Syllabus

Master of Science in Health Informatics

HIN 615 – Computer Science for Health Informatics Professionals – Fall A 2016

Credits - 3

Description

The field of health informatics depends on advanced computing systems to collect health data and analytical sophistication to make sense of that data. This course provides students with a solid understanding of the computer science that undergirds the entire field, exploring the design and implementation of database systems and technology applications, data communications, and systems analysis. Students will learn to identify current and emerging information technologies that may have strategic value for enterprise solutions, assess where those technologies may have strategic value, and explore methods for implementing those technologies in their organizations.

 

Materials

Textbook

Ciampa, M., & Revels, M. (2013). Introduction to Healthcare Information Technology.
First edition. ISBN: 978-1-133-78777-8

Other Materials to purchase

Pearson Network Simulator 

Learning Objectives and Outcomes

Program Outcome addressed by this course:

  • Analyze, evaluate, and apply the range of tools needed to implement new technology, including identifying, evaluating, selecting, implementing, and upgrading technological systems

Course Outcomes:

  • Explain the role of desktop PCs and servers in clinical environments
  • Describe basic networking in clinical applications
  • Explain troubleshooting procedures to address hardware and software malfunctions
  • Explain how data is shared between health systems
  • Discuss and implement information security procedures to protect health IT systems

Assignments

Weekly Discussion Posts – Each week there will be a discussion board that addresses a topic within the current module. For each discussion board, you must submit an original post and respond to at least 2 posts from your colleagues.

Security Slide Presentation – due at the end of week 2

Virtual Computer Project – due at the end of week 3

Networking Lab – due at the end of week 5

Troubleshooting Screencast – due at the end of week 6

Reflection Paper – due at the end of week 8

Course Schedule at a Glance 

Module Topic Activities and Assignments Dates
1 Introduction to Healthcare IT and Healthcare Organizations and Operations  (2 weeks)

Download Pearson Network Simulator
2 Discussion Posts
Security Slide Show

8/31/2016 – 9/14/2016 

2 Desktop PCs  and Mobile Devices  (1 week) Discussion Post
Virtual Computer Project
9/14/2016 – 9/21/2016 
3 Data Networking in Healthcare (2 weeks) 2 Discussion Posts
Networking Lab
9/21/2016 – 10/5/2016
4 Medical Business, Sharing Information, and Troubleshooting  (1 week) Discussion Post
Troubleshooting Screencast
10/5/2016 – 10/12/2016
5 Healthcare Information Security  (2 weeks) 2 Discussion Posts
Final Reflection Paper
10/12/2016 – 10/23/2016 

Grading Policy

Your grade in this course will be determined by the following criteria:

Grade Breakdown

Assessment ItemPossible PointsPercent of Total Grade
Download Pearson Network Simulator55%
Discussion Boards2828%
Security Slide Presentationn1414%
Virtual Computer1414%
Network Lab1414%
Troubleshooting Screencast1515%
Final Reflection1010%
Total100100%

Grade Scale

Grade Points Grade Point Average (GPA)
A 94 – 100% 4.00
A- 90 – 93% 3.75
B+ 87 – 89% 3.50
B 84 – 86% 3.00
B- 80 – 83% 2.75
C+ 77 – 79% 2.50
C 74 – 76% 2.00
C- 70 – 73% 1.75
D 64 – 69% 1.00
F 00 – 63% 0.00

Schedule

Detailed Course Schedule

Module 1: Health Informatics — Healthcare Organization and Operations (two weeks)

Overview: In this first module, we will consider some of the benefits of healthcare technology and also look at proper methods for managing protected health information (PHI).

Readings:

Learning Outcomes:

  • Discuss the current use of technology in society as a whole and in healthcare specifically
  • Identify current PHI security practices found in healthcare
  • Describe proper communication methods and PHI security procedures in the healthcare workplace

Discussion Board Assignment, week 1:Technology today

Technology is found throughout modern society. Businesses and individuals rely on computers and mobile devices to complete many tasks. Consider for a moment what life would be like if technology were to disappear. How would you personally be affected? How would society as a whole be different? What kind of impact do you think the lack of technology would have in the medical field?

Discussion Board Assignment, week 2: PHI Security

There are a variety of ways to protect a patient’s health information (PHI). If you work in a clinical environment, please provide us with various examples of how your clinic protects a patient’s PHI. If you do not work in a clinical environment, please provide us with multiple examples of simple security devices that will prevent unauthorized access to data. After identifying the devices/methods, tell us how effective each is, and if you would recommend it.

Security Slide Presentation:

You have been hired as a new HIT coordinator at Salutem hospital. On your first day, you notice several violations for which the hospital could be fined. You make it a priority to protect electronic communications between clients and vendors. In addition to protecting electronic communications, you want to ensure all of the patient’s PHIs are protected. You decide to create a slideshow to address the new communications procedures and PHI security procedures for all employees to use as guide. Develop a 6-8 slide presentation to describe the new procedures you developed for electronic communications and patients’ PHIs.

Module 2: Desktop PCs and Mobile Devices (one week)

Overview: In this module, we will learn about desktop IT operations that support electronic records in the healthcare field. We will learn how to build, design, and install desktop PCs and the role mobile devices have in the healthcare field.

Readings:

Video:

Learning Outcomes:

  • Identify ways to protect information displayed on devices
  • Identify desktop components
  • Describe how to build a desktop workstation

Discussion Board Assignment, week 3:Protecting Data From Prying Eyes

People can often see confidential information on our computer screens without us being aware of it. Privacy screens are simple but effective solutions to protect data that is displayed on a screen because one must look directly at the screen to see the information; anyone looking from an angle won’t be able to see it. Find three (3) other methods to protect displayed data. Describe each method, including information on cost and ease of use. Tell us which method(s) you would use to ensure the data is only viewed by authorized personnel and why you would choose those method(s).

Virtual Computer Project:

Imagine you have been asked to build a fully operational desktop computer by purchasing the required components needed and assembling them. A $1000.00 budget has been set aside for this project. Make sure you include shipping cost and any state taxes. If there are leftover funds, feel free to purchase any peripherals such as a printer, speakers, or software. Remember, the goal is to stay at $1000.00 or under, so do not overspend!

Here are recommended sites for pricing your computer components:

www.newegg.com

www.tigerdirect.com

www.pcmall.com

Websites such as Dell, Gateway, and HP cannot be used to configure your system. Purchase all pieces and parts separately.

Submit a document which includes a table and a reflection. The table should contain the make, model and price of each item. The total price should appear in the final row of your table. Your reflection should include a detailed summary to explain why you selected each component and how how they are compatible with one another; you should also state whether or not you think building a PC is a good investment for your organization, or if you believe purchasing a system from a manufacturer would be better.

Module 3: Data Networking in Healthcare and Databases in Healthcare (two weeks)

Overview: In this module, we will learn about network IT operations in the healthcare field by exploring common network devices and servers. In addition to exploring networking devices and servers, we will learn how to set up a simple Local Area Network (LAN) through a virtual simulator.

Readings:

  • Campia & Revel, chapter 4

Software:

Installation Directions:

Learning Outcomes:

  • Discuss wireless networking in healthcare
  • Explain how to set up basic networking

Discussion Board Assignment, week 4: Wireless Networking

Most networks are set up to allow wireless connection, but caution needs to be taken to keep unauthorized devices from connecting to the network. How often and when do you use wireless connection outside of your home or workplace? How have wireless devices have been implemented in your place of employment? What type of encryption would you suggest to protect a hospital’s data from patients and visitors? Finally, how would you explain the advantages of mobile technology to a hospital’s board of directors?

Discussion Board Assignment, week 5: Databases and Servers

Databases have been around for some time, and have essentially become part of our daily lives. Take a few minutes to think about everyday devices and how they are connected to a database. Provide the class with a minimum of five (5) examples of databases, and how each of them are used in both your personal and professional lives.

Network Simulator, weeks 4 and 5

You will have two weeks to work through the labs listed below. At the end of the second week, you will turn in a screencast documenting the work you did. Please don’t wait until the second week to begin this project.

Download Pearson’s Network+ Simulator and then follow the installation instructions. When the installation is complete, register the simulator with Pearson by verifying your account and access code (you must log into Pearson to view the access code).

Once the simulator is registered, complete the labs listed below (sorted by category) to build basic troubleshooting skills, configure wireless settings, make standard patch cables and crossover cables, and develop user management skills. Once all of the labs are completed, create a screencast in which you show all your scores/results and discuss what you learned as a result of doing the labs. Which sections did you find particularly challenging? Use Screencast-O-Matic or another screencasting tool to create your video. When you are done, upload your screencast to Youtube and submit the link to your youtube video in Blackboard.

Matching:

IPv4 Address Types and Classes
Identifying Troubleshooting Commands to Use for Various Tasks
Security Terminology and Descriptions
Types of Network Threats and Attacks
Security Appliance Terminology and Methods

Drag and Drop:

Identify Common Cat5 Wiring Problems
Network Topologies
Create a Straight Cable and Test It
Create a Crossover Cable
Matching Command Output to Command

Simulation:

Verify a Data Link Connection from a Computer to a Network
Configuring a Client Network Adapter with an IPv4 Address
Using ipconfig to Discover Network Settings
Using ping to Troubleshoot Connectivity
Using ARP to Discover a MAC Address
Using ipconfig, ping, arp, and tracert Together to Troubleshoot Connectivity
Manually Configuring Wireless Signals on a Small Office/Home Router
Configuring Small Office/Home Office Router-Network User Security Settings
Troubleshooting Practice
Configuring Static Hostname Resolution on a Workstation
Using NSLookup for DNS Troubleshooting
DNS Troubleshooting Simulation
Configure an IP Address on a Switch with a Default Gateway
Configuring an Ethernet Interface on a Router
Using tracert to Troubleshoot Connectivity
Creating Network Users on a Domain Controller
Configuring a VPN client

Module 4: Medical Business, Sharing Information, and Troubleshooting (one week)

Overview: In this module, we will look at two different topics: the use of mobile technology in healthcare and how to troubleshoot technology problems.

Readings:

Videos

Learning Outcomes:

  • Discuss the use of text messaging in professional situations
  • Describe the clinical software troubleshooting process

Discussion Board Assignment, week 6: Text Messaging

The use of text messaging to provide reminders and updates to patients is a hot topic in healthcare these days. Text messaging is one of the easiest and quickest ways to reach people, but there are concerns about security. To gather a sense of how much text messaging is used in today’s society, tell us how many text messages you receive on a daily basis. How many are personal text messages, and how many are for business? What kind of information do you prefer to receive via text? via email? via a phone call? Do you think it is appropriate to send information to patients via text? Why or why not?

Troubleshooting Screencast Presentation

The troubleshooting process can be distilled into four steps:

Step 1: The system malfunctions and symptoms are identified.

Step 2: A list of possible causes is generated based on existing knowledge, research, and/or previous experience.

Step 3: Additional data is collected and, based on a process of elimination, the causes of the problem are determined.

Step 4: The solution is tested to confirm that the problem has been solved.

Read the scenario below and create a slideshow to describe the experiences the troubleshooter may encounter. Detail how to solve the problem. Be sure to follow the steps of the troubleshooting process. Finally, create a screencast to present the slideshow.

Scenario:

The Superior Care Health Group (SCHG) recently installed a new system for electronically sending patient prescriptions to pharmacies. This new e-prescribing system was working well until recently. Now the system is displaying errors periodically. When this occurs, the prescribing doctor has to call the prescription into the pharmacy, which takes much more time. The new office manager, Braden Thomas, is responsible for maintaining the system. Braden found an error-log file in the system. These errors are perplexing and contain cryptic messages:

07, incorSCRIPT error #34rect PVD format

PProc error #3212, Schedule 1 not allowed

PProc error #3245, not in formulary

After spending several hours changing various system configuration settings, the problems started getting worse. He finally realized that he doesn’t know enough about troubleshooting the system to correct the problems. Even worse, he doesn’t know whom to contact to solve the problem, other than the sales associate who sold SCHG the system. When he called that number, he was sent to voicemail. Meanwhile, the group’s doctors are expressing displeasure with his ability to manage the system.

 

Module 5: Healthcare Information Security (two weeks)

Overview: In this module, we explore the basics of IT security as it relates to healthcare. We will look at the definition of information security and examine the different types of physical security that can be used to keep out data thieves. We will also learn how encryption and other advanced healthcare information security can be used to protect data. Finally, we will examine wireless security and remote access.

Readings:

Videos:

Learning Outcomes:

  • Discuss how human error undermines security
  • Describe the vulnerabilities of wireless networks
  • Discuss current and future technology trends in healthcare

Discussion Board Assignment, week 7: Healthcare Information Security

Before responding to this week’s prompt, please watch the following two videos:

Organizations spend a lot of money ensuring that their networks are secure. However, people can circumvent all that expensive security through playing on the fallibility of an organization’s employees. In fact, human error is one of the top security vulnerabilities organizations face in today’s society. Two ways that an employee might inadvertently allow someone to access confidential materials are by falling prey to Social Engineering or by using insecure wireless networks.

Please comment on human error as a security vulnerability. Here are some questions that may help you formulate a comment:

  • Can you think of a time when someone you know may have inadvertently provided sensitive work and/or personal information? What were the ramifications?
  • Can you think of an instance when you used your mobile device (e.g., laptop, mobile phone, tablet) to connect to an unsecure wireless network to conduct important business such as banking transactions and/or updating work documents? If so, did you take the time to verify the legitimacy of the wireless hotspot? If so, how did you know that your wireless session was secure?

Final Reflection, week 8

Like technology in general, health care technology continues to evolve at a rapid pace and will become more integrated into the healthcare field as time goes on. Reflect back on the material covered in this course and write a 3-5 page paper discussing the following:

  • current technology trends
  • the importance of technology in healthcare
  • why health information technology professionals have to maintain their skill set
  • how future technology could potentially change the healthcare field

Student Resources

Online Student Support

Your Student Support Specialist is a resource for you. Please don't hesitate to contact them for assistance, including, but not limited to course planning, current problems or issues in a course, technology concerns, or personal emergencies.

Questions? Visit the Student Support Health Informatics page

APA Style Guide

UNE Libraries:

UNE Student Academic Success Center

The Student Academic Success Center (SASC) offers a range of services to support your academic achievement, including tutoring, writing support, test prep and studying strategies, learning style consultations, and many online resources. To make an appointment for tutoring, writing support, or a learning specialist consultation, go to une.tutortrac.com. To access our online resources, including links, guides, and video tutorials, please visit:

Accommodations

Any student who would like to request, or ask any questions regarding, academic adjustments or accommodations must contact the Student Access Center at (207) 221-4438 or pcstudentaccess@une.edu. Student Access Center staff will evaluate the student's documentation and determine eligibility of accommodation(s) through the Student Access Center registration procedure.

Policies

Technology Requirements

Please review the technical requirements for UNE Online Graduate Programs: Technical Requirements

Turnitin Originality Check and Plagiarism Detection Tool

The College of Professional Studies uses Turnitin to help deter plagiarism and to foster the proper attribution of sources. Turnitin provides comparative reports for submitted assignments that reflect similarities in other written works. This can include, but is not limited to, previously submitted assignments, internet articles, research journals, and academic databases.

Make sure to cite your sources appropriately as well as use your own words in synthesizing information from published literature. Webinars and workshops, included early in your coursework, will help guide best practices in APA citation and academic writing.

You can learn more about Turnitin in the Turnitin Student quick start guide.

Information Technology Services (ITS)

ITS Contact: Toll Free Help Desk 24 hours/7 days per week at 1-877-518-4673

Course Evaluation Policy

Course surveys are one of the most important tools that University of New England uses for evaluating the quality of your education, and for providing meaningful feedback to instructors on their teaching. In order to assure that the feedback is both comprehensive and precise, we need to receive it from each student for each course. Evaluation access is distributed via UNE email at the beginning of the last week of the course.