nursing informatics
DESCRIPTION
wewTRANSCRIPT
Nursing information system
Information system-An information system (IS) is defined as the organized combination of people, hardware, software, communication networks, and data resources that collects, stores, processes, transforms, displays, transmits disseminates and disposes information in accordance with defined procedures.
An IS may be automated (e.g., a computerized information system) or manual (e.g., a library’s card catalog).
Nursing information-Nursing information includes data collected by nurses; data used by nurses; data about nursing activity; and data about the nursing resource. This section describes the recent developments towards improving clinical nursing terminology; changes to the NHS minimum data set that reflect nursing autonomy; and some good practice issues in the collection of data, and the availability of information to the profession.
The main functions that can be found in current ward nursing information systems are:
-Care planningNursing Clinical RecordCare evaluationDischarge planningWorkload assessment (prospective and or retrospective)Personnel managementStaff rosteringAttendance recordingSkill mix managementCostingBudget management
Confidentiality of Health Record
Confidentiality is one of the main issues in Health information record Everything in computer are hack able Easily altered using electronic devices
Protecting Health Records
Installation of a Protective Layer Software or Authorization Management Software. Provision of Username and Passwords for access to users dependent upon their individual
needs. Execution of Security Protocols and Password Protection measures
Password Changing after periodic intervals.
Setting rules for minimum number of characters in passwords.
Barring from the re-usage of passwords.
Installation of Second Tier Verification Systems Face Recognition, Bio-metrics Identifier Scan including retina, finger or palm scanning etcetera.
Protecting Health Records
Installation of a Protective Layer Software or Authorization Management Software.
Provision of Username and Passwords for access to users dependent upon their individual needs.
Execution of Security Protocols and Password Protection measures
Installation of Second Tier Verification Systems
Structure of data interchange / fetching and query process
Interchange of standard between every department such as the pharmacology , nursing, critical care, laboratory, accounting, and finance are processes via a dedicated specialized transmission techniques
Translation of data into information are independently processedby separated software embedded in the main server
Software is installed in every dedicated terminal of every department to access the data using a graphical user interface
The server continuously pulling data in every terminal, translate the data into information and ready information is pushed from the server and sent to every dedicated terminal of every department
One information is available, the nurses, health care provider and other health care staff can access the data
Only nurses with proper code and proper authorization are required to download data Users of every department can use structured query system through a graphical user interface.
MANIPULATING DATA
AUDITING: it is necessary that HIS should have an audit log
Intermediate processing steps must not alter the original data , meaning the repository of the original data should not be the same with updated data and the original should have hard coded processes such as that nobody except the programmer can change or manipulate the data
Nurse to Patient Relationship
Improves the following Establish rapport Cooperation Awareness of culture Reliance on computer
Reliance on computer
It impedes the ability of health care providers to establish trust and communicate compassionately.
Submitted by: Vincent C, Bulla
Ylron John A, Tapar
Chapter 12
Nursing Informatics and Health Care
Policy Issue