Deck 7: Ethics in the Management of Health Information Systems

Full screen (f)
exit full mode
Question
According to the World Health Organization, the four functions of health information systems are __________ __________ __________ and __________
Use Space or
up arrow
down arrow
to flip the card.
Question
PHI fraud for personal gain or harm is both a __________ and __________ issue.
Question
Communication failures in the use of computer technology often occur because of __________ differences.
Question
Because computers allow a person to assume a different personality, he/she has __________ that contributes
Question
__________ is a type of malware that uses encryption to make files unreadable.
Question
__________ occurs when hackers require payment for releasing healthcare information.
Question
Protection of HIS requires management of potential risk through __________ safeguards.
Question
To protect PHI when using medical devices, a __________ process for apps can increase confidentiality.
Question
__________ are the most important priority in the Weber model of ethics decision making.
Question
The __________ for ethics decision making serves as a check for one's rationale.
Question
Patients are often concerned about the loss of confidentiality when HIT is used. Using the information in Chapter 7, discuss three ways that confidentiality is protected in HIT.
Question
Americans have a right to protected healthcare information. Use ethics principles to defend or refute this statement.
Question
Using the information in Chapter 7, present three reasons why conducting a background investigation is important for all HIM systems employees.
Question
A system administrator who assists medical staff in the use of the hospital's network but does not have access to protected health information is most likely a professional in which field?

A) health information management
B) health information technology
C) health information systems
D) health information auditing
Question
Which best describes the relationship between health information management, health information technology, and health information systems?

A) Health information management controls health information technology and health information systems.
B) Health information technology collects data that is used by health information systems for health information management.
C) Health information management and health information technology work together to select, implement, and manage health information systems.
D) Health information technology analyzes and convert data into information that is used in health care systems by health care management.
Question
A pharmaceutical company seeking participants for a new drug trial pays a healthcare provider to provide medical records of patients with specific conditions that the drug targets so that they can recruit the patients for their study. Which of the following has occurred?

A) data falsification
B) diagnosis fraud
C) blackmail
D) HIPAA violation
Question
Why is healthcare data frequently the target of ransomware attacks?

A) Cyber attackers disagree with the way the healthcare industry works.
B) Healthcare data is more plentiful than other types of data.
C) Healthcare data is time sensitive, so cyber attackers are more likely to get paid quickly
D) Cyber attackers would rather ransom the data than destroy it because they realize its importance.
Question
Which statement(s) regarding hackers and systems is/are true?

A) Any system that can be accessed by legitimate users cannot by completely hacker-proof.
B) Systems that implement even simple security protocols are less appealing to hackers.
C) Background checks can help healthcare organizations avoid hiring employees who might try to hack the system.
D) All of the above.
Question
Ransomware attacks on healthcare data can mainly be traced to which source?

A) individuals who are trying to demonstrate that cloud data storage is not secure
B) organized crime groups
C) individuals who are trying to redistribute resources more equitably
D) individual hackers working alone
Question
An unethical healthcare provider would most likely ask which of the following questions?

A) "How would my grandmother react if I told her about my use of healthcare data?"
B) "Does this use of healthcare data allow me advantages that I would not have otherwise?"
C) "Does this use of healthcare data deceive anyone?"
D) "How can I use healthcare data to benefit myself?"
Question
A healthcare professional who deals with patient records and is charged with protecting health information in both digital and traditional form is working in which field?

A) health information management
B) health information systems
C) health information ransoming
D) health information technology
Question
A hacker infects a hospital network, using encryption to make patient records unreadable. The hacker demands payment to unencrypt the records. Which is the hacker using?

A) computer virus
B) ransomware
C) spyware
D) Trojan horse
Question
The health insurer at a company rewards employees who engage in physical activity by providing bill credits to those who walk an average of 8,000 steps per day. Employees who participate in the program wear a device that automatically transmits step number, heart rate, location, and other data to the insurance company for analysis. Which is/are the ethical concern(s) related to the program?

A) Should the collected data be included in individual medical records or medical insurance records?
B) Does the transmission of the data pose a risk to individuals' protected health information?
C) Both A and B
D) Neither A nor B
Question
According to Weber's model for business ethics in healthcare, which should take first priority in ethical decision-making?

A) individual good
B) individual rights
C) community good
D) community interests
Question
Which list names entities in order from highest priority to lowest priority as specified by Weber's decision-making model for business ethics in healthcare?

A) individual good, community good, organizational good
B) community interests, individual interests, organizational interests
C) community good, organizational good, individual good
D) individual interests, organizational interests, community interests
Question
Individuals from different generations are most likely to experience which issue related to computer technology and its use?

A) threats from cyber attackers
B) differences in opinion on the ethics of ransomware
C) ethical disagreements about the transmission of patient data
D) miscommunications related to differing levels of familiarity with computer technology
Question
A healthcare network administrator knows that using their computer expertise to encrypt a section of the network and demanding payment to unencrypt it would be unethical because it would result in undeserved financial gain. Which decision-making model does the network administrator's thinking demonstrate?

A) Ethical "Three Rules of Thumb"
B) Weber's Individual Decision-Making Method
C) The "Grandmother Test"
D) None of the above
Question
The primary purpose of a health information system is to collect and analyze data, converting it into information that healthcare providers can use in decision-making.
Question
Individuals usually apply the same ethics to anonymous online behavior as they do to face-to-face interactions.
Question
If a hacker remains "invisible" and never uses or intends to use the information they accessed, no ethical violation occurs.
Question
The collection of personal healthcare data by smartphone applications does not raise ethical questions as long as the smartphone user has agreed to the terms of the user agreement.
Question
According to Weber's model for ethical decision-making in the healthcare business, community interests should take priority over organizational interests.
Question
A healthcare professional can consider the ethics of using of protected health information by asking, "Would I be dissatisfied if someone else used my protected health information in this way?"
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/33
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Ethics in the Management of Health Information Systems
1
According to the World Health Organization, the four functions of health information systems are __________ __________ __________ and __________
data generation, compilation, analysis, synthesis.
2
PHI fraud for personal gain or harm is both a __________ and __________ issue.
legal, ethical
3
Communication failures in the use of computer technology often occur because of __________ differences.
generational
4
Because computers allow a person to assume a different personality, he/she has __________ that contributes
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
5
__________ is a type of malware that uses encryption to make files unreadable.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
6
__________ occurs when hackers require payment for releasing healthcare information.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
7
Protection of HIS requires management of potential risk through __________ safeguards.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
8
To protect PHI when using medical devices, a __________ process for apps can increase confidentiality.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
9
__________ are the most important priority in the Weber model of ethics decision making.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
10
The __________ for ethics decision making serves as a check for one's rationale.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
11
Patients are often concerned about the loss of confidentiality when HIT is used. Using the information in Chapter 7, discuss three ways that confidentiality is protected in HIT.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
12
Americans have a right to protected healthcare information. Use ethics principles to defend or refute this statement.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
13
Using the information in Chapter 7, present three reasons why conducting a background investigation is important for all HIM systems employees.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
14
A system administrator who assists medical staff in the use of the hospital's network but does not have access to protected health information is most likely a professional in which field?

A) health information management
B) health information technology
C) health information systems
D) health information auditing
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
15
Which best describes the relationship between health information management, health information technology, and health information systems?

A) Health information management controls health information technology and health information systems.
B) Health information technology collects data that is used by health information systems for health information management.
C) Health information management and health information technology work together to select, implement, and manage health information systems.
D) Health information technology analyzes and convert data into information that is used in health care systems by health care management.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
16
A pharmaceutical company seeking participants for a new drug trial pays a healthcare provider to provide medical records of patients with specific conditions that the drug targets so that they can recruit the patients for their study. Which of the following has occurred?

A) data falsification
B) diagnosis fraud
C) blackmail
D) HIPAA violation
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
17
Why is healthcare data frequently the target of ransomware attacks?

A) Cyber attackers disagree with the way the healthcare industry works.
B) Healthcare data is more plentiful than other types of data.
C) Healthcare data is time sensitive, so cyber attackers are more likely to get paid quickly
D) Cyber attackers would rather ransom the data than destroy it because they realize its importance.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
18
Which statement(s) regarding hackers and systems is/are true?

A) Any system that can be accessed by legitimate users cannot by completely hacker-proof.
B) Systems that implement even simple security protocols are less appealing to hackers.
C) Background checks can help healthcare organizations avoid hiring employees who might try to hack the system.
D) All of the above.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
19
Ransomware attacks on healthcare data can mainly be traced to which source?

A) individuals who are trying to demonstrate that cloud data storage is not secure
B) organized crime groups
C) individuals who are trying to redistribute resources more equitably
D) individual hackers working alone
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
20
An unethical healthcare provider would most likely ask which of the following questions?

A) "How would my grandmother react if I told her about my use of healthcare data?"
B) "Does this use of healthcare data allow me advantages that I would not have otherwise?"
C) "Does this use of healthcare data deceive anyone?"
D) "How can I use healthcare data to benefit myself?"
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
21
A healthcare professional who deals with patient records and is charged with protecting health information in both digital and traditional form is working in which field?

A) health information management
B) health information systems
C) health information ransoming
D) health information technology
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
22
A hacker infects a hospital network, using encryption to make patient records unreadable. The hacker demands payment to unencrypt the records. Which is the hacker using?

A) computer virus
B) ransomware
C) spyware
D) Trojan horse
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
23
The health insurer at a company rewards employees who engage in physical activity by providing bill credits to those who walk an average of 8,000 steps per day. Employees who participate in the program wear a device that automatically transmits step number, heart rate, location, and other data to the insurance company for analysis. Which is/are the ethical concern(s) related to the program?

A) Should the collected data be included in individual medical records or medical insurance records?
B) Does the transmission of the data pose a risk to individuals' protected health information?
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
24
According to Weber's model for business ethics in healthcare, which should take first priority in ethical decision-making?

A) individual good
B) individual rights
C) community good
D) community interests
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
25
Which list names entities in order from highest priority to lowest priority as specified by Weber's decision-making model for business ethics in healthcare?

A) individual good, community good, organizational good
B) community interests, individual interests, organizational interests
C) community good, organizational good, individual good
D) individual interests, organizational interests, community interests
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
26
Individuals from different generations are most likely to experience which issue related to computer technology and its use?

A) threats from cyber attackers
B) differences in opinion on the ethics of ransomware
C) ethical disagreements about the transmission of patient data
D) miscommunications related to differing levels of familiarity with computer technology
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
27
A healthcare network administrator knows that using their computer expertise to encrypt a section of the network and demanding payment to unencrypt it would be unethical because it would result in undeserved financial gain. Which decision-making model does the network administrator's thinking demonstrate?

A) Ethical "Three Rules of Thumb"
B) Weber's Individual Decision-Making Method
C) The "Grandmother Test"
D) None of the above
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
28
The primary purpose of a health information system is to collect and analyze data, converting it into information that healthcare providers can use in decision-making.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
29
Individuals usually apply the same ethics to anonymous online behavior as they do to face-to-face interactions.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
30
If a hacker remains "invisible" and never uses or intends to use the information they accessed, no ethical violation occurs.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
31
The collection of personal healthcare data by smartphone applications does not raise ethical questions as long as the smartphone user has agreed to the terms of the user agreement.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
32
According to Weber's model for ethical decision-making in the healthcare business, community interests should take priority over organizational interests.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
33
A healthcare professional can consider the ethics of using of protected health information by asking, "Would I be dissatisfied if someone else used my protected health information in this way?"
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 33 flashcards in this deck.