Informatics and EBP
The popularity of social and mobile networking applications is one indication of how new Web-based technologies are changing communication preferences. T or F.
True
Explore cognitive informatics.
Field of study made up of the disciplines of neuroscience, linguistics, artificial intelligence, and psychology. This multidisciplinary study of cognition and information sciences investigates human information-processing mechanisms and processes and their engineering applications in computing.
What is the name of the federal legislation in the United States to control how financial institutions handle the private information they collect from individuals?
Gramm-Leach-Bliley Act (GLBA)
Knowledge can be defined as the awareness and understanding of a set of information. T or F.
True
Describe cognitive science.
is the fourth of four basic building blocks used to understand informatics, Interdisciplinary field that studies the mind, intelligence, and behavior from an information processing perspective.
A nurse reviews the electronic health record of a patient and identifies a drug allergy to the medication that has been prescribed. The nurse has demonstrated:
interpretation of data.
Current telehealth technologies are focused on clinicians being able to see patients and not interact with them since audio and streaming video capabilities are costly. T or F?
False
It is safe to open an email attachment from a known sender. T or F?
False
A nurse is explaining how cognitive informatics helps improve information technology in health care. Which statement by the nurse is correct?
"Cognitive informatics examines how humans interact with computers so better information technology systems can be built."
A nurse is explaining justice in health care to a nursing student. Which statement is correct?
"Justice refers to fair, equitable, and appropriate treatment no matter what is owed to a person."
How much is spent on health care in the United States per year?
Greater than $2 trillion
Explore how the HITECH Act is enhancing the security and privacy protections of HIPAA.
•Compliance with the Privacy and Security Rules is mandatory for all covered entities. •Entities must conduct regular audits to ensure compliance and must immediately fix breaches. •Privacy and security of patient health information has been improved by applying the requirements of HIPAA directly to the business associates of covered entities.
Relate nursing informatics metastructures, concepts, and tools to the knowledge work of nursing.
•Data: discrete entities that are described objectively without interpretation •Information: Data that are interpreted, organized, or structured •Knowledge: Information that is synthesized to identify and formalize relationships •Wisdom: Application of knowledge to the management and solution of human problems
Explore the concept of nurses as knowledge workers.
•Has advanced formal education and is able to apply theoretical and analytical knowledge •Is a continuous learner •Is a specialist •Devotes 50% of work to searching and evaluating information Is an innovator
Describe the purposes of the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009.
•Reducing health disparities •Ensuring the security of patient health information •Improving healthcare quality
Explore the Health Insurance Portability and Accountability Act (HIPAA) of 1996.
−Curtail healthcare fraud and abuse −Enforce standards for health information −Guarantee the security and privacy of health information −Ensure health insurance portability for employed persons
Explain methods to anticipate and prevent typical threats to network security.
−Restricting remote access to computers owned or configured by your organization −Disallowing administrator privileges on remote access computers −Placing restrictions in the VPN and remote access policies −Configuring the VPN to operate in a "sandbox" or virtual environment that isolates the session from other software running on the remote machine −Educating users about safe computing practices in remote locations
Identify various methods of user authentication and relate authentication to security of a network.
−Something the user knows (password) −Something the user has (ID badge) −Something the user is (biometrics)
Assess processes for securing electronic information in a computer network.
- antivirus software - hardware tool (proxy server) - keep programs up to date - email scanning software - firewall
Explore human-technology interface problems.
- digital medication dosage misreadings. - automatic discontinuation w/o alerts.
An organization's confidentiality policy should clearly define:
- which data are confidential. - procedures for releasing confidential information. - procedures to follow if confidential information is accidentally released without authorization.
A nurse is teaching a nursing student about the use of social media and health care. Which statement is correct by the nurse?
"Nurses must use social media cautiously to protect patients' rights."
A nurse is explaining nursing informatics to a nursing student. Which statement by the nurse is correct?
"Nursing informatics integrates nursing sciences and analytical sciences."
A nurse is considering a social convention about right and wrong human conduct that has formed a communal consensus, known as which of the following?
A moral
A nurse is discussing options in the treatment plan with a patient who speaks another language. To enhance interaction and exchange of data and information, the nurse will use which of the following?
A technologically based translator
Examine artificial intelligence and its relationship to cognitive science and computer science.
AI uses cognitive science and computer science to replicate and generate human intelligence.
Paper documentation hinders which of the following?
Ability to share information
Describe the human-technology interface.
Anytime a human uses technology, there is some type of hardware and or software that enables and supports the interaction.
A password consisting of the ampersand character (&) and the user's birthdate is strong. T or F?
False
A new nurse is documenting in a patient's electronic health record when a visitor approaches the nurse to ask questions. What should the nurse do to ensure confidentiality and security of the patient's electronic health record?
Close the electronic health record immediately.
A nurse is reviewing the conceptual framework of nursing informatics and understands the first concept in this framework is:
Data
Explore the ethical model for ethical decision making.
Examine the ethical dilemma (conflicting values exist). Thoroughly comprehend the possible alternatives available. Hypothesize ethical arguments. Investigate, compare, and evaluate the arguments for each alternative. Choose the alternative you would recommend. Act on your chosen alternative. Look at the ethical dilemma and examine the outcomes while reflecting on the ethical decision.
Examine ethical implications of nursing informatics.
Failing to log off a computer when not in use. Illegally accessing patient files. Lending passwords or access codes. Losing electronic devices. Not shredding printouts with private info. Texting patient information.
What is the human-technology interface?
Hardware and software that support humans interacting with technology.
Evaluate professional responsibilities for the ethical use of healthcare informatics technology.
Health professionals are ethically obligated to protect patient confidentiality.
A nurse is performing a physical assessment on a patient with chest pain. Which of the following is a technology that the nurse would use to obtain objective data on the physical status of the patient?
Heart monitor
Recognize the Foundation of Knowledge model as the organizing conceptual framework for the text.
Model proposing that humans are organic information systems constantly acquiring, processing, generating, and disseminating information or knowledge in both their professional and personal lives. The organizing framework of this text.
A patient reviews inaccurate information about a medical condition on the Internet that results in a delay in care. This is a violation of which of the following?
Nonmaleficence
Which of the following terms is defined as any physical or mental health information created, received, or stored by a "covered entity" that can be used to identify an individual patient, regardless of the form of the health information.
Protected health information
A nurse is reading literature on cognitive science and understands that this discipline is influenced by which field of science?
Psychology
Which of the following activities is/are used to build a foundation of knowledge in professional practice?
Reading research and theory articles, Attending continuing education programs, Consulting with expert colleagues and using clinical practice guidelines.
Healthcare organizations typically do not encourage use of personal devices for professional matters, and in many instances they actually have policies in place forbidding employees from using personal devices in the workplace. What is an issue or are issues with "bring your own device" (BYOD)?
Security of PHI
Trace the evolution of nursing informatics from concept to specialty practice.
The concept of informatics was introduced to the healthcare arena in the 1950s and has evolved from mechanical ventilators in the intensive care units to computer-based information systems (CIS) to now its own specialty.
Assess how the human mind processes and generates information and knowledge.
The decision-making process evolves around knowledge and wisdom, Output of cognition; outcome of our intellectual processing.
Define nursing science and its relationship to various nursing roles and nursing informatics.
The ethical application of knowledge acquired through education, research, and practice to provide services and interventions to patients so as to maintain, enhance, or restore their health; to advocate for health; and to acquire, process, generate, and disseminate nursing knowledge to advance the nursing profession.
Nursing informatics can be defined as which of the following?
The synthesis of nursing science, information science, computer science, and cognitive science for the purpose of managing, disseminating and enhancing healthcare data, information, knowledge, and wisdom to improve collaboration and decision making, provide high-quality patient care, and advance the profession of nursing.
Which of the following best describes the central goal of nursing informatics?
To manage and communicate data, information, knowledge, and wisdom in the delivery of nursing care Answers:A.
Artificial intelligence is the field that deals with the conception, development, and implementation of informatics tools based on intelligent technologies. This field attempts to capture the complex processes of human thought and intelligence. T or F.
True
Browser privacy settings can control how cookies are used. T or F?
True
Chronic diseases are of major concern to the United States, not only because of the impact they have on individuals, but also because of the tremendous cost associated with providing treatment for patients with these conditions. Adult-onset diabetes, for example, has reached epidemic proportions. A national health information technology infrastructure will help providers better identify those patients who are at risk for developing this disease and provide treatment strategies to avoid it. T or F.
True
Cognitive task analysis usually starts by identifying, through interviews or questionnaires, the particular task and its typicality and frequency. T or F?
True
Ethical dilemmas arise when issues raise questions that cannot be answered with a simple, clearly defined rule, fact, or authoritative view. T or F?
True
Every nurse must commit to lifelong learning and the use of knowledge in practice in order to be successful. T or F.
True
Extended and expanded access to clinical research findings and decision support tools has been significantly influenced by the advent of computerization and the Internet. T or F?
True
Human-technology interface problems are a major cause of patient monitoring incidents. It is not always that the technology itself is faulty. In fact, the technology may perform flawlessly, but the interface design may cause human error. T or F?
True
The HIPAA privacy requirements, which went into effect on April 14, 2003, limited the release of protected health information without the patient's knowledge and consent. T or F.
True
The human interfaces for each of the various technologies are different and can even differ among different brands or versions of the same device. T or F?
True
________ is the term that denotes the ease with which people can use an interface to achieve a particular goal.
Usability
Analyze practical ways of applying the ethical model for ethical decision making to manage ethical dilemmas in nursing informatics.
Use your problem-solving, decision-making, and critical-thinking skills. What is the dilemma you are analyzing? Collect as much information about the dilemma as you can, making sure to gather the relevant facts that clearly identify the dilemma. You should be able to describe the dilemma you are analyzing in detail.
Which of the following can be described as the appropriate use of knowledge to manage and solve human problems?
Wisdom
Explore how nurses can create and derive clinical knowledge from information systems.
information system can facilitate and provide an easier and faster information flow that is needed for efficient processing
It is termed __________if a nurse knows that a colleague has accessed or attempted to access the record of a patient for whom the colleague is not providing care.
a breach
Ethics is best described as:
a goal-oriented approach to answering questions that potentially have multiple acceptable answers.
A nursing professional reads a nursing journal article on a new patient care technology. This nursing professional is:
acquiring knowledge.
Videoconferencing technology:
allows professionals to communicate more effectively and frequently with in-home patients.
Recognize ethical dilemmas in nursing informatics.
arises when moral issues raise questions that cannot be answered with a simple, clearly defined rule, fact, or authoritative view.
Surveys of potential or actual users of a website can be conducted to:
assess preferences for a number of design characteristics such as display color, menu buttons, text, photo size, icon metaphor, and layout by selecting, on a computer screen, their preferences for each item from two or three options.
Task analysis involves:
inputs needed for the task, how a task must be accomplished, and constraints on actors' choices on carrying out the task.
An example of an expert system is the:
insulin pump
HIPAA was enacted by the federal government for several purposes, including:
better portability of health insurance as a worker moved from one job to another, deterrence of fraud, abuse, and waste within the healthcare delivery system, simplification of the administrative functions associated with the delivery of health care, such as reimbursement claims sent to Medicare and Medicaid.
Understanding of clinical practice decision making using cognitive science principles promotes the development of:
clinical decision support tools.
Identify informatics technologies likely to be legislated in the future.
collect and organize comprehensive data on patients, and systems that help providers integrate evidence into practice, and highlight problems as they arise.
A nurse is documenting patient data in the electronic health record, which will assist in:
communication with other healthcare providers.
Clinical decision support systems help users to:
consider consequences of alternative actions, provide stores of information, make decisions in unfamiliar circumstances.
Experts in computer science strive to understand how the mind processes:
data and information.
Acceptable use policies in an organization typically restrict downloads of files by employees because:
downloads increase vulnerabilities to viruses.
The prevalence of healthcare-associated infections demonstrates how the _______ can address healthcare quality issues.
electronic health record
A strength of the FITT model is that it:
encourages the evaluator to examine the fit between each two of the components: user and technology, task and technology, and user and task.
When a nurse uses information from other sources to help rethink, revise, and apply knowledge to a clinical situation, this is known as:
feedback
A nurse reviews the patient's electronic health record prior to meeting the patient. The nurse is:
gathering information and data.
Considering principles of cognitive informatics when designing technology interfaces helps to mitigate:
human mental workload.
Computerized technologies will assist in the transformation of data into:
information
Explore the quest for consistent terminology in nursing and describe terminology approaches that accurately capture and codify the contributions of nursing to health care.
it establishes a shorthand form of communication that can efficiently communicate key information about patient data and the regulations that govern the nursing profession.
A nurse's knowledge work includes interpreting trends in:
laboratory results, symptoms, and outcomes.
Organizations are able to monitor who is using the organizational network and what files that user has accessed, because any use of an electronic network:
leaves a digital footprint.
The nurse violates a patient's confidentiality and right to privacy by:
looking up a colleague's diagnosis and laboratory results.
New technologies used in health care, such as smartphones and Google Glass, create potential ethical issues associated with:
privacy and confidentiality.
A hardware security tool that helps protect an organization against security breaches by issuing masks to protect the identity of a corporation's employees who are accessing the Internet is a(n):
proxy server.
Some of the disciplines involved in cognitive science include:
psychology and philosophy, neuroscience and linguistics, biology and physics.
The main goal of any ethical decision is to:
reach a rational justifiable decision.
A nurse is caring for a patient who experiences a complication after surgery. The nurse understands the cause-and-effect relationship because her knowledge is based in:
reason.
An ID badge is an example of authentication by:
something the user has.
Determine how the HITECH Act and its impact on HIPAA apply to nursing practice.
the introduction of the Breach Notification Rule, the inclusion of Business Associates among who can be held accountable for data breaches, and the powers given to HHS to facilitate enforcement action.
Some organizations provide offsite employees such as homecare nurses with a network interface device that does not have secure information stored on it. These devices are also known as:
thin clients
Two ethics approaches that emphasize considerations for human needs and responsibility to meet needs are:
virtue and care ethics.
Behaviors leading to unintentional data breaches include:
walking away from a workstation without logging off.