Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop
Gift Vouchers
Browse by Category

facebook
Google Book Preview
CompTIA Healthcare IT Technician HIT-001 Cert Guide
— —
Jean Andrews Joy Dark
CompTIA Healthcare IT Technician HIT-001 Cert Guide by Jean Andrews at Abbey's Bookshop,

CompTIA Healthcare IT Technician HIT-001 Cert Guide

Jean Andrews Joy Dark


9780789749291

Pearson IT Certification


Maintenance & repairs;
Computer certification: CompTia


Mixed media product

432 pages

$75.95
We can order this in for you
How long will it take?
order qty:  
Add this item to my basket

This is the most comprehensive text for CompTIA's new Healthcare IT Technician (HIT-001) certificate exam. Its complete coverage is fully mapped to CompTIA's exam objective sequence, and includes all the information and insight students need to succeed on the exam. From start to finish, it has been organized to help students study more efficiently, improve retention, and earn their highest possible exam scores.

By:   Jean Andrews, Joy Dark
Imprint:   Pearson IT Certification
Country of Publication:   United States
Dimensions:   Height: 240mm,  Width: 192mm,  Spine: 28mm
Weight:   1.046kg
ISBN:   9780789749291
ISBN 10:   0789749297
Pages:   432
Publication Date:   May 2012
Audience:   Professional and scholarly ,  Undergraduate
Format:   Mixed media product
Publisher's Status:   Active

Introduction xxxix Chapter 1 Introducing Healthcare IT 2 The Importance of the HITECH Act 3 Getting to Know Healthcare 5 Types of Healthcare Facilities 6 Focus on Hospitals 7 Departments in the Hospital 8 Patient Flow Through a Hospital Stay 9 Inpatient Admittance 9 Outpatient Admittance 11 Emergency Department Patient 12 The Goals of Healthcare IT 15 Why Have IT in Healthcare? 15 Prepare for a Career in Healthcare IT 16 Chapter Summary 19 The Importance of the HITECH Act 19 Getting to Know Healthcare 19 Goals of Healthcare IT 20 Key Terms 20 Acronym Drill 21 Review Questions 22 Practical Application 23 Chapter 2 Introducing Data Flow in HIT 24 Learning Support Flow 25 Getting to Know Information Systems 27 Getting to Know HIS 28 Functions of an HIS 29 Getting to Know the Interface 33 The Message 34 The Message Path 36 Following the Data Flow 38 Three IS Sources of an ADT Message 39 HIS-originated ADT Data Flow 39 EDIS ADT Data Flow 40 Perioperative IS Data Flow 42 Data Flow Other Than ADT 44 Pharmacy IS Data Flow 44 RIS Data Flow 48 LIS Data Flow 49 EDIS Data Flow 52 Chapter Summary 54 Learning Support Flow 54 Getting to Know Information Systems 54 Getting to Know HIS 54 Getting to Know the Interface 55 Following the Data Flow 55 Key Terms 56 Acronym Drill 57 Review Questions 58 Practical Application 60 Chapter 3 Regulatory Requirements 64 Identifying Standard Agencies, Laws, and Regulations 65 Agencies Governing Healthcare 65 Department of Health and Human Services 66 National Institute of Standards and Technology (NIST) 72 Healthcare Programs 74 Healthcare Laws 76 Health Insurance Portability and Accountability Act (HIPAA) 76 American Recovery and Reinvestment Act (ARRA) 77 Health Information Technology for Economic and Clinical Health (HITECH) Act 78 Regulations of Healthcare Laws 79 Learning HIPAA Controls and Compliance Issues 80 Learning Rules of Record Retention and Disposal 83 Types of Health Records 83 Record Retention 85 Record Disposal 85 Learning Legal Best Practices and Documentation 86 Chapter Summary 90 Identifying Standard Agencies, Laws, and Regulations 90 Learning HIPAA Controls and Compliance Issues 91 Learning Rules of Record Retention and Disposal 91 Learning Legal Best Practices and Documentation 92 Key Terms 92 Acronym Drill 93 Review Questions 93 Practical Application 94 Chapter 4 Organizational Behavior 96 Handling PHI 97 Physical Safeguards 98 Technical Safeguards 103 Applying Proper Communication Methods 105 E-Mail 106 IM Versus Secure Chat 106 EMR/EHR System 107 Fax 108 Secure FTP 108 Phone 109 VoIP 111 Identifying EHR/EMR Access Roles and Responsibilities 113 Medical and Medical Support Roles 114 Technical Roles 119 System Administrator 119 Security Administrator 120 Network Administrator 121 Database Administrator 122 Desktop Support Technician 123 Third-Party Access 123 Role-Based Access and Exceptions 124 Access Based on Sensitive Patient Data 126 Levels of Access and Audit Trails 126 Identifying Organizational Structures and Different Methods of Operation 127 Hospitals 127 Private Practices 129 Nursing Homes 130 Assisted Living Facilities 130 Surgical Centers 131 Home Healthcare 131 Hospice 131 Executing Daily Activities 132 Communication 132 IT Functions in a Healthcare Environment 133 HIT Technician Presence in the Hospital 134 Chapter Summary 139 Handling PHI 139 Applying Proper Communication Methods 139 Identifying EHR/EMR Access Roles and Responsibilities 139 Identifying Organizational Structures and Different Methods of Operation 141 Executing Daily Activities 141 Key Terms 142 Acronym Drill 144 Review Questions 144 Practical Application 146 Chapter 5 IT Operations 148 How the Internet or an Intranet Works 149 The OSI Model 151 Application, Presentation, and Session Layer Protocols 153 Transport and Network Layers 156 Data Link and Physical Layers 159 Servers on the Network 160 Cloud Computing and Virtualization 163 Programming Languages 168 How a Network Works 172 Basic Network Devices and Hardware 175 Wireless Access Point 175 Router 177 Switch 182 Internet Modem 183 Network Tools 184 ipconfig Command 184 ping Command 185 tracert Command 186 Solving Network Problems 188 Duplicate IP Address 189 Broken Cables and Crosstalk 190 Interference with Wireless Networks 190 Poor AP Placement 190 Lost Connectivity to the ISP 191 Power Failure, Blackouts, and Brownouts 191 Managing Network Resources 192 Locally Hosted or Remote EHR and EMR Information Systems 193 Considerations for Servers on a Network 194 Security Risks 195 High Traffic and Load Balancing 196 Hardware and Software Specifications Required by Vendors 196 Purging Old Logs 196 Maintain Backups and Downtime Procedures 196 Configuring a Workstation and Peripherals 198 Deploy a Workstation 198 Maintain Operating System Updates 203 Troubleshoot Common Problems 204 Problems with a Mouse 204 Problems with a Monitor 205 Problems with a Printer 205 Power Problems 206 Software Patches, Hotfixes, and Updates 206 Peripheral Devices 207 Mobile Storage 211 Flash Drives and External Hard Drives 211 DVDs and CDs 212 SD Cards 212 Tapes 212 Mobile Computing Devices 213 Chapter Summary 215 How the Internet or an Intranet Works 215 How a Network Works 215 Managing Network Resources 216 Configuring a Workstation and Peripherals 216 Key Terms 217 Acronym Drill 219 Review Questions 220 Practical Application 224 Chapter 6 Medical Business Operations 226 Understanding the Clinical Environment 227 Medical Terms, Imaging, and Tests 228 Medical Terms 228 Medical Imaging 232 Medical Tests 236 Medical Departments 240 Clinical Environment 242 Supporting Software Used in Healthcare Facilities 245 Clinical Software and Modules 246 Scheduling Software 246 Patient Tracking Software 247 Order Entry Software 248 Practice Management Software 249 Billing and Coding Software 250 Tracking and Auditing Software 252 Document Imaging 253 Medical Images of the Human Body 253 Digital Images of Patient Records 255 Change Control 256 Support Requests 258 How a Healthcare Interface Works 259 HL7 Message 260 Typical Interface Issues 262 Chapter Summary 266 Understanding the Clinical Environment 266 Supporting Software Used in Healthcare Facilities 267 How a Healthcare Interface Works 269 Key Terms 270 Acronym Drill 271 Review Questions 272 Practical Application 275 Chapter 7 Security 280 What Are We Up Against? 281 Social Engineering 281 Electronic Attacks 282 Understanding Permission Levels 283 Understanding Physical Security 285 Location and Access 286 Servers 286 Network Hardware 287 Printers, Scanners, and Copiers 289 Accessing Secured Resources 290 Environmental Security 293 Using Password Best Practices 294 Understanding Encryption Types 296 Types of Encryption 296 Communication 298 Storage 299 Dissemination of PHI 301 How to Secure Wireless Networks 302 How to Remotely Access the Facility's Network 303 Securing Backups 306 Disposing of PHI 307 Chapter Summary 310 What Are We Up Against? 310 Understanding Permission Levels 310 Understanding Physical Security 311 Using Password Best Practices 311 Understanding Encryption Types 312 How to Secure Wireless Networks 312 How to Remotely Access the Facility's Network 313 Securing Backups 313 Disposing of PHI 314 Key Terms 314 Acronym Drill 315 Review Questions 317 Practical Application 318 Appendix A Answers to Acronym Drills, Review Questions, and Practical Application Exercises 320 Appendix B CompTIA Healthcare IT Technician ACRONYMS 336 Key Terms Glossary 342 TOC, 9780789749291, 5/24/2012

Joy Dark has worked in the healthcare IT field in several capacities. She first worked as a help desk technician providing first-level support at a company that supports more than 130 hospitals in 29 states. Later she focused on providing second-level support for clinical information systems, specializing in perioperative information systems and the emergency department information systems. Next she switched gears to become a support operations specialist, helping to design support protocols and structures as well as managing the transition of support when hospitals converted information systems. Now she has authored the CompTIA Healthcare IT Technician HIT-001 Cert Guide and contributes in writing other technical books. Before healthcare IT, Joy was an elementary school teacher in both the United States and in South America. She lives in Dalton, Georgia, with her sister and Doberman dog. She has two sisters who are physicians (anesthesiology and emergency medicine) who have shared plenty of stories, facts, and opinions about the healthcare environment that have helped to shape the content in this book. Jean Andrews, Ph.D., has more than 30 years of experience in the computer industry, including more than 13 years in the college classroom. She has worked in a wide variety of businesses and corporations designing, writing, and supporting applications software; managing a PC repair help desk; and troubleshooting wide area networks. She has written a variety of books on software, hardware, and the Internet. She lives in northeast Georgia.

My Shopping Basket
Your cart does not contain any items.