Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Question
____________________________ guide health informaticists in completing user-centered design processes, usability tests, IT adoption evaluations and usability research.
Answer
This answer is hidden. It contains 203 characters.
Related questions
Q:
Which one of the following passwords provides the most information and system security?
1. StJohns3821
2. p#3J24q7
3. p#5N24p7#hN5
4. p#3J24q7?hN5
Q:
An overlay occurs when one individual is assigned in the master patient index to another individual's health record. A health care facility has discovered that an overlay has occurred resulting in invalid data being stored in key identifying fields. Which of the following information security areas does this breach affect?
1. Survivability
2. Integrity
3. Availability
4. Inadvertent disclosure
Q:
Which of these is accurate about the Health Insurance Portability and Accountability Act (HIPAA) Security Rule and the use of technology?
1. Does not specify the use of particular technology
2. Refers to the Joint Commission standards for technology
3. Specifies the utilization of HIPAA approved technology
4. Provides a monthly Web-based list of approved technology
Q:
Which of the following best represents the purpose of training evaluation?
1. Training should be evaluated after the fifth session.
2. Training evaluation is necessary after the class.
3. Training evaluation alters methodology.
4. All super users have the opportunity to evaluate the training process.
Q:
The _________________ of an information systems training evaluation strategy is to collect subjective participant feedback about the learning experience, identify pre- and post-training skill gaps, and measure knowledge and performance of the stated learning objectives.
Q:
Which of the following describes the philosophical differences between the trainer's and educator's role?
1. Trainers are concerned with outcomes only whereas educators are concerned strictly with the educational process.
2. Trainers focus on behavior change through skill acquisition while concentrate on learning, thinking, and problem solving as a way to change behavior.
3. Any employee can be a trainer whereas an individual must have an advanced degree to be an educator.
4. Trainers rely on skill acquisition through learning, thinking, and problem solving as a way to change behavior, while educators rely on behavioral psychology which focuses on behavior change.
Q:
Which of the following are specific factors to consider when selecting a training method?
Standard Text: Select all that apply.
1. Time required to develop program
2. Cost of development and training
3. Application training strategies
4. Learning styles of trainees
5. Learning retention strategies
Q:
Among the following, which defines the process for determining health care worker information systems training needs?
Standard Text: Select all that apply.
1. User classes are used to refine the types of training courses needed for system implementation.
2. End-users are identified and grouped by job class responsibilities.
3. Training needs of each job class are determined according to what functions each end-user will perform.
4. Training is delivered based upon what administrators decide to automate first.
5. User class is defined and categorized as the personnel who perform similar functions.
Q:
The second step in continuity planning is the development of the plan itself. This step determines the probabilities of all types of disasters, their impact on critical functions, and which of the following other concerns?
1. Business impact analysis
2. Systematic evaluation
3. Factors necessary to restore services
4. Policies, procedures and vendor contracts
Q:
The Joint Commission suggests that organizations conduct at least how many emergency drill(s) per year?
1. One
2. Two
3. Three
4. Four
Q:
The HIPAA security rule requires continuity planning and disaster recovery processes for protected health information. Which of the following activities are required in order to safeguard protected patient information?
Standard Text: Select all that apply.
1. Lowering security requirements during a disaster
2. Development of disaster recovery processes
3. Establishment of a continuity plan
4. Creation, access, storage, and destruction of manual records
5. Give access codes and usernames to emergency personnel
Q:
What is metadata?
1. Data stored off site in a cold storage facility
2. A set of data that provides information about how, when, and by whom data are collected, formatted, and stored
3. A backup copy of all data within an organization
4. A set of data that is transferred electronically over high-speed telephone lines to another site and set to expire at the correct time
Q:
The 24-hour-a-day, 7-days-a-week operations of health care providers make continuity of services essential. What is the first line of defense in providing the continuous systems availability that is required in a health care setting?
1. Adequate firewall protection
2. Software redundancy
3. Installing anti-virus software
4. Hardware redundancy
Q:
The Magnet Recognition Program, while not an accrediting body, is very much like an accrediting body because it provides an assurance of quality and recognizes the essential role that information systems play in supporting that process. Which of the following databases is used to measure quality?
1. American Nurses Associations National Database of Nursing Quality Indicators (NDNQI)
2. Joint Commission Standards of Information Technology
3. National American Nurses standardized databases
4. American Medical Association Taxonomy
Q:
_____________determines whether providers receive funding. It also serves to enhance provider image, instills confidence in the quality of services rendered, and attracts qualified professionals. This process has direct implications for how documentation and information systems are structured.
Standard Text:
Q:
Which of the following organizations cannot perform accreditation and establish standards for health care delivery in the United States?
1. The Joint Commission
2. Commission for Accreditation of Rehabilitation Facilities (CARF)
3. Nursing Administrative Quarterly (NAQ)
4. The National Committee for Quality Assurance (NCQA)
Q:
The role of the informatics nurse is important to the success of the implementation of the EHR. Which of the following statements is true about the expanded role of the informatics nurse?
1. The informatics nurse has the responsibility of maintaining the compliance procedures of the health care setting.
2. The informatics nurse has the responsibility of analyzing the coding system.
3. The informatics nurse has the responsibility to serve as the liaison between physician and patient and physician and agency.
4. The informatics nurse has the responsibility of creating meaningful use policies.
Q:
Implementing an electronic health record in a small primary care practice can be cost prohibitive. To assist in the cost of the endeavor, the government has done which of the following?
1. Provided loans to physicians to purchase technology
2. Offered physicians stipends if they use the equipment correctly
3. Has given financial aid to larger practices to purchase equipment
4. Has given physicians the equipment to convert to electronic health records
Q:
Which of the following is true about the sustainability of the HIE?
1. Sustainability discussions occur after the implementation phase.
2. Sustainability is no longer an issue in HIE.
3. A system that is not sustainable is not an effective one.
4. Sustainable technology is not cost effective.
Q:
_________________ and health systems with nursing homes, hospice, homecare, and clinics integrated with hospitals are able to exchange with standard content and identifiers adopted across settings.
Q:
Which of the following is not a PHR concern?
1. Insurance claims
2. Privacy
3. Portability
4. Accuracy of data
Q:
Which of the following are considered disadvantages of the PHR?
Standard Text: Select all that apply.
1. E-literacy
2. Lack of access in poor and rural regions
3. Patient satisfaction
4. Cost
5. Enhanced therapeutic alliances
Q:
The largest health system to deploy a PHR in the United States is __________________:
Q:
Multiple benefits have emerged from the use of structured terminologies within health care records. Which of the following are considered benefits of the health information technology (HIT)?
Standard Text: Select all that apply.
1. Accurate, consistent meaning of data is collected and shared across the health care system.
2. A plethora of data can be entered into the system manually.
3. Clinical terminology enables the capture of data at the level of detail necessary for patient care documentation.
4. Standardization in nursing documentation supports research across settings on patient outcomes and interoperability.
5. Patient identification and outcomes are clearly shared throughout the systems.
Q:
The use of SNOMED CT within electronic health records has multiple benefits. Which of the following are considered benefits of SNOMED CT?
Standard Text: Select all that apply.
1. Provides interoperable data collection that can be analyzed and used for evidence-based practice models
2. Provides interoperable data collection that can be analyzed and used for decision support rules
3. Provides interoperable data collection that can be analyzed and used in reporting quality measures
4. Provides interoperable data collection that can be analyzed and used for medication renewals
5. Provides interoperable data collection that can be analyzed and used for administrative billing
Q:
______________________________ is a globally recognized controlled health care vocabulary that provides a common language for electronic health applications.
Q:
The American Nurses Association established criteria for recognizing standardized terminologies. The terminologies must meet established criteria to be approved. Which of the following are instrumental in the approval process?
Standard Text: Select all that apply.
1. Outcome identification
2. Diagnosis
3. Problem solving
4. Decision making
5. Nursing process data elements
Q:
The goals of implementing the EHR in all health care systems are fraught with a number of roadblocks. The largest barrier facing most institutions is which of the following?
1. The lack of fully trained professional staff
2. A technology committee that cannot agree on the institution's needs
3. Indecision regarding the choice of vendors
4. Cost
Q:
There is a global concern that not all populations or subpopulations have the resources and capabilities to utilize or benefit from communication using technology and Internet. This phenomenon is called _____________.
Q:
The use of the Internet for health information has grown exponentially in the past few years. There are a multitude of reasons for individuals to check online before contacting their health care provider. Which of the following statements is a major reason why people turn to the Internet and websites for health related information?
1. Fewer people have health care insurance.
2. The long lines and waiting time in healthcare providers' offices prevent individuals from making appointments.
3. People refuse to pay the co-pay when they can find out about their illness for free.
4. People are reluctant to bother their primary healthcare provider.