evolutionary, molecular, cellular, and system-based theories of aging

Aging Theories Blog! Read the Theories of Aging article by Weinert & Timiras. Address evolutionary, molecular, cellular, and system-based theories of aging. Discuss and give examples of each and d

Aging Theories Blog!

Read the Theories of Aging article by Weinert & Timiras. Address evolutionary, molecular, cellular, and system-based theories of aging. Discuss and give examples of each and demonstrate your depth of knowledge. Use proper spelling and grammar. Add your opinion on the topic.

Primary Insurance:

Start by reading and following these instructions:

  1. Quickly skim the questions or assignment below and the assignment rubric to help you focus.
  2. Read the required chapter(s) of the textbook and any additional recommended resources. Some answers may require you to do additional research on the Internet or in other reference sources. Choose your sources carefully.
  3. Consider the discussion and the any insights you gained from it.
  4. Create your Assignment submission and be sure to cite your sources, use APA style as required, check your spelling.

Assignment:

Students will complete the following scenario as an essay.

As you are completing your audits you observe Mary Johnson’s chart and notice the following:

Mary Johnson saw Dr. Nichols today for a well-woman exam. Total charges are $185.00. Mary has two insurance companies:

Primary Insurance:

BCBS

Copay: $25.00

100% benefit after copay

Allowed amount: $150.00

Secondary Insurance:

Cigna Health Care

Deductible: $200.00 (already met)

80% benefit after deductible

Allowed amount: $125.00

Both claims were submitted at the same time in error.

Money collected from the patient: $0.00

  1. Complete the following questions providing rationales for your responses:
    1. How much money did Dr. Nichols receive?
    2. How much should BCBS have paid?
    3. How much should Cigna have paid?
    4. How much is this claim overpaid?
    5. Who overpaid on this claim?
    6. What would be your next steps?
  2. Address how this situation might be avoided in the future: be specific and provide steps.
  3. The well-woman exam showed this patient due to a family history of cancer would benefit from BRCA genetic testing and both insurance companies denied this claim. Format a letter of appeal or BRCA testing.

This assignment is completed as an APA style paper and should be at least 2-3 pages in length. Demonstrate your business knowledge and professional ethics in your response.

Assignment Expectations:

  • Length: answers must thoroughly address each question in a clear, concise manner; complete answers will likely take 2-3 pages
  • Structure: Title and reference page required
  • address each question in a numbered list
  • References: References required to be cited if used

state legislative reporting requirements and then use metacomprehension to identify the criminal and civil risks to health care professionals for failing to report certain incidents.

In this week’s discussion preparation, you were asked to analyze the state legislative reporting requirements and then use metacomprehension to identify the criminal and civil risks to health care professionals for failing to report certain incidents. Provide examples of legal case law to support your response

Teaching Violence in the Workplace

Discussion Question:

When looking at violence in healthcare, human trafficking is an essential topic to discuss as healthcare providers. However, many nurses come in contact with a victim yet are not knowledgeable on the signs to look for and actions to take. Discuss what your role is as a nurse in realizing the signs and what interventions are necessary.

Your initial posting should be at least 400 words in length and utilize at least one scholarly source other than the textbook.

Assignment:

Discussion Question:

When looking at violence in healthcare, human trafficking is an essential topic to discuss as healthcare providers. However, many nurses come in contact with a victim yet are not knowledgeable on the signs to look for and actions to take. Discuss what your role is as a nurse in realizing the signs and what interventions are necessary.

Your initial posting should be at least 400 words in length and utilize at least one scholarly source other than the textbook.

Assignment:

Teaching Violence in the Workplace

Create a teaching PowerPoint presentation that addresses each of the following points/questions. Be sure to completely answer all the questions for each bullet point. Use clear headings that allow your professor to know which bullet you are addressing on the slides in your presentation. Support your content with at least three (3) sources using APA citations throughout your presentation. Make sure to cite the sources using the APA writing style for the presentation. Include a slide for your references at the end. Follow best practices for PowerPoint presentations related to text size, color, images, effects, wordiness, and multimedia enhancements. Review the rubric criteria for this assignment.

This week you are to create a PowerPoint as if you are teaching this information to your colleagues.

  • Guns in the Workplace: prepare for an active shooter (what is the protocol and preparations your workplace has taken – if none have been developed describe what should be taken). What is the responsibility as a nurse caring for patients in an active shooter scenario?
  • Bullying in Nursing: Bullying in the nursing workforce has become an increasing topic of concern. Research this topic and describe reasons why bullying is a problem in nursing. Provide suggestions for a new nurse who is being bullied by coworkers. What is your responsibility if you see a fellow nurse being bullied?
  • Title Slide (1 slide)
  • Objective Slide (1 slide)
  • Preparing for an active shooter (2-3 slides)
  • Responsibility for patients in an active shooter scenario? (1-2 slides).
  • Why bullying is a problem in nursing (2-3 slides)
  • Suggestions for a new nurse being bullied (2-3 slides)
  • Your responsibility (1-2 slides)
  • References (1 slide)

Assignment Expectations:

Length: 11-16 slides

Structure: Include a title slide, objective slide, content slides, reference slide in APA format.

References: Use appropriate APA style in-text citations and references for all resources utilized to answer the questions.  A minimum of three (3) scholarly sources are required for this assignment.

Rubric: This assignment uses a rubric for scoring. Please review it as part of your assignment preparation and again prior to submission to ensure you have addressed its criteria at the highest level.

Format: Save your assignment as a Microsoft PPT document (.pptx) or a PDF document (.pdf)

File name: Name your saved file according to your first initial, last name, and the assignment number (for example, “RHall Assignment 1.docx”)

Create a teaching PowerPoint presentation that addresses each of the following points/questions. Be sure to completely answer all the questions for each bullet point. Use clear headings that allow your professor to know which bullet you are addressing on the slides in your presentation. Support your content with at least three (3) sources using APA citations throughout your presentation. Make sure to cite the sources using the APA writing style for the presentation. Include a slide for your references at the end. Follow best practices for PowerPoint presentations related to text size, color, images, effects, wordiness, and multimedia enhancements. Review the rubric criteria for this assignment.

This week you are to create a PowerPoint as if you are teaching this information to your colleagues.

  • Guns in the Workplace: prepare for an active shooter (what is the protocol and preparations your workplace has taken – if none have been developed describe what should be taken). What is the responsibility as a nurse caring for patients in an active shooter scenario?
  • Bullying in Nursing: Bullying in the nursing workforce has become an increasing topic of concern. Research this topic and describe reasons why bullying is a problem in nursing. Provide suggestions for a new nurse who is being bullied by coworkers. What is your responsibility if you see a fellow nurse being bullied?
  • Title Slide (1 slide)
  • Objective Slide (1 slide)
  • Preparing for an active shooter (2-3 slides)
  • Responsibility for patients in an active shooter scenario? (1-2 slides).
  • Why bullying is a problem in nursing (2-3 slides)
  • Suggestions for a new nurse being bullied (2-3 slides)
  • Your responsibility (1-2 slides)
  • References (1 slide)

Assignment Expectations:

Length: 11-16 slides

Structure: Include a title slide, objective slide, content slides, reference slide in APA format.

References: Use appropriate APA style in-text citations and references for all resources utilized to answer the questions.  A minimum of three (3) scholarly sources are required for this assignment.

Rubric: This assignment uses a rubric for scoring. Please review it as part of your assignment preparation and again prior to submission to ensure you have addressed its criteria at the highest level.

Format: Save your assignment as a Microsoft PPT document (.pptx) or a PDF document (.pdf)

File name: Name your saved file according to your first initial, last name, and the assignment number (for example, “RHall Assignment 1.docx”)

negative consequences that may occur if the patient’s health issue is not addressed.

Essay I Instructions

Complete Three Separate Essays. Each essay is at least one page

Analyze the case study found on p. 276 in your textbook by addressing the assigned questions below.

While analyzing the case, be sure to identify the major problems and issues.

  • Draft a response or strategy for addressing the major problems and issues.
  • Make recommendations to improve the patient’s health.
  • Discuss any negative consequences that may occur if the patient’s health issue is not addressed.

Your response should be at least one page in length. Include at least one reference to support your work in APA style. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.

Case Study

Let’s revisit Maria’s case. She is a 35-year-old insulin-dependent diabetic who currently takes good care of herself. She did not take good care of herself as a teenager. She is on an insulin pump to try to control her blood sugar, but has recently passed out in public several times.

  1. a.

What condition causes her to pass out? (hyperglycemia or hypoglycemia)

_______________________________________

_______________________________________

  1. b.

Why does this condition develop?

_______________________________________

_______________________________________

  1. c.

What is the appropriate treatment for the early stages of this condition?

_______________________________________

_______________________________________

  1. d.

Given that she has been a diabetic for so long, why doesn’t Maria realize she is in trouble before she passes out?

_______________________________________

_______________________________________

Essay II Instructions

Analyze the case study found on p. 479 of your textbook by addressing the assigned questions below.

While analyzing the case, be sure to identify the major problems and issues.

  • Draft a response or strategy for addressing the major problems and issues.
  • Make recommendations to improve the patient’s health.
  • Discuss any negative consequences that may occur if the patient’s health issue is not addressed.

Your response should be at least one page in length. Include at least one reference to support your work in APA style. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.

Case Study

During a recent trip to the doctor’s office, Maria had a standard urinalysis. The results worry her doctor. In her urine there was a tiny amount of protein. The doctor orders more extensive tests.

  1. a.

Why is Maria’s doctor concerned? It’s only a little protein.

_______________________________________

_______________________________________

  1. b.

What other tests should the doctor order?

_______________________________________

_______________________________________

  1. c.

When the tests come back, the doctor tells Maria she needs to go on an ACE inhibitor, even though her blood pressure is normal. What is the diagnosis?

_______________________________________

Essay III Instructions

Using the Internet, conduct a search of autoimmune disorders. How many disorders can you find? What tissues can be attacked by your immune system? Select one autoimmune disease to summarize. What are the common signs and symptoms exhibited in a patient with this disease?

Your response should be at least one page in length. Include at least one reference to support your work in APA format. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.

Job Functions: Database Administrator vs. HIM Department Manager

Assignment: Job Functions: Database Administrator vs. HIM Department Manager TIP: Please see the Lesson Content and Rubric in the attachment for additional information. Professionals working in the HI

Week 8-Assignment, Rubric, & Lesson Content

Assignment: Job Functions: Database Administrator vs. HIM Department Manager

TIP: Please see the Lesson Content and Rubric in the attachment for additional information.

Professionals working in the HIM field find that some of their job functions relate to or are similar to those of a database administrator. This assignment explores the functions of these two positions. Clearly, the positions are not the same, you will, however, see some crossover of function when the assignment is complete.

The assignment is outlined in three (3) steps below.

Step 1: Create a table like the one below into a Word document and then fill in the information you gather in Step 2.

HIM Technician Database Administrator
Primary Job Functions
Job Outlook (expected growth)
Approximate number of jobs in the field
Educational requirements and qualities to possess for the job

Step 2: Visit the U.S. Bureau of Labor Statistics’ Occupational Outlook Handbook webpage https://www.bls.gov/ooh. Look up the description for the following job titles and enter the information in the Table you created in Step 1:

  • Database Administrator
  • Medical Records/Health Information Technician

Step 3: Finally, compare and contrast the job functions listed for these titles. Using complete paragraphs or another table if you like, identify and highlight differences you see in the job functions and then identify and highlight similarities you note in the job functions.

Your paper should use proper spelling/grammar and be at least two (2) pages long.

APA format with In-Text citation.

Save your assignment as a Microsoft Word document.

Rubric:

Criteria Points
Completed comparison table for jobs. 12
Identified differences of the job functions.
Identified similarities of the job functions.
Presentation, grammar, spelling, flow, format, citations, etc.
Total 30

Lesson Content:

Why Does an Organization Need a Database Administrator?

Large databases are extremely complicated systems. They include interactions of hardware, software, and database structures/schema. Each database has its own unique features and platforms, including the database management system (DBMS).

Database Administrator Tasks

The list below contains some of the common tasks for a database administrator. You’ll see that they are quite varied and potentially time-consuming ones, as well.

  • Maintaining table structures/database schema
  • Using SQL to maintain and create data objects and tables
  • Formulating storage solutions
  • Deciding upon physical storage locations and characteristics
  • Deciding on backup strategies and locations for backups
  • Monitoring performance and speed of the database response
  • Controlling access via establishing User IDs and password system
  • Assuring data security within the context of the database
  • Assuring data integrity (accuracy and completeness)
  • Applying system upgrades

Space and Performance Needs

A database application such as a new EHR may start out with a certain amount of expected data and space needs. Soon though, the system “outgrows” the initial plans. The capacity of the server hardware for storage and structures, along with the configuring of the database software and operating system, have to be adjusted and fine-tuned.

Most database systems have monitoring “tools” that help the database administrator (DBA). They can tell where some bottlenecks are developing and starting to hit the limits of what this particular configuration can handle.

Reliability and Availability of the Database

Every database has maintenance and changes/updates that need to be administered. In a 24/7 environment like healthcare, the downtime for the database will be especially concerning. The database administrator needs to determine what tasks can be performed for maintenance while the database is up and running and which maintenance tasks will require downtime. Perhaps the downtime can be managed to a point where the database is always “on” except for a couple of two-hour windows twice a month. During those times, a backup redundant software and hardware system might be employed so that data can be entered, and then the database fully updated when the maintenance period is over.

A reliable data application can make or break a practice or business. Imagine this scenario: The patient was registered, the vital signs taken and then… the EHR computerized database went down so the patient’s history could not be brought up on screen or allow the vital signs to be documented. Do we make the doctor and patient both wait for the system to get up and running again? Does the nurse or medical assistant write the vital signs on a piece of paper to enter later? Finally, can the physician safely prescribe a new medication if the history of current medications is unavailable? This is what makes having a reliable system so important.

Storage Methods

The database administrator has to make sure the storage method is adequate and reliable. Sometimes a new server is acquired to expand space or to correct reliability concerns. The DBA needs to move the data over from the old server to the new server! They configure the server for the ways that it can accept the new data. Databases may be “indexed” to help requests run efficiently. Just as having an index for a phone book or textbook helps, this index helps the software quickly find what is needed.

Interaction between HIM and Database Administrators

Certainly it is the job of all database administrators to be concerned with keeping all data secure in the technological environment. The DBA or other person in the IT department will need to implement user authentication, such as User IDs and password authentication systems.

The HIM professional, as an expert on HIPAA rules and guidelines, can also help the DBA to consider other areas where information and data security should apply. For example, the HIM manager may ask, if remote backups are kept on the patient care data, where will they be kept? Does a contractor who keeps those remote backups comply with HIPAA guidelines? Would the backup data of our own organization become inter-mingled with that from other organizations, or not?

Data Security Features and Functions

Information and data security have become quite complex functions in the modern networked computer environment. The HIPAA security rule covers PHI in all forms: paper, oral and electronic. In many respects, a computerized system can offer greater security than mere paper. However, when a breach does happen to a computerized system, it is more likely for that access to involve multiple patients or individuals.

The information security officer, along with the database administrator, must work to ensure that data are kept private and used only for allowed purposes. As new technology emerges and is acquired, the security needs and features will change. Looking at the security needs via an information Life Cycle approach can assure that the organization will keep reviewing security measures periodically and appropriately.

Breach Threats and Methods

Breaches can occur from various causes including:

  • Computer Viruses: Malicious software used to infect a system. The virus can wreak havoc with the computer’s normal operations, as well as potentially expose routes for further access from unauthorized individuals or infection by other viruses. Some viruses even turn a computer into a “bot” that is then used by unauthorized individuals to run unauthorized tasks and procedures on the computer’s processors. This is actually “stealing time” of the computer’s processors.
  • Computer Worms: Computer worms are similar to viruses. They self-replicate, spreading across entire networks. Then, the individual computers in the network may be used to conduct unauthorized tasks or simply encounter interference with normal processes and functioning.
  • Ransomware: According to Kaspersky Lab’s (2017) Ransomware & Cyber Blackmail webpage, ransomware is particularly malicious and has the aim of profit to individuals who imposed it. Ransomware will demand payments in order to undo unwanted changes to an organization’s or individual’s computer. It can encrypt the data so that they are not available until the ransom amount is paid. It can also block normal access to a victim’s system. Infected websites and responding to “phishing” emails seeking personal information by masquerading as a legitimate request or site can lead to ransomware. Several very prominent ransomware attacks have been experienced by hospitals.
  • Man-in-the-Middle Attacks: The Open Web Application Security Project (OWASP, 2015) explains that man-in-the-middle attacks occur when a program or machine inserts itself in between the computer being used and a network connection. The connection between the client computer and the network or server is vulnerable to attack. The transfer protocols (TCP/IP) are the weak point. This is particularly true of wireless networks that do not require strong router passwords and security mechanisms such as WPA. Logging onto any non-secured network entails a high risk of encountering man-in-the-middle attacks. Every keystroke could be monitored and logged when using a successful attack. There is even a risk of compromising individual passwords used to access websites, banking sites and credit card accounts via this mode.

Internal Breaches

Organizations attempt to reduce unauthorized access to data by conducting employee background checks, audit logs of system access, and other methods. However, unscrupulous people can fall prey to the lure of “easy money.”

Any employer that maintains Social Security Numbers as well as addresses and other identifying information on individuals needs to maintain alertness against internal breaches, as well as external threats. “Spoofing” of IRS tax returns using the SSN to gain access to tax refunds has become a serious threat in the United States, enabled by those who have access to multiple SSNs. Besides those breaches used to obtain money illegally, the healthcare organization, of course, should also be on lookout for unauthorized access to private medical information.

Preventing Breaches

Technological approaches to preventing breaches include: strong passwords, role-based access privileges, requirements to periodically reset passwords, anti-virus software, automatic logoffs and forced time-outs, firewalls, and encryption of data on laptops and mobile devices. Additionally, a very strong training program for each new employee and refresher courses for all employees on safe and ethical use of computers should be conducted.

Any time that remote access is allowed to the computer network, special precautions and methods are needed to assure that these entry points are secured, as well. A Virtual Private Network (VPN) establishes a secured kind of information “tunnel” by which data can travel through the internet safely to its destination. The healthcare organization may require that only devices that are owned and controlled by the organization, not by an individual, are used to access its network via VPN. Or, it may make additional security software mandatory for use in individually-owned mobile devices.

HIPAA Security Requirements

The Health Insurance Portability and Accountability Act (HIPAA) includes substantial requirements for administrative safeguards of healthcare data and information. Risk analysis is a required task, as is risk management and review of information systems activity.

  • Workforce security steps that are addressable include: authorization and supervision of individuals, workforce clearance procedures (such as background checks), and termination procedures. For example, if an employee is terminated and that position involved access to ePHI, the employee’s access to systems containing ePHI should be immediately terminated, as well.
  • Information access management includes: isolating healthcare clearinghouse functions, access authorization, and access management/establishment and modification. Providing for the appropriate, role-based access to ePHI in our systems is one of the most critical items that the IT department and HIM department can work on and assure, together.
  • Security awareness and training involves: security reminders, protection from malicious software, log-in monitoring, and password management.
    • Security reminders might include popup windows when a user goes to access a website outside the organization as well as general reminders to remain vigilant about email phishing efforts and threats. Protection from malicious software involves the protection from virus and various malware efforts as described earlier.
    • Log-in monitoring means that there should be routine, regular reviews of accesses to the ePHI data, and the system might flag trigger events — such as efforts to access sensitive records — to be followed up on. Password management goes beyond just establishing an initial password for authorized employees. Employees should be required or counseled to create adequate passwords: to not use just a word in the dictionary or a name but to include, for example, both uppercase and lowercase letters, special characters, and numbers. Passwords might be required to be changed periodically, too, such as every 30 days.

Security Incident Procedures

There should be a plan and procedure for following up and appropriately reporting and mitigating loss when any security breach has happened.

  • Contingency plans involve: data backup plans, disaster recovery plans, emergency mode operations plan, testing, and revisions. Every healthcare organization needs to have a disaster recovery plan. It should specify what should happen, identify who is in charge of various functions, and be taught and practiced in the organization. You may have worked on disaster plan elements in other courses. Disaster recovery in the sense of HIPAA means disasters that affect the data and operations of the healthcare organization. It does not mean citizens are flooding into the hospital due to natural or man-made tragedies, although the hospital needs to serve injured individuals from actual disasters, too.
  • Business associate contracts need to be covered by written contract and other arrangements by the healthcare organization in a way that ensures the data will remain private. Business associates do not include physicians, other hospitals, or long-term care institutions to which we simply transfer and refer patients.

Other HIPAA requirements under Administrative Safeguards include facility access controls and device and media controls for actively-used and discarded media.

References

Kaspersky Lab’s (2017). Ransomware & Cyber Blackmail. Retrieved March 29, 2017, from https://usa.kaspersky.com/resource-center/threats/ransomware.

OWASP (2015). Man-in-the-middle attack. Retrieved March 29, 2017, from https://www.owasp.org/index.php/Man-in-the-middle_attack.