Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole.

Slides:



Advertisements
Similar presentations
Computers in Health Care Hospital Information Systems.
Advertisements

Technology in Medicine n Computers in health care Medical information systemsMedical information systems Administrative applicationsAdministrative applications.
© 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
©2013 Delmar, Cengage Learning. All Rights Reserved. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in.
© 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
Computer Technology in Health Care
Chapter 10 Privacy and Security McGraw-Hill
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Copyright © 2007 by Thomson Delmar Learning. ALL RIGHTS RESERVED.1.
Unit 11 Computers in Health Care
New Data Regulation Law 201 CMR TJX Video.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
The Office Procedures and Technology
Ch  ICT is used in many ways in the provision and management of healthcare services:  Hospital administration  Medical training  Maintenance.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 8 The Personal Health Record.
Copyright ©2012 Delmar, Cengage Learning. All rights reserved. Chapter 11 Operating Computers and Office Equipment.
Copyright © 2012 Wolters Kluwer Health | Lippincott Williams & Wilkins Chapter 19: Computers and Other Technology.
Course ILT Computers and society Unit objectives Identify the main uses of computers in daily life, and identify the benefits of using Describe.
Your Interactive Guide to the Digital World Discovering Computers 2012.
1.1 System Performance Security Module 1 Version 5.
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
Health Information Technology Basics January 8, 2011 by Leola McNeill adapted from Information Technology Basics by June 2009, Kayla Calhoun & Dr. Frank.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
Introduction Greatest advancement in information processing since invention of printing press Use of computers a necessity in health care.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Information Collection, Storage and Sharing. The use of computers have made it easier than before, to collect, store and share large amounts of information.
Chapter 2 Standards for Electronic Health Records McGraw-Hill/Irwin Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 7 Introduction to Practice Partner Electronic Health Records.
IT Application in Health Care
Introduction to Engineering and Technology Concepts Unit Five Chapter Two – Medical Technologies.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
DIAGNOSTIC SERVICES What They Do * Perform tests or evaluations that aid in the detection, diagnosis, and treatment of disease, injury or other physical.
Technology in Medicine
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 5 Personal Health Records Electronic Health Records for Allied.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Unit 11 Computers in Health Care
© 2012 Cengage Learning. All Rights Reserved. Objective 2.04 Understand applications and issues of technology SLIDE 1 Objective 2.00 Understand the nature.
© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 12 Electronic Media and Image Records 1 © 2016 Cengage Learning ®. May not be scanned, copied.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Copyright © 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole.
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
Computers in the Ambulatory Care Setting
Managing Windows Security
Electronic Health Records (EHR)
Computer Technology in Health Care
Technology in Health Care
UNIT 19 Data Security 2.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Protecting Your Information Assets
Technology in Healthcare
HOW DO I KEEP MY COMPUTER SAFE?
Unit# 5: Internet and Worldwide Web
Unit 4 IT Security Kerris Davies.
Computers in the Ambulatory Care Setting
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Technology in Medicine
Computers and Technology in Health Care
G061 - Network Security.
Presentation transcript:

Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Chapter 12 Computers and Technology in Health Care

Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12:1 Introduction Computer literacy is a health care necessity – Information systems – Diagnostic testing – Treatment – Patient monitoring – Educational tools – Research – Communication

Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part Information Systems Word processing Compiling databases Creating EHR Scheduling Maintaining financial records

Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part Information Systems Maintaining inventory Developing spreadsheets

Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part Information Systems Health care providers use of technology – Health information technician – Physician – Pharmacist – Dietitian – Laboratory technician – Environmental service worker

Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Diagnostics Tests to diagnose or rule out disease – May be invasive or noninvasive Electrocardiogram (ECG) Stress test Echocardiograph Computerized tomography (CT)

Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Diagnostics Magnetic resonance imaging (MRI) Positron emission tomography (PET) Ultrasonography Digital radiography Computer-aided detection (CADe) or computer-aided diagnosis (CADx)

Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part Treatment Lasers Robotic surgery or computer-assisted surgery Image-guided surgery (IGS) Radiation therapy Computer-aided design (CAD)

Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12:4 Treatment Ultrasound Hearing assistive technology Automated drug dispensing systems (ADDS) Automated storage and dispensing cabinets or carts (ADCs)

Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12:5 Patient Monitoring Pulse oximeters Fetal heart monitors Incubators with computer-controlled photo (light) therapy Electrical impedance tomography (EIT) Global positioning satellites (GPS)

Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12:6 Education Computer-assisted instruction (CAI) Patient-education software/DVDs Internet for distance learning and continuing education units (CEUs)

Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12:7 Research National Library of Medicine database, MEDLINE – Free access at PubMed MedlinePlus Bioinformatics – Rapid scientific progress through information sharing

Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12:8 Communication Networks – Computers linked together in health care facilities Internet – Links computers located around the world Electronic mail ( )

Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12:8 Communication Telemedicine for medical/health care use Electronic medicine for contacting physicians – Web visit between patient and physician Telepharmacies speed up the process of dispensing medicines

Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12:8 Communication Online or virtual communities – Social networks – Blogs – Online discussion groups – Automatic mailings such as LISTSERVE

Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12:9 Using the Internet Network of computer users Medical updates Information on new procedures Aid in making diagnoses Used for expediency in organ transplants

Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12:9 Using the Internet Defined as a database of Internet files Parts of search engines or service – Search program – Index – Retrieval program

Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12:9 Using the Internet Search engines – America On Line – Ask – Bing – DuckDuckGo – Google – Lycos – Yahoo

Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12:9 Using the Internet Search limitations – Identify key words – Use an advanced search – Use different search engines – Evaluate information sources

Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12:10 Computer Protection and Security Health care computerized records must be safe and secure Loss of information can result from electrical surges, power outages, viruses, hackers

Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12:10 Computer Protection and Security Protect computers from electrical surges and power outages – Uninterrupted power supply (UPS) – Daily backups onto optical disks, flash drives, external hard drives

Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12:10 Computer Protection and Security Protect computers from loss by fire, natural disasters, or theft – Storage of data in a safe and secure external location – Computer security company can perform and store backups

Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12:10 Computer Protection and Security Viruses are programs that – Alter the operation of computer programs – Erase or scramble data on a computer – Allow access to information on a computer Installation of antivirus software will provide protection

Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12:10 Computer Protection and Security Other computers, outside programs, and hackers can gain access Firewalls are needed for protection Network database computers only within the health care facility Use a dedicated computer to send information to outside sources

Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12:10 Computer Protection and Security Confidentiality is of utmost importance for patient records Guidelines have been established Privacy Rule of the Health Insurance and Portability Act (HIPAA)

Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12:10 Computer Protection and Security Wireless technology creates security risks Use a security code to prevent unauthorized access Encryption programs can secure information Do not send personal information using a public wireless or WiFi connection

Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12:10 Computer Protection and Security Passwords must be kept confidential – Do not let others see the keyboard when the password is entered Others should not be able to see a screen if confidential patient information is visible Clear monitor screens before leaving work area

Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12:10 Computer Protection and Security Do not open s or files from unknown parties Follow instructions if a virus or firewall alert occurs Discarded hard copies must be shredded