Hardware and software that support human interacting with technology.
What is the human-technology interface?
100
Unauthorized use by unauthorized users.
How is confidential information in a secure network breached most frequently?
100
The act requiring 'meaningful use' of electronic health records by October 2015 in order to receive compensation from Medicare/Medicaid.
What is Health Technology for Economic and Clinical Health (HITECH)?
100
Knowledge worker.
What is a nurse?
100
The acquisition of knowledge that promotes the ability to understand and to manage one's health.
What is health literacy?
200
Health services delivered by telecommunications-ready tools (telephone, videophone, and computer).
What is telemedicine?
200
Software, hardware, or both that examines all incoming messages or traffic to the network.
What is a firewall?
200
The American Recovery and Reinvestment Act of 2009.
What is the act that requires 3 main components of meaningful use?
200
A nurse who works with information, generates information and produces knowledge.
What is a knowledge worker?
200
Empowers consumers to understand their health needs.
What is a major goal of the eHealth Initiative?
300
Healthcare initiatives and practice supported by electronic or digital media.
What is E-Health?
300
A hardware security tool that helps protect an organization against security breashes by issuing masks tp protect the identity of a corporation's employees who are accessing the World Wide Web.
What is a proxy server?
300
The process of systematically examining varying viewpoints related to moral questions of right and wrong?
What is ethics?
300
An interdisciplinary field that studies the mind, intelligence and behavior from an information processing perspective.
What is cognitive science?
300
Video games is the best format for meeting the educational needs of this group of patients.
What is Digital Natives or Generation Y?
400
A system that promotes the interaction between healthcare providers and patients.
What is communications system?
400
This is left behind when one uses an organizational network.
What is a digital footprint?
400
Assigning passwords to employees so that they can access the secure network is known as_______
What is authentication?
400
A model that explains how knowledge acquisition, dissemination, generation and processing relate to nursing informatics.
What is the Foundation of Knowledge Model?
400
A signaling device that is worn as a pendant to provide access to help.
What is a personal emergency response system?
500
Digital divide
What is the gap between those who have access to online information and those who do not called?
500
Curtails healthcare fraud and abuse and enforces standards for health information.
What is HIPAA?
500
A person who conducts informatics research and generates informatics theory.
What is an informatics innovator?
500
This replicates usual clinical interactions in all specialty areas across a distance.