Informatics Reviewer

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

UNIT 1 Memory”

- compact disc that stores computer data


COMPUTER HARDWARE – physical elements of
7. EXPANSION CARD – printed circuit board can be
computer. Machinery/ equipment of computer.
inserted into electrical connector.
- Keyboard, mouse, processing unit.
- enhance the quality of specific function.
INPUT DEVICES – provide data and control signals.
B. COMPUTER SOFTWARE – consists of encoded
1. COMPUTER KEYBOARD – enter characters and
information/ computer instructions.
functions. Primary device used to enter text
2. COMPUTER MOUSE – pointing device SOFTWARE – organizing collections of computer data
3. COMPUTER MICROPHONE – captures audio and and instructions. Two categories:
sends to computer. Record audio, relay sounds live for - basic non-task-specific function
video chat or audio stream - application software - used accomplish specific task
4. SCANNER – transfer images into computer.
History of Computer Software - An outline (algorithm) for
5. WEBCAM – can’t operate independently
what would have been the first piece of software was
- no inbuilt memory
written by Ada Lovelace in 1843, for the planned Analytical
- capture photograph/videos; often used livestream
Engine, designed by Charles Babbage in 1827, but the it
6. DIGITAL CAMERA – capture photograph/video
never came into operation.
independently
TYPES OF COMPUTER SOFTWARE
OUTPUT DEVICE – converts information into readable
form. Text, graphic, tactile, audio, video APPLICATION SOFTWARE – “App” or “Application”
- general designation of computer to perform tasks
1. MONITOR – most common output device
- contrast to system software
- screen, circuitry, power supply, buttons, casing.
- ex. word processor, a spreadsheet, an accounting
2. HEADPHONES – earphones
application, a web browser, a Media player, an
- listening to audio
aeronautical flight simulator, a console game or a photo
3. COMPUTER SPEAKERS – transform the signal from
editor.
computer’s sound card to audio
4. PRINTER – text to paper TYPES OF APPLICATION SOFTWARE
- electronic data on computer and generate hard copy
5. PROJECTOR – projects data onto wall/screen 1. General Purpose Application Software - used for
variety of tasks. Not limited to one particular function
- ex. Word processor,
2. Special Purpose Application Software – use one
SYSTEM UNIT – “tower” or “chassis”
specific task.
-main part of computer.
- ex. Camera, chess
- differentiate between the computer and peripheral devices.
SYSTEM SOFTWARE - generic term to computer
1. MOTHERBOARD – essential part of computer
programs
- holds together many crucial components
- start/run computer system
2. HARD DISK DRIVE – “Hard Drive”
- provide services to other software
- non-volatile computer storage device
Cloud Based Software - services to a software client
- store data permanently
not to the user directly.
3. RANDOM ACCESS MEMORY (RAM)
- form of memory that read and changed in any order TYPES OF SYSTEM SOFTWARE
- allows data items to be read or written in almost the same
amount of time 1. OPERATING SOFTWARE - allows the parts of a
computer to work together like transferring data
4. CENTRAL PROCESSING UNIT - Provides a platform to run high-level system software and
- “central processor” or “main processor” application software
- executes instructions that make up program - Manages computer hardware and software resources
5. POWER SUPPLY – supplies power to computer
- pulls required amount of electricity and converts AC
current to DC current
6. CD-ROM DRIVE – “Compact Disc Read Only
2. LANGUAGE TRANSLATOR - Translate a set of -Protection of one’s innermost self by determining who or
instruction code to machine level language what enters our personal space
3 Types of Translators:
IMPORTANCE OF PRIVACY ETHICS
A. COMPILER - Used to convert high-level programming
- Individuals maintain their autonomy and individuality
language to low-level.
- Protect people's identities
- Converts whole program in one session
- To control crime such as cyber stalking, cyber terrorism
- Processor-dependent and platform-dependent
and cyber theft
B. INTERPRETER -Used to convert high-level
programming language to low-level but easier to detect PRIVACY CONCERNS:
errors. HACKING – unlawful intrusion into a computer. It can
- Often used as a debugging tool for software development acquire unauthorized access to other computers.
C. ASSEMBLER - Used to translate assembly language to MALWARE – malicious software which is created to
machine language. impair computer system.
- Low-level programming language COMMON MALWARE – viruses, spyware, worms
-Translates a low-level language (the machine code) – can and Trojan horses.
be directly understood by the CPU VIRUS – can delete files from a hard drive
SPYWARE – can collect data from a computer
3. COMMUNICATION SOFTWARE -Provide remote
DATA PROTECTION – knows as INFORMATION
access to systems and exchange files and messages in text,
PRIVACY or DATA PRIVACY
audio, video format with different computers. Ex. Email,
- Process of safeguarding data which intends to influence a
chat, messaging apps
balance between individual privacy rights
4. UTILITY SOFTWARE - To help to analyze, configure, ANONYMITY – way of keeping a user’s identity masked
optimize or maintain a computer. through various apps.
- To support the computer infrastructure contrast to
application software
INTELLECTUAL PROPERTY RIGHTS
COMPUTER ETHICS - Set of moral standards that – rights given to persons over the creations of their minds.
govern the use of computers. COPYRIGHT – gives proprietary publication, distribution
- Deals with the procedures, values and practices that and usage rights for the author. Whatever idea the author
govern the process of consuming computing technology created cannot be employed or disseminated by anyone
without damaging moral values and beliefs of individual or without the permission of the author.
entity TRADEMARKS – used by businesses to protect their
brands
IMPORTANCE OF COMPUER ETHICS
PLAGIARISM – act of copying and publishing another
1. To protect personal and commercial information such as
person’s work without proper citation. Stealing someone’s
login & password info, credit card and account information
work and releasing it as your own work
and government and commercial databases. It also controls
CRACKING – way of breaking into system by getting past
unwanted Internet mail and ads (Spam).
the security of the system.
2. To control plagiarism, student identity fraud, and they
SOFTWARE LICENSE – allows the use of digital
use of copyrighted material, etc.
material by following the license agreement.
3. To make ICT available and accessible to all peoples,
including the disabled and the deprived. Accessibility needs REPUBLIC ACT NO. 8293
to be kept in mind during curriculum design (in educational "AN ACT PRESCRIBING THE INTELLECTUAL
contexts), in order to maximize the capabilities of the PROPERTY CODE AND ESTABLISHING THE
technology. INTELLECTUAL PROPERTY OFFICE, PROVIDING
4. To suppress dishonest business practices and to protect FOR ITS POWERS AND FUNCTIONS, AND FOR
and encourage Fair competition. OTHER PURPOSES"
5. To promote moral and social values in society.
PRIVACY ETHICS -Centered on the victims’ need to
control information about them.
- Important social concerns regarding privacy are made
transparent and inescapable
The intellectual property rights under the Intellectual
Property Code are as follows:
1. Copyright and related rights; DIKW Paradigm
2. Trademarks and service marks; DATA VS INFORMATION
3. Geographic indications;
• Data – Raw facts
4. Industrial designs;
5. Patents; • Information – Processed data
6. Layout designs [topographies] of integrated circuits; and FROM KNOWLEDGE TO WISDOM
7. Protection of undisclosed information. • Knowledge – what is known
• Wisdom – appropriate application of knowledge
COMPUTER ABUSE Use of Knowledge – formal dissemination of knowledge
- Use of computer to do something improper or
illegal KNOWLEDGE VIABILITY – technology-based
➢Accessing without permission in a protected applications that is easily accessible & timely information
computer
WISDOM IN INFORMATICS – Evaluate the
➢Transmitting code that causes damage to computers documentation drawn from health information system
➢Trafficking in computer passwords • Decision Making – array of decisions
Use of Wisdom – application of knowledge in appropriate
situation
UNIT 1: FUNDAMENTALS INFORMATICS
- actions directed by wisdom
Nursing Informatics Fundamentals - integrates nursing - Wisdom developed through knowledge
science with multiple information and analytical sciences
NURSING SCIENCE AND FOUNDATION OF
DIKW Pyramid KNOWLEDGE MODEL

- Data is foundation for making information then


knowledge and wisdom
METASTRUCTURES OF NURSING INFORMATICS
◘ DATA – Discrete entities without interpretation
- Objective, value free, discrete, facts & Symbols, held in
technologies
- Ex. Patient’s Vital Signs
◘ INFORMATION – Data interpreted, organized,
structured.
- Data organized into meanings
- Ex. A serial set of vital signs, placed into a context and BUILDING BLOCKS OF INFORMATICS
used for longitudinal comparisons 1. NURSING SCIENCE
◘ KNOWLEDGE – Information synthesized to formalize 2. INFORMATION SCIENCE
relationships 3. COMPUTER SCIENCE
- Information applied in contexts 4. COGNITIVE SCIENCE
- Ex. Recognition of a pattern and identification of
interventions 1. NURSING SCIENCE AND INFORMATICS
Nursing Informatics – accepted combination Nursing
◘ WISDOM – application of knowledge to solution of science, Information Science & Computer Science
human problems Nursing Science as the Building blocks of Informatics
- Evaluated Knowledge - most frequently quoted and widely accepted definitions of
- Ex. Accuracy of the synthesis of information and nursing informatics.
appropriate selection of interventions
Use Of Knowledge – ability to manage knowledge
- Learned and honed from birth
- Experience environment by acquiring, processing,
generating & disseminating knowledge
4 PHASES OF INFORMATION SYSTEM
NURSING KNOWLEDGE 1. NEEDS ASSESSMENT PHASE
• Knowledge Workers – Working with information - Initiated by someone w/ vision of future
• Knowledge Acquirers – Convenient and efficient means - analyzes organization needs
• Knowledge Users – Benefitting from valuable 1.1 Components of Need Asessment
• Knowledge Engineers – Designing, developing A. Steering Committee Members
• Knowledge Managers – Capturing & Processing • Membership
collective expertise - Board Member
• Knowledge Developers/Generators – Changing and - Representatives from all department impacted
evolving knowledge - Representatives from other companies
- Must include end-users
2. INFORMATION SCIENCE
- Chair should be a member of administration
The Science of Nursing - application and use of • Who will make final decision?
information and knowledge in organizations - Upper level makes final decision
- Information science enables the processing of information - Lower Level makes recommendations
Information Processing - Information science and
B. Consultant
computational tools are extremely important in enabling the
- used for part of the selection or implementation processes
processing of data
- used to analyze all available information and make
Information System - Combinations of hardware,
recommendations
software, and telecommunications networks
• Qualities of an Effective Consultant
3. COMPUTER SCIENCE - Consulting skills and a proven methodology
- computer essential components: hardware and software - Verbal and communication skills
- Analyze how computer systems function - Good project management skills
- Define the concept of human–technology interfaces. - Clearly defined work plan
- Define the concept of human–technology interfaces. - Flexibility and availability
- A fit with the corporate culture
4. COGNITIVE SCIENCE - Leadership in a team environment
- Interdisciplinary field that studies the mind, intelligence, - Dedication to the project at hand
- Provides the scaffolding for the analysis and modeling of - Credibility
complicated human performance • Analysis of Current System
Cognitive Informatics - Wang (2003) - transdisciplinary - Thorough understanding is essential
field that attempts to bridge the gap of understanding how - Must determine what information is used,
information is processed in the mind - May use questionnaires, observation and interviews
Artificial Intelligence - deals with the conception, - Must weight strengths and weaknesses
development, and implementation of informatics tools
- capture the complex processes of human thought and C. System Requirements
intelligence. 1. User Needs – musts and wants
- uses weighting system to rank criteria by workers.
2. Technical Criteria – Hardware and software needed
UNIT 2: - Type of architecture
3. Administrative Criteria – Security levels
LIFE CYCLE OF AN INFORMATION SYSTEM - Compliance w/ regulatory & legal requirements
- selection and implementation of information 4. Registration Criteria – Update and verification feature
- developing and marinating - Ensures client is properly identified
5. Medical Records Criteria – report storage of pertinent
4 phases of information system
client data
1. Needs assessment
- using various identifiers (Social Security No., Name, &
2. System Selection
Medical Record)
3. System Implementation
6. Order entry/ Results Reporting – Provision audit trail
4. Maintenance
- Ensures accurate entry of physician orders
7. Accounting Criteria – Generation detailed bills • Claims Status Verification / Payment
- Facilitate reimbursement of services rendered • National Health Data Standards
LP2: IHOMIS Module 1 (Patient Management)
1. ADMISSION
iHOMIS (Integrated Hospital Operations and
2. BILLING
Management Information System)
3. CASHIER
- computer-based information system developed by the 4. PHIC
Department of Health to support the hospital management 5. MSS
for effective and quality health care by providing timely, 6. MEDICAL RECORDS
relevant and reliable information. 7. REFERRAL
8. EMERGENCY ROOM
Objectives: 9. OUT-PATIENT
1. Systemically record and collect, process, store, present,
and share information on various service delivery and
management functions.
Module 2 (Service Provision)
2. Help Improve, facilitate, and make cost-effective hospital
1. NURSING CARE / WARD
transactions
2. LABORATORY
Benefits: 3. RADIOLOGY
1. Quick access and faster retrieval of patient’s data 4. PHARMACY
2. Reduce processing time of hospital transactions like 5. DOCTOR
admission of patient, processing of billing and payments 6. CENTRAL SUPPLY
3. Lessens the paper-based transactions 7. DIETARY
4. Generate hospital reports such as collections, revenues 8. DELIVERY ROOM
and expenses 9. OPERATING ROOM
5. System distribution, installation, support, maintenance 10. PHYSICAL THERAPY
and upgrades are given for FREE by DOH
Parts of iHOMIS:
• It is a package of systems solutions that includes
Admitting System, Outpatient Department System,
Emergency Room System, Billing System, Cashiering
System, Medical Records Systems, Nursing Service
System, Pharmacy System, Dietary System, Revenue
Centers’ Systems like Laboratory and Radiology, among
others, Philhealth eClaims Systems (Membership
Verification, Claims Processing, Status Monitoring) LP: rCHITS

• The iHOMIS also includes national health data reporting ◘ Real-time monitoring of maternal and child health
on tuberculosis (ITIS), injuries/kontra paputok (ONEISS), indicators through the Community Health Information
hospital statistical report (OHSRS), chronic non- Tracking System (rCHITS)
communicable diseases like cancer, diabetes, stroke, - ICT tools used in far flung communities for health service
chronic obstructive pulmonary diseases, coronary artery delivery & health decision-making.
diseases (UDRS), Anti Microbial Resistance Stewardship - Developed for GIDAs Geographically Isolated and
Program and others. disadvantages areas
- rCHITS was developed UNICEF & UP-NTHC – UP
Manila National Telehealth Center
Integrated iHOMIS: - 2011, components of rCHITS developed on top of CHITS
✓ Compliant through consultation w/ experts & end users
• PHIC Electronic Claims System - prototype of rCHITS was deployed in:
• Online Claims Eligibility Verification a. Sto Domingo, Albay
• Electronic Claims Submission b. Gamay, Northern Samar
c. Glan, Saranggani - People at different locations have audio and possibly
- 2013, rCHITS was expanded in 8 GIDA’s and 3 cities video contact which is used to carry out telehealth
applications.
• Three Components:
1. mReports – mobile app to record pertinent data in 2. Video conference – it allows to interact with medical
remote communities specialists anytime, anywhere. It allows the doctors to
- Patient data/health information entered can be examine and diagnose patients’ right form their office. They
synchronized to electrical medical record can determine whether an in-person meeting is necessary.
2. CHITS- “Community Health Information Tracking Advantages:
System” ✓ Saves time and Cost for Travel
- electronic medical record by UP Manila, College of ✓ It helps more patients
Medicine
✓ Improves medical training
- function is to retrieve, organize tracking, updating medical
✓ Enables to view and Emulate Surgeries
records faster and more efficient
✓ It helps break down the geographical barrier with your
3. LGU Dashboard- Allows local chief Executive to view patients
CHITS reports ✓ It has higher productivity and efficiency
• BENEFITS rCHITS ◘ Telehealth Terminologies
a. It has better health outcomes in geographically isolated
and disadvantaged areas (GIDAs) 1. E-care / E-health- The provision of health information
b. It continuously enhanced to better serve the Filipinos products and services online as well as the automation of
c. It serves as fast, efficient and accessible health care administrative and clinical aspects of care.
delivery system
2. E-medicine - Use of telecommunication and computer
d. Real-time data helps healthcare provider in decision-
technology to deliver medical care
making
3. Telecardiology - Transmission of cardiac catheterization
• Mag-Ina Telereferral System (MInTS)
studies, echocardiograms and other diagnostics tests in
✓ It facilitates paper-less sending of maternal and neonatal conjunction with electronic examinations for second
referrals from lying-in clinics to hospital through the opinion by cardiologist at another site.
internet. 4. Telecare or Teleconsultation- Remote delivery and
• Birth Registration Tracking System (BiRTS) health care services into the home via information and
communication technology that include the use of
✓ It allow the Local Civil of Registry to monitor delivery monitoring devices.
reports sent by the lying-in clinics. It ensures that all - Videoconferencing between two healthcare professionals
newborn babies are registered on time or a healthcare professional and a client.
TELEHEALTH (TELEMEDICINE) 5. Teleradiology - Transmission of high-resolution images
to a remote radiologist for interpretation.
- use of telecommunication technologies/computers to
exchange healthcare information. To provide service in 6. Telepathology- The use of telecommunications
other location. technology to facilitate the transfer of high resolution still
images for the interpretation of a pathologist at a remote
• Telehealth Services
site.
1. Health Promotion
2. Disease prevention 7. Telesurgery -A surgical procedure that is carried out
3. Diagnosis from a great distance using computer and robotic
4. Consultation technology.
5. Education
• Telehealth Delivery
POLICIES, GUIDELINES AND LAWS IN
1. Teleconference- A conference with participants in NURSING INFORMATICS
different locations linked by telecommunications devices.
7. Protection of undisclosed information.
INTELLECTUAL PROPERTY and COPYRIGHT Government agencies – in charge is the intellectual
LAW property office which replaced the Bureau of Patents,
Trademarks and Technology Transfer
- Republic Act No. 8293 or also known as
Intellectual Property Code of the Philippines [1] Bureau of Patents;
STATE POLICY DECLARATION [2] Bureau of Trademarks;

- It shall protect and secure the exclusive rights [3] Bureau of Legal Affairs;
of scientists, inventors, artists and other gifted
[4] Documentation, Information and Technology
citizens to their intellectual property and
Transfer Bureau;
creations, particularly when beneficial to the
people, for such periods as provided in this [5] Management Information System and EDP Bureau;
Act. and
EFFECT ON INTERNATIONAL [6] Administrative, Financial and Personnel Services
CONVENTIONS AND ON PRINCIPLE OF Bureau.
RECIPROCITY
Functions of the Intellectual Property Office:
- Any person who is a national, domiciled or has
The Intellectual Property Office is mandated under
a real and effective industrial establishment in
the law to:
a country shall be entitled to benefits to the
extent necessary to give effect to any provision. 1. Examine applications for the grant of letters
patent for inventions and register utility models
PARTS OF THE LAW
and industrial designs;
PART 1 – The intellectual property office
Significant features of the law:
PART 2 – The law of Patents
1. A shift was made from the "first-to-invent
PART 3 – The Law on Trademarks, Service Marks system" under R. A. 165 [old law] to "first-to-
and Trade Names file system" under the new law.
2. In the case of inventions, the period of the
PART IV - The Law on Copyright grant was increased from 17 years from grant
PART V - Final Provisions under the old law to 20 years from date of
filing under the new law.
Significant changes in the trademark law:
INTELLECTUAL PROPERTY RIGHTS UNDER
THE I.P CODE: The significant changes in the trademark law under the
old law [R. A. No. 166] and the present law are as
1. Copyright and related rights; follows:
2. Trademarks and service marks; 1. Under the former, the element of use before
3. Geographic indications; filing a local application is a requirement
although this is not required when the
4. Industrial designs; application is based on foreign registration;
5. Patents; while under the latter, the element of use has
been eliminated as a requirement for
6. Layout designs [topographies] of integrated circuits; application.
and 2. 2. Under the former, the term granted is 20
years renewable for 20-year periods; while
under the latter, the term is for 10 years,
renewable for 10-year periods.
PRIVACY OF PERSONAL AND PUBLIC
Significant changes in the copyright law: DOMAINS or Data Privacy Act of 2012 - is intended
to protect individuals or natural persons through the
✓ For first offenders - fine of PhP50,000 to protection of personal information.
PhP150,000 and/or imprisonment of 1 to 3 years
A. Personal Information and Sensitive Personal
✓ For second offenders - fine of PhP150,000 to Information - Personal information is information
PhP500,000 and/or imprisonment of 3 to 6 years about an identified or identifiable individual. Any set
of information, as long as it can allow identification of
✓ For third and subsequent offenders - fine of
an individual
PhP500,000 to PhP1.5 million and/or imprisonment of
6 to 9 years. B. Personal Information Controller and Personal
Information Processor
✓ In case of insolvency, the offender shall furthermore
suffer subsidiary imprisonment. Personal Information Controller refers to an
individual, organization, or group that controls the
processing of personal data.
Four Types of Intellectual Property: Personal Information Processor refers to an individual,
1. Patents – protect invented machines, organization, or group that processes personal data
manufactured objects, technological or only upon the instructions of another.
industrial processes and systems. C. National Privacy Commission
2. Trademarks or service marks - apply to
assets that serve as marketplace identifiers for The National Privacy Commission is an independent
organizations' brands, including, but not government agency with the mandate to implement the
limited to, product or service names, logos and Data Privacy Act through its regulatory and quasi-
slogans judicial function.
3. Copyrights protect dramatic, literary and
Data Privacy Principles
artistic works, including those created for hire.
Artistic and literary are broad terms here. Transparency
4. Trade secrets are essential pieces of
The data subject must be aware of the nature, purpose,
information regarding the processes, products
and extent of the processing of his or her personal
or services of an organization that are not
data, including the risks and safeguards involved, the
intended to be published or otherwise
identity of personal information controller, his or her
distributed and that directly benefit the owner
rights as a data subject, and how these can be
by dint of their confidentiality.
exercised.
How do you protect Intellectual Property?
ii. Legitimate Purpose
The phrase "You can never be too careful" applies
The processing of information shall be compatible
perfectly to IP assets.
with a declared and specified purpose which must not
Registering IP in every jurisdiction relevant to your be contrary to law, morals, or public policy.
business is key, especially for patents and trademarks,
iii. Proportionality
and entering into the WIPO's framework helps
facilitate more far-reaching protection and save The processing of information shall be adequate,
money. Timely renewal and upkeep (i.e., fee payment relevant,
and declarations of use) are also essential protective
suitable, necessary, and not excessive in relation to a
steps with all registered IP rights.
declared and
specified purpose. 5. Third Party Management
The Organization must have clear policies and
efficient processes in its engagement or transactions
Rights of the Data Subject
with third parties where personal data processing is
a. Right to Information- involved.
b. Right to Object
6. Data Subject Engagement
c. Right to Access and to Data Portability
d. Right to Correct Upholding the rights of data subjects should be every
e. Right to Erase organization’s priority.
f. Right to File a Complaint and to Damages
7. Regulator Engagement
• Security Measures
The Organization must coordinate regularly with data
Those who process personal information should protection authorities and cooperate during
implement reasonable and appropriate security investigations of compliance checks.
measures for the protection of personal data against
8. Capacity-building Mechanisms
any accidental or unlawful destruction, alteration, and
disclosure, as well as against any other unlawful The Organization must develop and implement
processing. These Security measures may be capacity-building mechanisms that will foster a culture
organizational, physical and technical measures of privacy among its personnel.
intended to maintain the confidentiality, integrity and
availability of personal data.
Privacy Program Management
1. Data Protection Unit
The Data Privacy Act implements the principle of
accountability and
mandates the designation of an individual or
individuals who are accountable for the organization’s
compliance with the law.
2. Security Incident Management
The Organization must develop a protocol for handling
data breaches and other types of security incidents. It
must have a unit ready to investigate and resolve such
incidents if or when they occur.
3. Privacy Impact Assessment
The Organization must develop or adopt its own
privacy impact assessment (PIA) program, based on its
size, available resources, and other relevant factors.
4. Transparency and Consent Mechanisms
The Organization must make use of appropriate
privacy notices and transparency statements when
conducting data processing activities.

You might also like