¶ … Pulse of Electronic Medical Records
Taking the Pulse
Dr. Cara is treating a patient for congestive heart failure in the hospital emergency room. The elderly female patient has made multiple trips to the ER the last four months after suffering chest pains, palpitations and other health scares.
Before ending her 12-hour shift, Dr. Cara writes instructions on the patient's medical chart. Under the column that reads "medications," she writes "now nec,," an abbreviation for "now necessary."
An hour later, the next attending ER physician reviews the chart -- and then, struggling for clarity, reads it several times again. Is that a "w" or a "t"? Is that word "now" or "not"? He cannot reach Dr. Cara by phone, but sees that she has been consulting with the patient's cardiologist. Assuming from this piece of information that the patient has been prescribed medication from the cardiologist, the physician reads Dr. Cara's note as "not nec.," or "not necessary."
His interpretation is as wrong as it can be.
Quality health care has been defined as "doing the right thing at the right time in the right way to the right person and having the best possible results" (Agency for Healthcare Research Quality, 2004). But this patient, and perhaps thousands like her across the United States every day, receive less than quality health care. In fact, errors like this one can, and have, cost patients their lives.
"Quality health care" can be measured by many yardsticks -- error reduction and patient safety among them. And it's long been assumed that these two crucial measures would be improved through the use of electronic medical records, or EMRs.
Taking the Pulse 3
But that's not exactly what A.S. Kazley and Y.A. Ozcan (2008) found...
(the pulse of health care is wireless: The future medical enterprise) The Pocket PCs and the PDA's are just only the tools but it is the software that drive these hand held devices that allow for providing better health care services. Starting from an individual medical practitioner and moving on to the communities of professional the use of these hand held devices allow them to work cooperating with each other
Planned change in the eldercare advocacy organization In the coming years, many countries will experience a dramatic shift in healthcare infrastructure due to an expanding elderly population size. However, the changes may vary across countries depending on many factors such as the kind of social welfare available in each country, the political environment which determine policies, the level of healthcare available and individual expectations in each country. Due to this wide
In order to implement these new techniques, an understanding of where handoffs occur is also crucial. Knowing where handoffs are frequent enables the healthcare facility to expect and enable these techniques effectively. Handoffs as mentioned previously, occur in high traffic units of the health care facility, when specialists are needed, and in large facilities such as hospitals. Handoffs generally occur under these circumstances: shift-to-shift handoff, nursing unit-to-nursing unit handoff, nursing
Wireless Broadband Technology Overview of Wireless technology Presently it is quite evident to come across functioning of a sort of wireless technology in the form of mobile phone, a Palm pilot, a smart phone etc. With the inception of fast connectivity in the sphere of commerce it is customary and useful to operate from central locations communicating with the remote branches, conducting conferences in remote places, discussing with every body at every
" (Doukas, Maglogiannis and Kormentzas, 2006) The following illustration shows the evaluation Platform Architecture. Figure 3 The Evaluation Platform Architecture Doukas, Maglogiannis and Kormentzas (2006) state that the patient state vital signs are monitored through a PDA device attached to the patient and transmitted to a computer for evaluation through wireless access or Bluetooth. Additionally the patient site is monitored through use of a camera. The software that has been developed is used
Cyber Terrorism The Internet that we know today and use in our everyday lives was founded in the early 1970s. But all through the Cold War, the apprehension of data theft led to the Internet becoming a decentralized system. But it was not until the late 1980s when the Internet, after years and years of research was made available to public. This was a big change because now anyone in the
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now