HTM 310 Health Informatics Discussion Essay
A friend, colleague, or your boss asks you what you are studying. You respond that you are taking a course on Informatics for Health Professionals. They respond, “What is Health Informatics?”
Describe and define health informatics. Base your response on course materials, especially the Introduction, reading chapter one in the Informatics etextbook, and introductory videos. Add a reference to add credibility to your discussion as well as share your thoughts on the value of health informatics.
https://books.google.com/books?id=vVVTBgAAQBAJ&lpg…
https://www.healthit.gov/how-do-i/individuals
https://www.mayoclinic.org/healthy-lifestyle/consu…
Advanced Technical Centers Health & Medical Discussion
Topic: Many people are still unwilling to accept that it is permissible for parents to intentionally create a deaf child. What do you think?
Raise issues regarding standards of normalcy, the « right to an open future » argument, the distinction between biological and social conception of health (and disability). Use arguments from Aristotle, Mill (or Bentham) and Kant as you see fit, or from any other author whose points you might find relevant to this specific question.
Consider arguments on both sides – even if your opinion leans more towards one of the 2 standpoints.
References:
Virtue Ethics:
-Kant and deontology:
-Utilitarianism:
Information Technology & System for Healthcare Project
Create a security plan for a medium sized health care facility. In your security plan, evaluate how you would approach security threats from both inside and outside the organization. Be sure that you address the following items in your security plan:
physical and administrative safeguards: employee education, health information archival and retrieval systems, disaster recovery, storage media
access safeguards: authentication, password management
network safeguards: cloud computing, firewalls, encryption / decryption and using mobile devices to deliver healthcare
Critique the plan you have written, identifying its strengths, elements that were not covered in the text, and any additional omissions or weaknesses of the plan.
As a reference, you may want to visit the following website:
Source: HIPAA Privacy, Security, and Breach Notification Audit Program: United States Department of Health & Human Services. Retrieved from http://www.hhs.gov/ocr/privacy/hipaa/enforcement/a…