HIC’s accredited Diploma in Health Informatics (DipHI) is a comprehensive 17 course online program covering everything to do with Health Informatics and Healthcare Computing.
Study in block or spend 7-15 minutes at the start of each day.
Here’s what’s covered in the program’s 350 topics and 473 research elinks.
HI203 Health Informatics
- Introduction and Study Objectives
- Information
- What Does This All Mean for Healthcare?
- Historical Perspectives
- What IS Information?
- Information and Records Management
- Medical Records on Paper
- Reporting and Using Paper Records
- Professionals and Information
- Patients and Information
- Trusting Information
- Visions of the Future
- Setting the Scene
- What exactly is a Medical Record?
- Investment in Medical Records
- Shortcomings of the Paper Record
- What IS an EHR (Electronic Healthcare Records) System?
- Obstacles to Adoption of Electronic Records
- Cost
- Clinician Comfort with Data Entry
- Concerns about Privacy and Security
- Information in Electronic Formats
- Pictorial Material
- “Free” Text
- Structured Text – the options
- Data Entry Methods
- Events / Encounters / Episodes
- Communication
- Summary
- Setting the Scene
- Medical Terminology
- Precision in Data Entry
- Classification Systems
- Coding
- Data Analysis
- Navigating a Classification System
- Data Exchanges and Collections
- Classification Updates and Versions
- Adding Codes
- A Brief Overview of Some Classification and Coding Systems
- Classification and Coding Systems – for CLINICAL Use
- 1a. SNOMED-CT – Merging Read and SnoMed Systems
- 1b. The Read Clinical Classification System
- 1c. SNOMED
- 1d. International Classification of Primary Care – ICPC-2
- Classifications Primarily Intended for NON-CLINICAL Purposes
- 2a. ICD
- 2b. Diagnosis Related Groups (DRGs) and Healthcare Resource Groupings (HRGs)
- 2c. Other Resource Groupings
- 2d. Items of Service
HI203-04 Data Collections – for Care, Management, Audit and Research
- Setting the Scene
- Collecting Data
- Privacy, Intellectual Property and Ownership Issues
- Ethical Approvals
- Collecting Quality Data
- Adequacy
- Validation
- Bias and Objectivity
- Data Management and Storage
- Identification and Registration
- Databases
- Data Analysis and Reporting
- Analysis
- Reporting
- Minimum Data Sets
- Data for Current and Continuing Care, and for Audit
- Patient Progress Data
- Data for Prospective Research
- 1. How Much Data?
- 2. Free Text Descriptors or Classified and Coded Entries?
- 3. Standard or Home-made Classifications?
- Clinical Trials
- Data for Warehousing and Retrospective Research
- Data Warehouse
- Data Mining
- Setting the Scene
- Representing Information and Computers
- Computer Systems
- The Hardware
- The Box, Power Supply, etc
- Magnetic and Optical Memory
- Electronic Memory Chips
- Processor Chips
- The Software
- Operating System
- Applications Software
- Files and File Storage
- Compression of Data / Files
- Software and BUGS
- External Connections
- Plugs, Ports and Peripherals
- Supercomputers, Mainframes and ‘smaller’ computers (such as PCs)
- Networks
- Check Your Understanding
HI203-06 General Computer Applications – enterprise, web, core clinical
- Setting the Scene
- Applications
- A. Enterprise Management / Office Automation Software
- 1. Word Processors
- 2. Spreadsheets
- 3. Databases
- 4. Presentation Managers
- B. Web Browsers and Web-based Applications
- The World Wide Web
- Searching
- Web-based Resources and Protocols
- C. Medical and Patient Care Applications
- Security and Anti-Malware Applications
- Setting the Scene
- Understanding Communication
- Communication Connections
- Networks
- Network IP Addressing
- Network Hardware
- Network Protocols
- LAN Configuration and Protocols
- A Quick Practical Activity
- Messages and Data Interchange
- Messages
- Structure in Messages
- Structured Messages
- Coded Data in Messages
- Validation of Messages
- Message Libraries and Frameworks
- Message Security
- Electronic Messaging: some cautionary notes
- Setting the Scene
- What is Security?
- Privacy – see later module
- Why is Security Important?
- Consequences of Breach of Security
- What are the Security Threats and Risks?
- Security Measures
- Security Policy
- General Principles
- Specific Measures
- System Structural and Operational Measures
- Hardware and Network
- Storage Memory Protection – RAID
- Memory and Disk ‘sharing’
- Operating System and Software
- Malware Protection
- Firewalls
- Back-up
- Data Encryption
- Asymmetrical Encryption and the Public Key Infrastructure
- Data Removal
- Archiving
- Data Destruction
- Functional and User Management Measures
- The Human Element
- Preventive Strategies
- Access Control
- Identification and Authentication: passwords, tokens and PINs
- People Management
- Detective Strategies
- Microcomputer Security
- Security Relating to IT Staff
- Two Notes of Caution
- Internet Cafes and Business Centres
- Another Note of Caution
- Setting the Scene
- Introduction to Information Privacy
- Ethics: respect for persons and personal information
- Privacy Breach and Redress
- The Evolution of Information Privacy Concepts
- Privacy Principles as Applied to Health Information
- Legislation and Personal Information Privacy
- Data Protection
- Freedom of Information
- Human Rights
- HIPAA: a North American initiative
- Ensuring Privacy Compliance
- Caldicott Guardians
- Privacy Monitoring
- Privacy Guidance
- Management and Privacy
- A Final Thought: who owns medical records?
- Setting the Scene
- Why Standardise?
- What is a ‘Standard’?
- De Facto Standards
- Formal Development of Standards
- When to Standardise
- Standardise WHAT and WHERE exactly?
- Between Entities
- Within Entities
- Healthcare Systems
- Lock-in
- Open Software
- WHAT Standards???
- Data Standards
- Data Set Standards
- Technical Standards
- Interface Engines
- Other Healthcare Related Standards
- Computer User Health and Safety Standards
- Professional Standards
- Further Reading
HI203-11 Systems Acquisition – Specification, Selection and Contracting
- Setting the Scene
- The Business Case
- Steering Committee
- Scoping and Specifying a System
- Seeking out Vendors
- Selecting a System
- Technical Evaluation
- Selecting and Evaluating a Software Application
- User Evaluation
- Future-Proofing
- Data Migration
- ‘Vapourware’
- ‘Lock-in’
- Contractual and Relationship Issues
- Contracts
- Roles and Responsibilities
- Milestones, Slippage and Payments
- Modifications and Changes
- Project Documentation
- Maintenance, Support and Updates / Upgrades
- Source Code
- Procurement Overall – general issues
- Managing the Project(s)
- Setting the Scene
- Implementing the Project
- Project Management
- Technical Systems Implementation
- Change Management Plan
- Parallel Running
- Risk Management
- Migrating, Moving and Merging Data
- Operational Planning
- Managing the People – change management
- The Change Process
- Addressing Staff Issues
- Staff Engagement: Development, Education and Training
- Expectation Management
- Benefits Realisation
- Action Teams
- User Support
- Some Practical Suggestions and Hints
- Project Failure
- Setting the Scene
- Introduction
- Terminology
- Clinical Reasoning
- Logic
- Logical and Semantic Models of Medicine
- Logical Reasoning – Boole, Bayes and Fuzzy
- Boole
- Bayes
- Fuzzy
- Artificial Intelligence in Medicine
- Top-Down AI
- Rules
- The Inference Engine
- Bottom-up AI
- AI Programming
- Additional Reading
- Setting the Scene
- Do we need AI/ES?
- Decision Analysis
- Gathering, Warehousing and Mining the Data
- Data Warehouse
- Data Mining
- Evidence-based Medicine
- Embedding Knowledge in Systems
- Data Collection Protocols
- Prescribing Guidance
- Flow Charts
- Interpretative Systems
- Clinical Decisions Support System (CDSS) Styles
- CDSS in Action
- MYCIN
- INTERNIST / CADUCEUS / QMR
- Puff
- DXplain
- ISABEL
- PRODIGY / CKS
- General
- The User Interface for Clinical Decision Support
- Legal Issues
- Further reading
HI203-15 Networking Care – the Information Management Perspective
- Setting the Scene
- Introduction
- The Current Health Information Environment
- SV vs BoB
- Information Flows
- Creating a Health Information Infrastructure – and Politics
- Health Enterprise Mergers – A Common Scenario
- Joining-up Services
- Healthcare Networking Methodology
- Administrative
- Clinical Information
- The Shared Care Record
- Recognising the Obstacles
- Linking using Interface Engines
- Linking using Web Technology
- Privacy and Security in ‘Joined-up care’ – a Framework
- Robust Identification
- Contractual Security Framework
- Telecommunications
- A Final Note
- Setting the Scene
- Health Information Governance
- Information Governance
- Some Issues in IG
- Telemedicine Services
- Where and How Will Telemedicine be Effective?
- Some Selected National Health Information Infrastructures (NHII)
- NHII Implementations
- 1. New Zealand
- 2. The UK’s NHS
- 3. Other NHII Initiatives
- Identification devices
- Setting the Scene
- Understanding Clinical Systems
- Communications and Messages
- Understanding HL7 Messages
- Understanding HL7 Language
- Version 2
- Version 3
- CDA
- Using HL7 in Systems Integration
- Forwards / Backwards Version Compatibility
- Profiles
- Interface Engines
- Integration at the User Desktop
- Essential Infrastructure
Pingback: One billion Android devices exposed to malware - yours too?