Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

NI Notes 4th UE

Download as pdf or txt
Download as pdf or txt
You are on page 1of 43

Administrative applications can help nursing managers

and use information to fulfill its unique data


requirements, including:
-Clinical Needs
-Business/Strategic Needs
-Quality Management Needs
-Resource and Personnel Management Needs
Ønurses who hold an adminstrative position at the nurse
manager level are responisble for:
ü The proper allocation of available resources to provide efficient and
effective nursing care
ü providing input into executive-level decisions and collaborating with
the nurse executives and others in organizational programming and
committe work.
ü implementing the philosophy,goals, and standards of the healthcare
organization.
ü implementing clinical nursing services within their defined areas of
responsibility.
ü Planning,organizing,implementing, and controlling the care of
individuals and aggregates acroos the spectrum of healthcare settings.
This includes, but is not limited to, aspects of quality outcomes, staff
development, care management, and research.
Øthe nurse executive is responsible for:
ü managing organized nursing services and the environment
in which clinical nursing is practiced.
üCollaborating with other healthcare organization executives
to make decisions about healthcare services and
organizational priorities.
üensuring the standards of nursing practice are established
and implemented, and are consistent with standards od
professional organizations and regulatory agencies.
üevaluating care delivery models and of services provided to
individuals and aggregates.
üfostering a climate for practice that enhances
productivity,job satisfaction, and professional development.
Specific Computer Applications for Nursing
Administrators:
Applications for Nurse Managers Applications for Nurse Executives

Patient Classification Systems Forecasting and Planning


Acuity System Financial Planning
Staffing and Scheduling Systems Hospital Expansion
Inventory System Preventive Maintenace
Budgeting and Payroll System Planning System
Shift Summary Reports Systems Quality Assurance
Census Regulatory Reporting
Errors & Incident Reports System Consumer Surveyss
Training and Education System Evidence-Based Nursing
Computer-Based Patient Records Systems Risk Pooling
Unit Activity ReportsPoison Control Costing Nursing Care
Allergy and Drug Reactions Case Mix Management
• Nurse Administrators use
managment information systems
for the purposes of :
• Financial Management
• Process Improvement
• Human Resourcse Management
• Quality Improvement
• Benchmarking
• Business Intelligence
• Spreadsheets, to perform calculations, and display data in charts.
• These skills are useful to any nurse manager for following
monthly budgets or creating a variance report if one is not
provided by the accounting department.
• a nurse manager might want to take data available from different
sources and create a new spreadsheet to determine if
relationships exist between two groups of information.
• Use data to show a need for staffing.
• using spreadsheet is to trend historical data to forecast for
future needs.
• nurse administrators can use knowledge of their facilities,
historical data , graphing techniques, assessment of trends or
seasonal patterns , and formulas to make reasonable
estimates(Finkler,Kovner,& Jones,2007)
• is the application of actions taken to identify,analyze, and
improve existing processes within an organization to meet
requiremnts for quality,customer satisfaction, and financial goals.
• Administrators can use a particular strategy such as total quality
management or a general process improvement framework
called plan-do-check-act(PDCA) (Yoder-Wise,2006)
• An analytical process where tools such as flowcharts, cause-and-
effect charts and other control methods are used to make
changes to targeted processes.
• Project Management Software,is the ability to track the project’s
progress using tools such as a Gantt Chart, which can show start
to end dates and associated costs with tasks.
• is one of the most important parts of the job of a
nurse manager.
• Using Human Resource Management System
(HRMS) is essential to planning and staffing
nursing services appropriately.
• Nursing personnel,staffing, and employment data
can be managed with HRMS, which generally
includes 4 categories:
• Personnel Profile icluding demographic data
• daily work schedule and time-off request
• Payroll data , educational , and skill qualifications
• Licensure information
• Benchmarking is a comparison and
measurement of a healthcare organization's
services against other national healthcare
organizations.
• Benchmarks can be tailored to specific areas
of nursing, such as acute- and long-term-care
hospitals, hospice, and home health facilities.
• Accreditation and certification procedures
have acted as stimulating mechanisms for the
discovery of skills and technology specifically
designed to improve performance.
• Total Quality Management (TQM) and
Continuous Quality Improvement (CQI) are
the most widespread and recent approaches
to implementing and improving healthcare
quality control .
• The alignment and linking of data to
transform them into information for the
purpose of decision making is called
business intelligence (Elliot,2004)
• Business intelligence software is a set of
tools used by companies to retrieve, analyze,
and transform data into useful business
insights.
• Examples of business intelligence tools
include data visualization, data warehousing,
dashboards, and reporting.
III. Employee Scheduling
• Computer scheduling systems can handle
scheduling rules such as master schedules
and shift rotations , repeating patterns to
make the first draft of a schedule quick.
• Scheduling system can often prevent errors
such as scheduling nurses for a double
shifts,for overtime, during overlapping shifts
or during requested time off.
• Often scheduling system are capable of
generating reports to show the number of
productive hours,eduction,vacation, and
family medical leave hours in a period.
• Technology is the key to ensuring that
nursing remains present and able to continue
contributing to healthcare.
• Key emerging technologies
include(Simpson,2003):
Ø Mobile Technology (mHealth)
Ø Picture Archiving and Communication System (PACS)
Ø Single Sign-On (SSO)
Ø Thin-Client Computing
• Saba, Virginia K., McCormick, Kathleen A (2006). Essentials of Nursing
Informatics 4th edition. Virginia: USA. McGraw Hill Company.

• Gabriel, Orestes (2010). Nursing Informatics. Manila:Philippine.


Educational Publishing House.

• Thede,Linda Q.,Sewell,Jeanne P.(2010). Informatics and Nursing


Competencies and Applications 3rd edition.Wolters Kluwer Health :
Macmillan Publishing Solutions.
Informatics
in Nursing Practice
Learning Objectives
, Florence Nightingale spoke about the critical
importance of nursing informatics in patient care.
• It was more than a century that Florence Nightingale’s era that computers
made their appearance on the hospital landscape.
• The
although these systems focuse primarily on processing financial and
administrative information.
• By the , the computer was being used for diverse hospital functions
such as radiology,pharmacy, and laboratories.
• Throughout the , expanded uses of computers evolved as nurses in
keeping with the traditions begun 100 years before by Florence Nightingale
Medical Alert Systems
• Medical alert systems, also known as
personal emergency response systems,
offer a fast and easy way for the elderly,
people with health issues, and those who
live alone, to get help during an
emergency, whether it be a medical issue,
a fall, a fire, or any event that requires an
immediate response.
• Compose : Identity , emergency contact,
and medical content
• Critical, life-saving information when it’s
needed most
ADT System
(Admission,Discharge,Transfer)
• ADT System is a software application used by healthcare facilities to
track patients from the point of arrival at a hospital until departure by
transfer, discharge, or death.
• The admission, discharge, and transfer (ADT) process is a prime (and
one of the most essential) hospital workflows.
• The ADT system is a part of the hospital information system (HIS).
• The admission, discharge, and transfer (ADT) process stores
valuable patient information like the medical record numbers, ages,
names, and contact information for its user’s patients.
• Used in health care, an ADT system is usually the foundation for other
types of health care information systems because it holds valuable
patient information such as a medical record number, age, name, and
contact information.
EMR (ELECTRONIC MEDICAL RECORD)
vs
EHR (ELECTRONIC HEALTH RECORD)

• The EMR or electronic medical record • EHR or electronic health record are digital
refers to everything you’d find in a paper records of health information.
chart, such as medical history, diagnoses, • They contain all the information you’d find in a
paper chart — and a lot more.
medications, immunization dates, allergies.
• EHRs include past medical history, vital signs,
• While EMRs work well within a practice, progress notes, diagnoses, medications,
they’re limited because they don’t easily immunization dates, allergies, lab data and
travel outside the practice. imaging reports.
• In fact, the patient’s medical record might • They can also contain other relevant
even have to be printed out and mailed for information, such as insurance information,
another provider to see it. demographic data, and even data imported
from personal wellness devices.
Telehealth
• Telehealth is the use of digital information and
communication technologies, such as computers and
mobile devices, to access health care services remotely
and manage your health care.
• These may be technologies you use from home or that
your doctor uses to improve or support health care
services.
• Telehealth connects patients to vital health care services
through videoconferencing, remote monitoring, electronic
consults and wireless communications.
• By increasing access to physicians and specialists,
telehealth helps ensure patients receive the right care, at
the right place, at the right time.
• Examples of telehealth includes health education
services, remote monitoring of vital signs, ECG or blood
pressure and remote doctor-patient consultations
(telemedicine).
The Critical Care Information System ( CCIS )
• The Critical Care Information System ( CCIS ) is the most
comprehensive source of province-wide information on access
to critical care, quality of care and outcomes for critically ill
patients.
• Critical care information systems (CCIS) are computer software
systems specialized for supporting the data processing tasks of
clinical staff in intensive care units (ICUs).
• A CIS can benefit both patients and clinicians by: improving
communication between the many health professionals caring
for each patient ,making it easier for patients to have x-rays and
scans when needed and encouraging quality improvement.
• The introduction of a Critical Care Information System (CCIS)
into an intensive care unit (ICU) is purported to reduce the time
health care providers (HCP) spend on documentation and
increase the time available for direct patient care.
Community Health System
• CHS connotes those computerized IT systems specifically
developed and designed for use by community health agencies,
local, and state health departments, community programs, and
services.
• CHS address the broad areas of
– healthcare programs
– agencies
– settings
• CHS are also used to evaluate the impact of noninstitutional nursing
services on patients,families, and community hlth conditions.
• The following are some of the typically used systems in community
health systems:
– categorical system
– screening programs
– client registration systems
– Management Information Systems
– Statistical Reporting Systems
– Special Purpose Systems
Computerized Provider Order Entry (CPOE)
• Computerized provider order entry (CPOE) systems are designed
to replace a hospital's paper-based ordering system.
• They allow users to electronically write the full range of orders,
maintain an online medication administration record, and review
changes made to an order by successive personnel.
• Computerized Provider Order Entry (CPOE) – CPOE entails the
provider's use of computer assistance to directly enter medication
orders from a computer or mobile device.
• The order is also documented or captured in a digital, structured,
and computable format for use in improving safety and
organization.
• Electronic entry of medication orders through CPOE may reduce
errors from poor handwriting or incorrect transcription.
• CPOE systems often include functionalities such as drug dosage
support, alerts about harmful interactions, and clinical decision
support, which may further reduce errors.
Bar Code-Enabled Point-Of-Care Technology
• A definition of the medical term “bar code-enabled
point of care technology,” which refers to a keyless
data entry technique that facilitates automatic
identification and collection of data and allows real-time
confirmation of medical records such as patient identity
and medication taken, is presented.
• Barcode technology in healthcare is the use of optical
machine-readable representation of data in a hospital
or healthcare setting.
• In the early 2000s, published reports began to illustrate
high rates of medical error (adverse events) and the
increasing costs of healthcare.
• The barcode technology makes sure the correct
treatment is administered to the right patient, ultimately
reducing errors and ensuring patient safety.
Automated Dispensing Cabinets (ADCs)
• Automated dispensing cabinets (ADCs) are decentralized
medication distribution systems with technology integration
that enable computerized storage, dispensing, inventory
control, computerized order entry, bar-coded medication
administration, and documentation.
• ADCs incorporate advanced software and electronic
interfaces to synthesize high-risk steps in the medication
use process.
• These unit-based medication repositories provide
computer controlled storage, dispensation, tracking, and
documentation of medication distribution on the resident
care unit.
• Automated dispensing machines provide secure
medication storage on patient care units, along with
electronic tracking of the use of narcotics and other
controlled drugs.
• Reports can be generated to help identify and prevent
potential diversion.
Smart Infusion Pump Delivery System
• "Smart" infusion pumps are medication delivery
devices that use a combination of computer
technology and drug libraries to limit the
potential for dosing errors.
• The evidence for their impact is limited: they
have been shown to prevent some errors but
there are minimal data linking the devices to
reducing harm.
• The FDA has summarized the three major
reasons for infusion pump malfunctions as the
following:
– Software Defects. Some pumps fail to activate pre-
programmed alarms when problems occur, while
others activate an alarm in the absence of a problem
– User Interface Issues
– Mechanical or Electrical Failures
• Saba, Virginia K., McCormick, Kathleen A (2006). Essentials of
Nursing Informatics 4th edition. Virginia: USA. McGraw Hill
Company.

• Gabriel, Orestes (2010). Nursing Informatics. Manila:Philippine.


Educational Publishing House.

• Thede,Linda Q.,Sewell,Jeanne P.(2010). Informatics and


Nursing Competencies and Applications 3rd edition.Wolters
Kluwer Health : Macmillan Publishing Solutions.
• moral principles that govern a person's behavior or
the conducting of an activity.
• the branch of knowledge that deals with moral
principles.
• is a process of systematically examining varying
viewpoints related to moral questions of right and
wrong.
• Ethical Principles:
• Autonomy
• Beneficience
• Non-Maleficience
• Veracity
• Fidelity
• Justice
• is the study of the ethical issues
emerging from advances in
biology and medicine.
• It is also moral discernment as it
relates to medical policy and
practice.
• the protection of information against threats to its integrity,
inadvertent disclosure, or availability determines the
survivability of a system.
• the state of being protected against the unauthorized use of
information, especially electronic data, or the measures taken to
achieve this.
• information security, sometimes shortened to infosec, is the
practice of protecting information by mitigating information
risks. It is part of information risk management.
• ongoing protection of both
information housed on the
systemand the system itself from
threats or disruption.
• Primary goals:
• protection of client confidentiality
• protection of information integrity
• ready avilability of information when
needed
Insider An insider threat occurs when individuals close to an organization who have authorized
threats access to its network intentionally or unintentionally misuse that access to negatively
affect the organization's critical data or systems.
Phishing a type of information security threat that employs social engineering to trick users into
attacks breaking normal security practices and giving up confidential information, including
names, addresses, login credentials, Social Security numbers, credit card information and
other financial information.
Hackers and People, not computers, create computer security threats and malware. Hackers and
Predators predators are programmers who victimize others for their own gain by breaking into
computer systems to steal, change, or destroy information as a form of cyber-terrorism.
These online predators can compromise credit card information, lock you out of your data,
and steal your identity.
Spyware A serious computer security threat, spyware is any program that monitors your online
Threats activities or installs programs without your consent for profit or to capture personal
information.
Viruses, Viruses and worms are malicious software programs (malware) aimed at destroying an
worms organization's systems, data and network.
• Organizations that collect, use or disclose
PHI are responsible for the personal health
information in their custody or care.
• A named individual within the organization
should be responsible for facilitating
organizational compliance with applicable
data protection legislation and
organizational privacy policies.
• To allow patients to make appropriate decisions about their PHI,
it is important that they be made aware of the purposes for which
this information is being collected, used, and disclosed.
•There are many legitimate purposes for collecting personal health
information; indeed, an international standard classification of such
purposes has been developed.

•These purposes include:


• providing clinical care to an individual
• providing emergency care to an individual
• supporting care activities for the individual within the healthcare organization.
• enabling medical billing
• health service management and quality assurance
• education for health care professionals
• public health surveillance and disease control
3. Consent :
• An organisation should be able to demonstrate that it is in
compliance with applicable laws and that the patient can
reasonably be expected to know that information about
them was going to be collected and used for defined
purposes.

4. Limiting collection :
• Organisations should limit collection of personal health
information to that which is necessary for the identified
purposes; i.e. personal health information should not be
collected indiscriminately
• Historically, many fields of data (e.g., religion and race) were
collected in patient records, even in cases where they had
little or no bearing on treatment and care.
5. Limiting use , disclosure and retention :
• Once organisations identify the purposes for
which they collect personal and seek consent .

6. Accuracy :
• The need for accuracy as a fair information
practice is particularly relevant in the delivery
of healthcare.

7. Safeguards :
• B y i m p l e m e n t i n g i n fo r m a t i o n s e c u r i t y
safeguards, organisations protect personal
health information against loss and theft, as
well as unauthorized access, disclosure,
copying, use, and modification.
8. Openness :
• It should be possible for concerned patients to know the
purposes for which information about them is collected,
used, and disclosed.

9. Individual access :
• Patients should have the right to access their own
personal health information so that they can assure its
a c c u ra c y, a n d a m e n d i n a c c u ra t e o r i n c o m p l e t e
information .

10. Challenging compliance :


• The right of a patient to lodge a privacy complaint against
an organization was first articulated when the Fair
Information Practices were promulgated more than 40
years ago.
• Hebda, T. & Czar, P. (2013). Handbook of informatics for nurses and health
care professionals (5th ed.). Upper Saddle River, New Jersey: Pearson.

• Saba, Virginia K., McCormick, Kathleen A (2006). Essentials of Nursing


Informatics 4th edition. Virginia: USA. McGraw Hill Company.

• Gabriel, Orestes (2010). Nursing Informatics. Manila:Philippine. Educational


Publishing House.

• Thede,Linda Q.,Sewell,Jeanne P.(2010). Informatics and Nursing Competencies


and Applications 3rd edition.Wolters Kluwer Health : Macmillan Publishing
Solutions.

You might also like