Universal Middle-Range Nursing Theory: The Neuman Model Theory Essay

Internet Plan for Healthcare Facilities A suitable IT plan for an electronic inventory control and communication for the 10 healthcare facilities in Gainesville, Florida will have voice or data communication between and among the Corporation, the master practice and the individual practices (China Mobile, 2011). It can provide or extend telehealth or eHealth devices through the network. It can also use mobile phones and similar devices for local health operations, which utilize the main network (China Mobile).

These top-of -- the line applications or devices are fast enabling healthcare operations in both the economically advanced and the developing countries (China Mobile, 2011). Through their skillful use, they can reach un-served and under-served populations, raise the level of efficiency of these operations, and cut down on costs of healthcare delivery, as a consequence. As consequences, they contribute to the effectiveness of public health programs and research, help prevent and treat disease of both mind and body, and reduce hospital visits and stays (China Mobile).

This type of hook-up internet setup, using the tablet-type device, can perform healthcare functions and activities speedily (China Mobile, 2011). These devices also allow self-diagnostics, supervision of long-term treatments, dispatch of clinical information from source to destinations in a flash, transmission of public messages, soliciting and recruiting of data on public health, personnel administration and control and supervision of supplies. These mobile networks' capabilities can be further enhanced by high-resolution images, video and voluminous file exchanges to the advantage of all the patients and the professionals at the practices and the Corporation. All of them can benefit from the capabilities of new-generation smartphones' computing power, vast storage and versatility in fitting many applications (China Mobile).

II. Network Security Plan

A strategic emergency plan for Sunshine Health Corporation should be in place and always ready for any eventuality (FCC, 2015). It is essentially a healthcare information system, which focuses on the protection of electronic medical records or EMR, and a reliable network security mechanism (Yoder, 2015). This security mechanism should comply with the guidelines of the Health Insurance Portability and Accountability Act or HIPAA, which specifically addresses IT-based health information systems. These are organizational data, personal records, intellectual property, and customer records. The network mechanism is devoted to the movement of all clinical and patient data from written records to the digital form in a database converted by software applications. It directs the flow of clinical work and office operations and administration (Yoder).

Selection of an EMR Provider

EMR providers sell their services on outsource basis as a third party (Yoder, 2015). The client, or Sunshine Health Corporation, should analyze the kind of EMR service it really needs before looking for one. The provider should be suitable to the company's administrative and clinical needs. Some EMR providers offer the precise service a company needs, such as information management. Computer and network systems should be carefully monitored and protected to ward off loss of data or inactivity (Yoder).

Compliance with HIPAA Requirements

HIPAA rules and requirements guard the privacy and security of public health records (Yoder, 2015). The Corporation's network systems on data transfer and storage should thus comply with HIPAA regulations. The EMR provider, which is already complying to these regulations and offers network security solutions and off-site data backup according to HIPAA rules and requirements, is the right provider for the Corporation (Yoder).

Designing an Emergency-Mode Network Security Plan

A network security plan in this mode will always be ready for the unforeseen and prevent or reduce disruption of the delivery of essential services (FCC, 2015). The objective of this plan is to insure that operations remain un-interrupted and communication systems and network stay secure and operable at all times. The three phases are preparation, response and recovery.

Preparation

An apt and proactive network security plan prepares for communications and the continuity of operations, back-up communications, a wide range of communication systems, emergency notifications, security, power, test equipment and agreements on mutual aid (FCC, 2015). Communications and the continuity of operations consist of operational processes and procedures protective of computers, records and backed-up databases; recovery processes for assessment, repair or restoration, alternative solutions, analysis after an event, and updates of a management plan; communications response team, which will implement the security plan; training of the communications leader and others involved in communication coordination during an event; employee training exercises on all the phases of any event; employee contact lists of important telephone and cell phone numbers and email addresses, which should be regularly updated; priority services,...

...

Preparing back-up or redundant communications should also consider many types of communication systems, which include last-mile connectivity, internal infrastructure, hardware back-up, hardening and alternate routing, uninterrupted power supply and the proximate and market availability of replacement parts. Emergency notifications, such as structure-wide intercom systems, wire phone messages, emails and face-to-face communication, especially during crises. These systems should remain functional despite power failure. Disabled and other vulnerable employees should be especially informed and prepared to obey or cooperate with the plan. Security facilities should shield vital communications and IT equipment and only experienced personnel should be allowed to operate them and have access to them. Virus protection and similar software should be installed, run and regularly updated. Power sources should be insured at all times from commercial providers for extended periods of crisis. Backups like generators, solar power and batteries should be ready at all times in times of power failure. The Corporation may obtain new radios powered by off-the-shelf alkaline batteries with correct adapters. Sources of fuel shall also be generated to refill generators in times of power failure. Batteries for radio, flashlights, fire detectors and supplementary devices are functioning properly, are fully charged, available and ready for use any time. They should be periodically but frequently checked and tested. Additional supplies of batteries at the worksite shall be insured.
Test equipment should be available at all times and can work with both alternating and direct current sources. And the Corporation should establish agreements with similar groups for reciprocal assistance, whether within or outside its area. It is most helpful when these similar organizations share their resources when the Corporation runs short of these during a crisis. Agreement should also be entered into with local utilities, like the telephone, wireless telephone, and water. Likewise, procedures and contact numbers should always be handy in times of need (FCC).

Response

This includes procedures for the assessment of effects of an event, repairs and use of alternate communication devices or systems (FCC, 2015). Respective or involved staff members should be informed and trained on their response functions. The Corporation should undertake a complete communication systems assessment to establish the accurate operational status and conditions of different communication systems, such as land mobile radio systems, repeaters, PHX, LAN or email. Then the level of support the system of capable shall be assessed. A three-phase priority list shall be framed as it will enable the Corporation to know the consequences f losing a particular asset. It also allows the Corporation to convey its thoughts better over losing a certain asset. Such a list shall also improve your capacity to communicate your own needs when needed. There are three levels o criticality enumerated, namely, mission critical, important responses and minor, Mission critical indicates a disaster, which could cost many losses of life, property and system trust breakdowns. Important refers to a serious decrease in the Corporation's capacity to respond effectively to the event or emergency. This can equate with overwhelming loss of lives or property. And minor means that the full capability could be visible to the public if the systems and its architecture or software were changed or replaced (FCC).

Back-up systems shall be activated to make up for the lack of or lag of in communication system or lines. Repairs of any component of the communication system should be undertaken by commercial vendors or the personnel of the Corporation themselves (FCC).

Institutional awareness is important and this is where periodic surveys come in. The Corporation shall update and inform its leaders and the security or emergency management team and the public, when necessary on security situations (FCC, 2015). Risk modeling against the Corporation's infrastructure and its response to probable disasters in the area will be an advantage. Results shall expose a range of possible issues, which likely will include a breakdown of systems. Include costs that may be incurred by repairs in or of the infrastructure system, manpower loss, reduction of liability effects, and supplemental losses (FCC).

Recovery

This phase involves procedures, which will evaluate the impact of an event, undertake repairs or restoration, set up alternate solutions, conduct post-event analysis, and update the network security management plan, as needed (FCC, 2015). The Corporation shall establish a personnel identification scheme to guarantee access in difficult times. This scheme should be…

Sources Used in Documents:

BIBLIOGRAPHY

Benson, C (2015). Security planning. Microsoft Solutions Framework: MSDN. Retrieved on June 28, 2015 from http://www.msdn.microsoft.com/en-us/library/cc723503.aspc

China Mobile (2011). Mobile communication for medical care. Technology Business:

University Cambridge. Retrieved on June 27, 2015 from http://www.slideshare.net/bluepathrec/mobile-communiations-for-mdical-care

FCC (2015). Emergency planning: health sector. Public Safety and Homeland Security Bureau:
Federal Communications Commission. Retrieved on June 28, 2015 from http://www.transition.fcc.gov/pshs/emergency-information/guidelines/health-care.html
Inc. Retrieved on June 29, 2015 from http://www.ehow.com/way_6001923_stategic-health-care-information-systems.html
diagram https://www.nsa.gov/ia/_files/vtechrep/ManageableNetworkPlan.pdf


Cite this Document:

"Universal Middle-Range Nursing Theory The Neuman Model Theory" (2015, June 28) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/universal-middle-range-nursing-theory-the-2151409

"Universal Middle-Range Nursing Theory The Neuman Model Theory" 28 June 2015. Web.26 April. 2024. <
https://www.paperdue.com/essay/universal-middle-range-nursing-theory-the-2151409>

"Universal Middle-Range Nursing Theory The Neuman Model Theory", 28 June 2015, Accessed.26 April. 2024,
https://www.paperdue.com/essay/universal-middle-range-nursing-theory-the-2151409

Related Documents

Watson's Theory Of Nursing Florence Nightingale taught us that nursing theories describe and explain what is, and what is not, nursing" (Parker, 2001, p 4). In nursing today, the need for such clarity and guidance is perhaps more important than at any time in the past. As nursing continues to strive for acceptance of its right to be regarded as a profession, and seeks to expand and develop the bank of