion of technology. Facilities are taken more precautions to prevent cyber attacks. With the move towards advancing cybersecurity is important, technology continues to grow. ○ Decision-assisting ■ tools provide important support for healthcare professions decision- making through integration of patient information with evidence. ○ 837 institutional format ■ is the standard format used by institutional providers to transmit health care claims electronically. ○ health informatics environment ■ Data is transformed into information that is then used to better inform and develop programs. ■ Imagine a physician taking a patient's home environment into account when making a diagnosis. ○ protected health information (PHI) ■ Any info in a medical record that can be used to identify an individual, and that was created, used, or disclosed in the course of providing a health care service, such as a diagnosis or treatment. ○ Robotics ■ the branch of technology that deals with the design, construction, operation, and application of robots. ■ Robotics mimics that of human action ○ Security ■ means safety, as well as the measures taken to be safe or protected ■ With technology security if a major issue, the risk having patient feel exposed and unprotected is a concern ○ social media ■ websites and applications that enable users to create and share content or to participate in social networking. ■ Various places are taking action to reduce social media ■ This could result in reduced medical errors such as those resulting from misdiagnosis or omissions of care. ○ cognitive computing ■ Big data and cognitive computing analyses of data can deliver information in “real time” to clinicians. ■ describes technology platforms that, broadly speaking, are based on the scientific disciplines of artificial intelligence and signal processing. ■ technology can rapidly analyze large masses of data, generate insights not attainable by traditional analytics, and produce “actionable responses” based on evidence ■ cognitive systems can utilize big data to think and learn, thus processing information much faster than a human while identifying patterns, trends, and evidence-based solutions. ○ data mining ■ has been defined as mining data and information from large databases and is often associated with machine learning or advanced analytics techniques ■ is also defined as a method in computer science that is used to discover patterns and trends within large data sets. ■ Data-mining techniques contain many specialized classifications and subclassifications involving various methods that intersect with artificial intelligence, machine learning, statistics, and database systems ○ data scientist ■ to describe the competencies required as “part hacker, part analyst, part communicator” ■ is focused on using analytics to solve problems, and the data scientist has the competencies to understand how to “fish out answers to important business questions from today’s tsunami of unstructured information” ○ machine learning ■ defined as “the science and technology of systems that learn from data” ● These systems present challenges with adoption and implementation of technology that require nursing expertise and leadership given the impact on clinical and operational workflows often managed by nursing ○ unstructured data ■ Unstructured data is information that either does not have a pre- defined data model or is not organized in a pre-defined manner ■ Unstructured information is typically text-heavy, but may contain data such as dates, numbers, and facts as well. ○ Watson project ■ Was originally built to demonstrate its advanced natural language processing, knowledge representation, machine learning, and information retrieval processes in the context of the game Jeopardy ■ Cognitive computing systems, such as IBM Watson, have the potential to transform healthcare with improved efficiencies and reduced costs that ultimately lead to better patient outcomes. ■ demonstrate the feasibility and positive impact that cognitive computing tools can have on a clinical setting ■ The use of advanced analytics will face challenges in the healthcare environment with implications for nursing practice. ● McBride Chapter 29 Enhancing Cybersecurity in New and Emerging Health Informatics Environments ○ Bitcoin ■ peer-to-peer digital currency system that allows currency to be sent directly from one party to another without the need for a financial institution managing the transaction, and as such provides anonymity to the parties involved in the transaction ■ bitcoin and blockchain technology was initially adopted by criminals as a way of avoiding money laundering detection by law enforcement authorities; however, the value of the blockchain storage method was soon realized for its commercial value and was enhanced by a number of companies working together in an open forum to adapt to the more rigorous requirements of business and healthcare. ○ Blockchain ■ derives its name from its chronological structure ■ The structure is enforced through a chain of forward and backward pointers that record the hashes of the previous and of the next record in the chain. ■ Once a transaction is written to the blockchain data store, it becomes a link in the chain and is never erased. ■ Ability of various systems and organizations to work together to exchange information ○ Order entry management ■ A program that allows a clinician to enter medication and other care orders directly into a computer, including orders for laboratory, microbiology, pathology, radiology, nursing, and medicine; supply orders; ancillary services; and consults. ○ Patient support ■ The total array of tools and software that can be used to provide information and assistance to help meet the healthcare needs of consumers ○ Population health management ■ A term adopted by healthcare management companies to express their goal of achieving optimal health outcomes at a reasonable cost ■ The management process involves data collection and trend analyses that are used to predict clinical outcomes in a group of people. ○ Reporting ■ The act of using of documents or information system outputs to convey information to stakeholders ○ Results management ■ An approach to evaluating the outcomes of a process to determine whether that process was useful or valuable ● McBride Chapter 12 National Standards for Health Information Technology ○ American Society for Testing Materials (ASTM) ■ One of the leading clinical document standard ■ The result being the Continuity of Care Document ■ Standards organization that develops and publishes voluntary consensus technical standards for a wide range of materials, products, systems, and services ○ clinical document architecture (CDA) ■ One of the other leading clinical document standard ■ Provides the markup standardization that indicates the structure and semantics of the clinical document specifically for the purpose of standardizing clinical information to be exchanged both between and across care settings ■ Contain information such as admissions and discharge summaries, imaging, and pathology reports ■ An XML-based markup standard intended to specify the encoding, structure and semantics of clinical documents for exchange. ○ code sets ■ Used are the diagnostic and procedural coding or classification systems. ● As code sets change and are updated, mapping maintenance considerations are important to data integrity ● Updates to code sets are not always on the same time schedule ○ common data standards ■ A goal of the industry is also to attain semantic interoperability ■ Semantic interoperability requires that the meaning of the information is understood as the data are exchanged ○ continuity-of-care document ■ Is built using HL7 Clinical Document Architecture (CDA) elements and contains data that is defined by the ASTM Continuity of Care Record (CCR) ■ An XML-based markup standard intended to specify the encoding, structure, and semantics of a patient summary clinical document for exchange ○ continuity-of-care record ■ A standard for the creation of electronic summaries of patient health ■ Its aim is to improve the quality of healthcare and to reduce medical errors by making current information readily available to physicians. ○ current procedural terminology (CPT) ■ Refers to a set of medical codes used by physicians, allied health professionals, nonphysician practitioners, hospitals, outpatient facilities, and laboratories to describe the procedures and services they perform ○ data mapping ■ Is defined as the process of linking interoperable components from one system to another, involving mapping “one component to another,” and is an essential component for interoperability ○ data standards ■ Are a fundamental building block that the industry must address to fully realize the potential of the information technology (IT) infrastructure implemented under the Health Information Technology for Economic and Clinical Health (HITECH) Act and to market ■ It can also be used in personal health records applications ○ Systematized Nomenclature of Medicine (SNOMED) ■ Is a systematic, computer-processable collection of medical terms, in human and veterinary medicine ■ Provides codes, terms, synonyms and definitions which cover anatomy, diseases, findings, procedures, microorganisms, substances, etc. ○ Unified Medical Language System (UMLS) ■ is a set of files and software that brings together many health and biomedical vocabularies and standards to enable interoperability between computer systems ○ X12 ■ Messaging standards developed to transmit data between two entities referred to as “trading partners” in the HIPAA legislation ● McBride Chapter 18 Data Management and Analytics: The Foundations for Improvement ○ Foundations of improvement: data management, analytics, and measures ○ Master data management: coordination of people, practices, and automation ○ Data warehouse: retrospective store of data set up to report trends, offer comparisons, and provide strategic analysis ■ Does not change with time ■ Maintains aggregate and detail level data ■ Centralizes data collection for the intended purpose & provides data marts within the infrastructure ● Data mart: subsection of the data warehouse that stores data for a very specific intended purpose ○ Clinical or operational data: Accumulates clinical and operational data from many systems to assist clinicians in managing patient care at the point of care ■ Expected to shift and change with time ○ When designing a data-analysis strategy the analyst needs to determine what it is that is needed for analysis ■ Measurement theory: conceptual foundation of all scientific decisions- basis for all evidenced based practice ● The goal of measurement is to accurately evaluate a phenomenon of interest and reduce concepts to operational definitions with numeric values ■ Levels of measurement- nominal, ordinal, interval, and ratio data-- once classified the level of measurement specifies which statistical operation can be properly used ● Nominal: numbers assigned represent an objects membership in one of a set of mutually exclusive, exhaustive, and unorderable categories (categorical data) ● Ordinal: numbers assigned represent an objects membership in one of a set of mutually exclusive and exhaustive categories that can be ordered according to the amount of the attribute possessed (categorical data) ● Interval: numbers assigned represent an objects membership in one of a set of mutually exclusive and exhaustive categories that can be ordered and are equally spaced regarding the magnitude of the attribute under consideration (continuous variable or scale) ● Ratio: same as the interval, but also the distance from an absolute zero point is known (continuous variable or scale) ○ Operationalizing a measure: outlines precisely how a measure will be constructed ■ Variable: quantity that may assume any set of values (gender-m or f) ■ Dependent variable: outcome of interest ■ Independent variable: related to the dependent variable of interest or may be an intervention that is manipulated in a study ■ Intervention: process measure that impacts the outcome measure ○ Quality of data ■ May take into consideration: consistency of data, completeness, conformity to standard, accuracy, duplication, and overall integrity ○ A data exploration analysis provides a variety of visual and numerical summaries of data and can be performed by all cases, a subject of cases, or separately for groups of cases ■ To perform an analysis the analyst screens the data, examines the data file for outliers, and checks assumptions one might have relating to the data ○ Data transformation: requires manipulation of the original data to answer the questions of interest ■ Collapse data into age groups, deriving an outcome from source data such as mapping discharge status codes to a mortality measure of yes or no