Ensuring the Quality and Best Use of Information

Slides:



Advertisements
Similar presentations
1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
Advertisements

DATA PROCESSING SYSTEMS
Organise Workplace Information
C6 Databases.
Database Management System MIS 520 – Database Theory Fall 2001 (Day) Lecture 13.
Auditing Computer-Based Information Systems
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Auditing Computer Systems
Managing Information Systems Information Systems Security and Control Part 1 Dr. Stephania Loizidou Himona ACSC 345.
MIS DATABASE SYSTEMS, DATA WAREHOUSES, AND DATA MARTS MBNA
Database Administration Chapter FOSTER School of Business Acctg. 420.
Chapter 3 Database Management
Database Management: Getting Data Together Chapter 14.
Introduction to Databases Transparencies
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
1 Introduction Introduction to database systems Database Management Systems (DBMS) Type of Databases Database Design Database Design Considerations.
Chapter 1 Introduction to Databases
Data Warehousing: Defined and Its Applications Pete Johnson April 2002.
Chapter 3: Storage Devices & Media ALYSSA BAO 1. 2 Solid State controls movements of electrons within a microchip Optical uses precision lasers to access.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Business Intelligence: Data and Text Management Instructor: Bajuna Salehe Web:
Software Development Unit 2 Databases What is a database? A collection of data organised in a manner that allows access, retrieval and use of that data.
Introduction to Databases and Database Languages
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
The Office Procedures and Technology
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
MIS DATABASE SYSTEMS, DATA WAREHOUSES, AND DATA MARTS MBNA ebay
Database Systems – Data Warehousing
Chapter 1 Introduction to Databases Pearson Education ©
1 California State University, Fullerton Chapter 7 Information System Data Management.
Chapter 6: Foundations of Business Intelligence - Databases and Information Management Dr. Andrew P. Ciganek, Ph.D.
David N. Wozei Systems Administrator, IT Auditor.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Chapter 7: Database Systems Succeeding with Technology: Second Edition.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Information Systems Security Operational Control for Information Security.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Information: Policy, Strategy and Systems Module Overview
C6 Databases. 2 Traditional file environment Data Redundancy and Inconsistency: –Data redundancy: The presence of duplicate data in multiple data files.
5-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Lecture # 3 & 4 Chapter # 2 Database System Concepts and Architecture Muhammad Emran Database Systems 1.
5 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 1 Introduction to Databases. 1-2 Chapter Outline   Common uses of database systems   Meaning of basic terms   Database Applications  
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Chapter 3 Databases and Data Warehouses: Building Business Intelligence Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
CAPE INFORMATION TECHNOLOGY – Unit 2
Chap1: Is there a Security Problem in Computing?.
MBA 664 Database Management Dave Salisbury ( )
Catholic University College of Ghana Fiapre-Sunyani INFORMATION TECHNOLOGY I Audrey Asante, Faculty of ICST Data Protection and Security Computers and.
CONTROLLING INFORMATION SYSTEMS
Introduction to Databases Dr. Osama AL Rababah. Objectives In this capture you will learn: Some common uses of database systems. The characteristics of.
Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Handbook of Informatics for Nurses and Healthcare.
© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
Information Security and Privacy in HRIS
Introduction to Databases
Data Validation & Security.
Information Systems.
Introduction to Databases Ashima wadhwa
Processing Integrity and Availability Controls
Database Database is a large collection of related data that can be stored, generally describes activities of an organization. An organised collection.
CAPE INFORMATION TECHNOLOGY – Unit 2
INFORMATION SYSTEMS SECURITY and CONTROL
Security of Data  
Chapter 17 Designing Databases
The Database Environment
Managing data Resources:
Presentation transcript:

Ensuring the Quality and Best Use of Information Chapter 3 Ensuring the Quality and Best Use of Information

Data Management Process of controlling the collection, storage, retrieval, and use of data to optimize accuracy and utility while safeguarding integrity Also known as business intelligence (BI)

How can we make the right decision without good data management?

Data Management Levels Data entry level System analysts help identify data needed and collection Method of collection Programmers create computer instructions that collect required data build the database Database is a file structure that support the storage of data in an organized fashion an allows data retrieval as meaningful information

Data Management levels Database administrator (DBA) oversees details of maintaining and using database Optimizing the use of the database

Data Warehouse Repository for storing data from several different databases so that it can be combined and manipulated to provide answers to complex analytic questions

Data Storage Online storage Offline storage Provides access to current data Rapid, using high-speed hard disk drives or storage space on the network Virtual drives Offline storage For data that are needed less frequently, or for long-term data storage of old client records Can be done on any secondary storage device CDs, DVDs, External HD,

Data Storage Considerations Speed/frequency of access needed Virtual drive vs. DVD Environmental conditions and hazards Temp., water, fire, magnetic fields Control of equipment and media Logical restriction Physical restrictions Contingency planning Backup copy 8

Data Storage Considerations Storage period for each record type Patient info should be stored for certain minimum length Media degradation DVD may degrade after few years, transfer data in case longer storage required Obsolescence of hardware and software Rapid advance in technology threaten the use of old tech. Eg. Floppy disk

Outsourcing Process by which an organization contracts with outside agencies for services Must consider costs Personnel Space Equipment Maintenance Expertise

Data Retrieval Process that allows the user to access previously collected, stored data Considerations Performance response: the ability of the system to respond to the user’s request Capacity—amount of data that can be stored and retrieved Security—protected against unauthorized access Cost: hardware, software, personnel

Data Exchange Growing expectation that information collected in one facility will be available to another E.g. a patient may have surgery in once center but have a follow up appointment at a satellite location

Data Mining Technique that uses software to look for hidden patterns and relationships in large groups of data E.g. in business used to identify the customers interest and marketing trends

Data Cleansing Procedure that uses software to improve the quality of data to ensure that it is accurate enough for use in data mining and warehousing Used to fix inconsistent entries, duplicate entries Typos, misspelling

Data Disposal Physical destruction Software destruction Secure disposal of documents containing PHI Shredding Deform/destroy storage media Software destruction Overwrite data

Chch. Of Quality information Timely: insurance info available immediately at a follow up visit Precise: abdominal surgery vs. specific name of the surgery Accurate: left vs right below knee amputation Numerically quantifiable: stage of ucler, cancer

Quality information Rapidly and easily available: pt in ER, allergies can be quickly retrieved from EMR past history Comprehensive: info about med include name dosage, frequency Clear: patient don’t like eggs vs. allergy from eggs Current: regular update

Threats to information quality Alteration of files Accidental or intentional change of data System alteration Adding of new function may result in data loss Viruses, Trojans, worms Damage, steal info

Threats to information availability Destruction of hardware or software, or even data Natural or manmade Interruption of power Loss of power  loss of data Denial of service Malicious software overwhelm a website  access denied Sabotage Intentional destruction of harware, software or data

Threats to confidentiality Failure to adhere to information policies Misuse of computer access Eavesdropping Unauthorized access to info Looing at the system data Improper handling of confidential data Unauthorized reception of wireless network technology transmissions