Week



Cebu Doctors’ University

College of Nursing

Mandaue City

INFORMATICS

Subject: N 20

Units: 2 units Lecture

1 unit Laboratory

Term: Level III, Second Semester

Teachers:

I. COURSE DESCRIPTION

This course deals with the use of information technology system and data standards based on nursing informatics principles/theories. It further deals with the utilization of clinical information systems in the management and decision-making of patient care.

II. OBJECTIVES

At the end of the course and given relevant actual or simulated situations/conditions, the Level III student will be able to:

1. apply concepts, theories, and principles of informatics in nursing and health care.

2. discuss issues and trends in informatics relevant to nursing and health.

III. METHODS OF TEACHING

Various modes of teaching will be utilized, such as lecture-discussion, simulation, group dynamics, reporting, and other teaching pedagogy.

IV. COURSE REQUIREMENTS

1. accomplishment of all workshops/required outputs

2. accomplishment of all tests, long examinations

3. submission of projects/reports

V. EVALUATION CRITERIA

Quizzes 30%??

Workshops/Outputs??? 20%??

Long Exam 30%??

Participation and Attitude 20%??

_______________

100%

|Week |Contents |Teachers-in-Charge |

| |1. The Computer and Information Literacy | |

| |a. The concepts of information and computer literacy | |

| |b. Elements of a computer lab system | |

| |c. Logging in to a computer system | |

| |d. Creating a PDF file. | |

| |e. Compressing and unzipping a file | |

| |f. Downloading and uploading an email attachment | |

| |g. Developing basic skill in using OneNote to explore a few computer and | |

| |information literacy concepts | |

| |2. Computer Systems: Hardware, Software and Connectivity | |

| |a. Definition of inlock keys formation systems | |

| |b. The major components of computer systems and their related functions | |

| |c. Basic terminology related to hardware, software and connectivity | |

| |d. The main categories of computer software | |

| |e. The language of information systems | |

| |3. The Computer and its Operating System Environment | |

| |a. The Windows operating system environment | |

| |b. Performing the boot process | |

| |c. Explaining a graphical user interface | |

| |d. Operating system trends in end-user design and functions | |

| |e. Starting windows and loging off from windows | |

| |f. Manipulating windows and managing the desktop | |

| |g. Identifying the basic concepts underlying file and disk management, | |

| |including file naming conventions. | |

| |4. Software Applications: Common Tasks | |

| |a. Standards common to applications running in the windows environment | |

| |b. Online help the applications provide | |

| |c. The MS Office ribbon and its tabs, groups, and commands. | |

| |d. Creating, opening, closing, saving, finding and printing files | |

| |e. Cut/copy/paste functions to move or copy data from within the same | |

| |file, from one file to another or from one application to another. | |

| |5. Introduction to Word Processing | |

| |a. Common terms relation to work processing | |

| |b. Create, format, edit, save and print Microsoft word documents | |

| |6. Introduction to Presentation graphics | |

| |a. Basic terminology related to presentation graphics | |

| |b. Selective uses of presentation graphics software | |

| |c. Components of a quality slide and poster presentation | |

| |d. Developing quality powerpoint and poster presentation | |

| |7. Introduction to Spreadsheet | |

| |a. Uses of the spreadsheet in general as well as for healthcare | |

| |applications | |

| |b. Basic terminology related to spreadsheets | |

| |c. Selected functions for using excel | |

| |8. Introduction to Database | |

| |a. Data types that are best managed through databases | |

| |b. Advantages and uses of databases | |

| |c. Characteristics of databases and their associated features | |

| |d. Terms related to database applications | |

| |e. The database design process | |

| |f. Interpreting basic directions for operating a database program | |

| |g. Performing selected queries | |

| |9. Using the World Wide Web | |

| |a. The internet and the world wide web | |

| |b. Related internet terms | |

| |c. The components of a world wide web address | |

| |c. The hardware and software that are needed to connect to the internet | |

| |d. Using browsers to explore the world wide web | |

| |e. Downloading files from the internet | |

| |f. The web page creation process and the healthcare professional’s role in| |

| |it | |

| |10. Computer-assisted Communication | |

| |a. The components needed to establish computer-assisted communication | |

| |b. Computer communication modalities: email, electronic discussion groups,| |

| |bulletin boards, chat rooms, blogs and internet conferencing | |

| |c. Identifying security threats when using email | |

| |d. Sending email messages and attachments | |

| |e. Joining an electronic discussion group | |

| |f. Accessing newsgroups, bulletin boards, chat rooms and online social | |

| |networking communities. | |

| |11. Information: Access, Evaluation and Use | |

| |a. Definition of information literacy | |

| |b. Demonstration of skills related to information literacy | |

| |c. Definition of an information need, including concepts and terms that | |

| |can be used to search for information | |

| |d. Developing a variety of search strategies to locate and access | |

| |information from published literature, and internet resources | |

| |e. Using systematic approach to evaluate the quality of information | |

| |obtained from a variety of sources | |

| |f. Appropriate and inappropriate uses of information | |

| |g. General principles for documenting information resources | |

| |12. Privacy, Confidentiality, Security, and Integrity of Electronic Data | |

| |a. Concepts of privacy, confidentiality, security, and integrity as they | |

| |apply to the management of electronic data | |

| |b. Common threats to privacy, confidentiality, security, and integrity of | |

| |data stored in electronic systems | |

| |c. Procedures for protecting data, software, and hardware | |

| |e. Healthcare security issues related to the internet and the role of | |

| |healthcare providers in protecting patient data | |

| |13. Healthcare Informatics and Information Systems | |

| |a. Definition of healthcare informatics using the concepts of data, | |

| |information, knowledge and wisdom | |

| |b. Automated healthcare delivery systems | |

| |c. Types of healthcare data and explain how the integration of these data | |

| |influences the effectiveness of healthcare information systems. | |

| |d. Selected types and levels of computer-related personnel | |

| |e. Difference between computer literacy, information literacy, | |

| |computer-assisted instruction and healthcare informatics. | |

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download