Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
INFORMATICS
A broad term defined as the application of computer, and information management and processing of data, information, and knowledge.
INFORMATICS
The science concerned with the gathering, manipulation, classification, storage, and retrieval of recorded knowledge The techniques and practices used to manage and operate information systems and technology.
Electronic communication Radio-frequency identification Pharmacy information systems CPOE Electronic prescribing E-health record
Role of IT
Implementation of CPOE E-documentation of administration Integration with pharmacy systems Dispensing devices
INFORMATION Data that has relevance and purpose Has meaning because it is contextualized, categorized, calculated, corrected, or condensed EXAMPLE Knowing particular lab result was high or low from reference valur
5. Drugs.com 6. Yahoo!Health
7. RxList.com 8. RealAge.com 9. MedHelp.org 10. Healthline.com
Clear and regular updating of information with date clearly displayed Accountability for information Process for user feedback and appropriate oversight responsibility Editorial policy has clear statement on process used for selection of content Guidelines on accessibility, searchability, readability
Clinical: Improving a pharmacists access to information about the patient Documentation of clinical practice Utilizes software interfaces that allow pharmacists to document their work directly int5o handheld devices
Administrative: Managers have the information tools that allow them to better assign resources Allowed managers to move pharmacists into clinical roles and increase the overall safety of the medication-use-system
Workflow and Process Improvement: Automation has permitted change in important pharmacist functions and allowed to be accomplished by robots, automated dispensing cabinets and compounding devices Pharmacists are able to participate in patient care teams and exercise clinical skills Automation increased safety e.g. BCMA- bedside barcode medication administration RFID- radiofrequency idenfication
Access to and Use of Information: THREE TIERS Client Tier- user interacts with the system Application Tier- software stored on the local machine Database Tier- contains the database tables where information is stored
Integration Information Systems with Work Activities PIS- serves as the backbone for pharmacy work activities - automates and organizes the daily workflow in addition to coordinating its many clinical function PIS-generated medication administration records (MARs)- help nurses organize activities related to the medication administration process CPOE- systems contain patient lists, profiles, demographic information, electronic medication administration documentation, order forms and other features.
ADVANTAGES: reduction in time spent entering orders by pharmacy staff Elimination of transcription errors, entry on the wrong patient DISADVANTAGES: Complexity-every component must work and work well in conjunction with each other
Types of CDS
Passive Conveyance
Occurs as a result of system design features and choices made during system configuration that may not necessarily be apparent to the user of the system Limits choices a prescriber can make, the institution can help prevent the errors that occur from ordering medication doses, routes of administration, or frequencies that are unsafe, subtherapeutic, excessively costly, nonstandard, or inconsistent with institutional policy
Types of CDS
Active Conveyance
Ensures that key clinical information contained in the PIS or CPOE system can be coded conveys knowledge to the user of the system Highlights abnormal laboratory values and the use of pop-up alerts performed at the time of order entry such as allergies, drug interactions, abnormal doses, therapeutic duplication, intravenous drug admixture incompatibilities, therapeutic indication problems
CDS Rule
Coded program incorporated into the POE system, the PIS, or a standalone CDS system in order to identify specific clinical care or business-related situations for the purposes of alerting specified users of the ned to address a particular situation Rules can be imbedded by the vendor or as conceived by a hospitals employees Rules can take information from disparate systems, perform calculations, and/or
Types of Alerts
Synchronous CDS Alerts
Pop-up warning screens that interrupt user workflow Triggered by specific actions taken by a user of the system The user action of submitting the order invokes a check of the dose against defined criteria within the system and interrupts the user with a request to act on the alert notification before proceeding
Types of Alerts
Asynchronous CDS Alerts
Occur as a result of an imbedded rule and typically do not interrupt workflow unless the user chooses to do so Can occur based on programmed logic using either data already contained within the CPOE system database resulting from user input Can occur based from data sent to the database from ancillary systems
Information Security
Reasonable protection from risk of loss, risk of inappropriate access, or doubt regarding authenticity of information Vulnerabilities and threats to information security may consists of internal failures of hardware or software, human errors, deliberate attacks on information security, and natural catastrophes Confidentiality ensures that the data is readable only by the intended recipients
Information Security
Depends on the degree of sensitivity of the information
Ensure that the physical location where servers are stored has been secured Provide a history of access that can be examined if there are ever questions about who accessed certain data or was involved in specific transactions
Disadvantage is that they do not provide positive identification of individuals because passwords may be shared by multiple individuals
Information Security
Has the ability to back up data so that it can be restored in an event of internal hardware or software failures, these may be accomplished by replicating the data in an alternative medium and site Authenticity of the involved parties and the electronic signature
Criteria of VIPPS
Patient rights to privacy Authentication and security of prescription orders Maintenance of a quality assurance and improvement program Provision of meaningful consultation between patients and pharmacists
VeriSign
Encrypts prescription or other protected health information during the electronic transmission of these data Prevents interception and unintended disclosure of confidential patient information during these transactions
HIPAA (continuation)
It requires the hospital to protect against any reasonably anticipated threats or hazards to the security or integrity of this information and to ensure that rules and safeguards are in place to prevent inappropriate disclosure of this information Disclosure of PHI is limited to the minimum needed for health care treatment, business operations, and quality improvement A technique that is useful when handling
Encryption
Involves replacing identifiers that are traceable to an individual with another set of letters or numbers which cannot be linked back to individual patients De-identification very useful when doing analyses of aggregate data sets, examining overall prescribing trends, and evaluating drug utilization when there is no need to identify patients specifically
Led to the incorporation of informatics learning outcomes for both college of pharmacy and residency curriculums.
Devoted to enhancing networking opportunities and improving health outcomes through the use and integration of data, information, knowledge, technology, and automation in medication-use-process.
Field of pharmacy informatics is constantly evolving. Many pharmacists have found applying their clinical knowledge with information technology skills for the purposes of bettering patient care to a very satisfying and rewarding career.