0% found this document useful (0 votes)
9 views5 pages

NCM110 Handout 6 AdminApp

The document discusses various methodologies and systems in nursing informatics, including the System Development Life Cycle, Waterfall Method, and Dynamic System Development Method, highlighting their traits and suitability for different project sizes. It also covers the importance of healthcare administrative information systems, interoperability, and the role of open source software in enhancing patient care and communication. Additionally, it addresses electronic security measures, user authentication, and potential threats to security in healthcare organizations.

Uploaded by

Jericka Mae
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views5 pages

NCM110 Handout 6 AdminApp

The document discusses various methodologies and systems in nursing informatics, including the System Development Life Cycle, Waterfall Method, and Dynamic System Development Method, highlighting their traits and suitability for different project sizes. It also covers the importance of healthcare administrative information systems, interoperability, and the role of open source software in enhancing patient care and communication. Additionally, it addresses electronic security measures, user authentication, and potential threats to security in healthcare organizations.

Uploaded by

Jericka Mae
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Nursing Informatics Administrative Applications Rapid Prototyping or Rapid Application Development

System Development Life Cycle


• Used to make important and appropriate organizational
decision for technology adoption
• The process of developing systems
• Is a way to deliver efficient and effective information Traits
systems that fit with the strategic organizational plan • Fast development through prototyping and user testing
• Advantage is the speed with which the system can be
developed
Waterfall Method • Disadvantage is the fast pace there will be inadequate
testing to be completed

Dynamic System Development Method

Traits
• One of the oldest methods
• Sequential process Traits
• Gradual progress • Highly iterative and incremental approach
• Encounters difficulty when there are changes • High level of user input and involvement
• Suitable for small to medium projects • Three Phases:
1) Pre-project;
2) Project Life Cycle;
3) Post-project
to enhance the overall outcomes for patients with chronic
Open Source Software and Free/Open Source Software illness
• Freedom of users to implement, modify, apply, -beneficial for patients with a high cost of care and
reconstruct and restructure the rich libraries of open complex health needs, such as the elderly and patients
source codes available from proven, well-tested with chronic disease condition
products
• Advantages: Cost, Freedom, Collaboration, Flexibility B. Communication Systems
• Disadvantages: Support, Security, Compatibility -promote interaction among healthcare providers and
between providers and patients
Healthcare Administrative Information System -enhance the flow of communication within an
• Collect, process, and distribute patient-centered data to organization and promote an exchange of information to
aid in managing and providing care care better for patients
• Functions and provides information to clinicians and
administrators C. Core Business Systems
-enhance administrative tasks within healthcare
• Interoperability organizations
• Ability to share information (patient data) across -provide the framework of reimbursement, support of best
organizations practices, quality control and resource allocation
• A key component to coordinated, patient-centered -Four common business systems:
care 1. Admission, Discharge, & Transfer (ADT) – care
• Is driven by the need to “achieve nationwide coordination
interoperability to enable learning health system, with 2. Financial Systems – manage expense and revenue
the person at the center of the system that 3. Acuity Systems – monitor patient population/type
continuously improve care, public health, and science 4. Scheduling Systems – staff, services, equipment
through real-time data access” (ONC, 2015, p. vii) allocation

D. Order Entry Systems


Types of Healthcare Organization Information System -automates the way that orders have traditionally been
initiated for patients
A. Case Management Information Systems -provide major safeguards by ensuring that physician
-identify resources, patterns, and variances in care to orders are legible and complete to achieve a level of
prevent costly complications related to chronic conditions patient safety
-computerized physician order entry systems
Electronic Security
E. Patient Care Support Systems - Secures network information
-focus on collecting data and disseminating information • Network – linked computers - may create possibility of
related to direct care breached and exposed information to unauthorized use
-Four systems most commonly used:
1. Clinical Documentation Systems Three main areas of Secure Network Information:
2. Pharmacy Information Systems 1. Confidentiality – information handling
3. Laboratory Information Systems 2. Availability – information accessibility
4. Radiology Information Systems 3. Integrity – information accuracy and genuineness

Authentication of Users
Aggregating Patient and Organizational Data -used in organizations in their security policies
Most common ways to authenticate users rely on
something…
1. the user knows – passwords
Holistic
View of
the
Patient

• Many healthcare organizations now aggregate data in


a data warehouse for the purpose of mining the data to
discover new relationships and build organizational
knowledge.

• Database – structured or organized collection of data


that is typically the main component of an IS

• Data Warehouse/repository – stores all of an


organization’s data and makes those data available for
data mining.
• Downloading files from the internet - most common way
2. the user has - ID Badge, RFID viruses and other malicious codes enter a computer
network
• Cookies -> Spy cookies

Security Tools
• Wide range of tools that aids to protect the
organizational network and information
• Includes cybersecurity software such as Antivirus
technology, firewalls and data encryption used in
healthcare
3. the user is - Biometrics • Includes cybersecurity hardware such as proxy servers

Threats to Security
• Hackers
• Malicious codes (spyware, adware, ransomware, viruses,
worms and Trojan Horses)
• Malicious Insiders
References
Brook, C. (2024, August 26). Understanding data security
tools, their capabilities, and why they are important.
Digital Guardian. Retrieved from
https://www.digitalguardian.com/blog/understandi
ng-data-security-tools-their-capabilities-and-why-
they-are-important

Healthcare Information and Management Systems Society


(HIMSS). (n.d.). Interoperability in healthcare.
Retrieved from
https://legacy.himss.org/resources/interoperability-
healthcare

Karopka, T., Schmuhl, H., & Demski, H. (2014). Free/libre


open source software in health care: A review.
Healthcare Informatics Research, 20(1), 11–22.
https://doi.org/10.4258/hir.2014.20.1.11

McGonigle, D., & Mastrian, K. G. (2022). Nursing informatics


and the foundation of knowledge (5th ed.). Jones &
Bartlett Learning.

Saba, V. K., & McCormick, K. A. (2015). Essentials of nursing


informatics (6th ed.). McGraw-Hill Education.

Stair, R., & Reynolds, G. (Year). Principles of information


systems (12th ed.). Cengage.

You might also like