10-530-164Intro to Health Informatics
Course Information
Description
Emphasizes the role of information technology in healthcare through an investigation of the electronic health record (EHR), business, and health information software applications. Learners will develop skills to assist in enterprise information management and database architecture design and implementation.
Total Credits
3
Course Competencies
-
EXAMINE the interconnection of information systems within a healthcare organizationAssessment StrategiesOral, written or graphic assessmentCriteriadifferentiate among source systems and core electronic health record componentsexamine the data that is shared among information systems within the organizationidentify the ways in which data is shared across systems (e.g. interface, HL7 transactions etc.)
-
EXAMINE transaction and exchange regulations and standards for the sharing and exchange of electronic health informationAssessment StrategiesOral, written or graphic assessmentCriteriaidentify certification requirements and why they are importantcompare transaction standards (e.g. 837 Healthcare Claim etc.)describe data marts, data warehouses, and health information exchangesexplain advantages of sharing and exchange of electronic health informationexplain concepts of interoperability
-
EVALUATE information systems for vulnerabilities to mitigate risk of unauthorized access to assets and protected informationAssessment StrategiesOral, written or graphic assessmentCriteriaidentify vulnerabilities (potential and actual) that increase risk of unauthorized access to information systemsrecommend physical, technical, and administrative controls to mitigate vulnerabilitiesidentify whether recommended controls are preventative, detective, or correctiveexplain the rationale for stated recommendations
-
ANALYZE system policies and procedures for compliance with HIPAA security rulesAssessment StrategiesOral, written or graphic assessmentCriteriaexamine the contents of security policies and proceduresidentify user activity and other security flags that may indicate inappropriate access to information systemsprovide recommendations to address gaps in compliance with security rules
-
EVALUATE information systems for vulnerabilities to cyber security threatsAssessment StrategiesOral, written or graphic assessmentCriteriadescribe potential cyber security threatsdefine steps that may be taken to prevent disruption or loss of information resulting from cyber security threats
-
SUPPORT the organization in response to system down time resulting from a cyber attack or other disasterAssessment StrategiesOral, written or graphic assessmentCriteriadescribe procedures to promote business continuity during system down-time resulting from cyber security attacks or other disasterdescribe procedures to recover/restore information following system down-timedescribe procedures for reporting and responding to breaches in security
-
EXAMINE the clinical terminologies used in the collection, reporting and exchange of healthcare dataAssessment StrategiesOral, written or graphic assessmentCriteriaexplain the importance of standardized clinical terminologies for interoperabilitydifferentiate among the various standardized clinical terminologies that are used in the electronic health record (i.e. the use, application and structure of SNOMED, LOINC, RxNorm, UCUM etc.)
-
SUPPORT implementation of an information system or applicationAssessment StrategiesOral, written or graphic assessmentCriteriadistinguish between team rolescompare systems against criteriadescribe system needsexamine the system implementation processexplore the importance of system integration
-
EXAMINE current trends and future challenges of electronic health informationAssessment StrategiesOral, written or graphic assessmentCriteriaidentify a variety of trends in electronic health informationexamine the impact of selected trends on health information systemsidentify the impact of selected trends on consumer health/digital literacy