Program Details
Health Informatics, BS
Bachelor of ScienceGeorge Mason University
The BS in Health Informatics degree program prepares students in the field of health informatics, which integrates health sciences, information technology, computer science, data science, and behavioral sciences. The program combines interdisciplinary knowledge from these areas with practical, specialized skills in health informatics to improve patient care, and individual and population health.
Program Overview & Guidance

Program Guidance Element | What You Need to Know |
---|---|
Considerations for Selecting Degree | |
Program Requirement Notes | Program Requirement Notes https://catalog.gmu.edu/colleges-schools/public-health/health-administration-policy/health-informatics-bs/#requirementstext |
Considerations When Selecting Courses |
|
Program Requirements Beyond Specific Courses | |
Doing More With Your Degree | |
Program Successes & Highlights |
Program Credit Requirements

If you wish to see how your credits may apply, you can:
- Contact the institution where a staff member can help you map your credits to the requirements for this program.
- View the program requirements listed in the institution's catalog.
Applicable Admissions Agreements

The table below lists admissions agreements between George Mason University and partner institutions that may guarantee admission to this program if you meet the required criteria. Click on the title name of the agreement to view a summary of those criteria.
You can view the full text of these Agreements in the Resource Center
What If I Have An Associate Degree Or Credit For Prior Learning?

Transfer Guidance Element | What You Need to Know |
---|---|
Associate Transfer Degree Completion | Transfer associate degree completion is recommended. RBC and VCCS students completing A.A., A.A.& S., A.F.A, or A.S. degrees receive a lower-level Mason Core waiver. |
Completion of Associate Degree Concurrent with High School | Students who earn an associate degree through high school dual enrollment should still apply as freshmen and are not eligible for GAA. College coursework will be evaluated for transferable course credit. |
Credit for Prior Learning | https://www2.gmu.edu/admissions-aid/apply-now/how-apply/transfer/transfer-credit-policy |
Did You Know That... |
|
College Level Information

College Fit Guidance | What You Need to Know |
---|---|
Is This College Right For Me? | George Mason University welcomes 4,500 new transfers each year.
|
Transfer Student Catalog Year | Determined by first semester of enrollment |
First Year Student Catalog Year | Determined by first semester of enrollment |
Applying for Guaranteed Admissions | https://go.gmu.edu/GAA |
Where Can This Degree Transfer

Institution | Title | Degree | Award Name | Award Level | Delivery Mode |
---|
Careers Where This Degree Applies

O*Net Code | Name | Description | Parent |
---|---|---|---|
15-1299.07 | Blockchain Engineers | Maintain and support distributed and decentralized blockchain-based networks or block-chain applications such as cryptocurrency exchange, payment processing, document sharing, and digital voting. Design and deploy secure block-chain design patterns and solutions over geographically distributed networks using advanced technologies. May assist with infrastructure setup and testing for application transparency and security. | Computer and Mathematical Occupations |
15-1299.00 | Computer Occupations, All Other | All computer occupations not listed separately. | Computer and Mathematical Occupations |
15-1299.08 | Computer Systems Engineers/Architects | Design and develop solutions to complex applications problems, system administration issues, or network concerns. Perform systems management and integration functions. | Computer and Mathematical Occupations |
15-1221.00 | Computer and Information Research Scientists | Conduct research into fundamental computer and information science as theorists, designers, or inventors. Develop solutions to problems in the field of computer hardware and software. | Computer and Mathematical Occupations |
15-1299.06 | Digital Forensics Analysts | Conduct investigations on computer-based crimes establishing documentary or physical evidence, such as digital media and logs associated with cyber intrusion incidents. Analyze digital evidence and investigate computer security incidents to derive information in support of system and network vulnerability mitigation. Preserve and present computer-related evidence in support of criminal, fraud, counterintelligence, or law enforcement investigations. | Computer and Mathematical Occupations |
15-1299.03 | Document Management Specialists | Implement and administer enterprise-wide document management systems and related procedures that allow organizations to capture, store, retrieve, share, and destroy electronic records and documents. | Computer and Mathematical Occupations |
15-1299.02 | Geographic Information Systems Technologists and Technicians | Assist scientists or related professionals in building, maintaining, modifying, or using geographic information systems (GIS) databases. May also perform some custom application development or provide user support. | Computer and Mathematical Occupations |
29-9021.00 | Health Information Technologists and Medical Registrars | Apply knowledge of healthcare and information systems to assist in the design, development, and continued modification and analysis of computerized healthcare systems. Abstract, collect, and analyze treatment and followup information of patients. May educate staff and assist in problem solving to promote the implementation of the healthcare information system. May design, develop, test, and implement databases with complete history, diagnosis, treatment, and health status to help monitor diseases. | Healthcare Practitioners and Technical Occupations |
15-1299.05 | Information Security Engineers | Develop and oversee the implementation of information security procedures and policies. Build, maintain and upgrade security technology, such as firewalls, for the safe use of computer networks and the transmission and retrieval of information. Design and implement appropriate security controls to identify vulnerabilities and protect digital files and electronic infrastructures. Monitor and respond to computer security breaches, viruses, and intrusions, and perform forensic investigation. May oversee the assessment of information security systems. | Computer and Mathematical Occupations |
15-1299.09 | Information Technology Project Managers | Plan, initiate, and manage information technology (IT) projects. Lead and guide the work of technical staff. Serve as liaison between business and technical aspects of projects. Plan project stages and assess business implications for each stage. Monitor progress to assure deadlines, standards, and cost targets are met. | Computer and Mathematical Occupations |
15-1299.04 | Penetration Testers | Evaluate network system security by conducting simulated internal and external cyberattacks using adversary tools and techniques. Attempt to breach and exploit critical systems and gain access to sensitive information to assess system security. | Computer and Mathematical Occupations |
25-1199.00 | Postsecondary Teachers, All Other | All postsecondary teachers not listed separately. | Educational Instruction and Library Occupations |
15-1299.01 | Web Administrators | Manage web environment design, deployment, development and maintenance activities. Perform testing and quality assurance of web sites and web applications. | Computer and Mathematical Occupations |
Cost To Complete
