Professional Documents
Culture Documents
Nursing Informatics Note - d1
Nursing Informatics Note - d1
INTRODUCTION
Since the days of Florence Nightingale, nursing has placed a priority on patient-centered care.
Kindness and compassion were the cornerstones of that care. Increasingly, informatics also
plays a fundamental role.
Healthcare delivery largely depends on information for effective decision making. Every
nursing action relies on knowledge based on information. The nursing process begins with
obtaining and communicating information in the initial and ongoing assessment. Nursing
informatics (NI) is therefore the management of data, information, knowledge, and wisdom
relevant to nursing (ANA, 2008).
Advances in information technology (i.e., computers and software) over the last two decades
has created significant opportunities for nurses to be aware of current information when
making decisions. Now we have faster computers to process data, more sophisticated
software to assist in the transformation of data into useful information, and powerful
communication technologies such as the internet to enable the secure transmission of
information among health service organizations and professionals.
As we enter the era of the electronic health record (EHR), NI has become an indispensable
element in the practice of nursing. It therefore becomes necessary for trainee nurses to be
equipped with requisite knowledge to enable them utilize informatics skills in their practice.
Florence Nightingale has been recognized as an early informatics nurse because of her use of
data to inform knowledge and changed nursing practices. Her report on health of British
soldiers in Crimea was based on her ability to gather, organize, process and analyze data
(Ozbolt & Saba, 2008).
1
In the 1970s nurses became instrumental in the development of nursing application for
hospital information system. By early 1980s, nursing informatics was broadly defined as the
use of computer technology to support all aspects of nursing practice. However, the term
“nursing informatics” was first used by Scholes and Barber in their address to the
MEDINFO (Medical Information) Conference held in Tokyo, Japan, in 1980. In the same
year, medical and nursing informatics specialty emerged. Personal computer was introduced
which allows for flexibility in how these clinical systems were used.
In 1990 and beyond, the internet became the tool for web-based clinical applications,
communication and access to evidence-based resources and application at the point of care.
Telemedicine became possible and was recognized as a specialty in the late 1990s.
Post-2000 era saw an unprecedented explosion in the number and sophistication of both
computer hardware and software. Electronic patient record became an integral part of clinical
information systems.
Now nursing informatics is a field of study which is still developing and is based on the
concept that health care data and information can be effectively managed and communicated
using computer systems, networks, modems and telecommunications.
In Ghana, the national policy on e-Health came into force in 2010 (Acheampong, 2012). By
2015, Nursing and Midwifery Ghana had introduced Nursing informatics as a subject of study
in Nursing Training Institutions.
INFORMATICS
What is Informatics?
The word “Informatics” comes from the French word, “Informatique”, which means
computer science.
2
2. the science of how to use data, information and knowledge to improve human health
and the delivery of health care services.
3. refers to processing, storing, and retrieving data to optimize healthcare delivery and
improve patient outcomes.
Computer science: refers to the study of computers (both hardware and software design) and
their uses.
Information science: is the study of information and how it is used by people within
organizations.
Note
- The knowledge and ability to use computers and related technology efficiently.
- The familiarity with computers and how they work, especially a non-technical
understanding of computers and the role they play.
The individuals who have the knowledge and skills to use a computer and other related
technology is known as computer literate.
3
Qualities of Information Literate
• Understand the economic, legal, and social issues surrounding the use of information, and
access and use information ethically and legally. The focus here is the patient and the process
of care (Imhoff et al, 2001).
Health Informatics
Health informatics is defined as the development and assessment of methods and systems for
the acquisition, processing and interpretation of patient data with the help of knowledge from
scientific research. This implies that health informatics is not tied to the application of
computers but more generally to the entire management of information in healthcare. The
focus here is the patient and the process of care (Imhoff et al, 2001).
• Bio-Informatics
• Dental Informatics
• Clinical Informatics
4
• Medical Informatics
5
Nursing informatics is defined as, a specialty that integrates nursing science, computer
science and information science to manage and communicate data, information, knowledge
and wisdom in nursing practice (ANA, 2008).
It is also defined as the combination of computer science, information science and nursing
science designed to assist in the management and processing of nursing data, information and
knowledge to support the nursing practice and delivery of care.
1. Computer Science
2. Information Science
3. Nursing Science
4. Cognitive Science
Computer Science
Computer science: refers to the study of computers (both hardware and software design) and
their uses.
COMPUTER
6
Figure 7. Computer
What is Computer?
• An electronic device that processes data into information that is useful to people.
• An electronic device that can be programmed to perform the following major
functions:
• gathers data (or allows users to input data).
• processes that data into information.
• outputs data or information.
• stores data and information.
- The knowledge and ability to use computers and related technology efficiently.
7
- The familiarity with computers and how they work, especially a non-technical
understanding of computers and the role they play.
- The knowledge of non-technical aspects of capabilities and limitations of computers.
The individuals who have the knowledge and skills to use a computer and other related
technology is known as computer literate.
Classification of Computers
• Embedded systems/Microcontrollers
• Mobile/handheld devices
• Personal computers
• Servers
• Mainframe
• Supercomputer
8
Embedded systems/ Microcontrollers;
These are the tiny, specialized microprocessor (chip) installed in “smart” appliances and
automobiles.
9
Figure 9. Smartphones
10
Figure 11. Palmtop
Personal Computers
11
Servers
12
Mainframe Computers
Supercomputers
These are large, fast computers which are designed to concentrate on specific scientific tasks.
13
Components of a Computer
• Hardware
• Software
Computer Hardware
Hardware is the physical component of the computer. It consists of System Unit and
Peripheral devices.
System Unit is the cabinet that houses motherboard, CPU and Memory modules. Peripheral
devices are auxiliary devices that input and output information. Eg. Mouse; Keyboard;
Webcam; Microphone; Monitor; Speakers; Projector; Printer; USB Flash Drive; External
Hard; etc.
14
- Central Processing Unit (CPU)/Processor; Known as the brain of the computer,
directs and controls the actions of all other components of the computer. Some of the
best processors include;
1. AMDFX-9590,
2. AMD FX-8320,
3. AMD FX-6300,
4. Intel Core i7-5820K,
5. Intel Core i7- 4930K,
6. Intel Core i75960X, I
7. ntel Core i5-6600K, and
8. Intel Xeon processor (Futuremark, 2016).
Hardware System
1. Device Driver - a program that determines how a computer will communicate with a
peripheral device.
2. Plug-n-play - The ability to add a new component to a system and have it work
automatically without technical configuration.
• Keyboard
• Scanners
• Microphone
• Mouse
• Digital camera
• Trackball
• Touch screen
• Game Controller
15
• Monitor
• Speakers
• Printers
Storage devices: Are apparatus for recording computer data. Eg. Flash drive, floppy disk
drive, hard disk drive, zip drive, etc.
16
Storage Medium: Is the material on which data is and stored. Eg. Hard disc, floppy disc,
compact disc, memory card, etc.
17
COMPUTER SOFTWARE
Software is a set of instructions that tells the computer what to do. Or programs that enable
the hardware to perform different tasks.
Types of software
There are two main types of software; application software and system software.
System software is designed to provide platform for other software. It is essential for
platform operation and support. Eg. Windows10, MacOS, MacBook, android, iOS, etc.
Application software is a tool for getting things done. Eg. Excel, PowerPoint, Chrome, MS
Word, Music player, Skype, etc.
Productivity software are programs that enable you to perform tasks required in home,
school, and business. Programs like Office Suite, is the most commonly used both in the
workplace and on personal computers. Examples include;
- Word processing : to create and edit written documents. Eg. MS Word, Open Office
Writer, KOffice KWord, Apple Pages, Corel Word Perfect or Corel Write.
- Spreadsheet : used to perform calculations and numerical analyses. Eg. MS Excel,
Open Office Calc, KOffice KSpread, Corel Quattro Pro, Apple Numbers.
- Presentation : usually use for business or classroom presentation using text, images,
graphs,. Eg. MS Power Point, Open Office Impress, KOffice KPresenter, Corel Show,
Apple Keynote.
- Email: integrates email programs to send and receive electronic mail.
- Database : database creation for text and numbers
These are;
18
• SPSS (Statistical Package for Social Science)
• Epi Info
• STATA
• SAS (Statistical Analysis System)
• Minitab
• MatLab
Communication Software
Communication software enable users to dialogue, share, and network with other users via
the exchange of email or instant message(IM), by accessing the World Wide Web ,or by
engaging in virtual meetings using conferencing software. The features include;
- Email client: Allows a user to read, edit, forward, and send email messages to other
users via an Internet connection. Eg. Resident programsMicrosoft Outlook and Outlook
Express, Eudora, Pegasus, Mozilla Thunderbird, Lotus Notes Web-based programs
Gmail, Yahoo Mail, Hotmail
- Internet browsers: Allows users to access, browse, download, upload, interact with
text, video, and other web-based documents. Eg. Mozilla Firefox, Microsoft Internet
Explorer, Google Chrome, Apple Safari, Opera, Microbrowser (for mobile access).
- Instant Messaging (IM): It facilitates real-time text messaging and allows users to attach
images, videos and other documents via personal computer, cell phone and handheld
19
devices. Eg. MSN Instant Messenger, Microsoft Live Messenger, Yahoo Messenger,
Apple iChat
- Conferencing: Enables users to communicate in a virtual meeting room setting to share
work, discussions, planning, using an intranet or Internet environment; can exhibit files,
video, and screen shots of content. Eg. Adobe Acrobat Connect, Microsoft Live Meeting
or Meeting Space, Go To Meeting, Meeting Bridge, Free Conference, Rain Dance,
WebEx
An operating system is a program that acts as an interface between the user and the
computer hardware and controls the execution of all kinds of programs.
Types of OS
Server OS
Desktop OS
Mobile OS
Server OS include Mac OS X server, Windows server, Red Hat (Linux/Unix), Solaris
(Linux/Unix), FreeBSD, etc.
20
Mobile OS include Apple iOS, BlackBerry OS, Windows⁰ mobile and Android.
Functions of OS
• Manages memory
• Manages hardware
Categories of Software
• Open source software – free software available for general public to use.
• Off-the-shelf software – Is commercial software that are available in the market that
can be purchased for use.
Computer Specifications
The following are the things you need to consider if you want to purchase a computer;
• System
• USB Port
• Hard disk
• Networking
• Operation system
• Backup devices
• Brand
21
• Processor
• Memory
• Battery type
22
CT SCAN
MRI
23
ECG
ULTRASOUND
24
HARVEY STIMULATOR
Harvey Stimulator
Harvey simulator is a proven simulation system used to teach bedside cardiac assessment
skills that transfer to real patients
25
Optical Mark Recognition is a technology that reads hand-drawn marks such as small
circles or rectangles.
Biometrics refers to technologies that measure and analyse human body characteristics such
as:
• DNA
• Fingerprints
• eye retinas and irises
• voice patterns
• facial patterns
• and hand measurements,
26
Smart card is any pocket-sized card with embedded integrated circuits.
This is a technology whereby digital data encoded in RFID tags are captured by RFID reader
via radio waves.
27
Figure 28. RFID IMPLANT
28
Figure 30. ANTI THEFT SYSTEM
29
Disadvantages of using computers
• Health Risks
• Violation of Privacy
• Public Safety
• Impact on Labour Force
• Impact on Environment
INTERNET
30
Internet (simply called “Net”) is
- the wider network that allows computer networks around the world run by companies,
governments, universities and other organisations to talk to one another.
- Computer
- Network
- Services
Computer Network
Types of Network
• Wide Area Network (WAN): is a large computer network that connects groups of
computers over large distances. It uses telecommunication lines.
Uses of Internet
31
• searching for jobs - both the employer and applicant use the Internet to post open
positions, apply for jobs and recruit individuals found on social networking sites
like LinkedIn.
• Online discussion groups and forums
• Research
• Reading electronic newspapers and magazines
• Online shopping, or e-commerce.
- Set of protocols and tools that allow us to share information with each other.
Web browser is software that allows you to locate, view, and navigate the Web.
Examples:
- Google Chrome
- Safari
- Mozilla Firefox
- Opera
- Internet explorer, etc.
Search Engine
- is a web based tool that is used by people to locate information on the internet.
- It allow users to search the internet for content using keywords.
Examples:
- Google
- You Tube
- Facebook
- Twitter
- Amazon
- Yahoo!
- Bing, etc.
32
- E-mail
- Instant messaging (IM)
- Voice/Video calls or conferencing (VoIP)
- Social media
E-commerce
• Types
• Payment option:
– Mobile money
– VISA
• Debit cards
• Credit cards
• Master card
Benefits of Internet
33
• Access to the internet of things (IoT), which allows home appliances and devices to
connect and be controlled from a computer or smartphone.
• The ability to save data and easily share files with cloud storage.
• The ability to monitor and control personal accounts instantly, such as bank accounts
or credit card bills.
Big Data: This refers to the phenomenal growth, use, and accessibility of information. The
sources include social media updates, search data, multimedia content, and even climate
information, among others. Big data could also mean the rise of new tools to analyse all the
data available to you.
BYOD (Bring Your Own Device): The refers to institutional policy that allows employees to
use their personal devices such as smartphones, laptops and tablets to access work related
information, software and applications. This also involves getting IT support.
Cloud Computing: refers to products, services, and platforms that allow businesses and other
users to access computing resources that are delivered to them over the Internet or other
networks.
Content Management: ls a collection of tools, software, and processes that allow you to
collect, manage, and publish information on any medium.
Data Centre: ls a facility that houses your computer systems, components, servers and storage
systems.
Green Technology: ls environmental friendly and innovative technology that relate to safety,
health, energy efficiency, renewable resources, and recycling, among other things.
34
Virtualization: is the development of a virtual version of an IT resource, such as a server,
storage, device and operating system. This gives rise to virtual machines where you can run
programs very much like on a physical machine.
Biometrics: refers to the physical characteristics that are unique to the user. They are used as
account or user verification, typically in line with This can include facial recognition,
fingerprints, and voice recognition.
Ethic is the standards that determine whether an action is good or bad. Ethics includes
standards of professional practices, code of conducts etc.
Computer ethics is the moral guidelines that govern the use of computers.
• counterfeit software,
• hard disk loading,
• corporate software piracy,
• Internet software piracy.
A software licenses
Intellectual Property
An Intellectual property refers to unique and original works such as ideas, inventions,
writings, art, product names and logos etc, sually results from creativity.
35
Intellectual Property Rights
Intellectual property rights are the rights to which the creator is entitled for their work.
Intellectual property right includes:
• Copyright
• Trademark
• Patent
• copy
• distribute
• adapt etc.
Plagiarism
Means taking someone else’s work and passing it off as your own.
Fair use - permits students to make use of copyrighted works for limited purposes including;
• Criticism,
• News reporting,
• Educational and references.
Trademark
Trade marks are signs which allow a business to distinguish its products or services from
those of other suppliers.
Trade marks can include words, letters, numerals or designs and even the shape of goods or
their packaging.
Computer Security
Cyber crime encompasses any criminal act dealing with computers and networks. It also
includes traditional crimes conducted through the Internet.
Cybercriminals are individuals who use computers, networks, and the Internet to
perpetrate/commit crime.
36
A hacker is Anyone who unlawfully accesses a computer system.
A Cracker is any one who gain unauthorized access to a computer system with a criminal
intent.
• Install Firewall.
• Install Intrusion detection software.
• Provide access control mechanism (set a password or use biometric devices etc.).
Note
Do Not Choose;
1. Your name in any form — first, middle, last, maiden, spelled backwards, nickname or
initials.
2. Any ID number or user ID in any form, even spelled backwards.
3. Part of your user id or name.
4. Any common name, e.g., Sam, Jane.
5. Words or phrases with all the vowels or white spaces deleted.
6. Words or phrases that do not mix upper and lower case, or do not mix letters or
numbers, or do not mix letters and punctuation.
7. Any word that exactly matches a word in a dictionary, forward, reversed, or
pluralized, with some or all of the letters capitalized.
8. Passwords of fewer than six characters.
9. The name of a close relative, friend, or pet.
10. Your phone or office number, address, birthday, or anniversary.
11. Acronyms, geographical or product names, and technical terms.
12. Any all-numeral passwords, e.g., your license-plate number, social-security number.
13. Names from popular culture, e.g., Harry Potter, Sleepy.
14. A single word either preceded or followed by a digit, a punctuation mark, up arrow, or
space.
37
Virus – Is a program that attaches itself to another program and spreads itself to other
computers. Viruses are hidden within the code of a host program.
Types of Malware
1. Viruses
2. Worms
3. Trojans
4. Rootkits
5. Spyware
6. Crimeware
7. Adware
1. Install Anti-virus
2. Install Firewall
3. Do not download e-mail attachments when not sure of the source.
1. Sending sexually explicit photograph, messages and video in a text message or email.
2. The smartphones and the social media apps/websites have become a dangerous tool
causing more harm.
3. It has become a very common practice to send nude pictures or videos to loved ones.
4. A lot of people have very sensitive data on their phone and this can be very
dangerous.
38
2. Don’t ever allow yourself to be captured by anyone.
3. You can’t trust anyone to keep your data safe – it might genuinely not be their fault.
4. Never forward any leaked data.
5. Be guided by common sense.
Information Science
Information science: is the study of information and how it is used by people within
organizations.
Blum (1986) introduced a framework that explains clinical information system and its impact
on health care. This framework is based on the following concepts;
1. Data
2. Information
3. Knowledge
In reference to the concept of data, information, and knowledge, Blum explained that the
health informatics could not be defined by information technology that is used in the practice
on medical informatics, but rather the discipline of informatics is defined by how the provider
uses technology to meet human needs. The emphasis here is on the medical use of the
information technology and not on the application of technology to medicine.
Data
39
• Number
• Word
• Picture
• Sound
2. Is defined as facts or figures that can be analysed or used in an effort to gain
knowledge or make decisions.
3. A discrete observations that are not interpreted, organized or structured
4. An uninterpreted item.
For example is a patient/ client’s weight of 65kg. Without additional data of height, age, etc.,
it would be impossible to interpret the significance of an individual number.
1. Subjective data
2. Objective data
Subjective data: These are information from the client or the patient. It represents patient’s
feelings, perceptions and thoughts and can only be obtained or discovered by asking
questions (interview). This cannot be directly observed. For example, if a patient in an
interview tells a nurse that he has been coughing, vomiting, having headache, abdominal
pain, feeling nauseous, loss appetite for food, etc for the past three days, the patient’s
experiences here are referred to as subjective data. Subjective data are therefore symptoms
of conditions that can only be obtained from a client/patient through assessment.
Objective data: These are assessment information obtained through observations (signs of a
condition) using our five senses or are discovered through physical examination, laboratory
investigations and diagnostic testing. It is either a measurement or an observation. Examples
of objective data are;
1. Body temperature
2. Pulse (Heart rate)
3. Respiration
4. Blood pressure
40
5. Facial expression
6. Wound
7. Dry skin, etc.
1. Observation- focuses on client’s physical condition and functions that can be seen.
2. Physical examination- It is a hand-on-skill that focuses on body systems and it
involves inspection, palpation, percussion and auscultation.
3. Interview- purposeful interaction between the client and the expert (nurse) aimed at
gathering data.
Sources of data
1. Primary
2. Secondary
Primary source – This refers to data (useful information) collected directly from the client or
patient. It includes both subjective and objective data. The aspect of data that may be
collected from a client include;
A. Physical data: Demographic data such as name, age, sex, marital status, no. of
children, education background, past and present medical history.
B. Psychological data: These include client’s emotional state, mental status,
attitudes, coping strategies and history of psychological problems, etc.
C. Developmental data: refers to information on the growth and development of
the client.
D. Socio-economic data: Involves occupation, social status, income, life style,
etc.
E. Spiritual data: Religious affiliation
F. Environmental data: These include safe drinking water, housing, sanitation,
etc.
41
Secondary source – data collected from family and significant others, health team members,
and medical records.
Information
For example:
1. Suppose someone states the number 99.5. What does that mean? It could be a
radio station or a score on a test. Now suppose someone says that Mr.
Sampong’s temperature is 41°C —what does that convey? It is then known
that 99.5 is a person’s temperature. The data (99.5) were processed to the
information that 99.5° is a specific person’s temperature.
Height, weight, age, and gender are data elements that can be used to calculate the Body
Mass Index (BMI). BMI is a person’s weight in kilograms divided by the square of height in
meters.
Types of information
1. Static information
Static information is information that are concrete, constant and stay same. Once a static
information source has been created, it is unlikely to be changed or updated for a significant
amount of time. Think about an encyclopaedia which has been produced on a CD-ROM.
42
Once the encyclopaedia has been written and checked for accuracy, it probably will not be
updated again for at least a year. So once the CD-ROM has been made the data will not
change - it will be static. Examples of static sources of information include books and
newspapers. It takes months or even years to write a book, edit it and publish it. Once they
are printed and published the information remains unchanged for a long time.
Dynamic information
Dynamic information on the other hand means to ever changing information. A good
example of a dynamic information source would be a web site which is updated on a regular
basis. Think about the Citifm, Joynews or BBC news web site – it changes throughout the
day as news stories happen around the world. The growth of video phones and satellite
technology means that news can be reported on whilst it is still happening.
However, you need to be clear that not all websites are dynamic information sources, some
could be classified as static. Although we are constantly adding new worksheets and pages to
this web site, the theory mini-web that you are using right now probably won't be updated
again for at least another year. That would be classified as a static source of information.
One must also take note of the fact that although many websites are updated regularly, there
is nothing to guarantee that the information is correct or unbiased. No one polices the internet
and basically anyone with access to web creation software and hosting space can create a web
site about anything they like. Unless the content is illegal, then it will stay on the web for
anyone to view.
A valuable and meaningful information must be of good quality. Its value relates directly to
how the information informs decision making.
1. Accessibility: - The right of user (authorized) to obtain the right information at the
right time and in the right format to meet his or her needs.
43
2. Security: - preventing information from getting to unauthorized user.
3. Timeliness: - making information available when it is needed for the right purpose
and at the right time.
7. Flexibility: - means that the information can be used for a variety of purposes.
8. Reliability: - information must come from clean data or authoritative and credible
sources.
10. Utility: - refers to the ability to provide the right information at the right time to the right
person for the right purpose.
11. Transparency: - information must be clear as much as possible so that the user can apply
or use the information to accomplish a task.
12. Verifiability: - means that one can check to verify or prove that the information is
correct.
Knowledge
Knowledge is the awareness and understanding of a set of information and ways that
information can be made useful to support a specific task or arrive at a decision.
Types of Knowledge
1. Explicit knowledge:
44
These are factual or documented knowledge. It can be acquired through formal
education. This knowledge is expressed in words, numbers, and symbols and stored in
books, computers, etc. Explicit knowledge can be articulated and easily
communicated between individuals and organizations.
2. Tacit (Implicit) knowledge (“Know how”): This knowledge is acquired through
personal experience. This knowledge is not taught from a book but it is rather
acquired through experience of working in an organization or with others.
Wisdom
Wisdom may be defined as the appropriate use of data, information, and knowledge in
making decisions and implementing nursing actions. It includes the ability to integrate data,
information, and knowledge with professional values when managing specific human
problems. Wisdom of nursing is demonstrated when the nursing data, information and
knowledge are managed and used in making appropriate decisions that meet the health needs
of individuals, families, groups and communities (ANA, 2015)
Information System
45
• Management Information System (MIS): Provides summaries of internal sources of
information, such as information from the transaction processing system, and
develops a series of routine reports for decision making.
• Office System: Facilitates communication and enhances the productivity of users
needing to process data and information.
• Transaction Processing System (TPS): Processes and records routine business
transactions, such as billing systems that create and send invoices to customers, and
payroll systems that generate employees’ paystubs and wage checks and calculate tax
payments.
• Hospital Information System (HIS): Manages the administrative, financial, and
clinical aspects of a hospital enterprise. It should help to link financial and clinical
outcomes.
These two terms are almost used interchangeably. The electronic medical records replaced
paper records of a patient’s medical history. The electronic health record includes more
health data, test results, and treatments. It is also designed to share data with other electronic
health records so other healthcare providers can access a patient’s healthcare data. Examples
of EHR include;
It helps healthcare providers manage daily operations such as scheduling and billing.
Healthcare providers, from small practices to hospitals, use practice management systems to
automate many of the administrative tasks.
It connects separate patient records across databases. The index has a record for each patient
that is registered at a healthcare organization and indexes all other records for that patient.
MPIs are used to reduce duplicate patient records and inaccurate patient information that can
lead to claim denials.
Patient Portals
46
These allow patients to access their personal health data such as appointment information,
medications and lab results over an internet connection. Some patient portals allow active
communication with their physicians, prescription refill requests, and the ability to schedule
appointments.
Also known as telehealth, it allows medical sensors (a device) to send patient data to
healthcare professionals. It frequently monitors blood glucose levels and blood pressure for
patients with chronic conditions. The data is used to detect medical events that require
intervention and can possibly become part of a larger population health study.
47
7. Korle-Bu Teaching Hospital
8. Kofo Anokye Teaching Hospital
9. Bank of Ghana Hospital
10. Tamale Teaching Hospital
11. International Maritime Hospital
Nursing science is the development of theories and practical concepts for improving how
clinicians and patients administer care and manage conditions.
The American Nurses Association (2016) defines nursing as the protection, promotion, and
optimization of health and abilities, prevention of illness and injury, facilitation of healing,
alleviation of suffering through the diagnosis and treatment of human response, and advocacy
in the care of individuals, families, groups, communities, and populations.
The focus of nursing is on human responses to actual or potential health problems and
advocacy for various clients.
This definition of nursing science, therefore focuses on the ethical application of knowledge
acquired through education, research, and practice to provide services and interventions to
patients to maintain, enhance, or restore their health and to acquire, process, generate, and
disseminate nursing knowledge to advance the nursing profession.
48
Consider this case scenario;
Kofi B. is a registered nurse who works in a very busy hospital emergency Unit. He has just
admitted a 69-year-old man whose children brought him to the hospital because he is having
difficulty in breathing. Kofi immediately clips a pulse oximeter to the patient’s finger and
performs a very quick assessment of the patient’s other vital signs. He discovers a rapid pulse
rate and a decreased oxygen saturation level in addition to the rapid and laboured breathing.
Kofi notices that the patient is not in immediate danger and that he does not require
intubation. Kofi focuses his initial attention on easing the patient’s laboured breathing by
elevating the head of the bed and put patient on oxygen ; he then hooks the patient up to a
heart monitor. Kofi continues to assess the patient’s breathing status as he performs a head-
to-toe assessment of the patient that leads to the nursing diagnoses and additional
interventions necessary to provide comprehensive care to this patient.
Cognitive Science
The term, “cognitive science” was coined by Prof. Hugh Christopher Longuet-Higgins (1923
– 2004). Cognitive Science therefore, refers to the study of the mind, intelligence, and
behaviour from an information-processing perspective.
In other words, cognitive science is simply the study of the mind and how information is
processed in the mind.
This type of the building block is an interdisciplinary field that explores the nature of the
mind, knowledge representation, language, problem solving, decision making, and the social
factors that influence the design and use of technology.
Connectionism
It is a component of cognitive science that uses computer modeling through artificial neural
networks to explain human intellectual abilities. Neural networks can be thought of as
interconnected simple processing devices or simplified models of the brain and nervous
system that consist of a considerable number of elements or units. The diagram below
represents artificial neural networks.
49
Dehydration
Dry mouth, muscle crumps, decreased urine production, dry skin, headaches & dizziness
The theoretical model that underpins Nursing informatics is called Novice to Expert Theory.
This theory was first proposed by Hubert and Stuart Dreyfus (siblings) in 1980 and was
called, “Dreyfus Model of Skill Acquisition”. This theory which is now called “Novice to
Expert theory” was modified and applied to Nursing informatics by Patricia Benner in 1984.
50
Novice
A novice here is someone who does not know anything about the subject he/she is
approaching and has to memorize its context-free features. The novice needs guidelines to
help his or her studies. To improve, the novice needs monitoring, either by self-observation
or instructional feedback. For example, a nurse learning to use a new hospital information
system needs explicit instruction and rules to learn to use the computer interface and
manipulate the software.
Advanced Beginner
An advanced beginner is still dependent on rules, but as he/she gains more experience with
real-life situations, he/she begins to notice additional aspects that can be applied to related
conditions.
Competent
At this stage, the competent person grasps all the relevant rules and facts of the field and is,
for the first time, able to bring his/her own judgment to each case. This is the stage of
learning that is often characterized by the term problem-solving. A competent level nurse
would be able to use a hospital information system with ease and know how to solve
technical difficulties or interpret conflicting data.
Proficient
The fourth stage is called fluency. At this level the learner is knowledgeable in the field of
study and would be able to do step-by-step analysis and be able to solve problem holistically.
The proficient hospital information system learner would know how to interpret data from all
departmental information and provide guidance to other disciplinary members as needed.
Expert
An expert is someone who is very knowledgeable and very experienced in how things are
done in his or field of specialty ( has the technical know-how). Specific situations normally
dictates their instinctual appropriate action. He or she sees what needs to be done, and
decides how to do it. The expert not only knows what needs to be achieved, but he/she knows
how to achieve his or her goal.
51
Note
Both Dreyfus and Benner estimated that it takes approximately five years to move through
the five stages from novice to expert. They also explained that not all novices become
experts. Some people get 'stuck' at the competent or proficient stages. According them the
successful graduation from Novice to Expert level depends on two personal characteristics.
These are;
1. Deliberate practice;
2. The willingness to take risk to go beyond the “norm”.
Within the field of nursing informatics, this theory can be applied to:
The goal of nursing informatics (NI) is to improve the health of populations, communities,
families, and individuals by optimizing information management and communication (ANA,
2001, p. 17). Information management is integral to providing high-quality health care cost-
effectively. To provide this level of care, it is important to have accurate clinical information.
52
2. To study the process and structure of nursing information to support clinical decision-
making.
3. To help nurses know how to retrieve evidence-based information and render standard
care.
4. To help nurses access relevant information and use it efficiently to render quality care.
5. To safeguard personal records of patients.
6. To enhance sharing of data within the co-workers and other health disciplines.
7. To develop information-sharing network and data handling standards locally and
nationally.
Competencies of Informatics
1. beginning nurse,
2. experienced nurse,
3. informatics specialist, to
4. informatics innovator
The entering requirements for beginning nurse should include computer literacy and basic
information management skills. Computer literacy skills include skills in use of;
1. word processing,
2. healthcare database and spreadsheet applications,
3. presentation software, and
4. email.
Information literacy skills enable a nurse to locate, access, and evaluate clinical data. Access
includes the ability to perform bibliographic retrievals using the Internet and library-based
resources (McNeil et al., 2003).
53
The important technology skills of the entry-level nurse include knowing how to use nursing-
specific software such as;
1. computerized documentation;
2. use of patient care technologies such as monitors, pumps, and medication dispensing;
3. information management for patient safety
to sustain their specific area of practice. These skills include making judgments based on
trends of data in addition to collaboration with informatics nurses (IN) in the development of
nursing systems.
The nurse informatics innovator is expected to have advanced informatics preparation and
possesses skills for conducting informatics research along with theory development (Thede,
2003).
54
5. It allows for evaluation of nursing practice.
6. It affords nurses a useful knowledge in decision making at the operational and
strategic planning level of health care.
7. It allows articulation of organized information.
Clinical Practice
Nursing Administration
Nursing Education
55
Distance learning/teaching via the internet.
• Online courses.
• Literature access and retrieval
• Online examination
• Computerized record-keeping.
• Computerized-assisted instruction.
• Distance Learning-Web based courses and degree programs.
• Presentation software for preparing slides (MS PowerPoint), MS Excel and MS
Word.
Research
CINAHL (Cumulative Index to Nursing and Allied Health Literature): This is the
definitive research tool for nursing and allied health professionals.
• The ability to find trends in aggregated data, that is data derived from large population
groups - Statistical Software, SPSS.
SPSS - Statistical Package for the Social Sciences.
56
4. Facilitates data collection for research
5. Easy access to multiple information.
6. Improves communication and decreases error.
7. Provides historical and current data reports for effective data management and trend
finding.
8. Support software provides alert to any discrepancies in patient medications.
9. Support software helps to identify food allergies.
10. It reduces turnaround time.
11. It helps nurses and midwives work faster, smarter and makes them more competent.
NURSE INFORMATICIST
Nurse informaticists play a critical role in not only developing health care technology but
educating staff and evaluating the results of implementation. Other responsibilities and duties
include:
57
b. Troubleshooting
c. Escalating issues as needed
5. Assisting in the transition from one system's technology to another.
6. Evaluating the success of implementation; revising as needed.
7. Serving as project managers.
8. Assisting in ensuring organizations meet state health care laws and regulations.
9. Serving as a resource to staff.
10. Serving as a liaison between staff and information technology experts.
11. Assessing user requirements and developing solutions.
12. Serving as an educator to staff and new nurses.
13. Developing organizational policies and standards.
14. Researching different informatics topics that affect health care providers as well as
patients.
TELEMEDICINE (TELEHEALTH)
The term “Telemedicine” was coined in the 1970s, which literally means “healing at a
distance” (Strehle & Shabde, 2006). This signifies the use of ICT to improve patient
outcomes by increasing access to care and medical information.
Definition of Telemedicine
Telemedicine can be defined as the use of technology (computers, video, phone, messaging)
by a medical professional to diagnose and treat patients in a remote locations.
According to WHO, Telemedicine is the delivery of health care services, where distance is a
critical factor, by all health care professionals using information and communication
58
technologies for the exchange of valid information for diagnosis, treatment and prevention of
disease and injuries, research and evaluation, and for the continuing education of health care
providers, all in the interests of advancing the health of individuals and their communities
(WHO, 1998).
Branches of Telemedicine
Teledermatology: allows dermatology consultations over a distance using audio, visual and
data communication, and has been found to improve efficiency
Teledentistry: is the use of information technology and telecommunications for dental care,
consultation, education, and public awareness in the same manner as telehealth and
telemedicine.
Purpose of Telemedicine
Benefits of Telemedicine
59
8. Doctors get to stay home and operate from home during a pandemic.
9. Reduced medical overhead costs.
10. Support for people with chronic conditions.
11. Access to online psychiatric support.
Limitation of Telemedicine
System Integration
• The process of linking together different computing systems and software applications
both physically and functional to act as a coordinated whole.
• The process of connecting different sub-systems (components) into a single larger
system that functions as one.
a. improve productivity
b. improve quality of operations
IHS is the organization and management of health services so that people get the care they
need, when they need it, in ways that are user-friendly, achieve the desired results and
provide value for money (WHO, 2017). It is characterized by the sharing of information
among team members related to patient care.
60
The primary focus of IHS is to provide a coordinated health care to patients and their
families.
61
Or it is the ability to communicate, collect data, and use information for patient care by many
users who need access to patient information.
Intra-operability- describes the exchange of data between systems used in the same
organization or developed by the same vendor. This strictly focuses on operations within
certain parameters.
Change is the process of altering or replacing existing knowledge, skills, attitudes, systems,
policies, or procedures.
Though change is a dynamic process that necessitates alterations in behaviour and usually
causes some conflict and resistance, it also can stimulate positive behaviours and attitudes and
improve organizational outcomes and employee performance.
It is important to note that change at any level requires different behaviour from the people
involved. Skills needed to effect change include;
1. leadership,
2. management,
3. political savvy (know-how),
4. analytical,
5. interpersonal,
62
6. system,
7. business, and
8. communication skills (Nickols, 2007; O’Shea, 2002).
Group Presentation
THANK YOU
63
Bibliography
American Nurses Association. (2001). Scope and Standards for Nursing Informatics
Practice. Silver Spring, MD: Nursesbooks.org.
64
American Nurses Association. (2015). Nursing Informatics: Scope and Standards of
Practice. (2nd, ed.). Silver Spring, MD: Nursingbooks.org.
Graves, J., & Corcoran, S. (1989). The study of nursing informatics. IMAGE: Journal
of Nursing & Scholarship, 21(4), 227-231.
Wootton R, Jebamani LS, Dow SA. (2005). E-health and the Universitas 21
organization: Telemedicine and underserved populations. Journal of Telemedicine
and Telecare, 11(5):221–224.
65