Hospital Information Systems.pptx

ArdraSabu 1,064 views 64 slides May 06, 2023
Slide 1
Slide 1 of 64
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64

About This Presentation

HIS aka Hospital Information System is very important for Hospital Administration courses.


Slide Content

Module 4

Module 4 - Syllabus Hospital Information System - Hospital Information System Management and software applications in registration, billing, investigations, reporting, ward management and bed distribution, medical records management, materials management and inventory control, pharmacy management, dietary services ,management, information processing. Executive information system; expert support systems; security and ethical challenges.

Hospital Hospital is an institution providing medical and surgical treatment and nursing care for sick or injured people WHO defines Hospital as “ An integral part of social and medical organization, the functions of which are to provide the population complete health care, both curative and preventive with out patient services reaching out to the family in its own environment and also to carry out training of health workers/ functionaries and the bio social research”

Hospital System Hospital is an organisation that mobilises the skills and efforts of widely divergent group of professionals, semi- professionals and non-professionals so as to provide highly personalised services to individual patients It is therefore , essential to bring together the various components to a unified whole to achieve the objective through the authority of control and co-ordination This warrants a systemic functioning of hospital as an Institution. 

Hospital System Hospital system consists of co-ordinate activities provided by a variety of categories of hospital staff utilising different skills and equipments Quality of output in the system is an important variable that affects input and process at any level of function Patient being from out side of the hospital system attention has also to be directed towards the external environment of the hospital Hence the hospital system is not a closed system.

Hospital is an interaction point between the hospital staff and the patient and his relatives On arrival of the patient , group of people from inside the hospital as well as from out side engage themselves for his care and early recovery Therefore hospital is an open system Hospital System

Hospital Services

Hospital System The hospital system can be broadly classified into 2 main categories Organizational System Hospital System Clinical System

Information and Service Links of Hospitals

Information Subsystems in a Hospital There are eight information subsystems in a hospital according to Gillette et. al .

Computers in Hospitals According to Rowland et. al. computers are used in hospitals at three levels Administrative data processing Clinical data processing Medical information system

Reasons for computerization of hospitals To increase organizational efficiency through reduction in the overall costs of delivering health care services To provide useful, accurate, complete and timely information to meet the requirements of the various departments requiring such data To improve managerial effectiveness in planning, allocating and controlling the scarce and expensive resources of the organization

To improve medical service to ensure high quality of medical care at a reasonable cost To improve the management information system To reduce clerical workload A good hospital must have an efficient real time communication network ensuring the pertinent data needs for medical care, business office, hospital management and support activities

Hospital Information Systems

Hospital Information System (HIS) A  Hospital Information System  (HIS) is an element of health informatics that focuses mainly on the administrational needs of hospitals A HIS is a comprehensive, integrated information system designed to manage all the aspects of a hospital's operation, such as medical, administrative, financial, and legal issues and the corresponding processing of services.

Computerized Hospital Information System A computerized hospital information system is a high speed, computer controlled, multi station, authorized access, information flow network for the hospital It provides patient medical histories, current medical records, statistical summaries, and legal records Scheduling of medical services, maintain inventory control, and automate information flow in hospitals

HIS is highly important for hospital management to monitor progress, measure performance, detect trends, evaluate alternatives, and make decisions to take corrective actions well in time Thus, HIS improves functioning of hospitals in a cost effective way

Aims of HIS To improve the quality of healthcare delivery To reduce the administrative work, and To provide better data for use by managers and health care professionals

Classification of HIS Ball and Boyle (1980) classified HIS according to the degree of integration and the communication present in the systems

Classification according to functionality 4 Categories Clinical IS used to primarily support direct patient care activities MIS assists in strategic planning, controlling and evaluating activities A DBMS, which collects interrelated data and with least data redundancy Operational administrative system to support management in day-to-day non-patient care activities

Kolenaty’s - Classification of HIS

HIS - Database

HIS - Modules

Registration PATIENT ENTERS INTO THE HOSPITAL   PATIENT APPROACHES THE OPD REGISTRATION DESK  PATIENTS FILLS THE REGISTRATION FORM  INFORMATION IS ENTERED IN TO THE HIS OF THE HOSPITAL  THEN, UHID (UNIQUE HOSPITAL IDENTIFACTION) IS GENERATED  BILLS ARE PROCESSED AND NEW INVESTIGATION ORDER OR DOCTOR VISIT ARE ENTERED INTO THIS THEN, HARD COPY OF THE BILL IS TAKEN WHICH IS GIVEN TO THE PATIENT FOR FURTHER PROCEEDINGS

Registration Module

Billing

Investigations and Reports

Ward Management and Bed Distribution

Medical Records Management

Material Management & Inventory Control

Pharmacy Management

Dietary Services

Management Information Processing

Security and Ethical Challenges

Security Challenges Computer crimes that exist in the present society are:- Hacking Cyber Theft Unauthorized use at work Software Piracy Piracy of intellectual property Computer viruses and worms

Hacking Hacking is the obsessive use of computers, or the unauthorized access and use of networked computer systems. Hackers usually Steal or damage data Get unauthorized access to computer files Monitor e-mails or web server access May use remote services that allow one computer to execute programs on another Plant data that will cause system to welcome intruders

Cyber Theft Cyber theft involves theft of money by unauthorized network entry and fraudulent alteration of computer databases.

Unauthorized use at Work Unauthorized use of computer resources especially by employees Playing video games Unauthorized use of internet Non-work related upload/download Transmission of confidential data Moonlighting

Software Piracy Unauthorized copying of software is called software piracy or software theft Software is protected by copyright law and user license agreement that allows only limited copies to be made

Piracy of Intellectual Property Materials other than software are also pirated by making multiple copies Piracy of music, video, images, articles, books etc. Dissemination of these material through internet websites

Computer viruses and worms A virus is a program code that cannot work without being inserted into another program A worm is a distinct program that can run unaided They enter a computer through e-mail or file attachments, or through illegal software. A virus usually copies itself into the OS, and then spreads to main memory and thus hard disk and any inserted external memory.

Privacy Issues Privacy on the internet Computer Matching Privacy Laws Spam e-mail Flame e-mail

Other Challenges Employment challenges because a lot of tasks have been automated Computer monitoring causes intrusion in personal space for workers Challenges in working conditions are caused by tasks which are monotonous in nature. But it also automates most of the work and gives way to more challenging jobs Challenges to individuality as they eliminate the human relationships between people 

Health issues The use of IT in the workplace raises a variety of health issues . Heavy use of computers is reportedly causing health problems such as: Job stress Damaged arm and neck muscles Eye strain Radiation exposure

Ethical responsibility of business professionals Business ethics are concerned with Equity Rights Honesty Exercise of corporate power

Categories of ethical business issues

Principles of technology ethics Proportionality of benefits to risk Informed consent to risks Justice in distribution of risk with benefits derived to each sub unit Minimized risk by the selected option

Ethical guideline Acting with integrity Increasing your professional competence Setting high standards of personal performance Accepting responsibility for your work Advancing the health, privacy, and general welfare of the public

Security management of IT Encryption Firewalls Denial of service attacks E-mail monitoring Virus defence Security codes Backup files Security monitors Biometric security Computer failure controls Fault tolerant systems Disaster recovery System controls and audits

Encryption The concept of private key and public key can be extended to authentication protocols. There are three types of authentication protocols followed by organizations. Password Authentication protocol Challenge Handshake authentication Protocol Extensible Authentication Protocol

Firewall Firewalls are used to restrict access to one network from another network. Different types of firewalls exist

Denial of Service Defences The Internet is extremely vulnerable to variety of assaults by criminal hackers, especially denial of service (DOS) attacks. In computing, a denial of service attack is an attempt to make a network resource unavailable to its intended users

e-Mail Monitoring Internet and other online e-mail systems are one of the favourite avenues of attack by hackers for spreading computer viruses or breaking into networked computers. E-mail is also the battleground for attempts by companies to enforce policies against illegal, personal, or damaging messages by employees, and the demands of some employees and others, who see such policies as violations of privacy rights. 

Virus Defences Many companies are building defences against the spread of viruses by centralizing the distribution and updating of antivirus software, as a responsibility of there IS departments. protection responsibility is to their Internet service providers or to telecommunications or security management companies

Security Codes Typically, a multilevel password system is used for security management. First, an end user logs on to the computer system by entering his or her unique identification code, or user ID. The end user is then asked to enter a password in order to gain access into the system. Next, to access an individual file, a unique file name must be entered

Backup Files Backup files, which are duplicate files of data or programs, are another important security measure. Files can be protected by file retention measures that involve storing copies of files from previous periods. Several generations of files can be kept for control purposes

Security Monitors System security monitors are programs that monitor the use of computer systems and networks and protect them from unauthorized use, fraud, and destruction Security monitor programs provide the security measures needed to allow only authorized users to access the networks Security monitors also control the use of the hardware, software, and data resources of a computer system . Security monitors can be used to monitor the use of computer networks and collect statistics on any attempts at improper use.

Biometric Security These are security measures provided by computer devices, which measure physical traits that make each individual unique. This includes: Voice verification Fingerprints Hand geometry Signature dynamics Keystroke analysis Retina scanning Face recognition
Tags