Foreword |
|
xlvii | |
Acknowledgments |
|
xlix | |
Part I: Healthcare and Information Technology in the United States |
|
|
Chapter 1 Healthcare Information Technology: Definitions, Stakeholders, and Major Themes |
|
|
3 | (18) |
|
|
|
|
|
The Explosion of Healthcare Information Technology |
|
|
4 | (2) |
|
New Network Complexity Requires New Standards for Data Sharing and Interoperability |
|
|
6 | (1) |
|
The Role of HIT in the Continuum of Healthcare |
|
|
7 | (1) |
|
The Increasing Volume and Shift to Value of Healthcare IT |
|
|
8 | (2) |
|
Increasing the Volume of EHRs |
|
|
9 | (1) |
|
Measuring the Value of Healthcare |
|
|
9 | (1) |
|
Preparing a Critical Mass of Certified Healthcare IT Technicians and Professionals |
|
|
10 | (2) |
|
The Roles of HIMSS and AHIMA in Support of Healthcare Information Credentialing, Education, and Training |
|
|
12 | (3) |
|
Healthcare Information and Management Systems Society (HIMSS) |
|
|
12 | (1) |
|
American Health Information Management Association (AHIMA) |
|
|
12 | (3) |
|
|
15 | (7) |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
18 | (3) |
|
Chapter 2 U.S. Healthcare Systems Overview |
|
|
21 | (28) |
|
|
U.S. Healthcare Delivery Organizations and Management Structures |
|
|
22 | (4) |
|
Private Medical Practices |
|
|
22 | (1) |
|
Health Maintenance Organizations (HMOs) |
|
|
22 | (1) |
|
Independent Practice Associations (IPAs) |
|
|
23 | (1) |
|
Preferred Provider Organizations (PPOs) |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
24 | (1) |
|
Public Health Departments |
|
|
25 | (1) |
|
Other Healthcare Organizations |
|
|
25 | (1) |
|
|
26 | (4) |
|
|
26 | (1) |
|
|
27 | (1) |
|
Long-term Care Facilities |
|
|
28 | (1) |
|
Home Care/Visiting Nursing Services |
|
|
29 | (1) |
|
Community/Population Care |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
30 | (3) |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
32 | (1) |
|
Acute Care vs. Chronic Care |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
33 | (2) |
|
Certification and Accreditation |
|
|
33 | (2) |
|
Healthcare Reform and Quality |
|
|
35 | (2) |
|
Costs-U.S. Expenditures Overall Compared to Other Countries |
|
|
35 | (1) |
|
Affordable Care Act (ACA) |
|
|
36 | (1) |
|
HITECH Meaningful Use Provision |
|
|
36 | (1) |
|
Medicare Access and CHIP Reauthorization Act of 2015 |
|
|
37 | (1) |
|
Healthcare Regulatory and Research Organizations |
|
|
37 | (4) |
|
|
38 | (2) |
|
|
40 | (1) |
|
|
41 | (9) |
|
|
41 | (2) |
|
|
43 | (1) |
|
|
44 | (5) |
|
Chapter 3 An Overview of How Healthcare Is Paid For in the United States |
|
|
49 | (22) |
|
|
The Nature of Health Insurance |
|
|
50 | (1) |
|
The Structure of Health Insurance |
|
|
50 | (1) |
|
Insurance in the United States |
|
|
51 | (14) |
|
|
52 | (1) |
|
Commercial (Private) Insurance in the United States |
|
|
53 | (1) |
|
|
54 | (2) |
|
|
56 | (2) |
|
|
58 | (7) |
|
|
65 | (8) |
|
|
65 | (2) |
|
|
67 | (1) |
|
|
68 | (3) |
|
Chapter 4 Healthcare Information Technology in Public Health, Emergency Preparedness, and Surveillance |
|
|
71 | (18) |
|
|
|
|
73 | (3) |
|
|
76 | (2) |
|
|
78 | (1) |
|
|
78 | (1) |
|
|
79 | (1) |
|
Clinical Information Standards |
|
|
80 | (1) |
|
Trends and What to Expect in the Future |
|
|
80 | (1) |
|
|
81 | (9) |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
84 | (5) |
Part II: Fundamentals of Healthcare Information Science |
|
|
Chapter 5 Computer Hardware and Architecture for Healthcare IT |
|
|
89 | (22) |
|
|
|
90 | (7) |
|
|
90 | (2) |
|
|
92 | (1) |
|
|
92 | (5) |
|
Cloud Computing, ASPs, and Client-Server EMR Systems |
|
|
97 | (1) |
|
|
98 | (9) |
|
Operating Systems and Hardware Drivers |
|
|
98 | (1) |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
101 | (1) |
|
|
101 | (1) |
|
Trends in Meeting Hardware Requirements |
|
|
101 | (2) |
|
Computer Asset Management |
|
|
103 | (4) |
|
|
107 | (5) |
|
|
107 | (2) |
|
|
109 | (1) |
|
|
110 | (1) |
|
Chapter 6 Programming and Programming Languages for Healthcare IT |
|
|
111 | (22) |
|
|
|
Languages and Virtual Machines |
|
|
112 | (1) |
|
|
113 | (1) |
|
|
114 | (1) |
|
|
115 | (3) |
|
|
118 | (2) |
|
Hypertext Markup Language (HTML) |
|
|
120 | (2) |
|
Extensible Markup Language (XML) |
|
|
122 | (2) |
|
Active Server Pages (ASP) |
|
|
124 | (2) |
|
PHP: Hypertext Preprocessor (PHP) |
|
|
126 | (2) |
|
Programming Languages and Development Environments for Mobile Health Application Development |
|
|
128 | (1) |
|
|
128 | (5) |
|
|
128 | (2) |
|
|
130 | (1) |
|
|
130 | (3) |
|
Chapter 7 Databases, Data Warehousing, Data Mining, and Cloud Computing for Healthcare |
|
|
133 | (36) |
|
|
|
133 | (4) |
|
|
135 | (2) |
|
Database Application Development Process |
|
|
137 | (8) |
|
Analyzing the Business Scenario and Extracting Business Rules |
|
|
137 | (1) |
|
Modeling Database: Entity Relationship Diagram Design and Normalization |
|
|
138 | (1) |
|
Creating a Physical Database Using Structured Query Language |
|
|
139 | (1) |
|
Implementing a Healthcare Database Application |
|
|
140 | (5) |
|
Database Administration and Security |
|
|
145 | (4) |
|
|
145 | (1) |
|
|
146 | (3) |
|
Data Warehouses for Healthcare |
|
|
149 | (8) |
|
What Is a Data Warehouse? |
|
|
149 | (1) |
|
The Differences Between a DW and OLTP |
|
|
150 | (2) |
|
|
152 | (4) |
|
A Healthcare Data Warehouse Life Cycle |
|
|
156 | (1) |
|
Data Mining in Healthcare |
|
|
157 | (3) |
|
|
157 | (2) |
|
Applications of Data Mining in Healthcare |
|
|
159 | (1) |
|
Cloud Computing in Healthcare |
|
|
160 | (2) |
|
|
160 | (1) |
|
Cloud Computing Deployment Models |
|
|
161 | (1) |
|
Examples of Cloud Computing in Healthcare |
|
|
161 | (1) |
|
Pros and Cons of Cloud Computing in Healthcare |
|
|
162 | (1) |
|
|
162 | (7) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
165 | (4) |
|
Chapter 8 Networks and Networking in Healthcare |
|
|
169 | (40) |
|
|
Telecommunications and Healthcare |
|
|
169 | (1) |
|
From Voice to Data Networks and the Global Internet |
|
|
170 | (1) |
|
Data Communications Concepts |
|
|
171 | (9) |
|
Connectivity: The Geometrical Nature of Networks |
|
|
171 | (1) |
|
|
172 | (2) |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
Addressing in Data Networks |
|
|
177 | (2) |
|
The World Wide Web as an Example of a Network Application |
|
|
179 | (1) |
|
PANs, LANs, MANs, and WANs |
|
|
179 | (1) |
|
|
180 | (7) |
|
Application Architectures |
|
|
180 | (1) |
|
Network Architectures and Implementations |
|
|
181 | (3) |
|
|
184 | (3) |
|
|
187 | (5) |
|
Wireless Applications and Issues in a Healthcare Setting |
|
|
188 | (1) |
|
|
188 | (1) |
|
|
189 | (1) |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
192 | (1) |
|
|
192 | (9) |
|
|
192 | (1) |
|
Components of the Sample Network |
|
|
193 | (3) |
|
Network Address Translation |
|
|
196 | (1) |
|
|
197 | (1) |
|
|
197 | (1) |
|
Wireless Access Points and WLAN Controllers |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
199 | (2) |
|
Transmission of Healthcare Data (HL7) |
|
|
201 | (4) |
|
|
201 | (1) |
|
|
202 | (2) |
|
|
204 | (1) |
|
EHR Outbound Communication |
|
|
204 | (1) |
|
|
205 | (5) |
|
|
205 | (2) |
|
|
207 | (1) |
|
|
207 | (2) |
|
Chapter 9 Systems Analysis and Design in Healthcare |
|
|
209 | (24) |
|
|
|
Systems Analysis and Design in HIT |
|
|
210 | (16) |
|
The Systems Development Life Cycle (SDLC) |
|
|
211 | (15) |
|
Trends and Issues in HIS Analysis and Design |
|
|
226 | (3) |
|
|
229 | (5) |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
231 | (2) |
|
Chapter 10 Fundamentals of Health Workflow Process Analysis and Redesign |
|
|
233 | (30) |
|
|
|
|
Life Cycle of Major Information Technology Implementation and Organizational Change |
|
|
234 | (3) |
|
Process Management and Process Improvement |
|
|
237 | (6) |
|
Process Hierarchy: Levels of Mapping Processes |
|
|
238 | (5) |
|
Methodologies for Understanding Processes |
|
|
243 | (5) |
|
|
243 | (1) |
|
Modeling Workflows for Scope of Professional Practice Standards |
|
|
243 | (3) |
|
|
246 | (1) |
|
|
247 | (1) |
|
Business Process Management |
|
|
247 | (1) |
|
|
248 | (4) |
|
|
249 | (1) |
|
Role-Based Swim-Lane Workflow |
|
|
249 | (1) |
|
|
250 | (2) |
|
Success Factors for Implementing Clinical Process Change |
|
|
252 | (3) |
|
|
254 | (1) |
|
Identification and Prioritization of Targets for Workflow Improvement |
|
|
255 | (1) |
|
|
255 | (2) |
|
Change Management Principles |
|
|
256 | (1) |
|
|
257 | (7) |
|
|
257 | (2) |
|
|
259 | (2) |
|
|
261 | (2) |
|
Chapter 11 Healthcare IT Project Management |
|
|
263 | (34) |
|
|
|
Projects, Project Management, and Healthcare IT |
|
|
264 | (8) |
|
Critical Success Factors for Healthcare IT Projects |
|
|
264 | (1) |
|
The Project Management Institute, PMBOK, and PMP |
|
|
265 | (2) |
|
Major Project Management Constraints/Objectives |
|
|
267 | (1) |
|
Project Team Roles and Stakeholders |
|
|
268 | (2) |
|
Effective Communication in Projects |
|
|
270 | (1) |
|
Process Groups and the Project Life Cycle |
|
|
271 | (1) |
|
|
272 | (4) |
|
Project Charter and Scope |
|
|
272 | (1) |
|
Project Problem/Vision/Mission Statements |
|
|
273 | (2) |
|
|
275 | (1) |
|
Planning a Healthcare IT Project |
|
|
276 | (9) |
|
The Work Breakdown Structure (WBS) |
|
|
277 | (3) |
|
Estimating Time, Cost, and Resources |
|
|
280 | (1) |
|
Developing the Project Schedule |
|
|
280 | (2) |
|
Scheduling Resources in Projects |
|
|
282 | (3) |
|
Executing, Monitoring, and Controlling HIT Projects |
|
|
285 | (5) |
|
Execution Principles, Issues, and Opportunities |
|
|
285 | (1) |
|
Monitoring Progress in Projects |
|
|
285 | (4) |
|
|
289 | (1) |
|
|
290 | (2) |
|
|
292 | (6) |
|
|
293 | (1) |
|
|
294 | (1) |
|
|
295 | (2) |
|
Chapter 12 Assuring Usability of Healthcare IT |
|
|
297 | (26) |
|
|
|
Usability of Healthcare IT |
|
|
298 | (7) |
|
Usability Engineering Approaches |
|
|
298 | (5) |
|
|
303 | (2) |
|
Human Factors and Human-Computer Interaction in Healthcare |
|
|
305 | (1) |
|
User Interface Design and Human Cognition |
|
|
306 | (3) |
|
Importance of Considering Cognitive Psychology |
|
|
306 | (1) |
|
Approaches to Cognition and HCI |
|
|
307 | (2) |
|
Technological Advances in HIT and User Interfaces |
|
|
309 | (5) |
|
Input and Output Devices and the Visualization of Healthcare Data |
|
|
310 | (2) |
|
Approaches to Developing User Interfaces in Healthcare |
|
|
312 | (1) |
|
Methods for Assessing HIT in Use |
|
|
313 | (1) |
|
Challenges and Future Issues |
|
|
314 | (1) |
|
|
315 | (9) |
|
|
316 | (1) |
|
|
317 | (1) |
|
|
318 | (5) |
Part III: Healthcare Information Standards and Regulation |
|
|
Chapter 13 Navigating Health Data Standards and Interoperability |
|
|
323 | (18) |
|
|
Introduction to Health Data Standards |
|
|
324 | (2) |
|
|
326 | (5) |
|
Health Data Interchange and Transport Standards |
|
|
326 | (2) |
|
Vocabulary and Terminology Standards |
|
|
328 | (1) |
|
Content and Structure Standards |
|
|
329 | (2) |
|
|
331 | (1) |
|
Standards Coordination and Interoperability |
|
|
331 | (2) |
|
Health IT Standards Committee |
|
|
331 | (1) |
|
International Organization for Standardization |
|
|
332 | (1) |
|
Integrating the Healthcare Enterprise |
|
|
332 | (1) |
|
eHealth Exchange and the Sequoia Project |
|
|
332 | (1) |
|
The Business Value of Health Data Standards |
|
|
333 | (1) |
|
|
333 | (9) |
|
|
334 | (2) |
|
|
336 | (1) |
|
|
337 | (1) |
|
|
338 | (3) |
|
Chapter 14 Interoperability Within and Across Healthcare Systems |
|
|
341 | (32) |
|
|
|
342 | (3) |
|
|
342 | (1) |
|
|
343 | (1) |
|
|
344 | (1) |
|
|
344 | (1) |
|
|
345 | (1) |
|
Internal Directory vs. External Directory |
|
|
345 | (1) |
|
|
345 | (3) |
|
The Multiple Factors of Authentication |
|
|
346 | (1) |
|
|
347 | (1) |
|
|
347 | (1) |
|
Authentication vs. Claims About Authentication (Federated Identity) |
|
|
347 | (1) |
|
|
348 | (2) |
|
|
348 | (1) |
|
|
349 | (1) |
|
Balanced Access Control and Audit Control |
|
|
349 | (1) |
|
|
350 | (2) |
|
|
350 | (1) |
|
|
351 | (1) |
|
|
351 | (1) |
|
Multilevel Data Confidentiality |
|
|
352 | (1) |
|
Data Tagging with Sensitivity Codes |
|
|
352 | (1) |
|
Coding of Restricted Data |
|
|
352 | (1) |
|
Medical Records Regulations |
|
|
352 | (1) |
|
Other Sources of Access Control Rules |
|
|
353 | (1) |
|
Data Treated at the Highest Level of Confidentiality |
|
|
353 | (1) |
|
|
354 | (1) |
|
|
354 | (2) |
|
Privacy Consent Related to Purpose of Use and Access Control |
|
|
354 | (2) |
|
|
356 | (1) |
|
Summary of Basic Access Control |
|
|
356 | (1) |
|
|
356 | (1) |
|
|
357 | (1) |
|
|
357 | (1) |
|
|
357 | (1) |
|
Policies: Where the Logic Resides |
|
|
357 | (1) |
|
Healthcare Information Exchange |
|
|
357 | (8) |
|
|
358 | (1) |
|
Enforcement of Access Controls in an HIE |
|
|
358 | (1) |
|
The First Rule of HIE Access Control |
|
|
359 | (1) |
|
The Second Rule of HIE Access Control |
|
|
359 | (1) |
|
HIE Access Control Information |
|
|
360 | (2) |
|
|
362 | (1) |
|
|
363 | (2) |
|
|
365 | (1) |
|
|
366 | (7) |
|
|
366 | (3) |
|
|
369 | (1) |
|
|
369 | (4) |
|
Chapter 15 Assuring the Health Insurance Portability and Accountability Act Compliance |
|
|
373 | (22) |
|
|
Introduction to the Healthcare Legal Environment |
|
|
373 | (1) |
|
HIPAA, HITECH Act, and Omnibus Rule Overview |
|
|
374 | (2) |
|
|
375 | (1) |
|
HIPAA Administrative Simplification Provisions |
|
|
375 | (1) |
|
HIPAA Privacy Rule: 45 CFR Part 164, Subpart E |
|
|
376 | (5) |
|
Use and Disclosure of PHI: 45 CFR 164.502(a) |
|
|
377 | (1) |
|
Minimum Necessary: 45 CFR 164.502(b) |
|
|
377 | (1) |
|
BA Contracts: 45 CFR 164.504(e), 45 CFR 164.308(b), 45 CFR 164.314(a) |
|
|
377 | (1) |
|
|
377 | (1) |
|
Authorization Requirements: 45 CFR 164.508 |
|
|
377 | (1) |
|
Release Without Consent or Authorization: 45 CFR 164.512 |
|
|
378 | (1) |
|
Avert a Serious Threat to Safety: 45 CFR 164.512(j) |
|
|
378 | (1) |
|
Disclosure for Specialized Government Functions: 45 CFR 164.512(k) |
|
|
379 | (1) |
|
Limited Data Set: 45 CFR 164.514(e) |
|
|
379 | (1) |
|
Notice of Privacy Practices: 45 CFR 164.520 |
|
|
380 | (1) |
|
|
380 | (1) |
|
Privacy Official and Security Official: 45 CFR 164.530(a), 45 CFR 164.308(a)(2) |
|
|
380 | (1) |
|
Workforce Training: 45 CFR 164.530(b), 45 CFR 164.308(a)(5) |
|
|
380 | (1) |
|
Standard Safeguards: 45 CFR 164.530(c) |
|
|
380 | (1) |
|
Sanctions: 45 CFR 164.530(e), 45 CFR 164.308(a)(1) |
|
|
381 | (1) |
|
Privacy and Security Policies and Procedures: 45 CFR 164.530(i), 45 CFR 164.316 |
|
|
381 | (1) |
|
HIPAA Security Rule: 45 CFR Part 164, Subpart C |
|
|
381 | (5) |
|
Administrative Safeguards: 45 CFR 164.308 |
|
|
381 | (3) |
|
Physical Safeguards: 45 CFR 164.310 |
|
|
384 | (1) |
|
Technical Safeguards: 45 CFR 164.312 |
|
|
385 | (1) |
|
Breach Notification Rule: 45 CFR Part 164, Subpart D |
|
|
386 | (3) |
|
Breach Definition: 45 CFR 164.402 |
|
|
386 | (1) |
|
General Breach Description Notification Requirements: 45 CFR 164.404(a-c) |
|
|
387 | (1) |
|
Methods of Notification: 45 CFR 164.404(d) |
|
|
388 | (1) |
|
Notification Delay for Law Enforcement Purposes: 45 CFR 164.412 |
|
|
388 | (1) |
|
Specific CE Requirements: 45 CFR 164.404 |
|
|
388 | (1) |
|
Specific BA Requirements: 45 CFR 164.410 |
|
|
389 | (1) |
|
HIPAA Enforcement Rule: 45 CFR Part 160 |
|
|
389 | (1) |
|
|
390 | (1) |
|
|
390 | (5) |
|
|
391 | (2) |
|
|
393 | (1) |
|
|
394 | (1) |
|
Chapter 16 Health Information Technology and Health Policy |
|
|
395 | (16) |
|
|
The Linkage Between Health Policy and Health IT: Why It's Important |
|
|
395 | (1) |
|
Precision Medicine Initiative |
|
|
396 | (2) |
|
|
398 | (1) |
|
|
398 | (2) |
|
|
400 | (2) |
|
EHR Incentive and Certification Programs |
|
|
402 | (1) |
|
|
403 | (1) |
|
|
404 | (8) |
|
|
404 | (2) |
|
|
406 | (1) |
|
|
407 | (4) |
|
Chapter 17 The Electronic Health Record as Evidence |
|
|
411 | (54) |
|
Kimberly A. Baldwin-Stried Reich |
|
|
Sources and Structure of U.S. Law |
|
|
412 | (1) |
|
Three Branches of U.S. Government Responsible for Carrying Out Government Powers and Functions |
|
|
412 | (12) |
|
Executive Branch: President, Vice President, and Cabinet |
|
|
413 | (1) |
|
Legislative Branch: The Senate and the House of Representatives |
|
|
414 | (8) |
|
Judicial Branch: Structure and Function of the U.S. Court System |
|
|
422 | (2) |
|
|
424 | (6) |
|
EHR Standards for Records Management and Evidentiary Support |
|
|
430 | (1) |
|
The Role and Use of the Medical Record in Litigation and/or Regulatory Investigations |
|
|
431 | (2) |
|
Paper-based Medical Records vs. Electronic Health Records in Discovery |
|
|
431 | (2) |
|
Discovery and Admissibility of the EHR |
|
|
433 | (1) |
|
The Federal Rules of Evidence (FRE) |
|
|
433 | (3) |
|
Medical Records as Hearsay |
|
|
434 | (1) |
|
Physician-Patient Privilege |
|
|
435 | (1) |
|
Incident Report Privilege |
|
|
436 | (1) |
|
The Scope and Procedures of E-Discovery Process |
|
|
437 | (5) |
|
Impact of the 2015 Amendments to the E-Discovery Process |
|
|
438 | (4) |
|
Duty to Preserve Relevant Evidence and Establishing Legal Holds |
|
|
442 | (1) |
|
The Path Forward: A Coming Together of Laws, Rules, and Regulations |
|
|
442 | (8) |
|
|
443 | (1) |
|
The Health Insurance Portability and Accountability Act |
|
|
443 | (1) |
|
The Convergence of E-Discovery and Release of Information Processes |
|
|
444 | (2) |
|
The Concept of the Legal Health Record |
|
|
446 | (4) |
|
A New Era in the Nation's Health Information Infrastructure |
|
|
450 | (2) |
|
|
450 | (1) |
|
|
451 | (1) |
|
|
452 | (15) |
|
|
452 | (2) |
|
|
454 | (1) |
|
|
455 | (10) |
Part IV: Implementing, Managing, and Maintaining Healthcare IT |
|
|
Chapter 18 Effective Organizational Communication for Large-Scale Healthcare Information Technology Initiatives |
|
|
465 | (22) |
|
|
Importance of Communications in Health IT Initiatives |
|
|
467 | (3) |
|
Leadership and Governance |
|
|
467 | (2) |
|
|
469 | (1) |
|
Focus on Customers and Players |
|
|
470 | (3) |
|
|
470 | (1) |
|
|
471 | (1) |
|
|
471 | (1) |
|
IT Departments and Multidisciplinary Project Teams |
|
|
472 | (1) |
|
Healthcare System Leadership |
|
|
473 | (1) |
|
Components of a Communications Plan |
|
|
473 | (1) |
|
Project Phases and the Communication Functions |
|
|
473 | (1) |
|
|
474 | (1) |
|
Key Industry Considerations |
|
|
474 | (5) |
|
The Expanding World of Media |
|
|
475 | (1) |
|
Role of Federal Healthcare Agencies |
|
|
476 | (1) |
|
Role of Regulatory Standards and the Evolution of Health Information Exchange |
|
|
477 | (2) |
|
|
479 | (9) |
|
|
480 | (1) |
|
|
481 | (1) |
|
|
482 | (5) |
|
Chapter 19 Non-EHR HIT: From Architecture to Operations |
|
|
487 | (22) |
|
|
|
The Healthcare IT Organization: Challenges, Structures, and Roles |
|
|
488 | (2) |
|
HIT Major Non-EHR HIT Systems and Applications |
|
|
490 | (14) |
|
Working with Enterprise HIT Systems |
|
|
491 | (1) |
|
Vendor-Specific Systems: Acquisition, Installation, and Maintenance of HIT Systems |
|
|
492 | (2) |
|
|
494 | (2) |
|
|
496 | (2) |
|
|
498 | (1) |
|
Patient Monitoring Systems |
|
|
499 | (1) |
|
|
500 | (1) |
|
|
501 | (1) |
|
Finance and Operations Systems |
|
|
501 | (2) |
|
Clinical Decision Support (CDS) |
|
|
503 | (1) |
|
Patient Relationship Management Systems |
|
|
503 | (1) |
|
Application Data Interchange Systems |
|
|
504 | (1) |
|
|
504 | (1) |
|
|
505 | (1) |
|
|
506 | (1) |
|
|
507 | (2) |
|
Chapter 20 EHR Implementation and Optimization |
|
|
509 | (30) |
|
|
|
Using HIT and EHRs for Organizational Transformation |
|
|
510 | (8) |
|
|
510 | (1) |
|
|
511 | (3) |
|
Governance of Large HIT and EHR Initiatives |
|
|
514 | (3) |
|
|
517 | (1) |
|
|
518 | (16) |
|
|
519 | (1) |
|
The Orders Catalog and Order Sets |
|
|
520 | (1) |
|
Documentation Templates and Note Hierarchy |
|
|
521 | (1) |
|
|
521 | (1) |
|
Extraction, then Conversion |
|
|
522 | (1) |
|
|
522 | (2) |
|
Policies Affect Workflows |
|
|
524 | (1) |
|
|
525 | (1) |
|
|
526 | (1) |
|
Reduce Schedules for Go-Live |
|
|
526 | (2) |
|
|
528 | (1) |
|
|
528 | (2) |
|
During and Post Go-Live Communication |
|
|
530 | (1) |
|
|
531 | (3) |
|
|
534 | (1) |
|
|
534 | (2) |
|
|
536 | (1) |
|
|
536 | (3) |
|
Chapter 21 Training Essentials for Implementing Healthcare IT |
|
|
539 | (18) |
|
|
|
540 | (1) |
|
Assessing Basic Skill Level |
|
|
541 | (1) |
|
|
542 | (3) |
|
|
544 | (1) |
|
Constructing a Lesson Plan |
|
|
545 | (3) |
|
Multimedia as a Method of Delivery |
|
|
546 | (1) |
|
Current Internet Technologies |
|
|
547 | (1) |
|
Training Delivery and Accommodation |
|
|
548 | (1) |
|
|
548 | (2) |
|
|
550 | (1) |
|
Utilizing a Learning Management System |
|
|
550 | (2) |
|
|
551 | (1) |
|
|
552 | (5) |
|
|
553 | (1) |
|
|
554 | (1) |
|
|
555 | (2) |
|
Chapter 22 Using Healthcare IT to Measure and Improve Healthcare Quality and Outcomes |
|
|
557 | (30) |
|
|
|
557 | (1) |
|
Defining Quality Measures for EHR Queries |
|
|
558 | (6) |
|
What Makes a Quality Measure Worth Measuring? |
|
|
564 | (1) |
|
Evidence-Based Clinical Practice Guidelines |
|
|
564 | (1) |
|
What Is the Connection Between Clinical Decision Support and Quality Measurement? |
|
|
565 | (1) |
|
What Is the Measure of a Measure? |
|
|
566 | (1) |
|
What Are the Types of Measures, and How Are They Different? |
|
|
567 | (1) |
|
What Are the Expectations for the EHR to Perform Measurement? |
|
|
567 | (4) |
|
What Changes Are Needed to Enable Electronic Clinical Quality Measures? |
|
|
571 | (2) |
|
Data Modeling: Example from the International Health Information Terminology Standards Development Organization |
|
|
572 | (1) |
|
How Are Value Sets Standardized? |
|
|
573 | (1) |
|
Moving Forward: Retooling vs. Creating Measures de Novo Based on Data in EHRs |
|
|
574 | (1) |
|
|
575 | (13) |
|
|
576 | (2) |
|
|
578 | (1) |
|
|
579 | (8) |
Part V: Optimizing Healthcare IT |
|
|
Chapter 23 Big Data and Data Analytics |
|
|
587 | (30) |
|
|
Innovation in Healthcare IT: The Creative Reconstruction of Health and Wellness |
|
|
588 | (1) |
|
Which Technologies Are Creating Big Opportunities for Innovation? |
|
|
589 | (3) |
|
How Do We Optimize the Human-Machine Interface? |
|
|
590 | (1) |
|
How Do We Accelerate Continuous Learning and Innovation? |
|
|
591 | (1) |
|
A Simple Taxonomy for Innovation |
|
|
592 | (1) |
|
The Different Communities Engaged in Healthcare Delivery |
|
|
593 | (4) |
|
Person-Centric Communities |
|
|
593 | (1) |
|
Professional Care-Delivery Teams |
|
|
594 | (2) |
|
Personal Caregiver Networks |
|
|
596 | (1) |
|
What Can the Impact of Innovations Be on the Future Technologies? |
|
|
597 | (1) |
|
Key Gaps and How Technology Can Help Close Them |
|
|
597 | (12) |
|
The Empathy Gap Is the Most Important Gap to Close |
|
|
598 | (1) |
|
Gap Between Evidence and Behavior for Disorders of Lifestyle |
|
|
599 | (2) |
|
Environmental Disruption Gap (Chemical, Thermal, Microbial) |
|
|
601 | (1) |
|
Learning/Education/Communication Gap |
|
|
602 | (3) |
|
|
605 | (1) |
|
Gap in Seamless and Reliable Human Data Entry |
|
|
605 | (1) |
|
Gap in Evidence-Based Virtual Care |
|
|
605 | (1) |
|
The Science vs. the Application of -omics (Genomics, Microbiomics, Proteomes, etc.) Gap |
|
|
606 | (1) |
|
Gap in Drones and Healthcare |
|
|
607 | (1) |
|
|
607 | (1) |
|
Gap in Chatbots, AI, Trust, and Health |
|
|
607 | (1) |
|
Gap in Transcranial Magnetic Stimulation and Health |
|
|
608 | (1) |
|
Gap in New Psychopharmacology Research and Previously Refractory Psychiatric States |
|
|
608 | (1) |
|
Gap in Harnessing Exponential Technology |
|
|
608 | (1) |
|
|
609 | (9) |
|
|
610 | (2) |
|
|
612 | (1) |
|
|
613 | (4) |
|
Chapter 24 Innovations in Healthcare Impacting Healthcare Information Technology |
|
|
617 | (22) |
|
|
Innovations in Genetics/Genomics/Pharmacogenomics |
|
|
618 | (1) |
|
Genetics/Genomics Throughout the Healthcare Continuum |
|
|
619 | (4) |
|
New Major Sources of Evidence with a Focus on Pharmacogenomics |
|
|
620 | (1) |
|
The IT Volume Challenge of Monitoring Genetics/Genomics/Pharmacogenomics in Healthcare |
|
|
621 | (2) |
|
Innovations in Mobile Devices in Healthcare |
|
|
623 | (5) |
|
Wireless Communication Technologies and Standards |
|
|
624 | (1) |
|
Mobile Devices Connected to the Internet |
|
|
624 | (1) |
|
Mobile Device Security Protocols |
|
|
625 | (1) |
|
How Mobile Networks Are Being Used in Healthcare |
|
|
625 | (1) |
|
The Most Popular Mobile Health Apps |
|
|
625 | (1) |
|
Healthcare Professionals' Use of Mobile Devices |
|
|
626 | (1) |
|
Major Barriers to Advancing Mobile Devices |
|
|
626 | (1) |
|
Steps to Institutionalizing Genomic and Mobile Technologies |
|
|
627 | (1) |
|
Innovative Institutions Pushing Advances in Genomics and Mobile Devices |
|
|
627 | (1) |
|
Nine Technologies for Future Innovation Using Devices |
|
|
628 | (1) |
|
Social Media Being Used in Healthcare |
|
|
628 | (1) |
|
Innovations in Telehealth |
|
|
628 | (2) |
|
Major Services of Telehealth |
|
|
629 | (1) |
|
Delivery Mechanisms Used for Telehealth |
|
|
629 | (1) |
|
|
630 | (14) |
|
|
630 | (2) |
|
|
632 | (1) |
|
|
632 | (7) |
Part VI: Making It All Secure: Healthcare IT Privacy, Security, and Confidentiality |
|
|
Chapter 25 Framework for Privacy, Security, and Confidentiality |
|
|
639 | (32) |
|
|
|
644 | (3) |
|
|
647 | (16) |
|
|
647 | (2) |
|
Layer 2: Information Assurance Policy |
|
|
649 | (1) |
|
Layer 3: Physical Safeguards |
|
|
650 | (1) |
|
Layer 4: Operational Safeguards |
|
|
651 | (4) |
|
Layer 5: Architectural Safeguards |
|
|
655 | (2) |
|
Layer 6: Technology Safeguards |
|
|
657 | (5) |
|
Layer 7: Usability Features |
|
|
662 | (1) |
|
|
663 | (9) |
|
|
663 | (2) |
|
|
665 | (1) |
|
|
665 | (6) |
|
Chapter 26 Risk Assessment and Management |
|
|
671 | (22) |
|
|
|
672 | (1) |
|
Risk Management in Healthcare IT |
|
|
673 | (1) |
|
The Risk-Management Process |
|
|
674 | (9) |
|
|
675 | (1) |
|
|
676 | (5) |
|
|
681 | (1) |
|
|
682 | (1) |
|
Documentation and Communication |
|
|
682 | (1) |
|
|
683 | (5) |
|
|
683 | (3) |
|
Application and Data Criticality Analysis |
|
|
686 | (1) |
|
|
686 | (1) |
|
|
687 | (1) |
|
|
688 | (5) |
|
|
688 | (2) |
|
|
690 | (1) |
|
|
690 | (3) |
|
Chapter 27 Physical Safeguards, Facility Security, Secure Systems and Networks, and Securing Electronic Media |
|
|
693 | (22) |
|
|
Physical Safeguard Requirements |
|
|
693 | (1) |
|
Locating Storage Devices, Network Hardware, Printers, and Other Devices |
|
|
694 | (1) |
|
Securely Handling Protected Health Information (PHI) |
|
|
695 | (5) |
|
|
695 | (1) |
|
|
695 | (1) |
|
Printer, Fax Machine, and Scanner Placement |
|
|
695 | (1) |
|
|
696 | (1) |
|
|
696 | (1) |
|
Access to Servers, Offices, and Data Closets |
|
|
696 | (2) |
|
|
698 | (2) |
|
|
700 | (4) |
|
|
700 | (1) |
|
|
700 | (1) |
|
|
701 | (1) |
|
|
701 | (2) |
|
|
703 | (1) |
|
Securing and Preserving Electronic Media Storage Devices |
|
|
704 | (2) |
|
|
704 | (1) |
|
|
704 | (1) |
|
|
705 | (1) |
|
|
705 | (1) |
|
|
705 | (1) |
|
|
705 | (1) |
|
Network-Attached Storage (NAS) |
|
|
706 | (1) |
|
Storage Area Network (SAN) |
|
|
706 | (1) |
|
|
706 | (2) |
|
|
707 | (1) |
|
Asymmetric or Public Key Infrastructure (PM) |
|
|
707 | (1) |
|
|
707 | (1) |
|
|
707 | (1) |
|
|
707 | (1) |
|
|
708 | (1) |
|
|
708 | (1) |
|
Secure Disposal of Electronic Media |
|
|
708 | (3) |
|
Secure Shredding, Degaussing, and Sanitizing |
|
|
708 | (1) |
|
Determining the Level and Type of Destruction |
|
|
709 | (2) |
|
|
711 | (4) |
|
|
711 | (2) |
|
|
713 | (1) |
|
|
714 | (1) |
|
Chapter 28 Healthcare Information Security: Operational Safeguards |
|
|
715 | (26) |
|
|
Operational Safeguards: A Component of Information Security |
|
|
715 | (1) |
|
Operational Safeguards in Healthcare Organizations |
|
|
716 | (10) |
|
Security Management Process |
|
|
720 | (1) |
|
Information Management Council |
|
|
720 | (1) |
|
Identity Management and Authorization |
|
|
720 | (1) |
|
Awareness and Training Programs |
|
|
721 | (1) |
|
|
721 | (1) |
|
Software and System Development |
|
|
722 | (1) |
|
|
723 | (1) |
|
|
723 | (1) |
|
|
724 | (1) |
|
|
724 | (1) |
|
|
725 | (1) |
|
|
725 | (1) |
|
|
725 | (1) |
|
Business Associate Contracts |
|
|
726 | (1) |
|
Healthcare-Specific Implications on Operational Safeguards |
|
|
726 | (3) |
|
Networked Medical Devices |
|
|
726 | (2) |
|
Multiple-Tenant Virtual Environments |
|
|
728 | (1) |
|
|
729 | (1) |
|
Operational Safeguards in Emerging Healthcare Trends |
|
|
729 | (5) |
|
|
729 | (2) |
|
International Privacy and Security Concerns |
|
|
731 | (1) |
|
Health Information Exchanges |
|
|
731 | (1) |
|
Workforce Information Security Competency |
|
|
731 | (1) |
|
Accountable-Care Organizations |
|
|
732 | (1) |
|
Meaningful Use Privacy and Security Measures |
|
|
733 | (1) |
|
|
734 | (8) |
|
|
735 | (1) |
|
|
736 | (1) |
|
|
737 | (4) |
|
Chapter 29 Architectural Safeguards |
|
|
741 | (12) |
|
|
|
742 | (2) |
|
Relationship Between Reliability and Security |
|
|
742 | (1) |
|
Reliability Implications for Healthcare Systems |
|
|
743 | (1) |
|
|
744 | (1) |
|
Availability as a Component of Data Security |
|
|
744 | (1) |
|
|
745 | (1) |
|
|
745 | (1) |
|
|
745 | (2) |
|
Considerations for Healthcare IT Systems |
|
|
746 | (1) |
|
Considerations for Medical Devices |
|
|
746 | (1) |
|
Considerations for Design of High-Reliability Healthcare Systems |
|
|
747 | (2) |
|
|
748 | (1) |
|
|
748 | (1) |
|
|
748 | (1) |
|
|
749 | (1) |
|
|
749 | (4) |
|
|
750 | (1) |
|
|
751 | (1) |
|
|
751 | (2) |
|
Chapter 30 Healthcare Cybersecurity Technology |
|
|
753 | (28) |
|
|
Healthcare Cybersecurity Threat |
|
|
753 | (7) |
|
|
756 | (1) |
|
The Big Four: Cybercrime, Cyber Espionage, Hacktivism, and Advanced Persistent Threats |
|
|
757 | (2) |
|
Staying Abreast of the Threat |
|
|
759 | (1) |
|
Planning for Outcomes: Cybersecurity Frameworks and Standards |
|
|
760 | (2) |
|
Building a Secure Architecture |
|
|
762 | (8) |
|
Maintaining a Current Environment |
|
|
762 | (1) |
|
|
763 | (1) |
|
Thwarting Cyber Exploitation |
|
|
764 | (1) |
|
|
764 | (1) |
|
Detecting Cyber Intrusions |
|
|
765 | (1) |
|
Detecting Web-Based Threats |
|
|
766 | (1) |
|
|
766 | (1) |
|
Addressing the Ubiquitous Threat of IoT |
|
|
767 | (1) |
|
|
768 | (1) |
|
Conducting Information Correlation and Analysis |
|
|
769 | (1) |
|
Looking for Vulnerabilities |
|
|
770 | (5) |
|
|
770 | (2) |
|
|
772 | (2) |
|
Red Teaming for Readiness |
|
|
774 | (1) |
|
|
775 | (6) |
|
|
776 | (2) |
|
|
778 | (1) |
|
|
779 | (2) |
|
Chapter 31 Cybersecurity Considerations for Medical Devices |
|
|
781 | (24) |
|
|
Medical Device Cybersecurity and Cybersafety: An Introduction |
|
|
781 | (2) |
|
Medical Device Vulnerabilities and Risks: A Review |
|
|
783 | (2) |
|
Medical Device Regulation: Impact on Cybersecurity |
|
|
785 | (4) |
|
|
785 | (2) |
|
Changes in the Regulatory Landscape |
|
|
787 | (2) |
|
Implementing Medical Device Cybersecurity |
|
|
789 | (7) |
|
|
790 | (1) |
|
Risk Analysis, Assessment, and Management: Laying the Foundation |
|
|
791 | (5) |
|
|
796 | (12) |
|
|
796 | (2) |
|
|
798 | (1) |
|
|
799 | |
Part VII: Appendixes |
|
|
Appendix A: AHIMA CHTS Exams Domain Maps |
|
|
|
CHTS-CP: Clinician/Practitioner Consultant Examination |
|
|
805 | (1) |
|
CHTS-IM: Implementation Manager Examination |
|
|
806 | (1) |
|
CHTS-IS: Implementation Support Specialist Examination |
|
|
807 | (1) |
|
CHTS-PW: Practice Workflow & Information Management |
|
|
|
Redesign Specialist Examination |
|
|
808 | (2) |
|
CHTS-TR: Trainer Examination |
|
|
810 | (1) |
|
CHTS-TS: Technical/Software Support Staff Examination |
|
|
811 | (4) |
|
Appendix B: HIMSS CAHIMS Exam Domain Map |
|
|
|
Appendix C: About the CD-ROM |
|
|
|
|
815 | (1) |
|
Installing and Running Total Tester Premium Practice Exam Software |
|
|
815 | (1) |
|
Total Tester Premium Practice Exam Software |
|
|
815 | (1) |
|
|
816 | (1) |
|
Glossary and Appendix PDFs |
|
|
816 | (1) |
|
Risk Register and Example Risk Map from Chapter 26 |
|
|
817 | (1) |
|
|
817 | (2) |
Index |
|
819 | |