Foundation of Practice Flashcards
According to Staggers, Gassert, Curran 2002, what are the levels of informatics competencies?
- Beginning nurse
- Experienced nurse
- Informatics nurse specialist
- Innovator
Advanced practice nursing: Discuss ethical principals in practice (Nursing Code of Ethics).
The American Nurses Association developed the Nursing Code of Ethics. There are nine provisions, which are listed below:
- The nurse treats all individuals with respect and consideration, regardless of social circumstances or health condition.
- The nurse’s primary commitment is to the individual regardless of conflicts that may arise.
- The nurse promotes and advocates for the individual’s health, safety, and rights, maintaining privacy and confidentiality and protecting him or her from questionable practices or care.
- The nurse is r_esponsible for his or her own care practices_ and determines appropriate delegation of care.
- The nurse must retain respect for self and his or her own integrity and competence.
- The nurse participates in ensuring that the health care environment is conducive to providing good health care that is consistent with professional and ethical values.
- The nurse participates in education and knowledge development to advance the profession.
- The nurse collaborates with others to promote efforts to meet health needs.
- The nursing profession articulates values and promotes and maintains the integrity of the profession
ANA Competency levels
- Entry level
- Experienced nurse
- The informatics nurse
- “Proficiency with informatics applications to support all areas of nursing practice including quality improvement activities, research, project management, system design, development, analysis, implementation, support, maintenance, and evaluation
- Fiscal management
- Integration of multidisciplinary language/standards of practice
- Skills in critical thinking, data management and processing, decision making, and system development, and computer skills
- Identification and provision of data for decision making” (Hebda, p.13)
- Informatics nurse specialist
- Graduate-level and can conduct informatics research and add information to the field (Scope & Standards; Hebda, p.13)
ANA definition of NI (2008)
Nursing informatics is a specialty that:
A. integrates nursing science
B. Computer science
C. Information science to manage and communicate:
- Data
- Information
- Knowledge and
- Wisdom in nursing practice
NI Supports:
a. consumers
b. patients
c. nurses
d. other providers in their decision-making in all roles and settings.
This support is accomplished through:
i. use of information structures
ii. information processes
iii. information technology
ANA definition of NI (2015)
NI is a specialty that integrates nursing science with multiple information and analytical sciences to: A. Identify B. Define C. Manage and D. Communicate data, information, knowledge, and wisdom in nursing practice NI supports: 1. Nurses 2. Consumers 3. Patients 4. Users 5. Interprofessional healthcare team 6. Other stakeholders in their decision-making roles and settings to achieve desired outcomes This support is accomplished through the use of: a. information structures, b. information processes, and c. information technology
ANA Recognized terminologies and data element sets Data Element Sets
ANA-Recognized Informatics System Data Element Sets: 1-Nursing Minimum Data Set (NMDS) 1-Developed by nursing 1-Contains: Clinical data elements 2-Nursing Manamgnet Minimum Data Set (NMMDS) 2-Developed by all settings 2-Contains: Nursing administrative data elements
Compare electronic medical records and electronic helath records.
electronic medical record (EMR) and electronic health record (EHR)
The EMR is created by a hospital or other health care delivery organization (CDO).
- The CDO owns the information
- Cconsists of clinical documentation, orders, medications, treatments, and other clinical decision support, and is a legal record.
The EHR includes information from EMRs
- The EHR relies on the information from the EMR to complete it.
- Owned by the patient and stakeholders, which could include the government, insurance companies, and healthcare providers among others.
- Needs controlled medical vocabulary so that information will be comparable among providers and other interested stakeholders
- Organizations now receive financial incentives to install EMR and EHR systems from healthcare reform.
Computer science
Branch of engineering (application of science) that studies theoretical foundations of information and computation and their implementation and application in computer systems.
Study of storage/memory, conversion and transformation, and transfer or transmission of information in machines (computers) through both algorithms and practical implementation problems. (McGonigle & Mastrian, Glossary)
Define the steps needed for workgroup formation.
A workgroup is a small number of people working together toward a common goal.
Advantage: the environment allows for increased insight and creativity.
Disadvantage: members of the group allow personal conflicts (in terms of personality and work styles) to interfere with the group’s goal.
A popular concept identifies four stages in group development:
- Forming: This is where a group is formed and the members begin to get to know one another. Typically, individuals are quiet and polite to one another.
- Storming: This is the stage where conflicts normally arise. Effective communications must be occurring.
- Norming: Typically, conflicting factions make peace and come together. Less communication is necessary.
- Performing: This is the stage in which the group begins to really work well. Communication is free flowing.
Define the term: management science.
Management science is the study of business decision-making using various analytical methods.
Elements used in management science to help organizations make practical decisions:
- Strategic planning: Strategic planning is based on an organization’s goals and mission.
- Morphological analysis: Morphological analysis looks at many different possible solutions in an attempt to come up with the most appropriate one.
- Influence diagrams: Influence diagrams use mathematical representations and graphs to solve problems.
- Problem structuring: A method used in management science is problem structuring, sometimes known as “soft-operations research”.
Define the terms privacy and confidentiality and how they relate to informatics.
Patient privacy and confidentiality are two main concerns especially as they apply to the collection and storage of computer records. Patients have a right to privacy and that any information they choose to share is only accessible to authorized personnel.
- Privacy is defined as “freedom from intrusion, or control over the exposure of self or personal information.” In healthcare, an individual’s right to privacy includes remaining anonymous by request, deciding what information is collected, and how that information is used.
- Confidentiality is the careful sharing of private information to people who have a valid interest in helping the individual. The ethical duty of confidentiality requires the information to be stored or transferred in a secure way. The individual’s right to decide how information is shared is known as information privacy. This includes the right to accurate information being collected and stored. Information security includes the measures taken to ensure that records are kept accurate and are not accessible to unauthorized people.
Definition of (EBP) Evidence Based Practice
*A problem-solving approach to clinical decision-making within a healthcare organization *Integrates best available scientific evidence with best available experience *Uses research & non-research evidence (ethical or personal)
Describe encryption methods designed to protect confidential information.
Patient information that is stored in databases is of a sensitive and confidential nature.
Encryption is the process of using mathematical formulas to code data so that it is unrecognizable if it is intercepted by someone outside of the system.
There are three distinct ways that encryption can be handled by a company: at the desktop (can hide information/viruses from system Admin), administrated, or server-wide (most effective).
Describe some of the roles that informatics nurse plays.
The following are some of the roles that the informatics nurse must play:
- Developing informatics theories: Assemble what sort of information should be captured on the system and how the data should be analyzed.
- Analyzing the information needs of the organization: Sort through the large amounts of data collected to determine the best information for the organization.
- Helping the organization choose computer systems: Assist in the system requirements, both for now and in the near future.
- Customizing purchased computer systems: Work with IT to customize the system so that it will be the most useful.
- Designing computer information systems: Assist IT in the overall design of the system.
- Testing new or upgraded computer systems: Conduct robust tests of the system when changes or upgrades are performed.
- Teaching other people to use the computer system: Set up training and education programs to encourage the most effective use of the system.
Describe the Accredited Standards Committee
The goal is to create records that are more accurate, avoid duplication, and ensure communication between computer systems.
• The Accredited Standards Committee (ASC) created the standards associated with administrative medical insurance tasks. The current version, X12N, is used nationwide. X12N helps with claims, enrollment, and determining insurance eligibility.
Describe the Pharmacy Standards Association.
The goal is to create records that are more accurate, avoid duplication, and ensure communication between computer systems.
• The National Council for Prescription Drug Programs (NCPDP) develops pharmacy standards for the U.S. Electronic claims processing under this standard was first introduced in 1992 and has gone on to make up nearly 100% of retail pharmacy claims being processed in real-time.
Healthcare providers send EDI (electronic prescriptions} messages to the pharmacy directly. Another NCPCP set of standards, HL7, focuses on the communication of information within and between different healthcare facilities. Collaboration between X12N and HL7 has resulted in the EHR-S (electronic health record system) standards as a way to solidify all aspects of patient healthcare under a single system.
Describe the attributes that help to assure accuracy of information.
The following information attributes are important in assuring accuracy:
- Objective reporting - Information should be completely free from bias and reported accurately.
- Comprehensive - All the necessary information is available to complete reports and requests.
- Appropriateness - All users are able to access the information necessary to do their jobs.
- Unambiguous - The data is clearly defined in order to reduce errors.
- Reliability - When identical information is keyed in by different people, it should always be uniform in the system.
- Up to Date - The most recent information should be listed first.
- Convenience - It should not be difficult for users to locate the information they need.
Describe the differences between clinical nurses and those nurses who specialize in informatics.
Traditional clinical nurse- taking care of patients.
- user level knowledge (i.e., enough knowledge to operate the equipment and enter data).
- concentration on the accuracy of the information that they are interpreting or giving to other caregivers.
- Their opinion of the computerized systems is key as to whether or not the system is successful.
Nurses who specialize in informatics focus on the information systems.
- worry about the security and stability of the systems installed at their facility.
- very adept at troubleshooting problems (especially at the user level).
- insure systems are user friendly
- reduce the number of tasks the traditional clinical nurse has to perform in their routine day.
- Efficiency arid enhanced productivity are the key goals of the informatics nurse.
Describe the essential elements in the practice of nursing informatics.
The essential elements within the practice of nursing informatics include traditional nursing aspects such as:
- Focus on the patient and their well-being.
- Healthcare in general. Keeping up to date on the latest state of the art in terms of nursing.
- Working environment. This includes how things are laid out (to avoid errors and make things as efficient as possible).
- Working with others. How to interact effectively with other healthcare practitioners and coworkers.
In terms of informatics, the related skills include:
- Knowledge of data structures (including metastructures)
- Knowledge of computer networking
- Knowledge of computer hardware
- Information system training skills
Formal education includes:
- A degree in nursing (Bachelor of Science)
- A minor (or second major) in a computer science program focused on computer systems in the healthcare industry
Describe the factors necessary for information quality.
Quality information is defined by the following factors:
- Timeliness: The necessary data is available (and retrievable) as needed.
- Precision: System dictionaries shall describe uniform wording and clear definitions.
- Accuracy: The data should be as error-free as possible.
- Measurability: The information should be quantifiable so that comparisons can be made.
- Independently verifiable: The integrity of the information remains constant regardless of the individual reporting it.
- Availability: The information should be accessible where it is needed. In the hospital or clinic environment, the information should usually be available at the patient’s location.
Describe the framework for nursing informatics as defined by the American Nurses Association.
The American Nurses Association (ANA) has laid out standards for informatics nurse specialist. These standards are based on a “problem-solving framework” which includes both traditional aspects of nursing as well as those aspects more specific to the informatics nurse. The standards are:
- Assessment
- Diagnosis
- Identification of outcomes
- Planning implementation
- System planning
The ANA has also set standards for the performance for informatics nurses.
- quality assurance,
- review of performance evaluation methods,
- ensuring that the practice of nursing informatics is effective.
The informatics nurse should also work to create guidelines for research, ethics, peer cooperation, allocation of resources, and effective communication. Finally, they should be willing to help other nurses who want to improve their skills in informatics and computer science.
Describe the fundamentals of computer security mechanisms.
Keeping computer systems safe entails a mixture of both physical and electronic security. This consists of:
Physical security
- placing computers or servers in restricted areas.
- Laptop and other portable computers should be fitted with locks or alarms
- extensive password protection
Electronic security
- Firewalls help protect systems from unauthorized access by presenting an electronic barrier between the system and the remote user. A firewall is able to look at incoming information and only let through that which is approved. Firewalls may also be placed within a system to keep parts of it off limits to individuals who are authorized users of the system in general. It is a good practice to use a firewall to protect such things as payroll, personnel data, and client information.
Describe the Health Insurance Portability and Accountability Act (HIPAA).
The Health Insurance Portability and Accountability Act (HIPAA)
created by Congress in 1996
establish standards for computer based record keeping in the healthcare industry.
Timetables were established that included fines for noncompliance by certain dates.
This legislation required the Director of Health and Human Services (DHHS) to create:
- Rules regarding how electronic transactions are processed.
- A unique identification code for all providers, health plans, and employers.
- A way to keep patient information secure and private.
The Health Insurance Portability and Accountability Act also granted certain rights to patients:
- right to view their own medical records and request that corrective changes are made to their medical files.
- healthcare providers may not keep (PHI) unprotected on their computer systems.
Describe the history of the Health Insurance Portability and Accountability Act (HIPAA).
The Health Insurance Portability and Accountability Act (HIPAA) was passed in 1996 to protect patient privacy rights.
key compliance dates for HIPAA (for large health plans):
- October 16, 2002: Electronic transactions and code sets are to be identified.
- April 14, 2003: Privacy standards are to be set.
- July 30, 2004: Standards for employer identification are to be set.
- April 21, 2005: Standards for system and data security are to set.
- May 23, 2007: Standards for provider identification are to be set.
uniform standards allow the data repositories of large healthcare systems to be efficiently monitored for adherence to the HIPAA regulations
Describe the informatics nurse responsibilities.
The following is a list of responsibilities that are required of the informatics nurse:
- Teaching the policies involved with information systems including the standard operating procedures and system security features.
- Deciding the effectiveness of the computer system based on overall performance (e.g., system response time) and how well the system design is working.
- Making sure the system works as it was designed to by verifying that the system produces results that are expected and troubleshooting problems.
- Deciding when computer systems need to be upgraded based on gauging the obsolescence of the hardware and system compatibility with modern software.
- Finding new ways to use technology in nursing by looking for new and novel applications of technolow.
- Ensuring compliance in regulations regarding patient information including the patient privacy regulations.
- Managing projects as needed.
- Conducting research into the field of nursing informatics.
Describe the International Council of Nurses (ICN) Code of Ethics for nurses in regards to patients.
The following is an outline of the ICN (International Council of Nurses) Code of Ethics for nurses in regards to patients:
- the nurse’s responsibility is to the patient. The patient must receive the best possible care and their rights and well-being are respected and maintained.
- Respect and support patient rights, religious beliefs, values, and customs. The patient should be able to live their way of life while under care. This means that they should be allowed to follow their culture and traditions as best as possible.
- Make sure the patient gives informed consent for any treatment. The patient has the ultimate say as to whether or not they receive treatment. The right of the patient to accept or refuse a given treatment through the informed consent process.
- Keep patient information confidential. The patient’s right to privacy is protected under law and should be respected.
Describe the International Council of Nurses (ICN) Code of Ethics for nurses in regards to coworkers.
The International Council of Nurses (ICN) has developed a Code of Ethics for nurses in regards to coworkers.
Key areas that need attention:
- Keep relationships with coworkers cooperative and professional
- Make sure that patients are safe and promptly deal with unprofessional or dangerous conduct on the part of coworkers
- Take care not to delegate more work than the individual is able to handle
- Promote continuing education in the workplace
- Keep the lines of communication open between departments, management, etc.
Any drift from optimal conditions should be addressed before the patient is exposed to any negative effects of poor teamwork.
Describe the methods to avoid the installation of malicious software.
In order to avoid malicious software (such as viruses or Trojan horses), use the following proven methods:
- Monitor and verify that only licensed software is uploaded into the system.
- Make sure that all network computers have updated virus detection software installed and that it is set-up to make daily scans of the entire system.
- Be wary of e-mail and never open a file attachment from an unfamiliar source.
- Keep copies of computer start-up files, original software, work flies, and directory structure in case problems arise. Keep a list of where each piece of hardware or software was purchased, the date of purchase, and all serial numbers in a secure location separate from the system.
- Update software regularly to fix security vulnerabilities.
- Finally, be sure that all staff members are familiar with the appropriate use of software, hardware, and e-mail.
Describe the organizational development (OD) model of change.
The organizational development model (OD) of change within an organization works by focusing on the entire culture of the organization rather than trying to change individual behaviors. OD encourages management-worker cooperation and free flowing communication. Its primary goal is to make the whole workplace an excellent environment for everyone to work towards common goals. There are several steps that must take place in order for OD to be beneficial:
- First, the dynamics of the organization are studied and accurately described in a written document.
- Next, a comprehensive strategic plan for problem solving should be carried out.
- Finally, the necessary resources are obtained and the plan is put into place and carried out.
These three comprehensive steps can be further broken down into the following: initial diagnosis, data collection/confrontation, action planning/problem solving, team building, intergroup development, evaluation and follow-up.
Describe the role of chief information officer
- Chief Information Officer: The chief information officer (CIO) is the head of the information services department.
- in charge of hiring information systems staff
- budgeting for maintenance of the system, and designing and implementing new systems as needed.
Generally, the CIO holds a masters or doctorate degree in computer science.
Describe the role of chief privacy officer
Chief Privacy Officer: The chief privacy officer (CPO) is a federally mandated position at any facility that treats patients.
- responsible for all forms of patient information.
The title of CPO is generally bestowed on an employee already working for the organization rather than being an entirely separate job.
Describe the role of chief e-health officer.
Chief E-health Officer: The e-health officer is a relatively new position created by the onset of interactive health websites.
- in charge of promoting and enabling the use of online interactive patient services.
Describe the role of compliance officers, planning and recovery officers, and interface engineers.
Three information system support roles that are typically held by fulltime employees in addition to working under their normal clinical role:
- Compliance officer: A compliance officer keeps track of state and federal regulations and accrediting requirements to make sure that the organization is in compliance. This job may be held by someone from the information systems department or by one of the clinical staff members.
- Planning and recovery officer: The planning and recovery officer must be sure that disaster plans are up to date and that they are integrated between departments. They must also be aware of what would be required to recover the full functionality of the information system in the event of a disaster.
- Interface engineer: The interface engineer should be an employee from the information system department who is capable of making sure that information integrity is maintained when data is exchanged between different systems.
Describe the role of network administrator and trainer.
Network administrators and trainers are two types of support personnel . They perform the following functions:
Network administrator: Network administrators are given access to all areas of the system and must be held to high standards of ethical accountability.
- managing existing systems and planning new systems.
- help the organization make hardware decisions
- manage the lower level information systems employees such as PC specialists and programmers.
Trainer: Trainers teach the organization’s staff how to use computer systems. Trainers may be full-time employees of the organization, provided by the software vendor as part of the system contract, or temporary workers. They need to be up to date regarding healthcare information systems and the functions they support.
Describe the role of security officer for information systems.
Since there are many regulatory patient privacy requirements (e.g., HIPAA), security officers are essential members of the healthcare information system team.
The security officer is responsible for
- assigning system access codes,
- making sure passwords are kept secret (and updated),
- monitoring the overall use of the system.
- They may also be in charge of the physical security of the computers and peripherals. A stolen hard drive or laptop computer could contain sensitive information and be a target for information thieves.
security officer should work with the information systems department and the organization’s management to
- create enterprise wide policies and procedures, which describe the proper and ethical use of equipment andinformation.
Describe the roles of analysts, liaisons, and programmers.
There are three types of support personnel that are typically involved in information systems:
- Analyst:
- background in healthcare information systems.
- usually have degrees in the medical field with certificates in computer studies.
- Their primary job is to define the way in which clinical data is entered into and processed by the information system.
- Liaison:
- Liaisons are hospital employees chosen to work with the information system team while remaining at their primary clinical post.
- Liaisons act as a conduit between the clinical and information systems staff.
- Programmers:
- Programmers may be full-time hospital employees, but are most likely contract workers or employees of the software vendor.
- These individuals write the machine language code necessary for system functions.
- They often work with the analyst and liaison in order to accomplish their tasks.
Describe the terms: antivirus software and spyware.
Two types of programs are essential to the security of today’s computers:
- Antivirus software: Must be completely updated. The software then should be scheduled to check for viruses on a regular basis (typically daily).
- Spyware detection software: Spyware is a type of software that implants itself into a computer system and sends information back to its maker. typically attached to many “free” software programs available for download on the Internet. All computers connected to the Internet are at risk to spyware. Therefore, updated spyware detection software should be run regularly to find and eradicate these programs.
Describe the unauthorized user and what threat they pose to system security.
An unauthorized user is an employee of the company that has legitimate access to the database system, but access of information beyond what is needed for their job or task.
This type of individual purposefully or inadvertently views data that they should not, creates a disruption in the availability of information, or corrupts the integrity of the stored data.
Under HIPAA regulations, all healthcare facilities must guarantee patient information privacy under penalty of law. Because healthcare databases may be very large and fragmented, it is sometimes difficult to restrict an employee’s access to only those patients (or specific patient test results) to which they have a valid need to access.
Discard system security and integrity: Time-out.
Once a person has logged in and gained access to a computer, the computer is vulnerable if that user leaves the computer and fails to log out, so computers connected to a secure system routinely have a time-out feature (automatic log off) that locks the system after a prescribed period (usually 10-15 minutes) in which there is no mouse or keyboard activity.
Time out/automatic logoff is one of the security procedures that must be addressed for part of the Health Insurance Portability and Accountability Act’s security rule.
The users’ workflow and type of use of devices should be considered when scheduling automatic log off.
Discuss acquiring recommendations form national quality organizations: National Quality Forum.
The National Qualify Forum (NQF) has endorsed a set of safe practices that can be used to assess and develop the organization’s patient safety culture. Practices encompass creating a safe culture as well as specific steps to ensure safe practices throughout the organization. According to NQF, the four elements needed to create and sustain a patient safety culture include the following:
- Leadership must ensure structures are in place for organization-wide awareness and compliance with safety measures, including adequate resources and direct accountability.
- Measurement, analysis, and feedback must track safety and allow for interventions.
- Team-based patient care with adequate training and performance improvement activities must be organization-wide.
- Safety risk must be continuously identified and interventions taken to reduce patient risk.
Discuss acquiring recommendations from national quality organizations: Leapfrog initiatives related to safe practices.
Leapfrog has developed a number of specific initiatives related to safe practices, including:
- Implementation of a computerized physicians order entry system that includes software to detect and prevent errors with a goal of decreasing prescribing errors by more than 50%.
- Evidence-based hospital referral, requiring referral to hospitals that demonstrate the best results with high-risk conditions and surgeries; these are assessed, according to the number of procedures or treatments done each year and outcome data with a goal of reducing mortality rates by 40%.
- Intensive care unit physician staffing requiring specially trained specialists (intensivists) with a goal of reducing mortality rates by 40%.
Leapfrog Safe Practices Score, which assesses the progress a health care organization makes on thirty safe practices that Leapfrog has identified as reducing the risk of harm to patients.
Discuss acquiring recommendations from national quality organizations: Leapfrog initiatives related to preventing medical errors.
Leapfrog is a consortium of health care purchasers/employers providing benefits to millions of Americans. The focus initially was on reducing health care costs by preventing medical errors and “leaping forward” by rewarding hospitals and health care organizations that improve safety and quality of care. Leapfrog has developed a number of initiatives to improve safety. These initiatives can be valuable tools in assessing and developing a patient safety culture. Leapfrog provides an annual Hospital and Quality Safety Survey to assess progress, releases regional data, and encourages voluntary public reporting. Leapfrog has instituted the Leapfrog Hospital Rewards Program as a pay-forperformance program to reward organizations for showing improvement in key measures. One initiative includes preventing medical errors. Purchasers of health care agree to the base purchase of health care based on four principals:
- Educating enrollees about patient safety and providing comparative performance data
- Recognizing and rewarding health care organizations that demonstrate improvement in preventing errors
- Making health plans accountable for implementing these principles
- Advocating for these principles with clients by using benefits consultants
Discuss acquiring recommendations from national quality organizations: Quality indicators from the Agency for Healthcare Research and Quality.
The quality indicators (QIs) from the Agency for Healthcare Research and Quality are distributed as a software tool free of charge to health care organizations to help them identify adverse events or potential adverse events that require further study. This software is an invaluable aid in assessing and developing the organization’s patient safety culture. Current quality indicators include the following:
- Prevention QIs use patient discharge data to determine conditions that require ambulatory care to prevent rehospitalization.
- Inpatient QIs measure quality of care through types of procedures, use of procedures, and mortality rates associated with procedures or conditions.
- Patient Safety QIs use data regarding adverse events and complications related to surgeries, medical procedures, and childbirth.
- Pediatric QIs use patient discharge data to screen for problems related to pediatric exposure to health care and analyze system changes that may prevent problems.
The data indicators may also be used to assess safety factors at an area (e.g., county) level per 100,000 population.
Discuss acquiring recommendations from national quality organizations: Agency for Healthcare Research and Quality and evidence-based practice centers.
The Agency for Healthcare Research and Quality promotes evidence-based practice through funding of evidence-based practice centers (EPCs) to develop evidence-based practice guidelines for dissemination and use in development of patient care plans, establishing insurance coverage, and development of educational materials. These centers issue research reports, including meta-analysis of all relevant research, on a wide range of topics, such as “Pain Management Interventions for Elderly Patients with Hip Fracture,” which include morbidity/mortality rates and cost-effectiveness associated with different treatments and procedures. Research focuses on areas of significance to people receiving Medicaid and Medicare. For example, five EPCs are engaging in research on technology for the Centers for Medicaid and Medicare, which focuses on topics related to the U.S. Preventive Services Task Force. Partners, such as insurance companies, professional associations, patient advocacy groups, and employers, nominate topics. Guides are available for both consumers and clinicians.
Discuss acquiring recommendations from national quality organizations: Institute of Medicine and National Committee for Quality Assurance safety issues.
The Institute of Medicine called for accrediting agencies to ensure organizations focus on patient safety. In response, the National Committee for Quality Assurance has addressed safety issues as part of its accreditation standards. Guidelines directed at managed care organizations provide useful information for other organizations as well. Organizations should:
- Educate staff regarding clinical safety by providing information.
- Provide collaborative training within the network related to safe clinical practice.
- Combine data within the network (organization) on adverse outcomes and polypharmacy.
- Make improving patient safety a priority for quality improvement activities.
Provide and distribute information about safe practices that includes information about computerized pharmacy order systems, physicians trained in intensive care, best practices, and research on safe clinical practices.
Discuss acquiring recommendations from national quality organizations: Institute of Medicine.
The Institute of Medicine (lOM), founded in 1970 under the charter of the National Academy of Sciences, is a nonprofit organization that serves an advisory role on health care issues to governmental and nongovernmental decision-makers. The lOM advises the government but is outside of the governmental structure to ensure lack of bias. The lOM issues guidelines based on research and evidence, conducts studies for Congress and other organizations, and conducts a number of epidemiological studies. The lOM is involved in a broad range of activities, issues regular reports, and provides workshops and forums about a health care issues (e.g., obesity]. The lOM has standing committees to focus on specific issues and provide forums for general discussion. Additionally, the lOM provides fellowships to help professionals gain experience and expertise in health-related fields.
Discuss acquiring recommendations from national quality organizations: National Quality Forum’s safe practices.
National Quality Forum’s safe practices include:
- Considering patient’s rights/responsibilities, providing informed consent, respecting advance directives, making full disclosure of medical errors, managing information and care by documenting care properly, providing prompt accurate test results, using standard procedures for labeling diagnostic studies, & providing discharge planning.
- Managing medications by implementing a computerized prescriber order entry system, standardizing abbreviations, maintaining updated medication lists for patients/pharmacists in medication management, identifying high-alert drugs, and dispensing drugs in unit doses.
- Providing adequate well-trained and well-supervised staff and resources, including critical care physicians.
- To prevent HCA infections: ventilate properly, central lines, wash hands, immunize, & surgical care procedures. Providing safe practices for surgery, i.e., informing patient of risks, taking measures to prevent errors, and using prophylactic treatments to prevent complications. Providing procedures/ongoing assessment to prevent adverse events, such as pressure ulcers, thromboembolism/DVT, allergic reactions, or anticoagulation complications.
Discuss administrative computer related policies.
A healthcare facility must have a policy regarding computer system use. This policy should be discussed during the orientation process and before the employee is allowed to access the computer system. The policy should outline the regulations pertaining to client confidentiality, ethical use of computers, and the disciplinary actionS that will be taken against employees who do not adhere to the policy. Many organizations insist that staff members sign an agreement (which states that system misuse can result in disciplinary action) before system access instructions. System access is usually achieved by entering a user name and password. Security measures may include setting the complexity of the password and the password change intervals.
Discuss adult learning theories: Theory of adult development developed by Robert Peck.
In his theory of adult development, Robert Peck expanded on Eric Erikson’s stages of adult development, believing that there were seven important tasks required during the last two stages of life.
In middle age:
- Mental flexibility vs. mental rigidity
- Valuing wisdom vs. physical powers
- Socializing vs. sexualizing
- Cathectic (libidinal energy) flexibility vs. cathectic impoverishment
Negative outcomes lead to weak relationships, inflexibility, and resistance to change.
Positive outcomes lead to strong relationships, flexibility in lifestyle, and adaptability to change.
In older adulthood:
- Ego differentiation vs. work role preoccupation
- Body transcendence vs. body preoccupation
- Ego transcendence vs. ego preoccupation
Negative outcomes lead to loss of identity after retirement, depression, inability to accept bodily or functional changes, and fear of death.
Positive outcomes lead to meaningful life after retirement, acceptance of bodily or functional changes, acceptance of death, and feeling that life has been good.
Discuss adult learning theories: Theory of adult development developed by Robert Havighurst.
Robert Havighurst, in his theory of adult development, stated that there were a number of tasks that needed to be accomplished during each stage of development and that remaining active is important. His adult stages reflect stereotypical roles to some degree related to the 1960s when marrying young was more typical than now.
Early adulthood: Tasks include finding a mate, marrying, having children, managing a home, getting started in an occupation or profession, assuming civic responsibility, and finding a congenial social group.
Middle age: Tasks include achieving civic & social responsibility, maintaining an economic standard of living, raising teen-agers & teaching them to be responsible adults, developing leisure activities, accepting physiological changes related to aging, & adjusting to aging of parents.
Older adulthood: Tasks include adjusting to a decrease in physical strength and health, death of a spouse, life in retirement, and reduced income. Other tasks include establishing ties with those in the same age-group (senior citizen’s groups/retirees), meeting social and civic obligations, and establishing physical living arrangements that are satisfactory.
Discuss adult learning theories: Theory of andragogy developed by Malcolm Knowles.
Malcolm Knowles developed the theory of andragogy in relation to adult learners, who are more interested in process than in information and content. Knowles outlined some principles of adult learning and typical characteristics of adult learners that an instructor should consider when planning strategies for teaching parents, families, or staff.
Practical & goal-oriented:
- Provide overviews or summaries and examples,
- Use collaborative discussions with problem-solving exercises.
- Remain organized with the goal in mind
Self-directed:
- Provide active involvement, asking for input.
- Allow different options toward achieving goals.
- Give them responsibilities
Knowledgeable:
- Show respect for their life experiences or education.
- Validate their knowledge and ask for feedback.
- Relate new material to information with which they are familiar.
Relevancy-oriented:
- Explain how information will be applied,
- Clearly identify objectives
Motivated:
• Provide certificates of achievement or some type of recognition for achievement.
Discuss adult learning theories: Bloom’s taxonomy developed by Benjamin Bloom.
Bloom’s taxonomy developed by Benjamin Bloom outlines behaviors that are necessary for learning, and this can apply to health care. The theory describes three types of learning:
Cognitive: (Learning and gaining intellectual skills are used to master six categories of effective learning.)
- Knowledge Comprehension
- Application
- Analysis
- Synthesis Evaluation
Affective: (Recognizing five categories of feelings and values from simple to complex is slower to achieve than cognitive learning.)
- Receiving phenomena: accepting the need to learn
- Responding to phenomena: taking an active part in care
Valuing: under-standing the value of becoming independent in care
- Organizing values: understanding how surgery or treatment has improved life
- Internalizing values: accepting condition as part of life; being consistent and self-reliant
Psychomotor: (Mastering six motor skills necessary for independence follows a progression from simple to complex.)
- Perception: uses sensory information to learn tasks
- Set: shows willingness to perform tasks
- Guided response: follows directions
- Mechanism: does specific tasks
- Complex overt response: displays competence in self-care
- Adaptation: modifies procedures as needed
- Origination: creatively deals with problems
Discuss adult learning theory: Theory of social learning developed by Albert Bandura.
In the 1970s, Albert Bandura proposed the theory of social learning, in which l_earning develops from observation, organizing, and rehearsing behavior that has been modeled_. Bandura believed that people were more likely to adopt the behavior if they valued the outcomes, if the outcomes had functional value, and if the person modeling had similarities to the learner and was admired because of status. Behavior is the result of observation of behavioral, environmental, and cognitive interactions. There are four conditions required for modeling:
- Attention: The degree of attention paid to modeling depends on many variables (e.g., physical, social, environmental}.
- Retention: A person’s ability to retain models depends on symbolic coding, creating mental images, organizing thoughts, and rehearsing (mentally or physically).
- Reproduction: The ability to reproduce a model depends on physical and mental capabilities.
- Motivation: Motivation may derive from past performances, rewards, or vicarious modeling.
Discuss applying current research findings to practice: Model of integration.
Integrating the results of data analysis and research into performance improvement or best practice guidelines varies from one organization to another, depending on the model of integration that the organization uses:
- Organizational: Processes for improvement are identified, and teams or individuals are selected to participate in different areas or departments, reporting to one individual, who monitors progress.
- Functional/coordinated: While staff specialties, such as risk management and quality management, are not integrated, they draw from the same data resources to determine issues related to quality of care and efficiency.
- Functional/integrated: While staff specialties remain, there is cross-training among specialties. A case management approach to individual care is used so that one person follows the progress of a patient through the system and coordinates with the various specialties, such as infection control and quality management.
Discuss audit trails.
Audit trails are records of activity related to systems and applications, users’ access, and use of systems and applications. One system may employ a number of different audit trails. Audit trails are a security tool that allows administrators to track individual users, identify the cause of problems, note data modification and misuse of equipment, and reconstruct computer events. Audit trails can also indicate penetration or attempted penetration. Audit trails include event records and keystroke monitoring, which shows each keystroke entered by a user and the electronic response.
- Audit trails at the system level generally record any logins, including identification, date, and time, devices used, and functions.
- Audit trails at the application level monitor activity within the application, including opened files, editing, reading, deleting, and printing.
Audit trails for users include all activities by the user, such as commands, accessed files, and deletions.
Discuss benchmarking: External benchmarking and internal trending.
External benchmarking involves analyzing data from outside an institution, such as monitoring national rates of hospital-acquired infection, and comparing them to internal rates. In order for this data to be meaningful, the same definitions must be used as well as the same populations or effective risk stratification. Using national data can be informative, but each institution is different; thus, relying on external benchmarking to select indicators for infection control, for example, can be misleading. Additionally, benchmarking is a compilation of data that may vary considerably if analyzed individually; it can be further compromised by anonymity, making comparisons difficult.
Internal trending involves comparing internal rates of one area or population with another, such as infection rates in intensive care units and general surgery; while this can help to pinpoint areas of concern within an institution, making comparisons is still problematic because of inherent differences. Using a combination of external and internal data can help to identify indicators.
Discuss benchmarking: Xerox Corporation’s 10-step benchmarking model.
Benchmarking is an ongoing process of measuring practice, service, or product results against competitors or industry standards. The Xerox Corporation developed the 10-step benchmarking model. This model compares an organization’s efficiency with that of others and searches for improvements. The 10-step process moves through four phases: planning, analysis, integration, and action. The steps include the following:
- Identify benchmark targets.
- Identify organizations/units/providers with which to compare data.
- Determine and initiate methods of data collection.
- Evaluate current performance level and deficits.
- Project vision of future performance.
- Communicate findings and reach group agreement.
- Recommend changes based on benchmark data.
- Develop specific action plans for objectives.
- Implement actions and adjust as necessary based on monitoring of process.
- Update benchmarks based on latest data.
This basic benchmarking model is often modified to a 7 to 11 step process, depending on the needs of the organization. Benchmarking is often used to improve cash flow as health care becomes more competitive or to compare infection rates.
Discuss change theory developed by Kurt Lewin and modified by Edgar Schein.
Change theory was developed by Kurt Lewin and modified by Edgar Schein. This management theoiy is based on three stages:
- Motivation to change (unfreezing): Dissatisfaction occurs when goals are not met, but as previous beliefs are brought into question, survival anxiety occurs. Sometimes, however, anxiety about having to learn different strategies causes resistance that can lead to denial, blaming others, and trying to maneuver or bargain without real change.
- Desire to change (unfrozen): Dissatisfaction is strong enough to override defensive actions. The desire to change is strong but must be coupled with identification of needed changes.
- Development of permanent change (refreezing): The new behavior that has developed becomes habitual, often requiring a change in perceptions of self and establishment of new relationships.
Discuss change theory: Theory of planned behavior developed by Icek Ajzen.
The theory of planned behavior, developed by Icek Ajzen, evolved from the theory of reasoned action in 1985 when studies showed that behavioral intention does not necessarily result in action. The theory of planned behavior is more successful in predicting behavior. To the basic concepts of attitudes, subjective norms, and behavioral intentions encompassed by the earlier theory, Ajzen added the concept of perceived behavioral control, which relates to the individual’s attitudes about self-efficacy and outcomes. Ajzen’s theory shows that beliefs are central:
- Behavioral beliefs lead to attitudes toward a behavior or action.
- Normative beliefs lead to subjective norms.
- Control beliefs lead to perceived behavioral control.
All of these beliefs interact to influence intention and action. Basically, this theory relates to the person’s confidence, based on beliefs and social influence of others, that he or she can actually do an action and that the outcome of this action will be positive. This theory considers the power of emotions—such as apprehension or fear—when predicting behavior.
Discuss change theory: Theory of reasoned action developed by Martin Fishbein and Icek Ajzen.
The theory of reasoned action, developed in 1975 by Martin Fishbein and Icek Ajzen, is based on the premise that the actions people take voluntarily can be predicted, according to their personal attitude toward the action and their perception of how others will view their doing the action. There are three basic concepts to the theory:
- Attitudes: These are all of the attitudes about an action, and they may be weighted (i.e., some may be more important than others).
- Subjective norms: People are influenced by those in their social realm (e.g., family, friends) and their attitudes toward particular actions. The influence may be weighted (e.g., the attitude of a spouse may carry more weight than the attitude of a neighbor).
3 . Behavioral intention: The intention to take action is based on weighing attitudes and subjective norms (opinions of others), resulting in a choice to either take an action or avoid an action.
Discuss cloud computing and its implications for healthcare.
Cloud computing is using the internet to store and access files as opposed to a business network or a computer hard drive. Cloud computing has dramatically increased by healthcare organizations in the past years, likely associate with health care reform giving financial incentives for providers and organizations that use electronic medical records and electronic health records (EHR). Health care organizations are also using the cloud to store information that is not EHR related at rapidly increasing numbers. The benefits to using the cloud include multiple providers being able to access the records at the same time from many different locations, increasing collaboration and decreasing healthcare costs. The major disadvantages focus on privacy concerns, as patient’s personal health information is being stored on the internet, making it susceptible to cybercriminals. As the health care industry moves to new and alternative solutions to satisfy the “meaningful use” clause given by the Centers for Medicare and Medicaid Services, cloud providers are coming up with new agreements to protect private information, thereby becoming more attractive to healthcare organizations.
Discuss cognitive science: Cognitive flexibility developed by Rand J. Spiro, Paul J. Feltovitch, and Richard L. Coulson.
The theory of cognitive flexibility, focusing on the use of interactive technology, such as computerized programs, was developed by Rand J. Spiro, Paul J. Feltovitch, and Richard L. Coulson. The theory recognizes the complexity and flexibility of learning and suggests that information must be presented in a variety of perspectives and that materials and presentations must be context specific. According to this theory, the primary factor in learning is the ability of the person to construct knowledge. Basic concepts include:
- Providing multiple and varying presentations of content, including technological presentations (computerized) as well as input from instructors or experts, who can facilitate learning.
- Avoiding oversimplification of content and ensuring that information relates to context.
- Building knowledge rather than transferring information. Learners must interact with the material, such as responding to questions or formulating hypotheses based on information presented, to construct their own conclusions.
- Interconnecting instructional sources.
Discuss cognitive science: Psychosocial development model developed by Eric Erikson.
Eric Erikson’s psychosocial development model covers the life span, focusing on conflicts at each stage and the virtue that is the outcome of finding a balance in the conflict. The first five stages relate to infancy and childhood and the last three stages to adult-hood, but childhood development affects later adult development:
Discuss cognitive science: Theory of cognitive development developed by Jean Piaget—Sensorimotor Stages III and IV (4 months to 12 months of age).
Jean Piaget’s theory of cognitive development discusses how children assimilate new experiences and deal with them through accommodation. Piaget believed children go through stages of development beginning with sensorimotor, which has six substages.
Stage: III
Age: 4-8 months of age
Description: There is an intensification of stage II, with children developing a sense of causality, time, and personal separateness. They begin to imitate and show different affects. They develop a sense of object permanence between 6 and 8 months (secondary circular reactions).
Stage: IV
Age: 9-12 months of age
Description: This is a transitional stage with age further intellectual development, including understanding that a hidden object is not gone. Children begin to behave with intention, to associate words and symbols (bye-bye) with events, and attempt to climb over obstacles.
Discuss cognitive science: Theory of cognitive development developed by Jean Piaget—Preoperational, concrete, and formal operational, 2 years of age to adult.
Jean Piaget’s theory of cognitive development includes sensorimotor stage (0-24 months of age) and three additional stages:
Stage: Preoperational
Age: 2-7 years
Description: From 2-4 years of age, during the preconceptual substage, chlidren use language and symbols, have poor logical ability, and show egocentrism. From 4-7 years of age, during the intuitive substage, children establish a concept of cause and effect, but it may be faulty because of transductive reasoning. They may engage in magical thinking, centration, and animism.
Stage: Concrete operational
Age: 7-11 years
Description:Cause and effect is better understood, and children understand concrete objects and the concept of conservation.
Stage: Formal operation
Age: 11 years of age to adult
Description: Children exhibit mature thought processes and the ability to think abstractly. Children and young adults can evaluate different possibilities and outcomes.
Discuss cognitive science: Theory of cognitive development developed by Jean Piaget—Sensorimotor Stages I and II (birth to 4 months of age).
Jean Piaget’s theory of cognitive development discusses how children assimilate new experiences and deal with them through accommodation. Piaget believed children go through stages of development, beginning with sensorimotor, which has six substages.
Stage: I
Age: 0-1 month
Description: Reflexes (sucking, rooting, grasping, crying) are primary.
Stage: II
Age: 1-4 months
Description: Reflexive behavior is replaced by voluntary behavior, recognizing a stimulus and a response (primary circular reactions).
Discuss cognitive science: Theory of cognitive development developed by Jean Piaget—Sensorimotor Stages V and VI (13 months to 24 months of age).
Jean Piaget’s theory of cognitive development discusses how children assimilate new experiences and deal with them through accommodation. Piaget believed children go through stages of development, beginning with sensorimotor, which has six substages.
Stage: V
Age: 13-18 months of age
Description: Newly acuqired motor skills allow children to experiment and demonstrate the beginning of rational judgment and reasoning. children further differentiate themselves from objects, understand cause and effect, but have little transfer ability. Children gain spatial awareness (tertiary circular reactions).
Stage: VI
Age: 18-24 months
Description: Preparation for more complex intellectual activiities. Children understand object permanence, begin to use language, and engage in domestic mimicry and sex-role behavior. They have some sense of time, but time is exaggerated.
Discuss cognitive science: Theory of cognitive dissonance developed by Leon Festinger.
Leon Festinger’s theory of cognitive dissonance states that individuals attempt to escape dissonance and try to avoid inconsistencies between their beliefs and actions. If dissonance occurs, then beliefs and ideas are more likely to change than actions or behavior. Dissonance can be resolved by understanding and attaching less importance to dissonant beliefs, seeking beliefs that are more consonant to outweigh those that are dissonant, or changing beliefs to avoid inconsistencies. Dissonance is especially a concern when the individual is faced with choices and decision-making. Because people want to avoid dissonance, they may avoid individuals or situations in which dissonance occurs. A cognition is considered a piece of knowledge. When faced with dissonance, the person can:
- Change one cognition to match others, or change all to bring them in line.
- Eliminate one cognition, or add more to bring about consonance.
- Alter the importance of cognitions
Discuss cognitive science: Theory of multiple intelligences developed by Howard Gardner.
Howard Gardner developed the theory of multiple intelligences, which states that there are at least seven categories of “intelligence” that people use to comprehend the world and to learn. Gardner proposed that teaching that engages multiple intelligences is more effective than teaching focused primarily on linguistic or logical and mathematical intelligences (those most commonly addressed in education). Students should be assessed to determine the strengths of their personal intelligence, and teaching should address the student’s preferences.
- Linguistic intelligence is the ability to use and understand written or spoken language.
- Logical/mathematical intelligence is the ability to use deductive and inductive reasoning, numbers, and abstract thinking.
- Spatial intelligence is the ability to visualize and comprehend spatial dimensions.
- Bodily/kinesthetic intelligence is the ability to control physical action.
- Musical intelligence is the ability to create and appreciate musical forms.
- Interpersonal intelligence is the ability to communicate and establish relationships with others.
- Intrapersonal intelligence is the ability to use self-knowledge and to be self-aware.
Discuss cognitive science: Attribution theory developed by Bernard Weiner.
Bernard Weiner developed the cognitive theory known as attribution theory, which focuses on explaining behavior. Weiner suggested that people attempt to attribute cause to behavior, based on three-stages, which include:
1 . Observing behavior.
- Determining that the behavior is intentional.
- Attributing the behavior to internal or external causes.
According to this theory, there are four factors to which achievement can be attributed:
1 . Individual effort
2 . Ability
- Difficulty of task
4 . Good or bad luck
People often view their own achievement as the result of effort and ability and the achievements of others as the result of luck. By the same token, people may view personal failures as the result of bad luck and the failure of others as the result of lack of effort or ability. Attributions are classified according to three factors:
- Locus of control (internal/external)
- Stability of causes for behavior
- Ability to control causes
Discuss communication skills needed for leading intra- and interdisciplinary teams.
A number of communication skills are needed to lead and facilitate coordination of intra- and interdisciplinary teams, such as the following:
- Communicating openly is essential with all members encouraged to participate as valued members of a cooperative team.
- Avoiding interrupting or interpreting the point another is trying to make allows free flow of ideas.
- Avoiding jumping to conclusions as this can effectively shut off communication.
- Active listening requires paying attention and asking questions for clarification rather than challenging the ideas of others.
- Respecting the opinions and ideas of others, even when they are opposed to one’s own, is absolutely essential.
- Reacting and responding to facts rather than feelings allows one to avoid angry confrontations or diffuse anger.
- Clarifying information or opinions stated can help avoid misunderstandings.
- Keeping unsolicited advice out of the conversation shows respect for others and allows them to solicit advice without feeling pressured.
Discuss communication theories: Communication accommodation theory developed by Howard Giles and cultivation theory developed by George Gerbner.
Howard Giles developed the communication accommodation theory (CAT) to explain why people alter their communication styles. Individuals may practice convergence, modeling the communication style (i.e., accent, dialect, vocabulary) after the other if seeking approval, or may practice divergence, intentionally using differences in communication to emphasize social differences. Components of CAT include the following:
- Context (social and historical) influences communication.
- Accommodative orientation includes three factors: personality, positive or negative feelings, and understanding areas of conflict.
- Immediate communication is affected by social and political states, motivations, goals, convergence, divergence, linguistic choices, and attributions.
George Gerbner developed the cultivation theory to explain the effect media, primarily television, have on cultivating ideas and beliefs related more to the media than to the real world. Gerbner believed that media cultivate beliefs that already exist but spread these beliefs through society, thus affecting people’s belief systems and perceptions of reality.
Discuss communication theories: Social exchange theory by George C. Homans, John Thihaut, and Harold Kelley; social penetration theory by Irwin Altman and Dalmas Taylor; spiral of science theory by Elisabeth Noelle-Neuman; and face-negotiation theory by Stella Ting-Toomey.
Social exchange theory developed by George C. Homans, John Thibaut, and Harold Kelley, describes communication as an exchange system in which people attempt to negotiate a return on their “investment” in much the same way that people engage in commerce. Those involved in communication seek a balance between investment and return.
Social penetration theory, developed by Irwin Altman and Dalmas Taylor, describes the manner in which people use communication to develop closeness to others, proceeding from superficial communication to more explicit self-disclosure, which causes vulnerability but allows for a closer relationship.
Spiral of science theory, developed by Elisabeth Noelle-Neuman, looks at the role mass media has in influencing communication and suggests that people fear isolation so that they conform to public opinion as espoused by mass media and mute dissent.
Face-negotiation theory developed by Stella Ting-Toomey assumes that all cultures are concerned with maintaining face, and this affects conflict resolution. The theory encompasses the concepts of “positive face” and “negative face” and suggests that people in individualistic cultures are likely to be less compromising than those in collectivist cultures.
Discuss conflict resolution.
Conflict is an almost inevitable product of teamwork, and the leader must assume responsibility for conflict resolution. While conflicts can be disruptive, they can produce positive outcomes by forcing team members to listen to different perspectives and opening dialogue. The team should make a plan for dealing with conflict resolution. The best time for conflict resolution is when differences emerge but before open conflict and hardening of positions occur. The leader must pay close attention to the people and problems involved, listen carefully, and reassure those involved that their points of view are understood. Steps to conflict resolution include:
- Allow both sides to present their side of conflict without bias, maintaining a focus on opinions rather than individuals.
- Encourage cooperation through negotiation and compromise.
- Maintain the focus, providing guidance to keep the discussions on track and avoid arguments.
- Evaluate the need for renegotiation, formal resolution process, or third party.
- Utilize humor and empathy to diffuse escalating tensions.
- Summarize the issues, outlining key arguments.
- Avoid forcing resolution if possible
Discuss developing informatics competencies: End-users and informatics staff.
Developing informatics competencies among end-users and informatics staff requires intensive and comprehensive training and institutional support. A variety of different training procedures, such as one-on-one or instructor-led classrooms, may be used. Training should include the following:
- Policies regarding computers, including privacy issues, penalties, and failure to comply with policies
- Access policies and issues regarding misuse (e.g., viewing nonauthorized materials)
- Preimplementation steps to prepare end-users for changes and to inform and educate informatics staff
- Basic computer literacy information
- Workflow diagrams outlining changes occurring with transition from manual to automatic systems
- Scenarios with step-by-step instructions
- Access and use of help documents and online tutorials
- Generation of error messages, including avoidance and error correction
- Causes of screen & system freezing and troubleshooting methods
- Elements specific to the organization’s system
- Maintenance and troubleshooting for hardware and software
- Methods of information retrieval
- Managing downtimes (both scheduled and nonscheduled) and backup systems
Discuss developing teaching materials and resources: Classroom response systems.
Electronic classroom response systems (CRS) include the use of clickers to respond to questions or educational content. For example, if an instructor asks the class a question, all students can answer with the clicker, which beams responses wirelessly to a computer, so the instructor can immediately determine if the students understood the question and responded appropriately. This is especially valuable in large groups where quiet students [or those in the back) may have little input into discussions. Additionally, responses can be projected from the computer onto a screen and, in some cases, graphed, so that students are able to see the results of the questions visually. One major advantage to the clicker is that those who might be afraid to answer or unsure can do so privately. Students using clickers often remain more actively engaged in the learning process.
Discuss developing teaching materials and resources: Electronic and audiovisual materials.
There are a number of issues that must be considered when teaching a course and determining the appropriate audiovisual and handout materials. The physical environment is a major consideration, especially when using electronic and audiovisual materials.
- First, everyone in the room must be able to hear and see. In a small room, a television or computer screen may suffice, but in a large space, a projection screen must be used.
- Another issue is lighting. Some projectors have low resolution and the lights need to be turned off, dimmed, or windows covered. Turning lights on and off a dozen times during a presentation can be very distracting. A small portable light at a speaker podium or an alternate presentation can be used.
- Text size for presentations is another issue: PowerPoint or other presentations that include text must be of a sufficient font size to be read from the back of the room.
Discuss developing teaching materials and resources: Help tools.
A variety of help tools are available for education, including the following:
- Learning aids: Questions, guides, maps, pictures, charts, illustrations, outlines, or diagrams can be used to support lecture or computer-based training.
- Web tools: These can include websites that provide specific .educational content and information updates, such as the Skin Care Network at NursingCenter.com (Lippincott), and interactive websites. Additionally, chat tools and message boards may provide valuable support for students.
- Software applications: Software is available for training on almost every health care topic and usually includes interactivity and audiovisual presentations. Many applications are available for portable devices as well.
- Books: Many books are now available in electronic versions, making access less expensive and more easily transported.
- Multimedia: Compact discs, DVDs, and streaming videos combine sound and images with hardware/software to deliver educational content.
Discuss developing teaching materials and resources: Hospital information system.
The hospital information system (HIS) can provide real practice for students and trainees using hardware and software programs that they will need when caring for patients. Nursing students can use HIS to generate care plans and do mapping rather than doing this in the traditional time-consuming paper method. The students and trainees should be able to access fictitious patient files and retrieve and enter information, but security must be in place to prevent access to actual patient files for training purposes as this violates the Health Insurance Portability and Accountability Act (HIPAA) regulations. Additionally, existing staff, such as nurse managers, should be taught how to access data from patient census records and electronic health records (EHRs) to plan staffing, organize care, and promote patient safety. Any training involving HIS and EHR must review HIPAA regulations as well as methods to ensure data security and patient confidentiality.
Discuss developing teaching materials and resources: Selection.
It is impractical to believe that the nurse can produce all teaching materials and resources, but careful consideration must be given to the selection process.
- Price ranges from free to hundreds or even thousands of dollars for educational materials, which may be handouts, videos, posters, or entire courses or series of courses available online. The nurse must first consider the budget and then look for material within those monetary constraints. Government agencies, such as the Centers for Disease Control, often have posters and handouts as well as PowerPoint presentations and videos available for download online at no cost.
- Quality varies considerably as well. The nurse should consider the goal and objectives before choosing materials, and the materials should be evaluated to determine if they cover all needed information in a clear and engaging manner.
- Currency must be considered as well. If material will soon be outdated because of changes in regulations, then it will have to be replaced.
Discuss developing teaching materials and resources: Videos, videoconferencing, and teleconferencing.
Videos are a useful adjunct to teaching as they reduce the time needed for one-on-one instruction (increasing cost-effectiveness). Good-quality videos can be expensive to produce, although commercial products are available. Passive presentation of videos, such as in a waiting area, has limited value, but focused viewing in which the educator discusses the purpose of the video presentation before viewing and then is available for discussion after viewing can be very effective. Videos are also effective tools for demonstrating patient care techniques, such as wound care. Additionally, videos can be placed on course or learning management systems for anytime access. Providing focused questions for use during the video presentation helps increase retention by keeping active involvement.
Videoconferencing and teleconferencing allow for audiovisual collaboration at a distance and can be a valuable tool for education, providing access to experts without the transportation costs. In teleconferencing, students may be at multiple sites while interacting with each other and an instructor.
Discuss developing teaching materials and resources: Written handouts and paper materials.
Written handouts or other paper materials are a fixture in classes, but many end up in the wastebasket without ever being used; thus, thought should be given to what useful information should be in the handouts:
- Handouts that simply copy a PowerPoint presentation or repeat everything in the presentation are less helpful than those that summarize the main points.
- Giving out handouts immediately before a discussion ensures that most of the class will be looking at the handout instead of the speaker. Thus, handouts should be placed in a folder or binder and passed out before the class meets so students can peruse them in advance; for example, handouts can be passed out at the end of class in preparation for the next class.
- Handouts can be used to provide guidance or worksheets for smallgroup discussions.
- Posters (with drawings or pictures) that can be placed on bulletin boards are useful.
- Handouts should be easily readable and not smudged copies of newspaper articles or small print text.
Discuss development of policies
The development of policies must be based on best practices and conform to state, federal, and accreditation regulations and guidelines. Empowerment includes encouraging participation of all staff in policy making. Objectives for policies should be clearly outlined. In some cases, policies may be broad and cover all aspects of an organization, but in other cases, policies may be much more specific, such as a policy regarding use of computer equipment. Conflict of interest policies should be in place to ensure that those involved in review activities should not be primary caregivers or have an economic or personal interest in a case under review. Policies should ensure that access to protected health information be limited to those who need the information to complete duties related to direct care or performance improvement review activities. Policy and procedure manuals should be readily available organization-wide in easily accessible format, such as online. Policy issues may include cost-effectiveness, insurance coverage, criteria for qualified staff, and legal implications.
Discuss documentation of quality indicators.
The Agency for Healthcare Research and Quality (AHRQ) provides software (current version 4.4) that allows tracking and documentation of quality indicators (QIs); this software and focus on QIs can be integrated into the information system so that data can be easily accessed. The QI software programs of AHRQ include:
- SAS, which uses SAS/STAT statistical software (which is commercially available).
- Windows, which has a GUI and uses a SQL Server (which has a free version).
MONAHRQ, which facilitates development of a website for health care reporting, including data regarding quality of care, use, preventable hospitalizations, and rates for different conditions and procedures (free to federal, state, and local organizations). MONAHRQ is especially valuable for documenting QIs and providing access to consumers and health care providers because it is easy to use by downloading, inputting the organization’s data, selecting options related to websites, and creating a website.
Discuss downtime forms.
Downtime forms are used for record-keeping when the information system has scheduled or unscheduled downtime. Policies should be in place stating when use of downtime forms should begin (often after 1 hour). Downtime forms should be readily available at the point of care and correspond as much as possible to the screen presentations in the information system so that information can be easily entered when the system is back up. Screenshots may provide helpful guides when creating downtime forms but are usually not flexible enough for accurate record-keeping. Each department may have different downtime forms, depending on functions. Some systems have print options for forms, and these should be preprinted and ready for use. Forms should be up-to-date and contain correct coding (e.g., current procedural terminology codes) when applicable. Print medication records should contain allergy information.
Discuss educational technologies: High- and low-fidelity simulations.
High-fidelity simulations are those that use real or realistic equipment and materials as part of learning. This can include electroencephalogram machines, mannequins, or specialized equipment used in the work environment, so that learners can actually practice the tasks or procedures that they will carry out as part of their job. High-fidelity simulations are often the most helpful for the learner but are also the most costly because equipment may need to be dedicated for learner use. Additionally, training that involves practice and assessment of performance is often more time-consuming.
Low-fidelity simulations rely on verbal, print, video, or audio descriptions and often involve discussion of potential actions rather than actual practice. Thus, learners may be presented with a case study or scenario with specific problems and asked to describe the process for dealing with the problems. Lowfidelity simulations are less expensive and can usually be completed more quickly, but evaluation may not adequately measure clinical expertise.
Discuss educational technologies: Virtual reality.
Virtual reality involves participation in computer-simulated environments in which the participant often has an avatar, a visual representation of the person. Virtual-reality systems may be only viewed on the screen or may require use of special equipment, such as a wired glove or special stereoscopic goggles. Tactile information (force feedback) is also available in some applications, such as those used in medicine. The virtual reality simulation allows the person to interact and have a life-like experience in a learning environment. Virtual reality may be used to practice medical techniques, such as dissection or insertion of intravenous lines or catheters. Virtual reality systems are also used as part of therapy in some instances, such as for treatment of phobias. Second Life is a virtual online world that has been incorporated into health care educational programs, allowing students to interact in medical communities. For example, the Centers for Disease Control (CDC) have a Second Life site that provides information to “visitors” about the CDC.
Discuss Federal regulations pertaining to security and privacy: Health Information Technology for Economic and Clinical Health Act.
The American Recovery and Reinvestment Act of 2009 included the Health Information Technology for Economic and Clinical Health Act (HITECH). HITECH provides incentive payments to Medicare practitioners (usually physicians] to adopt electronic health records (EHRs). EHRs must be certified and meet the requirement for “meaningful use.” Additionally, HITECH provides penalties in the form of reduced Medicare payments for those who do not adopt EHRs, unless exempted by hardship (e.g., rural practices). Security provisions include the following:
- Individuals and Health and Human Services must be notified of a breach in security of personal health information.
- Business partners must meet security regulations or face penalties.
- The sale or marketing of personal health information is restricted.
- Individuals must have access to electronic health information.
- Individuals must be informed of disclosures of personal health information.
HITECH also provides matching grants to institutes of higher education and funding for training for health information technology, promotes research and development of health information technology, and provides grants to the Indian Health Services for adoption of health Internet technology.
Discuss four major threats to computer systems.
There are four main categories of threat to a computer system. These threats can incapacitate a computer system for a short or very long time, depending on their severity:
- Environmental disasters can be either natural or man-made. Natural disasters include blizzards, earthquakes, epidemics, floods, tornadoes, and hurricanes. Man-made environmental disasters include: chemical contamination, power outages, accidents when hardware is being transported, and toxic fumes.
- Human error is one of the major causes of problems with a computer system. Human error includes overwriting files, accidentally deleting files, and overloading the system with unnecessary programs.
- Human mischief includes theft, malicious programs, terrorism, and cybercrime. Since the attacks of September 11, 2001, organizations have also had to include potential loss of large numbers of information system employees in their disaster planning scenarios.
- Equipment failure includes disconnected wiring, CPU crashes, and monitor failure.
Discuss implications of health care reform.
Health care reform initiatives are spurring the switch from paper to electronic health records and sharing of health care information among health care providers, increasing the demand for health information technology and people with expertise in informatics. New programs have been developed to focus on wellness with an increased emphasis on cost-effective measures because of increases in health costs. Internal data analysis and research are becoming important means by which to identify waste, institute best practices, and reduce costs. Increasing numbers of people are covered by health plans, even those with preexisting conditions, placing more demand on health care providers for services. There is an increased need for health literacy so that people are better informed about the services available, especially those newly insured. Medicaid costs have increased, resulting in some cutbacks in care. Early transfer from acute care facilities to extended care or home health care is also increasing.
Discuss Information science: Information theory developed by Claude Shannon.
Claude Shannon devised the information theory in 1948, which is used to determine the effectiveness of communication systems, especially related to compressing, transmitting, and storing data. Shannon identified problems that required solutions. The essential factors in a system of communication include the source of power, the bandwidth, the noise, and the decoder/receiver. Information is carried by symbols, such as words or codes. The three steps involved in communication include encoding a message (e.g., bits, words, icons), transmission through a channel of communication (e.g., voice, radio, computer), and decoding when reaching a destination. Note that signal-to-noise indicates the ratio between a signal’s magnitude and interfering “noise” magnitude. Another element is channel capacity, which determines the amount of information that can be transmitted with the smallest rate of error. Entropy refers to the amount of energy, code, or bits, required to communicate or store one symbol in the communication process. The lower the entropy, the more efficient the process of communication.
Discuss integrating the results of data analysis
Integrating the results of data analysis is necessary; attempting performance improvement and developing practice guidelines without data can be problematic. These data should be used not only as the basis for long-term strategic planning but also for identifying opportunities for performance-improvement activities on an ongoing basis. Integration of information includes:
- Identifying issues for tracking.
- Reviewing patterns and trends to determine how they impact care.
- Establishing action plans and desired outcomes based on the need for improvement.
- Providing information to process improvement teams to facilitate change.
- Evaluating systems and processes for follow-up.
- Monitoring specific cases, criteria, critical pathways, and outcomes. The integration of information should assist with case management, decision-making about individual care, improvement of critical pathways related to clinical performance, staff performance evaluations, credentialing, and privileging.
Discuss integration of key quality concepts within the organization.
There are a number of key concepts related to quality that must be communicated to ail members of an organization through inservice, workshops, newsletters, fact sheets, and team meetings. Quality care/performance should be:
- Appropriate to needs and in keeping with best practices.
- Accessible to the individual despite financial, cultural, or other barriers.
- Competent, with practitioners well-trained and adhering to standards.
- Coordinated among all healthcare providers.
- Effective in achieving outcomes based on the current state of knowledge.
- Efficient in methods of achieving the desired outcomes.
- Preventive, allowing for early detection and prevention of problems.
- Respectful and caring with consideration of the individual needs given primary importance.
- Safe so that the organization is free of hazards or dangers that may put patients or others at risk.
Discuss interpersonal communication skills: Team building.
Leading, facilitating, and participating in performance improvement teams require a thorough understanding of the dynamics of team building:
- Initial interactions: This is the time when members define their roles and develop relationships, determining if they are comfortable in the group.
- Power issues: The members observe the leader and determine who controls the meeting and how control is exercised; alliances begin to form.
- Organizing: Methods to achieve work are clarified, and team members begin to work together, gaining respect for each other’s contributions and working toward a common goal.
- Team identification: Interactions often become less formal as members develop rapport, and members are more willing to help and support each other to achieve goals.
- Excellence: This develops through a combination of good leadership, committed team members, clear goals, high standards, external recognition, spirit of collaboration, and a shared commitment to the process.
Discuss issues related to the fair distribution of health information access.
The fair distribution of health information access information specific to the individual (e.g., electronic health records), data (both aggregate and comparative), and knowledge-based information (e.g., journals, websites). While people should have access to health information, considerations must include the right to privacy, regulations regarding intellectual property, and equitable access to information. One problem with access is that many people are unaware of their rights or lack the training or tools to access information, so an important element of fair distribution must include providing public means of access, such as in libraries and through public health agencies and education (e.g., posters, handouts, videos) to educate the general public. People in rural or isolated areas may lack access to basic care and health information but may be served by telehealth services, using telecommunications to provide information and Internet health resources.
Discuss legal implications: Malpractice and negligence.
Risk management must attempt to determine the burden of proof for acts of negligence, including compliance with duty, breaches in procedures, degree of harm, and cause as a finding of negligence can lead to a malpractice suit. Negligence indicates that proper care, based on established standards, has not been provided. State regulations regarding negligence may vary, but all have some statutes of limitation. There are a number of different types of negligence.
- Negligent conduct indicates that an individual failed to provide reasonable care or to protect/assist another, based on standards and expertise.
- Gross negligence is willfully providing inadequate care while disregarding the safety and security of another.
- Contributory negligence involves the injured parties contributing to the harm done .
- Comparative negligence attempts to determine what percentage of negligence is attributed to each individual involved.
Discuss legal implications: Liability.
With the marked increase in use of electronic health records (EHRs) has come increased concern regarding liability because the EHR documents all actions in real time. For example, if there is a delay between the time a patient event occurs and when the health care provider responds, the duration of time is documented in the record and cannot be altered. This can give the appearance of negligence even if the delay was unavoidable. Additionally, errors tend to increase with any major change, and there is a learning curve in adjusting to new technology, so information may be entered into EHRs incorrectly and a facility may be liable if it did not provide adequate staff education. Providers used to reports on paper may not access electronic reports in a timely manner. Hardware or software incompatibilities may cause information, such as medicine orders, to be altered or deleted. If health care providers provide patients access to them via e-mail or messaging and do not respond promptly to those messages, then they may be liable for malpractice.
Discuss legal implications: Patient data misuse.
Patient data misuse is an increasing problem with the rapid proliferation of electronic health records (EHRs). Types of misuse include:
- Identity theft: Health records often contain identifying information, such as Social Security numbers, credit card numbers, birthdates, and addresses, making patients vulnerable.
- Unauthorized access: Although EHRs and computerized documentation systems are password protected, providers sometimes share passwords or unwittingly expose their passwords when logging in, inadvertently allowing access to information about patients.
- Privacy violations: Even professionals authorized to access a patient’s record may share private information with others, such as family or friends.
- Security breaches: Data are vulnerable to security breaches because of careless, inadequate security, especially when various business associates, such as billing companies, have access to private information.