PREFACE |
|
xv | |
ACKNOWLEDGMENTS |
|
xix | |
MEDIA CONTRIBUTORS |
|
xxi | |
REVIEWERS |
|
xxiii | |
ABOUT THE AUTHORS |
|
xxv | |
SECTION ONE General Computer Information |
|
1 | (116) |
|
CHAPTER 1 Informatics in the Health Care Professions |
|
|
3 | (33) |
|
Data, Information, and Knowledge |
|
|
4 | (3) |
|
The Nurse as Knowledge Worker |
|
|
7 | (1) |
|
The Significance of Good Information Management |
|
|
8 | (1) |
|
The Definition and Evolution of Informatics |
|
|
8 | (4) |
|
Informatics Competencies for Nurses |
|
|
12 | (3) |
|
Applications of Nursing Informatics |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
The Current Status of Health Care Delivery |
|
|
16 | (5) |
|
|
17 | (1) |
|
|
18 | (1) |
|
Pressure to Implement Information Technology |
|
|
18 | (1) |
|
Consumer Demands for Quality and Cost-Effective Care |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
Benefits of Nursing Informatics for Other Health Care Professionals |
|
|
21 | (2) |
|
Nursing Informatics as a Specialty Area of Practice |
|
|
23 | (4) |
|
The Role of the Informatics Nurse |
|
|
27 | (1) |
|
The Future of Nursing Informatics |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
30 | (6) |
|
CHAPTER 2 Hardware, Software, and the Roles of Support Personnel |
|
|
36 | (28) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
38 | (4) |
|
Peripheral Hardware Items |
|
|
42 | (3) |
|
|
45 | (1) |
|
|
46 | (2) |
|
|
48 | (3) |
|
|
49 | (1) |
|
|
49 | (2) |
|
Mobile and Wireless Computing |
|
|
51 | (2) |
|
|
53 | (3) |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
Roles of Support Personnel |
|
|
56 | (4) |
|
|
56 | (1) |
|
Call Desk and Help Desk Personnel |
|
|
56 | (1) |
|
Microcomputer or PC Specialist |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
57 | (1) |
|
|
57 | (1) |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
58 | (1) |
|
Chief Information Officer |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
59 | (1) |
|
|
59 | (1) |
|
Disaster Planning and Recovery Officer |
|
|
59 | (1) |
|
|
60 | (1) |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
61 | (3) |
|
CHAPTER 3 Ensuring the Quality of Information |
|
|
64 | (16) |
|
|
65 | (2) |
|
Ensuring Correct Data Collection and Entry |
|
|
65 | (2) |
|
|
67 | (6) |
|
|
68 | (3) |
|
Outsourcing Data Management and Storage |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
72 | (1) |
|
Characteristics of Quality Information |
|
|
73 | (2) |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
|
78 | (2) |
|
CHAPTER 4 Electronic Communication and the Internet |
|
|
80 | (37) |
|
|
82 | (23) |
|
|
83 | (4) |
|
|
87 | (1) |
|
|
87 | (6) |
|
|
93 | (1) |
|
|
93 | (2) |
|
|
95 | (1) |
|
|
95 | (1) |
|
|
96 | (1) |
|
Access to Health Care Information and Services |
|
|
96 | (1) |
|
Professional Information Sharing |
|
|
97 | (3) |
|
Online Publications and Journals |
|
|
100 | (1) |
|
|
101 | (1) |
|
|
102 | (3) |
|
Concerns Related to the Use of the Internet |
|
|
105 | (3) |
|
|
105 | (1) |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
108 | (2) |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
111 | (6) |
SECTION TWO Health Care Information Systems |
|
117 | (206) |
|
CHAPTER 5 Health Care Information Systems |
|
|
119 | (23) |
|
Clinical Information Systems |
|
|
120 | (16) |
|
Nursing Information Systems |
|
|
120 | (6) |
|
Clinician Information Systems |
|
|
126 | (1) |
|
|
126 | (1) |
|
|
126 | (2) |
|
|
128 | (2) |
|
|
130 | (1) |
|
|
131 | (4) |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
137 | (1) |
|
Decision Support and Expert Systems |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
139 | (3) |
|
CHAPTER 6 Strategic Planning |
|
|
142 | (16) |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
145 | (1) |
|
Strategic Planning for Information Systems |
|
|
146 | (2) |
|
Steps of the Strategic Planning Process |
|
|
148 | (7) |
|
Identification of Goals and Scope |
|
|
149 | (1) |
|
Scanning the External and Internal Environments |
|
|
149 | (1) |
|
|
150 | (1) |
|
Identification of Potential Solutions |
|
|
150 | (1) |
|
Selecting a Course of Action |
|
|
151 | (3) |
|
|
154 | (1) |
|
Ongoing Evaluation and Feedback |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
157 | (1) |
|
CHAPTER 7 Selecting a Health Care Information System |
|
|
158 | (18) |
|
|
159 | (9) |
|
|
161 | (1) |
|
|
162 | (1) |
|
Developing a Common Vision |
|
|
162 | (1) |
|
Understanding the Current System |
|
|
163 | (1) |
|
Determining System Requirements |
|
|
163 | (5) |
|
|
168 | (6) |
|
Additional Sources of Information |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
170 | (4) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
175 | (1) |
|
CHAPTER 8 System Implementation and Maintenance |
|
|
176 | (15) |
|
|
177 | (9) |
|
Develop an Implementation Committee |
|
|
177 | (1) |
|
|
177 | (4) |
|
Analyze Hardware Requirements |
|
|
181 | (1) |
|
Develop Procedures and Documentation |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
183 | (1) |
|
Common Implementation Pitfalls |
|
|
184 | (2) |
|
|
186 | (2) |
|
User Feedback and Support |
|
|
186 | (1) |
|
|
186 | (2) |
|
|
188 | (1) |
|
The Information System's Life Cycle |
|
|
188 | (1) |
|
|
188 | (1) |
|
|
189 | (1) |
|
|
190 | (1) |
|
CHAPTER 9 Information Systems Training |
|
|
191 | (18) |
|
Identification of Training Needs |
|
|
193 | (11) |
|
|
193 | (1) |
|
|
194 | (2) |
|
|
196 | (1) |
|
Hardware and Software Requirements |
|
|
197 | (1) |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
198 | (2) |
|
|
200 | (4) |
|
Additional Training Considerations |
|
|
204 | (1) |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
207 | (2) |
|
CHAPTER 10 Information Security and Confidentiality |
|
|
209 | (28) |
|
Privacy, Confidentiality, and Security |
|
|
210 | (1) |
|
Information System Security |
|
|
211 | (5) |
|
|
212 | (4) |
|
|
216 | (4) |
|
|
216 | (1) |
|
Passwords and Other Means of Authentication |
|
|
217 | (2) |
|
|
219 | (1) |
|
|
219 | (1) |
|
|
220 | (1) |
|
Spyware Detection Software |
|
|
220 | (1) |
|
Administrative and Personnel Issues |
|
|
220 | (7) |
|
|
272 | |
|
|
222 | (1) |
|
|
223 | (1) |
|
System Security Management |
|
|
224 | (2) |
|
|
226 | (1) |
|
Handling and Disposal of Confidential Information |
|
|
227 | (4) |
|
|
227 | (1) |
|
|
228 | (1) |
|
|
228 | (2) |
|
|
230 | (1) |
|
Web-Based Applications for Health Care |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
233 | (4) |
|
CHAPTER 11 System Integration |
|
|
237 | (14) |
|
|
238 | (3) |
|
|
241 | (1) |
|
The Need for Integration Standards |
|
|
241 | (4) |
|
|
242 | (1) |
|
|
242 | (1) |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
245 | (1) |
|
Integration Implications for Nursing |
|
|
246 | (1) |
|
Emerging Integration Solutions |
|
|
247 | (1) |
|
|
247 | (1) |
|
|
248 | (1) |
|
|
249 | (2) |
|
CHAPTER 12 The Electronic Health Record |
|
|
251 | (17) |
|
|
252 | (2) |
|
|
254 | (2) |
|
|
256 | (2) |
|
|
257 | (1) |
|
|
257 | (1) |
|
|
258 | (1) |
|
Health Care Enterprise Benefits |
|
|
258 | (1) |
|
Current Status of the EHR |
|
|
258 | (4) |
|
Considerations When Implementing the EHR |
|
|
258 | (2) |
|
|
260 | (1) |
|
Ownership of the Patient Record |
|
|
261 | (1) |
|
Privacy and Confidentiality |
|
|
261 | (1) |
|
|
262 | (1) |
|
|
262 | (1) |
|
|
263 | (1) |
|
Considerations for the Future |
|
|
264 | (1) |
|
|
265 | (1) |
|
|
266 | (1) |
|
|
266 | (2) |
|
CHAPTER 13 Regulatory and Accreditation Issues |
|
|
268 | (24) |
|
Privacy and Confidentiality Legislation |
|
|
269 | (9) |
|
The Health Insurance Portability and Accountability Act |
|
|
272 | (5) |
|
Other Privacy Legislation |
|
|
277 | (1) |
|
Accreditation and Reimbursement Issues |
|
|
278 | (3) |
|
Joint Commission for Accreditation of Healthcare Organizations |
|
|
278 | (1) |
|
Commission on Accreditation of Rehabilitation Facilities |
|
|
279 | (1) |
|
|
280 | (1) |
|
HIPAA Electronic Data Interchange (EDI) and Transactions Rule |
|
|
281 | (1) |
|
|
281 | (1) |
|
|
282 | (3) |
|
Geriatric and Long-Term Facilities |
|
|
282 | (2) |
|
|
284 | (1) |
|
|
285 | (1) |
|
|
286 | (1) |
|
|
287 | (5) |
|
CHAPTER 14 Contingency Planning and Disaster Recovery |
|
|
292 | (31) |
|
What Is Contingency Planning? |
|
|
293 | (1) |
|
Steps of the Contingency Planning Process |
|
|
294 | (5) |
|
Advantages of Contingency Planning |
|
|
299 | (1) |
|
Disasters versus System Failure |
|
|
300 | (2) |
|
|
300 | (1) |
|
|
300 | (1) |
|
Sabotage, Cybercrime, Terrorism, and Bioterrorism |
|
|
301 | (1) |
|
System or Equipment Failure |
|
|
302 | (1) |
|
Continuity and Recovery Options |
|
|
302 | (4) |
|
|
303 | (3) |
|
Manual versus Automated Alternatives |
|
|
306 | (7) |
|
Salvaging Damaged Records |
|
|
309 | (3) |
|
|
312 | (1) |
|
|
313 | (1) |
|
Using Post-Disaster Feedback to Improve Planning |
|
|
314 | (2) |
|
Legal and Accreditation Requirements |
|
|
316 | (1) |
|
|
317 | (1) |
|
|
318 | (1) |
|
|
319 | (4) |
SECTION THREE Specialty Applications |
|
323 | (82) |
|
CHAPTER 15 Using the Computer to Support Health Care Education |
|
|
325 | (30) |
|
Instructional Applications of Computer Technology |
|
|
326 | (15) |
|
Computer-Assisted Instruction |
|
|
327 | (2) |
|
Competency-Based Training |
|
|
329 | (1) |
|
|
329 | (2) |
|
|
331 | (1) |
|
|
331 | (4) |
|
Web-Based Instruction (WBI) |
|
|
335 | (4) |
|
|
|
|
339 | (2) |
|
Audiences for Computer-Enhanced Education |
|
|
341 | (5) |
|
|
341 | (3) |
|
|
344 | (1) |
|
|
345 | (1) |
|
Issues Related to Computer-Enhanced Education |
|
|
346 | (1) |
|
Educational Opportunities in Nursing Informatics |
|
|
347 | (1) |
|
|
347 | (1) |
|
|
348 | (2) |
|
|
350 | (5) |
|
|
355 | (28) |
|
Terms Related to Telehealth |
|
|
356 | (2) |
|
|
358 | (1) |
|
|
358 | (1) |
|
Desktop Videoconferencing |
|
|
358 | (1) |
|
|
358 | (2) |
|
|
360 | (1) |
|
|
361 | (6) |
|
Online Databases and Tools |
|
|
362 | (2) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
365 | (2) |
|
|
367 | (3) |
|
HIPAA, Referral, and Payment |
|
|
367 | (1) |
|
|
368 | (1) |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
370 | (1) |
|
|
370 | (1) |
|
Establishing a Telehealth Link |
|
|
371 | (5) |
|
Formulating a Telehealth Plan |
|
|
371 | (1) |
|
Building the Supporting Framework |
|
|
372 | (1) |
|
|
373 | (1) |
|
|
374 | (1) |
|
|
374 | (1) |
|
|
374 | (2) |
|
|
376 | (1) |
|
|
376 | (1) |
|
|
377 | (1) |
|
|
378 | (1) |
|
|
379 | (4) |
|
|
383 | (22) |
|
Using Computers to Support Research |
|
|
384 | (10) |
|
Identification of Research Topics |
|
|
384 | (1) |
|
|
384 | (2) |
|
|
386 | (3) |
|
|
389 | (3) |
|
Data Presentation: Graphics |
|
|
392 | (1) |
|
Online Access to Databases |
|
|
392 | (2) |
|
Impediments to Health Care Research |
|
|
394 | (5) |
|
|
395 | (1) |
|
Multi-institutional Research |
|
|
396 | (1) |
|
|
396 | (1) |
|
|
396 | (3) |
|
Dissemination of Research Findings |
|
|
399 | (1) |
|
The Implications of HIPAA for Health Care Research |
|
|
399 | (1) |
|
Students Using Computers for Research |
|
|
400 | (1) |
|
|
401 | (1) |
|
|
402 | (1) |
|
|
402 | (3) |
APPENDIX A: INTERNET PRIMER |
|
405 | (8) |
APPENDIX B: CAREER RESOURCES ON THE INTERNET |
|
413 | (4) |
APPENDIX C: CASE STUDY EXERCISES-SUGGESTED RESPONSES |
|
417 | (20) |
GLOSSARY |
|
437 | (16) |
INDEX |
|
453 | |