| D007256 |
Information Systems |
Integrated set of files, procedures, and equipment for the storage, manipulation, and retrieval of information. |
Ancillary Information Systems,Emergency Care Information Systems,Information Retrieval Systems,Perinatal Information System,Ancillary Information System,Information Retrieval System,Information System,Information System, Ancillary,Information System, Perinatal,Perinatal Information Systems,Systems, Information Retrieval |
|
| D007260 |
Infusion Pumps |
Fluid propulsion systems driven mechanically, electrically, or osmotically that are used to inject (or infuse) over time agents into a patient or experimental animal; used routinely in hospitals to maintain a patent intravenous line, to administer antineoplastic agents and other drugs in thromboembolism, heart disease, diabetes mellitus (INSULIN INFUSION SYSTEMS is also available), and other disorders. |
Drug Infusion Systems,Infusion Pump,Infusion Pumps, External,Infusors,Intravenous Drug Delivery System,Intravenous Drug Delivery Systems,Perfusion Pumps,Pumps, Infusion,Drug Infusion System,External Infusion Pump,External Infusion Pumps,Infusion Pump, External,Infusion System, Drug,Infusion Systems, Drug,Infusor,Perfusion Pump,Pump, External Infusion,Pump, Infusion,Pump, Perfusion,Pumps, External Infusion,Pumps, Perfusion,System, Drug Infusion,Systems, Drug Infusion |
|
| D008508 |
Medication Errors |
Errors in prescribing, dispensing, or administering medication with the result that the patient fails to receive the correct drug or the indicated proper drug dosage. |
Drug Use Error,Errors, Medication,High-Alert Drug Error,High-Alert Medication Error,LASA Medication Errors,Look-Alike Drug Name Errors,Look-Alike Sound-Alike Drug Errors,Look-Alike Sound-Alike Drug Substitution Errors,Look-Alike Sound-Alike Medication Errors,Lookalike Drug Name Errors,Lookalike Soundalike Drug Errors,Lookalike Soundalike Drug Substitution Errors,Lookalike Soundalike Medication Errors,Drug Error, High-Alert,Drug Use Errors,Error, Drug Use,Error, LASA Medication,Error, Medication,High Alert Drug Error,High Alert Medication Error,High-Alert Drug Errors,High-Alert Medication Errors,LASA Medication Error,Look Alike Drug Name Errors,Look Alike Sound Alike Drug Errors,Look Alike Sound Alike Drug Substitution Errors,Look Alike Sound Alike Medication Errors,Medication Error,Medication Error, High-Alert,Medication Error, LASA,Medication Errors, High-Alert,Medication Errors, LASA |
|
| D010355 |
Patient Identification Systems |
Organized procedures for establishing patient identity, including use of bracelets, etc. |
Patient Tracking,Identification System, Patient,Identification Systems, Patient,Patient Identification System,Patient Trackings,System, Patient Identification,Systems, Patient Identification,Tracking, Patient,Trackings, Patient |
|
| D004867 |
Equipment Design |
Methods and patterns of fabricating machines and related hardware. |
Design, Equipment,Device Design,Medical Device Design,Design, Medical Device,Designs, Medical Device,Device Design, Medical,Device Designs, Medical,Medical Device Designs,Design, Device,Designs, Device,Designs, Equipment,Device Designs,Equipment Designs |
|
| D006801 |
Humans |
Members of the species Homo sapiens. |
Homo sapiens,Man (Taxonomy),Human,Man, Modern,Modern Man |
|
| D001330 |
Electronic Data Processing |
Applications that store and process large quantities of data. |
Automatic Data Processing,Bar Codes,Computer Data Processing,Data Processing, Automatic,Information Processing, Automatic,Optical Readers,Information Processing,Automatic Information Processing,Bar Code,Codes, Bar,Data Processing, Computer,Data Processing, Electronic,Optical Reader,Processing, Automatic Data,Processing, Automatic Information,Processing, Computer Data,Processing, Electronic Data,Processing, Information |
|
| D016494 |
Computer Security |
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data. |
Computer Viruses,Data Protection,Data Security,Compromising of Data,Computer Hackers,Computer Worms,Cyber Security,Cybersecurity,Data Encryption,Information Protection,Computer Hacker,Computer Virus,Computer Worm,Data Compromising,Data Encryptions,Encryption, Data,Encryptions, Data,Hacker, Computer,Hackers, Computer,Protection, Data,Protection, Information,Security, Computer,Security, Cyber,Security, Data,Virus, Computer,Viruses, Computer,Worm, Computer,Worms, Computer |
|
| D057188 |
Workflow |
Description of pattern of recurrent functions or procedures frequently found in organizational processes, such as notification, decision, and action. |
Work Flow,Work Flows,Workflows |
|
| D057766 |
Policy |
A course or method of action selected to guide and determine present and future decisions. |
Policies |
|