1 / 20

Chapter 3 Ensuring the Quality and Best Use of Information

Chapter 3 Ensuring the Quality and Best Use of Information. Data Management. Process of controlling the collection, storage, retrieval, and use of data to optimize accuracy and utility while safeguarding integrity Also known as business intelligence (BI).

erickr
Download Presentation

Chapter 3 Ensuring the Quality and Best Use of Information

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 3 Ensuring the Quality and Best Use of Information

  2. Data Management • Process of controlling the collection, storage, retrieval, and use of data to optimize accuracy and utility while safeguarding integrity • Also known as business intelligence (BI)

  3. How can we make the right decision without good data management?

  4. Data Management Levels • Data entry level • System analysts • help identify data needed and collection • Method of collection • Programmers • create computer instructions that collect required data • build the database

  5. Data Management levels • Database administrator (DBA) • oversees details of maintaining and using database • Optimizing the use of the database

  6. Data Warehouse • Repository for storing data from several different databases so that it can be combined and manipulated to provide answers to complex analytic questions

  7. Data Storage • Online storage • Provides access to current data • Rapid, using high-speed hard disk drives or storage space on the network • Virtual drives • Offline storage • For data that are needed less frequently, or for long-term data storage of old client records • Can be done on any secondary storage device • CDs, DVDs, External HD,

  8. Data Storage Considerations • Speed/frequency of access needed • Virtual drive vs. DVD • Environmental conditions and hazards • Temp., water, fire, magnetic fields • Control of equipment and media • Logical restriction • Physical restrictions • Contingency planning • Backup copy

  9. Data Storage Considerations • Storage period for each record type • Patient info should be stored for certain minimum length • Media degradation • DVD may degrade after few years, transfer data in case longer storage required • Obsolescence of hardware and software • Rapid advance in technology threaten the use of old tech. Eg. Floppy disk

  10. Outsourcing • Process by which an organization contracts with outside agencies for services • Must consider costs • Personnel • Space • Equipment • Maintenance • Expertise

  11. Data Retrieval • Process that allows the user to access previously collected, stored data • Considerations • Performance response: the ability of the system to respond to the user’s request • Capacity—amount of data that can be stored and retrieved • Security—protected against unauthorized access • Cost: hardware, software, personnel

  12. Data Exchange • Growing expectation that information collected in one facility will be available to another • E.g. a patient may have surgery in once center but have a follow up appointment at a satellite location

  13. Data Mining • Technique that uses software to look for hidden patterns and relationships in large groups of data • E.g. in business used to identify the customers interest and marketing trends

  14. Data Cleansing • Procedure that uses software to improve the quality of data to ensure that it is accurate enough for use in data mining and warehousing • Used to fix inconsistent entries, duplicate entries • Typos, misspelling

  15. Data Disposal • Physical destruction • Secure disposal of documents containing PHI • Shredding • Deform/destroy storage media • Software destruction • Overwrite data

  16. Chch. Of Quality information • Timely: insurance info available immediately at a follow up visit • Precise: abdominal surgery vs. specific name of the surgery • Accurate: left vs right below knee amputation • Numerically quantifiable: stage of ucler, cancer

  17. Quality information • Rapidly and easily available: pt in ER, allergies can be quickly retrieved from EMR past history • Comprehensive: info about med include name dosage, frequency • Clear: patient don’t like eggs vs. allergy from eggs • Current: regular update

  18. Threats to information quality • Alteration of files • Accidental or intentional change of data • System alteration • Adding of new function may result in data loss • Viruses, Trojans, worms • Damage, steal info

  19. Threats to information availability • Destruction of hardware or software, or even data • Natural or manmade • Interruption of power • Loss of power  loss of data • Denial of service • Malicious software overwhelm a website  access denied • Sabotage • Intentional destruction of harware, software or data

  20. Threats to confidentiality • Failure to adhere to information policies • Misuse of computer access • Eavesdropping • Unauthorized access to info • Looing at the system data • Improper handling of confidential data • Unauthorized reception of wireless network technology transmissions

More Related