Presentation is loading. Please wait.

Presentation is loading. Please wait.

HI150 – Automation of Health Information Unit 2 Seminar.

Similar presentations


Presentation on theme: "HI150 – Automation of Health Information Unit 2 Seminar."— Presentation transcript:

1 HI150 – Automation of Health Information Unit 2 Seminar

2 Strategies for converting paper-based charts to EHR

3 Converting Existing Records Conversion strategies: Total conversion (pp. 42-3) Incremental conversion (p. 43) Hybrid conversion (pp. 43-4)

4 Messaging standards used with EHR

5 The Importance of Clinical Standards For shared information to be useful, computer systems must be interoperable No mandatory standards for clinical data exist yet.

6 Clinical Information Standards Clinical vocabularies – Systematized Nomenclature of Medicine Clinical Terms (SNOMED-CT) – Logical Observation Identifiers Names and Codes (LOINC) – U.S. National Library of Medicine Unified Medical Language System (UMLS)

7 Clinical Information Standards Classification systems – International Classification of Diseases, Ninth Revision (ICD-9) – International Classification of Diseases, Tenth Revision (ICD-10) – Current Procedural Terminology (CPT) – Healthcare Common Procedures Coding System (HCPCS), Level II

8 Clinical Information Standards Messaging Standards – Health Level Seven (HL7) – Digital Imaging and Communications in Medicine (DICOM) – Picture Archiving and Communication System (PACS) – National Council for Prescription Drug Program (NCPDP) – The Institute of Electrical and Electronics Engineers 1073 (IEEE1073)

9 Entering live data into EHR system

10 Entering Live Data Methods: dictation and transcription clinical templates voice recognition scanning

11 Bits and bytes and how they are measured

12 Bits and Bytes: The Language of Computers Bit – Binary digit – 0 or 1 Byte – 8 bits Each letter, number, and character = a string of eight 0s and 1s

13 How Much Is a Byte?

14 Data vs. Information Data: Representation of a fact, figure, or idea Information: Organized, meaningful data

15 Using firewalls and virus protection programs

16 Identity Theft Thief steals your name, address, social security number, and/or bank account and credit card information Can result in credit problems and refusal of healthcare service if policy limits are exceeded Can be stolen using computer, theft of wallets and purses, mail, credit statements, or pretense of being a bank or credit company official

17 Preventing Identity Theft 1.Never reveal password or PIN. 2.Never reveal personal information without first verifying you are dealing with a legitimate representative. 3.Create hard-to-guess passwords. Use a combination of letters and numbers Avoid using obvious passwords 4.When shopping online, beware of unfamiliar merchants. 5.If you are a victim of identity theft, freeze credit history or place an extended fraud alert.

18 Computer Safeguards: Firewalls Software programs or hardware designed to close logical ports to invaders – A firewall is built into Windows Vista. – More robust firewalls are available from other vendors. – Firewalls are critical if you have an always-on broadband connection.

19 Protecting a Wireless Network Wireless network range doesn’t stop at the property line. Default device and network ID settings allow intruders to enter the network. Internet bandwidth can be stolen. Computers can be vulnerable to hacker intrusion and takeover.

20 Computer Threats: Viruses A virus is a program that attaches itself to another program and spreads itself to other computers. Viruses are hidden within the code of a host program.

21 How Does a Computer Catch a Virus? Viruses copy themselves Infect a file on your computer Spread by sharing disks or flash drives E-mail attachments are the most likely source of a virus

22 What Viruses Do Replicate themselves – Slow down networks Secondary objectives – Display annoying messages – Delete files on the hard drive – Change computer settings

23 Types of Viruses Boot-sector viruses – Replicate themselves in the boot sector of the hard drive Logic bombs – Activate when certain conditions are met Time bombs – Triggered by the passage of time or on a certain date Worms – Travel between systems through networks

24 Types of Viruses Script viruses – Hidden on Web pages as mini programs Macro viruses – Attached to documents – Series of commands E-mail viruses – Use e-mail address books to distribute the virus Encryption viruses – Compress files using a complex encryption key – User must pay to get the files unlocked

25 Virus Classifications Polymorphic viruses – Periodically rewrite themselves to avoid detection Multipartite viruses – Infect multiple file types Stealth viruses – Erase their code from the hard drive and reside in the active memory

26 Antivirus Software Programs designed to detect viruses – Scan files looking for virus signatures (unique code) – Provide options for deleting or fixing infected files – Inoculate files against further infection Detects known viruses Needs to be updated frequently


Download ppt "HI150 – Automation of Health Information Unit 2 Seminar."

Similar presentations


Ads by Google