American Recover and Reinvestment Act (ARRA)
Authorized INCENTIVE PAYMENTS to specific types of hospitals and healthcare professionals for adopting and
... [Show More] using interoperable Health Information Technology and EHR's. ARRA provides economic stimuli and incentives for the adoption of EHRs.
Admission-Transfer-Discharge (ADT) System
Classified under the hospitals' administrative info system. It's one of the foundational systems that allows operational activities such as bed placement, transportation coordination, room readiness, and the general coordination of services focused on the patient's phase of movement. Tracks a patient's activities and location from admission to discharge.
Analytical Science
Uses a variety of methods and instruments to answer 2 basic questions: What do I have? How much of it do I have? Environment, pharmacy, safety & security, fraud detection, and healthcare diagnostics.
Asynchronous Applications
Patient-centered and allows consumers to participate in their own care by using designated health technology to share health metrics and data with their healthcare provider via technology (remote patient-monitoring - the use of devices to capture patient data at one location and then transmit it electronically to healthcare professionals at a different location, allowing the review of data for clinical decision-making, i.e. MobileHealth).
Audit Trails
Software that is used for detecting security violations, performance problems, and flaws. Records activity by users and system. Goal is to improve data integrity. Audit trails are only one of the ways to ensure data integrity. An audit trail must contain the name of the user, the application triggering the audit, the workstation, the specific document, a description of the event being audited, and the date and time to determine the integrity of data.
Authentication
Action that verifies the authority of users to receive specified data.
Barcode Medication Administration
MANDATED BY FDA
Benchmark
The continual process of measuring services and practices against the toughest competitors in the healthcare industry. Comparing the performance of an organization or clinician to others.
Big Data
Very large data sets that are beyond human capability to analyze or manage without the aid of information technology. Big data is considered data originating from very large data sets that help identify patterns and trends. Big data cannot be managed without the use of technology to analyze its output.
Clinical Decision Support System (CDSS)
Supports healthcare practitioners in making patient-care decisions by integrating patient data with current clinical knowledge. CDSS is technology that provides recommendations for care and must be balanced with professional judgment, not used in place of it.
Clinical Information System
Software used to access client data, plan, implement, and evaluate care. May be specific to certain departments: lab, radiology, pharmacy, or particular patient populations. Provides patient centric decision-making functionality to help guide a nurse with decision-making while caring for a patient. Acquires patient data so that healthcare professionals can review it and use the information to deliver care.
Computer Literacy
Familiarity with the use of personal computers. Computer literacy is defined as the knowledge and ability to use computers and technology efficiently. Computer literacy allows patients to interact with the internet.
Computerized Provider Order Entry (CPOE)
The prescriber's decisions to enter orders and immediately share the orders with appropriate health professionals who execute the orders and departments that need to dispense, schedule, or immediately deliver services to patients.
Confidentiality
Unspoken understanding that private information shared in a situation, in which a relationship has been established for the purpose of treatment or delivery of services will remain protected.
Configurability
Refers to the extent that a given software product can be adapted or changed to meet a user's preference.
Connected Health
Model or platform by which technology assisted healthcare is delivered between at least two points, involving either synchronous or asynchronous exchange.
Consolidated-Clinical Document Architecture (C-CDA)
Allows interoperability of health information exchange between hospital systems.
Consumer Health Informatics (CHI)
Use of electronic information and communication to improve medical outcomes and health-care decision making from the patient/consumer perspective. Three barriers include: Privacy issues, cognitive disabilities, low health literacy. Five examples: Personal Health Records, Telehealth, Mobile Health, Games for Health, and Health 2.0. Telehealth is defined as healthcare at a distance through the use of technology that connects the patient and the clinician in real time.
Continuity of Care Record (CCD)
Snapshot of a person's health and healthcare to a provider who does not have access to the person's EHR.
Cumulative Index to Nursing and Allied Health Literature (CINAHL)
Primary database used for nursing literature.
Data
Collection of numbers, characters, or facts that are gathered according to some perceived need for analysis.
Data Analysis
The processing of data that identify trends and patterns of relationships.
Data Information Knowledge Wisdom (DIKW) Framework
Data are the most discrete components of the DIKW framework. They are mostly presented as discrete observations with little interpretation. Information is a continuum of progressively developing and clustered data. Relations and interactions are not yet evident in information alone. Knowledge is information that is processed and organized so that relations and interactions are identified. Wisdom is an appropriate use of knowledge to manage and solve human problems. Wisdom includes ethics or knowing why certain things or procedures should or should not be implemented in specific cases.
Data Integrity
Ability to collect, store, and retrieve correct, complete, and current data so that the data are available to authorized users when needed. Can be compromised by incorrect entry of information, data tampering, and system failure. Prevention by implementing security measures and audit trails. Data integrity is the state wherein data are uncorrupted, accurate, and valid.
Data Mining
Technique that look for hidden patterns and relationships in large groups of data using software. [Show Less]