The Burdett Trust for Nursing and CHIME are working together on the Trust's next major grant programme for nurse-led digital health improvement projects. Applications may be made from 1April to 30 May 2021 and the grants will start in January 2022. Watch this recording from a recent workshop to understand more about the grant programme, how to apply and the Change Agents Framework, delivered by CHIME.
Nanotechnology in Healthcare
NANOTECHNOLOGY IN HEALTHCARE
NANOTECH IN HEALTHCARE
What role does nanotechnology play in healthcare?
Many exciting innovations in the field of medicine are related to developments in nanotechnology.
These innovations include advancements in imaging and diagnostic tools, drug delivery systems, treatment practices, anti-microbial options and cell repair and regeneration.
RISKS AND BENEFITS OF NANOTECHNOLOGY
While the cost of research and products made from nanoparticles can be expensive, nanotechnology affords the advanced treatment of disease by leveraging improved electronic devices, including transistors, LED and plasma displays and quantum computers, and more.
Subscribe to Ignite to access more information about the risks and benefits of Nanotechnology in Healthcare in an expanded, self-paced course and so much more!
Design Thinking in Healthcare
DESIGN THINKING IN HEALTHCARE
PROBLEM SOLVING with design thinking:
Design thinking solves problems by:
Understanding the human needs involved
Constructing the problem in human-centric ways
Creating many ideas in brainstorming sessions, and
Adopting a hands-on approach in prototyping and testing.
How Does Design Thinking Work In Healthcare?
Design Thinking in Patient Care
Applying design thinking to the patient care process, allows you to uncover ways in which care goes beyond the treatment.
Implementing a customer empathy map will help you understand your patient’s pain, concerns, fears and go beyond the clinical treatment.
Design Thinking in Clinical Experience
Think of your most recent waiting experience. Patients could potentially spend a large amount of time in waiting rooms, sometimes waiting to be treated and other times waiting to see the doctor.
Design thinking may bring forth innovative ways of helping patients feel comfortable and making their experience bearable. You can start by asking questions and understanding their mindset. If you can not reduce the wait time, think of ways to utilize it.
Subscribe to Ignite to access more information about the risks and benefits of Design Thinking in Healthcare in an expanded, self-paced course and so much more!
Fully Inclusive Gender Equity: A Resource Guide
This Resource Guide is a living document to provoke discussion, inspire questions, increase knowledge and understanding, and connect us to powerful allies in this space. We hope that you will disseminate the guide, with attribution, through your own networks, and reach out to add to this growing compendium.
DOWNLOAD the 2021 “Resource Guide for Women and Institutions Seeking Fully Inclusive Gender Equality” BELOW:
Contact us with questions regarding this resource guide and with contributions for this resource guide at info@carolemmottfoundation.org
After downloading this resource guide, Subscribe to Ignite to access expanded, self-paced courses and so much more!
Remote Patient Monitoring
HOW DOES REMOTE PATIENT MONITORING WORK?
DATA-DRIVEN DECISIONS
RPM devices, such as scales, pulse oximeters, and blood pressure cuffs, can be connected to patients’ tablets or smartphones via Bluetooth. Wi-Fi is normally used to transmit readings back to the hospital for doctor review.
CALL CENTERS
Nurses who are working within the medical facility's call center can immediately contact the patient as metrics are reported from the patients RPM devices in real time. This approach can also help patients avoid re-hospitalization by providing proper care as a preventive measure and as it is needed.
Medical Compliance
Medical compliance happens in real time. For example, there are tools to help track the vital signs of organ transplant recipients after surgery once they are released from the hospital or patients can wear a patch that detects when they take their medications while giving notifications as needed.
RPM has helped reduce hospital admissions by 38%
Patient satisfaction has increased 25% due to RPM.
DOWNLOAD A “Remote Patient Monitoring” INFOGRAPHIC BELOW:
After downloading that infographic, Subscribe to Ignite to access expanded, self-paced courses and so much more!
Securing Connected Medical Devices
SECURING CONNECTED MEDICAL DEVICES
The use of connectivity in healthcare devices to collect and disseminate real-time data for faster, more accurate analysis, or tailored treatment has certainly created a significant opportunity for medical professionals to improve diagnoses and treatment, and for healthcare providers to reduce operating costs and enable remote monitoring.
However, these devices also bring significant risks if security is not managed properly. These no only include risks to sensitive patient data, but to the patient themselves. When developing a device, or assessing the risks associated with using a device medical professionals and health IT departments there are criteria that should be considered.
CRITERIA THAT SHOULD BE CONSIDERED:
To protect patient privacy, tokenization of patient identity should be used in data stores where feasible.
End-to-end encrypted data communications should be used to preserve confidentiality for communications that cross the Internet, although where possible patient data should not cross the internet.
Digital signatures should be used to preserve integrity. Highly-sensitive data such as firmware should only be accepted from authenticated end-points.
Where possible, Denial of Service attacks should be mitigated by only accepting connection attempts from trusted network zones or specific IP addresses; where this is not possible, connection attempts should be rate limited.
Where data flows in both directions, the security context should be mutually authenticated and cryptographic mechanisms including encryption and signature verification should be bidirectional.
System integrators must check that devices using encryption support compatible cipher suites which are sufficiently strong for the lifetime of the product or device.
To minimize the attack surfaces, unneeded platform services should be turned off.
Security controls should be enabled and only lenient when there is a sufficiently low risk to do.
Patient ID Ban (And Why It Should Be Removed)
PATIENT ID BAN (And Why it Should Be Removed)
A unique or national patient identifier is similar to a Social Security number, where a number code would be used across all providers to identify individual patients. This would replace the current system that uses a name, address, or date of birth. Patient Identifiers are thought to solve the issue of inconsistent patient matching.
The Patient ID ban prohibits the Department of Health and Human Services (HHS) from funding, implementing, or developing a unique patient identifier system to eliminate or reduce the inconsistent patient matching.
WHY SHOULD THE PATIENT ID BAN BE REMOVED?
With the removal of the Patient ID ban, numerous incidents in healthcare that are due to patient mismatching would be reduced.
Incidents that can occur due to patient mismatching includes but are not limited to:
Losing a loved one because he or she is mistaken for another patient, leading to a medical error.
An infant given expressed breast milk from the wrong mother who was infected with hepatitis.
A patient in cardiac arrest denied lifesaving care because the care team pulled the wrong patient's record and adhered to a do not resuscitate order.
Opiates unknowingly prescribed to patients with a history of addiction.
DOWNLOAD A “Patient id ban” INFOGRAPHIC BELOW:
After downloading that infographic, Subscribe to Ignite to access expanded, self-paced courses and so much more!
Presentation Skills
PRESENTATION SKILLS
Communication exists in two forms: verbal and nonverbal communication. As such, when presenting information, applying various techniques is paramount to being understood and understanding what is being said. View the tables below to compare the presentation skills contained in verbal and non-verbal communication.
Non-Verbal Communication
Select on the buttons inside the tabbed menu:
Eye Contact
People usually associate giving eye contact with being trustworthy. Eye contact also conveys interest and emotions.
Facial Expressions
You can show that you are hearing and understanding your colleagues by holding a slight smile, nodding, and by maintaing eye contact.
Handshakes
In business, handshakes are the only appriopriate expression of touch, so make sure you have a firm one.
Posture and Presence
When standing, stand tall. While sitting, sit rigidly at the edge of your seat.
Verbal Communication
Select on the buttons inside the tabbed menu:
Intrapersonal
The private conversations that you have with yourself when you play both roles of being the sender and the receiver.
Interpersonal
This is a one-on-one conversation between two people. The roles of sender and receiver swap throughout the conversation for a clearer understanding.
Small Group
This form happens when there are more than two people in a room. Examples of this form include board meetings, team meetings, and press conferences.
Public
This takes place when one individual addresses a large gathering of people.
If you desire to take a deeper dive into Healthcare IT-related Professional Development content like this, then Subscribe to Ignite! On Ignite, you can access expanded, self-paced courses, and so much more!
Coaching and Mentoring
COACHING AND MENTORING IN THE WORKPLACE
Both coaching and mentoring are processes that guide Healthcare IT Professionals as they aim to achieve continued growth. Coaching is an ongoing process which helps build and maintain effective employee and supervisory relationships. Supervisors and employees can work collaboratively on developing plans that might include training, job enrichment, or work details.
Mentoring involves an intense relationship between the mentor, usually a senior member of a leadership team, and the Healthcare IT Professional. In this relationship, the HIT Professional seeks support, direction, and feedback about his or her career and/ or personal development.
Coaching vs. Mentoring
View some differences between coaching and mentoring below:
Coaching | Mentoring | |
---|---|---|
Orientation | Task-Oriented | Relationship-Oriented |
Length of Time | Short-Term | Long-Term |
Motivation | Performance-Driven | Development-Driven |
DOWNLOAD A “Coaching and Mentoring” INFOGRAPHIC BELOW:
After downloading that infographic, Subscribe to Ignite to access an expanded, self-paced course on Coaching and Mentoring and so much more!
ePhysicians
ePHYSICIANS
FEATURES OF AN ePHYSICIAN
Select the Title of each column to reveal the information inside the tabbed table:
Electronic
Use digital technologies in their medical practice
Equipped
Having digital technologies that are readily available at your disposal
Enabled
Enabled by regulations and guidelines
Empowered
Empowered by technologies that support daily work-related tasks and their e-patients
Engaged
ePhysicians are able to take part in the entire healing process while taking into account the patient's feelings and viewpoint
Expert
Provide technological expertise in the area of their practice
benefits of an ephysician
Some of the benefits of ePhysicians include:
More accessible care for patients
More convenient care for patients
More affordable care for patients
Increased access to specialists
Higher quality care for every patient
DOWNLOAD AN “ephysician” INFOGRAPHIC BELOW:
After downloading that infographic, Subscribe to Ignite to access an expanded, self-paced course on ePhysicians and so much more!
Patient Identity and Matching
PATIENT IDENTITY AND MATCHING
Patient matching is the practice of connecting disparate patient records across different medical providers or facilities. A patient visiting two different doctors or two different hospitals should yield the same medical record, but the data shows this does not usually happen.
Inconsistent patient matching creates a handful of problems for the patient and the provider.
Consequences of mismatched data
Data-matching errors present a considerable threat to the delivery of suitable care and patient safety and carry major consequences. Some of the consequences of mismatched patient data include:
Mismatched patient data and incomplete medical history can
lead to potentially fatal consequences. Mismatched data could result in incorrect or unnecessary medical care.
An example would be if a patient is not matched to the correct record, a drug could be prescribed to the wrong patient. If the clinician does not know of the patient’s drug history, a fatal outcome may result.
Patient safety is always a major priority, but there is also a significant cost burden on the health system if there is a patient matching error.
POTENTIAL SOLUTION WITH SECURITY CONSEQUENCES
A common solution is a national patient identifier. An NPI is similar to a Social Security number, where a number code would be used across all providers to identify individual patients. This would replace the current system that uses a name, address, or date of birth.
DOWNLOAD A “patient identity and matching” INFOGRAPHIC BELOW:
After downloading that infographic, Subscribe to Ignite to access self-paced courses, expert-led intensives, other engaging Healthcare IT learning activities, and more!
Ransomware in HIT
RANSOMEWARE IN HIT
Ransomware has become more prevalent in recent years. Hackers are able to breach security and access up-to-date patient information. Then, they deny the hospital access to the records until they are paid the money they are requesting.
How Does Ransomware Infect?
Typically, ransomware infects victim machines in one of three ways:
Through phishing emails containing a malicious attachment
Via a user clicking on a malicious link
By viewing an advertisement containing malware
Beware of the following cyberattack techniques:
(Select the Title of each column to reveal the information inside the tabbed table.)
Fraudulent Emails
Fraudulent emails have included logos and other imagery associated with the Centers for Disease Control (CDC) and the World Health Organization (WHO). Emails include links to items of interest, such as "Updated cases of the coronavirus near you." Landing pages for these false links may look legitimate, but the sites are often malicious and may be designed to steal email credentials.
Operational and Industry Disruption
The spread of COVID-19 is disrupting temporary supplies and revenue in some industries. Cybercriminals hope victims will mistake their malicious emails for legitimate ones. For example, emails with subject lines like “Coronavirus – Brief note for the shipping industry,” have been sent to employees of companies in industries being disrupted by the virus. Some campaigns have even been disguised to look like invoices, shipping receipts and job applications.
Hidden Malware
There has been a rise in malicious emails directing recipients to educational and health-related websites riddled with malware.Malware is a term used to describe malicious software, including spyware, ransomware, viruses, and worms. Malware breaches a network through a vulnerability, typically when a user clicks a dangerous link or email attachment that then installs risky software.
TIPS TO AVOIDING CYBERATTACKS:
Be skeptical of emails from unknown senders or familiar people (like your company’s CEO or your doctor) who do not usually communicate directly with you.
Don’t click on links or open attachments from those senders.
Don’t forward suspicious emails to co-workers.
Note grammatical errors in the text of the email; they’re usually a sure sign of fraud.
Report suspicious emails to the IT or security department.
DOWNLOAD A “ransomware-in-hit” INFOGRAPHIC BELOW:
After downloading that infographic, Subscribe to Ignite to access self-paced courses, expert-led intensives, other engaging Healthcare IT learning activities, and more!
Interpersonal Skills
INTERPERSONAL SKILLS
What are Interpersonal Skills?
Interpersonal Skills are all the behaviors that allow you to work well with others.
Different Types of Interpersonal Skills
Communication
Conflict Management
Empathy
Leadership
Listening
Negotiation
Positive Attitude
Teamwork
How to Improve Interpersonal Skills
Increase Confidence
Confidence makes it easier for you to express your ideas. Jot down some of your strengths. Keep the list handy and look over it periodically to remind yourself what you have to offer.
Ask for Feedback
Adk your colleagues for feedback on your interpersonal skills. Take in what they say and use it to help yourself improve.
Listen. Then Ask Questions
Practice listening more in a conversation.
Put Yourself in Their Shoes
Try not to act too quickly and put yourself in the other person’s shoes. If something seems to be making them upset, try to understand why and how you can help.
Take a Class
Local universities or adult education centers may provide relevant courses to help.
DOWNLOAD AN INTERPERSONAL SKILLS INFOGRAPHIC BELOW:
After downloading that infographic, Subscribe to Ignite to access an expanded, self-paced course on Interpersonal Skills and so much more!
Conflict Management
CONFLICT MANAGEMENT
In every relationship, conflict is inevitable. Knowing how to manage conflict is a necessary interpersonal skill that not only helps us to arrive at resolutions, but also helps our relationships be more positive and productive. Download this Infographic to discover styles of conflict management.
After downloading this infographic, Subscribe to Ignite to access an expanded, self-paced course on Conflict Management and so much more!
Telehealth
TELEHEALTH
As times change, our methods of delivering effective patient care and education should evolve. Telehealth is a developing telecommunication technology with unique healthcare features and benefits. View some top benefits of Telehealth in the infographic below.
After downloading this infographic, Subscribe to Ignite to access an expanded, self-paced course on Telehealth and so much more!
Innovation Beyond the Edge - Stephanie Lahr, MD, CHCIO
In times like this, positively impacting and saving lives are the most valuable innovations. This series is designed to share creative problem solving in relation to Covid-19 and to highlight innovations implemented by CIOs and other HIT leaders. Enjoy this presentation from Dr. Stephanie Lahr, CIO & CMIO at Monument Health, on how COVID-19 has catalyzed a new way of thinking in the healthcare industry.
Innovation Beyond the Edge - Russell Branzell and Daniel Barchi
In times like this, positively impacting and saving lives are the most valuable innovations. The following session was designed to share creative problem-solving in response to Covid-19 and to highlight innovations implemented by CIOs and other HIT leaders. Enjoy this presentation by CHIME CEO Russ Branzell and Daniel Barchi, CIO, New York-Presbyterian Hospital.
Digital Transformation Strategy and Roadmaps
Edward W. Marx (CIO, Cleveland Clinic) and Paddy Padmanabhan (CEO, Damo Consulting, Inc.) discuss Digital Transformation Strategy and Roadmaps at the Cleveland Clinic Experience. This presentation defines Digital Transformation, describes the forces behind Digital Transformation, and expose innovative healthcare IT strategies that ultimately optimize patient care amidst our changing times.
Healthcare AI
National Patient Identifiers
In 1996, HIPPA called for all healthcare facilities to use national identifiers within the healthcare system. Learn about what national patient identifiers are, and why they are important.