Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

NR 599 Final Exam Study Guide (Version 3) / NR599 Final Exam Study Guide (V3, LATEST 2022/, Exams of Nursing

NR 599 Final Exam Study Guide (Version 3) / NR599 Final Exam Study Guide (V3, LATEST 2022/2023): Chamberlain College

Typology: Exams

2021/2022

Available from 04/27/2022

Experttutor1
Experttutor1 ๐Ÿ‡ฌ๐Ÿ‡ง

3.8

(85)

820 documents

1 / 23

Toggle sidebar

Related documents


Partial preview of the text

Download NR 599 Final Exam Study Guide (Version 3) / NR599 Final Exam Study Guide (V3, LATEST 2022/ and more Exams Nursing in PDF only on Docsity! ยท NR599 Final Exam Study Guide with Midterm Guide & Review General principles of Nursing Informatics Nursing informatics is the specialty that integrates nursing science with multiple information management and analytical sciences to identify, define, manage, and communicate data, information, knowledge, and wisdom in nursing practice. One of the most frequently quoted and widely accepted definitions of nursing informatics is that it is a combination of nursing science, information science and computer science ยท Knowledge โ€ข All nurses have the opportunity to be involved in the formal dissemination of knowledge via their participation in professional conferences either as presenters or attendees. โ€ข All nurses, regardless of the practice arena, must use informatics and technology to inform and support that practice. ยท Wisdom โ€ข Wisdom is the application of knowledge to an appropriate situation. โ€ข In the practice of nursing science, we expect action and/or actions directed by wisdom. โ€ข Wisdom uses knowledge and experience to heighten common sense and insight to exercise sound judgment in practical matters. It is developed through knowledge, experience, insight and reflection. ยท Scientific Underpinning The scientific underpinnings of practice provide the basis of knowledge for advanced nursing practice. These scientific underpinnings include sciences such as biology, physiology, psychology, ethics, and nursing. ยท The Foundation of Knowledge Model According to Mastrain and McGonigle (2009), one of the most prominent models associated with nursing informatics is the Foundation of Knowledge model. This theory involves integrating four main kinds of knowledge, which are: knowledge acquisition, knowledge dissemination, knowledge generation and knowledge processing. Knowledge acquisition: application of knowledge acquired through education, research, and practice to provide services and interventions to patients to maintain, enhance, or restore their health, and to acquire, process, generate, and dis- seminate nursing knowledge to advance the nursing profession. Knowledge Dissemination: Disturbing and sharing of knowledge learned Knowledge Generation: Creating new knowledge by changing and evolving knowledge based on your experience, education and input from others Knowledge Processing: The activity or process of gathering, collecting or perceiving, analyzing, saving and transmitting knowledge The Foundation of Knowledge model specifically prompts nurses to extend their theoretical and metaphorical knowledge into practical, holistic determinations based on a variety of factors and contexts. Because competencies in informatics include but are not limited to information literacy, computer literacy, and the ability to use strategies and system applications to manage data, knowledge, and information, the ability of nursing students to use computer-mediated communication skills is essential to their success in the nursing field and as a means to improve patient safety. โ€ข Organizing conceptual framework for text โ€ข Helps to explain the ties between nursing science and informatics and knowledge โ€ข Informatics is viewed as a tool for founding knowledge ยท Computer science ยท Computer science is introduced through a focus on computers and the hardware and software that make up these evolving systems; computer science is one of the building blocks of nursing informatics. Computer science offers extremely valuable tools that, if used skillfully, can facilitate the acquisition and manipulation of data and information by nurses, who can then synthesize these into an evolving knowledge and wisdom base. Data storage, management, retrieval, and processing. ยท Cognitive science Interdisciplinary field that studies the mind, intelligence, and behavior from an information processing perspective. A field that involves both cognitive informatics and artificial intelligence. The science of understanding what information is housed in and processed by the brain (Cognitive informatics) ยท Information science the science of information studying the application and usage of information and knowledge in organizations and the interfacing or interaction between people, push for more technology to be used especially for education ยท TIGER-based Nursing Informatics Competencies Model The work of the Technology Informatics Guiding Education Reform team. This team of nursing leaders developed a vision for utilizing information technology to transform nursing practice. Pillars of the TIGER vision include: management and leadership, education, communication and collaboration, informatics design, information technology, policy, and culture. WEEK ONE READING/KEY POINTS McGonigle, D. & Mastrian, K. (2018). โ— Chapter 1 โ—‹ Nursing informatics: specialty that integrates nursing science, computer science, cognitive science, and information science โ—‹ For information to be valuable & quality it must be: โ–  Accessible & Utility: right user obtain right information at the right time in the right format โ–  Accurate: โ–  Timely: available when needed for the right purpose at the right time โ–  Complete: contains all necessary essential data โ–  Cost-effective โ–  Flexible: information may be used for a variety or purposes โ–  Reliable: authoritative or credible source โ–  Relevant: subjective descriptor that has relevant information that is useful โ–  Simple โ–  Verifiable โ–  Transparency: allows user to apply their intellect to accomplish tasks while tools housing the information disappears into the background โ–  Secure โ–  Reproducibility: ability to produce the same information again โ— Chapter 2 โ—‹ Data: raw facts โ—‹ Information: processed data that has meaning โ—‹ Data integrity: whole, complete, correct, and consistent data โ—‹ Dirty data: database that contains errors such as duplicate, incomplete, or outdated records โ—‹ Information science: study of information science-- concerned with input, processing, output, and feedback of data and information through technology integration with a focus on comprehending the perspective of the stakeholders involved and then applying IT as needed. โ–  Systemically based-- deals with big picture, opposed to individual pieces of technology โ–  Integrates communication science, computer science, cognitive science, library science, and social science โ–  Links people and technology โ–  Machines (inorganic ISs) Humans (organic ISs) โ–  Focuses on why and how technology can be put to best use to serve the information flow within an organization โ—‹ Information systems: handle the needs of the entire organization (communication, tracking, and research) โ—‹ Input: collecting and acquiring raw data โ–  Keyboards, touch screen, mice, light pens, automatic scanners โ—‹ Processing: retrieval, analysis, synthesis of data-- transforms data into useful information and outputs โ–  Storing for future use, making calculations, comparing data โ—‹ Output: dissemination-- produces helpful information โ–  Reports, documents, summaries, alerts, outcomes โ— Chapter 3 โ—‹ Motherboard: central nervous system of the computer-- facilitates communication among all components of the computer โ—‹ Hard disk: permanent data storage area that holds gigabytes of data, information, documents even when the computer is turned off. Backing up important files are important because disk drives are not infallible โ—‹ Random-access memory: temporary storage that allows the processor to access program codes and data while working on a task--the contents of RAM are lost once the system is rebooted or shuts off โ—‹ Software: application programs โ–  OS software โ— Most important software on any computer โ— Very first program to load on computer start-up and is fundamental for the operation of all other software and the computer hardware โ— Allows user to multitask with ease โ— Described in 6 basic processes: Memory, device, processor, and storage management, application and user interface โ–  Productivity software โ— Provide all the basic programs that a user needs to do their work (word, spreadsheet, email, etc) โ–  Creativity software โ— Allows user to draw, paint, render, record music and sound, and incorporate multimedia in professional aesthetic ways to share and convey information and knowledge โ–  Communication software โ— Allows user to share, dialogue, and network with other users via exchange of email or instant message โ—‹ Cloud computing: web-browser based login-accessible data, software, and hardware that you can access and use โ–  Public cloud: owned and operated by companies offering public access to computing resources โ–  Private cloud: operated for a single organization with the infrastructure being managed internally or outsourced to a third party โ— Chapter 4 โ—‹ Cognitive science: fourth of four basic building blocks used to understand informatics-- studies the mind, intelligence, and behavior from an information-processing perspective โ—‹ Connectionism: component of cognitive science that uses computer modeling through artificial neural networks to explain human intellectual abilities โ–  Neural network: interconnected simple processing device of the brain and nervous system that consists of a considerable amount of elements or units linked together in a pattern of connections โ—‹ Sources of knowledge โ–  Empiricism: knowledge derived from experiences or senses โ–  Rationalism: knowledge derived from reason โ–  Instinct, reason, intuition โ—‹ Epistemology: the study of the nature and origin of knowledge โ—‹ Wisdom: knowing when and how to apply knowledge (knowledge is understanding information in a way that it can be made useful) โ—‹ Cognitive informatics: field of study that bridges the gap in understanding how information is processed in the mind and in the computer โ—‹ AI: field that deals with the conception, development, and implementation of informatics tools based on intelligent technologies-- uses cognitive science and computer science to replicate and generate human intelligence โ— Chapter 6 โ–  A specialty that integrates medical science, computer science, cognitive science, and information science to manage and communicate data, information, knowledge, and wisdom in medical practice. โ—‹ Product developer โ–  One who designs, creates, and builds a product โ—‹ Project manager โ–  Person responsible for the success of a project, who manages the planning and enactment of the project. โ—‹ Researcher โ–  The one who researches โ—‹ TIGER initiative โ–  The work of the Technology Informatics Guiding Education Reform team. This team of nursing leaders developed a vision for utilizing information technology to transform nursing practice. โ— Chapter 15 โ—‹ Adverse events โ–  Any undesirable experiences or outcomes in a patient related to the use of a medical treatment or product. โ—‹ Agency for Healthcare Research and Quality (AHRQ) โ–  An agency within the U.S. Department of Health and Human Services that supports health services research initiatives. โ—‹ Bar-code medication administration (BCMA) โ–  A system using bar-code technology affixed to the medication โ—‹ Clinical decision support (CDS) โ–  A computer-based program designed to assist clinicians in making clinical decisions by filtering or integrating vast amounts of information and providing suggestions for clinical intervention. โ—‹ Computerized physician order entry (CPOE) โ–  Clinicians place orders within these systems instead of using traditional handwritten transcription onto paper. โ—‹ Electronic medication administration system (eMAR) โ–  A system that uses bar-coding technology in order to submit and fill prescriptions. โ—‹ Failure modes and effects analysis (FMEA) โ–  A systematic evaluation of a process to determine how and why it failed to produce the desired results. โ—‹ Government Accountability Office (GAO) โ–  The highest audit institution of the federal government that provides auditing, evaluation, and investigative services for the U.S. Congress. โ—‹ High-hazard drugs โ–  Drugs known to cause significant adverse side effects when administered inappropriately โ—‹ Human factors engineering โ–  Recognizing the limitations of human performance and developing products to overcome these limitations. โ—‹ Just culture โ–  An atmosphere of trust โ—‹ Never events โ–  Events that should never occur, such as wrong-site surgeries and retained surgical objects. โ—‹ Radio frequency identifier (RFID) โ–  An identification chip that stores information for retrieval. โ—‹ Root-cause analysis โ–  Similar to failure modes and events analysis; analysis to discover why a process is faulty or produces an undesired result. โ—‹ Safety culture โ–  An organizational commitment to patient safety and the prevention of medical errors. โ—‹ Smart pump โ–  Machine used to infuse medication that includes dose-checking technology and safeguards โ—‹ Smart rooms โ–  Patient rooms that are equipped with technologies to increase patient safety and improve patient care. โ—‹ Systems engineering โ–  An approach where technology manufacturers partner with organizations to identify risks to patient safety and promote safe technology integration. โ—‹ Wearable technology โ–  The study or practice of inventing, designing, building, or using miniature body-borne computational and sensory devices. McBride, S., & Tietze, M. โ— Chapter 2 โ—‹ Advanced practice โ–  Designed to improve the science of simulation and share best practice and provide evidence based guidelines. โ—‹ Interprofessional โ–  Collaborating and interacting with other healthcare professionals to ensure positive patient outcomes. โ— Chapter 24 โ—‹ Competencies โ–  Rely primarily on methods that self-report through survey instrumentation methods. Valid and reliable methods to evaluate informatics competencies measurably and objectively within simulation centers are not currently available. โ—‹ electronic health record โ–  Creating a significant change in the way clinicians access, read, digest, and use the information within the health record to treat patients. โ—‹ Simulation โ–  Simulation-based learning requires learners to actively participate in dynamic experiences as opposed to static, traditional modes of learning. WEEK THREE READING/ KEY POINTS McGonigle, D. & Mastrian, K. โ— Chapter 11 โ—‹ Cognitive task analysis โ–  Examination of the nature of a task by breaking it down into its component parts and identifying the performersโ€™ thought processes. โ—‹ Cognitive walkthrough โ–  Within cognitive walkthrough when evaluators assess a paper mockup, working prototype, or completed interface by observing the steps users are likely to take to use the interface โ–  . This analysis helps designers determine how understandable and easy to learn the interface is likely to be for these users and the typical tasks โ—‹ Cognitive work analysis โ–  Cognitive work analysis was developed for the analysis of complex, high-technology work domains โ–  A complete CWA includes five types of analysis: (1) work domain, (2) control tasks, (3) strategies, (4) socialโ€“organizational, and (5) worker competencies โ–  Work domain analysis describes the functions of the system and identifies the information that users need to accomplish their task goals โ— (3) the use of certified EHR technology to submit clinical quality and other measures. โ—‹ The criteria for meaningful use will be staged in three steps. โ–  Stage 1 (2011โ€“2012) set the baseline for electronic data capture and information sharing. โ–  Stage 2 (2013) โ–  Stage 3 (expected to be implemented in 2015) will continue to expand on this baseline and be developed through future rulemaking. McBride, S., & Tietze, M. (2018). โ— Chapter 1 โ—‹ Health information exchange (HIE) โ–  Data translated into actionable information with extensive data management and reporting capability on which providers can manage and improve care โ—‹ Medicare Access and CHIP Reauthorization Act (MACRA) โ–  there is significant emphasis on expanding the requirement to capture more structured data, better quality reporting, and better capacity to exchange data using HIEs within and across states and regions โ—‹ Merit-Based Incentive Payment System (MIPS) โ–  with a focus on interoperability โ—‹ National Strategy for Quality โ–  Improvement in Health Care, several legislative components have been implemented. โ—‹ Patient Protection and Affordable Care Act (ACA) โ–  focused on providing all Americans with access to quality and affordable healthcare โ—‹ The third content domain of the NEHI framework: goal to improve patient outcomes โ–  Patient safety โ–  Population health โ–  Quality โ— Chapter 8 โ—‹ Agile โ–  Agile development is a technique that is a programmer-driven technique that creates a feedback loop with the end users. This technique is based primarily on verbal communication with the end user and does not rely on documentation strategies โ—‹ Alpha testing โ–  testing is done using test data or โ€œmade-upโ€ data. โ—‹ beta testing โ–  gets a step closer to production with a sample of โ€œrealโ€ data to test how the system functions and looks for any errors that might arise. โ—‹ big-bang implementation โ–  all units or hospitals in a system go live at once โ—‹ command center โ–  A 24-hour resource center on site for the first 3 days of each rollout. โ—‹ commercial off-the-shelf products โ–  require customization. Customization must be done in-house by a design team, or the design team is contracted through the vendor or a service provider company. This design work requires close alignment with end-user requirements. โ—‹ core implementation team โ–  The team is on site the first 24 hours and available by cell or pager for 2 weeks thereafter. โ—‹ costโ€“benefit analysis โ–  Is the cost worth the benefit โ—‹ Evaluation โ–  Evaluating how well the product is working โ—‹ Implementation โ–  Putting the product into effect โ—‹ integration testing โ–  one or more modules or components work together (integrate) and function as designed. โ—‹ project management โ–  is an essential tool of the design phase of the SDLC because it is required to keep implementation and development projects on time, in scope, and within budget. โ—‹ rapid application development โ–  RAD deploys software tools and analysis and design strategies to speed up development. The goal is to get systems rapidly into the hands of the end user to test and refine the product to meet the end-user requirements โ—‹ request for information โ–  is a shorter, less detailed request that surveys what type of products might fit the end userโ€™s needs, โ—‹ request for proposal (RFP) โ–  includes detailed specifications and requirements that typically serve as a more binding proposal or offer to accomplish the goals or product needs of the customer โ—‹ return on investment (ROI) โ–  electronic information systems and technology in the healthcare setting is an important consideration, but other success factors include improvements in quality, safety, and population health. โ—‹ Scrum โ–  is considered by some to be the most popular software development agile framework and is a term used for iteration โ—‹ Sprint โ–  is defined by the โ€œscrum masterโ€ or the agile teamโ€™s facilitator. โ—‹ Superuser โ–  Users that have expert technology skills โ—‹ system testing โ–  is typically done by the system analyst to make sure the system functions as the designer understood it to be developed. โ—‹ systems development life cycle (SDLC) โ–  is a standardized approach used to develop and implement an information technology (IT). โ–  This framework is often used across industries to structure best practices for IT development and deployment. โ–  SDLC is a phased approach used to analyze and design information systems that is broken into distinct phases โ—‹ unit testing โ–  is one specific component or module that performs a specific task โ—‹ Waterfall โ–  approach to development occurs in a cascade fashion with analysts and users proceeding in a sequenced manner from one phase to the next. The phases are linear in approach and do not cycle back around to inform the former stage. โ— Chapter 11 โ—‹ Business associate agreements (BAA) โ–  BAA is in place with each of their partners to maintain security and overall HIPAA compliance. โ—‹ Centralized model โ–  HIE data sharing is protected through data-sharing agreements, and data are stored for use by organizations through the data repository. This approach typically fosters the use of data within the community or region in a collaborative manner, supporting โ–  Something that cannot be updated โ—‹ Trust-e โ–  One of the two most common symbols that power users look for to identify trusted health sites. โ—‹ Voice recognition โ–  A type of software that allows the user to input data or to navigate the Web using voice commands. โ—‹ Web quests โ–  Searches of the World Wide Web for information. โ—‹ Weblog โ–  A website that contains the contributions of single or multiple users about a particular topic or issue. โ— Chapter 17 โ—‹ Agency for Toxic Substances and Disease Registry (ATSDR) โ–  A federal agency that acts as a repository for research and data regarding hazardous materials that serves the public by using the best science โ—‹ Behavioral Risk Factor Surveillance System โ–  An assessment system initially designed to collect information on the movement of mentally impaired persons from state-operated facilities into community settings. โ—‹ Bioterrorism โ–  The use of pathogens or other potentially harmful biological agents to sicken or kill members of a targeted population. โ—‹ Centers for Disease Control and Prevention (CDC) โ–  An agency of the U.S. Department of Health and Human Services that works to protect public health and safety related to disease control and prevention. โ—‹ Community risk assessment (CRA) โ–  A comprehensive examination of a community to identify factors that potentially affect the health of the members of that community. โ—‹ Crowdsourcing โ–  Information generated by individuals on social media. โ—‹ Epidemiology โ–  The field of study identifying things that come upon the people. Incidence, prevalence, and control of disease. โ—‹ National Center for Public Health Informatics (NCPHI) โ–  Center created in 2005 by the Centers for Disease Control and Prevention to provide leadership in the field of public health informatics. โ—‹ National health information network โ–  An agency of the U.S. Department of Health and Human Services charged with the development of a safe, secure, interoperable health information infrastructure. โ—‹ National Health and Nutrition Examination Survey โ–  A survey sponsored by the Centers for Disease Control and Prevention that combines both questionnaires and physical examinations to collect data on the health and nutritional status of adults and children in the United States. โ—‹ Public health โ–  The science of protecting the well-being of communities and the population through education, research, intervention, and prevention. โ—‹ Public health informatics โ–  An aspect of informatics focused on the promotion of health and disease prevention in populations and communities. โ—‹ Public health interventions โ–  Actions taken to promote and secure the well-being of a population or a community. โ—‹ Regional health information exchanges โ–  A regional network of healthcare organizations and providers who exchange information related to the health of the population. โ—‹ Risk assessment โ–  Determination of risk or danger, such as assessing for risk factors related to heart disease. โ—‹ Suicide Prevention Community Assessment Tool โ–  Risk assessment method that addresses general community information, prevention networks, and the demographics of the target population as well as community assets and risk factors. โ—‹ Surveillance โ–  The act of watching for trends in health-related data for early detection of health threats. โ—‹ Surveillance data systems โ–  A networked computer system designed to use health-related data trends to predict the probability of an outbreak of a contagious or infectious disease or to detect morbidity and mortality trends โ—‹ Syndromic surveillance โ–  A specialized system of data collection that seeks to detect trends in the incidence and severity of a specific disease or health-related syndrome and plan the public health response. โ—‹ Youth Risk Behavior Surveillance System โ–  An epidemiologic survey conducted by the Centers for Disease Control and Protection to identify and track the most common health risk behaviors that lead to illnesses and mortality among youth. โ— Chapter 21 โ—‹ American Library Association โ–  A U.S.-based organization that promotes libraries and library education internationally. โ—‹ Cumulative Index to Nursing and Allied Health Literature โ–  A comprehensive nursing and allied health literature database. โ—‹ Educational Resources Information Center โ–  A comprehensive educational resources database. An international database of educational literature. โ—‹ Fair use โ–  Doctrine that permits the limited use of original works without the copyright holderโ€™s permission โ—‹ Foundation of Knowledge model โ–  Model proposing that humans are organic information systems constantly acquiring, processing, generating, and disseminating information or knowledge in both their professional and personal lives. โ—‹ Information literacy โ–  Recognizing when information is needed and having the ability to locate, evaluate, and effectively use the needed information. McBride, S., & Tietze, M. โ— Chapter 4 โ—‹ accountable care organizations (ACA) โ–  that were embedded in the ACA, required more robust technological infrastructure and subsequent policy documents to fully develop their potential โ—‹ Beacon project โ–  designed to demonstrate the kinds of clinical quality improvements that are possible in communities with more robust EHR adoption. โ—‹ health information exchange โ–  Continue to lack plug-and-play functionality that would lower implementation costs and encourage data exchange, and many HIEs are based on limited datasets.
Docsity logo



Copyright ยฉ 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved