GNRS 5349 Info and Quality Improvement
A nurse is conducting research on methods to reduce alarm fatigue. Which of the following is one way technology can aid in this research?
Feed alarm data into a reporting database for further analysis.
A nurse executive is reviewing a proposed plan to expand hospital services. Which information system would provide the nurse executive with data on growth and the strategic plan for the hospital?
Financial system
The Big Data to Knowledge (BD2K) initiative of the National Institutes of Health (NIH) supports the creation of data sets with which the following characteristics?
Findable Accessible Interoperable ***All of these are correct.***
The user understands how to use the technology to accomplish a goal when you bridge the:
Gulf of execution
Synthesizing predicted classifications to generate a final best predicted classification is a process referred to as stacking.
True
Once a technology is integrated into an organization, biomedical engineers can become valuable partners in promoting patient safety through appropriate use of the technology.
True
Organizational financial systems frequently interface with materials management, staffing, and billing systems.
True
Organizations themselves can engage in root-cause analysis or failure modes and effects analysis to examine medical errors closely and to determine the system processes that need to be changed to prevent similar future errors.
True
Pharmacy information systems streamline the order entry, dispensing, verification, and authorization process for medication administration.
True
The Agency for Healthcare Research and Quality seeks to improve patient outcomes through the promotion of research and technology applications focused on evidence-based practice.
True
Which of the following types of apps are subject to regulation by the FDA?
None of these is correct.
A new clinical technology has been implemented to improve care so that little waste is incurred. This is known as which of the following?
Efficient delivery of care
Cognitive task analysis usually starts by identifying, through interviews or questionnaires, the particular task and its typicality and frequency.
True
Qualitative research on a practice intervention provides insights into:
the patient's subjective opinion of the effectiveness of the intervention.
Which provides an online health database?
CINAHL Complete
An informatics nurse is integrating a new clinical technology and understands that to optimize success in integration, which of the following must be considered?
End-user involvement
A nurse administrator seeks to increase access to evidence-based care content at the point of care by providing which of the following?
Access to library databases
A patient has a concern that the security and privacy of health information has been compromised. Which statement by the nurse is correct?
"You should contact the Office of Civil Rights to file a complaint about privacy and security rights."
Database management systems consist of software designed to collect, sort, organize, store, retrieve, select, and aggregate data. Nursing and health data may be classified into four basic types:
(1) resource data (e.g., financial information); (2) patient and client demographics; (3) activity data (clinical data); and (4) health service provider data
An informatics nurse is explaining barriers to the adoption of electronic health records to a group of administrators. Which statement by the informatics nurse is correct?
"Electronic health records are expensive, and the cost has prohibited widespread adoption of this technology."
A nurse is teaching a nursing student about the role of safety in health information technology. Which statement by the nurse is correct?
"Health information technology does not replace critical thinking, solid nursing practice, and careful patient monitoring."
A nurse is explaining the multiple systems that impact patient care to a group of nursing students. Which statement by the nurse is correct?
"Important information about the patient, including demographics and patient identification, is communicated by the admitting, discharge, and transfer system."
A nurse researcher is teaching a nursing student about meta-analysis. Which statement by the nurse researcher is true?
"Meta-analyses typically include quantitative studies."
A nurse researcher is explaining neural networks for data mining to a nursing student. Which statement by the nurse researcher is correct?
"Neural network are nonlinear, predictive models that learn through training."
A nurse researcher is teaching a nursing student about data mining and nursing research. Which statement by the nurse researcher is correct?
"Nursing research will help transform big data into comprehensible knowledge."
A nurse researcher is teaching a nursing student about qualitative research and evidence-based practice. Which statement by the nurse researcher is correct?
"Qualitative research cannot be considered evidence-based practice because there are no methods to synthesize the evidence."
A nurse is discussing computerized physician order entry with a physician. The physician prefers to handwrite orders. Which statement by the nurse is correct about computerized physician order entry systems?
"There are less errors and misinterpretation of orders when physician orders are entered in the computer."
A patient asks a nurse about variation in patient care by different providers. What is the best response by the nurse?
"Variation occurs when clinicians perform the same function in different ways and is minimized with standardization."
A patient does not want to be identified in the healthcare facility's directory and informs the nurse. Which of the following is an appropriate response by the nurse?
"You can opt out of the facility's directory."
U.S. citizens could opt to have their Social Security numbers changed to a different ID number on their Medicare cards as a result of the MACRA legislation.
False
Ethics is best described as:
A goal-oriented approach to answering questions that potentially have multiple acceptable answers
When computers are linked together to facilitate communication and operations within and outside an organization, this is known as:
A network
Although nurses have an ethical duty to ensure patient safety, increasing demands on professionals in complex and fast-paced healthcare environments may lead to workarounds. What is a workaround?
A practice that deviates from accepted and expected practice protocols A shortcut to save time An inappropriate action or omission of appropriate actions ***All of these are correct.***
A nurse is conducting a literature search for meta-analysis. She should begin with which of the following?
A search of bibliographic databases
Workflow analysis must be conducted as a stand-alone effort.
False
Healthcare information systems differ from information systems in other organizations because:
All of these are correct
A nurse manager is brainstorming ideas for the promotion of safety in patient care in the nursing unit. Which activity has been recommended by the Institute for Healthcare Improvement to promote safety?
Appoint a safety champion for the unit.
Assigning passwords to employees so that they can access the secure network is known as:
Authentication
A nurse understands that medication errors occur commonly with the use of health information technology. Which of the following should she use to reduce this risk?
Bar-code medication administration
A nurse researcher is using aggregate patient data for data mining. How is patient confidentiality maintained?
By deidentifying patient data
________is a type of study in which two groups of people are identified, one with an exposure of interest and another without the exposure. The two groups are followed forward to determine whether the outcome of interest occurs. Groups are defined based on whether they have had an exposure to a particular risk factor.
Cohort research
A healthcare system creates a database of aggregate patient information. This database will help reduce which of the following?
Communication errors
Which of the following is an example of a human-technology interface?
EMR PCA pump Telephone ***All of these are correct.***
Which of the following strategies are instrumental in managing change?
Education and communication Facilitation and support Negotiation and agreement ***All of these are correct.***
Which term describes well-based standards of right and wrong that prescribe what humans ought to do?
Ethics
A nurse is preparing data for the data mining process and is identifying important variables. What phase of data mining is this?
Exploration
The HITECH Act had which of the following goals?
Facilitate clinical research
A network password can be shared with a co-worker as long as the co-worker is authorized to see the information he or she is attempting to access.
False
A nurse researcher needs to access a healthcare system's data mine to review the system's database.
False
A system developed using a human factors engineering approach means that users are required to adapt their workflow to the system parameters.
False
Bias occurs in systematic reviews only if all sources of evidence are not investigated.
False
Cloud computing is not used for data processing in healthcare organizations because of the potential security breaches.
False
Computers are used in some, but not all, areas of research.
False
Current telehealth technologies are focused on clinicians being able to see patients and not interact with them because audio and streaming video capabilities are costly.
False
Extremely varied in nature, quantitative data can include nearly any information that can be captured and are not numerical.
False
Meta-learning is a subset of artificial intelligence that permits computers to learn either inductively or deductively. Inductive machine learning is the process of reasoning and making generalizations or extracting patterns and rules from huge datasets.
False
Quality improvement (Ql) projects are very different from workflow analysis and therefore rarely use process mapping, change theories, or metrics.
False
Why is blockchain technology a secure application for health care?
It is maintained across several networked computers simultaneously.
Which falls outside the realm of social media?
Microsoft Word
A nurse practitioner is using a registry in the electronic health record to identify patients at risk for diabetes. Which data can the registry identify to assist with this data mining for diabetes?
Patient glucose laboratory results
An electronic health record (EHR) undergoes an upgrade. In order to ensure the end users' ability to use the system, which action should the informatics nurse take?
Provide end user training and support on the EHR upgrades.
A nurse researcher clusters data so that the large datasets are broken up into more manageable, smaller datasets. What is this process known as?
Reduction
A nurse researcher would like to collect survey data that will be emailed to nurses in a healthcare organization. Which informatics tool would be appropriate for the nurse researcher to use?
Research Electronic Data Capture (REDCap)
______allow users to surf the web and find information on nearly anything, although many researchers steer clear of them because of the vast amounts of unsubstantiated information they are likely to uncover.
Search engines
Which of the following requires a release of information in accordance with the Health Insurance Portability and Accountability Act (HIPAA)?
Sharing patient records from an evaluation at a mental health treatment center
Rate the strength of this password: !12E30
Strong password
Rate the strength of this password: *tomatoSoup7
Strong password
An ethics approach that emerged from relatively homogenous societies where beliefs were similar and the majority of societal members shared common values is known as:
The Hippocratic tradition
A nursing executive would like to improve a nursing process. Which of the following will he or she need to collect metrics on?
The current performance of the process
A nurse is preparing to administer a medication and scans the patient's bar code and the medication bar code in the electronic medication administration system. This bar-code technology supports patient safety by ensuring which of the following?
The five rights of medication administration are upheld.
A health system is taking on a transformation initiative, which will be initiated by whom?
The health system's leadership
Nurses who protect the privacy and security of patient information are also protecting which of the following?
Themselves from violation of privacy laws
A common thread in all ethics approaches is that they all are goal-oriented approaches to answering questions that have the potential for multiple acceptable answers.
True
A core difficulty with social media networks is that networks overlap so that the unintended audience is almost always greater than the intended one.
True
Algorithms are typically computer-based recipes or methods with which data mining models are developed
True
As natural language interfaces evolve, they will help us speed up complex processes requiring extensive typing. This will enhance health care by allowing us to map unstructured text data elements to structured fields in an HR to improve clinical data reliability and integrity; identify key elements, concepts, or phrases in lengthy blocks of a clinical note; and reverse the process by converting data from machine readable formats to natural language for reporting functions.
True
Before data can be analyzed or critically reviewed to determine outcomes or assessment, they must be collected and aggregated.
True
Browser privacy settings can control how cookies are used.
True
Data can be converted into information and knowledge by either inductive or deductive reasoning. Most qualitative methods use an inductive approach in which the researcher generates hypotheses (versus the deductive approach typical of quantitative studies, in which hypotheses are tested).
True
Ethical dilemmas arise when issues raise questions that cannot be answered with a simple, clearly defined rule, fact, or authoritative view.
True
Exploration begins with exploring and preparing the data for the data mining process.
True
Human enhancement technology (HET) refers to technologies and biomedical technologies such as prostheses that augment a person using human-machine integration.
True
Human-technology interface problems are the major cause of all patient monitoring incidents. It is not always that the technology itself is faulty. In fact, the technology may perform flawlessly, but the interface design may cause human error.
True
If you use REDCap properly, you will probably be in no trouble legally.
True
Information literacy is directly related to knowledge generation and lifelong learning.
True
Many healthcare organizations experience the effects of poorly implemented clinical technology solutions. These effects may be manifested in the form of redundant documentation, non-value-added steps, and additional time spent at the computer rather than in direct care delivery.
True
Mapping describes how environmental facts (e.g., the order of light switches or variables in a physiologic monitoring display) are accurately depicted by the information presentation.
True
Nationwide interoperability will improve care, public health, and science.
True
New challenges arise for individuals seeking to understand and evaluate information because information is available through multiple media (graphical, aural, and textual). Most significantly, information literacy forms the basis for lifelong learning, serving as a commonality among all learning environments, disciplines, and levels of education.
True
Nursing informatics combines all four nursing practice areas (clinical, research, administration, and education), so the ability to recognize the need for a specific kind of information and then locate, evaluate, and effectively use that information within the nursing informatics paradigm will catapult nurses ahead of other healthcare professionals in applying and engaging various facets of technology.
True
Nursing informatics skills and knowledge can assist in data collection to identify adverse events in hospitals.
True
The HITCH Act made provisions to include meaningful public input in the development of a national HIT infrastructure. Both the Policy Committee and the Standards Committee established by the HITCH Act hold public meetings, and anyone interested in this process can participate.
True
The Standards Committee established by the HITCH Act is responsible for recommending standards by which health information is to be electronically exchanged.
True
The acronym SEMMA-sample, explore, modify, model, assess-refers to the core process of conducting data mining.
True
The growing use of large databases for research has led to the design of novel human-technology interfaces that help researchers visualize and understand patterns in the data that generate new knowledge or lead to new questions.
True
The popularity of social and mobile networking applications is one indication of how new web-based technologies are changing communication preferences.
True
The term boosting refers to increasing the power of the models generated by weighting the combinations of predictions from those models into a predicted classification.
True
Two key pieces of legislation have shaped the nursing informatics landscape-the Health Insurance Portability and Accountability Act (HIPAA) of 1996 and the Health Information Technology for Economic and Clinical Health Act (HITECH) of 2009.
True
We must minimize preventable errors, and one of the most important tools for this purpose is the use of electronic records and information systems to provide point-of-care decision support and automation.
True
Web hosts develop new domain suffixes constantly, so although looking at the suffix can be useful, it should not be the sole deciding factor when choosing whether to trust information.
True
When someone disregards established policies and procedures, it is thought of as reckless behavior.
True
When workflow changes begin to fail and workarounds develop, the new processes need to be evaluated further.
True
Workflows integrating technology provide the nurse with the data necessary to make informed decisions.
True
Safe offsite use of portable devices can be accomplished by:
a virtual private network (VPN) to encrypt data. limiting the information carried outside the secure network. installing software to perform a remote data wipe. ***All of these are correct.***
Rate the strength of this password: &your birthdate
Weak password
When a bar-coding medication system interfered with their workflow, professionals devised__________, such as removing the armband from the patient and attaching it to the bed, because the bar-code reader failed to interpret bar codes when the bracelet curved tightly around a small arm.
Workarounds
Workflow is a term used to describe:
a progression of steps (tasks, events, interactions) that comprise a work process, involve two or more persons, and create or add value to the organization's activities.
Interoperability is the ability to share information:
across organizations.
Surveys of potential or actual users of a website are conducted to:
assess preferences for a number of design characteristics such as display color, menu buttons, text, photo size, icon metaphor, and layout by selecting, on a computer screen, their preferences for each item from two or three options.
HIPAA was enacted by the federal government for several purposes, including:
better portability of health insurance as a worker moved from one job to another. deterrence of fraud, abuse, and waste within the healthcare delivery system. simplification of the administrative functions associated with the delivery of health care, such as reimbursement claims sent to Medicare and Medicaid. ***All of these are correct.***
A __________identifies resources, patterns, and variance in care to prevent costly complications related to chronic conditions and enhances the overall outcomes for patients with chronic illnesses.
case management information system
The intent of HIPAA was to:
curtail healthcare fraud and abuse and enforce standards for health information. guarantee the security and privacy of health information. assure health insurance portability for employed persons. ***All of these are correct***
Data integrity policies cover:
data input. data modification. data access tracking. ***All of these are correct.***
Heuristic evaluation:
detects problems early in the design process
A safety culture is a blame-free environment where individuals are able to report errors or near misses without fear of reprimand or punishment. Conversely, a just culture emphasizes individual accountability and:
encourages error reporting and seeks to understand workflow and process issues that lead to errors.
A nurse identifies a problem in clinical care and subsequently develops a clinical question. This process is known as:
evidence-based practice.
Information literacy is an intellectual framework for finding, understanding, evaluating, and using information. These activities are accomplished in part through:
fluency with information technology. sound investigative methods. critical reasoning and discernment. ***All of these are correct.***
A radiology information system equipped with a picture archiving and communication system provides all of the following except.
hard copy film storage
A nurse is working on patient acuity data for an inpatient unit. The nurse understands that these data are important because they:
help predict the ability of the facility to care for its current population.
The development and implementation of a nationwide electronic health records system holds great promise for nursing practice and nursing informatics. The profession of nursing will benefit from the many enhancements such an infrastructure has to offer, including the ability to:
improve the delivery of nursing care and the quality of that care. make more efficient and timely nursing care decisions for patients. avoid errors that may harm patients and promote health and wellness for the patients whom nurses serve. ***All of these are correct.***
Some major types of qualitative data include:
in-depth interviews. direct observations. written documents. ***All of these are correct.***
Telehealth interfaces allow patients to:
interact with a virtual clinician (actually a computer program). have tailored educational programming developed. interact when they want to. ***All of these are correct.***
Fair, equitable, and appropriate treatment in light of what is due or owed to a person is known as:
justice
Behaviors leading to unintentional data breaches include:
losing an input device or walking away from a workstation without logging off.
An efficient workflow is characterized by:
motions and transportation being limited.
Professional obligations of nonmaleficence include:
not inflicting harm and not imposing risks of harm.
Information found in the pharmacy information system includes:
patient age. known allergies. height and weight. ***All of these are correct.***
New technologies used in health care such as smartphones or Google Glass create potential ethical issues associated with:
privacy and confidentiality
According to Derse and Miller (2008), practice entails all of the following except.
recognition by patients that professionals are gatekeepers of health information.
Radio frequency identifier (RFID) technology may gradually replace bar-code technology in the medication administration cycle because RFID provides:
reduced potential that a counterfeit medication is inadvertently introduced into the supply.
An error in medication administration occurs, resulting in an adverse patient outcome. The organization reviews system processes that need to be changed so that similar errors are avoided in the future. This process is known as a:
root-case analysis.
An accepted method or methods for securing PHI include:
shredding. electronic sanitation. encryption. ***All of these are correct.***
Organizations can ensure information integrity in a network by developing policies to:
specify how data are actually inputted. indicate who has the authorization to change data. track how and when data are changed and by whom. ***All of these are correct.***
One should never blindly trust information found on a webpage. When possible, you should check:
the date of the most recent update. (How old is the page?) contact information. (Is a bibliography or list of sources provided?) links to external sources (Do they seem relevant?) and previous attained knowledge from other reputable sources. (Is the information too unbelievable?) ***All of these are correct.***
Smart pump technologies are designed to promote safe administration of high-hazard drugs.
true
A meta-analysis helps to generate new practice evidence and knowledge by:
using statistical methods to combine the results of several quantitative studies.
Software that tracks and monitors employee network activity typically tracks:
which files an emplovee accesses. what changes were made to files whether or not files were copied. ***All of these are correct.***