0% found this document useful (0 votes)
71 views16 pages

Nursing Informatics

The document discusses electronic medical records (EMRs) and electronic health records (EHRs), including their definitions, differences, and benefits. EMRs contain a patient's medical history from one practice, while EHRs contain a patient's comprehensive medical history across multiple healthcare providers. Ensuring security, privacy, and appropriate access to patient health information in EMRs and EHRs is also discussed.

Uploaded by

Kimberly Derige
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views16 pages

Nursing Informatics

The document discusses electronic medical records (EMRs) and electronic health records (EHRs), including their definitions, differences, and benefits. EMRs contain a patient's medical history from one practice, while EHRs contain a patient's comprehensive medical history across multiple healthcare providers. Ensuring security, privacy, and appropriate access to patient health information in EMRs and EHRs is also discussed.

Uploaded by

Kimberly Derige
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

ELECTRONIC MEDICAL RECORD (EMR)

 Both EMRs and EHRs help make healthcare


 Is a digital version of a paper chart that more efficient and less costly.
contains all of a patient's medical history from
 But to go beyond basic clinical data and
one practice.
focus on the total health of each patient,
EMR vs EHR you need an EHR solution.

 The terms electronic medical record (EMR) BENEFITS OF EMR


and electronic health record (EHR) are often
 EMR maintains patient privacy
used INTERCHANGEABLY.
 Fewer forms to fill out during a visit.
 However, an EMR and an EHR serve much
 Fewer repetitive questions- regarding past
different purposes, despite sharing certain
medical history.
characteristics.
 Reduces cost of healthcare.
 Both an EMR and EHR are DIGITAL
RECORDS of patient health information. RISKS OF EMR
 An EMR is best understood as a digital
1) Security
version of a patient's chart.
 It contains the patient's medical and  Risk of inappropriate access
treatment history from one practice.  Unauthorized user access
 Usually, this digital record stays in the  Data breaches
doctor's office and does not get shared.  Risk of record loss due to natural
 If a patient switches doctors, his or her disasters
EMR is unlikely to follow.  Risk of record tampering Back dating
Fraudulent entries, or other modifications.
ELECTRONIC HEALTH RECORD (EHR)
 contains the patient's records from multiple 2) Usability
doctors and provides a more holistic, long-  Multiple screens and mouse clicks
term view of a patient's health.  Alert fatigue (alarm fatigue) - is when an
 It includes their demographics, test results, overwhelming number of alerts
medical history, history of present illness desensitizes the people tasked with
(HPI), and medications. responding to them, leading to missed or
 Goes wherever the patient goes and gets ignored alerts or delayed responses.
shared by healthcare providers. As an all-  STANDARDIZATION can lead to
inclusive patient record, it can powerfully mindless repetition of entries rather than
help improve patient care and health thoughtful documentation.
outcomes.  Lack of uniform communication
 Gives clinicians access to a wider range of standards for systems
patient data compared to an EMR. Such
access facilitates better-informed decision 3) Logistics and Cost
making and care planning.  System inefficiency
 Meets meaningful use standards for  Obsolete Technology
incentive programs administered by the  Huge Financial cost
Centers for Medicare & Medicaid Services
(CMS). This compliance is an important
reason why the healthcare industry is
increasingly using EHR systems.
KEY AREAS IN ENSURING INFORMATION
SECURITY AND PRIVACY OF PATIENT
HIPAA Health Insurance Portability and
HEALTH INFORMATION AND RECORD
Accountability Act (HIPAA)
The core of implementing controls in
 Under this act there is a limit as to how
Electronic Medical Records center on ensuring the
much information can be disclosed, and as
security and privacy of patients’ health information
well as who can see a patient’s information.
and records under the following key categories:
 Patients also get to have a copy of their
1. Confidentiality: Patients should have the records if they desire, and get notified if
right to decide who can examine and alter their information is ever to be shared with
what part of their medical records third parties
 Covered entities may disclose protected
2. Integrity: Complete and accurate records
health information to law enforcement
3. Availability: Ensuring patients' access to officials for law enforcement purposes as
their complete medical information while required by law (including court orders,
protecting their privacy court-ordered warrants, subpoenas) and
administrative requests; or to identify or
PHYSICAL SAFEGUARDS locate a suspect, fugitive, material witness,
 measures to protect the hardware and the or missing person
facilities that store PHI Includes:  Medical and health care providers
 Facility access control experienced 767 security breaches resulting
 Workstation: use Workstation security in the compromised confidential health
Device and media controls information of 23,625,933 patients during
the period of 2006–2012
ADMINISTRATIVE SAFEGUARDS  RA 10173, or the Data Privacy Act, protects
 Policies and procedures to protect the individuals from unauthorized processing of
security, privacy, and confidentiality personal information that is (1) private, not
patients’ PHI (Personal Health Information) publicly available; and (2) identifiable,
 Required by both the HIPAA Privacy Rule where the identity of the individual is
and the HIPAA Security Rule apparent either through direct attribution or
when put together with other available
HIPAA Health Insurance Portability and information.
Accountability Act (HIPAA)
 Passed in the US in 1996 Establishes rules
for access, authentications, storage and
auditing, and transmittal of electronic
medical records
 Restrictions for electronic records more
stringent than those for paper records.
PHI protected information under this act are:
 Information doctors and nurses’ input into
the electronic medical record
 Conversations between a doctor and a
patient that may have been recorded
 Billing information
DATA PRIVACY ACT OF 2102 the right to access; the right to object; the
RA 10173 right to erasure and blocking; the right to
rectify; the right to file a complaint; the
DPA COUNTER PART right to damages; and the right to data
 General Data Protection Regulation portability.
(GDPR) (2016) is an EU legislation that
aims to give the residents of the EU more PROCESSING
control over their data. Under this  Any operation of any set of operations
regulation, organizations that handle data of performed upon personal data including, but
EU residents will have to comply with data not limited to, the collection, recording,
and privacy rules. organization, storage, updating or
 HIPAA (Health Insurance Portability and modification, retrieval, consultation, use,
Accountability Act of 1996) is United States consolidation, blocking, erasure or
legislation that provides data privacy and destruction of data.
security provisions for safeguarding medical
information. PERSONAL INFORMATION CONTROLLER
Examples of Breaches: (PIC)
1. COMELeak  Refers to a natural or juridical person, or any
2. Log-in procedure other body who controls the processing of
3. List of top students/passers personal data, or instructs another to process
4. Unsecured storage of patient records personal data on its behalf.
5. Online Lending
6. Raffle OBLIGATIONS OF A PERSONAL
Impact of a Problematic Data Action on Business INFORMATION CONTROLLER
 Loss of reputation  The PIC should collect personal information
 Loss of market share for specified and legitimate purposes
 Legal liabilities determined and declared before, or as soon
as reasonably practicable after collection.
NATIONAL PRIVACY COMMISSION  The PIC should process personal
 The National Privacy Commission, or NPC, information fairly and lawfully, and in
is an independent body created under accordance with the rights of a data subject.
Republic Act No. 10173 or the Data Privacy  The PIC should process accurate, relevant
Act of 2012, and up to date personal information.
 Mandate to administer and implement the  The PIC should collect and process personal
provisions of the Act, and to monitor and information adequately and not excessively.
ensure compliance of the country with  The PIC should retain personal information
international standards set for data only for as long as necessary for the
protection. fulfillment of the purposes for which the
data was obtained. The information should
DATA SUBJECT be kept in a form which permits
 An individual whose personal information, identification of data subjects for no longer
sensitive personal information, or privileged than is necessary.
information is being processed.  The PIC must implement reasonable and
appropriate organizational, physical and
UNDER CHAPTER IV OF THE DATA technical measures intended for the
PRIVACY ACT protection of personal information.
 There are eight (8) rights that belong to data
subjects, namely: the right to be informed;
 Refers to a breach of security leading to the
PERSONAL INFORMATION PROCESSOR accidental or unlawful destruction, loss,
(PIP) alteration, unauthorized disclosure of, or
 Refers to any natural or juridical person or access to, personal data transmitted, stored,
any other body to whom a personal or otherwise processed.
information controller may outsource or
instruct the processing of personal data TYPES OF DATA BREACHES
pertaining to a data subject. 1. An availability breach resulting from loss,
 Personal information processor should not accidental or unlawful destruction of
make use of personal data for its own personal data;
purpose. 2. An integrity breach resulting from
alteration of personal data; and/or
THE DATA PROTECTION OFFICER 3. A confidentiality breach resulting from the
 Personal information controllers (PIC) and unauthorized disclosure of or access to
personal information processors (PIP) are personal data.
required to appoint or designate a data
protection officer (DPO). The DPOs will be THE COMMISSION
accountable for ensuring compliance by the 1. Raymund Enriquez Liboro - Privacy
PIC or PIP with the Data Privacy Act, its Commissioner and Chairman
IRR, related issuances of the National 2. Atty. John Henry Du Naga - Deputy
Privacy Commission, and other applicable Privacy Commissioner
laws and regulations relating to data privacy 3. Atty. Leandro Angelo Y. Aguirre - Deputy
and security. Privacy Commissioner

CLASSIFICATION OF PERSONAL DATA DATA PRIVACY ACT OF 2012


 An act protecting individual personal
PERSONAL INFORMATION information in information and
 Any information from which the identity of communications systems in the government
an individual is apparent. and the private sector, creating for this
 Any information that can be put together purpose a National Privacy Commission,
with other information to reasonably and and for other purposes.
directly identify an individual.  The law upholds the right to privacy by
protecting individual personal information.
SENSITIVE PERSONAL INFORMATION  The National Privacy Commission protects
 Individual’s race, ethnic origin, marital individual personal information by
status, age, color and religious, regulating the processing of personal
philosophical, political affiliations. information.
 Individual’s health, education, genetic or
sexual life, or to any proceeding for any FUNCTIONS
offense committed or alleged to have been  Rule making
committed by the individual.  Advisory
 Government-issued personal numbers such  Public education
as SSS, GSIS, PhilHealth, Pag-IBIG, LTO  Compliance & monitoring
and previous or current health records, and  Complaints & investigation
tax returns.  Enforcement

DATA BREACH
THE DATA LIFE CYCLE  Jail Term: 3y to 6y
 Fine: 1m to 5m

DATA PRIVACY PRINCIPLES


1. Transparency
2. Legitimate Purpose
3. Proportionality

TRANSPARENCY
 A data subject must be aware of the nature,
purpose and extent of the processing of his
or her personal data, including the risks and
PENALTIES safeguards involved, the identity of personal
1. Access due to negligence information controller, his or her rights as a
 Jail Term: 1y to 3y – 3y to 6y data subject, and how these can be
 Fine: 500k to 4m exercised. Any information and
communication relating to the processing of
2. Unauthorized processing personal data should be easy to access and
 Jail Term: 1y to 3y – 3y to 6y understand, using clear personal data should
 Fine: 500k to 4m be easy to access and understand, using clear
and plain language.
3. Unauthorized purposes
 Jail Term: 18m to 5y – 2y to 7y How transparency is demonstrated?
 Fine: 500k to 2m  Privacy notice
 Privacy policy
4. Improper disposal  Consent
 Jail Term: 6m to 2y – 3y to 6y  The data subject agrees to the
 Fine: 100k to 1m collection and processing of personal
information.
5. Intentional breach  Freely given
 Jail Term: 1y to 3y  Specific
 Fine: 500k to 2m  Informed indication of will
 Evidenced by written, electronic or
6. Concealing breach recorded means:
 Signature
 Jail Term: 18m to 5y
 Opt-in box/clicking an icon
 Fine: 500k to 1m
 Sending a confirmation email
 Oral confirmation
7. Malicious disclosure
 Opt-in; silence, pre-ticked boxes or
 Jail Term: 18m to 5y
inactivity does not constitute consent.
 Fine: 500k to 1m

8. Unauthorized disclosure
 Jail Term: 1y to 3y – 3y to 5y
 Fine: 500k to 2m

9. Combining of acts
not excessive in relation to a declared and
specified purpose. Personal data shall be
processed only if the purpose of the
processing could not reasonably be fulfilled
by other means.

Do you always need consent? FIVE PILLARS OF COMPLIANCE


 No. consent is just one criterion for lawful
processing of both personal and sensitive Commit to Comply
personal information.  Appoint a Data Protection Officer (DPO).
 Consent will not always be the most Know your Risks
appropriate basis for processing personal  Conduct a Privacy Impact Assessment
data. (PIA).
 PICs should choose the lawful basis that Be accountable
most closely reflects the true nature of the  Create your Privacy Management Program
relationship with the individual and the and Privacy Manual.
purpose of the processing. Demonstrate your compliance
 Implement your privacy and data protection
Lawful Processing (PDP) measures.
1. Consent Be prepared for breach
2. Law and regulation  Regularly exercise your Breach Reporting
3. Protect life Procedures (BRP).
4. Court proceedings, legal claims
5. Medical treatment DATA PRIVACY ACT
6. Contract  Data Privacy Principles
7. Legal obligation  Security Measures
8. Public order and public safety  Uphold Rights of Data Subject
9. Legitimate interest
The Data Privacy Golden Rule
Processing Which May Not Need Consent “If you can’t protect it… Don’t collect it.”
 Securities and Exchange Commission
 Insurance Commission
 Bureau of Internal Revenue
 Anti-Money Laundering Council
 Credit Information Corporation

LEGITIMATE PURPOSE
 The processing of information shall be
compatible with a declared and specified
purpose, which must not be contrary to law,
morals, or public policy.

PROPORTIONALITY
 The processing of information shall be
adequate, relevant, suitable, necessary, and
INNOVATIONS IN NURSING EDUCATION  In the past, these have included the use of
mainframe computers, floppy diskettes,
INTRODUCTION multimedia CD-ROMs (compact discs –
 The only constant feature in the world is read only memory), and interactive
change. While all the change may not lead to videodisks.
progress, there can be no progress without  The introduction of computers was the
change. basis of this revolution and with the
 Civilization owes its existence to change. passage of time,
 The success or even survival of an  But with the increasing use of smart-
institution or organization depends on phones, tablets, etc., these devices now
making necessary changes. have an importance place in the
classrooms for learning.
PRIMARY GOALS OF NURSING  Most recently, Web technology (both
EDUCATION internet and intranet delivery) are being
 Nurses must be prepared to meet diverse used.
patient’s needs; function as leaders; and  Future trends are looking at training
advance science that benefits patients and delivered on smart cell phones.
the capacity of health professionals to  This new, form of education is called, m-
deliver safe, quality patient care. learning or mobile learning.
 Knowledge can also be shared via the
APPLICATION OF HEALTH INFORMATICS internet which is accessible 24x7x365
IN NURSING EDUCATION anywhere, anytime.

1. E-Learning Meaning of E-Learning


2. Teleconfencering  A learning system based on formalized
3. Webinar teaching but with the help of electronic
resources is known as E-learning.
E-Learning  E-learning is the learning facilitated and
 In the current era, where technology is supported by Information Communication
rapidly evolving, education has also taken Technologies (ICT) to enable people to learn
the support of ICT and now offers anytime and anywhere.
convenient ways to help increase the  E-learning can also be termed as a network-
knowledge, education and literacy status enabled transfer of skills and knowledge
of people. through which the delivery of education is
 Earlier, e-learning was not accepted made to a large number of recipients at the
wholeheartedly as it was assumed that same or different times.
this system lacked the humane element
required in learning. Importance of E-Learning
 However, with the rapid progress in  The presence of an instructor is not required
technology and the advancement in and learners can decide their own time and
learning systems, it is now embraced by venue for learning.
the masses.  This provides a great amount of
 Books are gradually getting replaced by flexibility for the learner, allowing
electronic educational materials like learning to fit within their busy
optical discs or pen drives. lives.
 The learning can be imparted by a  In the physical absence of an
number of means. instructor, it is important for e-
learning to be impactful yet those resources; and support such activities
engaging. while they take place.
 This is achieved by infusing e-
learning courses with attractive  Principle 1 - Match to the
visuals, audio and other Curriculum: the pedagogy (method
multimedia elements including of teaching) should be matched with
simulations and animations. and aligned to the appropriate
 The use of such innovative techniques to curriculum through clear objectives;
garner learner interest creates an inedible the relevance of content covered; the
impression in the minds of the learners and appropriateness of student activities;
helps them retain more as well as apply and the nature of the assessment.
more.
 E-learning courses provide an enabling  Principle 2 – Inclusions: The
platform by virtue of which the pedagogy should support inclusive
professionals can upgrade their knowledge practice seen in terms of different
without going for regular courses. types and range of achievement;
 E-learning platform provides an opportunity physical disabilities that can be
to quickly make technical concepts and particularly supported by e-learning;
communicate to a much wider audience at a different social and ethnic groups;
faster pace. and gender.
 Since the modules are standardized and not
dependent upon the delivery of the trainers,  Principle 3 – Leaner Engagement:
they have consistency in the content. 13 The pedagogy should engage and
 The e-learning courseware uses a mixed motivate learners. This engagement
learning approach and hence could lead to should be evident in an spirit of
better retention of concepts. being both educational and
 Easy tools embedded in the e-learning motivating.
courses help the individuals to learn and
move at their own pace and take a formal  Principle 4 – Innovative
assessment after each lesson. So it provides Approaches: It should be evident
immediate results and feedback, in case an why learning technologies are being
individual is not able to score properly in a used, rather than a non-technologies
particular unit they are requested to re-read approach which achieves the same
the chapter and go through assessment end as effectively. E-learning should
again. On passing this test which is based be fit for purpose.
on the technical knowledge and application
of skills the individuals can deepen their  Principle 5 – Effective Learning:
understanding related to the project. This principle can be demonstrated
in a variety of ways, for example, by
Principles of E-Learning using a range of different approaches
 According to Professors John Anderson and in the learning platform that will
Robert McCormick, the Ten Principles may allow the student choose one that
help designers to construct educationally suits him/her, or that can be
sound e-learning materials and related personalized to him/her, or by
activities. The principles may also help satisfying a number of characteristics
teachers to choose resources; design of good learning.
teaching and learning activities based on
 Principle 6 – Formative Assessment:
The pedagogy should provide
formative assessments.

 Principle 7 – Summative
Assessment: The summative
assessments must be valid and
reliable; comprehensible by teachers,
learners and parents; able to deal
with a range of achievement levels;
and free from adverse emotional
impact on the learner.

 Principle 8 – Coherence,
Consistency and Transparency: The
pedagogy must be internally
coherent and consistent in the way
the objectives, content, student
activity and assessment match to
each other. It must be open and
accessible in its design.

 Principle 9 – Ease of Use: E-


learning should be transparent in its
ease of use.

 Principle 10 – Cost Effectiveness:


Technology solutions need to be
justifiable and affordable and the
cost is sustainable.
NURSING INFORMATICS minimum of 12 semester hours of
credit in informatics courses that are
NURSING INFORMATICS AND
part of a graduate-level nursing
THE NURSE ENTREPRENEUR
informatics program
 Have completed a graduate program in
Nurse Informaticist/Informatics Nurse Specialist
nursing informatics that includes a
 a qualified nurse, with nursing experience
minimum of 200 hours of supervised
together with advanced knowledge of
practicum
technology and information systems
 Certification is by exam, and the credential
 the specialty of Nurse Informaticist was
is valid for five years.
recognized by the American Nurses
Association as early as 1992, which was also
ROLES/COMPETENCIES
the year in which certification was
introduced.
Nurse Informaticist Responsibilities &
Duties
Nurse Informatics
 Assessing and analyzing health care
 has experience in informatics but without
technology needs
graduate education in the subject
 Designing systems technology
QUALIFICATIONS OF A NURSE  Testing systems technology
INFORMATICS/INFORMATICIST  Implementing the technology which also
includes:
 Bachelor’s Degree in Nursing  Staff training
 Registered or Licensed Nurse  Troubleshooting escalating issues as
needed
 Master’s Program in Nursing
 Assisting in the transition from one
 Doctoral Degree Program
system's technology to another
 Evaluating the success of
EXAMINATION, LICENSURE, AND
implementation; revising as needed
CERTIFICATION
 Implementing the technology which also
 Certification is provided by the American
includes (cont’d):
Nurses Credentialing Centre (ANCC)
 Serving as project managers
 Eligibility for certification include:
 Assisting in ensuring organizations meet
 Hold a bachelor's degree or higher
federal health care laws such as HIPAA
 Have practiced as a registered nurse
 Serving as a resource to staff
full time for two years (or part time
 Serving as a liaison between staff and
equivalent)
information technology experts
 Have completed 30 hours of
 Assessing user requirements and
continuing education in nursing
developing solutions
informatics within three years before
 Serving as an educator to staff and new
certification
nurses
 Have met one of the following practice hour  Developing organizational policies and
requirements: standards
 Have practiced a minimum of 2,000  Researching different informatics topics
hours in informatics nursing within the that affect health care providers as well
prior three years as patients
 Have practiced a minimum of 1,000
hours in informatics nursing in the last
three years and have completed a
NURSING INFORMATICS ROLES What They Do?
Help lead the nursing informatics team, and
Nursing Informatics Coordinators may also:
 Nursing Information Coordinators often  Create procedures to handle data
serve as the bridge between the IT management, generate data reports and
department and the clinical team to create evaluate data.
understanding of EHR systems.  Ensure compliance with industry
regulations and standards.
What They Do?  Make recommendations for
 Provide support, training and immediate improvement.
feedback on implementation and what
barriers users may face. They make sure Job Qualifications
the IT and clinical teams are aligned on  2-5 years of clinical information
projects and processes. experience
 Advanced degree (varies with
Job Qualifications organization)
 Bachelor’s or master’s degree (varies  Experience in both nursing and
with organization) computer sciences
 Clinical and leadership experience  Healthcare compliance knowledge
 Registered nurse  Leadership skills

Nursing Informatics Specialist


 Nursing Informatics Specialists help make Nursing Informatics Directors
sure health IT functions in a clinical setting  Nursing Informatics Directors lead the
clinical informatics team that implements
What They Do? healthcare technology within an
 Work behind the scenes combining their organization.
clinical expertise and information
management skills to provide data. The What They Do?
help implement best practices to  Advocate for nursing priorities in
improve patient care and may technology projects
participate in process improvement and
 Evaluate effectiveness of programs
provide support for end-users
 Provide oversight to informatics team
 Set vision for nursing informatics
Job Qualifications
 Bachelor’s or master’s degree (varies
Job Qualifications
with organization)
 Advanced degree (varies with
 Critical thinking and project
organization)
management skills
 Clinical experience
 Registered nurse
 Leadership skills
Nursing Informatics Managers  Management experience
 Nursing Informatics Managers are  Several years of clinical informatics
responsible for overseeing an organization’s experience
informatics program, ensuring seamless
implementation of technology and clinical
care.
support clinical decision making and nursing
Chief Nursing Informatics Officers practice improvements.
 Chief Nursing Informatics Officers (CNIO)  Assists patients and their families to access,
are senior executives who help determine review and evaluate information they
the strategy for technology use by clinicians. retrieve using ICTs and with leveraging
ICTs to manage their health.
What They Do?  Describes the processes of data gathering,
 When changes are made to how nurses recording and retrieval, in hybrid or
collect data and update records, the CNIO homogenous health records, and identifies
ensures the changes can be implemented informational risks, gaps, and
in a clinical setting- and are efficient for inconsistencies across the healthcare system.
caregivers. They provide clinical and  Articulates the significance of information
technological expertise when considering standards necessary for interoperable
healthcare-based computer programs. electronic health records across the
healthcare system.
Skills Needed  Articulates the importance of standardized
 Clinical experience nursing data to reflect nursing practice, to
 Informatics experience advance nursing knowledge, and to
 Leadership experience contribute to the value and understanding of
 Management experience in a clinical nursing.
setting  Critically evaluates data and information
 Master’s degree, though some from a variety of sources to inform the
organizations may require a doctorate delivery of nursing care.
 Strategic vision
Professional and Regulatory Accountability
Health Informatics Consultants  Complies with legal and regulatory
 Are responsible for the supervision of requirements, ethical standards, and
clinical application systems and databases organizational policies and procedures.
that are used to track and maintain patients’  Advocates for the use of current and
records. innovative information and communication
technologies that support the delivery safe,
System Administrator quality care.
 Manage, update and customize systems,  Identifies and reports system process and
especially in the case of new systems that functional issues according to organizational
need to be tested and may have issues that policies and procedures.
require troubleshooting.  Maintains effective nursing practice and
patient safety during any period of system
COMPETENCIES unavailability by following organizational
downtime and recovery policies and
Information and Knowledge Management procedures.
 Performs search and critical appraisal of on-  Demonstrates that professional judgement
line literature and resources to support must prevail in the presence of technologies
clinical judgement, and evidence-informed designed to support clinical assessments,
decision making. interventions, and evaluation.
 Analyses, interprets, and documents  Recognizes the importance of nurses’
pertinent nursing data using standardized involvement in the design, selection,
nursing and other clinical terminologies to
implementation, and evaluation of
applications and systems in health care.

Information and Communication Technologies


 Identifies and demonstrates appropriate use
of variety of information and
communication technologies to deliver safe
nursing care to diverse populations in a
variety setting.
 Uses decision support tools to assist clinical
judgement and safe patient care.
 Uses ICTs in a manner that supports the
nurse-patient relationship.
 Describes the various types components of
health information systems.
 Describes various types of electronic records
used across the continuum of care and their
clinical and administrative uses.
 Describes the benefits of informatics to
improve health systems, and the quality of
interprofessional patient care.

CAREER OPPORTUNITIES

Career and Outlook


Working Conditions:
 Hospitals
 Clinics
 Long-term care facilities
 Nursing schools
 Health care consulting firms
 IT companies

SALARY RANGE FOR NURSE


INFORMACISTS
 Ave.= $109,610 per year
 According to PayScale, informatics nurses
can earn between $56,372 and $97,367
annually with a median salary of $75,939.
 Salary can be dependent an additional
degrees or certificates held, city and state of
employment, experience, and the
organization.
NURSING INFROMATION SYSTEM TEAM
Newsgroups
 Modeled after bulletin board message areas

sci.med and alt.support


 sci.med.nursing- more of a scientific or
professional orientation; a newsgroup
devoted to nursing issues
 alt.support - typically addressing the lay
public; sharing experiences and giving
encouragement

Team Leadership Role of the Nurse in the


 Nurse informaticist Management of Nursing Information System
 Nursing informatics specialist  Strategic and systems planning
 Nursing informatics clinician  Implementation of clinical nursing systems
 Clinical nurse informatics specialist  Monitoring and evaluation of clinical and
 Chief nursing informatics officer budgetary outcomes; cost control
 Perioperative informatics nurse  Reducing the burden of paper work as well
as improve the communication
Listserv and Newsgroup  Financial management
 2 ways to join into discussion with other  Providing decision support tools
people interested in a particular topic  Keeping the records available
 Increasing the productivity of nurses
Listserv  Checking bedside data entry (med record)
 An e-mail routing list with subscriptions  Client monitoring
 Mail list or e-mail conference  Telenursing
 Devoted to the interests of a scholarly or  Duty scheduling; calculating staffing
professional group requirements
 Effective means to discuss issues, ask
questions and network with colleagues  With the right nursing informatics
 Disseminate information such as call for background and training, nurse
papers, request for proposals, administrators can play a major role in
conference announcements and job accreditation and compliance--such as
openings assisting in implementing standards.
 Example:
EM-NSG-L WHAT NURSE ADMINISTRATORS SHOULD
Emergency Nursing List: "Practice and DO?
issues of emergency nursing, care of
emergency patients, and the discussion of Role of Advocates
shared concerns with other emergency  Advocacy is about influencing people,
professionals." policies, practices, structures and systems in
Subscribers as of 11/12/01: 857 List address order to bring about change.
(to post message):
[email protected]
List management address (to subscribe):
[email protected]
What Nurse Administrators Should Do?
 Need to communicate clearly and concisely
and to structure their message to fit both the
situation and the intended audience.
 Should be comfortable in communicating in
verbal, written, and electronic formats.
 Must be able to influence others to action
 Must establish positive, collaborative
relationships with others to garne the
support necessary to address the issue of NI.
 Ensure a continuing education programme.
 Informatics competencies need to be
developed in all 3 levels of expertise through
basic and continuing nursing education
programs.
Major Research Databases
PROMOTE RESEARCH IN NURSING
Go to Health Sciences Databases page or the UIC
INFORMATICS
Library database A to Z list for additional databases.
COMPUTER APPLICATIONS THAT
1) CINAHL Plus with Full Text
SUPPORT NURSING RESEARCH
 Covers literature related to nursing
Contents and allied health
1. Literature Searches 2) Cochrane Library
2. Data Collection and Statistical Tools  Independent medical evidence on
which to base clinical treatment
LITERATURE SEARCH decisions
 It is a systematic, thorough search from the 3) EMBASE: Excerpta Medica Database
already published data to identify a braedth  Database in biomedicine which also
of good quality references on a specific excels in its coverage in
topic. pharmaceutical research. From 1974
 Reasons: to present
 Drawing information for making  Tip: if you have problems with off
evidence-based guidelines campus access, Use AnyCOnnect
 A step in the RS method and as part VPN. To install, got AnyConnect
of academic assessment VPN and make sure you select the
library-Resources group
Main Purpose 4) ERIC on EBSCOhost
 To formulate a research question by 5) HAPI: Health and Psychosocial
evaluating the available literature with an Instruments
eye on gaps still amenable to further  Information on measurement
research instruments (questionnaires,
interview schedules, checklists,
index measures, coding
schemes/manuals, rating scale,
projective techniques,
vignette/scenarios, tests)
6) MEDLINE through Ovid (1947 to technology; also the social sciences,
Present) arts and humanities are represented.
 National Library of Medicine’s 13) Dissertations & Theses @ CIC
premier bibliographic database Institutions
covering the fields of medicine,  Provides downloadable doctoral
nursing, dentistry, veterinary dissertations originating from
medicine, the health care system, and universities in the Big Ten
the preclinical sciences conference from 1997 to present.
7) MEDLINE via PubMed@UIC More dissertations from other North
 PubMed, a service of the National American and European universities
Library of Medicine, provides access are available for preview and
to MEDLINE citations and individual purchase.
additional life sciences books and 14) Google Scholar
databases. From mid-1960s to  Searches for scholarly materials such
present as peer-reviewed papers, theses,
8) Nursing Reference Center Plus books, preprints, abstracts and
 Master nursing best practices with technical reports from abroad areas
the source for evidence-based of research. It includes a variety of
information designed specially for academic publishers, professional
nurses. Includes PERC societies, preprint repositories and
9) PsycINFO universities, as well as scholarly
 Now called APA PsycINFO. articles available across the web.
Abstract and index of Psychology 15) Health Source: Nursing/Academic
and the psychological aspects of Edition
related disciples, such as medicine,  Nursing and allied health sciences
nursing, sociology, business, and scholarly journal literature
education 16) Sociological Abstracts
10) SAGE Research Methods  International literature sociology and
 Contains information on research related disciplines in the social and
methods including over 120,000 behavioral sciences
pages of SAGE book, journal, and 17) Sigma Repository
reference content  Formerly Virginia Henderson
11) Scopus International Nursing Library
 Contains over 20, 500 titles from
5,000 publishers worldwide with 49 DATA COLLECTION AND STATISTICAL
million records, 78% with abstracts. TOOLS
It includes over 5.3 million  On-line questionnaires
conference papers and provides  Digital polls
100% Medline coverage with  Survey monkey
interoperability with ScienceDirect,  Data processing and database applications
engineering Village and Reaxys
12) Web of Sciences
 Access to the Web of Science Core
Collection which is the largest
citation database in science,
engineering, medicine and

You might also like