0% found this document useful (0 votes)
266 views27 pages

NCM 110 Transes 2ND Sem

 Nursing informatics is the specialty that integrates nursing science with information management and analytical sciences to manage and communicate data, information, knowledge, and wisdom in nursing practice.  Some examples of information systems in healthcare include electronic health records, clinical information systems, nursing information systems, and hospital information systems which allow efficient management of patient data and records.  Implementing a nursing information system involves collecting data, translating it into useful information through statistical analysis, disseminating the information, and evaluating the system to support better patient care and decision making.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
266 views27 pages

NCM 110 Transes 2ND Sem

 Nursing informatics is the specialty that integrates nursing science with information management and analytical sciences to manage and communicate data, information, knowledge, and wisdom in nursing practice.  Some examples of information systems in healthcare include electronic health records, clinical information systems, nursing information systems, and hospital information systems which allow efficient management of patient data and records.  Implementing a nursing information system involves collecting data, translating it into useful information through statistical analysis, disseminating the information, and evaluating the system to support better patient care and decision making.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

NCM 110 (2ND SEMESTER)

Module 1: Concepts, Principles and


Theories in Nursing Informatics D.I.K.W. Paradigm or model
D- Data
INFORMATICS I- Information
The science of processing data for storage K- Knowledge
and retrieval; information science. W- Wisdom

For example: Bed management systems Paradigm: in science and philosophy, a


allow hospitals to manage their patient paradigm is a distinct set of concepts or
census. Radio frequency identification (RFID) thought patterns, including theories,
help track patients, providers and research methods, postulates, and
equipment. Electronic portals give patients standards for what constitutes legitimate
instant access to their medical records. contributions to a field.

Nursing Informatics MULTIDISCIPLINARY


Is the specialty that integrates nursing Combining or involving several academic
science with multiple information disciplines or professional specializations in
management and analytical sciences to an approach to a topic or problem.
identify, define, manage, and communicate
data, information, knowledge, and wisdom Generally speaking, information system is a
in nursing practice. collective term referring to a system of
data records and activities that processes
The Healthcare Information and and translate the data to information in an
Management Systems Society (HIMSS) is automated process. The
an American not-for-profit organization processing of data involves the use of
dedicated to improving health care in computer systems and specialized software
quality, safety, cost-effectiveness and that manipulates the
access through the best use of information information-processing activities of the
technology and management systems. It organization.
was founded in 1961 as the Hospital
Management Systems Society. It is now
headquartered in Chicago, Illinois. Various types of information systems in
the healthcare industry.
INFORMATION SYSTEM IN HEALTCH * Patient data profiling
INDUSTRY * Transaction records processing
Informatics is the science of information, systems
the practice of information processing, * Hospital information system
* Pharmacy health system
and the engineering of information system. * Clinical information system
It also develops its own conceptual and * Electronic health records
theoretical foundations and utilizes * Patient care management
foundations developed in other fields. * Critical care system
* Ambulatory and laboratory
information system
* Nursing information system and many
more.
NCM 110 (2ND SEMESTER)
Data profiling is the process of examining Republic Act No. 7164 November 21,
the data available from an existing 1991
information source (e.g. a database or a file) An act regulating the practice of nursing in
and collecting statistics or informative the Philippines.
summaries about that data. ... Find out
whether existing data can be easily used ARTICLE XIII
for other purposes. SOCIAL JUSTICE AND HUMAN RIGHTS
HEALTH
Section 11. The State shall adopt an
integrated and comprehensive approach
to health development which shall
endeavor to make essential goods, health
and other social services available to all the
people at affordable cost.

There shall be priority for the needs of the


underprivileged, sick, elderly, disabled,
women, and children. The State shall
 The Patient Medication Profile (PMP) endeavor to provide free medical care to
is a record of information about a paupers.
patient's drug therapy. The profile can
contribute to better patient care by • The 14th congress of the republic of the
enhancing the pharmacist's ability to Philippines, introduced the implementation
efficiently perform his professional of Health Information Technology (HIT).
duties.
 A hospital information system (HIS) is Additional information:
a computer system that can manage The Fourteenth Congress of the Philippines
all the information related (Filipino: Ikalabing-apat na Kongreso ng
Pilipinas) was the national legislature of the
to health care providers allowing them to Republic of the Philippines, composed of
do their job effectively. They were the Philippine Senate and House of
introduced in the 1960s and have changed Representatives. The convening of the 14th
over time. Congress followed the 2007 general
elections, which replaced half of the Senate
PRESERVATION OF HEALTHCARE QUALITY membership, and the entire membership
THROUGH NURSING INFORMATICS of the House of Representatives.
THE 1987 CONSTITUTION OF THE
REPUBLIC OF THE PHILIPPINES Health Informatics Paradigm Shift
 Information influences people to
[REPUBLIC ACT NO. 9173] change their activities such as the
An act providing for a more responsive proper way of eating balanced foods.
nursing profession, repealing for the  Information also creates pressure for
purpose Republic Act No. 7164, otherknow the hospital management to change
as “The Philippine Nursing Act of 1991” and the scheme of pricing the hospital
for other purposes Eighth Congress services and implement new strategies
NCM 110 (2ND SEMESTER)
which focus more on the healthcare service experiment or surveys, used as a basis for
rather than business. making calculations or drawing conclusions.

Nursing informatics will help makes INFORMATION


patients aware of what they are really It is a data that has been given meaning by
getting and enables them to make way of relational connection.
decisions that reflect their requirements
and their ideals. Nutrition labels, for EXAMPLE
instance, made people conscious of their *a telephone service that supplies
consumption in a new way, for the first telephone numbers to the public on request.
time, they were able to judge the quality of *
food, compare products, and make
informed decisions about the foods they computer data that have been organized
eat. and presented in a systematic fashion to
clarify the underlying meaning.

Basic steps to properly implement the KNOWLEDGE


nursing information system in the hospital It is the appropriate collection of
1. Commencing the project information with an intent to be useful.
2. Collecting and analyzing the data
3. Translate data into information ( using Examples:
statistical processes) * All the information, facts, truths, and
4. Dissemination of information principles learned throughout time.
5. Support from the client * Familiarity or understanding gained
6. Project evaluation through experience or study.

Components of Nursing Informatics When someone “memorizes” information,


then they have amassed knowledge. This
knowledge has useful meaning to them,
but it does not provide for, in and of itself,
integration such as would infer further
knowledge.

UNDERSTANDING
 It is an interpolative and probabilistic
process. It is cognitive and analytical.
DATA  It is the process by which I can take
It simply exists and has no significance knowledge and synthesize new
beyond its existence. It can exist in any knowledge from the previously held
form, usable or not. It does not have knowledge.
meaning of itself.
Additional information:
Examples of data: Interpolate : verb (used with object),
Numbers, text, images, and sounds often in in·ter·po·lat·ed, in·ter·po·lat·ing.
a form of facts or figures obtained from
NCM 110 (2ND SEMESTER)
to introduce (something additional or
extraneous) between other things or parts;
interject; interpose; intercalate.
Mathematics. to insert, estimate, or find an
intermediate term in (a sequence).
to alter (a text) by the insertion of new
matter, especially deceptively or without
authorization. To insert (new or spurious
matter) in this manner.
A deterministic mathematical model is
meant to yield a single solution

describing the outcome of some Collecting data is expensive and to merit


"experiment" given appropriate inputs. the effort, you need to be very clear about
why you need it and how you plan to use it.
A probabilistic model is, instead, meant to
give a distribution of possible outcomes (i.e.
it describes all outcomes and gives some The nurses must use the data correctly and
measure of how likely each is to occur). process it properly. Wrong interpreting the
results may lead to more serious problems.
Converting Data into Information
Patient data, medical records and nursing Other information:
documents become information when it is One of the reasons that organizations
applied to some purpose and adds value collect data is to monitor and improve
for the recipient. It is on how the various performance of healthcare delivery and
types of data could be processed to create services. Some other data are irrelevant
useful information. and does not provide accurate benefits in
decision making.
Collecting data is expensive and to merit
the effort, you need to be very clear about
why you need it and how you plan to use it.

Converting Information to Knowledge


 The tremendous amount of
information that is translated is only
useful if it can be applied to create
knowledge that is significant to the
nurse and the healthcare giver
provider. Building and managing
knowledge is one of the greatest
challenges that have to establish.
 Information on its own will not create
a knowledge-based system but as a
guide in the decision making, we can
simply conclude that information and
NCM 110 (2ND SEMESTER)
knowledge are the building blocks of the
decision making process. Secondary Relevant Data Items
The right information fuels the Occupation
development of intellectual capital which in Health habits
turns drives innovation and performance Environment
improvement. Irrelevant Data Items
 Hobbies
CHARACTERISTICS OF DATA QUALITY Favorite color
The characteristics of data quality are Organization
frequently described in terms of data
relevancy, completeness, accuracy, 1. Data Relevancy
precision, accessibility, and timeliness. Data are meaningful to the performance of
the process or application for which they
Philippines where these causes of death are collected.
and morbidity are the highest are rural,
isolated regions/communities that exist 2. Legality of Data Collection
This is sometimes referred as Data items should be easily obtainable or
data integrity legal to collect such as weight, height,
temperature, systolic and diastolic reading.
Note:
The tremendous amount of information 3. Data Comprehensiveness
that is translated is only useful if it can be All the data items required should be
applied to create knowledge that is included. The data collection scheme
significant to the nurse and the healthcare should anticipate future data needs; as
giver provider. Building and managing such flexibility of data is essential.
knowledge is one of the greatest challenges
that have to establish. 4. Data Appropriateness
Information on its own will not create a Data attributes and their values should be
knowledge-based system but as a guide in defined at the correct level of details.
the decision making, we can simply
conclude that information and knowledge 5. Data Timeliness
are the building blocks of the decision Data gathering has to be done on real-time
making process. so that immediate preparedness will be
The right information fuels the applied to unaffected areas or community
development of intellectual capital which in and proper response from the healthcare
turns drives innovation and performance provider are provided instantaneously (e.g.
improvement. dengue case, age/area affected the most,
and the like.
Primary Relevant Data Items
Name 6. Data Consistencies & Data Uniqueness
Age The values should be the same and
Sex consistent within the hospital and clinic
department and outside the hospital (e.g.
health institutions, regulatory and policy
makers, schools and universities, health
agency, etc.
NCM 110 (2ND SEMESTER)
COMPUTER SYSTEM do. Any data the instruction needs are
 aims to enhance the quality of retrieved via the bus and placed in the
healthcare system. (The inadequacy CPU’s register or copied to specific
and inefficiency of manual data memory locations via a bus. The CPU
collection is in question if the integrity executes the instruction, and the results
is at risk). are stored in another register or copied to
 It simply duplicates the performance specific memory locations via bus. The
of a manual system with lower entire sequence of steps is called an
maintenance cost. instruction cycle. Frequently, several
instructions may be in process

simultaneously, each at a different stage in


What is Computer? its instruction cycle. This is called pipeline
A special machine that performs tasks, such processing
as calculations, data processing and
handling, electronic communication etc. Four main functions of Computer
under the control of a set of instructions 1. Accepts data
called a program. 2. Processes data
3. Produces output
When a computer is turned on , it searches 4. Stores results
for instructions in its memory. Usually, one
of the first sets of these instructions is a Main components of a Typical Computer
special program called the operating Central Processing Unit (CPU)
system, which is the software that makes – The microprocessor “brain” of the
the computer work computer system . Everything that a
computer does is overseen by the CPU.
Information from an input device or from
the computer’s memory is communicated
via the Bus to the central processing unit
(CPU), which is the part of the computer
that translates commands and runs
programs.
Memory
The CPU is a microprocessor chip---that is, – This is a very fast storage used to hold
a single piece of silicon containing millions data. It has to be fast because it connects
of tiny, microscopically wired electrical directly to the microprocessor.
components. Information is stored in a CPU
memory location called a Register. Several specific types of memory in a
computer.
BUS  Random-access memory (RAM) – used
A set of parallel conductors in a computer to temporarily store information
system that forms a main transmission that the computer is currently
path. working with.
 Read-only memory (ROM) – a
An instruction is analyzed by a decoder, permanent type of memory storage
which determines what the instruction will used by the computer for
NCM 110 (2ND SEMESTER)
important data that do not change. (e.g.
programs )
 Basic input/output system (BIOS) – a
type of ROM that is used by the
computer to establish basic
communication when the computer is
first turned on.
Integrated Drive Electronics (IDE)
Controller
 Cashing – the storing of frequently - This is the primary interface for the hard
used data in extremely fast RAM that drive and CD-ROM
connects directly to the CPU.
 Virtual memory – space on a hard disk
used to temporarily store data and
swap it in and out of RAM as
needed.

Motherboard
This is the main circuit board that all of the Peripheral Component Interconnect (PCI)
other internal components connect to. Bus
- The most common way to connect
additional components to the computer,
PCI uses a series of slots on the
motherboard that PCI cards plug into.

Power supply
An electrical transformer regulates the
electricity used by the computer.

SCSI (small computer system interface)


- Pronounced “scuzzy” , a method of
Hard disk adding additional devices, such as
This is large-capacity permanent storage hard drives or scanners, to the computer.
used to hold information such as programs
and documents.

AGP (Accelerated Graphics Port)


Operating System (OS) - Is a very high-speed connection used by
This is the basic software that allows the the graphics card to interface with the
user to interface with the computer. computer.
NCM 110 (2ND SEMESTER)
of instructions with step by step algorithm
that directs the computer hardware to
perform specific task.

One has to understand that computer


cannot directly understand human
language; you have to translate it to a
Sound Card higher language compatible with the
- This is used by the computer to record machine language.
and play audio by converting analog sound
into digital information and back again. There is already a direct and simple
execution of commands because of the
systems’ software. Software is the
information that the computer uses to get
the job done. Computer programs allow
users to complete tasks. A program can
also be referred to as an application and
Graphics Card
the two words are used interchangeably.
- This translate image data from the
computer into a format that can be
Examples of software programs or
displayed by the monitor
applications
 Operating system – Windows 9x/
Millenium/ XP
 Database – Patients Records
 Internet Browser
 Email
And many others

HARDWARE COMPUTER NETWORK


 The hardware are the parts of Is a group of interconnected computer
computer itself including the Central systems. A computer network is an
Processing Unit (CPU) and related interconnection of various computer
microchips and micro-circuitry, systems located at different places. In
keyboards, monitors, case and drives computer network, two or more computers
(floppy, hard, CD, DVD, etc…). are linked together with a medium and
 Other extra parts called peripheral data communication devices for the
components or devices include mouse, purpose of communicating data sharing
printers, scanners, etc…Together they resources. Networks may be classified
are often referred to as a personal according to a wide variety of
computers or PCs. characteristics, which are categorized
according to the basic components of a
COMPUTER SOFTWARE network.
Is a collective term in information
technology used to describe the function or
the contribution of the sets of commands,
procedures in computer system. It is a set
NCM 110 (2ND SEMESTER)
Common Types
Personal Area Network (PAN) FREE WARE (free software) – the source
Is a computer network used for code is not readily accessible, as such it
communication among computer devices does not guarantee compatibility to the
close to one person such as the computer system. You can use freeware but there is a
system in hospital departments (pharmacy, very little potential way to improve for it. A
laboratory, nursing, etc.) examples of such freeware is just an advertisement or
devices includes printers, fax machines, product endorsement.
telephones, and scanners.
SHAREWARE – is a different concept. You
Local Area Networks (LAN) can download and try shareware for free,
Are computer network covering a small but if you use it, you are supposed to pay
physical area such as hospitals and inter for it. It is developed and released by
department computer systems. someone who keeps full control of the
intellectual property. The user does not
Metropolitan Area Network (MAN) have access to the source code and cannot
A network that connects two or more local modify it.
area networks but does not extend
beyond the boundaries of the immediate Computer Data Processing
town/city. In nursing informatics system, the term is
defined as any computing process that
Wide Area Network (WAN) transforms patient and healthcare data
Is a computer network that covers a broad into information or knowledge necessary
area. WAN is a network that uses routers for the medication use process.
and public communications link (e.g.
internet). The computer data processing system
should simply be equipped facility that
OPEN WARE– open source technically remotely accessing data and translate it
means that the application software is free using the statistical information system to
to users as well as programmers. In become information such as charts, tables,
addition, most open source software has index, forecast, etc.
communities that support the user and
work on mutual partnership on the When a child is born dead, parents are
development and finalization of the advised to have a chromosomal analysis
software. Open source means that the and autopsy performed on the infant.
program source code is available to all • Attempt to obtain more
potential users, and they are free to use, information by asking the couple to
modify, and redistribute the source code describe the appearance or
( a computer program in its original activities of the affected individual
programming language). or asking for permission to obtain
health records.
● An extensive prenatal history of
any affected person should be
obtained to determine whether
environmental conditions could
NCM 110 (2ND SEMESTER)

Nursing Shortage
 Steep population growth and an aging
population which are increasing the
need for health care services.
Module 2: Information Technology System  Many nurses leaving the field.
Applicable in Nursing Practice  An aging nursing workforce and more.
ADMINISTRATIVE APPLICATIONS OF
INFORMATION TECHNOLOGY FOR How Nursing Benefits from Information
NURSING MANAGERS IN DIFFERENT Technology?
SETTINGS  Improve communication
 Improve continuity of care
Three major issues have an administrative  Improve order entry
impact of on the workplace, the profession,  Contributes to efficiency
and the future of nursing managers and  Minimizes errors
administrators
1. The nursing shortage What Nursing Administrator Need to
2. Increased demand for patient know about Selecting a System?
safety  User-friendly system interface
3. Need for visibility  Data repositories to facilitate data
sharing
In the world of prove-it healthcare, if it is  Specialized manage care software
not documented, it was not done. If  Standards
nursing cannot establish its contributions  Interoperability
to patient outcomes, nursing becomes
invisible and in fiscally tightened market, Ambulatory Care
invisibility can mean expendability. Nursing Ambulatory care or outpatient
must have a way to substantiate its role in care is medical care provided on
healthcare process and its vitality an outpatient basis, including diagnosis,
outcomes. observation, consultation, treatment,
intervention, and rehabilitation services.
Why is there a shortage of nurses?
Patient safety is an international issue. This care can include advanced medical
Standards focusing on the patient well technology and procedures even when
being cut across all models of care, provided outside of hospitals
categories of disease and health conditions
and all types of providers Many medical investigations and
Part of the challenge if measuring treatments for acute and chronic illnesses
outcomes rest in defining what outcome and preventive health care can be
really is. They could relate to individual performed on an ambulatory basis,
patient across several encounters or they including minor surgical and medical
might measure a system. procedures, most types of dental services,
dermatology services, and many types
of diagnostic procedures
NCM 110 (2ND SEMESTER)
(e.g. blood tests, X-
rays, endoscopy and biopsy procedures of
superficial organs). Other types of  health promotion
ambulatory care services  health maintenance
include emergency visits, rehabilitation  health education
visits, and in some cases telephone  health management
consultations.  coordination continuity of care using a
holistic approach.
Financial Benefit
The implementation of an automated
information system include a cost-effective
and timely bill submission process resulting
in decreased days in accounts receivable
and the reduction of rejected claims. In
financial arena, client benefits need to be
verified and accurate insurance
information obtained.
MANAGEMENT INFORMATION SYSTEM
(MIS)
Healthcare Information Management
It is a computer system consisting of
Systems Society (HIMSS)
hardware and software that serves as the
Formed an Ambulatory Care Committee.
backbone of an organization's operations.
was created in response to trends such as
An MIS gathers data from multiple
the aging population, the increasing
online systems, analyzes the information,
prevalence of chronic diseases, and the
and reports data to aid
development of minimally-invasive
in management decision-making.
procedures that can be performed without
hospitalization.
A small business, for example, may only
need a single machine to store information,
Joint Commission on Accreditation of
such as employee data, projects, and
Healthcare Organizations (JCAHO) -
invoices. ... Some common functions of MIS
publishes Mangement of Information
software include employee record keeping,
Standards for Ambulatory Care.
invoicing, inventory management, project
planning, customer
COMMUNITY HEALTH NURSING
relationship management, and business
 A synthesis of nursing practice and
analysis.
public health practice applied to
promoting and preserving the health
Community-Based Information Systems
of populations.
A community-based information system
 Requires a comprehensive
(CBIS) involves data collection,
understanding and knowledge of the
management, and analysis of health
framework of the community, its
services that exist within a community
resources and the sociocultural issues
outside of health facilities.
impacting people within a community.
NCM 110 (2ND SEMESTER)
These services can be delivered through International Development (USAID), as
community organizations, these systems operate at the community
nongovernmental organizations, faith- level, where health services are closest to
based organizations, and other groups the people who need them.
working either alongside formal health
services or in places where there are no 4 Domains of MIS
health facilities. Typically, community-  Public Health
based programs provide a wide range of Focused on population interventions and
services at the household level to targeted outcomes related to epidemiologic and/or
participants. Participant targets may reside mortality and morbidity trends.
in a defined geographic area or exhibit
similar behavioral or occupational  Home Health
characteristics (e.g., men who have sex Focused on skilled nursing care for
with men, sex workers, truck drivers). They individuals in the home and the outcomes
may share demographic traits (e.g., related to care delivery for individuals or
children under age five, pregnant or aggregated populations
nursing mothers), situational factors (e.g.,
orphans or incarcerated individuals), or any  Special Population Community
combination thereof. Community health Practice
workers often act as frontline care (mental health) Focused on specific
providers for a wide range of services, diagnostic care and/or treatment needs
including family planning, maternal and and outcomes related to the care provided
child care, childhood illness, malaria, to those groups
HIV/AIDS, and tuberculosis.
The data collected in a CBIS can be used to  Outpatient Care
inform programming and policy, identify focused on intermittent, episodic, and
populations in need, monitor the preventive care for individuals and/or put
continuum of care, and address equity, together groups inclusive of national health
access, and accountability. When prevention standards.
community members have access to
information in a CBIS, they have the TELEMEDICINE
potential to define and prioritize the  Being implemented to replace face-to-
community’s needs; set objectives and face home visits. Refers to electronic
targets for meeting those needs; and transfer of medical info and services
participate in planning, implementing, and (voice, data, and video) from one site
monitoring programs. A well-functioning to another using telecommunications
CBIS can support civil registration and vital technology.
statistics, by providing information on  It refers to the practice of caring for
births and deaths. patients remotely when the provider
and patient are not physically present
MEASURE Evaluation’s work on CBIS with each other.
aligned with larger health goals of its  Telehealth is different from
funder, the United States Agency for telemedicine in that it refers to a
broader scope of remote health care
services than telemedicine.
NCM 110 (2ND SEMESTER)
Telehealth is the distribution of health-
related services and information via
electronic information and the Department of Health and Human
telecommunication technologies. It allows Services
long-distance patient and clinician contact,
care, advice, reminders, education, A biological attack, or bioterrorism, is the
intervention, monitoring, and remote intentional release of viruses, bacteria, or
admissions other germs that can sicken or kill people,
livestock, or crops. Bacillus anthracis, the
bacteria that causes anthrax, is one of the
most likely agents to be used in a biological
attack.

Syndromic surveillance
Is an investigational approach where health
department staff, assisted by automated
data acquisition and generation of
statistical alerts, monitor disease indicators
Informatics is not only used in hospital but in real- time or near real-time to detect
also in disaster response. outbreaks of disease earlier than would
It can be used in tacking victims, Electronic otherwise be possible with traditional
health records, supply inventory and public.
surveillance of threat detection. also, it
helps in informing the volunteers about the
plans and reports. We don’t know when
these calamities and disaster strike but we
need to be ready. we don’t want to repeat
what happen in the past wherein many
people died and lost their loved one as well
as their properties that they work hard.
having the informatics in emergency
planning and responses is a big help in our
people because it can help in giving status
and reports that can warn them of an
upcoming typhoon or other disaster.

The Centers for Disease Control and


Prevention (CDC) is a federal agency that
conducts and supports health promotion,
prevention and preparedness activities in
the United States, with the goal of
improving overall public health. Established
in 1946 and based in Atlanta, the CDC is
managed by
NCM 110 (2ND SEMESTER)
Module 3: Informatics Application in
Evidence-Based Nursing Practice Population/ Patient Problem: Who is your
Evidence-based health care practices are patient? (Disease or Health status, age,
available for a number of conditions such race, sex)
as asthma, heart failure, and Intervention: What do you plan to do for
diabetes. ... Evidence-based practice (EBP) the patient? (Specific tests, therapies,
is the conscientious and judicious use of medications)
current best evidence in conjunction with Comparison: What is the alternative to
clinical expertise and patient values to your plan? (ie. No treatment, different type
guide health care decisions. This is the of treatment, etc.)
second article in a new series from the Outcome: What outcome do you seek?
Arizona State University College of Nursing (Less symptoms, no symptoms, full health,
and Health Innovation's Center for the etc.)
Advancement of Evidence-Based Practice. Time: What is the time frame? (This
Evidence-based practice (EBP) is a problem- element is not always included.)
solving approach to the delivery of health
care that integrates the best evidence from Step 2: Search for the best evidence.
studies and patient care data with clinician Step 3: Critically appraise the evidence.
expertise and patient preferences and Step 4: Integrate the evidence with clinical
values. When delivered in a context of expertise and patient preferences and
caring and in a supportive organizational values.
culture, the highest quality of care and best Step 5: Evaluate the outcomes of the
patient outcomes can be achieved. practice decisions or changes based on
evidence.
EVIDENCE-BASED NURSING PRACTICE (EBP) Step 6: Disseminate EBP results.
Evidence-based decision making involves
combining the knowledge arising from Evidence-Based Practice - Conscientious,
one’s clinical expertise, patient preferences, explicit and judicious use of current best
and the research evidence within the evidence with clinical expertise, and
context of available resources. patient values to make decisions about the
care of patients.
The Seven Steps of Evidence-Based (Sackett, 2000)
Practice
Step Zero: Cultivate a spirit of inquiry. Evidence-based nursing practice is the
Step 1: Ask clinical questions in PICOT process of shared decision-making
format. between practitioner, patient and
To formulate questions in Evidence Based significant others, based on research
Practice, use the PICOT format. evidence, the patient's experiences and
PICOT stands for: preferences, clinical expertise, and other
robust sources of information.
NCM 110 (2ND SEMESTER)
COMPUTER-GENERATED NURSING CARE These are assessment, diagnosis, planning,
PLAN implementation, and evaluation.
It is important to know when additional Assessment is the first step and involves
data becomes hindrance in decision making critical thinking skills and data collection;
that subjective and objective.
will confuse rather that clarify certain A nursing care plan (NCP) is a formal
issues and scenarios. process that includes correctly identifying
existing needs, as well as recognizing
Types of Nursing Care Plans potential needs or risks. Care plans also
Care plans can be informal or provide a means of communication among
formal: Informal nursing care plan is a nurses, their patients, and other healthcare
strategy of action that exists in the nurse‘s providers to achieve health care outcomes.
mind. A formal nursing care plan is a Without the nursing care planning
written or computerized guide that process, quality and consistency in patient
organizes information about the client’s care would be lost.
care. Formal care plans are further
subdivided into standardized care plan, and ASSESSMENT
individualized care plan: Standardized care Involves collecting vital data and
plans specify the nursing care for groups of fundamental information necessary for the
clients with everyday needs. Individualized next process.
care plans are tailored to meet the unique
needs of a specific client or needs that are Factual information and relevant data are
not addressed by the standardized care collected manually, as such recording error
plan. and gathering of erroneous data can be
executed. However, computer-enhanced
Nursing Process automated nursing assessment can
Is a patient-centered and goal oriented mitigate these potential problems by
processes by which nurses deliver effective integrating it to the statistical information
care to patients which involve assessment, system.
nursing diagnosis, planning,
implementation, and evaluation. The following are the goals and objectives
of writing a nursing care plan:
It is a cyclical, repetitive and on going  Promote evidence-based nursing care
process of nursing care and healthcare and to render pleasant and familiar
delivery. The nursing process and practice conditions in hospitals or health
can be further enhanced with the centers.
implementation of electronic  Support holistic care which involves
documentation effectively. the whole person including physical,
The nursing process functions as a psychological, social and spiritual in
systematic guide to client-centered care relation to management and
with 5 sequential steps. prevention of the disease.
 Establish programs such as care
pathways and care bundles. Care
pathways involve a team effort in
NCM 110 (2ND SEMESTER)
order to come to a consensus with regards Is the action phase of the nursing process.
to standards of care and expected Documentation is essential on this part
outcomes while care bundles are related to since it will provide the details and record
best practice with regards to care given for of the actual execution as well as the
a specific disease. nursing behavior towards achieving
 Identify and distinguish goals and expected outcome.
expected outcome.
 Review communication and The nurse can also search for other
documentation of the care plan. possible options and solution that is readily
 Measure nursing care. fit to the condition
Implementation is the step which involves
Nursing Diagnosis action or doing and the actual carrying out
Involves proper comprehension of the of nursing interventions outlined in the
patient’s condition and responses. plan of care
Diagnostic process is complex and utilizes
aspects of intelligence, critical thinking, and Evaluation
deeper thoughts of understanding. During evaluation, use the computer to
record and store observations, patient’s
responses to nursing interventions
(independent & collaborative), and your
own evaluation statements.

The final step of the nursing process, is


crucial to determine whether, after
application of the nursing process, the
client’s condition or well-being improves.
Planning The nurse applies all that is known about a
Setting priorities, predicting expected client and the client’s condition, as well as
outcome and establishing time tables are experience with previous clients, to
the main ingredients and components of evaluate whether nursing care was
nursing care planning. effective. The nurse conducts evaluation
measures to determine if expected
Once there is already established nursing outcomes are met, not the nursing
care planning, then the implementation interventions.
process is ready to execute.
Nursing planning can be further enhanced NURSING DOCUMENTATION
through computer simulation; the Computerized documentation has many
computer program can predict results and advantages. It is typed and therefore
test if the expected results match with the legible. The computer can be programmed
available data to identify the data and time of all entries
as well as the initials or the name of the
person making the entry.
NCM 110 (2ND SEMESTER)
Computerized documentation has many REPUBLIC ACT NO. 8293
advantages. It is typed and therefore June 6, 1997
legible. The computer can be programmed An act prescribing the intellectual property
to identify the data and time of all entries code and establishing the intellectual
as well as the initials or the name of the property office, providing for powers and
person making the entry. functions, and other purposes.

Module 4: Policies, Guidelines, and Laws in


Nursing Informatics SECTION 1. Title. ‑ This Act shall be known
INTELLECTUAL PROPERTY (IP) as the “Intellectual Property Code of the
Refers to creations of the mind, such as Philippines.”
inventions; literary and artistic works; SECTION 2. Declaration of State Policy. ‑
designs; and symbols, names and images The State recognizes that an effective
used in commerce. intellectual and industrial property system
is vital to the development of domestic and
The law of intellectual property typically creative activity, facilitates transfer of
encompasses the areas of COPYRIGHT, technology, attracts foreign investments,
PATENTS, and trademark law. It is intended and ensures market access for our products.
largely to encourage the development of It shall protect and secure the exclusive
art, science, and information by granting rights of scientists, inventors, artists and
certain property rights to all artists, which other gifted citizens to their intellectual
include inventors in the arts and the property and creations, particularly when
sciences. beneficial to the people, for such periods as
provided in this Act.
IP is protected in law by, for example, All these creations (IP) are protected by the
patents, copyright and trademarks, which law, ensuring that the people behind it are
enable people to earn recognition or given due recognition or remuneration for
financial benefit from what they invent or their effort.
create. By striking the right balance
between the interests of innovators and Categories:
the wider public interest, the IP system
aims to foster an environment in which
creativity and innovation can flourish. It
refers to anything created by someone,
including but not limited to inventions,
literary works, items created by artists (e.g.
artwork and musical pieces), symbols,
designs, images, pictures, and even names  Patent
that are used for commercial purposes.  Trademark
 Copyright

Overview of Intellectual Property Laws


A wide body of federal and state laws
protects creative property such as writing,
music, drawings, paintings, photography,
NCM 110 (2ND SEMESTER)
and films. Collectively, this body of law is Trade Secrets. State and federal trade
called “intellectual property” law, which secret laws protect sensitive business
includes copyright, trademark, and patent information. An example of a trade
laws, each applicable in various situations
and each secret would be a confidential marketing
plan for the introduction of a new software
with its own set of technical rules. When product or the secret recipe for a brand of
obtaining permission to use creative works, salsa. The extent of trade secret protection
you’re concerned primarily with copyright depends on whether the information gives
law. However, trademarks, trade secrets, the business an advantage over
and publicity and privacy rights sometimes competitors, is kept a secret, and is not
come into play when permission to use known by competitors.
certain types of works is sought. Below is a Right of Privacy. Although not part of
summary of the various types of intellectual property laws, state privacy
intellectual property laws that are relevant laws preserve the right of all people to be
to the permissions process. left alone. Invasion of privacy occurs when
Copyright. Federal copyright law someone publishes or publicly exploits
protects original creative works such as information about another person’s private
paintings, writing, architecture, movies, affairs. Invasion of privacy laws prevent you
software, photos, dance, and music. A work from intruding on, exposing private facts
must meet certain minimum requirements about, or falsely portraying someone. The
to qualify for copyright protection. The extent of this protection may vary if the
length of protection also varies depending subject is a public figure—for example, a
on when the work was created or first celebrity or politician.
published.
Trademark. Brand names such as Nike and PATENT
Apple, as well as logos, slogans, and other A patent is a form of intellectual property
devices that identify and distinguish that gives its owner the legal right to
products and services, are protected under exclude others from making, using, or
federal and state trademark laws. Unlike selling an invention for a limited period of
copyrighted works, trademarks receive years in exchange for publishing an
different degrees of protection depending enabling public disclosure of the invention.
on numerous variables, including the
consumer awareness of the trademark, the What is a Service Mark?
type of service and product it identifies, A service mark is the same type of device
and the geographic area in which the as a trademark, but service marks
trademark is used. distinguish the services of one company
Right of Publicity. A patchwork of state from those of another provider. Service
laws known as the right of marks are often slogans. For example, the
publicity protects the image and name of a service mark of a plumber might be "The
person. These laws protect against the Leak Fixers" with or without a distinctive
unauthorized use of a person’s name or logo.
image for commercial purposes—for
example, the use of your picture on a box
of cereal. The extent of this protection
varies from state to state.
NCM 110 (2ND SEMESTER)
The basic requirements for a creation to
be patentable:

The creation would have a novel idea,


inventive, and can be applied in an
industrial setting.

The word patent originates from the Latin


patere, which means "to lay open" (i.e., to
make available for public inspection). It is a
shortened version of the term letters
patent, which was an open document or
instrument issued by a monarch or
government granting exclusive rights to a
person, predating the modern patent
system. Similar grants included land
patents, which were land grants by early
state governments in the US, and printing
patents, a precursor of modern copyright.
In modern usage, the term patent usually
refers to the right granted to anyone who
invents something new, useful and non-
obvious. Some other types of intellectual
property rights are also called patents in
some jurisdictions: industrial design rights TRADEMARK
are called design patents in the US, plant a tool used to differentiate services and
breeders' rights are sometimes called plant goods from one another.
patents, and utility models and
Gebrauchsmuster are sometimes called FORMS:
petty patents or innovation patents. a word
The additional qualification utility patent is a group of words
sometimes used (primarily in the US) to sign, logo, or symbol.
distinguish the primary meaning from It could even be a combination of those
these other types of patents. Particular above.
species of patents for inventions include a symbol, word, or words legally registered
biological patents, business method or established by use as representing a
patents, chemical patents and software company or product.
patents. A trademark is a recognizable insignia,
phrase, word, or symbol that denotes a
specific product and legally differentiates it
from all other products of its kind. A
trademark exclusively identifies a product
as belonging to a specific company and
recognizes the company's ownership of the
brand.
NCM 110 (2ND SEMESTER)
COPYWRITE person involved in personal information
It refers to the protection given to the processing including those
owner of an original work covering:
literary works personal information controllers and
musical pieces processors who, although not found or
Paintings established in the Philippines, use
and computer programs, among others. equipment that are located in the
Philippines, or those who maintain an
The owner of the original work is entitled office, branch or agency in the Philippines
to economic rights and moral rights. subject to the immediately succeeding
paragraph: Provided, That the
Copyright refers to the legal right of the requirements of Section 5 are complied
owner of intellectual property. In simpler with.
terms, copyright is the right to copy. This
means that the original creators of NULLUM CRIMEN
products and anyone they give NULLA POENA SINE LEGE
authorization to are the only ones with the Nullum crimen sine lege is the principle in
exclusive right to reproduce the work. criminal law and international criminal law
ECONOMIC RIGHTS that a person cannot or should not face
enable the creator to receive profit gains criminal punishment except for an act that
should his works be distributed by third was criminalized by law before he/she
parties. performed the act. This idea is also
MORAL RIGHTS manifested in laws that require criminal
protect the connection between the acts to be publicized in unambiguous
creator and his work. statutory text.
Nullum crimen sine lege is sometimes
Literary works includes books, anthologies, called the legality principle. It is also
journal and newspaper articles, reports, interchangable with
conference papers, working papers, "nullum poena sine lege," which translates
computer software and programs, letters, to "no punishment without law".
emails, novels, poetry, song lyrics, "no punishment without law".
databases, tables and compilations.

REPUBLIC ACT. NO. 10173


August 15, 2012
An act protecting individual personal
information and communication systems in
the government and the private sector,
creating for this purpose a national privacy
comission, and for other purposes.

SECTION 1. Short Title. – This Act shall be


known as the “Data Privacy Act of 2012”.
SEC. 4. Scope. – This Act applies to the
processing of all types of personal
information and to any natural and juridical
NCM 110 (2ND SEMESTER)
a doctor. In others, physical therapists,
Module 4: Nursing Information System occupational therapists, and social workers
Team may be part of the team. Office managers
The healthcare team, regardless of also play an important role in the
whether you're treated at a large academic healthcare team.
institution or a small, rural private practice, In the United States, mid-level practitioners
is the group of professionals who are health care workers with training less
contribute to your care and treatment as a than that of a physician but greater than
patient. Typical members of a healthcare that of more ordinary nurses and other
team are a doctor and a registered nurse. medical assistants.

Computer technology is a reality of our NURSE PRACTIONER


modern world. It gives us a tool which can  Advanced practice registered nurse
be used to help us cope with the and a type of mid-level practitioner.
complexity and efficiency which is often NPs are trained to assess patient
required in many areas of work. needs, order and interpret diagnostic
and laboratory tests, diagnose disease,
Nursing information includes data formulate and prescribe treatment
collected by nurses; data used by nurses; plans
data about nursing activity; and data about  May be qualified to give you your
the nursing resource. medical diagnosis, as well as your
prescription to treatments. Depending
Over the last few years we have seen major on where you live your NP can operate
changes in the way health care is delivered. with as much independence as a
There has been and will be in the future a doctor, but in some places may work
need for nursing informatics to evolve to under a doctor’s supervision.
meet the changing requirements of our
health care system so as to serve our Your Registered Nurse is responsible for
patients needs. collecting much of the information the
doctor uses to make a diagnosis. Your
NURSING INFORMATION SYSTEM (NIS) nurse also consults with the doctor, and
A part of a health care information system uses his or her professional opinion to work
that deals with nursing aspects, particularly with the doctor to make decisions about
the maintenance of the nursing record. your care. It is the nurse who is responsible
for implementing much of your treatment
ADVANCED PRACTICE NURSE (APRN) plan. Your nurse will also make an effort to
is a registered nurse with advanced educate you about what your diagnosis
education at the master's, specialist, or means, what your treatment will entail,
doctoral level in a specific specialty area of and how you can work together to make
nursing. APRNs use their highly developed sure your care is effective for you.
knowledge and skills to provide healthcare
services independently with little or no
supervision from doctors. In some cases,
there might be a Nurse
Practitioner/A.P.N.(Nurse Midwives and
Nurse Anesthetists) instead of or as well as
NCM 110 (2ND SEMESTER)
OCCUPATIONAL THERAPIST Other than that, the major difference in job
 Treat injured, ill, or disabled patients functions between a doctor and a physician
through the therapeutic use of assistant is that a doctor works
everyday activities. They help these autonomously whereas a PA always works
patients develop, recover, improve, as in conjunction with a doctor
well as maintain the skills needed for
daily living and working. IT TEAMS
 They help patient to walk. IT teams are typically small groups of
practitioners who are able to develop,
The main difference between occupational deploy and maintain large-scale systems to
therapy and physical therapy is that OT keep modern businesses running.
focuses on improving a client's ability to
perform activities of daily living (ADL) and Working as an IT team allows brilliant
PT focuses on improving a client's ability to individuals to create remarkable systems,
perform movement of the human body processes, solutions and results.

 SOCIAL WORK Types of I.T Teams


 Is a profession concerned with helping While each IT team is unique, there are a
individuals, families, groups and few common reasons why IT teams are
communities to enhance their formed. Some IT teams are permanent,
individual and collective well-being. It while others exist for a temporary period of
aims to help people develop their skills time to achieve a specific outcome, and are
and their ability to use their own then disbanded.
resources and those of the community
to resolve problems. Development teams
 (caseworker; welfare worker; public Dev teams focus on developing a feature,
servant) Registered Social Workers product component, or an entire project.
Board Exam Be a graduate of a “BS in The team may be assembled to solve
Social Work” course in an accredited specific technology problems and deliver a
educational institution in the working solution, or they may follow an
Philippines; and pass the Social iterative, ongoing development process,
Workers Licensure Examination, which such as in DevOps and Agile environments.
is administered by the Board of Social Development teams are usually not
Workers under the supervision of the permanent. Groups of new cross-
Professional Regulation Commission functional experts may be assembled to
(PRC). deliver subsequent release iterations or
across different product features. While
PHYSICIAN ASSISTANT most organizations limit the size of
A physician assistant is a medical individual teams, developers following
professional who operates under a doctor's DevOps and Agile SDLC frameworks tend to
supervision. collaborate readily with cross-functional
departments and teams.
NCM 110 (2ND SEMESTER)
proactive resolution of IT incidents.
Operations teams Technologies such as chatbots and AIOps
IT Operations remains relevant despite the
prevalence of cloud computing, are reducing human involvement in both
infrastructure automation, and AIOps customer-facing support and backend
solutions. The complexity and importance
of ITOps has increased in large-scale infrastructure monitoring activities. These
organizations and early Ops involvement is interactions, however, must be
key to successful DevOps adoption. standardized and customer-focused and
Operations teams are responsible for evolve to meet the changing technical and
making the IT infrastructure work and business requirements of the organization.
provisioning services necessary for rapid Therefore, support teams may come from
development sprints and feature release cross-functional departments and work
cycles. The teams are also responsible to closely with development and operations
ensure that organizational policies and teams to meet these requirements.
ITSM principles are implemented across Security teams
the development teams. Several roles in Cybersecurity is a critical concern for all
operations teams are permanent, organizations. ITSM security activities are
especially those focused on infrastructure often performed by a group of dedicated IT
management, maintenance, and security professionals. Identity and access
monitoring activities. management and change approval
Quality assurance (QA) teams processes are common domains of IT
These teams are assembled to ensure the security teams in DevOps environments,
quality of software delivered to end-users. where infrastructure and service
QA teams are responsible for testing provisioning is automated to facilitate rapid
feature releases for quality issues and development sprints and release iterations.
known and unknown bugs. The ‘quality’ Security teams work with many partners,
piece of QA may refer to attributes like including:
performance, security, cost, compliance, Business executives to establish security
privacy, and risk. protocols and policies
The latest ITSM frameworks such as Development teams to reduce potential
DevOps have blurred the lines between bugs and security loopholes
development and QA roles. While both
functional teams are assembled Operations teams to ensure that ITSM
independently with unique set of skills and activities adhere to the organizational
expertise, they must collaborate early security policies
during the SDLC lifecycle to reduce waste The broader organization to deliver
processes and risk of releasing suboptimal cybersecurity training and education
products to end-users. Process teams
Support teams These permanent teams focus on managing
These teams are dedicated to resolving and improving IT systems to solve specific
technical issues facing IT users, including business problems. They may involve cross-
the internal workforce and external functional experts working with Devs and
customers. Support teams work with ITOps Ops teams to reduce waste processes at
personnel to ensure reduction and the development stage or streamlining
ITSM. Process teams may also collaborate
NCM 110 (2ND SEMESTER)
performance through concentrated
with external service providers and development efforts.
customers as part of a process The definition of teams and their types
improvement project, since process teams have evolved as large enterprises readily
adopt the silicon startup culture of flat
typically own their projects end-to-end. organizational hierarchy, quick decision-
DevOps organizations enhance the role of making, and rapid team restructuring.
process improvement teams, starting with Organizational structures have not entirely
defining a process improvement project, disappeared but the job disciplines, roles,
managing implementation, and monitoring and functions of members across different
the change process. types of teams are less restrictive in nature.
Virtual teams Most progressive organizations inclined to
These teams are temporarily assembled flat hierarchal structures establish teams
and work closely with the organization rich in cross-functional expertise. The result
remotely or from an off-site location, are reduced silos between different job
typically on a contractual basis. Virtual disciplines and associated departments.
team members assist development, QA, Team members can come from diverse IT
Ops and security teams on tasks that can background and integrate multiple
be performed without on-site presence. disciplines of the production chain. Devs,
These teams complement the skills Ops, and QA share overlapping functional
portfolio of the organization as needed, responsibilities that may evolve over the
allowing for scalability. For large course of the SDLC.
enterprises, virtual teams across disparate Employees from other functional areas
geographic locations may work collectively such as strategy, HR, marketing, sales,
on similar projects. Assignments are purchasing, and research may also be
typically limited to development or testing. involved in IT-related decisions,
For an external vendor engaged as a virtual interactions, and activities. It’s not that
team member, the task may not involve
exchange of sensitive business information roles and obligations are no longer
or mission-critical business tasks. specified—instead, adherence to team
formation and organizational structure has
Organizational structures in “startup a new meaning as the startup culture
culture” prevails across organizations of all sizes.
In organizations following traditional
workforce structures, IT teams were OPERATIONS TEAMS
focused on technology-alignment. Experts These teams are focused on operating
on specific technology domains worked technology infrastructure (such as
independently on their focus areas. The networks, data centers and Web services),
result was a siloed working environment monitoring them and ensuring services and
with IT teams following conflicting goals systems are available and performing
that compromised business outcomes. For normally to support business operations.
instance, the goal for development teams
was to push shiny new features to the These teams are often called IT service
market before their competitors. The goal management (ITSM) teams and their main
for QA was to ensure each feature release objective is to keep the IT ecosystem up
was near-perfect in quality, security, and and running.
NCM 110 (2ND SEMESTER)

PROJECT TEAMS copy of that message to all of the
These teams are assembled to solve a subscribers.
specific problem, implement a system or
make a change.

Projects are, by definition, temporary


endeavors, so once the project is
completed, it is common for the team to
either disband (with team members
assigned elsewhere) or the entire team to The term Listserv has been used to refer to
be transitioned to a different project electronic mailing list software applications
in general, but is more properly applied to
PROCESS TEAMS a few early instances of such software,
These teams (also sometimes known as IT which allows a sender to send one email to
business-support teams) are permanent the list, and then transparently sends it on
and tasked with owning, managing and to the addresses of the subscribers to the
improving the IT systems of a specific list.
business process

These teams are often staffed with analysts,


project managers and data experts and
partner with project teams to deliver
specific outcomes.
Process Team is an organized group of
people responsible for implementation

of methods and techniques required for


carrying out one or more processes. Compared to traditional email, sending
Members of the team are supposed to emails through a LISTSERV allows you to
work collaboratively towards accomplishing send an email to multiple people without
process-based endeavors and initiatives. having to type each individual email
address for every email you send. Also, it
LISTSERV makes replying to emails easier because
 An application that distributes replying to a LISTSERV sends a copy of the
messages to subscribers on an reply to everyone on the list as well.
electronic mailing list.
 An electronic mailing list. Who Joins a Listserv?
 A Listserv is a method of People join because they share a common
communicating with a group of people interest. That shared interest might be a
via email. You send one email message hobby, recreational pursuit (an activity that
to the “reflector” email address, and one engages in as a vocation, profession, or
the software sends the email to all of avocation: occupation), educational, work-
the group's subscribers. related, or health related. Or it might just
 A reflector, which is a single email be members of a family keeping in touch.
address that, when designated as the
recipient of a message, will send a
NCM 110 (2ND SEMESTER)
1979, making it one of the oldest network
communications systems still in use today.
newsgroups and discussion forums allow
users to view and post messages based on
common interests. These messages are
archived over time for others to view and
respond to. A newsgroup is a repository of
electronic messages posted by users and
managed by the Usenet system.

Usenet (/ˈjuːznɛt/) is a worldwide


distributed discussion system available on
computers. It was developed from the
general-purpose Unix-to-Unix Copy (UUCP)
dial-up network architecture. Tom Truscott
There is a challenging time ahead. Patients, and Jim Ellis conceived
nurses, midwives and health visitors can all
benefit from the lessons learned during the the idea in 1979, and it was established in
early development of 1980.

nursing information systems and from the DOS (/dɒs/, /dɔːs/) is a platform-
strategic approach now being taken. The independent acronym for Disk Operating
realization of these benefits will be System which later became a common
dependent on continued collaboration shorthand for disk-based operating systems
between health care professionals, the on IBM PC compatibles. DOS primarily
Department of Health, the IT suppliers, and consists of Microsoft's MS-DOS and a re-
even the P.N.A. branded IBM version under the name PC
DOS, both of which were introduced in
1. Newsgroup 1981.
2. Usenet
3. Bulletin Board System (BBS) These services can be delivered through
community organizations,
Newsgroup: a forum on the Usenet service nongovernmental organizations, faith-
for the discussion of a particular topic. based organizations, and other groups
working either alongside formal health
A Usenet newsgroup is a repository usually services or in places where there are no
within the Usenet system, for messages health facilities.
posted from many users in different Typically, community-based programs
locations using Internet. They are provide a wide range of services at the
discussion groups and are not devoted to household level to targeted participants.
publishing news. Participant targets may reside in a defined
Usenet is a worldwide system for Internet geographic area or exhibit similar
discussion that consists of a set of behavioral or occupational characteristics
newsgroups that are organized by subject. (e.g., men who have sex with men, sex
Users post articles or messages to these workers, truck drivers). They may share
newsgroups. ... Usenet was conceived in demographic traits (e.g., children under
NCM 110 (2ND SEMESTER)
age five, pregnant or nursing mothers),
situational factors (e.g., orphans or
incarcerated individuals), or any
combination thereof. Community health
workers often act as frontline care
providers for a wide range of services,
including family planning, maternal and
child care, childhood illness, malaria,
HIV/AIDS, and tuberculosis.

The data collected in a CBIS can be used to


inform programming and policy, identify
populations in need, monitor the
continuum of care, and address equity,
access, and accountability. When
community members have access to
information in a CBIS, they have the
potential to define and prioritize the
community’s needs; set objectives and
targets for meeting those needs; and
participate in planning, implementing, and
monitoring programs. A well-functioning
CBIS can support civil registration and vital
statistics, by providing information on
births and deaths.
MEASURE Evaluation’s work on CBIS
aligned with larger health goals of its
funder, the United States Agency for
International Development (USAID), as
these systems operate at the community
level, where health services are closest to
the people who need them.

You might also like