You Are Here:
Health Information Systems Course Descriptions
- 5613 HEALTH INFORMATION SYSTEMS
- This course is an introduction to the fundamentals of health information management using computer-based patient records. Key areas of study within health information management are addressed, with emphasis on the use of information as an asset to the health care provider. Included topics illustrate the importance of planning and setting procedures for proper storage, maintenance, usage, and security of health information records.
- 5623 ELECTRONIC HEALTH RECORDS
- This course introduces health information technology and develops the skills necessary to become successful users of medical practice management software. It prepares students to go into any medical office and perform medical practice management duties with the same or similar software as used in this course.
- 5633 HEALTH INSURANCE AND MANAGED CARE
- This course provides a working knowledge of medical insurance and its applications. Emphasis is placed on understanding insurance essentials, including the role of the medical insurance billing specialist and the laws and ethical guidelines of the field. Medical documents, coding diagnoses, and procedures are discussed. Students learn about the claims process, focusing on charges, methods of payments, billingand reimbursement. Other topics include private payers, Blue Cross and Blue Shield, Medicaid and Medicare, TRICARE and CHAMPVA, workers' compensation and disability insurance, hospital insurance, long-term insurance, and dental insurance. Finally, patient billing software is introduced and explored.
- 5643 HEALTH POLITICS AND POLICY
- This course emphasizes key concepts and knowledge regarding health politics and policy. Specifically, the course will provide an overview of the ethical and secure use of computer systems and data for the professional. Topics covered include ethical case studies, privacy, property rights, accountability and Internet issues as well as codes of ethics, professional conduct as published by technical organizations and best security practices. In addition, there is a focus on protecting computer resources from unauthorized access, establishing control to ensure the reliability of information processing, and auditing information systems to verify the accuracy of information systems.