NCM 110 Midterm

Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

NCM 110 - NURSING INFORMATICS

Dr. Elvira A. Baquial, RN, MAN

Lesson 1: Intellectual Property Law Types of Intellectual Property


1. Patents
POLICIES, GUIDELINES and LAWS in NURSING INFORMATICS 2. Copyrights
A. INTELLECTUAL PROPERTY LAW 3. Trademarks
B. COPYRIGHT LAW 4. Trade secrets
C. PRIVACY OF PERSONAL AND PUBLIC DOMAINS
D. NETIQUETTE RULES AND GUIDELINES

Intellectual Property Law


- Deals with laws to protect and enforce rights of the creators and
owner of inventions, writing, music, design, and other works, known
as the “intellectual property”
- Intellectual Property refers to creations of mind: inventions;
literary and artistic works; and symbols, names and images used in
commerce.
- Intellectual property divided into two categories:
1. Industrial property
2. Copyright

Intellectual property is protected in law which enable people to earn


recognition or financial benefits from what they invent or create by starting
the right balance between the interest of innovators and the wider public
interest.

The Intellectual property system - aims to foster an environment in which


creativity and innovation can flourish.

1. Industrial Property
- Industrial property includes patents for inventions, trademarks,
industrial designs and geographical indications.
Lesson 2: Copyright Law
2. Copyright
Objectives:
- Copyright covers literally works (such as novels, poems and plays),
 Describe copyright
film, music, artistic work (e.g, drawing, paintings, photographs and
sculptures) and architectural design.  Discuss the Philippine Copyright Law
- Copyright includes those performing artist in their performances,  Discuss why copyright are necessary
producer of phonograph in their recording and broadcaster in the  Identify what is being protected by copyrights
radio and television programs.  Present infringement of copyright
 Give examples of copyright violations
What are the Intellectual property Rights?
 They allow creators, or owners of patents, trademarks or copyrighted What LAW is violated when books are photocopied?
works to benefit from their own work or investment in a creation.  It is called the Intellectual Property Code of the Philippines, or
 This rights is outline on article 27 of the universal declaration of human Republic Act No. 8293, specifically the Law on Copyright.
rights which provide for the right to benefit from the protection of moral
and material interests resulting from alter ship of scientific literally or Copyright Law
artistic production.  Promotes creativity in literature and the arts by affording authors and
artists lengthy terms of protection (life of the author plus 70 years)
Why promote and protect intellectual property? against copying.
1. The progress and well-being humanity rest on its capacity to create
and invent new works in the areas of technology and culture. Exclusive Rights of the Owner of a Copyrighted Work:
2. The legal protection of new creations encourage the commitment of Right to:
additional resources for further innovation. 1) Distribute
3. The promotion and protection of intellectual property spurs 2) Reproduce
economic growth, creates new jobs and industries, and enhance the 3) Adapt
quality and enjoyment of life. 4) Perform
5) Publicly display the protected work.
The Intellectual Property Code of the Philippines also known as Republic
Act 8293 was signed into law on June 6, 1997. What are considered copyrightable works in the Philippines?
 An act prescribing the Intellectual property code and establishing  Under the Philippine Law, original intellectual creations in the literary
the intellectual property office, providing for its power and functions, and artistic domain are copyrightable. So this includes books, pamphlets,
and for other purposes. articles and other writings, periodicals, newspapers, lectures, ceremonies,
addresses, dissertation, letters, dramatic or dramatical musical
What is intellectual property crime? composition, choreographic works or entertainment, musical
composition, drawing, painting, architecture, sculpture, engraving,
models or designs for works of art, original ornamental designs,
illustrations, sketches, plastic works, technical character, photographic
works, including works produced by your process and analogous to
photography, lantern slides, cinematographic works, process for making
audio visual recordings, pictorial illustrations and Advertisement and
computer programs.

What works are not protected by Copyright under the Philippine Law?
 Copyright protection does not cover the idea, procedure, system, method,
or operation, concept, principle, discovery, or mere data such, even if they
are expressed, explained, illustrated, or embodied in work.
 It does not also cover news of the day and other miscellaneous facts
having the character of mere items of press information.
 Copyright protection does not also cover official text of legislative,
administrative, or legal nature, as well as any official translation thereof.
1
NCM 110 - NURSING INFORMATICS
Dr. Elvira A. Baquial, RN, MAN

 It does not also cover works of the Philippine government unless there Can’t do
was a prior approval by the appropriate government agency; and  Delete Copyright credits.
 Statutes, rules and regulations, speeches, lecture, sermons, addresses, and  Use copyrighted photos for internal meetings or presentations in an
dissertation, read or rendered in court of justice, before administrative organization.
agencies, deliberative assemblies and in meetings of public character.  Use copyrighted photos for commercial purposes in social media,
business websites or other channels such as billboards, books, T-
Is a Copyright registration necessary to protect artistic or literary shirt screens, advertising without a credit.
works?  Edit a copyrighted photo for commercial purposes without
 The answer is NO. Copyrightable works are protected from the moment permission.
of their creation.  Download music or movies without permission from the Copyright
holder or download content for sharing with others.
Who can apply for a Copyright registration?  Deleting the watermark from pictures, which leads to a Copyright
 The owner of the work or his or her assignees or successors-in-interest violation
has the right to apply for a Copyright registration.  Make copies of copyrighted CD, books, DVDs for sale

What is the duration of the Copyright protection?


 In the Philippines, Copyright protection for artistic, literary and
derivative work lasts during the lifetime of the author plus 50 years after
the author's death.
 In the case of joint authorship, the economic rights shall be protected
during the lifetime of the last surviving author plus 50 years after such
author's death.

What is COPYRIGHT?
 The right to present, make copies, and hold licensure on any type of
literary, music, or artistic work.
 Anything written down or recorded has Copyright, even if it does not
include the Copyright symbol.
 Copyright is a form of protection provided by the laws to the authors of
the creative work to stop other people from copying, publishing or
adapting your work without your permission.

What are Copyright and Related Rights?


 Copyright laws grant authors, artists and other creators protection for
their literary and artistic creations, generally referred to as “works”.
COPYRIGHT INFRINGEMENT
Who are the beneficiaries of related rights?  Using work that is protected under copyright law without the author’s
 Performers (such as actors and musicians) in their performances consent is referred to as copyright infringement. This includes
 producers Phonogram (for example, compact discs) in their sound distributing, reproducing, preforming or displaying protected pieces of
recordings; and work.
 Broadcasting organizations in the radio and television programs.  If a person or entity, such as a business, is found guilty of copyright
infringement, they stand to face a steep line for damages and profits, as
Works covered by Copyright include, but are not limited to: well as potential jail time, depending on the severity of the infraction.
 novels, poems, plays, reference works, newspapers, advertisements,
PLAGIARISM AND COPYRIGHT
computer programs, databases, films, musical compositions,
Although they are similiar, they are not the same.
choreography, paintings, drawings, photographs, sculpture,
architecture, maps and technical drawings.

What Rights Do Copyright and Related Rights Provide?


 The creator of works protected by copyright, and their heirs and
successors are (generally referred to as “right holders”) have certain
basic rights under copyright law.
 They hold the exclusive right to use or authorize others to use the work
on agreed terms.

The right holder or holder(s) of the work can authorize or prohibit:


 Its reproduction in all forms, including print form and sound
recording;
 Its public performance and communication to the public;
 Its broadcasting;
 Its translation into other languages, and
 Its adaptation, such as from novel to a screenplay for a film. What constitutes copyright infringement in the Philippines?
 Under the Philippine law, copyright infringement occurs when there is a
General Rule violation of any of the exclusive economic or moral rights granted to the
If you didn’t create it or you don't own the Copyright, you must get copyright owner. The IP Code also provides for the liability of a person
permission to use it. who at the time when copyright subsists in a work has in his possession
an article which he knows, or ought to know, to be an infringing copy of
the work for the following purposes:
What you can and you cannot do under the amended Copyright Act.
(a) selling or letting for hire, or by way of trade offering
or exposing for sale or hire, the article;
Can do (b) distributing the article for the purpose of trade, or for
 Share copyrighted photos through social media for personal use, any other purpose to an extent that will prejudice the
though credit to Copyright holder is required. rights of the copyright owner in the work; or
 Use copyrighted photos for education purposes such as reports or (c) trade exhibit of the article in public.
homework, though credit again is required.
 Use copyrighted content and photos for commercial purposes, Punishment of Copyright Infringement
though permission from the Copyright holder is required. Under Philippine law, copyright infringement is punishable by the following:
 Broadcast a video clip for commercial purposes though credit to 1. Imprisonment of between 1 to 3 years and a fine of between
Copyright holder is required. 50,000 to 150,000 pesos for the first offense.
2. Imprisonment of 3 years and 1 day to six years plus a fine of
between 150,000 to 500,000 pesos for the second offense.
2
NCM 110 - NURSING INFORMATICS
Dr. Elvira A. Baquial, RN, MAN

3. Imprisonment of 6 years and 1 day to 9 years plus a fine ranging Requirements for an invention to be patented?
from 500,000 to 1,500,000 pesos for the third and subsequent A. Novelty Requirement
offenses. - An invention shall not be considered new if it forms part of a prior
 The offending party may also be ordered to pay civil damages. art.
 Injunction and destruction of the infringing goods or products can also - Prior art shall consist of:
be obtained, as well as seizure and impounding of any article which may
a) everything which has been made available to the public
serve as evidence in the court proceedings.
anywhere in the world before the filing date or the priority
Example of Copyright Infringement: date of the application claiming the invention;
b) the whole contents of an application for a patent utility
model or industrial design registration published in
accordance with this Act, filed or effective in the
Philippines, with the filing or priority date that is earlier
Chinese Kon sues Apple over copyright infringement than the filing or priority date of the application.
Provided that the application which has validly claimed the
filing date of an earlier application shall be prior art with
effects as of the filing date of such earlier application.

B. Inventive Step
- An invention involves an inventive step if, having regard to prior art,
it is not obvious to a person skilled in the art at the time of the
Riot Games sues mobile game developer for copyright infringement filing date or priority date of the application claiming the invention.

C. Industrial Applicability
- An invention that can be produced and used in any industry shall
be industrially applicable.

This is an example of a patent.

Why are patents necessary?


 Patents provide incentives to individuals by recognizing their
creativity and offering the possibility of material reward for their
marketable inventions.
 These incentives encourage innovation which in turn enhances the
quality of human life.

What kind of protection do patents offer?


 Patent protection means an invention cannot be commercially made, used,
distributed, or sold without the patent owner's consent.

Who has the right to a patent?


 The right to a patent belongs to the inventor, his heirs or assigns.
Lesson 3: Patent  When (2) two or more persons have jointly made an invention, the right
to a patent shall belong to them jointly.
Our objectives for this lecture is that you will be able to describe patent, discuss
why patents are necessary, identify what is being protected by patent, present What rights do patent owners have?
infringement of patent, and give examples of patent violations.  A patent owner has the right to decide who may or may not use the
patented invention for the period during which it is protected.
What is a PATENT LAW?  Patent owners may give five (5) permission to or license other parties to
 Patent law is the branch of intellectual property law that deals with new use their inventions on mutually agreed terms.
inventions.  Owners may also sell their invention rights to someone else, who then
 A patent is an exclusive right granted for an invention – a product or becomes the new owner of the patent. Once a patent expires protection
process that provides a new way of doing something or that offers a new ends and the invention enters the public domain.
technical solution to a problem.  This is also known as becoming off patents, meaning the owner no
 A patent provides patent owners with protection for their inventions. longer holds exclusive rights to the invention and it becomes available
Protection is granted for a limited period, generally 20 years. for commercial exploitation by others.

PATENTABLE INVENTIONS PATENT INFRINGEMENT


 A patentable inventions are any technical solution of a problem in any  Patent infringement is the unauthorized, making, using, offering, for
field of human activity which is new, involves an inventive step, and is sale, selling of any patented invention within a jurisdiction, or
industrially applicable, shall be patentable. It may be or may relate to a importing into the jurisdiction of any patented invention during the
product or process or an improvement of any of the foregoing. term of a patent.

What are the non-patentable inventions? Three Basic Types Of Patent Infringement
1. Discoveries, scientific theories and mathematical methods; 1) Direct Patent Infringement
2. Schemes, rules and methods of performing mental acts, playing - When anyone who makes, uses, or sells the patented invention.
games or doing business, and programs for computers. 2) Indirect Patent Infringement
3. Methods for treatment of the human or animal body by surgery or - When a person actively encourages another to make, use, or sell the
therapy and diagnostic methods, practice on the human or animal invention.
body 3) Contributory Patent Infringement.
4. Plant varieties or animal breeds or essentially biological process for - This is knowingly selling or supplying an item for which the only
the production of plants or animals. use is in connection with a patented invention.
What constitutes patent infringement?
3
NCM 110 - NURSING INFORMATICS
Dr. Elvira A. Baquial, RN, MAN

 So just because Product B looks and operates like Product A and Product jewelry and other luxury items; from housewares and electrical
A uses a patented invention, that does not necessarily mean that Product appliances to vehicle and architectural structures: from textile
B is infringing the pattern used in Product A, it is entirely possible that designs to leisure goods.
the second product uses a totally different technology to accomplish the
same thing as the first product. So all of the elements of at least one
independent claim in the patent, a patent will consist of a series of claims,
and each claim has elements to it. If a product or service uses all of the
elements of at least one independent claim in the patent that constitutes
patent infringement.

What are the penalties for patent infringement?


 Patent infringement is not a crime, so there are no criminal penalties. It
is a civil matter, and one of the reasons why patent infringement is so
common is because the civil penalties are not severe. If a patent owner
sues a manufacturer for patent infringement and wins, the redress
awarded by the court is defined by law as reasonable royalties.
 The second one is cease sales. If the patent owner practices the patent
uses the patent in a product or service that is manufactured, sold, or
offered for sale, the court may order the infringer to cease sales of the
infringing products.

Lesson 4: Trademark
Trademark
 A trademark is a distinctive sign that identifies certain goods or
services produced or provided by an individual or a company, INDUSTRIAL DESIGN INFRINGEMENT
 Its origin dates back to ancient times when craftsmen reproduced  Industrial design infringement occurs when someone applies a
their signatures, or “marks”, on their artistic works or products of a registered industrial design or a design not differing substantially,
functional or practical nature. to an article, for the purposes of sale, rental, or exposure for sale,
without permission of the owner.
What do trademarks do?
 Trademark protection ensures that the owners of marks have the GEOGRAPHICAL INDICATION
exclusive right to use them to identify goods or services, or to authorize  Geographical indication is a sign used on goods that have a specific
others to use them in return for payment. geographical origin and possess qualities or a reputation due to
 The period of protection varies, but a trademark can be renewed that place of origin.
indefinitely upon payment of the corresponding fees.  Most commonly, a geographical indication consists of the name of
the place of origin of the goods,
 Agricultural products typically have qualities that derive from their
place of production and are influenced by specific local geographical
TRADEMARK INFRINGEMENT factors, such as climate and soil.
 Trademark infringement is the unauthorized use in commerce of a  Whether a sign functions as a geographical indication is a matter of
registered trademark or a copy or colorable imitation thereof, which national law and consumer perception.
results in the likelihood of confusion among the consuming public.
Features of Geographical Indication
Element of Trademark Infringement
1) Registered trademark in the Philippines,
2) Plaintiff’s ownership of said mark, and
3) Use of the trademark or imitation thereof by a third person, which
results in the likelihood of confusion.

Example

INDUSTRIAL DESIGN
 An industrial design refers to the ornamental or aesthetic aspects of
an article.
 A design may consist of three-dimensional features, such as the
shape or surface of an article, or two-dimensional features, such as
the patterns, lines or color. What is difference between GEOGRAPHICAL INDICATION and a
 Industrial design are applied to a wide variety of industrial products TRADEMARK?
and handicrafts: from technical and medical instruments to watches,
4
NCM 110 - NURSING INFORMATICS
Dr. Elvira A. Baquial, RN, MAN

TRADEMARK GEOGRAPHICAL 3. The subject of reasonable efforts to maintain its secrecy. A


INDICATION trade secret continues for as long as the information is
 Trademark is a sign used by a  A geographical indication maintained as a trade secret.
company to distinguish its guarantees to consumers that
goods and services from those a product was produced in a What is a trade secret?
produced by others. certain place and has a certain
• Creates a competitive advantage
 It gives its owner the right to characteristics that are due to
prevent others from using the that place of production. • Not readily known, identifiable or ascertainable
trademark. • Commercially valuable information
• Subject to secrecy protections

Infringement of GIs Trade Secret


 Information used in the conduct of a business that isn’t commonly
known by others.
 A process, method, plan, formula or other information unique to a
manufacturer, which gives it an advantage over competitors.
 Can be defined as (i) information (ii) that remains secret to others
(iii) through reasonable means to protect its secrecy and (iv) creates
actual or potential economic value for its owner.

Examples of Trade Secrets


 Forrmula for a sports drink
 Survey methods used by professional pollsters
 Recipes
 A new invention for which patent application has not yet been filed
 Marketing strategies
 Manufacturing techniques
UNFAIR COMPETITION  Computer algorithms
 Any false or unjustifiable allegations in the course of industrial
commercial activities that discredits or is likely to discredit other’s Famous Trade Secrets
enterprise or its activities in particular the products or services  Coca-Cola Recipes
offered by such enterprise shall constitute an act of unfair  Kentucky Fried Chicken
competition.  Listerine
 Definition: “Dishonest or fraudulent rivalry in trade and commerece,  WD-40
especially, the practice of endeavoring to pass off one’s own goods or  Krispy Kreme Doughnuts
products in the market for those of another by means of imitating or  McDonald’s Big Mac Special Sauce
counterfeiting the name, brand, size, shape, or other distinctive  The Google Search algorithm
characteristics of the article or its packaging.” (Black Law
Dictionary, 8th ed.) How do I file a trade secret?
 You don’t! There is no way to file or register something as a trade secret.
ELEMENTS OF UNFAIR COMPETITION  Whether something is entitled to trade secret protection is determined
 Fake advertising
by how you treat that piece of information.
 “bait and switch” selling tactics
 Unauthorized substitution of one brand of goods for another
Advantages of Trade Secret Protection
 Use of confidential information by former employee to solicit 1. Trade secrets involve no registration costs;
customers.
2. Trade secrets protection does not require disclosure or registration;
 Theft of trade secrets
3. Trade secret protection is not limited in time;
 Breach of a restrictive covenant
4. Trade secrets have immediate effect.
 Trade libel
 False representation of products or service
TRADE SECRET INFRINGEMENT
ELEMENTS OF UNFAIR COMPETITION IN THE PHILIPPINES  Called “MISAPPROPRIATION”.
An action for unfair competition in the Philippines has 2 essential elements as  It occurs when someone improperly acquires a trade secret or
stated by the Supreme Court in a number of cases: improperly discloses or uses a trade secret without consent or with
1) Confusing similarity in the general appearance of the goods, and having reason to know that knowledge of the trade secret was
2) Intent to deceive the public and deceive a competitor. acquired through a mistake or accident.

MISAPPROPRIATION OF TRADE SECRETS


Lesson 5: Trade Secrets 1. Acquisition by improper means
Objectives: 2. Acquisition by accident or mistake
 DESCRIBE trade secrets. 3. Use of or disclosure of a trade secret
 DISCUSS why trade secrets are necessary a. Acquired improperly
b. In violation of a duty to maintain confidentiality
 IDENTIFY what is being protected by trade secrets
 PRESENT infringement of trade secrets “Improper means” includes “theft, bribery, misrepresentation, breach
 GIVE examples of trade secret violations or inducement of a breach of a duty to maintain secrecy or espionage
through electronic or other means.”
TRADE SECRET
 A trade secret is defined as any information that is: “Proper means” which do not support a claim for misappropriation
1. Not generally known to the relevant business circles or to the include independent discovery, reverse engineering or discovery
public; from observing what has been allowed to enter the public domain.
2. Confers some sort of economic benefit on its owner. This
benefit must derive specifically from the fact that it is not How to establish violation of trade secrets:
generally known, and not just from the value of the information  Main Issues are:
itself; and 1. Was the information indeed secret?
2. Were reasonable steps taken to maintain the secrecy?

5
NCM 110 - NURSING INFORMATICS
Dr. Elvira A. Baquial, RN, MAN

To establish violation of trade secret rights, the owner of a trade secret  This is more of personal or subjective condition because one person
must be able to show the following: cannot decide for another, what his/her sense of privacy should be.
1. Infringement by or competitive advantage gained by the
person/company which has misappropriated the trade secret.  Privacy sometimes related to anonymity. This is wish to remain
unnoticed or unidentified in the public
2. The owner had taken all reasonable steps to maintain it as a secret.
3. There is misuse as the information obtained has been used or
WHAT IS ONLINE PRIVACY?
disclosed in violation of the honest commercial practices.
 The ability to control what information one reveals about oneself over
Ways to Protect Trade Secrets the internet, and to control who can access that information.
 Restrict access to the information (lock it away in a secure place, such  Internet privacy, involves the right or mandate of personal privacy
as a bank vault). concerning the storing re-proposing provision to third parties and
 Limit the number of people who know the information. displaying of information pertaining to one self via internet.
 Have the people who know the trade secret agree in writing not to
disclose the information (sign non-disclosure agreements). SENSITIVITY OF INFORMATION
 Have anyone that comes in contact with the trade secret, directly or  Shared in Online Social Networks
indirectly, sign non-disclosure agreements.  Is information or knowledge that might result in loss of advantage or
 Mark any written material pertaining to the trade secret as level of security if revealed to others who might have low or unknown
proprietary. trustability and/or indeterminable or hostile intentions
 Loss, Misused, Modification or unauthorized access to sensitive
7 “Musts” of Trade Secrets information can severely affect the privacy of an individual.
1. Must be kept secret.
2. Must be documented. How our Personal Information Gets Revealed
3. Must have access limited. 1. Internet Service Provider or ISP
4. Must be protected using administrative, legal and technical means.
 An internet service provider is a business or an organization that provides
5. Must have appropriate legal framework in place if shared with internet connections for its customers by enabling data transmission
another entity. between computers in work places or homes and our computers on the
6. Must not be in the public domain. internet.
7. Must be of value to the organization now or in the future.
 ISP always know your IP address and the IP address to which you are
communicating.
 ISP’s are capable of observing an encrypted data passing between you and
the internet, but they are prevented to do so due to social pressure and law.
2. Email
 Email may be appropriately spread by the original receiver, it can be
intercepted and may legally viewed or disclose by service provider
authorities.
3. Discussion group
 Any member of the list or group could collect and distribute your email
address and information you post.
4. Internet browsers
 Most web browser can save some forms of personal data such as browsing
history, cookies web for entries and password.
 You may accidentally reveal such information when using a browser on a
public a public computer or someone else’s.
5. Internet cookies
 Cookies are data packets sent by a server to a web client and then sent
back unchanged by the client each time it accesses that server.
 Cookies are used for authenticating, session tracking, and maintenance
specific information about users such as the preferences or the contents of
their electronic shopping cards.
 Cookies are only data; they are not program or
viruses.

How cookies work?

 This is how cookies work, you get on the web and then you request
information from a website and then when the website server replies it’s
sends a cookie.
Lesson 6: Online Privacy and Other Internet Issues  That cookie will be based on your computer on your hard drive.
 And then when you get online to return to that website, your computer
LEARNING OUTCOMES: sends the cookie back.
• Discuss online privacy;  And then this is where the website server identifies you and records data
that can be shared with other online sellers.
• Present ways of protecting personal information in the
net;
• Identify solutions to protect online privacy ; and
• Discuss personal and public domain privacy

WHAT IS PRIVACY?
 The ability of an individual or group to seclude themselves or
information about themselves and thereby reveal it selectively.  You may blocked the cookies by going to your internet option

6
NCM 110 - NURSING INFORMATICS
Dr. Elvira A. Baquial, RN, MAN

Purpose of Cookies NOW THIS IS HOW FARMING WORKS


Cookies help to:
 Simplify navigation
 Improve user experience
 Save time filing forms automatically, remembering password and
searches
 Carry out web analytics studies (statistics, number of visits…) to
optimize the web
 Adapts the content to every user profile (what they are looking for?)
 Make the user’s visit as personalized as possible Understand better the
audience
 The city bank for example, provides a phone banking service which
 better the audience allows its customers to have checks issued and paid to anyone by calling
What Cookies Do To Achieve Their Purpose? city bank.
Cookies track the user’s navigation keeping
information to know about:
 The customers now will be asked to enter first their SSN or personal
taxpayer identification number and telephone access code to provide
 Behavior service options.
 Habits  The caller will be authenticated by being asked questions and once they
 Preference: language bookmarks… are authenticated, they can issue checks.
 Geolocalization: country, IP…  To launch a voice farming attack, the attacker needs to set up a bogus
 Activity history and types of visit interactive voice response that sounds like the authentic IVR system and
6. Searching engine then re-direct the calls towards city bank phone banking to the malicious
IVR and/or the phone the attacker uses.
 Search engines have use the ability to track each one of your searches
7. Web bugs  Assume the wireless route is in place and checks if there are any calls to
financial institutions.
 Web bug is a graphic on a web page or in an email message that is
 By using a call redirection attack, the attacker can divert the call to his
designed to monitor who is reading the web page or the email message.
malicious IVR then it starts asking questions which the caller will
 Web bugs are invisible because they are very small in size; they are answer since they have dialed the correct phone number.
represented as HTML image tags.  Thus, the attacker will get all the necessary information he/she wants.
 When a web bag is viewed, this information will be sent to a server:
 The IP address, the computer fetch the bug, URL and many more. Now, we need to:
8. Third party Cookies  Protect privacy, your privacy on the web.
 Third party cookies comes from web page that may contain images or  Protect your privacy when surfing the internet. You have to avoid free
advertisements offers and protect your information.
9. Social networks, Blogs, and Personal website.  Protect your privacy from chatting. You guard your information unless
you are 100% sure who are you are chatting with
10. Way of cybercrime
 Cookies are not just for (?*), they may be sending your personal
information to others.
TYPE OF CYBERCRIME:
 Spyware.  You also need to protect your password like you would do to your wallet
or car keys, make it complicated
 Spyware downloads into your computer without you knowing that.
 Emails is not secure and should never be taught of as private
 It can collect personal information about you such as passwords,
 Beware of phishing which are fake emails sent to you to try to gain your
credit card number and web sites you visit, and transmit this to a
personal and financial information. And don’t even open or download a
third party.
spam buster
 It can also change the configuration of your computer, or put
advertisement on your computer. Solutions to Protect Online Privacy
 Phishing. 1. You need to control the cookies
 Phishing is a cybercrime in which a target are contacted by email, 2. Need to have other technical resorts
telephone, or text message by someone posing as a legitimate  anti-virus software
institution to lure individuals into providing sensitive data such as  Firewalls
personally identifiable information, banking and credit card details  Encryption tools
and password.
The only two absolute choices because we cannot avoid ourselves from
internet
1. Raise awareness of privacy
2. Learn to safeguard your privacy with a minimum
sacrifice of convenience

WHAT IS DOMAIN PRIVACY?


 Domain privacy, also known as WHOIS Privacy, is a service that
hides all domain registration details from the public
 This includes the Registrant, Administration, Technical, and Billing
contact information (i.e., Address, email address, phone number)
THIS IS HOW IT WORK  Domain privacy is a service offered by a number of domain name
 The attacker sends an email to the victim, and the victim will click on registrars. A user buys privacy from the company who in turn
the email and goes to the phishing website. replaces the user’s information in the WHOIS with the information
forwarding service
 And then the attacker collects the victim’s credentials.
 And then the attacker will now use the victim’s credentials to access a WHAT IS WHOIS?
website  A query and response protocol that widely used for querying
databases that store the registered users or assignees of an internet
 Farming. resource, such as domain name, and IP address block or an
 Farming occurs when criminals plant programs in the victim’s autonomous system, but is also used for wider range of other
computer which redirect the victim from legitimate websites to scam information.
look-alike sites  WHOIS is not an acronym. Instead, it is a short for the question
who is responsible for this domain name
7
NCM 110 - NURSING INFORMATICS
Dr. Elvira A. Baquial, RN, MAN

Why Are The Details Displayed Publicly?


 The Internet Corporation of Assigned Names and Numbers (ICANN)
requires authorized registrars to publish all registration details of every
active domain to WHOIS – a global directory which is accessible to
everyone.

How Does Domain Privacy Work?


 Domain privacy prevents spammer’s identity thieves and hackers from
accessing your domain registration details and abuses it.

This is an example of a registered domain name:

PUBLIC DOMAIN
 Are works that for one reason or another are NOT covered by
copyright and are ordinarily free for all to use. Lesson 7: What is Netiquette?
 The term public domain refers to creative materials that are not
protected by intellectual property laws such as copyright, trademark, What is Netiquette?
or patent laws.
 it is the etiquette of cyberspace
 The public owns these works. Not individual an author or artist.
 "etiquette" means "the forms required by good breeding or
Anyone can use a public domain work without obtaining permission.
prescribed by authority to be required in social or official life."
But no one can ever own it.
 No permission is required or works in public domain Rule 1: Remember the human
 Important to acknowledge sources by using credit line
 “source” or “data from”  “Do unto others as you'd have others do unto you”
 When you communicate electronically, all you see is a computer
PUBLIC DOMAIN SOURCES: screen.
 You don't have the
 Works out of copyright
 opportunity to use facial expressions, gestures, and tone of voice to
 Type of work not protected under copyright or patent/trademark communicate your meaning.
 Work dedicated to public domain by owner Improperly registered or  When you communicate through cyberspace -- via email or on
not renewed works discussion groups -- your words are written.
 There’s a good chance they can come back to haunt you
NOTE:
 If it’s in public domain, you may use it, but academic honesty required Rule 2: Adhere to the same standards of behavior online that you follow
that you still attribute to the source and author in real life

 Be ethical
PERSONAL DOMAIN
o If you encounter an ethical dilemma in cyberspace, consult
 A domain name that you personally own, control, and use to represent the code you follow in real life.
yourself on the internet.  Breaking the law is bad Netiquette
 A personal domain is a web address that allows you to take control o Do not something illegal in cyberspace!
of your online identity by directing visitors to any site.
Rule 3: Know where you are in cyberspace

 Netiquette varies from domain to domain


o That is why it is important to know where you are
 Lurk before you leap
o If you enter a domain of cyberspace that's new to you, take
a look around.

Rule 4: Respect other people's time and bandwidth

 Post something sensible and useful, do not waste other’s time.


 You are not the center of cyberspace

Rule 5: Make yourself look good online

 Take advantage of your anonymity


 Know what you're talking about and make sense
 Don't post flame-bait
 Be pleasant and polite

Rule 6: Share expert knowledge

 asking online works a lot of knowledgeable people are reading the


questions.
 Don't be afraid to share what you know.
 Sharing your knowledge is fun! It’s what makes the world a better
place

Rule 7: Help keep flame wars under control


8
NCM 110 - NURSING INFORMATICS
Dr. Elvira A. Baquial, RN, MAN

 "Flaming" is what people do when they express a strongly held  The provider can be an individual professional such as a nurse, a
opinion without holding back any emotion. physician or official therapist. The provider can also be the facility in
 Netiquette forbids the perpetuation of flame wars which care is provided, such as a public health unit or a hospital.
 It dominates the tone and destroy the camaraderie of a group
OUTCOMES
Rule 8: Respect other people's privacy  An outcome is defined as a measurable individual, family, or
community state, behavior or perception that is measured along a
 Failing to respect other people's privacy is not just bad Netiquette. continuum in response to nursing interventions.
It could also cost you your job  The outcomes are developed for use in all clinical settings and with
Rule 9: Don't abuse your power
all patient populations. There is a growing interest in ensuring that
care results in quality outcomes in a cost efficient manner.
 Knowing more than others, or having more power than they do, does  Outcomes can be difficult to measure, but technology can assist in
not give you the right to take advantage of them measuring the cost, it can enhance gathering, analysis and
dissemination of outcomes.
Rule 10: Be forgiving of other people's mistakes
PROCESS AND SYSTEM FOR DELIVERY OF CARE
 Everyone was a network newbie once.  Information about the process and system for delivery of care assist
 When someone makes a mistake, whether it’s a spelling error or a deciding on the type and the amount of care required. This is also the
spelling flame, a stupid question or an unnecessarily long answer, be tracking on interventions and the process used for each intervention.
kind about it.
 If you do decide to inform someone of a mistake, point it out politely, Information must be:
and preferably by private email rather than in public.  Accurate
 Give people the benefit of the doubt; assume they just don't know  Timely
any better.  Accessible
Reference:
 understandable

https://www.mccc.edu/~virtcoll/Netiquette.pdf WHAT IS INFORMATION?


 Information are delivered in conversation, handwritten notes, or
Lesson 8: Nursing Information System stored in a computer.
 Information is a stimuli that has meaning in some context for its
Learning outcomes: receiver.
 Define nursing information system  So regardless of the form, the same basic principles apply to the
 Discuss concept of information structure and the use of information. Words are often used
 Present Healthcare Informatics interchangeably to describe information.
 Discuss evidence-based practice.  When information is entered into and stored in a computer, it is
generally referred to as DATA.
NURSING INFORMATION SYSTEM
THE STRUCTURE OF INFORMATION
 Nursing information system are computer systems that manage
clinical data from a variety of healthcare environments and made  DATA - discrete entities objectively described without
available in a timely and orderly fashion to aid nurses in improving interpretation or context.
patient care.  Example: 110
 Having nursing information system helps provide an efficient way to
handle administrative activities such as workload management,  INFORMATION - data processed into a structured form. When
maintaining staff records, as well as scheduling shifts among others. combining 110 with other data, it becomes information because the
 Nursing information includes data collected by nurses, data used by data now processed into a structure form. systolic blood pressure of
nurses, data about nursing activity, and data about the nursing 110 mmHg and diastolic blood pressure of 70 mmHg can be an
resource. information that is being captured in a form or on a graphic or graph
or in a report.
THE IMPORTANCE OF INFORMATION
 The data that are interpreted, organized, structured and given
 The health care of our clients is largely dependent on information. meaning are referred to as INFORMATION.
Every action they can depends on previous information and
knowledge.  KNOWLEDGE - Knowledge are synthesized information derived
 The delivery of healthcare requires information about: from the interpretation of data.
 Science of type of care (nursing)  It provides a logical basis for making decision.
 Patient or client  It is also essential to decision-making and to new discoveries.
 Information about the provider  Example, when the blood pressure readings combined with
 Information about outcomes information about anatomy and physiology, pharmacology
 About process and systems for delivery of care. pathophysiology, knowledge is used to decide about further
care and treatment.
THE SCIENCE OF TYPE OF CARE (NURSING)
 WISDOM - This is the application of information and the right
 The “science of care” refers to the scientific foundations of the sense of judgment.
profession that provides health care.
 Science helps determine the body of knowledge, language and
purpose of that profession. scientific rationale or evidence provides a
foundation for decision making within that profession.

PATIENT OR CLIENT
 Information of the client is also required for his or her individual care.
 The information can be taken to assessment process. The use of
technology can assist in collecting this information. Information on
the client can be found in the patient record, the patient's history, and
laboratory results.

PROVIDER
 Information about the provider of care will also help determine the
type of assessment and the focus of care given.

9
NCM 110 - NURSING INFORMATICS
Dr. Elvira A. Baquial, RN, MAN

 Evidence based practice is the practice of nursing in which the nurse


makes clinical decisions on the basis of the best available current
research evidence, their own clinical expertise, and the needs and
preferences of the patient.
 During assessment, you collect data from the patient and classify
those gathered data. This data becomes an information when
analyzed and interpreted. When information are synthesized and
integrated. It will contribute to the new body of knowledge. Then,
when new body of knowledge is applied with right discernment and
sense of judgment, it becomes wisdom.

RIGHTS OF INFORMATION

 Right information
 Right person at the right time
 Right place
 Right amount of information

WHAT IS HEALTHCARE INFORMATICS?

 Healthcare Informatics is a combination of:  This are the advantages of evidence based practice in nursing:
 computer science  It improves patient outcomes through superior care.
 healthcare science  It maximizes providers time and reduces costs.
 information science  It adds new contributions to the science of nursing.
 cognitive science
* In summary, nurses must use their wisdom and make informed
 Computer science - is the development, configuration, architecture judicious, prudent and intelligent decisions in delivering care while
of computer hardware and software. using information technology. Cognitive Science, healthcare science,
 Healthcare science - is the body of knowledge on which healthcare information science, and healthcare informatics will continue to
profession basis their practice. It is the prevention, treatment. and evolve to help us build knowledge and wisdom.
management of illness and the promotion of health and well-being
through the services offered by the medical, nursing and allied health
professions. Lesson 9: Nursing Informatics System
 Information Science - includes information technology, which
involves the process of sending and receiving information. This is the
WHAT IS NURSING INFORMATICS?
collection, classification, manipulation, storage, retrieval and
dissemination of information. Also, this the application and use of
knowledge the interaction between people, organization and
information system.
 Cognitive Science - is the process of human thinking,
understanding and remembering. It assesses how our minds process
and generate information and knowledge and examine artificial
intelligence and its relationship to cognitive science and computer
science.

- Nursing informatics integrates nursing science, computer science,


and information science to manage and communicate data,
information, and knowledge in nursing practice.
- Nursing informatics promotes the generation, management, and
processing of relevant data in order to use information and develop
knowledge that supports nursing in all practice domains.
- It facilitates the integration of data, information, and knowledge to
support clients, nurses, and other providers in their decision-making
in all rows and settings.
Why is Nursing Informatics important?
 Because nurses need to develop competencies in informatics.
Informatics enables nurses to use information and communication
technologies in the collection of data, use of information, and
generation of knowledge to support nursing practice. Therefore,
 Using information as evidence-based practice, can lead to: nursing informatics competencies need to include both knowledge
 Determining standards and guidelines. and skills required to use information and communication
 A Guide for decision making process. technologies to enter, retrieved, and manipulate data. To also
 Determines best practice. interpret and organize data into information to affect nursing
10
NCM 110 - NURSING INFORMATICS
Dr. Elvira A. Baquial, RN, MAN

practice and to combine information to contribute to knowledge  Navigating


development in nursing.  Playing interactive games
 Video and music streaming
COMPETENCIES IN INFORMATICS  Chat/direct messaging, video conferencing
 Computer literacy
 Information literacy PHONES and DEVICES used for Internet Application
 The ability to use informatics strategies and system applications to 1. Personal Digital Assistant (PDA) – a.k.a Hand-held PC
manage data, information, and knowledge  A mobile device which function as a personal information manager
 Have been mostly based by highly capable smartphones in particular,
 Now, let’s see the relationship and interrelationship of computer those based on iOS or Android.
literacy, information literacy and nursing informatics.  Pocket-sized computers that is capable of accessing the internet,
sending data and storing textbooks worth of information.
 These tools have the potential to help nurses increase the quality of
care that they provide in the hospital setting.
 It also reduces medical errors, patient’s laboratory values at your
fingertips, charting as you go, and sending prescriptions to
pharmacy for patients.

2. Wireless Devices
 Wireless communication, otherwise known as “over the air”, is the
transfer of information or power when two or more points that are
not connected by an electrical conductor. The most common wireless
technologies use radio waves.
 Wireless devices are becoming more common in nursing students
1. Information Literacy- is the ability to use the tools of automation in the and nurses. They can be used in the clinical setting, and also for
process of accessing, evaluation, and using information. theory and learning. They can also provide faster and easier access
to patient’s records, charting, and many more.

3. Electronic Mail (E-Mail)


 A method of exchanging messages or mail between people using
electronic devices.
 This was invented by Ritam Lunson.
 Email first entered limited use in the 1060s and by the midline 1970s
had taken the form now recognized as email.
 Today’s email systems are based on a store and forward model.
 Email servers accept, forward, deliver, and store messages.

4. Digital Bookmark
2. Computer Literacy- is the ability to perform computer operations at a skill
 A bookmark is a Uniformed Resource Identifier (URI) that is stored
level high enough to meet the demands of society.
for later retrieval in any various storage formats. All modern web
browsers include bookmark features.
 Called “Favorites” or “Internet Shortcuts” in Internet Explorer.
 Are normally accessed to a menu in the user’s web browser and
folders are commonly used for organization.

5. Two-Way Video
 Like all long-distance communication technologies, two-way video
communication can cuts down the need to travel to bring people
together.
 The core technology used in the two-way video conferencing system
is digital compression of audio and video streams in real time.

6. Teleconferencing
THE INTERNET AND ITS APPLICATION  The technology that allows to you hold meetings with several
- The ability to use the internet is an essential skill for both nursing correspondents who are located in different places while seeing and
students and nurses to support their development of skills in using talking to them in real time. It is different in simple video calling
what is becoming an increasingly essential tools for professionals. which is normally one-to-one video communication.
This is where internet applications play its major role in nursing
informatics. 7. Facetime
- is proprietary video telephony product developed by Apple. Facetime is
INTERNET APPLICATION available on supported IOS mobile devices Macintosh computers that
- Internet application can be described as the type of applications runs MAC OS and later version. Facetime supports any IOS devices with
which use the internet for operating successfully. That is by using forward facing camera and any Macintosh computer equipped with stand
the internet for fetching, sharing, and displaying the information camera.”First patient in Arkansas to Face time during brain surgery”.
from the respective server systems. It can be accessed only with the
help of the internet facility and it cannot be functional without 8. Text messaging/Texting
internet. These applications can be classified as electronic devices -is the act of composing and sending electronic messages typically
based, automated digital technology, industrial internet, consisting of alphabetic and numeric characters between two or more
smartphones based, smart home based, smart grids, smart city and users of mobile device, desktops and laptops or other type of compatible
other major application. computer.
- The internet has many important applications of various services Two types of Messaging: short message service/SMS and Multimedia
available via the internet, the following are some of the applications: messaging service/MMS.
SMS is alphanumeric text while mms is multimedia message using a
INTERNET APPLICATIONS digital images, videos, and sound content, ideograms or emoji.
 Sending and receiving email
 Searching and browsing information 9. Twitter
 Copying files between computers - an American microblogging and social networking service on which
 Conducting financial transactions user post and interact messages known as tweets. Registered users
11
NCM 110 - NURSING INFORMATICS
Dr. Elvira A. Baquial, RN, MAN

can post, like and retweet tweets but unregistered users can only facilitate nurse education and contribute new knowledge to nursing
read them. research.

10. Google Lesson 10: The Healthcare Team with the IT Team
- is an American multinational technology company that specials
internet related services and products which include online TOPIC 10- NCM 110
advertising technologies, search engine, cloud computing, software Learning Outcomes:
and hardware. It is considered as one big four technology companies
alongside apple, amazon and Facebook. 1. Define healthcare team;
2. Enumerate the members of the health care team and the IT team;
11. Facebook 3. Identify the roles and responsibilities of the healthcare team in the
- is an American social media and technology company based in Menlo application and management of informatics.
Park, California. It was founded by Mark Zuckerberg along with
fellow Harvard college students and roommates, Eduardo
Sovereign, Andrew MA column, Dustin Moskovitz and Chris
Hobbs, originally as the facebook.com. Today’s Facebook popular
global social networking website. Facebook is also one of the big four
technology companies. Facebook is one of the most valuable
companies.

12. Instagram
- is an American photo and video sharing social networking service
owned by Facebook Inc. It was created by Kevin Seastrong and Mike The health care team consists of a group of people who coordinate their
Reager and launch in October 2010 exclusively on IOS. particular skills in order to assist a patient or his family. This team ensure
safety of patient, delivers quality care, and perform necessary skills needed by
13. Web 2.0 the patient. The personnel that comprise a particular team will be depending
upon the needs of the patient. Informatics can provide a mechanism for patient
- refers to websites that emphasize user generated content is of used
to provide their clinicians with critical information and to share information
participatory culture and interoperability for end users. The term
with family, friends, and other patients. This information may enable patients
web 2.0 was invented by Darcy DiNucci in 1999 and later to exert greater control over their own care.
popularized by Tim O'Reilly and Dale Dougherty at the first
O'Reilly Media Web 2.0 Conference in late 2004. Web 2.0 is the term
used to described a variety of websites and applications that allow
anyone to create and share online information or material they have
created. A key element of the technology is that it allows people to
create, share, elaborate and communicate. Web 2.0 differs from other
type of websites as it does not require any web design or publishing
skills to participate. Making it easy to people to create and publish
or communicate their work to the world. The nature of this
technology makes it an easy and popular way to communicate
information to either a select group of people or to a much wider
audience. It can also be an effective way to communicate and interact
with students and research colleagues. There are number of different
types of Web 2.0 applications including Wikis, blogs, social
networking, podcasting and content hosting services. Many of the
most popular websites are Web 2.0 sites such as wikpedia, youtube, Let’s take a look at the members of the health care team. The members of the
facebook, myspace and flickr. health care team are the physician, nurses, allied practitioners, pharmacist,
dietician, social workers, religious leaders and ward clerk. Each of the members
14. Blog of the health care team set at once for patient’s care or contribute to existing
plans using advance technology, they will also observe patience, and record
- is a discussion or informational website publish on the world wide
observations, and consult and collaborate with doctors and other members of
web consisting od discrete open informal diary style text entries. the health care team with the aid of informatics.
Posts are typically displayed in verse chronological order so that the
most recent post appears first at the top of the web page. A blog is a ROLES AND FUNTIONS OF THE MEMBERS OF THE HEALTH
contraction of the words web log. Blogs usually provide commentary CARE TEAM
or information on a particular issue, event or topic. In some cases,
blogs can be about a particular person. An online public personal 1. Physician
diary. A blog is usually maintained by a single person or a small - in hospital setting, the physician is responsible for the medical
group of a contributors. Visitors to the blog can comment on the diagnosis and for the determining the therapy required by the person
entries made or respond to comments made by other visitors. Blog who was ill or injured.
are primarily texts but can also be in the form of photos or other - A physician is a person who is legally authorized to practice medicine
images, sounds or film. in particular jurisdiction.
- The physicians also oversee medical information systems that
15. Wiki collect, analyse, and share patient information among health care
- is a knowledge base website on which users collaboratively modify specialists. Physicians can use informatics to integrate the
and structure content direct from a web browser. In a typical wiki, information they learn from patients with the medical knowledge
and data resources to improve patient care.
text is written using a simplified mark-up language and often edited
with the help of the rich text editor. A wiki is run using a wiki 2. Nurse
software otherwise known as the wiki engine. Wiki was introduced - the primary role of a nurse is to advocate and care for individuals of
to a lexicon by computer programmer Ward Cunningham in 1995 all ethnic regimes and religious backgrounds and support them
when he created collaborative software that he called WikiWikiWeb. through health and illness.
Wiki is Hawaiian for “to hurry; fast, quick.” A wiki is a collaborative - The head nurse is responsible for delegation of duties to members of
website that anyone within the community of users can contribute her tea and care given to the patients. Nurse use data and technology
to or edit. A wiki can be open to global audience or can be restricted everyday to monitor systems, programs, and patient care initiatives.
to a select network or community. Wiki’s can cover a specific topic - They also analyse data to see what is working and what is not, they
or subject area. Wikis also make it easy to search or browse use their findings to suggest improvements, lead projects, and
information although primarily text, wikis can also include images, implement change.
sounds, recordings and films 3. Nurse informatics specialist
- Nurse informatics specialists are an integral part of the healthcare
The right balance of information technology and the application nursing delivery process and a deciding factor in the selection,
informatics can enhance patient outcomes, manage healthcare facility, implementation and evaluation of healthcare, which supports safe,
high-quality and patient-centered care. It’s a type of nurse skilled in

12
NCM 110 - NURSING INFORMATICS
Dr. Elvira A. Baquial, RN, MAN

both delivery of health care the development and utilization of health - collaborate with other health care and information technology
care technology. professionals to promote safe, efficient, effective, timely, and optimal
- Nurses with their medical training enhanced on patient experience use of dedications. They contribute to the transformation of health
are uniquely suited to work with IT professionals to ensure care by analysing, designing, implementing, maintaining, evaluating
electronic health record and other health care technology work well information and communication systems that improve medication
in the real world. Managing the transition from paper to digital related outcomes and strengthen the pharmacist- patient
records is one of the rules of the nurse informatics specialists, they relationship.
also develop information systems based on current evidenced based
on under sub care and ensuring systems to remain updated they also 11. Respiratory technologist
are responsible for developing electronic health record interfaces - the inhalation therapies or respiratory technologies is skilled in
that are conducive to good care while remaining efficient to use. therapeutic measures used in care of patients with respiratory
They also analyse electronic health record data to identify areas problems. These therapies are negligible about oxygen therapy,
where care can be improve of cause better manage. They also work devices, intermittent positive pressure breathing respirators,
with policy makers and government agencies to ensure laws and artificial mechanical ventilators, and an accessory devices used for
regulations support health care technology and compatible in inhalation.
provider and patient technology needs. And they also develop or
implement health care technologies outside of electronic health 12. Psychologist
records including patient health monitoring systems, quality - the clinical psychologist constitutes an important member of the
tracking initiative and home care managements systems. health care team. The psychological dimension of the person is
looked into and health care services are accordingly planned.
4. Dietitian/Nutritionist
- Dietitians supervise the preparations of meals according to the 13. Ustadz/clergy
doctor’s prescription. The nutritionist recommends health diets for - the spiritual dimensions of a patient comes into pray more during a
the clients and is frequently involve in board advisory services person’s illness. Patients withdraw the spiritual strength from god
regarding purchase and preparation of food. are the ones who are successfully cope with illness. The role of the
- Nutrition and dietetics professionals worked in an immensely data clergy and ustadz are there for very important.
rich world as many paper based tools transition to technology there
are more efficient ways to collect, display, and study data from such
tools as food or nutrient analysis stables, electronic health records,
Lesson 11: Leadership Roles of Nurses in Managing Nursing Information
and mobile apps.
System
5. Physiotherapy
- they provide assistance to a patient who has problem related to LEADERSHIP ROLES OF NURSES IN MANAGING NURSING
muscular skeletal system. Their functions include assessing mobility INFORMATION SYSTEM
and strength, providing therapeutic measures and teaching patients  This is leadership roles of nurses in managing nursing information
new skills and measures. system. This is what we called nursing leadership through informatics.
- Physiotherapies have a role in following areas of practiced base It’s facilitating and empowering health using digital technology.
technology, clinical information systems, digital patient assessment  In today’s health care system information technology is the foundation of
and monitoring consumer heath technologies in health data the future. Healthcare modernization is best visualize in we compare how
analytics. we were many years ago and where we are today.
 The need for improvement who was the driving force behind the
6. Medical social worker
evolution of computers and healthcare.
- help patients and their families cope with emotional and social
 The majority of the past years technological expansion was spent on
responses to illness and treatment. They also educate patients and
their families on entitlements, community resources, and health computer programs for administrative purposes while the past decade has
insurance coverage. seen and emphasis the clinical process.
- They also lead support group discussions or provide individual  Patient care has been become a primary focus in a development of new
counselling. Technology and informatics in the field of social work consents and knowledge in healthcare technology. Technological
have been implementing a benefiting from the use of technology in development in clinical applications is the current trend in healthcare and
practice. Technology has improved outcomes from medical social it will continue to play a major role for years to come.
workers although they are always behind in the technology trend;
social work practitioners are learning the importance of these LEARNING OBJECTIVES:
systems within their daily applied practices. Technology can assist  Understand health information system
in bridging the gap between consumer needs and clinical experts in
the field.  Develop an understanding of telehealth and tele homecare
 Differentiate telehealth and telehomecare
7. Occupational therapist  Discuss the leadership role of nurses in developing clients health
- assists patients with some impairment of function to gain skills as literacy through information system.
they are related to activities in daily living and help with the skills
- that are therapeutic. Informatics is also about data and how that data Information
moves around the health and care system? All occupational
therapists are generating, sharing, or using data to make decisions  Plays a vital role in nursing process. As nurses we collect
about the services they provide. They collect and interpret data information about our clients use this data to develop nursing care
throughout the occupational therapy causes. plan, implement the plan, and communicate our findings with other
healthcare providers. Advances in information technology allow
8. Paramedical technologies nurses and nursing students to access vital information with the click
- the laboratory technologies examine, and study specimen such as end bottom.
urine, stool, blood, and discharges from wound paramedics services  For example, in hospital and clinical health care providers help
now rely more on technology and paramedics with technology skills. access to electronic health records which provide access to private
- The current medical technologies are not only required to carry out and confidential client health information in a secured environment
clinical laboratory tests but also be proactive and positive as well as
have mark problem solving abilities they are expected to improve Services such as:
diagnostic tests system on medical institutes for medical doctors and
Telehealth
patients resulting in the highest level of management efficiency.
 Provide a means for client a means of education as well as medical
9. Radiologist healthcare services such as health care monitoring or clinical
- the radiologic technologies assist with wide variety of x-ray diagnosis.
procedure from simple chest radiograph to more complex bioscopy.
Through radioactive materials, nuclear medicine technologies can Social media
provide diagnostic information about functioning of the patient’s  is also being used in healthcare to provide a means for client to share
specific organ. experiences with one another or learn more about their medical
- Radiologists have key roles as leaders in imaging informatics and are condition.
the liaison between the clinical needs of the healthcare enterprise and
the applicability of the information technology team. What is health information system?
10. Pharmacist
13
NCM 110 - NURSING INFORMATICS
Dr. Elvira A. Baquial, RN, MAN

 Health information system specialized in storing, managing, The nurse may perform a physical assessment and relay the result to
capturing and transmitting information about the health of the physician using telehealth technology.
individuals along with all activities within the healthcare
organizations when entering the workforce. TELEHOMECARE
 The students are expected to use information to support safe, - Is similar to telehealth. The difference is between telehealth and
effective and evidence in form of care for their clients. They are also telehome is that telehome is refers to services provided to the clients
expected to follow workplace, professional association, and in their own homes. Client receive devices and training to monitor
regulatory standards with respect to information and their own VS at home. These VS are related to a healthcare provider
communication technology. through a phone line or the internet. Health care providers watch for
 Students who are also able to use information and communication trends in the data to alert the physician or nurse practitioner about
technology in practice. the need for follow up.

Required skills include but are not limited to: The main benefits of TELEHOME CARE:
 searching for credible and reliable health information online and - Is that the client and caregivers are provided w/ additional supports
 assisting client for their families in finding and evaluating credibility which lead to a greater sense of independence, fewer emergency
and reliability of online information. department visits, and reduced flare ups.

E- health The Right Balance – Technology and Patient Care


 A term used to describe the information and communication - Healthcare outcomes including quality of life measures are the
technologies used in healthcare which include a range of services results of a multi-faceted relationship between the patient, the nurse,
such as electronic patient administration system, laboratory/ the treatment and the information health care system. A strong
diagnostic test, information services, and telehealth and tele foundation for addressing the challenges of electronic
homecare monitoring devices. documentation is the informatics nurses capability to understand
and direct the balance of patient care w/ the technology systems and
Mhealth organizational structure that supports this balance. In order to
guarantee a successful implementation of a computer system while
 Mobile technology has changed the way healthcare providers
managing patient care, it is important to integrate nurses’
communicate, monitor, and connect with client families and other
perceptions, beliefs and knowledge in the use of new technology and
healthcare providers. Any mobile device which smartphone
how nurses implement this technology into their daily nursing
capabilities allows for downloading apps which are self- contain
practice. Finding the right balance of information science in
computer programs that run directly on the devices and screen.
conjunction with nursing science is a continuing process that will
 This mhealth technology includes many different types of medical rely on the forward thinking and perseverance of today’s modern
and health related apps currently available either free of charge for nurse and the support of nursing informatics specialist.
fee.
 The use of mhealth technology may have potentials in security SUMMARY:
issues, many health apps currently available require the client to Information technology has advanced the delivery of health services.
input personal information. Clients also need to be informed if this There are many benefits including quick access to up-to-date medical
information will monitored by their healthcare provider or if information, accessibility for clients who may otherwise have to travel long
someone else is outside the circle of care will have access to this distances to meet w/ a specialist and availability of information 24 hours a day,
health information such as the app developer. seven days a week at the click of button. Nurses must consider legal and ethical
challenges related to the use of technology in healthcare in order to provide
Electronic health record safe, efficient, and effective care to all client either virtually or in person.
 Used in various hospitals, community health settings, and doctor’s
offices to enter and view client information. You need client CONCLUSION:
identifiers are used to ensure that information about the client is Nurse leaders played a critical role in achieving quality improvement
linked with correct health care provider the client most recent result through technology. Notably, when nursing leaders guided the
of laboratory and diagnostic test and an updated list on currently implementation process by working w/ teams to integrate the technology to
prescribe medications. redesign and improve existing processes, organization wide improvement will
 Information about the client’s vaccination history, allergies, occur. To achieve improvement w/ large scale change, nurse leaders must
operative report and discharge information is also provided. work alongside staff to interdependently improve processes, challenge existing
 A benefit of using electronic health record is that healthcare rules that impede open communication and collectively work to achieve a
providers have quick access to medical information, clients common goal. These characteristics exemplify a transformational leadership
benefit they received proof management of chronic diseases such as style where leaders and staff work together toward a greater good.
when health care professionals can receive reminders for follow up Transformational leaders strive to raise their followers up by working
test. interdependently as a team. Nurse leaders will create an environment
 Also reduce unnecessary repetition of laboratory and diagnostic conducive to open communication and information sharing will ultimately lead
testing which ultimately saves money. to a cohesive goal directed team environment. Importantly, when nurse leaders
 A risk of EHR is that people not within the circle of care may access facilitate teamwork and goal achievement not by control the team but rather
confidential information. Regional health authorities have taken empowering the team through seeking ongoing team member input and
measures to monitor for such risks. These measures include: feedback, improvement can occur.
 Providing limited access in monitoring who is viewing any
confidential health information.
 EHR may also use include the use of standardized evidenced-based
protocols for nursing care. Nurses can access the most current
evidence-based protocol to see potential nursing interventions which
can serve to improve documentation of assessments and
interventions by providing reminders to chart specific symptoms or
to chart the administration of PRN meds.

TELEMEDICINE
 Telehealth is an information and communication technology that
allows for health services to be delivered over a distance using
electronic or telecommunication devices.

BENEFITS:
 Is healthcare is accessible to all persons no matter where they reside.
For example; the client may act disservice in their community
instead if traveling to see a specialist in a large community. A nurses
is available to the client throughout the appointment and provides
care to the patient in various forms such as assessment or education.
14

You might also like