Final exam HCM 435
Which standards development method occurs when a group of interested people or organizations agrees on a certain specification without any formal adoption process?
Ad hoc
Why should IT projects be reviewed in a forum that routinely reviews similar requests?
All of the above
All of the following are online tools that allow organizations to compare data set except
All of the above are online tools for comparing data
Which of the following terminology standards have NOT been recommended by NCVHS?
All of the above have been recommended
Which of the following is NOT one of the four major categories of quality measures?
All of these (outcome, structure, process)
According to the text, what is the primary challenge of developing an effective security program in a health care organization?
Balancing the need for security and cost of security
________ is the process of comparing one or more performance measures against a standard
Benchmarking
Which of the following is NOT an accrediting agency?
CMS
_______ gives a health care organization the authority to participate in the federal Medicare and Medicaid programs
Certification
______ relies on trust that information shared with a health care provider during the course of treatment will be used only for its intended purpose and not disclosed otherwise
Confidentiality
Employing standards developing organizations (SDOs) is characteristic of which standards development method?
Consensus
________ is a desirable approach in assessing IT services that brings a level of objectivity to the assessment process
Consulting
According to the text, what is cause of 41% of all data breaches?
Cybercrime
Which standard related to the HIPAA Security Physical safeguards requires the CE to implement policies and procedures for the movement of hardware and electronic media that contain ePHI into and out of the facility and within a facility?
Device and media controls
______ is the extent to which the company has invested in technology-enable initiatives to change how the company operates
Digital intensity
Which of the following is NOT one of the six aims for establishing quality health care as outlined by Crossing the Quality Chasm?
Ethical
Spending a low percentage of the operating budget on IT means that underinvestment is occurring and the IT budget should be increased
False
The CIO should always report to the CEO of the organization
False
Which of the following is NOT a component of the NIST cybersecurity framework?
Framework Analysis
Which is one of the oldest and widely used sets of health care performance measures in the US with more than 90 percent of health plans in the US collecting and reporting this data?
HEDIS
Which of the following original CMS value-based programs determines whether or not an acute care hospital should be paid a reduced amount based on performance across health-acquired infections and unacceptable adverse event?
Hospital-acquired conditions
Which of the following is NOT characteristic of IT-enabled value? (CHAP7)
IT value is not variable across organizations
Which of the following is not a "level" that helps align organizations with the NQS?
Incident reporting
If a breach of unsecured protected health information occurs, all of the following should be notified except
Malware
Which of the following element is NOT required on a valid release of information form?
Marital status
Which common financial measure is calculated by subtracting the initial investment from the future cash flows that result from the investment?
Net present value
Who is principe entity responsible for implementation for health care IT standards for interoperability?
ONC
If a breach of unsecured protected health information occurs, all of the following should be notified except
Office of the National Coordinator for Health IT
Which of the following is an example of a "profiling body"?
Office of the National Coordinator for Health Information Technology
Data center management is a subgroup of which of the four core functions of an IT department?
Operations and technical support
______ is an individual's constitutional right to be left alone and to limit access to his or her health care information (CHAP 9)
Privacy
Which law was written specifically to protect patient confidentiality only in federally operated health care facilities, such as Veterans Administration hospitals, Indian Health service facilities, and military health care organization?
Privacy Act of 1974
Which of the following is NOT one of the six parts in the LOINC name structure?
Product category
Which of the following was NOT identified in the text as one of the four core functions of an IT department? (CHAP 8)
Project proposals
Which of the following is NOT a common metric regarding infrastructure?
Realistic
Which of the following is an action taken to limit network access?
Set up wireless routers to operate only in encrypted mode
_______ are the sets of rules for what should be included for the needed function and system level (CHAP 11)
Standards
Who oversees the licensure of health care facilities?
State government
Which IT staff member works with programmers and vendor staff members to test new systems and system upgrades, recommend solutions, and determine whether program requirements have been met?
Systems analyst
Which of the following is NOT one of the key sources regarding legal protection of an individual's health information?
The Joint Commission
According to the textbook, all of the following are areas that should be assessed when evaluating IT effectiveness except
Vendors
Which of the following is a standard of the HIPAA Security Administrative Safeguards?
Workforce security
Which of the following is NOT a strategy to shorten the deliverables cycle?
"Big bang" implementation
Which organization developed a widely used group of patient experience survey in the public area under the Consumer Assessment of Healthcare Providers and Systems program?
AHRQ
All of the following are components that should be addressed in an organization's security action plan except
All of the above are components
Which of the following is NOT considered health care data?
All of the above are considered health care data
Which of the following is NOT one of five concurrent and continuous functions the Framework Core?
Analyze
Which HIPAA rule was added as part of the HITECT Act in 2009?
Breach Notification Rule
In the process of increasing accountability for investments, who should defend the IT investment?
Business owners
Which organization has identified seven key attributes/competencies of CIOs and offers intensive "boot camp" training sessions for professional development of CIOs?
CHIME
Who is the most senior IT executive that managers the IT department and is seen as the executive who can successfully lead the organization in its efforts to apply IT to advance its strategies
Chief information officer (CIO)
Which IT leadership role is a relatively new position and emerged as a result of the growing interest in adopting clinical information systems and leveraging those systems to improve care ?
Chief medical information officier (CMIO)
Which of the following primary HL7 standards is a document markup standard for clinical information exchange among providers?
Clinical Document Architecture
Which of the following is NOT a specification of the access control standard related to the HIPAA Security Technical Safeguards?
Data storage
Which IT staff member plans, designs, coordinates, and coordinates system security measures?
Database administrator
Which standards development method occurs when a vendor fo other commercial enterprise controls such a large segment of the market that its produce becomes the recognized norm?
De facto
Who is responsible for the development, maintenance, and modification of relevant electronic data interchange standards?
Designated standard maintenance organizations (DSMOs)
Excluding laboratories, how often must a health care organization undergo an on-site survey in order to maintain accreditation with The Joint Commission?
Every 3 years
How often are CQMs (clinical quality measures) updated?
Every year
Decentralized decision making occurs when an organization has a highly structured hierarchy in which decisions are made by a few senior leaders
False
Implementation is the end point of the IT initiative
False
Most IT services in a health care organization are either fully centralized or decentralized
False
Once the implementation is over and the change settles in, value will have been achieved
False
Which standard set has the potential to accelerate health care IT interoperability as it goes beyond the function of a traditional messaging system and includes modern web services to exchange clinical information?
Fast Health Interoperability Resources (FHIR)
_______ protect systems that utilize the Internet from intrusions and threats from outside sources
Firewalls
Of the eight core IT processes that must be managed for an effective IT department, which competency involves development of IT staff skills and retention of IT talent?
Human capital management
What did the author describe as a cornerstone in examining IT value?
IT project proposal
"Making an effort to materially improve the process that the system is designed to support" describes which observation of realizing value?
IT value requires innovation in business practices
Which of the following is an example of intangible value?
Improved collaboration
All of the following are examples of factors outside of the organization's control that may dilute the IT investment except
Inadequate resources
Which of the following is NOT characteristic of a strong password?
Includes personal information
Which of the following is NOT one of the three broad aims of the National Quality Strategy?
Innovative care
Which of the following is a benefit of a decentralized decision making structure?
Innovative use of informations systems
Which of the following was NOT discussed by the authors as a step to ensuring the delivery of value?
Invest more resources
Which of the following workgroup members of an analytics group acts as a liaison between the technical and clinical teams and helps the technical team understand and interpret clinical data as s/he seeks to build algorithms that mimic clinical workflow?
Knowledgeable manager
______ is the process that gives a facility legal approval to operate (CHAP 10)
Licensure
Which new program streamlines three existing quality programs and rewards eligible professionals for meeting and surpassing established thresholds?
MIPS
Which of the following organizations is the leading accrediting body for health plans?
NCQA
Which is a nonprofit organization with board members from both private and public sectors that maintains a large, searchable database of performance measures?
NQF
What is the universal product identifier for all human drugs?
National Drug Code (NDC)
Which of the following is defined as a patient safety event that did not reach the patient?
Near misses
Which initiative encourages individual eligible professionals and group practices to assess and report the quality of care provided to their patients and risk negative payment adjustments if they do not do so?
PQRS
A projection with great certainty that people will use the system in specific ways in an example of which common proposal problem?
Reliance on complex behavior
Of the four classes of investment identified by Ross and Beath, which involves upgrading core IT infrastructure and applications, reducing the costs, or improving the quality of IT services?
Renewal
The goal of which standard below is to enable disparate health information systems to communicate with one another in an unambiguous manner
RxNorm
Which of the following is NOT a reason identified in the text that an organization might outsource IT functions?
Some organizations want to free up IT staff members time for sabbaticals or internships with other departments
Of the four types of IT investments in a portfolio identified by Weill and Aral, which includes applications that support core operations process?
Transactional
_______ are a type of virus specifically designed to look like a safe program
Trojans
Although a person might report to someone else according to the organization chart, s/he should report to the project manager during a specific project
True
Applications programmers write programs to handle specific user tasks, such as a program to track inventory within an organization
True
CapGemini's study of digital maturity found that transformation intensity was more important that digital intensity
True
It is appropriate for the organization to hold parties to celebrate their achievements
True
Which knowledge sources of the UMLS project contains concepts from more than one hundred source vocabularies and strives to incorporate and map existing vocabularies into a single system?
UMLS Metathesaurus
An unplanned, sudden deterioration in the organization's fiscal performance that may slow a project is an example of which common proposal problem?
Unwarranted optimism