Data Management Flashcards

1
Q

refers to the use of computers to store, access, and secure patient information.

A

Data Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is the information that is not required on a daily basis by the typical system user, but is used by management to make decisions

A

Data Warehouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

n effective data warehouse as has the following characteristics

A

Subject - oriented
Time - variant
Non- volatile
Integrated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This refers to the fact that all events or objects that are the same are linked in a traceable manner.

A

Subject - oriented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This is the ability to look at how information changes as a function of time.

A

Time - Variant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This means that once information is recorded, it can never be deleted or manipulated in a manner that could cause its loss.

A

Non-volatile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This refers to the fact that information from all areas of the enterprise is placed into the same database for the sake of analysis.

A

Integrated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

There are three major parts of a data warehouse:

A

Infrastructure
Data
Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(sometimes referred to as the technology perspective) refers to the hardware and software used in the system.

A

The infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

are diagram representations of the structures that send and store information and how they relate to one another.

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

defined by how information gets from one place to another or how it is dealt with.

A

Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Most data warehouses use ______________ of normalization.

A

Codd Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

breaks data down into a table in order to show the relationships between the various parts.

A

Codd Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

breaks data down into numerical facts and reference information.

A

Dimensional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

easy to use and operate quickly

A

Dimensionally based databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

saves information in the “third normal form” and groups the information into tables according to their subjects.

A

Normalized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

These databases can be slow and difficult to use.

A

Normalized based databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

There are four types of data warehouses that have evolved

A

Offline operation databases
Offline data warehouse
Real-time data warehouse
Integrated data warehouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

are simply copies of the operation system saved to a separate location or partition on the server.

A

Offline operation databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

creates a regular copy of the operational system used in a report-orientated system.

A

Offline data warehouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Similar to offline data warehouses except that they are constantly updated.

A

Real-time data warehouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

updated with information, processes it, and returns the results to the central system for use in daily activities.

A

integrated data warehouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

There are basically four types of health care–related data

A

Medical/clinical data
Knowledge- based data
Comparison data
Aggregate data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

This information is patient-specific and includes information regarding the patient, diagnosis, treatment, laboratory findings, consultations, care plans, physician orders, informed consent, and advance directives.

A

Medical/clinical data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
This information includes methods to ensure that staff is provided training, support, research, library services or other access to information, and good practice guidelines.
Knowledge- based data
26
These data may relate to internal comparisons or external comparisons to benchmarks or best-practice guidelines.
Comparison data
27
These data include pharmacy transactions, required reports, demographic information, financial information, hazard and safety practices, and any data not included in the clinical record.
Aggregate Data
28
used for analysis
Qualitative and Quantitative data
29
Data are described verbally or graphically, and the results are subjective, depending on observers to provide information.
Qualitative Data
30
Data are described in terms of numbers within a statistical format.
Quantitative data
31
This information gathering is done after the design of data collection is outlined, usually in later stages.
Quantitative data
32
Original data are collected for a particular purpose.
Primary data
33
Data were originally collected for another purpose.
Secondary data
34
There are several common methods that preserve data integrity
Staff education system checks data verification minimization of fraudulent information
35
assigned to data that an organization collects.
Attributes
36
two important pieces of information that must be assigned to attributes
Name and Domain
37
usually used to represent the count of something, are those that have a specific value and cannot be further quantified.
Discrete data
38
One of the first steps to ensuring adequate data is to
do a requirement analysis
39
describes how information is accumulated, stored, accessed, and linked within the information system. In designing the system, it is important to know how it will be used.
A physical database design
40
There are three factors to consider in a physical database design
Queries updates performance
41
essential so as not to inflate a database
Eliminating Redundancy
42
is the procedure used to eliminate redundancy and problems and to ensure that information is available from the database through querying.
Eliminating redundancy
43
The earliest type, are organized in a tree or parent–child formation with one piece of information connected to many (one-to-many), but in descending order only (not many-to-one).
Hierarchical databases
44
are appropriate only for simple structures (e.g., lists of e-mail addresses or telephone numbers) and have limited use in health care.
Hierarchical databases
45
Help people make judgments.
Decision Support Systems
46
Take all available data for a problem, generate results, implement the results in a simulation, and choose the optimum solution.
Decision Support Systems
47
Often used to make staffing decisions
Decision Support Systems
48
Similar to decision support systems, but using logic derived from specific task experts.
Expert systems
49
Operate using “If, then” type logic drawing from a database of knowledge in the problem area.
Expert systems
50
Work using a model of human reasoning processes.
Artificial intelligence systems
51
Use the rules of inference such as “If A>B and B>C, then A must be greater than C.”
Artificial intelligence systems
52
Attempt to find new ways to represent abstract ideas.
Artificial intelligence systems
53
Actually learn by trial and error.
Artificial intelligence systems
54
Understand and process information in human language rather than programming language.
Natural Language Systems
55
Enable speech and handwriting recognition.
Natural Language Systems
56
Strategic information technology (IT) planning that relates the capabilities of the organization to its customers and competitors.
Management Information Systems (MIS)
57
Stores data for easy retrieval. As an example, MEDLINE is used to access journal articles and health information.
Bibliographic Retrieval Systems
58
May also be called dedicated or turnkey systems. Used only for a specific function that does not require any connectivity.
Stand alone systems
59
Process specific transactions and produce reports that have the same format every time.
Transaction Systems
60
An input of electric impulses is converted to an output of waveforms. Examples: ECG, EEG, and the non-stress test.
Physiologic Monitoring systems
61
an automatic process to record actions and events occurring in an information system in system log files, which contain a record of events for various components of the information system.
Logging
62
allows the user to collect data, analyze, save, output results, and control the type of information collected, essentially as a method of computerized research.
Data Loggers
63
stand-alone devices that are used to acquire data, such as temperature and humidity in a server room.
Data loggers
64
The following are three main threats for information stored in computerized systems
Quality Availability Confidentiality
65
Information _______ may be compromised by the alteration of files.
Quality
66
This tends to happen during system upgrades or the introduction of unwanted programs
Quality
67
may be threatened by power outages, damage to the system (or its parts), disaster or sabotage, or the system becoming overloaded.
Availability
68
may be compromised by personnel disobeying company policies (or procedures) or unauthorized individuals viewing printed records or computer screens.
Confidentiality
69
there are a number of hazards that should be taken into account and managed
Environmental and Physical safety Control Planning Time restraints (Archiving) Transfer Maintenance
70
This includes exposure to dust, extreme temperature, shock (e.g., earthquakes), humidity, water, and fire.
Environmental and Physical Safety
71
This entails the physical and electronic access control mechanisms designed to protect the records from being erased, stolen, or altered.
Control
72
This is the process of creating backup copies of records and storing them in a separate location for safekeeping.
Planning
73
This process determines how long information must be retained according to state and federal regulations and sets up a system for destruction of obsolete records.
Time restraints (Archiving)
74
These are plans to salvage records before they become unusable due to either degradation or changes in computer hardware.
Transfer
75
This includes upkeep of the system that writes and reads the data.
Maintenance
76
are designed to make sure that the organization’s operations can continue to function (at some level) throughout a disaster and return to full function once the disaster is over.
Disaster Recovery Plans
77
Should be an ongoing process covering every conceivable scenario and involving all of the organization.
Disaster Recovery Plans
78
outlines ways that the organization can perform disaster recovery drills before they are actually needed.
A test plan
79
Lists all personnel who can be called in, alternate locations of data, and places that can be used to conduct business if the primary facility becomes unusable.
A backup plan
80
created to guide the organization during and right after a disaster.
An emergency plan
81
Some common areas in a disaster recovery plan that are sometimes found to be deficient include
Documentation Equipment Data Storage Keeping the plan updated
82
are electronic records that are generated by health care providers and the individual patient, allowing the patient to access, record, and share health information.
Personal health records (PHRs)
83
Patient-maintained paper records can include booklets, files, notebooks, medication records, and handwritten notations.
Paper/personal files
84
stand-alone and not connected to a particular system or electronic health record (HER)
Non-tethered PHRs
85
These pose more security risks than tethered PHRs and require more input from the individual to maintain accurate records.
Non-tethered PHRs
86
Data are tied to a particular system and EHR and are often internet-based.
Tethered PHRs
87
A secure patient portal is provided so the individual can access all or parts of the records, including lists of medications and laboratory results.
Tethered PHRs
88
Data are derived from multiple sources in a network rather than one system. This allows for more flexibility.
Net- worked PHRs
89
Basic principles for networked personal health records (PHRs)include
Transparency Purpose Consent limitations control quality privacy and security oversight troubleshooting
90
presents an opportunity for patient use, allowing patients to participate in their own health care in a number of ways:
Personal Health record (PHR)