Reviewer Nursing Informatics
Reviewer Nursing Informatics
Reviewer Nursing Informatics
Goal of Community Health Informatics- Effective and timely assessment that involves
monitoring and tracking the health status of populations including identifying and controlling
disease outbreaks and epidemics.
Ambulatory Care Covers a wide range of health care services that are provided for
patients who are not admitted overnight to a hospital.
•Increased accountability.
•The need for continuous support.
•Privacy and confidentiality of information.
•Accessibility and security of data and information.
•Integration and support to the other system
The Role of Nurse Using Information System in the Ambulatory Care System
•The very basic objective of the automated ambulatory care information system is to easily
integrate the data to the other data and easily translate these data into information.
•The effective transformation of data can be integrated to the other processes to transform
it into knowledge.
•The ambulatory care nurse and other health care provider should be capable enough to
implement the process effectively.
Planning - is the process of deciding in detail how to do something before you start to
do it.
Response - a response action to a situation that may cause an immediate and serious
threat of harm to human health or the environment.
Informatics and Emergency planning This chapter will explore the intersection
between informatics and emergency planning and response
1. A Federal department or agency acting under its own authority has requested the
assistance of the Secretary
2. The resources of State and local authorities are overwhelmed, and Federal
assistance has been requested by the appropriate State and local authorities
3.More than one Federal department or agency has become substantially involved in
responding to the incident
4. The Secretary has been directed to assume responsibility for managing the domestic
incident by the President.
National Response Plan (NRP) - Department of Homeland Security 2008, build National
Response Plan, The Framework emphasizes preparedness activities that include planning,
organizing, training, equipping, exercising, and applying lessons learned and assigns lead
federal agencies to each of 15 Emergency Support Functions.
Technology – is the process by which human modify nature to meet their needs
Benefits of Assistive Technology - can have a positive impact on the health and well-being
of a person and their family, as well as broader socioeconomic benefits
➢ Screen readers
➢ Screen magnifiers
➢ Text readers
➢ Speech input/Voice recognition
➢ Assistive keyboard
➢ Communication
➢ Creation of new jobs
➢ Saves time
➢ Creates Mobility
➢ Security
Telemedicine- is the use of information exchanged from one site to another via
electronic communications to improve patients’ health status
mHealth- typically refers to the use of a wireless communication device that supports public
health and clinical practices.
-Nausea
-Asthma
-Pink Eye
- Sore Throat
- Allergies
Benefits of Telemedicine
Types of Telemedicine
- Store-and-forward
- Interactive telemedicine
- Remote Monitoring
Teleradiology– the use of ICT to transmit digital radiological images (e.g. X-ray images)
from one location to another for the purpose of interpretation and/or consultation.
Telepsychiatry - use of ICT for psychiatric evaluations and/or consultation via video and
telephony.
Examples of E-Health
eHEALTH APPLICATIONS
- Non-clinical applications
- Clinical uses
- Clinical applications for telemedicine
- Telehealth applications
Privacy- “The right of individuals to be left alone and to be protected against physical or
psychological invasion or the misuse of their property.
Data Security- “The result of effective data protection measures; the sum of measures that
safeguard data and computer programs from undesired occurrences and exposure to accidental
or intentional access or disclosure to unauthorized persons, or a combination thereof"
System Security- “Security enables the entity or system to protect the confidential
information it stores from unauthorized access, disclosure, or misuse, thereby protecting the
privacy of the individuals who are the subjects of the stored information.”