QUESTION Which terminology serves as a resource to represent domain knowledge of interest and thus facilitates data collection, processing, and aggregation using computer processing? a. Ontology b. Classification c. Reference terminology d. Nomenclature ANSWER: ANS: C Reference terminology serves as a resource to represent domain knowledge of interest and thus facilitates data collection, processing, […]
QUESTION A unit has been experiencing a high rate of patient falls for the past three months. According to Donabedian’s model, patient falls would be considered: a. structure. b. process. c. outcome. d. effectiveness. ANSWER: ANS: C The end results of the structures and processes are considered outcomes. These may include clinical outcomes. The […]
QUESTION Your organization acknowledges that providers want to improve their user experience with health information technology (IT) products. You want to raise awareness of the potential benefits to the organization. You could draw on stated benefits such as: a. improved productivity, patient safety, and decreased customer support costs. b. improved cognitive support, increased maintenance costs, […]
QUESTION What is a negative impact of the increased use of mobile devices in transmitting health data? a. They support increased health data access for providers. b. They increase the risk of a security breach. c. They decrease productivity. d. They increase the number of medication errors. ANSWER: ANS: B The largest downfall to […]
QUESTION Which of these best describes an example of usability? a. The IT department is surveying your unit to determine the placement of new computer workstations. b. A researcher is conducting a study of how nurses interact with electronic documentation to organize care handoffs. c. The leadership in your institution is asking for your help […]
QUESTION What is the difference between the safe harbor and expert determination methods of de-identifying data? a. The safe harbor method involves removal of 18 types of identifiers, and the expert determination method involves the application of statistical or scientific models. b. The safe harbor method involves the application of statistical or scientific models, and […]
QUESTION National efforts to improve the user experience are under way in the U.S. One organization involved with this effort is the: a. Office of Technology and Disasters. b. American Nurses Association. c. National Institute of Standards and Technology. d. National League for Nursing. ANSWER: ANS: C An organization involved in national efforts to […]
QUESTION Which principles are included in IMIA’s Code of Ethics for informatics? (Select all that apply.) a. Information-Privacy and Disposition b. Openness c. Elimination of Threats d. Legitimate Infringement e. Accountability ANSWER: ANS: A, B, D, E IMIA’s Code of Ethics for informatics includes Information-Privacy and Disposition, Openness, Security, Access, Legitimate Infringement, Least Intrusive […]
QUESTION You want to make sure you consider crucial components as you design your first usability study. One of these components is to consider users and their characteristics. Other components are: a. a developmental timeline, tasks, information, product, and context. b. tasks, information, projected errors, context, and interactions. c. information, a developmental timeline, context, and […]
QUESTION Which are examples of secondary use of health information? (Select all that apply.) a. Treatment b. Surveillance c. Research d. Marketing ANSWER: ANS: B, C, D The three most common secondary uses of personal health information include public health monitoring or surveillance, research, and marketing. Treatment for an illness would be a primary […]