Muutke küpsiste eelistusi

Healthcare Information Technology Exam Guide for CHTS and CAHIMS Certifications 2nd edition [Multiple-component retail product]

  • Formaat: Multiple-component retail product, 800 pages, kõrgus x laius x paksus: 231x185x46 mm, kaal: 1363 g, 45 Illustrations
  • Ilmumisaeg: 05-Oct-2017
  • Kirjastus: McGraw-Hill Education
  • ISBN-10: 1259836975
  • ISBN-13: 9781259836978
  • Formaat: Multiple-component retail product, 800 pages, kõrgus x laius x paksus: 231x185x46 mm, kaal: 1363 g, 45 Illustrations
  • Ilmumisaeg: 05-Oct-2017
  • Kirjastus: McGraw-Hill Education
  • ISBN-10: 1259836975
  • ISBN-13: 9781259836978
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.











The Complete Healthcare Information Technology Reference and Exam Guide

Gain the skills and knowledge required to implement and support healthcare IT (HIT) systems in various clinical and healthcare business settings. Health Information Technology Exam Guide for CHTS and CAHIMS Certifications prepares IT professionals to transition into HIT with coverage of topics ranging from health data standards to project management. This new edition includes broadened security content in addition to coverage of disruptive innovations such as complex platforms that support big data, genomics, telemedicine, mobile devices, and consumers. Learn about achieving true interoperability, updates to HIPAA rules, and FHIR and SMART standards.

This book is an invaluable reference for understanding what has come before and what trends are likely to shape the future. The world of big data, precision medicine, genomics, and telehealth require us to break old paradigms of architecture and functionality while not interrupting existing care processes and revenue cycles Were dealing with state sponsored cyberterrorism, hacktivism, and organized crime. I describe healthcare IT security as a cold war Youll hear from the experts who created many of the regulations and best practices were using today to keep information private. I hope you enjoy this book as much as I have and that it finds a place of importance on your book shelf.

From the Foreword by John D. Halamka, MD, Chief Information Officer, CAREGROUP, Boston, MA

Coverage includes:

 Healthcare and Information Technology in the United States  Fundamentals of Healthcare Information Science  Healthcare Information Standards and Regulation  Implementing, Managing, and Maintaining Healthcare Information Technology  Optimizing Healthcare Information Technology  Making Healthcare Information Technology Private, Secure, and Confidential

Electronic content includes:

 Practice exams for CHTS and CAHIMS (Windows compatible only)  Secure PDF copy of the book
Foreword xlvii
Acknowledgments xlix
Part I: Healthcare and Information Technology in the United States
Chapter 1 Healthcare Information Technology: Definitions, Stakeholders, and Major Themes
3(18)
Kathleen A. McCormick
J. Marc Overhage
John E. Mattison
Brian Gugerty
The Explosion of Healthcare Information Technology
4(2)
New Network Complexity Requires New Standards for Data Sharing and Interoperability
6(1)
The Role of HIT in the Continuum of Healthcare
7(1)
The Increasing Volume and Shift to Value of Healthcare IT
8(2)
Increasing the Volume of EHRs
9(1)
Measuring the Value of Healthcare
9(1)
Preparing a Critical Mass of Certified Healthcare IT Technicians and Professionals
10(2)
The Roles of HIMSS and AHIMA in Support of Healthcare Information Credentialing, Education, and Training
12(3)
Healthcare Information and Management Systems Society (HIMSS)
12(1)
American Health Information Management Association (AHIMA)
12(3)
Chapter Review
15(7)
Questions
16(1)
Answers
17(1)
References
18(3)
Chapter 2 U.S. Healthcare Systems Overview
21(28)
Philip J. Kroth
U.S. Healthcare Delivery Organizations and Management Structures
22(4)
Private Medical Practices
22(1)
Health Maintenance Organizations (HMOs)
22(1)
Independent Practice Associations (IPAs)
23(1)
Preferred Provider Organizations (PPOs)
23(1)
Hospitals
23(1)
Academic Health Centers
24(1)
Specialty Hospitals
24(1)
Public Health Departments
25(1)
Other Healthcare Organizations
25(1)
Healthcare Venues
26(4)
Ambulatory Care Centers
26(1)
Acute Care
27(1)
Long-term Care Facilities
28(1)
Home Care/Visiting Nursing Services
29(1)
Community/Population Care
29(1)
Hospice/Palliative Care
29(1)
Types of Healthcare
30(3)
Primary Care
30(1)
Behavioral Health
31(1)
Specialty Care
31(1)
Emergency Care
31(1)
Urgent Care
32(1)
Acute Care vs. Chronic Care
32(1)
Patient Education
32(1)
Integrative Medicine
32(1)
Telehealth
33(1)
Healthcare Professions
33(2)
Certification and Accreditation
33(2)
Healthcare Reform and Quality
35(2)
Costs-U.S. Expenditures Overall Compared to Other Countries
35(1)
Affordable Care Act (ACA)
36(1)
HITECH Meaningful Use Provision
36(1)
Medicare Access and CHIP Reauthorization Act of 2015
37(1)
Healthcare Regulatory and Research Organizations
37(4)
Regulation
38(2)
Research
40(1)
Chapter Review
41(9)
Questions
41(2)
Answers
43(1)
References
44(5)
Chapter 3 An Overview of How Healthcare Is Paid For in the United States
49(22)
Donald Nichols
The Nature of Health Insurance
50(1)
The Structure of Health Insurance
50(1)
Insurance in the United States
51(14)
Insurance Products
52(1)
Commercial (Private) Insurance in the United States
53(1)
Medicare
54(2)
Medicaid
56(2)
Uncompensated Care
58(7)
Chapter Review
65(8)
Questions
65(2)
Answers
67(1)
References
68(3)
Chapter 4 Healthcare Information Technology in Public Health, Emergency Preparedness, and Surveillance
71(18)
J. Marc Overhage
Brian E. Dixon
Public Health Reporting
73(3)
Registries
76(2)
Health Alerts
78(1)
Privacy and Security
78(1)
Scope of Data
79(1)
Clinical Information Standards
80(1)
Trends and What to Expect in the Future
80(1)
Chapter Review
81(9)
Questions
82(1)
Answers
83(1)
References
84(5)
Part II: Fundamentals of Healthcare Information Science
Chapter 5 Computer Hardware and Architecture for Healthcare IT
89(22)
Omid Shabestari
Computer Hardware
90(7)
Input Devices
90(2)
Output Devices
92(1)
System Components
92(5)
Cloud Computing, ASPs, and Client-Server EMR Systems
97(1)
Hardware Management
98(9)
Operating Systems and Hardware Drivers
98(1)
Networking Hardware
99(1)
Portable Computers
100(1)
Wearable Computers
101(1)
Server Computers
101(1)
Trends in Meeting Hardware Requirements
101(2)
Computer Asset Management
103(4)
Chapter Review
107(5)
Questions
107(2)
Answers
109(1)
References
110(1)
Chapter 6 Programming and Programming Languages for Healthcare IT
111(22)
Alex Mu-Hsing Kuo
Andre Kushniruk
Languages and Virtual Machines
112(1)
Operating Systems
113(1)
The C Language
114(1)
The C++ Language
115(3)
The Java Language
118(2)
Hypertext Markup Language (HTML)
120(2)
Extensible Markup Language (XML)
122(2)
Active Server Pages (ASP)
124(2)
PHP: Hypertext Preprocessor (PHP)
126(2)
Programming Languages and Development Environments for Mobile Health Application Development
128(1)
Chapter Review
128(5)
Questions
128(2)
Answers
130(1)
References
130(3)
Chapter 7 Databases, Data Warehousing, Data Mining, and Cloud Computing for Healthcare
133(36)
Alex Mu-Hsing Kuo
Healthcare Databases
133(4)
Database Basics
135(2)
Database Application Development Process
137(8)
Analyzing the Business Scenario and Extracting Business Rules
137(1)
Modeling Database: Entity Relationship Diagram Design and Normalization
138(1)
Creating a Physical Database Using Structured Query Language
139(1)
Implementing a Healthcare Database Application
140(5)
Database Administration and Security
145(4)
Database Administration
145(1)
Database Security
146(3)
Data Warehouses for Healthcare
149(8)
What Is a Data Warehouse?
149(1)
The Differences Between a DW and OLTP
150(2)
Data Warehouse Models
152(4)
A Healthcare Data Warehouse Life Cycle
156(1)
Data Mining in Healthcare
157(3)
What Is Data Mining?
157(2)
Applications of Data Mining in Healthcare
159(1)
Cloud Computing in Healthcare
160(2)
Cloud Computing Models
160(1)
Cloud Computing Deployment Models
161(1)
Examples of Cloud Computing in Healthcare
161(1)
Pros and Cons of Cloud Computing in Healthcare
162(1)
Chapter Review
162(7)
Questions
163(1)
Answers
164(1)
References
165(4)
Chapter 8 Networks and Networking in Healthcare
169(40)
Roman Mateyko
Telecommunications and Healthcare
169(1)
From Voice to Data Networks and the Global Internet
170(1)
Data Communications Concepts
171(9)
Connectivity: The Geometrical Nature of Networks
171(1)
Communication Models
172(2)
Communications Protocols
174(1)
Data and Signals
175(1)
Digitization
176(1)
Throughput
176(1)
Addressing in Data Networks
177(2)
The World Wide Web as an Example of a Network Application
179(1)
PANs, LANs, MANs, and WANs
179(1)
How a Network Works
180(7)
Application Architectures
180(1)
Network Architectures and Implementations
181(3)
Device Configuration
184(3)
Wireless Networks
187(5)
Wireless Applications and Issues in a Healthcare Setting
188(1)
WLAN Topology
188(1)
802.11 Standards
189(1)
Security
190(1)
Bluetooth
191(1)
WAP, WML, and HTML5
191(1)
Cellular
192(1)
Sample Network
192(9)
Purpose of a Network
192(1)
Components of the Sample Network
193(3)
Network Address Translation
196(1)
Port Forwarding
197(1)
Router Configuration
197(1)
Wireless Access Points and WLAN Controllers
197(1)
Firewalls
198(1)
Cabling
199(2)
Transmission of Healthcare Data (HL7)
201(4)
HL7 v2
201(1)
HL7 v3
202(2)
HL7 FHIR
204(1)
EHR Outbound Communication
204(1)
Chapter Review
205(5)
Questions
205(2)
Answers
207(1)
References
207(2)
Chapter 9 Systems Analysis and Design in Healthcare
209(24)
Andre Kushniruk
Elizabeth Borycki
Systems Analysis and Design in HIT
210(16)
The Systems Development Life Cycle (SDLC)
211(15)
Trends and Issues in HIS Analysis and Design
226(3)
Chapter Review
229(5)
Questions
230(1)
Answers
231(1)
References
231(2)
Chapter 10 Fundamentals of Health Workflow Process Analysis and Redesign
233(30)
J. Michael Kramer
Sheila Ochylski
Jane Brokel
Life Cycle of Major Information Technology Implementation and Organizational Change
234(3)
Process Management and Process Improvement
237(6)
Process Hierarchy: Levels of Mapping Processes
238(5)
Methodologies for Understanding Processes
243(5)
Observation
243(1)
Modeling Workflows for Scope of Professional Practice Standards
243(3)
Simulation
246(1)
Lean Strategy
247(1)
Business Process Management
247(1)
Workflow Mapping Tools
248(4)
Workflow Diagram Example
249(1)
Role-Based Swim-Lane Workflow
249(1)
Value Stream Mapping
250(2)
Success Factors for Implementing Clinical Process Change
252(3)
Additional Techniques
254(1)
Identification and Prioritization of Targets for Workflow Improvement
255(1)
Change Management
255(2)
Change Management Principles
256(1)
Chapter Review
257(7)
Questions
257(2)
Answers
259(2)
References
261(2)
Chapter 11 Healthcare IT Project Management
263(34)
Brian Gugerty
Amy Flick
Projects, Project Management, and Healthcare IT
264(8)
Critical Success Factors for Healthcare IT Projects
264(1)
The Project Management Institute, PMBOK, and PMP
265(2)
Major Project Management Constraints/Objectives
267(1)
Project Team Roles and Stakeholders
268(2)
Effective Communication in Projects
270(1)
Process Groups and the Project Life Cycle
271(1)
Project Initiation
272(4)
Project Charter and Scope
272(1)
Project Problem/Vision/Mission Statements
273(2)
SMART Project Objectives
275(1)
Planning a Healthcare IT Project
276(9)
The Work Breakdown Structure (WBS)
277(3)
Estimating Time, Cost, and Resources
280(1)
Developing the Project Schedule
280(2)
Scheduling Resources in Projects
282(3)
Executing, Monitoring, and Controlling HIT Projects
285(5)
Execution Principles, Issues, and Opportunities
285(1)
Monitoring Progress in Projects
285(4)
Changing the Plan
289(1)
Closing the Project
290(2)
Chapter Review
292(6)
Questions
293(1)
Answers
294(1)
References
295(2)
Chapter 12 Assuring Usability of Healthcare IT
297(26)
Andre Kushniruk
Elizabeth Borycki
Usability of Healthcare IT
298(7)
Usability Engineering Approaches
298(5)
Usability and HIT Safety
303(2)
Human Factors and Human-Computer Interaction in Healthcare
305(1)
User Interface Design and Human Cognition
306(3)
Importance of Considering Cognitive Psychology
306(1)
Approaches to Cognition and HCI
307(2)
Technological Advances in HIT and User Interfaces
309(5)
Input and Output Devices and the Visualization of Healthcare Data
310(2)
Approaches to Developing User Interfaces in Healthcare
312(1)
Methods for Assessing HIT in Use
313(1)
Challenges and Future Issues
314(1)
Chapter Review
315(9)
Questions
316(1)
Answers
317(1)
References
318(5)
Part III: Healthcare Information Standards and Regulation
Chapter 13 Navigating Health Data Standards and Interoperability
323(18)
Joyce Sensmeier
Introduction to Health Data Standards
324(2)
Standards Categories
326(5)
Health Data Interchange and Transport Standards
326(2)
Vocabulary and Terminology Standards
328(1)
Content and Structure Standards
329(2)
Security Standards
331(1)
Standards Coordination and Interoperability
331(2)
Health IT Standards Committee
331(1)
International Organization for Standardization
332(1)
Integrating the Healthcare Enterprise
332(1)
eHealth Exchange and the Sequoia Project
332(1)
The Business Value of Health Data Standards
333(1)
Chapter Review
333(9)
Questions
334(2)
Answers
336(1)
References
337(1)
Additional Study
338(3)
Chapter 14 Interoperability Within and Across Healthcare Systems
341(32)
John Moehrke
User Identity
342(3)
Provisioning
342(1)
Identity Proofing
343(1)
Role Assignment
344(1)
Deprovisioning
344(1)
User Account Support
345(1)
Internal Directory vs. External Directory
345(1)
Authentication
345(3)
The Multiple Factors of Authentication
346(1)
Secondary Authentication
347(1)
Automatic Logoff
347(1)
Authentication vs. Claims About Authentication (Federated Identity)
347(1)
Accountability
348(2)
Access Control
348(1)
Audit Control
349(1)
Balanced Access Control and Audit Control
349(1)
Roles and Permissions
350(2)
What Are Permissions?
350(1)
Systems Have Roles
351(1)
Truth Tables
351(1)
Multilevel Data Confidentiality
352(1)
Data Tagging with Sensitivity Codes
352(1)
Coding of Restricted Data
352(1)
Medical Records Regulations
352(1)
Other Sources of Access Control Rules
353(1)
Data Treated at the Highest Level of Confidentiality
353(1)
Purpose of Use
354(1)
Patient Privacy
354(2)
Privacy Consent Related to Purpose of Use and Access Control
354(2)
Hint
356(1)
Summary of Basic Access Control
356(1)
Patient Information
356(1)
User Information
357(1)
Resource Information
357(1)
Context Information
357(1)
Policies: Where the Logic Resides
357(1)
Healthcare Information Exchange
357(8)
Push vs. Pull in an HIE
358(1)
Enforcement of Access Controls in an HIE
358(1)
The First Rule of HIE Access Control
359(1)
The Second Rule of HIE Access Control
359(1)
HIE Access Control Information
360(2)
Metadata
362(1)
User Identity in an HIE
363(2)
Access Control Languages
365(1)
Chapter Review
366(7)
Questions
366(3)
Answers
369(1)
References
369(4)
Chapter 15 Assuring the Health Insurance Portability and Accountability Act Compliance
373(22)
Chris Apgar
Introduction to the Healthcare Legal Environment
373(1)
HIPAA, HITECH Act, and Omnibus Rule Overview
374(2)
Legal Documents Review
375(1)
HIPAA Administrative Simplification Provisions
375(1)
HIPAA Privacy Rule: 45 CFR Part 164, Subpart E
376(5)
Use and Disclosure of PHI: 45 CFR 164.502(a)
377(1)
Minimum Necessary: 45 CFR 164.502(b)
377(1)
BA Contracts: 45 CFR 164.504(e), 45 CFR 164.308(b), 45 CFR 164.314(a)
377(1)
Consent: 45 CFR 164.506
377(1)
Authorization Requirements: 45 CFR 164.508
377(1)
Release Without Consent or Authorization: 45 CFR 164.512
378(1)
Avert a Serious Threat to Safety: 45 CFR 164.512(j)
378(1)
Disclosure for Specialized Government Functions: 45 CFR 164.512(k)
379(1)
Limited Data Set: 45 CFR 164.514(e)
379(1)
Notice of Privacy Practices: 45 CFR 164.520
380(1)
Patient Privacy Rights
380(1)
Privacy Official and Security Official: 45 CFR 164.530(a), 45 CFR 164.308(a)(2)
380(1)
Workforce Training: 45 CFR 164.530(b), 45 CFR 164.308(a)(5)
380(1)
Standard Safeguards: 45 CFR 164.530(c)
380(1)
Sanctions: 45 CFR 164.530(e), 45 CFR 164.308(a)(1)
381(1)
Privacy and Security Policies and Procedures: 45 CFR 164.530(i), 45 CFR 164.316
381(1)
HIPAA Security Rule: 45 CFR Part 164, Subpart C
381(5)
Administrative Safeguards: 45 CFR 164.308
381(3)
Physical Safeguards: 45 CFR 164.310
384(1)
Technical Safeguards: 45 CFR 164.312
385(1)
Breach Notification Rule: 45 CFR Part 164, Subpart D
386(3)
Breach Definition: 45 CFR 164.402
386(1)
General Breach Description Notification Requirements: 45 CFR 164.404(a-c)
387(1)
Methods of Notification: 45 CFR 164.404(d)
388(1)
Notification Delay for Law Enforcement Purposes: 45 CFR 164.412
388(1)
Specific CE Requirements: 45 CFR 164.404
388(1)
Specific BA Requirements: 45 CFR 164.410
389(1)
HIPAA Enforcement Rule: 45 CFR Part 160
389(1)
Additional Guidance
390(1)
Chapter Review
390(5)
Questions
391(2)
Answers
393(1)
References
394(1)
Chapter 16 Health Information Technology and Health Policy
395(16)
Allison Viola
The Linkage Between Health Policy and Health IT: Why It's Important
395(1)
Precision Medicine Initiative
396(2)
Interoperability
398(1)
New Payment Models
398(2)
Computable Privacy
400(2)
EHR Incentive and Certification Programs
402(1)
Quality Measures
403(1)
Chapter Review
404(8)
Questions
404(2)
Answers
406(1)
References
407(4)
Chapter 17 The Electronic Health Record as Evidence
411(54)
Kimberly A. Baldwin-Stried Reich
Sources and Structure of U.S. Law
412(1)
Three Branches of U.S. Government Responsible for Carrying Out Government Powers and Functions
412(12)
Executive Branch: President, Vice President, and Cabinet
413(1)
Legislative Branch: The Senate and the House of Representatives
414(8)
Judicial Branch: Structure and Function of the U.S. Court System
422(2)
The Medical Record
424(6)
EHR Standards for Records Management and Evidentiary Support
430(1)
The Role and Use of the Medical Record in Litigation and/or Regulatory Investigations
431(2)
Paper-based Medical Records vs. Electronic Health Records in Discovery
431(2)
Discovery and Admissibility of the EHR
433(1)
The Federal Rules of Evidence (FRE)
433(3)
Medical Records as Hearsay
434(1)
Physician-Patient Privilege
435(1)
Incident Report Privilege
436(1)
The Scope and Procedures of E-Discovery Process
437(5)
Impact of the 2015 Amendments to the E-Discovery Process
438(4)
Duty to Preserve Relevant Evidence and Establishing Legal Holds
442(1)
The Path Forward: A Coming Together of Laws, Rules, and Regulations
442(8)
The HITECH Act
443(1)
The Health Insurance Portability and Accountability Act
443(1)
The Convergence of E-Discovery and Release of Information Processes
444(2)
The Concept of the Legal Health Record
446(4)
A New Era in the Nation's Health Information Infrastructure
450(2)
Cures Act
450(1)
NIST
451(1)
Chapter Review
452(15)
Questions
452(2)
Answers
454(1)
References
455(10)
Part IV: Implementing, Managing, and Maintaining Healthcare IT
Chapter 18 Effective Organizational Communication for Large-Scale Healthcare Information Technology Initiatives
465(22)
Liz Johnson
Importance of Communications in Health IT Initiatives
467(3)
Leadership and Governance
467(2)
Rules for Governance
469(1)
Focus on Customers and Players
470(3)
Patients and Communities
470(1)
Physicians
471(1)
Nursing Workforce
471(1)
IT Departments and Multidisciplinary Project Teams
472(1)
Healthcare System Leadership
473(1)
Components of a Communications Plan
473(1)
Project Phases and the Communication Functions
473(1)
Communication Metrics
474(1)
Key Industry Considerations
474(5)
The Expanding World of Media
475(1)
Role of Federal Healthcare Agencies
476(1)
Role of Regulatory Standards and the Evolution of Health Information Exchange
477(2)
Chapter Review
479(9)
Questions
480(1)
Answers
481(1)
References
482(5)
Chapter 19 Non-EHR HIT: From Architecture to Operations
487(22)
Alistair Erskine
Bipin Karunakaran
The Healthcare IT Organization: Challenges, Structures, and Roles
488(2)
HIT Major Non-EHR HIT Systems and Applications
490(14)
Working with Enterprise HIT Systems
491(1)
Vendor-Specific Systems: Acquisition, Installation, and Maintenance of HIT Systems
492(2)
Radiology Systems
494(2)
Pharmacy Systems
496(2)
Lab Systems
498(1)
Patient Monitoring Systems
499(1)
Supply Chain Systems
500(1)
ERP Software Systems
501(1)
Finance and Operations Systems
501(2)
Clinical Decision Support (CDS)
503(1)
Patient Relationship Management Systems
503(1)
Application Data Interchange Systems
504(1)
Chapter Review
504(1)
Questions
505(1)
Answers
506(1)
References
507(2)
Chapter 20 EHR Implementation and Optimization
509(30)
Diane Hibbs
Julie Hollberg
Using HIT and EHRs for Organizational Transformation
510(8)
Banner Health
510(1)
Emory Healthcare
511(3)
Governance of Large HIT and EHR Initiatives
514(3)
Change Management
517(1)
Managing the Project
518(16)
A Good Product and Team
519(1)
The Orders Catalog and Order Sets
520(1)
Documentation Templates and Note Hierarchy
521(1)
Migrating Data
521(1)
Extraction, then Conversion
522(1)
Develop Workflows
522(2)
Policies Affect Workflows
524(1)
Testing
525(1)
Training
526(1)
Reduce Schedules for Go-Live
526(2)
Downtime Procedures
528(1)
Go-Live Support
528(2)
During and Post Go-Live Communication
530(1)
Monitoring Success
531(3)
Chapter Review
534(1)
Questions
534(2)
Answers
536(1)
References
536(3)
Chapter 21 Training Essentials for Implementing Healthcare IT
539(18)
Cheryl A. Fisher
Models and Principles
540(1)
Assessing Basic Skill Level
541(1)
Design Elements
542(3)
The Adult Learner
544(1)
Constructing a Lesson Plan
545(3)
Multimedia as a Method of Delivery
546(1)
Current Internet Technologies
547(1)
Training Delivery and Accommodation
548(1)
Evaluating Learning
548(2)
Program Evaluation
550(1)
Utilizing a Learning Management System
550(2)
New Directions
551(1)
Chapter Review
552(5)
Questions
553(1)
Answers
554(1)
References
555(2)
Chapter 22 Using Healthcare IT to Measure and Improve Healthcare Quality and Outcomes
557(30)
Floyd P. Eisenberg
Why Measure Quality?
557(1)
Defining Quality Measures for EHR Queries
558(6)
What Makes a Quality Measure Worth Measuring?
564(1)
Evidence-Based Clinical Practice Guidelines
564(1)
What Is the Connection Between Clinical Decision Support and Quality Measurement?
565(1)
What Is the Measure of a Measure?
566(1)
What Are the Types of Measures, and How Are They Different?
567(1)
What Are the Expectations for the EHR to Perform Measurement?
567(4)
What Changes Are Needed to Enable Electronic Clinical Quality Measures?
571(2)
Data Modeling: Example from the International Health Information Terminology Standards Development Organization
572(1)
How Are Value Sets Standardized?
573(1)
Moving Forward: Retooling vs. Creating Measures de Novo Based on Data in EHRs
574(1)
Chapter Review
575(13)
Questions
576(2)
Answers
578(1)
References
579(8)
Part V: Optimizing Healthcare IT
Chapter 23 Big Data and Data Analytics
587(30)
John E. Mattison
Innovation in Healthcare IT: The Creative Reconstruction of Health and Wellness
588(1)
Which Technologies Are Creating Big Opportunities for Innovation?
589(3)
How Do We Optimize the Human-Machine Interface?
590(1)
How Do We Accelerate Continuous Learning and Innovation?
591(1)
A Simple Taxonomy for Innovation
592(1)
The Different Communities Engaged in Healthcare Delivery
593(4)
Person-Centric Communities
593(1)
Professional Care-Delivery Teams
594(2)
Personal Caregiver Networks
596(1)
What Can the Impact of Innovations Be on the Future Technologies?
597(1)
Key Gaps and How Technology Can Help Close Them
597(12)
The Empathy Gap Is the Most Important Gap to Close
598(1)
Gap Between Evidence and Behavior for Disorders of Lifestyle
599(2)
Environmental Disruption Gap (Chemical, Thermal, Microbial)
601(1)
Learning/Education/Communication Gap
602(3)
AI/Robotics Robotics Gap
605(1)
Gap in Seamless and Reliable Human Data Entry
605(1)
Gap in Evidence-Based Virtual Care
605(1)
The Science vs. the Application of -omics (Genomics, Microbiomics, Proteomes, etc.) Gap
606(1)
Gap in Drones and Healthcare
607(1)
Gap in 3D Printing
607(1)
Gap in Chatbots, AI, Trust, and Health
607(1)
Gap in Transcranial Magnetic Stimulation and Health
608(1)
Gap in New Psychopharmacology Research and Previously Refractory Psychiatric States
608(1)
Gap in Harnessing Exponential Technology
608(1)
Chapter Review
609(9)
Questions
610(2)
Answers
612(1)
References
613(4)
Chapter 24 Innovations in Healthcare Impacting Healthcare Information Technology
617(22)
Kathleen A. McCormick
Innovations in Genetics/Genomics/Pharmacogenomics
618(1)
Genetics/Genomics Throughout the Healthcare Continuum
619(4)
New Major Sources of Evidence with a Focus on Pharmacogenomics
620(1)
The IT Volume Challenge of Monitoring Genetics/Genomics/Pharmacogenomics in Healthcare
621(2)
Innovations in Mobile Devices in Healthcare
623(5)
Wireless Communication Technologies and Standards
624(1)
Mobile Devices Connected to the Internet
624(1)
Mobile Device Security Protocols
625(1)
How Mobile Networks Are Being Used in Healthcare
625(1)
The Most Popular Mobile Health Apps
625(1)
Healthcare Professionals' Use of Mobile Devices
626(1)
Major Barriers to Advancing Mobile Devices
626(1)
Steps to Institutionalizing Genomic and Mobile Technologies
627(1)
Innovative Institutions Pushing Advances in Genomics and Mobile Devices
627(1)
Nine Technologies for Future Innovation Using Devices
628(1)
Social Media Being Used in Healthcare
628(1)
Innovations in Telehealth
628(2)
Major Services of Telehealth
629(1)
Delivery Mechanisms Used for Telehealth
629(1)
Chapter Review
630(14)
Questions
630(2)
Answers
632(1)
References
632(7)
Part VI: Making It All Secure: Healthcare IT Privacy, Security, and Confidentiality
Chapter 25 Framework for Privacy, Security, and Confidentiality
639(32)
Dixie B. Baker
When Things Go Wrong
644(3)
HIT Trust Framework
647(16)
Layer 1: Risk Management
647(2)
Layer 2: Information Assurance Policy
649(1)
Layer 3: Physical Safeguards
650(1)
Layer 4: Operational Safeguards
651(4)
Layer 5: Architectural Safeguards
655(2)
Layer 6: Technology Safeguards
657(5)
Layer 7: Usability Features
662(1)
Chapter Review
663(9)
Questions
663(2)
Answers
665(1)
References
665(6)
Chapter 26 Risk Assessment and Management
671(22)
Gila Pyke
Definitions
672(1)
Risk Management in Healthcare IT
673(1)
The Risk-Management Process
674(9)
Risk Identification
675(1)
Risk Assessment
676(5)
Risk-Mitigation Planning
681(1)
Risk-Mitigation Tracking
682(1)
Documentation and Communication
682(1)
Domains of Risk Analysis
683(5)
Security Risk Analysis
683(3)
Application and Data Criticality Analysis
686(1)
Privacy Risk Analysis
686(1)
Safety Risk Assessment
687(1)
Chapter Review
688(5)
Questions
688(2)
Answers
690(1)
References
690(3)
Chapter 27 Physical Safeguards, Facility Security, Secure Systems and Networks, and Securing Electronic Media
693(22)
Dennis M. Seymour
Physical Safeguard Requirements
693(1)
Locating Storage Devices, Network Hardware, Printers, and Other Devices
694(1)
Securely Handling Protected Health Information (PHI)
695(5)
Monitor Placement
695(1)
Privacy Screens
695(1)
Printer, Fax Machine, and Scanner Placement
695(1)
Screensavers
696(1)
Time Lockout
696(1)
Access to Servers, Offices, and Data Closets
696(2)
Access-Control Devices
698(2)
Building Secure Systems
700(4)
Office Hardware
700(1)
Locks
700(1)
Door Locks
701(1)
Environmental Controls
701(2)
Other Controls
703(1)
Securing and Preserving Electronic Media Storage Devices
704(2)
Flash Drives
704(1)
Personal Computers (PCs)
704(1)
Laptops
705(1)
Secure Digital (SD) Card
705(1)
External Drives
705(1)
Servers
705(1)
Network-Attached Storage (NAS)
706(1)
Storage Area Network (SAN)
706(1)
Encryption
706(2)
Symmetric Encryption
707(1)
Asymmetric or Public Key Infrastructure (PM)
707(1)
TLS/SSL
707(1)
DES
707(1)
AES
707(1)
3DES
708(1)
PGP
708(1)
Secure Disposal of Electronic Media
708(3)
Secure Shredding, Degaussing, and Sanitizing
708(1)
Determining the Level and Type of Destruction
709(2)
Chapter Review
711(4)
Questions
711(2)
Answers
713(1)
References
714(1)
Chapter 28 Healthcare Information Security: Operational Safeguards
715(26)
Sean Murphy
Operational Safeguards: A Component of Information Security
715(1)
Operational Safeguards in Healthcare Organizations
716(10)
Security Management Process
720(1)
Information Management Council
720(1)
Identity Management and Authorization
720(1)
Awareness and Training Programs
721(1)
Risk Assessment
721(1)
Software and System Development
722(1)
Configuration Management
723(1)
Consent Management
723(1)
System Activity Review
724(1)
Continuity of Operations
724(1)
Incident Procedures
725(1)
Sanctions
725(1)
Evaluation
725(1)
Business Associate Contracts
726(1)
Healthcare-Specific Implications on Operational Safeguards
726(3)
Networked Medical Devices
726(2)
Multiple-Tenant Virtual Environments
728(1)
Mobile Device Management
729(1)
Operational Safeguards in Emerging Healthcare Trends
729(5)
Healthcare in the Cloud
729(2)
International Privacy and Security Concerns
731(1)
Health Information Exchanges
731(1)
Workforce Information Security Competency
731(1)
Accountable-Care Organizations
732(1)
Meaningful Use Privacy and Security Measures
733(1)
Chapter Review
734(8)
Questions
735(1)
Answers
736(1)
References
737(4)
Chapter 29 Architectural Safeguards
741(12)
Lisa A. Gallagher
Reliability
742(2)
Relationship Between Reliability and Security
742(1)
Reliability Implications for Healthcare Systems
743(1)
Availability
744(1)
Availability as a Component of Data Security
744(1)
Maintainability
745(1)
Scalability
745(1)
Safety
745(2)
Considerations for Healthcare IT Systems
746(1)
Considerations for Medical Devices
746(1)
Considerations for Design of High-Reliability Healthcare Systems
747(2)
Fail-Safe Design
748(1)
Fault Tolerance
748(1)
Redundancy and Failover
748(1)
Simplicity
749(1)
Chapter Review
749(4)
Questions
750(1)
Answers
751(1)
References
751(2)
Chapter 30 Healthcare Cybersecurity Technology
753(28)
Mac McMillan
Healthcare Cybersecurity Threat
753(7)
Think Like a Bad Guy
756(1)
The Big Four: Cybercrime, Cyber Espionage, Hacktivism, and Advanced Persistent Threats
757(2)
Staying Abreast of the Threat
759(1)
Planning for Outcomes: Cybersecurity Frameworks and Standards
760(2)
Building a Secure Architecture
762(8)
Maintaining a Current Environment
762(1)
Managing Privileges
763(1)
Thwarting Cyber Exploitation
764(1)
Isolating Cyber Threats
764(1)
Detecting Cyber Intrusions
765(1)
Detecting Web-Based Threats
766(1)
Detecting the Unknown
766(1)
Addressing the Ubiquitous Threat of IoT
767(1)
Monitoring Activity
768(1)
Conducting Information Correlation and Analysis
769(1)
Looking for Vulnerabilities
770(5)
Vulnerability Testing
770(2)
Penetration Testing
772(2)
Red Teaming for Readiness
774(1)
Chapter Review
775(6)
Questions
776(2)
Answers
778(1)
References
779(2)
Chapter 31 Cybersecurity Considerations for Medical Devices
781(24)
Axel Wirth
Medical Device Cybersecurity and Cybersafety: An Introduction
781(2)
Medical Device Vulnerabilities and Risks: A Review
783(2)
Medical Device Regulation: Impact on Cybersecurity
785(4)
Regulatory Background
785(2)
Changes in the Regulatory Landscape
787(2)
Implementing Medical Device Cybersecurity
789(7)
A Shared Responsibility
790(1)
Risk Analysis, Assessment, and Management: Laying the Foundation
791(5)
Chapter Review
796(12)
Questions
796(2)
Answers
798(1)
References
799
Part VII: Appendixes
Appendix A: AHIMA CHTS Exams Domain Maps
CHTS-CP: Clinician/Practitioner Consultant Examination
805(1)
CHTS-IM: Implementation Manager Examination
806(1)
CHTS-IS: Implementation Support Specialist Examination
807(1)
CHTS-PW: Practice Workflow & Information Management
Redesign Specialist Examination
808(2)
CHTS-TR: Trainer Examination
810(1)
CHTS-TS: Technical/Software Support Staff Examination
811(4)
Appendix B: HIMSS CAHIMS Exam Domain Map
Appendix C: About the CD-ROM
System Requirements
815(1)
Installing and Running Total Tester Premium Practice Exam Software
815(1)
Total Tester Premium Practice Exam Software
815(1)
Secured Book PDF
816(1)
Glossary and Appendix PDFs
816(1)
Risk Register and Example Risk Map from
Chapter 26
817(1)
Technical Support
817(2)
Index 819
Kathleen McCormick was the recipient of the 2013 International Award for Nursing Informatics Leadership from Sigma Theta Tau. McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide