Skip to main content
Medicine LibreTexts

14.2: Health Informatics

  • Page ID
    8990
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)

    ( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\id}{\mathrm{id}}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\kernel}{\mathrm{null}\,}\)

    \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\)

    \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\)

    \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    \( \newcommand{\vectorA}[1]{\vec{#1}}      % arrow\)

    \( \newcommand{\vectorAt}[1]{\vec{\text{#1}}}      % arrow\)

    \( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vectorC}[1]{\textbf{#1}} \)

    \( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)

    \( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)

    \( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)

    \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \(\newcommand{\avec}{\mathbf a}\) \(\newcommand{\bvec}{\mathbf b}\) \(\newcommand{\cvec}{\mathbf c}\) \(\newcommand{\dvec}{\mathbf d}\) \(\newcommand{\dtil}{\widetilde{\mathbf d}}\) \(\newcommand{\evec}{\mathbf e}\) \(\newcommand{\fvec}{\mathbf f}\) \(\newcommand{\nvec}{\mathbf n}\) \(\newcommand{\pvec}{\mathbf p}\) \(\newcommand{\qvec}{\mathbf q}\) \(\newcommand{\svec}{\mathbf s}\) \(\newcommand{\tvec}{\mathbf t}\) \(\newcommand{\uvec}{\mathbf u}\) \(\newcommand{\vvec}{\mathbf v}\) \(\newcommand{\wvec}{\mathbf w}\) \(\newcommand{\xvec}{\mathbf x}\) \(\newcommand{\yvec}{\mathbf y}\) \(\newcommand{\zvec}{\mathbf z}\) \(\newcommand{\rvec}{\mathbf r}\) \(\newcommand{\mvec}{\mathbf m}\) \(\newcommand{\zerovec}{\mathbf 0}\) \(\newcommand{\onevec}{\mathbf 1}\) \(\newcommand{\real}{\mathbb R}\) \(\newcommand{\twovec}[2]{\left[\begin{array}{r}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\ctwovec}[2]{\left[\begin{array}{c}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\threevec}[3]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\cthreevec}[3]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\fourvec}[4]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\cfourvec}[4]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\fivevec}[5]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\cfivevec}[5]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\mattwo}[4]{\left[\begin{array}{rr}#1 \amp #2 \\ #3 \amp #4 \\ \end{array}\right]}\) \(\newcommand{\laspan}[1]{\text{Span}\{#1\}}\) \(\newcommand{\bcal}{\cal B}\) \(\newcommand{\ccal}{\cal C}\) \(\newcommand{\scal}{\cal S}\) \(\newcommand{\wcal}{\cal W}\) \(\newcommand{\ecal}{\cal E}\) \(\newcommand{\coords}[2]{\left\{#1\right\}_{#2}}\) \(\newcommand{\gray}[1]{\color{gray}{#1}}\) \(\newcommand{\lgray}[1]{\color{lightgray}{#1}}\) \(\newcommand{\rank}{\operatorname{rank}}\) \(\newcommand{\row}{\text{Row}}\) \(\newcommand{\col}{\text{Col}}\) \(\renewcommand{\row}{\text{Row}}\) \(\newcommand{\nul}{\text{Nul}}\) \(\newcommand{\var}{\text{Var}}\) \(\newcommand{\corr}{\text{corr}}\) \(\newcommand{\len}[1]{\left|#1\right|}\) \(\newcommand{\bbar}{\overline{\bvec}}\) \(\newcommand{\bhat}{\widehat{\bvec}}\) \(\newcommand{\bperp}{\bvec^\perp}\) \(\newcommand{\xhat}{\widehat{\xvec}}\) \(\newcommand{\vhat}{\widehat{\vvec}}\) \(\newcommand{\uhat}{\widehat{\uvec}}\) \(\newcommand{\what}{\widehat{\wvec}}\) \(\newcommand{\Sighat}{\widehat{\Sigma}}\) \(\newcommand{\lt}{<}\) \(\newcommand{\gt}{>}\) \(\newcommand{\amp}{&}\) \(\definecolor{fillinmathshade}{gray}{0.9}\)

    Nursing Informatics

    Health information systems specialize in storing, managing, capturing, and transmitting information about the health of individuals along with all activities within the health care organization (CASN, 2012). Nursing informatics is a specialty that incorporates nursing care with the use of computers and information science to provide information about nursing care delivery. The Canadian Association of Schools of Nursing (CASN) developed a resource that outlines the competencies required by nursing students upon graduation (see CASN, 2012). When entering the workforce, graduate nurses are expected to (1) use information to support safe, effective, and evidenced-informed care for their clients; (2) follow workplace, professional association, and regulatory bodies’ standards with respect to information and communication technologies; and (3) be able to use information and communication technologies in practice. Required skills include, but are not limited to, searching for credible and reliable health information online and assisting clients and their families in finding and evaluating the credibility and reliability of online health information.

    From the Field

    Understanding principles related to nursing informatics is important for student nurses who will both observe and experience countless examples of clients’ use of technology throughout their careers. Examples include:

    • working in a rural setting and using telehealth for a client’s appointment with a specialist;
    • using electronic health records in daily practice; and
    • using a medical app to assist in delivering safe, effective client care.

    e-Health

    e-Health is a term used by Health Canada to describe the information and communication technologies used in health care, which includes a range of services such as electronic patient administration systems, lab and diagnostic tests, information services, and telehealth and telehomecare monitoring devices (including remote vital sign monitoring).

    m-Health

    Mobile technology has changed the way health care providers communicate, monitor, and connect with clients, families, and other health care providers. Any mobile device with smartphone capabilities allows for downloading apps, which are self-contained computer programs that run directly on the device’s home screen. This m-Healthtechnology includes many different types of medical- and health-related apps, currently available either free of charge or for a fee.

    Health and fitness apps are generally intended for daily individual use and are related to monitoring or informing about a variety of healthy activities such as calorie counting or exercise (Aungst, Clauson, Misra, Lewis, & Husain, 2014; Martinez-Pérez, de la Torre-Diez, & López-Coronado, 2013). Medical apps focus more on health care practices and may assist in communication or pictorial representation of a medical condition or may help to record blood pressure or blood sugars in clients with hypertension or diabetes.

    The use of m-Health technology may have potential security issues. Many health apps currently available require the client to input personal health information (Cummings, Borycki, & Roehrer, 2013). The developer informs the user of the terms of use (including use of personal health information) by requiring a confirmation agreement before the app can be used. If the client agrees to the terms of use, users must be informed of who has access to any personal information placed within the app. Clients also need to be informed if this information will be monitored by their health care provider or if someone else outside the circle of care will have access to this health information, such as the app developer. All health care providers must follow HIPA (Health Information Protection Act) when using apps with multiple clients so that any personal information is de-identified. If more than one client is accessing a mobile device during a hospital stay or health consult, it is also important to develop privacy policies to prevent clients from accessing another client’s health information entered into the app.

    Infection control procedures must be developed based on the type of devices in use within the health care setting. Health care providers must consider infection control procedures when devices are shared between clients.

    When choosing health care apps for clients, providers must consider factors such as the client’s age, the cost of the app, and app-specific features (e.g., email, messaging, or support groups) to determine if they will meet the needs of the client (Ristau, Yang, & White, 2013). If the client is to use the app upon discharge or at home, it must be cost effective. Some apps require an internet connection, so the client will need to have regular or intermittent access to the internet. The app must also be easy to use and updated regularly to provide current, reliable information.

    Essential Learning Activity 14.1.1

    For more information on nursing informatics, see CASN’s report titled “Nursing Informatics: Entry-to-Practice Competencies For Registered Nurses,” then answer the following questions:

    1. What three entry-to-practice informatics competencies does CASN set out?
    2. Select one of these competencies and list the indicators.

    For more information on privacy, review the sites below, then answer the questions that follow:

    Health Insurance Portability and Accountability Act for Professionals, US Department of Health and Human Services

    1. Can health information be shared in a severe disaster?
    2. Who has the right to consent with respect to whether a covered entity may electronically exchange a minor’s protected health information to or through a health information organization?

    Your Personal Health Information and Privacy (Government of Saskatchewan)

    1. Who are the trustees under the Health Information Protection Act?
    2. What rights do you have with respect to your personal information?

    How do I get access to information? (Office of the Saskatchewan Information and Privacy Commissioner)

    1. How do you access the type of information you need from the Office of the Saskatchewan Information and Privacy Commissioner?

    This page titled 14.2: Health Informatics is shared under a CC BY 4.0 license and was authored, remixed, and/or curated by Shauna Davies via source content that was edited to the style and standards of the LibreTexts platform.