.

Sunday, February 24, 2019

Information Technology and Health Care Essay

Overview of current and emerging schooling technology musical arrangements and devices that atomic number 18 commonly apply by health trouble organizationsThe utilization of development technology systems and devices in each(prenominal)(prenominal) aras of the work show up is expanding. With the advent of the microcomputer, computer use has diffuse to all beas of work including health attending organizations. Computer systems in health care facilities today may encompass a electronic network of microcomputers in the succeeding(a).A primary use of computers in health care is for the documentation of the perseverings data. Today, computer programs that are designed to create diligent records abound. These programs bear input of admission data, recording of treat progress records, development of nursing care plans (both standardized and individualized), documentation of diligent teaching completed, scheduling of patients, recording of dietary intake and documentatio n of medication orders and administration. Some programs are so complete that they have virtually replaced the standard patient chart.The advent of information technology springs from the idea that information superhighway is made available to all people from all walks of life. All sorts of information are made affectionate at the tip of one(a)s fingers and drop be retrieved in a short period of time through the amazing profit technology, computerized or electronically functioned data system.What used to be data, standardised records or public documents, gat hered for weeks or days piece of tail presently be obtained in minutes or seconds. What used to be information for selected or privileged few intellectuals are now exposed to the public regardless of state, race, ethnical culture, sex or status, non to mention a few restricted information that are confined to certain get along levels, or those that are sensitive to security and privacy (Winkler 1997).Potential risks a nd constraints associated with each of these technology systems1. The Assessment ProcessThe Assessment wreak in a healthcare system is highly confidential. All patients have the right to confidentiality. patient of care information such as diagnosis, prognosis and care plans should be kept secret to those not concerned with the patients condition. solo authorized individuals should have access to information about a patient. medical exam exam records must be kept in a secure place where only those authorized to have access can obtain the records.The patient has a right to access his or her own record, and only by obtaining the patients permission can records or information be released to others. Agencies are required by state, federal and accrediting rules to have policies by the curb periodically followed.However, there are potential risks associated with these upstart technology systems oddly in the judgment area. If a smart agent works with a patient in conducting on-li ne assessment through a receiving set phone device, then a potential risk here would be the improper assessment due to a wrong registration of the patients voice tied(p) if coded repetitively (Dertouzos & Gerschenfeld as qtd in Skiba and Cohen 2003).In the same manner, a constraint here would involve extracting information from the encounter. It is crucial to remember that the transaction cannot be completed without at least close to exchange of intelligence amidst the patient and another person. These digital systems that collect, break up and respond to client condition can assess wrongly every information initially given. Even if they are rarely down or suboptimal, still, a patients life cannot be entrusted to a technology system no matter how smart it may be. TheAssessment process still is an important stage in any healthcare system that needs personal analysis and evaluation. Thus, a foreseeable constraint here is the fact that people may not really use it pronto since th ey would still prefer someone with whom they could talk to in a to a greater extent relaxed manner.Leaving the assessment part to any device is not that reliable because it can still malfunction and give a wrong assessment that can send a distressed patient in a more distressed state. The seamless voice recognition may transport the wrong data. Even if the human computer interface uses natural terminology structure, there is a possibility that the human computer lead not know the underlying codification structure (Dertouzos & Gerschenfeld as qtd in Skiba and Cohen 2003). This is the likely constraint that may interfere with the successful effectuation of each system.2. communications Technology SystemsIn the area of Communications, being primarily electronic and multidimensional testament be a great leap in the future when one can easily communicate with health care professionals employ both synchronous and asynchronous communication. (Skiba & Cohen, 2003). According to res earches, there are more than 100 nations that are currently engaged in espionage against US companied. Distinctions between global and local are now slowly being eradicated. guild shifts industrial boundaries from the static to the dynamic. The result is global competition of a uniquely unpredictable nature. Enterprises that previously worked hand in hand in incompatible areas may now find themselves at odds with each other, even spying on each other.Since millions of information is readily accessed nowadays, the possibility of disseminating mixed-up, traitorously or misleading information is high. This can be dangerous when used and relied upon for legitimate purposes. Moreover, some information and data need to be protect and if allowed for public consumption, the parties concerned have to ensure that the information must be updated, reliable and truthful before they are released to the public.The credibility and integrity are at stake at all times if their data are found to b e scrupulous, unreliable, and erroneous. Similarly, data bank sources or data controllers must take possible measures to protect the personal data that they are held responsible in viewing such information for unlawful, harmful and questionable purposes (Skiba & Cohen, 2003).3. superintend processFuture gadgets in monitor for the healthcare system will be state-of the-art such that smart devices will then be tie to ones personal Bodynet. This is the term used for the personal network coordinating the devices and both transmit and receive information within the premise of the hospital. It can even be hooked up such that these monitoring devices can reach until the homes of these patients.There will be such a thing as ubiquitous monitoring such that lifestyle factors are monitored too. Even the amount of food in a refrigerator can be monitored making all behaviors and actions available for monitoring purposes. (Skiba & Cohen 2003).Since monitoring can extend beyond hospital walls, the likelihood of information being transferred from one data source to another is highly possible. Smart devices that automatically monitor a patients electronic record can pass on wrong electronic records.A possible constraint here is the refusal of parties to avail of such devices since it can be restricting. Devices may be available solely only the agreeable parties will readily avail of it. Besides, it can be prohibitive in price.The focal point of good risk counselling is the identification and treatment of these risks, an integral component of any organizations strategic management. In a healthcare system set-up, the monitoring process can run awry if the devices used in attachments are improperly done. (Stoneburner, G. et al).IT security practitioners assigned to healthcare systems are responsible for proper implementation of security requirements in their IT systems especially in the monitoring process. As changes fare in the existing IT system environment, the IT securi ty practitioners must support or use the risk management process to identify and assess new potential risks and implement new security controls as required to rampart their IT systems.According to Pamela Matthews, conducting these efficient management researches for the results of patients test will prove to be very helpful in coming up with an effective and technologically advanced solutions that would be the answer to treatment.ConclusionIn the final analysis, informatization streamlines troubleshooting of involved systems. Technology today is embedded in and around products in ship canal that facilitate a steady stream of information about medical transactions and the use to which products and services are put. It is essential that a correspondence be done on both technology and the health care system where most people prefer a more condole with and personalized method.REFERENCESDertouzos, M. (1998). What will be How the new world of information will change ourlives. New York HarperEdge. (context physical contact from Skiba & Cohen)Gerschenfeld, N. (2000). When things start to think. New York Henry Holt & Co.(context link from Skiba & Cohen)Matthews, P. (2000). Leveraging Technology for Success. Journal of HealthcareInformation Management Vol. 14 No. 2 . Retrieved Sept. 11, 2006 fromhttp//www.himss.org/asp/ContentRedirector.asp?ContentID=749

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.