vReflection on Nursing Informatics Competencies
NR-512 NURSING INFORMATICS
Readings are as follows:
McGonigle, D. & Mastrian, Ok. (2015). Nursing informatics and the inspiration of information (third ed.). Burlington, MA: Jones and Bartlett.
Chapter 7: Informatics Roles and the Data Work of Nursing
References
American Affiliation of Faculties of Nursing (AACN). (n.d.). Crosswalk of the grasp’s necessities with the baccalaureate and DNP necessities. Retrieved from http://ift.tt/2zRvDGr
American Affiliation of Faculties of Nursing QSEN Consortium. (2012). Graduate-level QSEN competencies: Data, abilities and attitudes. Retrieved from http://ift.tt/2zvIzRN
Institute of Drugs (IOM). (2011). The way forward for nursing: Main change, advancing well being. Washington, DC: The Nationwide Academies Press.
McGonigle, D. & Mastrian, Ok. (2015). Nursing informatics and the inspiration of information (third ed.). Sudbury, MA: Jones and Bartlett.
Reay, T., Goodrick, E., Casebeer, A., & Hinings, C. R. (2013). Legitimizing new practices in major well being care. Well being Care Administration Evaluate, 38(1), 9–19. doi: 10.1097/HMR.0b013e31824501b6
Scott, E. S. & Miles, J. (2013). Advancing management capability in nursing. Nursing Administration Quarterly, 37(1), 77–82. doi:10.1097/NAQ.0b013e3182751998
The TIGER Initiative. (2013). About TIGER: TIGER Imaginative and prescient Assertion. Retrieved from http://ift.tt/2zQJWLk
The TIGER Initiative. (n.d.). Revolutionary management driving healthcare innovation: The TIGER management growth collaborative report. Retrieved from http://ift.tt/2zuPhr3
The TIGER Initiative. (n.d.). Remodeling schooling for an informatics agenda: TIGER schooling and college growth collaborative. Retrieved from http://ift.tt/2zQGpwO
Web page or paragraph numbers have to be included with quotes per APA. See APA re easy methods to format references and in-text citations i.e. capitalization points and use of the ampersand versus the phrase (“and”).
Together with not less than one in-text quotation and matching reference.
Verify for grammar and spellings
Dialogue- Reflection on Nursing Informatics Competencies (graded)
Replicate on your self-assessment accomplished in Week 1. How do your present competencies evaluate to discussions of NI competencies within the revealed, scholarly literature?
Whats up NR 512 nurses! Welcome to the week four dialogue and exploration of nursing informatics competencies. You all are considerably aware of these already as you accomplished the TIGER competencies in week 1. We’re going to dig a bit deeper this week and apply proof to our dialogue.
The course consequence guiding our dialogue this week is:
CO #5: Discover varied nurse roles, competencies, and abilities in informatics. (POs 2, 11)
——-
This week, mirror on your self-assessment accomplished in Week 1. The Question Assignment this week is, “Replicate on your self-assessment accomplished in Week 1. How do your present competencies evaluate to discussions of NI competencies within the revealed, scholarly literature?”
So as to absolutely reply to this Question Assignment you should COMPARE your present competencies evaluate to discussions of Nursing Informatics competencies within the revealed, scholarly literature. A comparability notes both similarities, or similarities and variations. You would possibly think about evaluating through the use of both the block methodology or point-by-point methodology (you possibly can Google these phrases to see how they could be used) or every other means you discover best.
Another issues to think about as you create your submit: Have you ever seen any impression out of your present competencies in your day by day follow or even perhaps in your persevering with work towards your graduate diploma? Is there sufficient literature on the market or does extra analysis must be achieved on this space? What are your strengths, weaknesses, and the place you want to focus your studying in expertise and nursing informatics?
Identify: Sophia David
Self Assessment of TIGER Nursing
Informatics Competencies
For every assertion under, please rank your degree of competence
Scientific Info Administration
Novice Competent Proficient Knowledgeable
Seize information and knowledge associated to medical care x
Replace information and knowledge x
Show on a display screen x
Print standardized (pre-formatted) studies x
Show procedures that guarantee confidentiality
of protected affected person well being data (PHI)
x
Show procedures for sustaining safety of PHI x
Show procedures to take care of safety of organizational data x
Discover data saved within the HIS to information affected person care (pointers, standardized plans of care, protocols, and many others.) x
Talk electronically with others, corresponding to colleagues x
Info Literacy
Novice Competent Proficient Knowledgeable
Decide the character and extent of the knowledge wanted x
Describe data want by key ideas and phrases x
Determine key phrases, synonyms, and associated phrases for the knowledge wanted x
Describe the accessible proprietary data techniques (CINAHL, EBSCO, and many others.) x
Decide probably the most acceptable strategies for accessing data electronically : search engines like google, interfaces (the database screens), and content material accessible by a given system x
State the dangers and constraints of looking the Web for wanted evidence-based data x
Use acceptable search language and parameters for chosen system x
Assess the amount, high quality, and relevance of the search outcomes to find out whether or not various data retrieval techniques or investigative strategies ought to be utilized x
Consider data and its sources critically and incorporates chosen data into his or her information base and worth system x
Determine verbatim materials that may be appropriately quoted x
Restate in your personal phrases major ideas from a supply x
Evaluate data from varied sources to guage reliability, validity, accuracy, authority, timeliness, and standpoint or bias x
Choose the scholarly nature of a supply corresponding to: bodily look, promoting, peer evaluate, references, footnotes) x
Analyze the construction and logic of supporting arguments or strategies x
Decide the worth added by the brand new data x
Synthesize conclusions based mostly upon data gathered x
Use data successfully to perform a selected function individually or as a member of a gaggle x
Articulate information and abilities transferred from prior experiences to satisfy information-need function x
Manipulate digital textual content, pictures, and information to switch from unique supply into new context x
Consider outcomes of using data x
Describe privateness and safety of knowledge x
Clarify free versus fee-based entry to data x
Use authorized passwords and different types of ID for entry to data sources x
Describe easy methods to protect the integrity of knowledge sources, tools, techniques and services x
Acquire, retailer, and disseminate textual content, information, pictures, or sounds legally x
Primary Pc Competencies
Novice Competent Proficient Knowledgeable
Describe the ideas of importing and downloading x
Activate a hyperlink x
Outline the time period e-learning x
Identify choices for recycling pc parts, printer cartridges and paper x
Identify methods to guard my pc and knowledge x
Begin the pc and log on securely utilizing a person title and password x
Restart the pc utilizing an acceptable routine x
Shut down a non-responding utility x
Shut down the pc utilizing an acceptable routine x
Use accessible Help features x
View the pc’s primary system data x
Create a desktop icon x
Collapse, develop, restore, resize, transfer, shut a window x
Create a folder and subfolder x
Determine frequent file varieties x
Use a textual content modifying utility x
Kind recordsdata x
Rename recordsdata, folders x
Transfer recordsdata, folders between folders and between drives x
Restore recordsdata, folders from the recycle bin/wastebasket/trash x
Use anti-virus software program to scan particular drives, folders, recordsdata x
Change the default printer from an installed-printer checklist x
Open an utility x
Create a brand new file x
Save a file to a location on a drive x
Shut an utility x
Open a file x
Shut a file x
Swap between open recordsdata x
Copy and paste content material between recordsdata x
Show/ cover built-in toolbars x
Determine dangers related to on-line x
Show an online web page in a brand new window, tab. x
Focus on the principle advantages of prompt messaging x
Acknowledge examples of social networking web sites, Web boards, chat rooms, on-line pc video games x
Acknowledge tried phishing x
Clarify the significance of community etiquette (netiquette) x
Determine attainable issues when sending file attachments x
Full the To, Copy (Cc), Blind copy (Bcc), and topic fields in e-mail x
Insert, take away a file attachment x
Save a draft of an e-mail x
Use a spell-checking software and proper spelling errors x
Ship an e-mail, ship an e-mail with a low, excessive precedence. x
Use the reply, reply to all perform x
Ahead an e-mail x
Add, take away message inbox headings like: sender, topic, date obtained x
Apply a setting to answer with, with out unique message insertion x
Flag an e-mail. Take away a flag mark from an e-mail x
Determine an e-mail as learn, unread. Mark an e-mail as unread, learn x
Seek for an e-mail by sender, topic, e-mail content material x
Add contact particulars to an tackle ebook. Delete contact particulars from an tackle ebook x