HI 630 - Week 4
What are 4 examples of point-of-care (POC) systems?
(1) EHRs (2) picture archiving systems (3) laboratory information systems (4) patient monitoring systems
What are 2 internal issues that must be addressed with mobile computing?
(1) type of device(s) (2) ownership of the device(s)
(Network Topology | Advantages | Disadvantages) Ring
- Advantages: can support better performance than a start topology, provides for orderly data transmission - Disadvantages: high performance under low loads, expensive to implement, any fault can cause network failure
(Network Topology | Advantages | Disadvantages) Bus
- Advantages: easy device connection, uses less cable than other topologies - Disadvantages: one break disables network, terminators required at both ends of the backbone, problems are hard to identify
(Network Topology | Advantages | Disadvantages) Star
- Advantages: easy installation/device connection, can connect/remove devices w/o disruption, problems are easily identified - Disadvantages: requires more cable than bus topology, failure of a hub/switch/concentrator disables nodes, more expensive than bus topology
(Network Topology | Advantages | Disadvantages) Mesh
- Advantages: extensive redundancy w/multiple connections, "self-configuring" when new nodes are added, "self-healing" to continue operations even when some nodes fail, more nodes increase speed - Disadvantages: still in development w/no standards, wireless is inherently unreliable, they are not completely seamless, moving nodes may result in failure
(Network Topology | Advantages | Disadvantages) Tree
- Advantages: point-to-point wiring for certain segments, vendor neutral - Disadvantages: length of a segment is limited by type of cable used, if backbone breaks an entire segment fails, more difficult to configure and wire
(Network Topology | Advantages | Disadvantages) Point-to-point
- Advantages: speed - Disadvantages: limited to 2 devices
Extended or Enhanced Entity Relationship (EER)
- a "languages" associated with information modeling, began as entity relationship diagramming - it is useful for those who process data better visually
future-proofing
- a benefit of cloud computing - computer hardware, software, and networking solutions begin their move toward obsolescence almost as soon as they are implemented, which can be costly - cloud computing moves the cost of updating certain parts of the technology form the customer to the cloud provider, a substantial benefit given the rapid pace of the growth of the Internet and other technologies
mobility
- a benefit of cloud computing - data streaming from the clouds allows for greater mobility because the Internet is accessible from multiple mobile devices, such as smart phones and tablets, PDAs, virtual desktops, or traditional laptops or PCs
dependability
- a benefit of cloud computing - the cloud is up and running 24 hours a day, 7 days a week, every day of the year, which ensures access to much-needed items such as business applications, financial data, and help desk personnel
security
- a benefit of cloud computing - the security of the cloud application is paramount for healthcare providers to be able to ensure the privacy of individually identifiable healthcare data - cloud computing service companies working with providers and others would be subject to all aspects of the HIPAA Privacy and Security Rules
cost of ownership
- a benefit of cloud computing - using cloud computing can be more cost effective than maintaining a server on-site - additional savings may be realized by reducing the number of employees and contractors needed for server maintenance, legacy system conversions, and upgrades
Service-Oriented Architecture (SOA)
- a distributed computing system framework that is used to integrate existing software components - a logical way of designing software in modular and flexible components, called services, that are often provided over the Internet or intranet
two-tiered model
- a model composed of several client computers that are used to capture and process the data - the servers in this configuration are powerful machines that have application software installed on them and in turn store the data captured by client machines
software
- a program that directs the hardware in the computer - two types: operating systems and application software
Database Management System (DBMS)
- a system installed locally on each machine that is designed to keep track of data locations and coordinate data modifications - creates and maintains a database - provides a method for adding or deleting data and also supports methods to extract data for reporting
private cloud
- accessible to only one customer and can be operated by the organization, a third party, or a combination of the two, at the customer's location or off-site - healthcare organizations, especially larger ones, may choose this option due to the need for patient information security or if sensitive research is being conducted
Platform as a Service (PaaS)
- at this intermediate level of capability consumers create or acquire applications using programming languages and tools supported by the cloud computing service provider - although the consumer does not control the underlying infrastructure they do exercise more control over the applications
physical models
- capture the hardware composition of a system in terms of computer and other devices - the model is a pictorial representation of the arrangement of the different pieces and connection points
audit log
- chronological record of electronic system(s) activities that enables the reconstruction, review, and examination of the sequence of events surrounding or leading to each event or transaction from its beginning to its end - includes who performed what event and when it occurred
unstructured data
- data typed into a text box - harder to index for database searches and cannot be separated into individual components like the structured data
three-tiered architecture
- expands on the 2-tier system with the addition of an application server that contains the software applications and the business rules - clients in this architecture are called "thin clients" because most of the processing is done on the server, and the client has very little software installed on it
Virtual Private Networks (VPNs)
- extend the firewall protection boundary beyond the local intranet by the use of cryptographically protected secure channels at the IP level - a VPN is a private network that uses a public network (usually the internet) to connect remoted sites or users together privately
healthcare-associated infections (HAIs)
- infections acquired in a healthcare setting that are associated with the use of indwelling medical devices, surgical procedures, and environmental contamination - 1 million HAIs reported in the US healthcare system each year
firewall
- monitors and controls all communication into and out of an intranet - it is implemented by a set of processes that act as a gateway to a network applying the organizational security policy
mobile computing
- providing healthcare with mobile devices, which include smart phones, tablets, PDAs, and other portable wireless devices - quickly emerging as a technology infrastructure challenge for healthcare organizations
What is the prevalent Internet protocol set utilized for implementing the OSI model? By whom was it developed?
- the Transmission Control/Internet Protocol (TCP/IP) - developed by the Department of Defense
terminal-to-host
- the application and any data stay on a host computer with the user connecting either via a dumb terminal or using terminal emulation software on a personal computer to connect as if the user is on a dumb terminal - sometimes this arrangement is also termed a thin client, with most of the actual processing taking place on a central computer
Software as a Service (SaaS)
- the highest level of cloud computing service models - enables access to the cloud computing provider's applications via a variety of devices, usually through an interface such as a web browser
topology
- the network's physical layout - types of cabled network topologies include point-to-point, star, bus, tree, or ring
public cloud
- this cloud is open to the general public and owned by an academic institution, the government, or some other organization for the benefit of the public - the owner or a third party or some combination thereof can operate it, at any location
Infrastructure as a Service (IaaS)
- this is the most minimal level of cloud computing where the infrastructure is provided, but the consumer controls the customer controls the operating systems, storage, and applications - the consumer may also have control over networking components such as the firewall
Open System Interconnection Model (OSI)
7-layer model presenting the protocol layers that a typical data packet traverses beginning with the electronic signal that starts the source data transmission, and ending with the application layer in the destination application on a PC or server that receives the transmitted data packet and translates i into meaningful data for display
What are the 4 layers to the TCP/IP model?
Application Layer Transport Layer Internet Layer Network Interface Layer
Where can ROM be found?
In the computer chip
What are the 7 layers of the open system interconnection system?
Layer 7: application layer (receives data) Layer 6: presentation layer Layer 5: session layer Layer 4: transport layer Layer 3: network layer Layer 2: data link layer Layer 1: physical layer (sends electronic data)
T/F Audit files may be subpoenaed and examined to determined if fraudulent activities occurred.
True
T/F Distributed information systems are difficult to develop due to their complex and decentralized nature, basic safety (and security) requirements, as well as the need to achieve consistently high performance across a wide range of deployment settings.
True
middleware
a bridge between two applications or the software equivalent of an interface
Clinical Data Repository (CDR)
a central database that focuses on clinical information
distributed system
a collection of independent computers connected through a network and managed by system software that enables the computers to coordinate their activities and to share system resources such that the users perceive the system as a single, integrated system
Unified Modeling Language (UML)
a common data-modeling notation used in conjunction with object-oriented database design
Wide Area Network (WAN)
a computer network that connects devices across a large geographic area
ergonomics
a discipline of functional design associated with the employee in relationship to his or her work environment, including equipment, workstation, and office furniture adaptation to accommodate the employee's unique physical requirements so as to facilitate efficacy of work functions
file server
a distribution method where the system runs entirely on the end user's workstation and transfers entire files
architectural models
a framework or structure for the flow of data and information within information
cloud computing
a model for enabling ubiquitous convenient, on-demand network access to a shared pool of configurable computing resources (such as networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction
client-server
a network distribution method that involves multiple servers dedicated to different functions with workstations running the application and retrieving data from a server as needed
Local Area Network (LAN)
a network that connects various devices together via communications wtihin a small geographic area such as a single organization
Hypertext Markup Language (HTML)
a standardized computer language that allows the electronic transfer of information and communications among many different information systems
decentralized
a system in which the processing functions are split or distributed, among one or more machines in the network system
centralized
a system in which the systems processing functions occur on a single computer
Check Your Understanding 4.3 2. Which network design connects various computers across one state so that they can communicate? a. WAN b. VPN c. LAN d. firewall
a. WAN
Check Your Understanding 4.1 1. What is the term for the physical part of a computer system that includes the monitor, keyboard, and mouse? a. hardware b. software c. operating system d. computer language
a. hardware
Check Your Understanding 4.1 4. Architectural models are used for information systems to: a. provide a framework or structure for the flow of data and information within systems b. determine the hardware necessary for the system c. help technicians isolate problems in the system d. assess quantitative results of evaluation data
a. provide a framework or structure for the flow of data and information within systems
Check Your Understanding 4.2 2. This network design is more expensive than a hub; however, it is easier to install. It is what type of network? a. star b. mesh c. tree d. bus
a. star
Check Your Understanding 4.2 1. What is a non-cabled method for computer communications using microwaves or radio waves called? a. wireless b. fiber optic c. twisted pair d. coaxial
a. wireless
broad network access
any capabilities available over the network can be accessed by a wide variety of interface devices (laptops, smart phones, and so on) using standard mechanisms
on-demand self-service
anyone with the appropriate permissions can make use of the resources without additional intervention
Check Your Understanding 4.2 9. What is the term for the natural laws that govern work? a. ethics b. ergonomics c. economics d. procedures e. processes
b. ergonomics
Check Your Understanding 4.1 3. What is permanent memory that stores the applications installed by a user, such as Microsoft Word? a. ROM b. hard disk c. RAM d. CPU
b. hard disk
resource sharing
being able to ue the hardware, software, or data anywhere in the system
Check Your Understanding 4.3 1. Which network design connects various devices in one hospital building so that they can communicate? a. WAN b. VPN c. LAN d. firewall
c. LAN
Check Your Understanding 4.1 2. What is temporary memory used by a laptop to perform application software tasks? a. ROM b. hard disk c. RAM d. CPU
c. RAM
Check Your Understanding 4.2 3. What is a private network that uses a public network (usually the internet) to connect to remote sites or users together privately? a. extranet b. FTP c. VPN d. SFTP
c. VPN
Check Your Understanding 4.2 7. According to HIPAA, what are facilities required to have for mobile devices? a. adequate power supply b. correct network architecture c. a separate risk management plan d. a policy forbidding Bring Your Own Device
c. a separate risk management plan
Check Your Understanding 4.1 5. Which of the following is not a goal of Service-Oriented Architecture? a. build information systems that enable businesses to reuse existing assets effectively b. support changes that will occur in the business and its needs c. create new assets d. ensure services are delivered effectively
d. ensure services are delivered effectively
Check Your Understanding 4.2 8. Which of the following would decrease the usability of a new Clinical Data Repository? a. develop workflow reports as they relate to the CDR b. review reports of other users of the same system c. survey users from systems testing activities d. exclude users from systems testing activities
d. exclude users from systems testing activities
Check Your Understanding 4.3 3. Which device monitors and controls all data transmission in and out of Valley General Hospital? a. WAN b. VPN c. LAN d. firewall
d. firewall
Check Your Understanding 4.2 5. Decisions regarding mobile computing should be made a. after new technology emerges b. after IT personnel tests the product c. when users demand it d. following a thorough risk anaylsis
d. following a thorough risk anaylsis
Check Your Understanding 4.2 10. Which is the main goal of creating ergonomic office environments? a. provide an up-to-date work place b. color coordinate the office furniture c. spend money leftover in the annual budget d. increase users' comfort as they perform their daily activities e. ergonomics
d. increase users' comfort as they perform their daily activities
Check Your Understanding 4.2 6. According to the DHHS, the majority of all healthcare data breaches affecting over 500 users involved which devices? a. servers b. desktops c. printers d. mobile devices
d. mobile devices
Check Your Understanding 4.2 4. What is the information distribution system that is the most widely employed in information systems? a. internet b. client-server c. peer-to-peer d. network
d. network
ergonomic work environment
designed to increase the workers' comfort as they go about the daily activities
Business Process Simulation (BPS)
designing a model of a real system and conducting experiments with this model for the purpose of either understanding the behavior of the system or of evaluating various strategies for the operation of the system
openness
flexibility to extend and improve the existing system with minimal impact
Enterprise Knowledge Development (EKD)
focused on managing technology, information, and knowledge across and organization
structured data
generated when the use selects data from a predefined selection of data on a webpage dropdown, radio button, or check box
central processing unit (CPU)
hardware that mimics the human brain as it directs the electrical circuits in teh computer to perform math, make logical comparisons, and store calculation results in long-term RAM
computers on wheels (CoWs)
mobile notebook computers on rolling carts that are used by clinical personnel
examples of input peripherals
mouse, keyboard, touch screen, microphone, bar code reader, web camera
Read Only Memory (ROM)
permanent memory that can be read from but not changed by any applications' or users' actions
examples of output peripherals
printers, speakers, digital cameras, network cards
concurrent processes
processes that run simultaneously and access shared resources such as databases
information infrastructure
processing, tools, and technologies to support the creation, use, transport, and storage of information
rapid elasticity
service is provided on demand, meaning that more can quickly be provided when needed and reduced just as fast, so the consumer only pays for what they need and use
fault tolerant
systems that are highgly available and remain in operation even when hardware, software, or network failures occur
Random Access Memory (RAM)
temporary memory used when a software application is in use or when the ocmputer starts up
scalability
the ability to support growth while maintaining hte same level of service
resource pooling
the cloud computing provider resources serve multiple consumers, usually independent of location, though these can be specified by the customer
transparency
the end user sees the distributed system as a single machine
hard disk
the permanent memory of a computer that stores installed application software, files created by the user, and the operating system
computer hardware
the physical pieces like the monitor, keyboard, mouse, printer, and scanner
hybrid cloud
this consists of two totally separate cloud infrastructures (private, community, or public) that are unique, but share standardized or proprietary technology facilitating data and application portability
measured service
use of resources in the cloud can be monitored, controlled, and reported, allowing for better management
terminal emulation software
used on a personal computer to allow a user to connect to a host as if the user is on a dumb terminal
Electronic Document Management System (EDMS)
utilized to manage the plethora of electronically stored images and documents
wireless network
when a network is created using non-cabled communication methods to connect the computers and other resources