Final exam HCM 435

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which standards development method occurs when a group of interested people or organizations agrees on a certain specification without any formal adoption process?

Ad hoc

Why should IT projects be reviewed in a forum that routinely reviews similar requests?

All of the above

All of the following are online tools that allow organizations to compare data set except

All of the above are online tools for comparing data

Which of the following terminology standards have NOT been recommended by NCVHS?

All of the above have been recommended

Which of the following is NOT one of the four major categories of quality measures?

All of these (outcome, structure, process)

According to the text, what is the primary challenge of developing an effective security program in a health care organization?

Balancing the need for security and cost of security

________ is the process of comparing one or more performance measures against a standard

Benchmarking

Which of the following is NOT an accrediting agency?

CMS

_______ gives a health care organization the authority to participate in the federal Medicare and Medicaid programs

Certification

______ relies on trust that information shared with a health care provider during the course of treatment will be used only for its intended purpose and not disclosed otherwise

Confidentiality

Employing standards developing organizations (SDOs) is characteristic of which standards development method?

Consensus

________ is a desirable approach in assessing IT services that brings a level of objectivity to the assessment process

Consulting

According to the text, what is cause of 41% of all data breaches?

Cybercrime

Which standard related to the HIPAA Security Physical safeguards requires the CE to implement policies and procedures for the movement of hardware and electronic media that contain ePHI into and out of the facility and within a facility?

Device and media controls

______ is the extent to which the company has invested in technology-enable initiatives to change how the company operates

Digital intensity

Which of the following is NOT one of the six aims for establishing quality health care as outlined by Crossing the Quality Chasm?

Ethical

Spending a low percentage of the operating budget on IT means that underinvestment is occurring and the IT budget should be increased

False

The CIO should always report to the CEO of the organization

False

Which of the following is NOT a component of the NIST cybersecurity framework?

Framework Analysis

Which is one of the oldest and widely used sets of health care performance measures in the US with more than 90 percent of health plans in the US collecting and reporting this data?

HEDIS

Which of the following original CMS value-based programs determines whether or not an acute care hospital should be paid a reduced amount based on performance across health-acquired infections and unacceptable adverse event?

Hospital-acquired conditions

Which of the following is NOT characteristic of IT-enabled value? (CHAP7)

IT value is not variable across organizations

Which of the following is not a "level" that helps align organizations with the NQS?

Incident reporting

If a breach of unsecured protected health information occurs, all of the following should be notified except

Malware

Which of the following element is NOT required on a valid release of information form?

Marital status

Which common financial measure is calculated by subtracting the initial investment from the future cash flows that result from the investment?

Net present value

Who is principe entity responsible for implementation for health care IT standards for interoperability?

ONC

If a breach of unsecured protected health information occurs, all of the following should be notified except

Office of the National Coordinator for Health IT

Which of the following is an example of a "profiling body"?

Office of the National Coordinator for Health Information Technology

Data center management is a subgroup of which of the four core functions of an IT department?

Operations and technical support

______ is an individual's constitutional right to be left alone and to limit access to his or her health care information (CHAP 9)

Privacy

Which law was written specifically to protect patient confidentiality only in federally operated health care facilities, such as Veterans Administration hospitals, Indian Health service facilities, and military health care organization?

Privacy Act of 1974

Which of the following is NOT one of the six parts in the LOINC name structure?

Product category

Which of the following was NOT identified in the text as one of the four core functions of an IT department? (CHAP 8)

Project proposals

Which of the following is NOT a common metric regarding infrastructure?

Realistic

Which of the following is an action taken to limit network access?

Set up wireless routers to operate only in encrypted mode

_______ are the sets of rules for what should be included for the needed function and system level (CHAP 11)

Standards

Who oversees the licensure of health care facilities?

State government

Which IT staff member works with programmers and vendor staff members to test new systems and system upgrades, recommend solutions, and determine whether program requirements have been met?

Systems analyst

Which of the following is NOT one of the key sources regarding legal protection of an individual's health information?

The Joint Commission

According to the textbook, all of the following are areas that should be assessed when evaluating IT effectiveness except

Vendors

Which of the following is a standard of the HIPAA Security Administrative Safeguards?

Workforce security

Which of the following is NOT a strategy to shorten the deliverables cycle?

"Big bang" implementation

Which organization developed a widely used group of patient experience survey in the public area under the Consumer Assessment of Healthcare Providers and Systems program?

AHRQ

All of the following are components that should be addressed in an organization's security action plan except

All of the above are components

Which of the following is NOT considered health care data?

All of the above are considered health care data

Which of the following is NOT one of five concurrent and continuous functions the Framework Core?

Analyze

Which HIPAA rule was added as part of the HITECT Act in 2009?

Breach Notification Rule

In the process of increasing accountability for investments, who should defend the IT investment?

Business owners

Which organization has identified seven key attributes/competencies of CIOs and offers intensive "boot camp" training sessions for professional development of CIOs?

CHIME

Who is the most senior IT executive that managers the IT department and is seen as the executive who can successfully lead the organization in its efforts to apply IT to advance its strategies

Chief information officer (CIO)

Which IT leadership role is a relatively new position and emerged as a result of the growing interest in adopting clinical information systems and leveraging those systems to improve care ?

Chief medical information officier (CMIO)

Which of the following primary HL7 standards is a document markup standard for clinical information exchange among providers?

Clinical Document Architecture

Which of the following is NOT a specification of the access control standard related to the HIPAA Security Technical Safeguards?

Data storage

Which IT staff member plans, designs, coordinates, and coordinates system security measures?

Database administrator

Which standards development method occurs when a vendor fo other commercial enterprise controls such a large segment of the market that its produce becomes the recognized norm?

De facto

Who is responsible for the development, maintenance, and modification of relevant electronic data interchange standards?

Designated standard maintenance organizations (DSMOs)

Excluding laboratories, how often must a health care organization undergo an on-site survey in order to maintain accreditation with The Joint Commission?

Every 3 years

How often are CQMs (clinical quality measures) updated?

Every year

Decentralized decision making occurs when an organization has a highly structured hierarchy in which decisions are made by a few senior leaders

False

Implementation is the end point of the IT initiative

False

Most IT services in a health care organization are either fully centralized or decentralized

False

Once the implementation is over and the change settles in, value will have been achieved

False

Which standard set has the potential to accelerate health care IT interoperability as it goes beyond the function of a traditional messaging system and includes modern web services to exchange clinical information?

Fast Health Interoperability Resources (FHIR)

_______ protect systems that utilize the Internet from intrusions and threats from outside sources

Firewalls

Of the eight core IT processes that must be managed for an effective IT department, which competency involves development of IT staff skills and retention of IT talent?

Human capital management

What did the author describe as a cornerstone in examining IT value?

IT project proposal

"Making an effort to materially improve the process that the system is designed to support" describes which observation of realizing value?

IT value requires innovation in business practices

Which of the following is an example of intangible value?

Improved collaboration

All of the following are examples of factors outside of the organization's control that may dilute the IT investment except

Inadequate resources

Which of the following is NOT characteristic of a strong password?

Includes personal information

Which of the following is NOT one of the three broad aims of the National Quality Strategy?

Innovative care

Which of the following is a benefit of a decentralized decision making structure?

Innovative use of informations systems

Which of the following was NOT discussed by the authors as a step to ensuring the delivery of value?

Invest more resources

Which of the following workgroup members of an analytics group acts as a liaison between the technical and clinical teams and helps the technical team understand and interpret clinical data as s/he seeks to build algorithms that mimic clinical workflow?

Knowledgeable manager

______ is the process that gives a facility legal approval to operate (CHAP 10)

Licensure

Which new program streamlines three existing quality programs and rewards eligible professionals for meeting and surpassing established thresholds?

MIPS

Which of the following organizations is the leading accrediting body for health plans?

NCQA

Which is a nonprofit organization with board members from both private and public sectors that maintains a large, searchable database of performance measures?

NQF

What is the universal product identifier for all human drugs?

National Drug Code (NDC)

Which of the following is defined as a patient safety event that did not reach the patient?

Near misses

Which initiative encourages individual eligible professionals and group practices to assess and report the quality of care provided to their patients and risk negative payment adjustments if they do not do so?

PQRS

A projection with great certainty that people will use the system in specific ways in an example of which common proposal problem?

Reliance on complex behavior

Of the four classes of investment identified by Ross and Beath, which involves upgrading core IT infrastructure and applications, reducing the costs, or improving the quality of IT services?

Renewal

The goal of which standard below is to enable disparate health information systems to communicate with one another in an unambiguous manner

RxNorm

Which of the following is NOT a reason identified in the text that an organization might outsource IT functions?

Some organizations want to free up IT staff members time for sabbaticals or internships with other departments

Of the four types of IT investments in a portfolio identified by Weill and Aral, which includes applications that support core operations process?

Transactional

_______ are a type of virus specifically designed to look like a safe program

Trojans

Although a person might report to someone else according to the organization chart, s/he should report to the project manager during a specific project

True

Applications programmers write programs to handle specific user tasks, such as a program to track inventory within an organization

True

CapGemini's study of digital maturity found that transformation intensity was more important that digital intensity

True

It is appropriate for the organization to hold parties to celebrate their achievements

True

Which knowledge sources of the UMLS project contains concepts from more than one hundred source vocabularies and strives to incorporate and map existing vocabularies into a single system?

UMLS Metathesaurus

An unplanned, sudden deterioration in the organization's fiscal performance that may slow a project is an example of which common proposal problem?

Unwarranted optimism


Ensembles d'études connexes

Chapter 3: Sources and Bodily Effects of Drugs

View Set

Final: Introduction to Rock Music Songs

View Set

steps to submitting a third party claim

View Set

AC 516 Chapter 3 - Fundamental Concepts: Materiality, Audit Risk and Risk Assessment

View Set