The field of health informatics depends on advanced computing systems to collect health data and analytical sophistication to make sense of that data. This course provides students with a solid understanding of the computer science that undergirds the entire field, exploring the design and implementation of database systems and technology applications, data communications, and systems analysis. Students will learn to identify current and emerging information technologies that may have strategic value for enterprise solutions, assess where those technologies may have strategic value, and explore methods for implementing those technologies in their organizations.
Analyze, evaluate, and apply the range of tools needed to implement new technology, including identifying, evaluating, selecting, implementing, and upgrading technological systems
Upon successful completion of HIN 615, the student will demonstrate the ability to:
Please note that all times in the syllabus and in Blackboard refer to Eastern Time. The discussion board and assignment links for each week will open at the start of the week for submissions.
Discussion Board Posts: These assignments will assess your ability to clearly and accurately apply concepts from your readings and from your own experiences. Each week you are expected to submit an initial post and comment on at least 2 other students’ posts. You need to follow APA guidelines for citing any sources you may reference in either your initial post or your response to others. Refer to the Discussion Rubric and discussion question for submission guidelines. Please be sure to follow the individual directions provided with each Discussion Board Prompt, as the requirements may vary from Discussion Board to Discussion Board.
Initial post: You should submit your initial post by 11:59 p.m. Sunday. Your initial post should be approximately 500 words.
Response to others: You should comment on at least 2 other students’ posts by 11:59 p.m. Wednesday. Your comments to others should be thorough, thoughtful, and they should offer some new content. Do not merely respond with “I agree” or “I disagree.” Engage directly with the ideas of your classmates and briefly mention which part of the post you are responding to.
Security Slide Presentation – In week 2, you will create a 6-8 slide presentation in response to a real-life HIT scenario. You will be tasked with developing and describing new communications procedures and protected health information (PHI) security procedures for all employees to use as a guide. Refer to the Security Slide Presentation Rubric and assignment instructions for submission guidelines.
Key Assignments:
Virtual Computer Project – In week 3, you will build a fully operational desktop computer by purchasing the required components and staying within budget. You will submit a table that itemizes each purchase and provides a detailed summary to explain why you selected each component along with a reflection on the project. Refer to the Virtual Computer Project Rubric and assignment instructions for submission guidelines.
CompTIA Network+ N10-006 Hands-on Simulator Labs – In weeks 4 and 5, you will be completing multiple hands-on networking labs using the simulator you downloaded. Once all the labs are completed, you will create a screencast in which you show all your scores/results and discuss what you learned as a result of doing the labs. Refer to the Network Simulator Rubric and assignment instructions for submission guidelines. This assignment will be due at the end of week 5.
Troubleshooting Screencast Presentation – In week 6, you will be given a troubleshooting scenario to solve. You will submit a screencast slide presentation of your solution. Refer to the Troubleshooting Screencast Presentation Rubric and assignment instructions for submission guidelines.
MySQL Installation – In week 7, you will install MySQL (database server) and MySQL Workbench (MySQL Graphical Interface). You will then submit screenshots of MySQL Workbench to BlackBoard to show the installation has been completed.
All assignments use scoring rubrics to assess student performance. Thoroughly review the rubric and assignment instructions for guidance on what’s required for each assignment.
Your grade in this course will be determined by the following criteria:
Assessment Item | Possible Points | Percent of Total Grade |
---|---|---|
Download Pearson Network Simulator | 5 | 5% |
Discussion Boards (7 @ 4 points each) | 28 | 28% |
Security Slide Presentation | 14 | 14% |
Virtual Computer Project | 14 | 14% |
CompTIA Network Simulator Labs | 15 | 15% |
Troubleshooting Screencast Presentation | 14 | 14% |
MySQL installation | 5 | 5% |
Hands on exercise (chapter 3) | 5 | 5% |
Total | 100 | 100% |
Grade | Points Grade | Point Average (GPA) |
A | 94 – 100% | 4.00 |
A- | 90 – 93% | 3.75 |
B+ | 87 – 89% | 3.50 |
B | 84 – 86% | 3.00 |
B- | 80 – 83% | 2.75 |
C+ | 77 – 79% | 2.50 |
C | 74 – 76% | 2.00 |
C- | 70 – 73% | 1.75 |
D | 64 – 69% | 1.00 |
F | 00 – 63% | 0.00 |
Please notice that the length of the modules in this course vary from week to week. Some modules are one week long and some are two weeks long. Each module starts on Wednesday at 12:00 am Eastern Time (ET) and closes on Wednesday at 11:59 pm ET, with the exception of Module 5 (1.5 weeks), which ends on Sunday. All assignments must be submitted by 11:59 pm ET on the due date. Please review the following schedule carefully for assignments and due dates.
Weeks | Topics | Assignments and Due Dates |
1 |
Introduction to Healthcare IT and Healthcare Organizations and Operations |
Introductory Discussion Download Pearson Network Simulator – Wednesday 9/5 Week 1 Discussion – Initial post by Sunday 9/2, responses by Wednesday 9/5 |
2 |
PHI Security Practices |
Week 2 Discussion – Initial post by Sunday, 9/9, responses by Wednesday 9/12 Security Slide Presentation – Wednesday 9/12 |
3 |
Desktop PCs and Mobile Devices |
Week 3 Discussion – Initial post by Sunday 9/16, responses by Wednesday 9/19 Virtual Computer Project – Wednesday 9/19 |
4 |
Data Networking in Healthcare |
Week 4 Discussion – Initial post by Sunday 9/23, responses by Wednesday 9/26 |
5 |
Data Networking in Healthcare |
Week 5 Discussion – Initial post by Sunday 9/30, responses by Wednesday 10/3 Network Simulator Labs & Screencast – Wednesday 10/3 |
6 |
Medical Business, Sharing Information, and Troubleshooting |
Week 6 Discussion – Initial post by Sunday 10/7, responses by Wednesday 10/10 |
7 |
Healthcare Information Security |
Week 7 Discussion – Initial post by Sunday 10/14, responses by Wednesday 10/17 Week 7 Assignment – MySQL Installation, by Wednesday 10/17 |
8 |
Introduction to MySQL |
Week 8 Assignment – Hands on Exercise – by Sunday 10/21 |
Learning Outcomes:
Course Materials:
Assignments:
Our society has become dependent on technology. There are businesses who completely rely on desktop computers and/or mobile devices to complete their daily tasks. Consider the following questions:
Please be specific with your answers. Refer to the Discussion Rubric for submission guidelines.
Remember: You must create an initial post and also comment on at least two other posts. Your initial post should be approximately 500 words and directly address the discussion prompt. Use APA style for references and when citing sources in-text.
Your comments to others should be thorough and thoughtful; they should offer some new content. Engage directly with the ideas of your classmates and briefly mention which part of the post you are responding to. If you make a mistake or want to add anything to your posts, create a new post and label it as a replacement or addition to your previous post.
Within Week 1, initial post due by 11:59 p.m. ET Sunday. Responses are due by 11:59 p.m. ET Wednesday.
In weeks 4 and 5 you will be working with CompTIA Network+ N10-006 Hands-on Lab Simulator. To ensure that everything runs smoothly for you then, we would like you to download the simulator now.
Refer to these tutorials for recording a presentation, uploading to YouTube, and sharing the video link for assistance.
Due Wednesday, by 11:59 p.m. ET.
Learning Outcomes:
Course Materials:
Assignments:
There are a variety of ways to protect a patient’s records.
OR
After identifying the devices/methods, tell us how effective each is, and if you would recommend it.
Remember: You must create an initial post and also comment on at least two other posts. Your initial post should be approximately 500 words and directly address the discussion prompt. Use APA style for references and when citing sources in-text.
Your comments to others should be thorough and thoughtful; they should offer some new content. Engage directly with the ideas of your classmates and briefly mention which part of the post you are responding to. If you make a mistake or want to add anything to your posts, create a new post and label it as a replacement or addition to your previous post. Refer to the Discussion Rubric for submission guidelines.
Within Week 2, initial post due by 11:59 pm ET Sunday. Responses are due by 11:59 pm ET Wednesday.
You have been hired as a new HIT coordinator at Salutem hospital. On your first day, you notice several violations for which the hospital could be fined. You make it a priority to protect electronic communications between clients and vendors. In addition to protecting electronic communications, you want to ensure all of the patient’s PHIs are protected. You decide to create a slideshow to address the new communications procedures and PHI security procedures for all employees to use as a guide.
Develop a 6-8 slide presentation to describe the new procedures you developed for electronic communications and patients’ PHIs. Refer to the Security Slide Presentation Rubric for submission guidelines.
Due Wednesday, by 11:59 p.m. ET
Learning Outcomes:
Course Materials:
Assignments:
People can often see confidential information on our computer screens without us being aware of it. Privacy screens are simple but effective solutions to protect data that is displayed on a screen because one must look directly at the screen to see the information; anyone looking from an angle won’t be able to see it.
Remember: You must create an initial post and also comment on at least two other posts. Your initial post should be approximately 500 words and directly address the discussion prompt. Use APA style for references and when citing sources in-text.
Your comments to others should be thorough and thoughtful; they should offer some new content. Engage directly with the ideas of your classmates and briefly mention which part of the post you are responding to. If you make a mistake or want to add anything to your posts, create a new post and label it as a replacement or addition to your previous post. Refer to the Discussion Rubric for submission guidelines.
Initial post due by 11:59 p.m. ET Sunday. Responses due by 11:59 p.m. ET Wednesday.
Imagine you have been asked to build a fully operational desktop computer by purchasing the required components needed and assembling them. A $1000.00 budget has been set aside for this project. Make sure you include shipping cost and any state taxes. If there are leftover funds, feel free to purchase any peripherals such as a printer, speakers, or software. Remember, the goal is to stay at $1000.00 or under, so do not overspend!
Submit a document which includes a table and a reflection:
Refer to the Virtual Computer Project Rubric for submission guidelines.
Here are recommended sites for pricing your computer components:
www.newegg.com
www.tigerdirect.com
www.pcmall.com
Websites such as Dell, Gateway, and HP cannot be used to configure your system. Purchase all pieces and parts separately.
Virtual Computer Project due Wednesday, at 11:59 p.m. ET.
Learning Outcomes:
Course Materials:
Assignments:
Most networks are set up to allow a wireless connection, but caution needs to be taken to keep unauthorized devices from connecting to the network.
Remember: You must create an initial post and also comment on at least two other posts. Your initial post should be approximately 500 words and directly address the discussion prompt. Use APA style for references and when citing sources in-text.
Your comments to others should be thorough and thoughtful; they should offer some new content. Engage directly with the ideas of your classmates and briefly mention which part of the post you are responding to. If you make a mistake or want to add anything to your posts, create a new post and label it as a replacement or addition to your previous post. Refer to the Discussion Rubric for submission guidelines.
Initial post due by 11:59 p.m. ET Sunday. Responses due by 11:59 p.m. ET Wednesday.
You will have two weeks to work through the labs listed below. At the end of the second week, you will turn in a screencast documenting the work you did. Please don’t wait until the second week to begin this project.
Back in week 1, you downloaded the Pearson CompTIA Network+ N10-006 Hands-on Lab Simulator. You will need that simulator to do the work for this module.
Use Screencast-O-Matic or another screencasting tool to create your video. When you are done, upload your screencast to YouTube and submit the link to your YouTube video in Blackboard. Refer to the Network Simulator Rubric for submission guidelines.
Labs:
Matching:
IPv4 Address Types and Classes
Identifying Troubleshooting Commands to Use for Various Tasks
Security Terminology and Descriptions
Types of Network Threats and Attacks
Security Appliance Terminology and Methods
Drag and Drop:
Identify Common Cat5 Wiring Problems
Network Topologies
Create a Straight Cable and Test It
Create a Crossover Cable
Matching Command Output to Command
Simulation:
Verify a Data Link Connection from a Computer to a Network
Configuring a Client Network Adapter with an IPv4 Address
Using ipconfig to Discover Network Settings
Using ping to Troubleshoot Connectivity
Using ARP to Discover a MAC Address
Using ipconfig, ping, arp, and tracert Together to Troubleshoot Connectivity
Manually Configuring Wireless Signals on a Small Office/Home Router
Configuring Small Office/Home Office Router-Network User Security Settings
Troubleshooting Practice
Configuring Static Hostname Resolution on a Workstation
Using NSLookup for DNS Troubleshooting
DNS Troubleshooting Simulation
Configure an IP Address on a Switch with a Default Gateway
Configuring an Ethernet Interface on a Router
Using tracert to Troubleshoot Connectivity
Creating Network Users on a Domain Controller
Configuring a VPN client
Due Wednesday of week 5 by 11:59 p.m. ET.
Learning Outcomes:
Course Materials:
Assignments:
Databases have been around for some time, and have essentially become part of our daily lives. Take a few minutes to think about everyday devices and how they are connected to a database.
Remember: You must create an initial post and also comment on at least two other posts. Your initial post should be approximately 500 words and directly address the discussion prompt. Use APA style for references and when citing sources in-text.
Your comments to others should be thorough and thoughtful; they should offer some new content. Engage directly with the ideas of your classmates and briefly mention which part of the post you are responding to. If you make a mistake or want to add anything to your posts, create a new post and label it as a replacement or addition to your previous post. Refer to the Discussion Rubric for submission guidelines.
Initial post due by 11:59 p.m. ET Sunday. Responses due by 11:59 p.m. ET Wednesday.
Back in week 1, you downloaded the Pearson CompTIA Network+ N10-006 Hands-on Lab Simulator. You will need that simulator to do the work for this module.
Use Screencast-O-Matic or another screencasting tool to create your video. When you are done, upload your screencast to YouTube and submit the link to your YouTube video in Blackboard. Refer to the Network Simulator Rubric for submission guidelines.
Labs:
Matching:
IPv4 Address Types and Classes
Identifying Troubleshooting Commands to Use for Various Tasks
Security Terminology and Descriptions
Types of Network Threats and Attacks
Security Appliance Terminology and Methods
Drag and Drop:
Identify Common Cat5 Wiring Problems
Network Topologies
Create a Straight Cable and Test It
Create a Crossover Cable
Matching Command Output to Command
Simulation:
Verify a Data Link Connection from a Computer to a Network
Configuring a Client Network Adapter with an IPv4 Address
Using ipconfig to Discover Network Settings
Using ping to Troubleshoot Connectivity
Using ARP to Discover a MAC Address
Using ipconfig, ping, arp, and tracert Together to Troubleshoot Connectivity
Manually Configuring Wireless Signals on a Small Office/Home Router
Configuring Small Office/Home Office Router-Network User Security Settings
Troubleshooting Practice
Configuring Static Hostname Resolution on a Workstation
Using NSLookup for DNS Troubleshooting
DNS Troubleshooting Simulation
Configure an IP Address on a Switch with a Default Gateway
Configuring an Ethernet Interface on a Router
Using tracert to Troubleshoot Connectivity
Creating Network Users on a Domain Controller
Configuring a VPN client
Due Wednesday, by 11:59 p.m. ET.
Learning Outcomes:
Course Materials:
Assignments:
The use of text messaging to provide reminders and updates to patients is a hot topic in healthcare these days. Text messaging is one of the easiest and quickest ways to reach people, but there are concerns about security.
Remember: You must create an initial post and also comment on at least two other posts. Your initial post should be approximately 500 words and directly address the discussion prompt. Use APA style for references and when citing sources in-text.
Your comments to others should be thorough and thoughtful; they should offer some new content. Engage directly with the ideas of your classmates and briefly mention which part of the post you are responding to. If you make a mistake or want to add anything to your posts, create a new post and label it as a replacement or addition to your previous post. Refer to the Discussion Rubric for submission guidelines.
Initial post due by 11:59 p.m. ET Sunday. Responses due by 11:59 p.m. ET Wednesday.
The troubleshooting process can be distilled into four steps:
Step 1: The system malfunctions and symptoms are identified.
Step 2: A list of possible causes is generated based on existing knowledge, research, and/or previous experience.
Step 3: Additional data is collected and, based on a process of elimination, the causes of the problem are determined.
Step 4: The solution is tested to confirm that the problem has been solved.
Read the scenario below and create a narrated slide presentation to describe the experiences the troubleshooter may encounter and to provide detail on how to solve the problem. Be sure to follow the four steps of the troubleshooting process. Create a screencast of your presentation. Refer to the Troubleshooting Screencast Presentation Rubric for submission guidelines.
Scenario:
The Superior Care Health Group (SCHG) recently installed a new system for electronically sending patient prescriptions to pharmacies. This new e-prescribing system was working well until recently. Now the system is displaying errors periodically. When this occurs, the prescribing doctor has to call the prescription into the pharmacy, which takes much more time. The new office manager, Braden Thomas, is responsible for maintaining the system. Braden found an error-log file in the system. These errors are perplexing and contain cryptic messages:
07, incorSCRIPT error #34rect PVD format
PProc error #3212, Schedule 1 not allowed
PProc error #3245, not in formulary
After spending several hours changing various system configuration settings, the problems started getting worse. He finally realized that he doesn’t know enough about troubleshooting the system to correct the problems. Even worse, he doesn’t know whom to contact to solve the problem, other than the sales associate who sold SCHG the system. When he called that number, he was sent to voicemail. Meanwhile, the group’s doctors are expressing displeasure with his ability to manage the system.
Use Screencast-O-Matic or another screencasting tool to create your video. When you are done, upload your screencast to YouTube and submit the link to your YouTube video in Blackboard.
Due Wednesday, by 11:59 p.m. ET
Learning Outcomes:
Course Materials:
Assignments:
Before responding to this week’s prompt, please watch the following two videos from the module course materials:
Organizations spend a lot of money ensuring that their networks are secure. However, people can circumvent all that expensive security by preying on the fallibility of an organization’s employees. In fact, human error is one of the top security vulnerabilities organizations face in today’s society. Two ways that an employee might inadvertently allow someone to access confidential materials are by falling prey to Social Engineering or by using insecure wireless networks.
Please comment on human error as a security vulnerability. Here are some questions that may help you formulate a comment:
Remember: You must create an initial post and also comment on at least two other posts. Your initial post should be approximately 500 words and directly address the discussion prompt. Use APA style for references and when citing sources in-text.
Your comments to others should be thorough and thoughtful; they should offer some new content. Engage directly with the ideas of your classmates and briefly mention which part of the post you are responding to. If you make a mistake or want to add anything to your posts, create a new post and label it as a replacement or addition to your previous post. Refer to the Discussion Rubric for submission guidelines.
Initial post due by 11:59 p.m. ET Sunday. Responses due by 11:59 p.m. ET Wednesday.
Follow the instructions in the MySQL Installation Guide.
to install MySQL (database server) and MySQL Workbench (MySQL Graphical Interface). Once the MySQL and MySQL Workbench installation is complete, open MySQL Workbench to install the necessary database files needed for this course.
Installing database files:
Download the student files.
Once the file has been downloaded, navigate to page 563, step 4, and follow the remaining steps in this section to complete the installation of the database files.
If Mac OS is being used for this course, navigate to page 573, step 4, and follow the remaining steps in this section to complete the installation of the database files.
MySQL Password Reset on a Mac instructions
Submit screenshots of MySQL Workbench to BlackBoard to show the installation has been completed (A list of databases that have been installed will show up in the bottom left-hand corner of the ‘Management’ pane in MySQL Workbench).
Learning Outcomes:
Course Materials:
Assignments:
Complete the exercises in Chapter 2 beginning on page 70 to become familiar with MySQL and Workbench before working on this week’s assignments.
Chapter 3: Complete the exercises beginning on page 110.
Chapter 4: Complete the exercises beginning on page 146.
Chapter 5: Complete the exercises beginning on page 164.
Once the exercises are completed, upload the saved SQL scripts to BlackBoard. Refer to Weekly Hands-on Database Assignment Rubric for submission standards.
Due by 11:59 p.m. ET Wednesday.
Your Student Support Specialist is a resource for you. Please don't hesitate to contact them for assistance, including, but not limited to course planning, current problems or issues in a course, technology concerns, or personal emergencies.
Questions? Visit the Student Support Health Informatics page
The Student Academic Success Center (SASC) offers a range of services to support your academic achievement, including tutoring, writing support, test prep and studying strategies, learning style consultations, and many online resources. To make an appointment for tutoring, writing support, or a learning specialist consultation, go to une.tutortrac.com. To access our online resources, including links, guides, and video tutorials, please visit:
Any student who would like to request, or ask any questions regarding, academic adjustments or accommodations must contact the Student Access Center at (207) 221-4438 or pcstudentaccess@une.edu. Student Access Center staff will evaluate the student's documentation and determine eligibility of accommodation(s) through the Student Access Center registration procedure.
Togetherall is a 24/7 communication and emotional support platform monitored by trained clinicians. It’s a safe place online to get things off your chest, have conversations, express yourself creatively, and learn how to manage your mental health. If sharing isn’t your thing, Togetherall has other tools and courses to help you look after yourself with plenty of resources to explore. Whether you’re struggling to cope, feeling low, or just need a place to talk, Togetherall can help you explore your feelings in a safe supportive environment. You can join Togetherall using your UNE email address.
Students should notify their Student Support Specialist and instructor in the event of a problem relating to a course. This notification should occur promptly and proactively to support timely resolution.
ITS Contact: Toll-Free Help Desk 24 hours/7 days per week at 1-877-518-4673.
The College of Professional Studies supports its online students and alumni in their career journey!
The Career Ready Program provides tools and resources to help students explore and hone in on their career goals, search for jobs, create and improve professional documents, build professional network, learn interview skills, grow as a professional, and more. Come back often, at any time, as you move through your journey from career readiness as a student to career growth, satisfaction, and success as alumni.
Please review the technical requirements for UNE Online Graduate Programs: Technical Requirements
The College of Professional Studies uses Turnitin to help deter plagiarism and to foster the proper attribution of sources. Turnitin provides comparative reports for submitted assignments that reflect similarities in other written works. This can include, but is not limited to, previously submitted assignments, internet articles, research journals, and academic databases.
Make sure to cite your sources appropriately as well as use your own words in synthesizing information from published literature. Webinars and workshops, included early in your coursework, will help guide best practices in APA citation and academic writing.
You can learn more about Turnitin in the guide on how to navigate your Similarity Report.
ITS Contact: Toll Free Help Desk 24 hours/7 days per week at 1-877-518-4673
Course surveys are one of the most important tools that University of New England uses for evaluating the quality of your education, and for providing meaningful feedback to instructors on their teaching. In order to assure that the feedback is both comprehensive and precise, we need to receive it from each student for each course. Evaluation access is distributed via UNE email at the beginning of the last week of the course.
Assignments: Late assignments will be accepted up to 3 days late; however, there is a 10% grade reduction (from the total points) for the late submission. After three days the assignment will not be accepted.
Discussion posts: If the initial post is submitted late, but still within the discussion board week, there will be a 10% grade reduction from the total discussion grade (e.g., a 3 point discussion will be reduced by 0.3 points). Any posts submitted after the end of the Discussion Board week will not be graded.
Please make every effort ahead of time to contact your instructor and your student support specialist if you are not able to meet an assignment deadline. Arrangements for extenuating circumstances may be considered by faculty.
8 week: Students taking online graduate courses through the College of Professional Studies will be administratively dropped for non-participation if a graded assignment/discussion post is not submitted before Sunday at 11:59 pm ET of the first week of the term. Reinstatement is at the purview of the Dean's Office.
16 week: Students taking online graduate courses through the College of Professional Studies will be administratively dropped for non-participation if a graded assignment/discussion post is not submitted before Friday at 11:59 pm ET of the second week of the term. Reinstatement is at the purview of the Dean's Office.
The policies contained within this document apply to all students in the College of Professional Studies. It is each student's responsibility to know the contents of this handbook.
Please contact your student support specialist if you are considering dropping or withdrawing from a course. The last day to drop for 100% tuition refund is the 2nd day of the course. Financial Aid charges may still apply. Students using Financial Aid should contact the Financial Aid Office prior to withdrawing from a course.
The University of New England values academic integrity in all aspects of the educational experience. Academic dishonesty in any form undermines this standard and devalues the original contributions of others. It is the responsibility of all members of the University community to actively uphold the integrity of the academy; failure to act, for any reason, is not acceptable. For information about plagiarism and academic misconduct, please visit UNE Plagiarism Policies.
Academic dishonesty includes, but is not limited to the following:
Charges of academic dishonesty will be reviewed by the Program Director. Penalties for students found responsible for violations may depend upon the seriousness and circumstances of the violation, the degree of premeditation involved, and/or the student’s previous record of violations. Appeal of a decision may be made to the Dean whose decision will be final. Student appeals will take place through the grievance process outlined in the student handbook.