Download presentation
Presentation is loading. Please wait.
Published byHoratio Bridges Modified over 8 years ago
1
HI150 – Automation of Health Information Unit 2 Seminar
2
Strategies for converting paper-based charts to EHR
3
Converting Existing Records Conversion strategies: Total conversion (pp. 42-3) Incremental conversion (p. 43) Hybrid conversion (pp. 43-4)
4
Messaging standards used with EHR
5
The Importance of Clinical Standards For shared information to be useful, computer systems must be interoperable No mandatory standards for clinical data exist yet.
6
Clinical Information Standards Clinical vocabularies – Systematized Nomenclature of Medicine Clinical Terms (SNOMED-CT) – Logical Observation Identifiers Names and Codes (LOINC) – U.S. National Library of Medicine Unified Medical Language System (UMLS)
7
Clinical Information Standards Classification systems – International Classification of Diseases, Ninth Revision (ICD-9) – International Classification of Diseases, Tenth Revision (ICD-10) – Current Procedural Terminology (CPT) – Healthcare Common Procedures Coding System (HCPCS), Level II
8
Clinical Information Standards Messaging Standards – Health Level Seven (HL7) – Digital Imaging and Communications in Medicine (DICOM) – Picture Archiving and Communication System (PACS) – National Council for Prescription Drug Program (NCPDP) – The Institute of Electrical and Electronics Engineers 1073 (IEEE1073)
9
Entering live data into EHR system
10
Entering Live Data Methods: dictation and transcription clinical templates voice recognition scanning
11
Bits and bytes and how they are measured
12
Bits and Bytes: The Language of Computers Bit – Binary digit – 0 or 1 Byte – 8 bits Each letter, number, and character = a string of eight 0s and 1s
13
How Much Is a Byte?
14
Data vs. Information Data: Representation of a fact, figure, or idea Information: Organized, meaningful data
15
Using firewalls and virus protection programs
16
Identity Theft Thief steals your name, address, social security number, and/or bank account and credit card information Can result in credit problems and refusal of healthcare service if policy limits are exceeded Can be stolen using computer, theft of wallets and purses, mail, credit statements, or pretense of being a bank or credit company official
17
Preventing Identity Theft 1.Never reveal password or PIN. 2.Never reveal personal information without first verifying you are dealing with a legitimate representative. 3.Create hard-to-guess passwords. Use a combination of letters and numbers Avoid using obvious passwords 4.When shopping online, beware of unfamiliar merchants. 5.If you are a victim of identity theft, freeze credit history or place an extended fraud alert.
18
Computer Safeguards: Firewalls Software programs or hardware designed to close logical ports to invaders – A firewall is built into Windows Vista. – More robust firewalls are available from other vendors. – Firewalls are critical if you have an always-on broadband connection.
19
Protecting a Wireless Network Wireless network range doesn’t stop at the property line. Default device and network ID settings allow intruders to enter the network. Internet bandwidth can be stolen. Computers can be vulnerable to hacker intrusion and takeover.
20
Computer Threats: Viruses A virus is a program that attaches itself to another program and spreads itself to other computers. Viruses are hidden within the code of a host program.
21
How Does a Computer Catch a Virus? Viruses copy themselves Infect a file on your computer Spread by sharing disks or flash drives E-mail attachments are the most likely source of a virus
22
What Viruses Do Replicate themselves – Slow down networks Secondary objectives – Display annoying messages – Delete files on the hard drive – Change computer settings
23
Types of Viruses Boot-sector viruses – Replicate themselves in the boot sector of the hard drive Logic bombs – Activate when certain conditions are met Time bombs – Triggered by the passage of time or on a certain date Worms – Travel between systems through networks
24
Types of Viruses Script viruses – Hidden on Web pages as mini programs Macro viruses – Attached to documents – Series of commands E-mail viruses – Use e-mail address books to distribute the virus Encryption viruses – Compress files using a complex encryption key – User must pay to get the files unlocked
25
Virus Classifications Polymorphic viruses – Periodically rewrite themselves to avoid detection Multipartite viruses – Infect multiple file types Stealth viruses – Erase their code from the hard drive and reside in the active memory
26
Antivirus Software Programs designed to detect viruses – Scan files looking for virus signatures (unique code) – Provide options for deleting or fixing infected files – Inoculate files against further infection Detects known viruses Needs to be updated frequently
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.