Nursing Informatics Quizzes (Lab)
Nursing Informatics Quizzes (Lab)
Nursing Informatics Quizzes (Lab)
For example, with the use of electronic documentation, Analysis of how and why the errors are occurring must be
identifying changes in patient status can occur quickly conducted.
because the information is readily available.
This allows you to quickly share the plan of care with your
CLINICAL INFORMATION SYSTEM patient.
Periodically return to the computer to check on laboratory
test results and document the care you deliver.
The computer screens and optional popup windows make it
All members of the inter professional health care team,
easy to locate information, enter and compare data, and
including nurse, physicians, pharmacists, social workers, and
make changes.
therapists, use programs available on Clinical Information
System(CIS).
NCISs have two designs. With an electronic and connected system in place, much of
that waste can be curbed. From lab results that reach their
reach their destination sooner improving better and more
1. The nursing process design timely care delivery to reduced malpractice claims, health
informatics reduces errors, increases communication drives
o is the most traditional efficiency where before there was costly incompetence and
More advanced systems incorporate standardized nursing obstruction
languages into the software such as:
3. Patient Participation
1. Dramatic Savings
When patients have electronic access to their own health
Health care isn‘t just expensive; its wasteful. It‘s estimated that history and recommendations, it empowers them to take their
half of all medical expenditures are squandered on account role in their own health care more seriously. Patients who
of repeat procedures, the expenses associated with more have access to care portals an able to educate themselves
traditional methods of sharing information, delays in care, more effectively about their diagnose and prognoses, while
errors in care of delivery and the like. also keeping better track of medications and symptoms.
They are also able to interact with doctors and nurses more patient may have with a team of people regarding care, and
easily, which yields better outcomes, as well. Informatics unless those conversations and efforts are made in tandem
allows individuals to feel like they are a valuable part of their with one another, problems will arise and care will suffer.
own health care team, because they are. Informatics makes the necessary coordination possible.
6. Improved Outcomes
4. The Impersonalization of Care
The most important way in which informatics is changing
One criticism of approaching patient care though health care is in improved outcomes. Electronic medical
information and technology is that care is becoming less records result in higher quality care and safer care as
becoming and less personal. Instead of a doctor getting to coordinated teams provide better diagnoses and decrease
know a patient in real time and space in order to best offer the chance for errors. Doctors and nurses are able to increase
care, the job of ―knowing‖ is placed on data algorithms efficiency, which frees up time to spend with patients, and
previously manual jobs and tasks are automated, which saves
As data gathered regarding a patient, algorithms can be time and money — not just for hospitals, clinics, and providers,
used to sort it in order to determine what is wrong and what but for patients, insurance companies, and state and federal
care should be offered. It remains to be seen what effects this governments, too.
data-driven approach will have over time, but regardless,
since care is getting less personal, having a valid and Health care is undergoing a massive renovation thanks to
accurate record that the patient and his care providers can technology, and informatics is helping to ensure that part of
access remains vital. the change results in greater efficiency, coordination, and
improved care.
5. Increased Coordination
In nursing informatics, there are different theories, which help to Concepts and Definition
frame and inform this discipline. This include the:
Input – Energy & raw Material (Ex. Information, Money,
o General systems theory, Energy, time)
o Change theory,
Throughput – processed used by the system to convert
o Cybernetics theory and the raw materials to products (Ex. Thinking , planning, Decision
o Cognitive learning theory making, constructing, meeting
In addition Output – The product or service from throughput
o Novice to Expert Theory and the Feedback – Information about some aspect of data or
o DIKW Theory also supports the framework of Nursing energy processing that can be used to evaluate and
Informatics. monitor the system
o All the theories support nursing informatics in different
Subsystem – A system which is a part of a larger system.
ways They can work parallel to each other or in a series with
Nursing practitioners can combine the knowledge they acquire each other
from the theories, with that they obtain from their nursing
Static System – Neither system elements nor the system
practice to enhance their performance. itself changes much over time in relation to the
1. General Systems Theory environment
Dynamic system – The system constantly changes the
Developed by biologist Ludwigvon Bertalanffy in 1936 environment & is changed by the environment
Includes purpose, content and process, breaking down the Closed systems – Fixed , automatic relationships among
―whole‖ and analyzing the parts system components no give or take with the environment
The relationships between the parts of the whole are Open Systems – Interacts with the environment trading
examined to learn how they work together energy & raw material for goods & services produced by
A system is made up of separate components. The parts rely the system
on one another, are interrelated, share a common purpose Boundary – The line or point where a system or subsystem
and together form a whole can be differentiated from its environment or from other
subsystems
Assumptions of General System Theory Goal – The overall purpose for existence or the desired
All systems must be goal directed outcomes. (mission statement)
A system is more than the sum of its parts Entropy – The tendency for a system to develop order &
A system is ever changing and any change in one part energy over time
affects the whole
Negantropy – the tendency of system to lose energy & 9. A system is a dynamic network of interconnecting elements A
dissolve chaos change in only one of the elements must produce change in all
Control or cybernation – The activities and processes used the others.
to evaluate input, throughput & output in order to make 10. When subsystems are arranged in a series, the output of one is
corrections the input for another; therefore, process alterations in one
Equifinality – Objectives can be achieved with varying requires alterations in other subsystems
inputs & in different ways 11. All systems tend toward equilibrium, which is a balance of
various forces within and outside of a system.
Basic Principles of a System Approach 12. The boundary of a system can be redrawn at will by a system
1. A system is greater than the sum of its parts. analyst
Requires investigation of the whole situation rather than 13. To be viable, a system must be strongly goal-directed, governed
one or two aspects of a problem. by feedback, and have the ability to adapt to changing
Mistakes can‘t be blamed on one person; rather a system circumstances.
analyst would investigate how the mistakes occurred within a
2. Change Theory
subsystem and look for opportunities to make corrections in
the processes used. Developed by Kurt Lewin who is considered the father of
2. The portion of the world studies (system) must exhibit Social Psychology
predictability. Lewin‘s definition of behavior in this model is ―a dynamic
3. Though each sub-system is a self-contained unit, it is part of wider balance of forces working in opposite directions‖
and higher order 3 Major Concepts
4. The central objective of a system can be identified by the fact 1. Driving Forces – are those that push in a direction that
that other objectives will be sacrificed in order to attain the causes change to occur. They cause a shift in the
central objective. equilibrium towards change
5. Every system, living or mechanical, is an information system. Must 2. Restraining Forces – are those forces that counter the driving
analyze how suitable the symbols used are for information forces
transmission. 3. Equilibrium – is a state of being where driving forces equal
6. An open system and its environment are highly interrelated restraining forces and no change occurs.
7. A highly complex system may have to be broken into subsystems 3 Stages
so each can be analyzed and understood before being 1. Unfreezing – process which involves finding a method of
reassembled into a whole. making it possible for people to let go of an old pattern that
8. A system consists of a set of objectives and their relationships was somehow counterproductive
2. Change Stage – ―moving to a new level‖ or ―movement‖.
Involves a process of change in thoughts, feeling, behavior, or
all three, that is in some way more liberating or more
productive.
3. Refreezing Stage – establishing the change as the new habit.
Major Assumptions
People grow and change throughout their lives
Change happens daily
Reactions to change are grounded in the basic human needs
for self-esteem, safety and security
Change involves modification or alteration.
Cybernetics
6 Components is a trans disciplinary approach for exploring regulatory
1. Recognition of the area where change is needed systems, their structures, constraints and possibilities ―the
2. Analysis of a situation scientific study of control and communication in the animal,
3. Identification of methods by which change, can occur machine and society‖ as defined by Norbert Wiener.
4. Recognition of the influence of group mores or customs on is applicable when a system being analyzed incorporates a
change. closed signaling loop-originally referred to as ―circular
5. Identification of the methods that the reference group uses to causal‖ relationship, that is where action by the system in
bring about change some manner (feedback) that triggers a system change.
6. The actual process of change The essential goal of the broad field of cybernetics is to
Kurt Lewin’s Model of Change understand and define the functions and processes of
systems that have goals and that participate in circular,
causal chains that move from action to sensing comparison
with the desired goal, and again to action.
Its focus is how anything (digital, mechanical or biological)
processes information, reacts to information and changes or
can be changed to better accomplish the first two tasks.
Comes from the Greek word ―Kubernetes‖ means ―steering‖
and ―governor‖ in Latin.
Major Concepts
Cybernetics introduces the concept of circularity and circular
causal systems
3. Cybernetics Theory Systems are defined by boundaries
Every system has a goal
Environment affects aim
Information returns to system- ―feedback‖
System measures difference between state and goal
Detects ―error‖
System corrects action to aim toward goal
Cycle Repeat
Scope and Application of Cybernetics
Basis of modern communication systems
Application in cognitive science for modeling and learning
Basic Concepts
Application in management science
o Observational Learning
Conclusion
o Reproduction
Cybernetics is applicable in any discipline relying on
o Self-Efficacy
feedback processes including health sciences, sociology and
o Emotional Coping
psychology, which are based on communication process
o Self-regulatory Capability
4. Cognitive Learning Theory
B. Cognitive Behavioral Theory
Explains why the brain is the most incredible network of
Describes the role of cognition (knowing) to determining and
information processing and interpretation in the body as we
predicting the behavioral pattern of an individual.
learn things
Developed by Aaron Beck
2 specific Theories
The Wisdom is the fourth and the last step of the DIKW
Hierarchy. It is a process to get the final result by calculating
through extrapolation of knowledge. It considers the output
from all the previous levels of DIKW Model and processes
them through special types of human programming (such as
the moral, ethical codes, etc.).
Therefore, Wisdom can be thought as the process by which
you can take a decision between the right and wrong, good
and bad, or any improvement decisions.
Wisdom is the topmost level in the DIKW pyramid and answers
the questions related to "Why".
In case of our example scenario, one example of wisdom
gained might be that due to 70 % of the working professionals
The information hierarchy stage of DIKW Pyramid reveals the visit our tutorials to get help with their certifications and
relationships in the data, and then the analysis is carried out technology needs.
to find the answer to Who, What, When and Where questions. Analyzing Organizational Issues Using the DIKW Hierarchy
C. The ―Knowledge‖ of DIKW Data: A way to identify the raw external inputs such as the
facts and figures that are yet to be interpreted.
is the third level of DIKW Model. Knowledge means the Information: Analyze the raw data to determine the
appropriate collection of information that can make it be organizational needs. An important aspect of information
useful. management is that apart from answering questions it can
Knowledge stage of DIKW hierarchy is a deterministic process. also help to find other solutions in organizational contexts.
When someone "memorizes" information due to its usefulness, Knowledge: Determines how something is remembered by an
then it can be said that they have accumulated knowledge. individual or how information is applied by them.
The knowledge step tries to find the answer to the "How" Wisdom: Uncover why the derived knowledge is applied by
question. Specific measures are pointed out, and the individuals in a specific way. i.e. - finding the reason behind
information derived in the previous step is used to answer this any decision-making
question.
With respect to our scenario, we must find the answer that The Usage and Limitations of DIKW Model
―How do student nurses between the age group of 18-22
years old use our modular approach.
This unit discusses the information technology applicable in
nursing practice which includes hospital and critical care
applications such as different monitoring devices needed to
care for patients. The community health applications focus on
the health information system of the community, it is centered
on the majority part of the public which also emphasizes the
prevention of the disease, medical intervention, and public
awareness.
PURPOSE & OBJECTIVES
Same as all other models, DIKW Model also has its own limits. 1. Describe the information technology applicable in nursing
You may have noticed that the DIKW Hierarchy is quite linear practice.
and follows a logical sequence of steps to add more
meaning to data in every step forward. But the reality is often 2. Explain the application of nursing informatics in the community
quite different than that. The Knowledge stage, for example, health practice.
is practically more than just a next stage of information.
HOSPITAL AND CRITICAL CARE APPLICATIONS
One of the principal critiques of this DIKW Pyramid is that it‘s a
hierarchical process and misses several important aspects of There are a lot of information technology applications applicable in
knowledge. In today's world, where we use various ways to the hospital. It can be branched out based on the major functional
capture and process more and more unstructured data, departments in the hospital such as in the Administration, Clinical,
sometimes forces us to bypasses few steps of DIKW. and Nursing. In the administration department, let us say for
Though the previous statement is quite true, however, the instance, the admission of the patient and retrieval of clinical
result still stays the same, such as what we do with the data records uses computer applications to make the work effective and
warehouse and transforming data through big data analytics efficient. In this discussion, we focus on the critical care aspects and
into decisions and actions (Wisdom). how the nursing division benefits from the information technology.
Information Technology System Applicable in Nursing Practice Below is the list to sum up the various applications of information
technology in this setting particularly focusing on patient care:
Goal
AMBULATORY CARE SYSTEMS
➢ Strengthen the surveillance and response capabilities at each The ambulatory care nurse focuses on patient safety and the
level of the health system by building local capacities and quality of nursing care by applying appropriate nursing
leveraging strengths and areas of expertise through partnership and interventions, such as identifying and clarifying patient needs,
coordination. performing procedures, conducting health education,
promoting patient advocacy, coordinating nursing and other
Vision
health services, assisting the patient to navigate the health
➢ To improve the availability and use of surveillance and laboratory care system, and evaluating patient outcomes.
data so that public health managers and decision makers can plan The ambulatory care covers a wide range of services that
for and carry out more timely detection and response to the leading can be offered to patients that needs medical attention.by
causes of illness, death, and disability. integrating the ambulatory care information system in the
nursing practice will really help in making the work easy like
FUNCTIONS the processing of data and information and the billing and
charges etc.
Information from PIDSR is expected to be used for the following
There are advantages of the ambulatory care information like
purposes:
first, the access of medical records of patients to health care
providers, second, the nurses will be able to give quality care
and improve workflow, reduce medical errors, and lastly the
management and monitoring of the billing, doctor‘s fees, Improved decision support and resource tracking/allocation
prescriptions and many more. tools bring added intelligence to the disaster situation. For
One of the most important responsibility of a nurse is to make example, better available collaboration software and file
sure that the patient receives the care that he/she needed sharing have benefited the recent business world and can
and with the use of this system I believe the quality of care serve to better reduce duplication of efforts during times of
can be given. disaster. At the same time, distributed emergency operation
EMERGENCY PREPAREDNESS AND RESPONSE centers provide resources in a less centralized manner that
Same with the objective in the application of informatics in aids in the distribution of planning, coordination, and
community health the over-all objective is public health. The scheduling. Computer assisted decision- making tools and
only difference is the focus and level of prevention. In intelligent adaptive planning provide alternatives to decisions
Community Health, the focus of the use of informatics is on that are typically made in a vacuum.
the promotive and preventive side, while in emergency Bio surveillance is a key capability of obtaining and
preparedness and response focus in the mitigation and maintaining situational awareness before and during a health
control of emergencies. The use of informatics here is much emergency. Early recognition and understanding of
wider and critical. The need for information in real-time is very departures from human, animal, plant, and environmental
crucial in saving the lives of many. baselines, including detection of novel occurrences, is
Based on Weiner and Slepski (2012) the modern movement necessary to give early warning and save lives; however,
toward HEI could go a long way to expanding information detecting deviations from the norm is complicated because
outreach to victims of disasters and humanitarian crises. of the complexities of systems and variables and the multiple
Although not the primary reason for the legislation that has stovepipes that exist. Many efforts are underway to improve
provided such sanctioned growth in electronic health care data collection, sharing, and analysis. Informatics and
records, for once an unintended consequence has a possible technology solutions such as smartphones, tablets, and other
positive effect. Other efforts to expand and upgrade wireless devices may help to gather signals to detect
communications to all populations have benefits for the potential incidents earlier, regardless of the cause, and
disaster community as well. As an example, radiofrequency communicate early warning and critical updates and foster
identification (RFID) technology holds such promise with early electronic information exchange worldwide. Rapid detection
prototypes tagging victims with treatment and other is critical to save lives and improve incident outcomes, and
information. Longer range RFID tags and readers will it the United States serves in a key role as part of global
possible to continuously track victims as they move through surveillance network.
the system for evacuation to treatment facilities (National
Research Council, Committee on using Information TELEHEALTH
Technology to Enhance Disaster Management, 2007). According to Mayo Clinic (2020), telehealth is the use of
digital information and communication technologies, such as
computers and mobile devices, to access health care Improve communication and coordination of care among
services remotely and manage your health care. These may members of a health care team and a patient.
be technologies you use from home or that your doctor uses Provide support for self-management of health care.
to improve or support health care services.
TELEHEALTH
CAP
Ward Admission
Outpatient
Sample of the clinical practice guideline for pneumonia by the Philippine College
of Chest Physician
Netiquette Rules and Guidelines have vision issues, there are ways to adjust how text displays so you
can still see without coming across as angry or upset.
- Netiquette is short for "Internet etiquette." Just like etiquette is a
code of polite behavior in society, netiquette is a code of good 2 Sarcasm can (and will) backfire.
behavior on the Internet. This includes several aspects of the
Internet, such as email, social media, online chat, web forums, - Sarcasm has been the source of plenty of misguided arguments
website comments, multiplayer gaming, and other types of online online, as it can be incredibly difficult to understand the
communication. commenter‘s intent. What may seem like an obvious joke to you
could come across as off-putting or rude to those who don‘t know
Examples of rules to follow for good netiquette: you personally. As a rule of thumb, it‘s best to avoid sarcasm
altogether in an online classroom. Instead, lean toward being polite
1. Avoid posting inflammatory or offensive comments online (a.k.a and direct in the way you communicate to avoid these issues.
flaming).
2. Respect others' privacy by not sharing personal information, photos, 3. Don’t abuse the chat box
or videos that another person may not want published online.
3. Never spam others by sending large amounts of unsolicited email. - Chat boxes are incorporated into many online classes as a place
4. Show good sportsmanship when playing online games, whether you for students to share ideas and ask questions related to the lesson. It
win or lose. can be a helpful resource or a major distraction—it all depends on
5. Don't troll people in web forums or website comments by how well students know their classroom netiquette. ―Rather than
repeatedly nagging or annoying them. asking relevant questions or giving clear answers, students might use
6. Stick to the topic when posting in online forums or when the chat box to ask questions irrelevant to the discussion, or to talk
commenting on photos or videos, such as YouTube or Facebook about an unrelated topic,‖ says Erin Lynch, senior educator at Test
comments. Innovators. The class chat box isn‘t an instant messenger like you‘d
7. Don't swear or use offensive language. use with friends. Treat it like the learning tool it‘s meant to be, and try
8. Avoid replying to negative comments with more negative not to distract your classmates with off-topic discussions. Use it
comments. Instead, break the cycle with a positive post. instead to ask relevant questions and participate in class when the
9. If someone asks a question and you know the answer, offer to help. professor asks.
10. Thank others who help you online.
4. Attempt to find your own answer
10 Netiquette Guidelines Online Students need to know
- If you‘re confused or stuck on an assignment, your first instinct may
1. NO YELLING, PLEASE be to immediately ask your instructor a question. But before you ask,
take the time to try to figure it out on your own. For questions related
- There‘s a time and a place for everything—BUT IN MOST SITUATIONS to class structure, such as due dates or policies, refer to your syllabus
TYPING IN ALL CAPS IS INAPPROPRIATE. Most readers tend to and course FAQ. Attempt to find the answers to any other questions
perceive it as shouting and will have a hard time taking what you on your own using a search engine. If your questions remain
say seriously, no matter how intelligent your response may be. If you unanswered after a bit of effort, feel free to bring them up with your
instructor.
5. Stop ... grammar time! 9. Think before you type
- Always make an effort to use proper punctuation, spelling and - A passing comment spoken in class can be forgotten a few minutes
grammar. Trying to decipher a string of misspelled words with erratic later, but what you share in an online classroom is part of a
punctuation frustrates the reader and distracts from the point of permanent digital record. Not only is it good practice to be
your message guarded when it comes to personal information, you always want to
be just as respectful toward others as you would be if you were
6. Set a respectful tone sitting in the same room together. Zink says a good rule of thumb to
follow is if you‘re comfortable standing up in front of a classroom
- Every day may feel like casual Friday in an online classroom where
and saying your message, then it‘s most likely okay to share.
you don‘t see anyone in person, but a certain level of formality is still
expected in your communication with instructors. In addition to 10. Be kind and professional
proper punctuation and spelling, it‘s good netiquette to use
respectful greetings and signatures, full sentences and even the Online communication comes with a level of anonymity that
same old ―please‖ and ―thank you‖ you use in real life. doesn‘t exist when you‘re talking to someone face-to-face.
Sometimes this leads people to behave rudely when they disagree
7. Submit files the right way with one another. Online students probably don‘t have the
complete anonymity that comes with using a screen name, but you
- You won‘t be printing assignments and handing to them to your
could still fall prey to treating someone poorly because of the
teacher in person, so knowing how to properly submit your work
distance between screens. Make a point to be kind and respectful
online is key to your success as an online student. Online course
in your comments—even if you disagree with someone.
instructors often establish ground rules for file assignment
submissions, like naming conventions that help them keep things Recommendations for Social Media Use in hospitals and health Care
organized or acceptable file formats. Ignoring these instructions is a Facilities
common example of bad netiquette.
8. Read first
Social Media is the new avenue for creating connections and sharing of
- Take some time to read through each of the previous discussion information. Through social media, one can reach a global community. In
post responses before writing your own response. If the original post recent years, we have seen how social media has changed the way we do
asked a specific question, there‘s a good chance someone has things. Social Media has been extensively utilized for health education and
already answered it. Submitting an answer that is eerily similar to a promotion, proving itself to be an invaluable tool for public health,
classmate‘s indicates to the instructor that you haven‘t paid professional networking and patient care benefit.
attention to the conversation thus far. Remember, discussions can
move fairly quickly so it‘s important to absorb all of the information The challenge has been to use the power afforded by social media
before crafting your reply. Building upon a classmate‘s thought or responsibly, and to define the line between use and abuse. While there
attempting to add something new to the conversation will show may be laws, implementation proves to be a challenge in the digital age.
your instructor you‘ve been paying attention. Therefore, self-regulation and institutional policy remain a critical part. It is
therefore urged that hospitals and health care facilities adopt their own
social media use policy appropriate for the institution. Below are proposed b) The individual should always be conscious of his or her online image
rules that could guide institutions in developing their own policy for social and how it impacts his or her profession, or the institution where he
media use: or she is professionally employed, affiliated or otherwise connected.
c) Responsible social media use also requires the individual to ensure
that in his or her social media activity, there is no law violated,
including copyright, libel and cybercrime laws. At all times, the
Sec. 1. Declaration of Policy. The health facility recognizes that the exercise
individual shall respect the right of privacy of others.
of the freedom of expression comes with a responsibility and a duty to
d) Use of social media requires a personal commitment to uphold the
respect the rights of others. The health facility likewise acknowledges the
ethical standards required of those providing health services, upon
fundamental right to privacy of every individual. This policy shall provide
which patient trust is built.
rules for responsible social media use.
Sec. 5. Social Media for Health Education or Promotion
Sec. 2. Definition. For purposes of this policy, the following definitions shall
be used: a) The individual using social media for health education or promotion
must be well-informed of the matter subject of the social media
a) Social Media refers to electronic communication, websites or
post, comment or other activity. The individual shall refrain from any
applications through which users connect, interact or share
activity which spreads or tends to spread misinformation.
information or other content with other individuals, collectively part
b) An article written by an individual and posted in social media must
of an online community. This includes Facebook, Twitter, Google+,
be evidence-based and disclose connections with pharmaceutical
Instagram, LinkedIn, Pinterest, Blogs, Social Networking sites.
or health product companies or other sources of possible conflict of
b) Health facility shall refer to the hospital or other health care facilities,
interest.
including training and educational institutions.
c) Social media shall not be used to dispense specific medical
c) Individual shall refer to physicians, employees, other health facility
diagnosis, advice, treatment or projection but shall consist of
staff, residents, or students to which this policy would apply.
general opinions only. Use of social media should include
Sec. 3. Applicability. This policy shall apply to all physicians, health statements that a person should not rely on the advice given online,
professionals, employees and other health facility staff, including students or and that medical concerns are best addressed in the appropriate
residents in training, practicing their profession, working, or fulfilling setting.
academic and clinical requirements within the health facility, whether d) The individual shall be careful in posting or publishing his or her
temporary or permanent. opinion and shall ensure that such opinion will not propagate
misinformation or constitute a misrepresentation. The individual shall
Sec. 4. General Principles. Social media use shall be guided by the not make any misrepresentations in his or her social media activity
following principles: relating to content, his or her employment or credentials, and any
other information that may be misconstrued or taken out of context.
a) In using social media, an individual should always be mindful of his
or her duties to the patient and community, his profession and his Sec. 6. Professionalism in Social Media Use
colleagues.
a) Individuals are discouraged from using a single account for both
professional and private use. Be mindful that an electronic mail
address used professionally may readily be linked to a social media a) In using social media, the individual shall respect the dignity,
site used privately. personality, privacy and peace of mind of another.
b) The individual shall conduct himself or herself in social media or b) The individual shall not post, share or otherwise use social media
online the same way that he would in the public, mindful of acting with the intent of damaging the reputation of any other individual or
in a manner befitting his profession, or that would inspire trust in the institution, especially if the subject is identified or identifiable.
service he or she provides, especially if the individual has not c) Derogatory comments about patients, colleagues, employers and
separated his or her professional and personal accounts in social institutions or companies should be avoided. An individual may
media. ―like‖ a defamatory post but he or she must use caution when
c) The individual shall likewise refrain from using the name, logo or sharing, retweeting or contributing anything that might be
other symbol of an institution without prior authority in his or her construed as a new defamatory statement. A post, comment or
social media activity. An individual shall not identify himself or herself other social media activity is considered defamatory if:
as a representative of an institution in social media without being
authorized to do so. 1) The activity imputes a discreditable act or condition to
d) Individuals shall not accept former or current patients as friends or another
contacts in their personal accounts, unless there is justification to do 2) The activity is viewed or seen by any other person
so, such as a pre-existing relationship or when unavoidable for 3) The person or institution defamed is identified or readily
patient care. In case of online interaction with patients, this should identifiable
be limited to matters related to the patient‘s treatment and 4) There is malice or intent to damage the reputation of
management, and which could be properly disclosed. another.
e) Informal and personal information concerning a patient, colleague
or the health facility shall not be posted, shared or otherwise used in d). He or she shall be careful of sharing posts or other contents that
social media. are unverified, particularly if it discredits another person or institution, or
f) Social media shall not be used to establish inappropriate imputes the commission of a crime or violation of law even before trial and
relationships with patients or colleagues, and shall not be used to judgment, and violates the privacy of another. Fair and true reporting on
obtain information that would negatively impact on the provision of matters of public concern shall be allowed provided that the content was
services and professional management of the patient. obtained lawfully and with due respect for the right of privacy.
g) An individual shall refrain from posting, sharing or otherwise using
e. An individual shall not use copyrighted materials other than for fair use
photos or videos taken within the health facility, which would give
where there is proper citation of source and author. Use of copyrighted
the impression of unprofessionalism, show parts of the health facility
material for purpose of criticism, comment, news, reporting, teaching,
where there is an expectation of privacy, or those which includes
scholarship, research, and similar purposes is compatible with fair use.
colleagues, employees, other health facility staff, or patients without
their express consent. The consent requirement shall apply even if f. An individual is prohibited from:
the other individuals included are not readily identifiable.
1) Social media activities that defame, harass, stalk, or bully another person
Sec. 7. Responsible Social Media Activity or institution.
2) The use or access of personal social media accounts of others without would blacken the reputation of the patient. The duty of maintaining
authority. patient confidentiality remains even after patient‘s death.
3) Posting, sharing or otherwise using any information intended to be e. An individual shall not post, share or otherwise use any information
private or obtained through access to electronic data messages or relating to the identity, status and personal details of persons with HIV, those
documents. who have undergone drug rehabilitation, and victims of domestic violence,
rape and child abuse.
4) Posting, sharing or otherwise using recorded conversations between
doctors, individuals or patients, when such recording, whether audio or Sec. 9. Compliance and Reporting.
video, was obtained without consent of all the parties to the conversation
a. An individual shall strive to develop, support and maintain a privacy
g. Individuals should use conservative privacy settings in their social media culture in the health facility. He or she shall abide by the social media use
account used professionally. The individual should also practice due policy of the institution.
diligence in keeping their social media accounts safe such as through
regular password change and logging out after social media use. b. An individual who becomes aware of unprofessional behavior,
misinformation or privacy violations in social media shall report the matter
Sec. 8. Health Information Privacy to the hospital‘s privacy officer or the proper office or authority within the
facility.
a. The individual shall respect the right to privacy of others and shall not
collect, use, access or disclose information, pictures and other personal or c. Health facilities shall in so far as practicable monitor the social media
sensitive information without obtaining consent from the individual activity of all physicians, employees and other health facility staff, including
concerned. Physicians, health facility employees and other health staff shall students or residents in training, practicing their profession, working, or
have the duty of protecting patient confidentiality in their social media fulfilling academic and clinical requirements within the health facility,
activity. whether temporary or permanent.
b. Personal health information, including photos or videos of patients, shall Sec. 10. Penalty. A violation of this policy may constitute a violation of the
not be posted, shared or otherwise used in social media without consent of code of ethics of physicians and other professions, and other applicable
patient. Consent shall be obtained after explaining to the patient the laws.
purpose of the intended collection, use, access and disclosure. Consent for
use of personal health information shall be written or evidenced by a. Health Professionals, employees and other Health Facility Staff. Any
electronic means. person found violating this policy will be considered in violation of health
facility rules and regulations, and shall be subjected to health facility
c. An individual shall not post, share or otherwise use any information which administrative proceedings, which after notice and hearing, and
could be used to identify patients without their consent, including patient‘s depending on the severity of the violation, could result to termination of
location, room numbers, and photographs or videos of patients or their service or withdrawal of privileges. A lighter penalty may likewise be
body parts, including code names referring to patients. imposed. In determining the severity of the violation, the following factors
may be considered: previous violation, if any, the nature of the violation,
d. The individual shall not post, share or otherwise use any other information and the extent of injury or damage. The penalty imposed by the health
acquired in attending to a patient in a professional capacity, and which facility shall be without prejudice to the filing of a complaint before the Civil
Service Commission, the Professional Regulations Commission, the Office of A surgical safety checklist was designed to improve team
the Prosecutor or Ombudsman, or proper courts. communication and consistency of care would reduce
complications and deaths associated with surgery.
b. Students. In case of students, they shall be reported to the college
wherein they are enrolled and shall be subjected to disciplinary Background cont…
proceedings, which could result to expulsion, depending on the severity of
the violation, and in accordance with the applicable University and Surgery is performed in every community: wealthy and poor, rural
respective College rules. A lighter penalty may likewise be imposed. The and urban, and in all regions.
disciplinary proceedings shall be without prejudice to other applicable Although surgical care can prevent loss of life or limb, it is also
legal remedies. associated with a considerable risk of complications and death.
The risk of complications is poorly characterized in many parts of the
SURGICAL SAFETY CHECKLIST
world, but studies in industrialized countries have shown a
perioperative rate of death from inpatient surgery of 0.4 to 0.8% and
Objectives of this presentation a rate of major complications of 3 to 17%
This topic will explain what a surgical safety checklist is and Data suggest that at least half of all surgical complications are
Why it is important. avoidable.
3. Sign out
1. Sign in (Briefing): Before the patient leaves the operating room:
Before induction of anesthesia, members of the team (at least the nurse
and an anesthesia professional) orally confirm that: Nurse reviews items aloud with the team
Name of the procedure as recorded
•The patient has verified his or her identity, the surgical site and procedure, That the needle, sponge, and instrument counts are complete (or
and consent not applicable)
•The surgical site is marked or site marking is not applicable That the specimen (if any) is correctly labeled, including with the
•The pulse oximeter is on the patient and functioning patient‘s name
Whether there are any issues with equipment to be addressed
The surgeon, nurse, and anesthesia professional review aloud the Effective preoperative patient assessment includes a review of the
key concerns for the recovery and care of the patient medical record or imaging studies immediately before starting
The WHO checklist format surgery.
To facilitate this step, all relevant information sources, verified by a
Some important considerations for the nurse predetermined checklist, should be available in the operating room
Is the patient fasting (Nil Per Oral – NPO)? When did the and rechecked by the entire surgical team before the operation
patient eat last? begins.
Is the necessary imaging displayed?
Are the surgical items that you have ―pulled‖ what the Conclusion cont…
surgeon needs? Do you need to check with the surgeon
first? A briefing is important for assigning essential roles and establishing
Is the patient situated on the table without unnecessary expectations.
pressure that could cause nerve damage? How long will the
procedure take? Introduction of each person in the operating room by name and
Are all members of the team ready to start? role, even if team members are familiar, is recommended for
improved communication. Whenever possible, the patient (or the
Outcomes of the checklist patient's designee) should be involved in the process of identifying
the correct surgical site, both during the informed consent process
Introduction of the WHO Surgical Safety Checklist into operating and in the physical act of marking the intended surgical site in the
rooms in various hospitals around the world was associated with preoperative area.
marked improvements in surgical outcomes.
Postoperative complication rates fell by 36% on average, and A formal procedure for final confirmation of the correct patient and
death rates fell by a similar amount. surgical site (a ―time out‖) that requires the participation of all
The reduction in the rates of death and complications suggests that members of the surgical team may be helpful. Time outs may
the checklist program can improve the safety of surgical patients in include not only verification of the patient and the surgical site, but
diverse clinical and economic environments. also relevant medical history, allergies, administration of appropriate
preoperative antibiotics, and deep vein thrombosis prophylaxis.
Conclusions
Use of the checklist involved both changes in systems and changes
A common theme in cases of wrong-site surgery involves failed in the behavior of individual surgical teams.
communication between the surgeon(s), the other members of the
health care team, and the patient. To implement the checklist, all sites had to introduce a formal pause
Communication is crucial throughout the surgical process, in care during surgery for preoperative team introductions and
particularly during the preoperative assessment of the patient and briefings and postoperative debriefings, team practices that have
the procedures used to verify the operative site. previously been shown to be associated with improved safety
processes and attitudes and with a rate of complications and
death reduced by as much as 80%.
The standards are subject to change with the dynamics of the
The philosophy of ensuring the correct identity of the patient and site nursing profession, as new patterns of professional practice are
through preoperative site marking, oral confirmation in the operating room, developed and accepted by the nursing profession and the public.
and other measures proved to be new to most of the study hospitals. In addition, specific conditions and clinical circumstances may
affect the application of the standards at a given time (e.g., during
REMEMBER a natural disaster).
The standards are subject to formal, periodic review and revision.
EVERY CHECK CAN SAVE LIFE The competencies that accompany each standard may be
evidence of compliance with the corresponding standard.
THIS CHECKLIST IS A DOCUMENT BUT ALSO A MATERIAL (TOOL) FOR
The list of competencies is not exhaustive.
OPERATING ROOMS, THAT CAN HELP US TO BE SAFE FOR OUR WORK AND
Whether a particular standard or competency applies depends on
SAFE FOR OUR PATIENTS.
the circumstances.
Standard 1. Assessment
UNIT 7 STANDARDS OF NURSING INFORMATICS PRACTICE The informatics nurse collects comprehensive data, information,
and emerging evidence pertinent to the situation.
Competencies
Standards of Nursing Informatics Practice According to American Nurses
Association The informatics nurse:
Synthesizes available data, information, evidence, and knowledge The informatics nurse identifies expected outcomes for a plan
relevant to the situation to identify patterns and variances. individualized to the healthcare consumer of the situation.
Applies ethical, legal, and privacy regulations and policies for the
Competencies
collection, maintenance, use, and dissemination of data and
information. The informatics nurse:
Documents relevant data in a retrievable format.
Involves the healthcare consumer, family, healthcare provider and
key stakeholder in formulating expected outcome when possible
and appropriate.
Standard 2. Diagnosis, Problems, and Issues Identification
Defines expected outcome in terms of the healthcare consumer,
The informatics nurse analyzes assessment data to identify health-care worker, and other stakeholder; their values; ethical; and
diagnoses, problems, issues, and opportunities for improvement. environmental, organizational, or situational considerations
Formulates expected outcomes after considering associated risks,
Competencies benefits, costs, available, expertise, evidence-based knowledge,
and environmental factors.
The informatics nurse: Develops expected outcomes that provide direction for project
team members, the healthcare team, and key stakeholders.
Derives diagnoses, problems, needs, issues, and opportunities for
Includes a time estimate for the attainment of expected outcomes.
improvement based on assessment data.
Modifies expected outcome based on changes in the status or
Validates the diagnoses, problems, needs, issues, and opportunities
evaluation of the situation.
for improvement with the healthcare consumer, family,
Documents expected outcomes as measurable goals.
interprofessional team, and key stakeholders when possible and
appropriate.
Identifies actual or potential risks to the healthcare consumer‘s
health and safety, or barriers to health, which may include, but are Standard 4. Planning
not limited to, interpersonal, systematic or environmental
circumstances.
The informatics nurse develops a plan that describes strategies, The informatics nurse implements the identified plan
alternatives and recommendations to attain expected outcomes.
Competencies
Competencies
The informatics nurse:
The informatics nurse:
Standard 5c, Consultation Identifies the informatics nurse practices ethically, with further
detailing of associated competencies, such as the use of the Code
The informatics nurse provides consultation to influence the of Ethics for Nurses with Interpretive Statements to guide practice
identified plan, enhance the abilities of others, and effect change.
Standard 8. Education
Standard 6. Evaluation
Addresses the need for the informatics nurse to attain knowledge
The informatics nurse evaluates progress toward attainment of and competence, including the competency associated with
outcomes demonstration of a commitment to lifelong learning
The informatics nurse: Confirms that the informatics nurse integrative evidence and
research findings into practice
5. Pagination- one inch from the right edge of the the thesis proposal has been examined
paper on the 1st line of every page d) The acceptance of the department of nursing
and of the academic office.
1. Title page- it is center- justified and ALL CAPS, 3. Acknowledgement sheet. This reflects the
follows the inverted pyramid style and is single- researcher/s expression of appreciation for the
spaced. assistance and encouragement extended to
Contents: him/them in making the research paper. Pronouns
used must be in third person
a) Title
b) Classification of paper: Thesis proposal 4. Abstract
c) Name/s of the research
a) It is brief yet comprehensive summary of the f) Opposite each chapter title is the corresponding
paper. page number led by dots.
b) It describes the g) Chapter and section titles should not extend
Problem research on beyond the right margin of the leaders(dots). If a
The number and kind of participants or chapter/ section tittles occupies more than one
respondents, line, the second line on wards must align- left
The hypothesis, with the first.
Summary of procedures and methods
Instrumentation, Results, Conclusion,
Implication, recommendation 6. List of tables. It appears on the page immediately
following the table of contents.
5. Table of contents
a) LIST OF TABLES should be typed centered and in
This is an ordered and paginated listing of the
all capital letters.
different parts of the thesis.
b) The heading Table should be typed three lines
It must show the chapter and section titles in full
spaces below the title and flushed to the left
and must have entries for the references and
margin; opposite the word Page which is flushed
appendices sections.
to the right margin.
a) The heading TABLE OF CONTENTS should be
c) Arabic numerals are used for the table numbers
typed centered and in all capital letters.
which are placed right under the heading Table.
b) Spacing should be 1.5 in. throughout
A tab\ is inserted after each table number, then
c) Preliminaries should be listed first.
the little of the table appears.
d) The heading Chapter should be flushed left on
the same line with Page flushed right. Only the 7. List of Figures
first letters of the words are capitalized.
It is placed on the separate page right after the
e) Below the heading Chapter are the tittles of the
list of the tables
different chapters in upper case.
a) LIST OF FIGURES is typed centered and in upper All should appear on the new page, separate from
case. the body of the thesis.
b) The heading Figure should be typed three line
spaces below the title and flushed to the left
margin: opposite is the heading Page which is All references cited on the body of the research
flushed to the right margin. paper must appear on the References section.
c) Arabic numerals are used for the table numbers,
The heading References is centered –justified on the
which are placed right under the heading
first line below the page header.
Figure. A tab is inserted after each table
number, followed by the title of the figure from The entries with changing indentions, begin on the
the corresponding page number. line following the heading References
References
2) Year Of Publication. It should follow the period after Burns, n. & Grove, S. K. (2005). The practice of nursing
the author‘s name and should be enclosed in research: Conduct, critique and utilization (Rev.
parenthesis ed.).Philadelphia: Saunders.
5) Place of publication. The city where the book is Houinard, M. C.,& Robichaud-Ekstrand, S (2005)The
published should be written followed by a colon. effectiveness of a nursing impatient smoking
cessation program in individuals with cardiovascular
6) Publishing house. The name of the publishing house
disease. Journal of Nursing Research, 54(4), 243-254
follows the place of publication
A. Dragging to copy cells Note: What happens if you move the cell
boundary in too far and the words cannot fit into the
In the bottom right corner of the highlighted cell
cell?
is a small square.
By clicking and holding down the left mouse What happens when you move the cells with
button you can drag the contents of the cell the numbers too close?
across other cells and copy into the new cells.
b. Changing cells with automatically
B. Filling numbers in the cell
By double clicking on the lines between the columns
A and B. The columns then will increase or decrease
to fit the biggest entry
D. MOVING DATA ON THE SPREAD SHEET Inserting a new row/s
a) Cut and copy 1. Click row marker to highlight the entire column.
b) Click and drag 2. Right click your mouse button and choose insert.
3. A new row will be inserted, moving the total row
1. Mark a whole column from the heading to what‘s
over one.
written bellow.
3. Click and hold down the left mouse button and 1. Click column/s marker to highlight\ the entire
drag the cells back into their original place. column.
2. Right click your mouse button and choose
delete.
3. Click row/s marker to highlight the entire
column.
4. Right click your mouse button and choose
E. INSERTING ROWS AND COLUMNS. delete.
+ to add
To subtract Formulas with cell reference
/ to divide
a. Inserting cell references automatically
to multiply
b. Formulas with cell reference
= to make equals
BMI
165 cm (1.65 m)