NCM110 Handout 6 AdminApp
NCM110 Handout 6 AdminApp
Traits
• One of the oldest methods
• Sequential process Traits
• Gradual progress • Highly iterative and incremental approach
• Encounters difficulty when there are changes • High level of user input and involvement
• Suitable for small to medium projects • Three Phases:
1) Pre-project;
2) Project Life Cycle;
3) Post-project
to enhance the overall outcomes for patients with chronic
Open Source Software and Free/Open Source Software illness
• Freedom of users to implement, modify, apply, -beneficial for patients with a high cost of care and
reconstruct and restructure the rich libraries of open complex health needs, such as the elderly and patients
source codes available from proven, well-tested with chronic disease condition
products
• Advantages: Cost, Freedom, Collaboration, Flexibility B. Communication Systems
• Disadvantages: Support, Security, Compatibility -promote interaction among healthcare providers and
between providers and patients
Healthcare Administrative Information System -enhance the flow of communication within an
• Collect, process, and distribute patient-centered data to organization and promote an exchange of information to
aid in managing and providing care care better for patients
• Functions and provides information to clinicians and
administrators C. Core Business Systems
-enhance administrative tasks within healthcare
• Interoperability organizations
• Ability to share information (patient data) across -provide the framework of reimbursement, support of best
organizations practices, quality control and resource allocation
• A key component to coordinated, patient-centered -Four common business systems:
care 1. Admission, Discharge, & Transfer (ADT) – care
• Is driven by the need to “achieve nationwide coordination
interoperability to enable learning health system, with 2. Financial Systems – manage expense and revenue
the person at the center of the system that 3. Acuity Systems – monitor patient population/type
continuously improve care, public health, and science 4. Scheduling Systems – staff, services, equipment
through real-time data access” (ONC, 2015, p. vii) allocation
Authentication of Users
Aggregating Patient and Organizational Data -used in organizations in their security policies
Most common ways to authenticate users rely on
something…
1. the user knows – passwords
Holistic
View of
the
Patient
Security Tools
• Wide range of tools that aids to protect the
organizational network and information
• Includes cybersecurity software such as Antivirus
technology, firewalls and data encryption used in
healthcare
3. the user is - Biometrics • Includes cybersecurity hardware such as proxy servers
Threats to Security
• Hackers
• Malicious codes (spyware, adware, ransomware, viruses,
worms and Trojan Horses)
• Malicious Insiders
References
Brook, C. (2024, August 26). Understanding data security
tools, their capabilities, and why they are important.
Digital Guardian. Retrieved from
https://www.digitalguardian.com/blog/understandi
ng-data-security-tools-their-capabilities-and-why-
they-are-important