vReflection on Nursing Informatics Competencies
NR-512 NURSING INFORMATICS
Readings are as follows:
McGonigle, D. & Mastrian, Okay. (2015). Nursing informatics and the inspiration of knowledge (third ed.). Burlington, MA: Jones and Bartlett.
Chapter 7: Informatics Roles and the Data Work of Nursing
References
American Affiliation of Schools of Nursing (AACN). (n.d.). Crosswalk of the grasp’s requirements with the baccalaureate and DNP requirements. Retrieved from http://ift.tt/2zRvDGr
American Affiliation of Schools of Nursing QSEN Consortium. (2012). Graduate-level QSEN competencies: Data, talents and attitudes. Retrieved from http://ift.tt/2zvIzRN
Institute of Medication (IOM). (2011). The way in which ahead for nursing: Most important change, advancing properly being. Washington, DC: The Nationwide Academies Press.
McGonigle, D. & Mastrian, Okay. (2015). Nursing informatics and the inspiration of knowledge (third ed.). Sudbury, MA: Jones and Bartlett.
Reay, T., Goodrick, E., Casebeer, A., & Hinings, C. R. (2013). Legitimizing new practices in major properly being care. Effectively being Care Administration Assessment, 38(1), 9–19. doi: 10.1097/HMR.0b013e31824501b6
Scott, E. S. & Miles, J. (2013). Advancing administration functionality in nursing. Nursing Administration Quarterly, 37(1), 77–82. doi:10.1097/NAQ.0b013e3182751998
The TIGER Initiative. (2013). About TIGER: TIGER Imaginative and prescient Assertion. Retrieved from http://ift.tt/2zQJWLk
The TIGER Initiative. (n.d.). Revolutionary administration driving healthcare innovation: The TIGER administration enchancment collaborative report. Retrieved from http://ift.tt/2zuPhr3
The TIGER Initiative. (n.d.). Remodeling education for an informatics agenda: TIGER education and school enchancment collaborative. Retrieved from http://ift.tt/2zQGpwO
Net web page or paragraph numbers need to be included with quotes per APA. See APA re format references and in-text citations i.e. capitalization factors and use of the ampersand versus the phrase (“and”).
Along with not lower than one in-text citation and matching reference.
Look at for grammar and spellings
Dialogue- Reflection on Nursing Informatics Competencies (graded)
Mirror in your self-assessment completed in Week 1. How do your current competencies consider to discussions of NI competencies throughout the revealed, scholarly literature?
Good day NR 512 nurses! Welcome to the week 4 dialogue and exploration of nursing informatics competencies. You all are significantly accustomed to those already as you completed the TIGER competencies in week 1. We will dig a bit deeper this week and apply proof to our dialogue.
The course finish consequence guiding our dialogue this week is:
CO #5: Uncover diversified nurse roles, competencies, and skills in informatics. (POs 2, 11)
——-
This week, replicate in your self-assessment completed in Week 1. The question this week is, “Mirror in your self-assessment completed in Week 1. How do your current competencies consider to discussions of NI competencies throughout the revealed, scholarly literature?”
To have the ability to completely reply to this question it is important COMPARE your current competencies consider to discussions of Nursing Informatics competencies throughout the revealed, scholarly literature. A comparability notes each similarities, or similarities and variations. It’s possible you’ll keep in mind evaluating by using each the block approach or point-by-point approach (you’ll Google these phrases to see how they is probably used) or one other method you uncover easiest.
One other points to ponder as you create your submit: Have you ever ever seen any have an effect on out of your current competencies in your day-after-day observe and even maybe in your persevering with work in the direction of your graduate diploma? Is there adequate literature on the market or does additional Assessment needs to be accomplished on this area? What are your strengths, weaknesses, and the place you wish to focus your finding out in experience and nursing informatics?
Establish: Sophia David
Self analysis of TIGER Nursing
Informatics Competencies
For each assertion beneath, please rank your diploma of competence
Medical Knowledge Administration
Novice Competent Proficient Educated
Seize data and information related to medical care x
Change data and information x
Present on a show display screen x
Print standardized (pre-formatted) experiences x
Present procedures that assure confidentiality
of protected affected particular person properly being data (PHI)
x
Present procedures for sustaining security of PHI x
Present procedures to deal with security of organizational data x
Uncover data saved throughout the HIS to data affected particular person care (pointers, standardized plans of care, protocols, and lots of others.) x
Discuss electronically with others, akin to colleagues x
Knowledge Literacy
Novice Competent Proficient Educated
Resolve the character and extent of the information wished x
Describe data need by the use of key concepts and phrases x
Set up key phrases, synonyms, and related phrases for the information wished x
Describe the accessible proprietary data applications (CINAHL, EBSCO, and lots of others.) x
Resolve most likely probably the most acceptable methods for accessing data electronically : serps, interfaces (the database screens), and content material materials accessible by the use of a given system x
State the hazards and constraints of searching the Net for wished evidence-based data x
Use acceptable search language and parameters for chosen system x
Assess the quantity, prime quality, and relevance of the search outcomes to search out out whether or not or not numerous data retrieval applications or investigative methods must be utilized x
Contemplate data and its sources critically and incorporates chosen data into his or her data base and price system x
Set up verbatim supplies that could be appropriately quoted x
Restate in your particular person phrases main concepts from a provide x
Look at data from diversified sources to evaluate reliability, validity, accuracy, authority, timeliness, and perspective or bias x
Resolve the scholarly nature of a provide akin to: bodily look, selling, peer consider, references, footnotes) x
Analyze the development and logic of supporting arguments or methods x
Resolve the price added by the model new data x
Synthesize conclusions primarily based upon data gathered x
Use data efficiently to carry out a specific objective individually or as a member of a bunch x
Articulate data and skills transferred from prior experiences to fulfill information-need objective x
Manipulate digital textual content material, photos, and data to change from distinctive provide into new context x
Contemplate outcomes of utilizing data x
Describe privateness and security of data x
Make clear free versus fee-based entry to data x
Use permitted passwords and several types of ID for entry to data sources x
Describe shield the integrity of data sources, gear, applications and facilities x
Obtain, retailer, and disseminate textual content material, data, photos, or sounds legally x
Major Laptop computer Competencies
Novice Competent Proficient Educated
Describe the concepts of importing and downloading x
Activate a hyperlink x
Define the time interval e-learning x
Establish decisions for recycling computer components, printer cartridges and paper x
Establish strategies to protect my computer and information x
Start the computer and go online securely using an individual establish and password x
Restart the computer using a suitable routine x
Shut down a non-responding software program x
Shut down the computer using a suitable routine x
Use accessible Help capabilities x
View the computer’s major system data x
Create a desktop icon x
Collapse, develop, restore, resize, switch, shut a window x
Create a folder and subfolder x
Set up widespread file types x
Use a textual content material enhancing software program x
Sort recordsdata x
Rename recordsdata, folders x
Switch recordsdata, folders between folders and between drives x
Restore recordsdata, folders from the recycle bin/wastebasket/trash x
Use anti-virus software program program to scan explicit drives, folders, recordsdata x
Change the default printer from an installed-printer guidelines x
Open an software program x
Create a model new file x
Save a file to a location on a drive x
Shut an software program x
Open a file x
Shut a file x
Swap between open recordsdata x
Copy and paste content material materials between recordsdata x
Present/ conceal built-in toolbars x
Set up risks associated to on-line x
Present a web based net web page in a model new window, tab. x
Focus on the precept benefits of on the spot messaging x
Acknowledge examples of social networking websites, Net boards, chat rooms, on-line computer video video games x
Acknowledge tried phishing x
Make clear the importance of group etiquette (netiquette) x
Set up doable points when sending file attachments x
Full the To, Copy (Cc), Blind copy (Bcc), and subject fields in e-mail x
Insert, take away a file attachment x
Save a draft of an e-mail x
Use a spell-checking machine and correct spelling errors x
Ship an e-mail, ship an e-mail with a low, extreme priority. x
Use the reply, reply to all carry out x
Forward an e-mail x
Add, take away message inbox headings like: sender, subject, date acquired x
Apply a setting to reply with, with out distinctive message insertion x
Flag an e-mail. Take away a flag mark from an e-mail x
Set up an e-mail as study, unread. Mark an e-mail as unread, study x
Look for an e-mail by sender, subject, e-mail content material materials x
Add contact particulars to an deal with e e book. Delete contact particulars from an deal with e e book x