Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

MODULE 3 included:

Informatics Applications in Evidenced Based nursing a. Vital signs


Practice b. Administration of
medications and
COMPUTER GENERATED NURSING CARE PLANS treatments
c. Preparation of
NURSING CARE PLANS diagnostic tests or
 A set of care guidelines that outline the course surgery
of treatment and the recommended d. Change in status
interventions that should be implemented to e. Admission, transfer,
achieve optimal results. discharge or death of a
 Care plans are common tools found in case client
management systems. f. Treatment for a sudden
 Two Types: change in status
 Traditional Care Plan – written for each  The nurse communicate
client Organization and organized entry in a
 Standardized Care Plan – based on an logical format or order.
institution’s standards of practice; helps to  The nurse should be able to
provide a high quality of nursing care observe confidential
communication that given
Computerized documentation has paved the way for or shared by one person to
Confidentiality
nurses to use computers to store the client’s database, another with trust and
add new data, create & revise care plans & document confidence that such
client progress. information will not be
disclosed.
GUIDELINES FOR GOOD DOCUMENTATION AND
REPORTING USE OF COMPUTERS IN THE NURSING PROCESS TO
 Information about clients GENERATE CARE PLAN
and their care must be  Increase efficiency and accuracy in all phases of
factual. the nursing process.
 A record should contain  Help in meeting the standards of nursing
Facts
descriptive, objective practice and documentation
information about what a
nurse sees, hears, feels and ASSESSMENT
smells.  Collect accurate data (patient health status,
 Information must be history, chief complaints and other assessment)
accurate so that health  Offers pathway to gather relevant information
Accuracy
team members have  Provides guide questions to gather information
confidence in it.
 The information within a DIAGNOSIS
record or a report should  Current programs contains standard diagnosis
be complete, containing with associated signs and symptoms as
concise and thorough reference
Completeness  Nurse uses clinical judgement to choose
information about a client’s
care. appropriate diagnosis among the suggested
 Concise data are easy to options.
understand
 Ongoing decisions about PLANNING
care must be based on  Contains display of recommended interventions
Up-to- for selected diagnosis and expected outcomes.
currently reported
date/Currentness  System (computer) can track outcomes for large
information.
 The following should be patient populations
1
"CLINICAL PATHWAYS ARE OFTEN PRESENTED IN
IMPLEMENTATION VISUAL OR ALGORITHMIC FORMAT."
 Computer records interventions and patient
information (such as transfer and discharge
instructions)
 Computer generated progress notes can easily
be sorted and printed patient data (medications,
treatment and vital signs)
 Make documentation more efficient and
accurate

EVALUATION
 Computer can record and store observations,
patient's responses to nursing intervention and
the nurses' evaluation
 May also use information from other health
care team members for future actions and In a study conducted, the implementation of clinical
discharge planning pathways in the emergency department and inpatient
 May use as basis for re-evaluation for outcomes settings, has been shown to reduce in-hospital
that has not be achieved. complications and improve documentation with no
negative effects on cost or length of stay as compared
to usual care.
CLINICAL PATHWAYS AND GUIDELINES
The AIM of a clinical pathway is to improve the quality
CLINICAL PATHWAYS of care, reduce risks, increase patient satisfaction and
 A clinical pathway is a structured plan of care, increase the efficiency in the use of resources.
used to translate current medical evidence into
a framework of recommendations, at times CLINICAL GUIDELINES
tailored to the local healthcare setting. It details  Clinical Guidelines are evidenced based
the steps in management and aims to recommendations which are usually generated
standardize care and reduce variation for a from an authority group consisting of experts
specific clinical context (Lawak et. al, 2016). in the field and published regularly (Alexander
 A clinical pathway is a method for the patient- et. al., 2019).
care management of a well-defined group of  Clinical Guidelines are recommendations that
patients during a well defined period of time. serve as a guide to decisions and provide
 A clinical pathway explicitly states the goals criteria for specific practice areas.
and key elements of care based on Evidence-  Clinical practice guidelines are informal or
Based Medicine (EBM) guidelines, best practice formal rules or guiding principles that a
and patient expectations by facilitating the healthcare provided uses when determining
communication, coordinating roles and diagnostic tests and treatment strategies for
sequencing the activities of the multidisciplinary individual patients.
care team, patient and their relatives.
 Clinical pathways (CPWs) are considered as a
common component in the quest to improve
the quality of health.
 CPWs are used to reduce variation, improve
quality of care and maximize the outcomes for
specific groups of patients.

2
DIFFERENCE BETWEEN CLINICAL PATHWAY AND ADVANTAGES OF ELECTRONIC JOURNALS
CLINICAL PRACTICE GUIDELINES 1. Contents pages and/or the full text of journals
can be searched to find articles on a certain
Clinical Pathways Clinical Practice subject.
(CP) Guidelines (CPG) 2. Journal articles can be read on your desktop,
 Implements  Offers explicit laptop or any mobile device.
CPG recommendatio 3. Articles can be emailed to yourself which can
Purpose recommendati ns of clinical downloaded or printed.
on in actual decision-making. 4. The article are always be available, no need to
practice go to a library.
 Charts the  Usually covers 5. Hypertext links allow you to move to different
care to be specific clinical sections within individual journals or articles
Scope given for the circumstances and can link you to related resources on the
entire clinical Internet.
course 6. e Journals can include images and audio-visual
 A group of  Governmental material.
local doctors and non- 7. e Journals can be interactive - you can e-mail
Developers the author or editor with your comments.
and nurses governmental
agencies
 Institution-  Not institution INTEGRATING EVIDENCE BASED PRACTICE
Use
specific specific  EVIDENCE-BASED PRACTICE (EBP)
 Designed  No timelines  A core skills necessary to improve nursing
around provided care and enhance the safety of patients.
Timelines  The components of EBP include a
specific
timelines systematic and critical evaluation of the
current literature, the nurses' clinical
 Expected  Do not trace a
expertise and available resources and
intermediate patient's
patients' values and preferences.
patient outcomes
Patient  This information is used to make deliberate
outcomes to
progress clinical decisions based on theory and
evaluate a
relevant research to guide patient care.
patient's
progress

USE OF e JOURNALS
 An electronic journal is a periodical publication
which is published in electronic format, usually
on the Internet.
 An electronic journal are journals which are
published online.
 The articles which are published within journals
are written by subject experts, and many
undergo a rigorous quality check called peer
review.
 Journal articles are considered as:
 reliable
 conform to high academic standards
 good to use in assignments.

3
ELECTRONIC DATABASES TO SUPPORT EBP
 PubMed
 A free resource supporting the search and
retrieval of biomedical and life sciences
literature with the aim of improving
health–both globally and personally.
 contains more than 32 million citations and
abstracts of biomedical literature
 Available to the public online since 1996
 PubMed was developed and is maintained
by the National Center for Biotechnology
Information (NCBI)
 Does not provide full text access to articles
but can be access through link out
functionality
 An effective way to use PubMed as a search
engine is through Medical Subject Headings
(MeSH) - a thesarus of controlled-
vocabulary terms
 Cumulative Index to Nursing and Allied Health
Literature (CINAHL)
 A database that indexes a comprehensive
body of healthcare literature.
 It indexes publications from several of the
prominent nursing associations and from
many publishers.
 It is used by nurses and other medical
personnel, and social workers, counselors,
and physical therapists.
 Provides full text for hundreds of journals
indexed in the CINAHL database

4
MODULE 4 HIPAA LISTS 18 DIFFERENT INFORMATION IDENTIFIERS
POLICIES, GUIDELINES AND LAWS IN NURSING THAT, WHEN PAIRED WITH HEALTH INFORMATION.
INFORMATICS 1. name;
2. address (anything smaller than a state);
Health Insurance Portalibity and Accountability Act of 3. dates (except years) related to an individual --
1996 (HIPAA) birthdate, admission date, etc.;
 A federal law that applies to healthcare 4. phone number;
providers, health plans, and healthcare 5. fax number;
clearinghouses that conduct transactions 6. email address;
electronically . 7. Social Security number;
 Signed into a law by Pres. Bill Clinton into 1996 8. medical record number;
addressing the need for standards to regulate 9. health plan beneficiary number;
and safeguard health information and making 10. account number;
provisions for health insurance coverage for 11. certificate or license number;
employed persons who change jobs. 12. vehicle identifiers, such as serial numbers,
 A law that was developed to : license plate numbers;
 protect electronic health information and 13. device identifiers and serial numbers;
implement reasonable and appropriate 14. web URL;
administrative safeguards that established 15. Internet Protocol (IP) address;
the foundation for a covered entity's 16. biometric IDs, such as a fingerprint or voice
security program. print;
 protect the privacy and security of certain 17. full-face photographs and other photos of
health information and promote efficiency identifying characteristics; and
in the health care industry through the use 18. any other unique identifying characteristic.
of standardized electronic transaction.
B. SECURITY OF HEALTH DATA
4 KEY ASPECTS OF HIPAA  HIPAA requires healthcare organizations to
A. PRIVACY OF HEALTH INFORMATION implement safeguards to ensure any health
 HIPAA restricts the individuals who are able to data created, stored, maintained, or
view healthcare data and who healthcare data transmitted is kept secure at all times.
can be shared with without first obtaining  Those controls include:
permission from patients.  administrative measures
 Access to health data is restricted to healthcare  physical security for paper records and
employees who need to view health and electronic devices that store health data
personal information in order to provide  technical controls such as encryption, anti-
healthcare services and perform any virus software, and firewalls
administration duties.
 Permission must be obtained from patients C. NOTIFICATION OF BREACHES OF MEDICAL RECORDS
before their personal health information (PHI)  HIPAA requires healthcare organizations and
can be shared with companies for reasons such their business associates to issue notifications
as research and marketing. (60 days) to patients when health data is
 Personal/Protected Health Information (PHI) - compromised or stolen.
the demographic information, medical histories,  Allows breach victims to take action to protect
test and laboratory results, mental health their identities and reduce the risk of becoming
conditions, insurance information and other a victim of fraud
data that a healthcare professional collects to
identify an individual and determine
appropriate care.

1
D. RIGHT TO OBTAIN COPIES OF HEALTHCARE DATA DATA PRIVACY ACT OF 2012
 HIPAA gives patients the right to obtain copies
of the health information created or held by Republic Act 10173
healthcare organizations. By obtaining copies of (Data Privacy Act of 2012)
heath data patients can take a much more
active role in their own healthcare. SECTION 1. Short Title. – This Act shall be known as the
 By obtaining copies of health information, “Data Privacy Act of 2012” or Republic Act 10173
patients can easily share that information with
any healthcare organizations, including research “AN ACT PROTECTING INDIVIDUAL PERSONAL
organizations. INFORMATION IN INFORMATION AND
 One other important reason for obtaining COMMUNICATIONS SYSTEMS IN THE GOVERNMENT
copies of health data is to check health records AND THE PRIVATE SECTOR, CREATING FOR THIS
for errors. PURPOSE A NATIONAL PRIVACY COMMISSION, AND FOR
OTHER PURPOSES “
COMMON ORGANIZATIONAL POLICIES AND PRACTICES
TO COMPLY WITH HIPAA SEC. 2. Declaration of Policy. – It is the policy of the
State to protect the fundamental human right of privacy,
1 Provision of HIPAA training for all employees of communication while ensuring free flow of
2 Employees sign a disclosure contract information to promote innovation and growth. The
acknowledging understanding of privacy State recognizes the vital role of information and
requirements communications technology in nation-building and its
3 Conduct annual HIPAA reviews and updated for inherent obligation to ensure that personal information
employees in information and communications systems in the
4 Require paper documents with PHI to be government and in the private sector are secured and
shredded protected.
5 Limit access to areas holding documents with
PHI (locked doors, cabinets, use of key cards SEC. 4. Scope of DPA
6 Require password to access computers;  The DPA applies to the processing of all types of
Passwords needs to be changed regularly personal information and to any natural and
7 Forbid leaving patient information displayed on juridical person, in the country and even abroad,
computers subject to certain qualifications.
8 Forbid sharing of passwords
9 Install firewalls to protect servers THE NATIONAL PRIVACY COMMISSION
10 Forbid access to PHI by caregivers not involved  a commission created by this act which is
in care mandated to administer and implement this law
11 Monitor access to electronic medical records for
inappropriate access SEC. 7. Functions of the National Privacy Commission.
 To administer and implement the provisions of
12 Limit information on whiteboards to the
this Act,
minimum
 To monitor and ensure compliance of the
13 Place general information whiteboards in
country with international standards set for
designated area (least visible to not involved in
data protection
care)
 Rule-making, advisory, public education,
investigations and complaints, and enforcement

2
KEY ROLES IN THE DATA PRIVACY ACT
 Data Subjects
 Refers to an individual whose, sensitive
personal, or privileged information is
processed personal
 Personal Information Controller (PIC)
 Controls the processing of personal data, or
instructs another to process personal data
on its behalf.
 Personal Information Processor (PIP)
 Organization or individual whom a personal
information controller may outsource or
instruct the processing of personal data
pertaining to a data subject
 Data Protection Officer (DPO)
 Responsible for the overall management of
compliance to DPA
 National Privacy Commission
 Independent body mandated to administer
and implement the DPA of 2012, and to
monitor and ensure compliance of the
country with international standards set for
personal data protection

RIGHTS OF THE DATA SUBJECT POTENTIAL BREACHES AND SECURITY INCIDENTS


 Right to be informed INVOLVING PERSONAL INFORMATION
 Right to object  Bank – Consent form
 Right to access  Hospital and School Records - Storage and
 Right to data portability Disposal Policy
 Right to correct (rectification)  Student transferred - Without Consent
 Right to file a complaint  Clinical record of a student to disclose with her
 Right to damages parents - Consent
 Right to erasure or blocking  List of top students/passers - Consent
 "The data subject shall have the right to  Cedula in Malls – Disposal Policy Improper
suspend, withdraw or order the blocking, Disposal
removal or destruction of his or her  Security issues in buildings – logbook
personal data from the personal  Use of re-cycled papers – Disposal Policy/Access
information controller’s filing system." (DPA due to negligence
of 2012, IRR Sec. 34)  Use of CCTV – Privacy Issues
 Transmissibility of Rights  Use of USB/CD/Personal laptop–Encryption
 "The lawful heirs and assigns of the data issue
subject may invoke the rights of the data
subject to which he or she is an heir or an
assignee, at any time after the death of the
data subject, or when the data subject is
incapacitated or incapable of exercising the
rights" (DPA of 2012, IRR Sec. 35)

3
ACCESS CONTROL AND SECURITY POLICY Pillar 3: Write your Privacy Management Program and
 Personal Records stolen from home of an Privacy Manual
employee – Security  Privacy Management Program (PMP)
 Viewing of Student Records in Public – Physical  A PMP is a holistic approach to privacy and
Security data security protection, important for all
 Raffle stubs – Privacy Notice/Storage and agencies, companies or other organization
Disposal Policy involved in processing of personal data.
 Universities and Colleges websites with weak  The PMP will reduce the risks of privacy
authentication breaches its impact to the organization.
 Photocopiers re-sold without wiping the hard Effective implementation of the PMP will
drives help you in identifying the root cause of the
 Password hacked/revealed problems in relation to data privacy.
 Accidentally sent an email attachment –
Unauthorized Disclosure Pillar 4: Write your Privacy Management Program and
Privacy Manual
 Implement your Privacy Data Protection (PDP)
measures
 Implementing data privacy governance to carry
out identified security measures.

Pillar 5: Regularly Exercise your Breach Reporting


Procedure
 The Commission and affected data subjects
shall be notified by the PIC within seventy-two
(72) hours upon knowledge of, or when there is
reasonable belief by the personal information
controllers (PIC) or personal information
NPC’s FIVE PILLARS OF COMPLIANCE processors (PIP) that, a personal data breach
requiring notification has occurred.
Pillar 1: Appointment of Data Protection Officer (DPO)  There should be training and simulations, not
 Mandated by the NPC through the just with the technical team but also with the
implementation of the Republic Act No. 10173 data process owners.
(Data Privacy Act of 2012)
 A Data Protection Officer (DPO) is required to be TYPES OF BREACH
appointed by the organization to ensure the 1. Availability Breach - Due to loss, accidental or
protection of your personal data collection and unlawful destruction of personal data
processing. 2. Confidentiality Breach - Due to the
 A DPO is beneficial to your company due to the unauthorized disclosure of, or access to,
fact that all companies in the Philippines are now personal data
being mandated to comply with the said law. 3. Integrity Breach - Due to alteration of personal
data
Pillar 2: Conduct A Privacy Impact Assessment (PIA) 4. Unlawful Processing/Violation of Privacy -
 A Privacy Impact Assessment or PIA is a process Unauthorized processing, processing for
used to assess and manage privacy impacts in
unauthorized purposes, violation of privacy
planned or existing systems technology, programs,
rights
processes or activities.
 It is a tool for identifying and assessing privacy
risks throughout the development life cycle of a
program or system.
 A PIA states what personally identifiable
information (PII) is collected and explains how
that information is maintained, how it will be
protected and how it will be shared.
4
NURSES GUIDELINES TO AVOID DATA BREACH
1. Never breach a patient’s Information.
2. If you are unsure about disclosing a patient’s
information, seek guidance from the hospital’s
Data Protection Officer (DPO)
3. Know by heart your hospital’s Privacy Manual
by heart
4. Never see information about a patient for
whom you are not providing care
5. Always maintain your patient’s information
confidential.

“Do not COLLECT if you cannot PROTECT” - National


Privacy Commission

5
Nursing Informatics – MODULE 5 eHealth
Application of Health Informatics  An emerging field of medical informatics which
refers to the organization and delivery of health
CLINICAL PRACTICE services and information using the Web and
APPLICATION OF HEALTH INFORMATICS IN CLINICAL related technology.
PRACTICE  Health care initiatives and practice supported
electronic or digital media used usually for
Electronic Health Record patients and family education where
 Contains a systematic documentation of a information is communicated electronically.
client's health status and health care in a
secured digital format. APPLICATIONS OF eHealth
 A collection of rich data stored a database that  Communicating with a patient through a
that possess capacity for customization that can teleconference, email, SMS
be adapted to the needs of the patient, health  Recording, retrieving, and mining data in an
care provider and health care organization electronic medical record (EMR/EHR)
which can shared with multiple providers across  Providing patient teachings with the aid of
health care setting. electronic tools

FEATURES OF A HOSPITAL BASED ELECTRONIC HEALTH


RECORD EFFECTS OF eHealth
1. Charting 1. Represents optimism by allowing patients and
2. Medication Management health workers to look into various options.
3. Scheduling 2. Enables the patient to received tailored
4. Labs information
5. Referrals 3. Empowers the patients to open a new types of
6. Bill Coding relationship.
7. Reporting/Surveillance
8. Health Maintenance TELEMEDICINE
 the use of information exchange from one site
BENEFITS OF EHR USE to another via electronic communications to
1. Point of care entry allow the nurse to capture improve patient’s health status.
the activities of care as they occur.  health services delivered by
2. Documentation of care is legible which lessen telecommunications-ready tools, supervised or
the time wasted on trying to learn what has directed by a physician
been written by the HCP.
3. Rapid access to patient-related data ADMINISTRATION
4. Data is available using remote workstations ADMINISTRATIVE AND CLINICAL INFORMATION
5. Interoperability and data portability SYSTEMS
6. Evidences such as clinical practice guidelines in
are embedded in the HER I. ADMINISTRATIVE INFORMATION SYSTEMS
 Support client care by managing financial and
CHALLENGERS OF EHR USE demographic information and providing
1. Change in workflow patterns reporting capabilities which includes client
2. System and system-related expense management, financial, payroll, human
3. Performance and Security Concerns resources and quality assurance system.
 Contains primarily administrative and financial
data
 Used to support the management functions and
general operations of the health care
organization

1
A. PATIENT ADMINISTRATION SYSTEMS
 Admission, Discharge, and Transfer B. COMPUTERIZED PROVIDER ENTRY ORDER
Registration -system is used to collect and ENTRY SYSTEMS
store client identification and demographic  Refers to the process of providers entering
data that are verified and updated at the and sending treatment instructions –
time of each visit including medication, laboratory, and
 Scheduling -allows a health care radiology orders – via a computer
organization to schedule clients and application rather than paper, fax, or
resources efficiently. telephone.
 Patient billing or accounts receivable  Order entry systems provide major
 Utilization management safeguards by ensuring that physician
orders are legible and complete.
B. FINANCIAL MANAGEMENT SYSTEMS C. LABORATORY SYSTEMS
 Financial systems manage the expenses and  Laboratory Information Systems were one
revenue for providing healthcare. of the first systems ever used in healthcare.
 Financial systems often interface to share  Systems which includes report on blood,
information with materials management, body fluid and tissue samples along with
staffing, and billing systems to balance the biological specimens that are collected at
financial impact of these resources within the bedside and received in a central
an organization. laboratory.
 Accounts payable/Ledger
 Materials Management D. RADIOLOGY SYSTEMS
 Payroll and Human Resource Systems  Radiology Information System (RIS) are
track employee time and attendance, systems schedule, result, and store
credentials, performance evaluations, information as it relates to diagnostic
and payroll compensation information. radiology procedures.
 Staff Scheduling systems coordinate  The benefit of RIS and picture archiving and
staff, services, equipment, and communication system (PACS) is their
allocation of patient beds. ability to assist in diagnosing and storing
vital patient care support data.

II. CLINICAL INFORMATION SYSTEMS E. PHARMACY SYSTEM


 Large computerized database management  These systems typically allow pharmacists
systems that support several types of activities to order, manage and dispense medications
that may include physician order entry, result for a facility.
retrieval, documentation, and decision support
 Clinicians use these systems to access data that
are used to plan, implement, evaluate case. EDUCATION
COMPUTER TECHNOLOGY USED IN EDUCATION

A. NURSING INFORMATION SYSTEM TYPES OF ONLINE EDUCATION


 are computer systems that manage clinical A. LEARNING MANAGEMENT SYSTEM (LMS)
data from a variety of healthcare  A software product which was originally
environments and made available in a designed for a corporate and government
timely and orderly fashion to aid nurses in training division as a tool to access workers
improving patient care. skills for job positions and also provide
specific training for individuals or groups
(Saba, 2015).

2
FEATURES OF LMS B. CONTENT MANAGEMENT SYSTEMS
Features Functionality Tools  A database of learning objects which
1. Synchronous  Utilize  Chat includes items that are developed for
communication virtual office  Whiteboard instructions use.
hours  Video  Allows course developers to create learning
 Online Conference objects such as videos, modules,
tutoring and assessments or any materials used for
training online learning.
sessions  Allows course developers to create learning
 Real-time objects to develop, modify and create
communicati materials which can be integrated with
on course or learning management systems.
 Student-led
learning C. MASSIVE OPEN ONLINE COURSES (MOOC)
 Visual  A model for delivering free learning content
presentation and usually does not require pre-requisites
of concepts other than internet and internet access.
2. Asynchronous  Allows user  Discussion  MOOC provide participants with course
communication to read and Forums
materials that are usually used in a
reply to  Email
traditional education setting such as
others  Journal
lectures, videos and study materials.
 Peer
 MOOCs provide an affordable and flexible
interaction
way to learn for career advancement,
 Self or group
reflections
college preparation, eLearning and training.
3. Collaborative  Promote  Wiki
TYPES OF COURSE DELIVERY
projects group  Blogs
collaboratio 1. Hybrid - A combination of online delivery and
development
n on site conduct of classes
 Sharing of 2. Web-enhanced - Face to face classes use web-
information based technology to facilitate self-studying
 Self- 3. Fully online - All content and communication
reflections are conducted entirely online and no face-to-
4. Testing and  Allows  Online tests face component
grading formative  Self-
and assessment TRENDS IN NURSING INFORMATICS
summative  Survey
assessment  Polls 1. MOBILE COMPUTING
 Informal test  A technology that allows transmission of data,
questions voice and video via a computer or any other
 Vote on wireless enabled device without having to be
issues connected to a fixed physical link.
5. Social media  Allows social  Twitter  Examples:
integration connections  Facebook  Personal Digital Assistants (PDAs)
 Collaboratio  YouTube  Smart Phones
n  RSS (Real  Tablets
 Building Simple  Laptop computers
community Syndication)  Computer on Wheels (COW) or Workstation
Feeds on Wheels (WOW)

3
2. WIRELESS PATIENT MONITORING 8. SMART BED
 Technologies that enable remote surveillance of  Uses advanced medical technology at the point
patient vital functions through the use of of care, connecting important information
internally and externally located patient devices. wirelessly, seamlessly, and directly to care
providers.
3. MOBILE SYSTEM ACCESS  Smart beds can monitor a patient's BP,
 Mobile technologies that enable remote/virtual temperature, heartbeat, oxygen levels, and
access to current clinical systems such as more, and deliver it to a central node which
Electronic Health Records (EHRs) and Picture can be accessed remotely.
Archiving and Communication System (PACS)
 Examples: 9. CREATING VIRTUAL ORGANS FROM MEDICAL
 Websites IMAGING (3D Printing)
 portal  Creating digital copies of patients‘ organs to
 mobile apps preplan device implantations and assess if there
is improved function or outcomes in a virtual
4. MEDICAL DEVICES (to include Wearables) environment before a patient enters a cath lab
 Mobile and/or wireless enabled technologies or operating room.
that capture and track key care compliance and
disease management area. 10. USE OF HIGH FIDELITY SIMULATION IN NURSING
EDUCATION
5. VIRTUAL CONSULTATION  HFS seeks to address the cognitive, affective,
 Remote connectivity and multimedia solutions and psychomotor domains of active learning
that enable virtual care consultation, education, (Bastable, 2008)
and therapy  It has noted that simulation effectively provides
a safe environment for learning and applying
6. AGING IN PLACE essential skills for nursing practice.
 Remote technologies that enable clinically
monitored independent living for aging 11. THE RISE OF AUGMENTED AND VIRTUAL REALITY
populations. IN HEALTHCARE
 Examples:  Aids in neuro-surgical planning and help
 Personal Emergency Response Systems educate patients on what will happen during
(PERS) their procedures in true 3-D using the patient's
 Video Consultations own imaging scans.
 Motion/Activity monitoring
 Fall detection, Aggregation and Transport 12. ROBOTICS (Surgery and Invasive Procedures)
 Robotics is the engineering science and
7. PHOTOVOICE technology of robots, and their design,
 A qualitative method of community-based manufacture, application, and structural
research that uses photographs to encourage disposition
knowledge and transformative change,
especially among marginalized groups.
 Patient-participants are asked to capture and
share photographs that relate to a particular
condition, as well as their sentiments regarding
it.

You might also like