mrsoooh
Information Technology in Nursing Practice: D220 Learning Guide…
Information Technology in Nursing Practice: D220 Learning Guide
Competency 3- Differentiate Among (Compare) Health Information Systems and Technologies
Healthcare Information system (HIS)
Define HIS and its parts using the reading:
Define the two major categories of information systems and what each category supports:
Give an example of a HIS in your workplace or clinical setting:
Give an example of ways health information systems support nurses’ decision-making in your workplace or clinical setting:
What are the financial drawbacks and benefits of a HIS
Administrative Information System (AIS)
Define AIS using the reading:
What are two components of Administrative Information Systems that can be used to improve patient care:
Give an example of an AIS in your workplace or clinical setting:
How does the AIS combine with CIS to improve the patient experience
Clinical Information System (CIS)
Define CIS using the reading:
Give an example of a CIS in your workplace or clinical setting:
Identify the seven components in the CIS and how are they used in your workplace or clinical setting:
How does the CIS support the EHR?
Lesson 5: Health Information Technologies
Objectives
Compare types and uses of health information technologies.
Describe ways health information technologies support nurses’ decision-making.
Computerized Provider (or Practitioner) Order Entry (CPOE)
Define CPOE using the reading:
Identify the benefits and drawbacks of CPOE:
Give an example of how CPOE is used in your workplace or clinical setting:
How has the use of CPOE affected EBP?
Electronic Documentation
Define electronic documentation using the reading:
Define Controlled Terminologies using the reading:
Give an example of electronic documentation in your workplace or clinical setting:
What are the strengths and challenges of electronic documentation
Why are controlled terminologies important?
Competency Four – Evaluate Health Information Technology Data
The learner evaluates health information technology data in nursing practice to monitor and improve patient outcomes.
Lesson 6: Gathering, Organizing, and Interpreting Health Information Technology Data
Objectives:
Describe how nurses use health information technology data in nursing practice.
Explain methods for gathering and organizing health information technology data.
Interpret health information technology data for actionable interventions.
Clinical Decision Support Systems (CDSS)
Define CDSS using the reading:
Give an example of how CDSS is used in your workplace or clinical setting:
What are the results of a CDSS and what role does EBP practice play in the support?
Risk-Management Systems
Define risk management system using the reading:
Give an example of how a risk management system is used in your workplace or clinical setting:
What role does Healthcare Informatics have in the risk management system?
How is patient care impacted by the risk management system?
What type of risk assessment is required by HIPAA and CMS Meaningful Use?
Lesson 7: Improving Patient Care Using Health Information Technology Data
Objectives:
Describe how data informs improvements in nursing practice.
Recommend improvement opportunities based on health information technology data.
Describe opportunities for emerging health information technology applications.
Quality Assurance (QA)
Define QA using the reading:
Define firewall related to Healthcare Informatics
Give an example of firewalls in your workplace or clinical setting:
How are the different types of data used in QA?
Smart Technology
Define smart technology using the reading:
Give an example of how smart technology is used in your workplace or clinical setting:
How do clinicians, patients, and families benefit from smart technology?
What is the disadvantage of using smart technology in patient care?
HITECH ACT
Define HITECH Act using the reading:
Give an example of how the HITECH Act is carried out in your workplace or clinical setting:
How has the HITECH Act affected nursing?
How can hospitals and healthcare professionals receive incentive payments?
Meaningful Use (MU)
Define MU using the reading:
Give an example of how MU is used in your workplace or clinical setting:
Identify objectives of meaningful use in your workplace or clinical setting:
How are MU Clinical Quality Measures used in your workplace or clinical setting?
What are the core requirements of MU related to EHRS?
MU Stage 1
Define MU Stage 1 using the reading:
Give an example of MU Stage 1 requirements used in your workplace or clinical setting:
What does stage 1 emphasize as it relates to data?
MU Stage 2
Define MU Stage 2 using the reading:
Give an example of MU Stage 2 requirements that are used in your workplace or clinical setting:
What are the MU Stage 2 requirements for patients’ access to online health information?
MU Stage 3
Define MU Stage 3 using the reading:
Give an example of how the EHRS has been adopted in your workplace or clinical setting:
What are the measures that are being used to improve patient outcomes in your workplace or clinical setting?
EHRS (Electronic Health Record System)
Define EHRS using the reading:
Give an example of EHRS benefits in your workplace or clinical setting:
Describe the general benefits of using an EHRS:
Describe the nursing benefits of using an EHRS:
Describe the challenges of using an EHRS
Workarounds
Define Work-Arounds using the reading:
Give an example of an EHRS Work-Around in your workplace or clinical setting:
What are some common process Workarounds?
What ways can workarounds be identified and monitored?
What identified workarounds have been addressed and are no longer in use at your workplace or clinical setting?
Standardization
Define standardization using the reading:
Give an example of how standardized languages are used in your workplace or clinical setting:
What are the benefits of using standardized languages?
How does the adoption of EHRSs increase the need for standardized terminology?
Data Integrity
Define data integrity using the reading:
Give an example of how data integrity can be compromised in your workplace or clinical setting:
What steps are put in place to maintain data integrity?
How does the use of audit trails improve data integrity?
System Failure
Define system failure using the reading:
Give an example of what causes system failures to occur in your workplace or clinical setting:
What role does the Nurse Informaticist have in downtime procedures?
What are downtime procedures?
Competency Five- Describe Legal and Ethical Implications
The learner describes the legal and ethical implications related to informatics in the healthcare environment.
Lesson 8: Legal Implications for Health Informatics
Objectives
Identify laws and policies related to health informatics.
Describe responsibilities and legal implications for using health informatics.
Policy, Legislation, and Regulation
Describe policies in your current work environment that protects patient privacy.
Define the following terms and provide examples related to health informatics.
Policy
Legislation
Regulation
Place in order and describe legislation that impacted health information technology from 1996-present.
HIPAA (Health Insurance Portability and Accountability Act of 1996)
MIPPA (Medicare Improvements for Patients and Providers Act of 2008)
ARRA (American Recovery and Reinvestment Act (2009)
HITECH Act (Health Information Technology for Economic and Clinical Health of 2009)
ACA (Affordable Care Act of 2010)
MACRA of 2015 (Medicare Access and CHIP Reauthorization Act of 2015)
Complete the table below
Act
Written acronym
Year passed
Example of the impact of health information technology in your workplace or experience in a healthcare environment
HIPAA
Example: Health Insurance Portability and Accountability Act
1996
Development of policies to keep information secure like requiring 2-factor authentication or automatic sign-off.
ACA
MACRA
ARRA
HITECH
21St Century Cures Act (Cures Act)
N/A
FDASIA
PSQIA
Complete the table below.
Non-Governmental Accreditation Agencies
Name of Agency
Acronym
Purpose
The Joint Commission
TJC
Independent, not-for-profit organization that accredits and certifies healthcare organizations.
Healthcare Facilities Accreditation Program
The Accreditation Commission for Healthcare
American Nurses Credentialing Center Magnet Program
Meaningful Use (MU)
Describe the primary goal of MU.
List the 5 Objectives of the Meaningful Use Program.
Complete the table below.
Stages of Meaningful Use
Stages
Focus
Example
Stage 1
Data Capture and Sharing
EHR implementation
Stage 2
Stage 3
Ethics
Identify the tenets of the Four Component Model.
Describe the Purpose of the Four Component Model.
Describe an ethical issue you and/or a colleague you have encountered in your nursing practice.
List the 13 Principles of the AHIMA Code of Ethics.
Define Ethical Dilemma.
Provide an example of an ethical dilemma faced by you or a colleague
List the 4 Principles of Information Ethics as identified by Severson in 1997.
Define and give examples of the following terms:
Privacy
Confidentiality
Information-and-data privacy
Information security
Information consent
Information-system security
How can an organization protect itself against downtime, breaches in confidentiality, loss of consumer confidence, cybercrime, liability, and lost productivity?
Identify threats to information security.
Explain Internet of things (IoT) devices.
Define vulnerability.
Explain the purpose of the HIPAA Privacy Rule.
Explain the purpose of the HIPAA Security Rule.
Information Security Risks
Complete the table below.
Characteristics of Malicious Programs
Program Type
Characteristics
Viruses
Require normal computer operations to spread May or may not disrupt operations or damage data.
Worms
Trojan horses
Logic bombs
Rootkits
Malware
Bacteria
List several ways to avoid malicious software.
Complete the table below.
Threats to Information Systems
Type of Threat
Characteristics
Cybercrime
Cybercrime commonly refers to the ability to steal personal information, such as Social Security numbers stored on computers.
Opportunists
Hackers
Computer or Information Specialists
Unauthorized Users
Overprivileged Users
From whom do the greatest threats to information systems originate?
Define sabotage.
Differentiate between physical and logical security.
List 3 examples of physical security measures used in your place of employment:
List 3 examples of logical security measures used in your place of employment:
Describe the benefits of biometric identification.
Define Public Key Infrastructure (PKI).
Define firewall.
List types of firewall techniques.
Describe a ransomware attack.
Who shares in the responsibility for an effective information security plan?
Who should have access to confidential information in the HIS?
Define audit trails.
List the 5 criteria necessary for information security, integrity, confidentiality, accessibility, and privacy policies to be effective.
List the 6 tasks required for good system security management.
What is the purpose of encrypting e-mails?
Define Wearable technology.
Give an example of wearable technology.
Why is PHI more valuable on the black market than credit card information?
Informatics Term Crossword
ACROSS
4. process that sets a level of access privileges and training based on their need
7. the ability of two entities to exchange data while retaining original meaning
8. using health information technology to collect specific data to improve care.
9. a flaw or weakness in a system procedures or design
10. a visual of how one variable relates to another
11. collection of number characters of facts
14. measured by quantity or numbers
15. collection of data that has been interpreted and examined for patterns
DOWN
1. way to track different tasks and provide a visual of due dates; start and stop times
2. descriptive data
3. A platform which technology assisted healthcare is delivered between at least two points
5. cause and effect diagram to trace problems and track back to the root
6. an action that verifies the authority of the user(s) to receive specific data
12. application of knowledge to manage and solve problems
13. synthesis of information from several sources to produce a single concept